OWASP A10 and A9: API and Component Attacks


Overview/Description
Target Audience
Prerequisites
Expected Duration
Lesson Objectives
Course Number
Expertise Level



Overview/Description
OWASP Top 10 list items 10 and 9 are exploits of APIs and components of web applications.

Target Audience
Individuals who wish to increase their knowledge in the field of web application security and common exploits used against web applications

Prerequisites
None

Expected Duration (hours)
0.9

Lesson Objectives

OWASP A10 and A9: API and Component Attacks

  • start the course
  • define what an underprotected API is
  • describe how underprotected APIs can be exploited and what kind of access is needed to exploit it
  • describe how easy it is to detect underprotected APIs and how common they are
  • list the technical and business impacts of underprotected APIs
  • provide examples of underprotected API attacks
  • specify what a vulnerable component is
  • describe how vulnerable components can be exploited and what kind of access is needed to exploit them
  • describe how easy it is to detect vulnerable components and how common they are
  • list the technical and business impacts of vulnerable components
  • provide examples of vulnerable component attacks
  • purchase merchandise at an unauthorized discount
  • describe what A10 and A9 are and how they affect web application security
  • Course Number:
    sp_owtt_a07_it_enus

    Expertise Level
    Intermediate