In this case there would be some initial setup steps needed, as they would need an API key to use the service. To do this they can use a mapping API (for example Google Maps API) to generate maps with the charge points marked on it. The company wants to show the charging points on a map. Examples of APIsĪs an example consider a company such as ZapMap which is developing a website that allows users to find nearby charging points for electric cars. These APIs provide a wide range of additional attack surfaces to malicious users, and often these are overlooked by security teams because they are only used by developers and other machines (see the interview with Corey Ball for more information on this). Some of these are public APIs which are offered as a service to paying customers, but APIs are also used to provide microservices internally within an organization, allowing different teams within the company to integrate their separate modules together. There are many APIs offered by a wide range of organizations. However the web is also used to provide APIs (Application Programming Interfaces), which allow different applications to talk to each other. These web pages are intended for ordinary end-users. Most of us use web applications frequently for everyday things like news, entertainment, shopping and so on. In this post we discuss how the crawler was adapted to work with API endpoints rather than web pages. Other blog posts cover how Burp Scanner’s crawler follows links in web pages to find attack surfaces that might expose security vulnerabilities. Both Burp Suite Professional and Burp Suite Enterprise Edition contain Burp Scanner - allowing users to easily scan web applications for vulnerabilities.
0 Comments
Leave a Reply. |
AuthorWrite something about yourself. No need to be fancy, just an overview. ArchivesCategories |