💻
MMHR0045 - MY Profile
search
⌘Ctrlk
💻
MMHR0045 - MY Profile
  • owasp top 10 api
    • Broken Object Level Authorization(BOLِِِِA)
    • Broken Authentication
    • Unrestricted Resource Consumption
    • Broken Object Property Level Authorization
    • Broken Function Level Authorization (BFLA)
    • Unrestricted Access to Sensitive Business Flows
    • server Side Request Forgery(SSRF)
    • Security Misconfiguration
    • Improper Inventory Management
    • Unsafe Consumption of APIs
  • The 3 Pillars of API Security
  • Application Security Technology Landscape
  • Conclusion and Best Practices
  • API Penetration Testing
gitbookPowered by GitBook
block-quoteOn this pagechevron-down

owasp top 10 api

Broken Object Level Authorization(BOLِِِِA)chevron-rightBroken Authenticationchevron-rightUnrestricted Resource Consumptionchevron-rightBroken Object Property Level Authorizationchevron-rightBroken Function Level Authorization (BFLA)chevron-rightUnrestricted Access to Sensitive Business Flowschevron-rightserver Side Request Forgery(SSRF)chevron-rightSecurity Misconfigurationchevron-rightImproper Inventory Managementchevron-rightUnsafe Consumption of APIschevron-right
NextBroken Object Level Authorization(BOLِِِِA)chevron-right