Exploiting Hidden Endpoints and Centralizing Defense with Kong - Your API Documentation is a Lie Podcast Por  arte de portada

Exploiting Hidden Endpoints and Centralizing Defense with Kong - Your API Documentation is a Lie

Exploiting Hidden Endpoints and Centralizing Defense with Kong - Your API Documentation is a Lie

Escúchala gratis

Ver detalles del espectáculo

Is your API documentation telling the truth? In this episode, we dive into the uncomfortable reality that API documentation is often a "lie" because of the gap between Swagger files and what is actually running in production. We explore how attackers exploit this gap using advanced fuzzing techniques and JWT manipulation, and why a centralised defense strategy using Kong API Gateway is the only way to effectively secure modern microservices.

Key Topics Covered:

The JWT Illusion: We debunk the myth that JSON Web Tokens (JWTs) are inherently secure. Because JWTs are encoded rather than encrypted, anyone who intercepts a token can read its payload in seconds. We discuss how attackers exploit servers that "trust" whatever a token says without a second opinion, leading to unauthorized admin access through signature flaws or "alg: none" exploits.

The Power of API Fuzzing: Learn how attackers use the predictability of REST naming conventions to guess hidden routes. We highlight the use of high-speed tools like ffuf to fire tens of thousands of requests at a server to map out an application's shadow attack surface.

The 405 Signal: Discover the "single most useful technique" in API discovery: the 405 Method Not Allowed response. While many security teams ignore this, it tells an attacker exactly where hidden admin or registration endpoints exist, even if they are unauthorized to access them at that moment.

The Microservice Security Trap: Why writing security logic into every individual microservice is a "losing strategy". We explain how this creates a patchwork of inconsistent controls where one weak, legacy service can compromise the entire perimeter.

Centralising Defense with Kong Gateway: We break down how Kong acts as a gatekeeper, ensuring no request reaches the backend without passing through global security controls. Learn how to use rate limiting to kill automated attacks and the critical importance of disabling direct access to backend server IP addresses.

Featured Experts: This episode draws on a hands-on workshop led by Marudhamaran Gunasekaran, Principal Security Consultant, and insights from Aditya Patni, Security Research Writer at Practical DevSecOps.

Call to Action: Stop relying on optional security suggestions. If you want to build real-world API security skills, check out the Certified API Security Professional (CASP) program, which focuses on hands-on labs rather than multiple-choice theory. You can also watch the full API Security Workshop on the Practical DevSecOps YouTube channel to see these exploits and defenses in action.

Don't let an attacker find your hidden endpoints before you do.

https://www.linkedin.com/company/practical-devsecops/
https://www.youtube.com/@PracticalDevSecOps
https://twitter.com/pdevsecops


Todavía no hay opiniones