Kilobyte ZeroExplain Like I’m Five: OWASP API Top 10 — Excessive Data ExposureA firefighting superhero creates their own API called APInferno, but they set it up wrong and made it vulnerable to excessive data exposure.Jun 5, 2023Jun 5, 2023
Kilobyte ZeroExplain Like I’m Five: OWASP API Top 10 — Broken User AuthenticationEveryman (Hannibal Bates) from the DC Universe helps explain how broken user authentication can be exploited.Jun 2, 2023Jun 2, 2023
Kilobyte ZeroExplain Like I’m Five: OWASP API Top 10— Broken Object Level AuthorizationLet’s use a little “toy story” to explain broken object level authorization.Jun 1, 2023Jun 1, 2023
Kilobyte ZeroExplain Like I’m Five: Hash FunctionsYou have a bunch of toy ninjas, and each one of them has a unique personality and skillset. The problem is all your ninja toys look the…May 31, 2023May 31, 2023
Kilobyte ZeroExplaining JSON Web Tokens (JWT) with Spider-ManImagine your name is Peter Parker, and you’re a really normal boy who goes to school and lives with his aunt and uncle. One day you were…May 26, 20231May 26, 20231
Kilobyte ZeroExplain Like I’m Five: How APIs Work with HTTP RequestsYou have a lot of toys, and you decide you want to share your toys with your friend. But your friend doesn’t know what toys you have or how…May 25, 2023May 25, 2023