Versaria + Axway

solving-the-top-11-api-threats

Issue link: https://axway.uberflip.com/i/991646

Contents of this Issue

Navigation

Page 7 of 27

BRUTE FORCE CONTEXT Unfortunately, computers are fairly stupid, and this is especially true of security protocols. In the real world, if you were to punch someone in the stomach, they would do one of two things: punch you back or run away. The one thing they would not do is say "try again." Yet this is how most security protocols function. Authentication systems are built on at least one secret that the user knows and the attacker does not. Attackers leverage misplaced trust that secrets cannot be reverse-engineered. VULNERABILITIES IDENTIFICATION & TRACKING Attackers use brute-force replay and retry attacks to impersonate or gain access to a legitimate user's authenticated session The authentication system must log the number, type and time of access requests COUNTERMEASURE(S) Rate-limiting services can be delivered via an API gateway to throttle access requests and detect potential malicious patterns like brute-force attacks. This should be done at network, application and user levels. ASSURANCE Build test harnesses that are designed to lock out users aer multiple failed attempts with invalid credentials and tokens. 03 | The Curious Case of Brute Force

Articles in this issue

view archives of Versaria + Axway - solving-the-top-11-api-threats