Abusing Web APIs Through Scripted Android Applications by Daniel Peck
Enterprise API Security Choices by Blake Dournaee
Enterprise security teams are dealing with a deluge of API deployments from internal SOA, B2B partner APIs, corporate BYOD initiatives, and open developer community API innovation. Applying consistent threat protection, authentication, rate limits, security standards, and general corporate visibility into API security vulnerabilities from device to the server side is a complex endeavor.
To illustrate the issues, we dive into an example of abusing web application APIs through the use of associated Android apps. We'll demonstrate using the JVM based scripting language JRuby to load, modify, and run code from targeted APKs in an easily scriptable way. We'll leverage this to demonstrate attacks against web APIs that have reduced their security requirements in order to allow for a frictionless mobile experience, such as removing the need for captchas, email validation, and other usage restrictions.