Room progress ( 0% )
Task 1Introduction
Task includes a deployable machine
Task 2Understanding APIs - A refresher
Task 3Vulnerability I - Broken Object Level Authorisation (BOLA)
Task 4Vulnerability II - Broken User Authentication (BUA)
Task 5Vulnerability III - Excessive Data Exposure
Task 6Vulnerability IV - Lack of Resources & Rate Limiting
Task 7Vulnerability V - Broken Function Level Authorisation
Task 8Conclusion
Ready to learn Cyber Security? Create your free account today!
The OWASP API Security Top 10 - 1 room is only available for premium users. Signup now to access more than 500 free rooms and learn cyber security through a fun, interactive learning environment.
Already have an account? Log in