2022 V13i401
2022 V13i401
1
GADEPALLI VSSSS MANIKANTA KAMAL 2 DR.A.VEERABHADRA RAO
1
M.Tech Student, Department of Computer science, Jogaiah Institutes of Technology and Sciences,
National Highway 214, Kalagampudi, Dist, Palakollu, Andhra Pradesh 534268
2
Professor, Principal, Department of Computer science, Jogaiah Institutes of Technology and Sciences,
National Highway 214, Kalagampudi, Dist, Palakollu, Andhra Pradesh 534268
[email protected]
ABSTRACT
Most modern cloud and web services are programmatically accessed through REST APIs. This paper
discusses how an attacker might compromise a service by exploiting vulnerabilities in its REST API. We
introduce four security rules that capture desirable properties of REST APIs and services. We then show
how a stateful REST API fuzzer can be extended with active property checkers that automatically test and
detect violations of these rules. We discuss how to implement such checkers in a modular and efficient
way. Using these checkers, we found new bugs in several deployed production Azure and Office365 cloud
services, and we discussed their security implications. All these bugs have been fixed.
1 INTRODUCTION Scanning - Postman is a popular tool for trying
1.1 INTRODUCTION TO THE PROJECT out REST APIs' functionality. A Postman
Cloud computing is exploding. Over the Collection is a report that may be exported from
previous few years, hundreds of latest cloud the tool and shared with other customers to
services had been deployed by using cloud institution together applicable requests (API
platform providers, like Amazon Web Services endpoints). The JSON layout is used to export
and Microsoft Azure, and with the aid of their those collections. Customers can now configure
customers who are “digitally remodeling” their their API scans with the use of Postman
companies by way of modernizing their tactics Collection for their API, thanks to the addition
whilst amassing and reading all forms of new of Postman Collection functionality in Qualys
statistics. Today, most cloud services are WAS.
programmatically accessed thru REST APIs. 1.3 PROBLEM OF EXISTING SYSTEM
REST APIs are applied on top of the ubiquitous SOAP APIs are largely based and use only
HTTP/S protocol, and offer a uniform way to HTTP and XML.
create (PUT/POST), display (GET), manipulate On other hand Soap API requires more resources
(PUT/POST/PATCH), and delete (DELETE) and bandwidth as it needs to convert the data in
cloud assets. Cloud carrier builders can XML which increases its payload and results in
document their REST APIs and generate sample the large sized file.
client code by means of describing their APIs On other hand SOAP cannot make use of REST
using an interface-description language since SOAP is a protocol and REST is an
including Swagger (these days renamed architectural pattern.
OpenAPI). 1.4 PROPOSED SYSTEM
REST APIs are constructed on the pinnacle of
1.2 EXISTING SYSTEM HTTP/S and offer a constant technique to build
Scanning of Swagger-based totally (PUT/POST), display (GET), control
Representational State Transfer (REST) APIs - (PUT/POST/PATCH), and delete (DELETE)
Qualys WAS makes use of the Swagger cloud assets. Developers of cloud offerings can
specification to test REST APIs in addition to use an interface-description language like
scanning SOAP net services. Users simplest Swagger (recently renamed OpenAPI) [25] to
want to make certain that the Swagger model 2. document their REST APIs and create pattern
Zero files (in JSON format) is seen to the purchaser code. A Swagger specification
scanning service, and the APIs could be checked explains a way to use a cloud provider's REST
for standard application security problems API, inclusive of what queries it can deal with,
mechanically. - Support for Postman in the API
Fig 1 v model
3.5.2 Phase of coding:
In the Coding section, the actual coding of the
system modules designed in the Design segment
is finished. Based on the machine and
architectural necessities, the gold standard
programming language is chosen. The coding is
executed in accordance with the coding
standards and rules. Before the final build is
checked into the repository, the code is subjected
to several code critiques and is optimized for
max performance.
3.5.3 V- Model Application
V- Model software is nearly the same as the
waterfall model, as each of the fashions is of a
sequential kind. Requirements ought to be very
clear before the assignment begins, due to the
fact it is also high-priced to go return and make
changes. This model is used within the scientific
improvement subject, as it is a strictly
disciplined domain. Following are the proper
scenarios to apply V-Model:
4DESIGN
4.1Design phase:
CHAPTER 5
TESTING
The cause of trying out is to discover flaws.
Testing is the system of attempting to find each
ability flaw or defect in a especially useful
product. It is a technique of observing the
practicality of elements, sub-assemblies,
assemblies, and or a finished product. It is a way
of writing attempt code with the goal of making
sure that the program satisfies its necessities and
consumer expectations and does not fail in an
unfavorable way. There are many extraordinary
forms of checks. A precise checking out demand
is suggested for each take a look at kind.
.5.1 Types of Testing
The basic levels of Testing:
Client needs acceptance testing
User details:
Features to be tested