Protection, Usability and Improvements in Reflected XSS Filters
|
|
|
- Abigail Moody
- 10 years ago
- Views:
Transcription
1 Protection, Usability and Improvements in Reflected XSS Filters Riccardo Pelizzi System Security Lab Department of Computer Science Stony Brook University May 2, / 19 Riccardo Pelizzi Improvements in Reflected XSS Filters
2 Outline XSS Attacks 2 / 19 Riccardo Pelizzi Improvements in Reflected XSS Filters
3 Outline XSS Attacks Existing XSS Filters 2 / 19 Riccardo Pelizzi Improvements in Reflected XSS Filters
4 Outline XSS Attacks Existing XSS Filters 2 / 19 Riccardo Pelizzi Improvements in Reflected XSS Filters
5 Outline XSS Attacks Existing XSS Filters 2 / 19 Riccardo Pelizzi Improvements in Reflected XSS Filters
6 Outline XSS Attacks Existing XSS Filters and Q&A 2 / 19 Riccardo Pelizzi Improvements in Reflected XSS Filters
7 Same-Origin Policy Attacker Please visit evil.com User Browser Malicious Server payload = send bank.com cookies to evil.com 3 / 19 Riccardo Pelizzi Improvements in Reflected XSS Filters
8 Same-Origin Policy Attacker Please visit evil.com User Click on link Browser Malicious Server payload = send bank.com cookies to evil.com 3 / 19 Riccardo Pelizzi Improvements in Reflected XSS Filters
9 Same-Origin Policy Attacker Please visit evil.com User Click on link Browser GET evil.com Malicious Server payload = send bank.com cookies to evil.com 3 / 19 Riccardo Pelizzi Improvements in Reflected XSS Filters
10 Same-Origin Policy Attacker Please visit evil.com User Click on link Browser GET evil.com Send response+payload Malicious Server payload = send bank.com cookies to evil.com 3 / 19 Riccardo Pelizzi Improvements in Reflected XSS Filters
11 Same-Origin Policy Attacker Please visit evil.com User Click on link Browser Execute payload on evil.com GET evil.com Send response+payload Malicious Server payload = send bank.com cookies to evil.com 3 / 19 Riccardo Pelizzi Improvements in Reflected XSS Filters
12 Same-Origin Policy Attacker Please visit evil.com User Click on link Browser Execute payload on evil.com SOP Violation GET evil.com Send response+payload Malicious Server payload = send bank.com cookies to evil.com 3 / 19 Riccardo Pelizzi Improvements in Reflected XSS Filters
13 XSS Attacks Attacker User/Browser Adds payload to bank.com pages bank.com payload = send bank.com cookies to Attacker 4 / 19 Riccardo Pelizzi Improvements in Reflected XSS Filters
14 XSS Attacks Attacker User/Browser bank.com Adds payload to bank.com pages Visits bank.com payload = send bank.com cookies to Attacker 4 / 19 Riccardo Pelizzi Improvements in Reflected XSS Filters
15 XSS Attacks Attacker User/Browser bank.com Adds payload to bank.com pages Visits bank.com Response+payload payload = send bank.com cookies to Attacker 4 / 19 Riccardo Pelizzi Improvements in Reflected XSS Filters
16 XSS Attacks Attacker User/Browser Adds payload to bank.com pages Execute payload on bank.com Visits bank.com Response+payload bank.com payload = send bank.com cookies to Attacker 4 / 19 Riccardo Pelizzi Improvements in Reflected XSS Filters
17 XSS Attacks Attacker User/Browser Adds payload to bank.com pages Visits bank.com Response+payload bank.com Execute payload on bank.com Cookies payload = send bank.com cookies to Attacker 4 / 19 Riccardo Pelizzi Improvements in Reflected XSS Filters
18 Reflected XSS Attacks Attacker User Please visit bank.com/index.php?branch=payload Browser bank.com payload = send bank.com cookies to Attacker 5 / 19 Riccardo Pelizzi Improvements in Reflected XSS Filters
19 Reflected XSS Attacks Attacker User Browser Please visit bank.com/index.php?branch=payload Clicks on link bank.com payload = send bank.com cookies to Attacker 5 / 19 Riccardo Pelizzi Improvements in Reflected XSS Filters
20 Reflected XSS Attacks Attacker User Browser bank.com Please visit bank.com/index.php?branch=payload Clicks on link GET bank.com+payload payload = send bank.com cookies to Attacker 5 / 19 Riccardo Pelizzi Improvements in Reflected XSS Filters
21 Reflected XSS Attacks Attacker User Browser bank.com Please visit bank.com/index.php?branch=payload Clicks on link GET bank.com+payload Response+payload payload = send bank.com cookies to Attacker 5 / 19 Riccardo Pelizzi Improvements in Reflected XSS Filters
22 Reflected XSS Attacks Attacker User Browser bank.com Please visit bank.com/index.php?branch=payload Clicks on link GET bank.com+payload Response+payload Execute payload on bank.com payload = send bank.com cookies to Attacker 5 / 19 Riccardo Pelizzi Improvements in Reflected XSS Filters
23 Reflected XSS Attacks Attacker User Browser bank.com Please visit bank.com/index.php?branch=payload Clicks on link GET bank.com+payload Response+payload Cookies Execute payload on bank.com payload = send bank.com cookies to Attacker 5 / 19 Riccardo Pelizzi Improvements in Reflected XSS Filters
24 Reflected XSS Example Whole Script Injection Partial Script Injection 6 / 19 Riccardo Pelizzi Improvements in Reflected XSS Filters
25 Reflected XSS Example Whole Script Injection Server: <b>your search query: <?=$ GET["query"]?></b> Request: bank.com/search.php?query=<script>alert(1)</script> Partial Script Injection 6 / 19 Riccardo Pelizzi Improvements in Reflected XSS Filters
26 Reflected XSS Example Whole Script Injection Server: <b>your search query: <?=$ GET["query"]?></b> Request: bank.com/search.php?query=<script>alert(1)</script> Partial Script Injection Server: <script>document.write( <a href="../plugin.php?passed id= + <?=$ GET["id"];?>"></a>); </script> Request: bank.com/search.php?id= );do xss();document.write( 6 / 19 Riccardo Pelizzi Improvements in Reflected XSS Filters
27 Blocking Reflected XSS Attacks Recognize malicious requests. Recognize malicious scripts. 7 / 19 Riccardo Pelizzi Improvements in Reflected XSS Filters
28 Blocking Reflected XSS Attacks Recognize malicious requests. Recognize suspicious requests. Modify suspicious requests. Recognize malicious scripts. 7 / 19 Riccardo Pelizzi Improvements in Reflected XSS Filters
29 Blocking Reflected XSS Attacks Recognize malicious requests. Recognize suspicious requests. Modify suspicious requests. Recognize malicious scripts. Recognize injected scripts. Prevent injected scripts from executing. 7 / 19 Riccardo Pelizzi Improvements in Reflected XSS Filters
30 NoScript Uses complex regular expressions to find JavaScript in outgoing requests. 8 / 19 Riccardo Pelizzi Improvements in Reflected XSS Filters
31 NoScript Uses complex regular expressions to find JavaScript in outgoing requests. Obscure logic for filtering. 8 / 19 Riccardo Pelizzi Improvements in Reflected XSS Filters
32 NoScript Uses complex regular expressions to find JavaScript in outgoing requests. Obscure logic for filtering. False positives. 8 / 19 Riccardo Pelizzi Improvements in Reflected XSS Filters
33 NoScript Uses complex regular expressions to find JavaScript in outgoing requests. Obscure logic for filtering. False positives. Sanitized requests are often invalid. 8 / 19 Riccardo Pelizzi Improvements in Reflected XSS Filters
34 IE8 Using regular expressions, find parameters in response scripts. Modifies HTML responses before they are parsed. 9 / 19 Riccardo Pelizzi Improvements in Reflected XSS Filters
35 IE8 Using regular expressions, find parameters in response scripts. Modifies HTML responses before they are parsed. Hard to identify scripts in the page. 9 / 19 Riccardo Pelizzi Improvements in Reflected XSS Filters
36 IE8 Using regular expressions, find parameters in response scripts. Modifies HTML responses before they are parsed. Hard to identify scripts in the page. Hard to sanitize scripts. 9 / 19 Riccardo Pelizzi Improvements in Reflected XSS Filters
37 XSSAuditor Examines scripts as they are fed to the JavaScript engine. Looks for the script in the URL. 10 / 19 Riccardo Pelizzi Improvements in Reflected XSS Filters
38 XSSAuditor Examines scripts as they are fed to the JavaScript engine. Looks for the script in the URL. Policies do not protect against partial script injections. 10 / 19 Riccardo Pelizzi Improvements in Reflected XSS Filters
39 XSSAuditor Examines scripts as they are fed to the JavaScript engine. Looks for the script in the URL. Policies do not protect against partial script injections. Can only cope with known, simple string transformations. 10 / 19 Riccardo Pelizzi Improvements in Reflected XSS Filters
40 Key Benefits of our Approach Protection against partial script injections, to increase attack vector coverage. 11 / 19 Riccardo Pelizzi Improvements in Reflected XSS Filters
41 Key Benefits of our Approach Protection against partial script injections, to increase attack vector coverage. Taint Inference, to account for arbitrary string transformations. 11 / 19 Riccardo Pelizzi Improvements in Reflected XSS Filters
42 Key Benefits of our Approach Protection against partial script injections, to increase attack vector coverage. Taint Inference, to account for arbitrary string transformations. Policies that minimize false positives. 11 / 19 Riccardo Pelizzi Improvements in Reflected XSS Filters
43 Taint Inference Taint-Inference is an approximate substring matching algorithm with acceptable overhead. Quadratic in the worst case, but mostly linear. 12 / 19 Riccardo Pelizzi Improvements in Reflected XSS Filters
44 Overview Internet Server Request Document Initialization Document URL Post Data Init Parse Headers Parse URL HTML Parser Component Text Node Script Node Permits Search params Script Content Script URL JavaScript Engine Browser 13 / 19 Riccardo Pelizzi Improvements in Reflected XSS Filters
45 Policies Inline Policy for inlined code (<script>...</script>, data URLs, etc) External Policy for external resources (<script src=...>, objects, etc): 14 / 19 Riccardo Pelizzi Improvements in Reflected XSS Filters
46 Policies Inline Policy for inlined code (<script>...</script>, data URLs, etc) Whole Script Injection: a substring of a parameter is found at the beginning of a script. Partial Injection: a parameter is found in a substring of a script, breaking out of a JavaScript string. External Policy for external resources (<script src=...>, objects, etc): 14 / 19 Riccardo Pelizzi Improvements in Reflected XSS Filters
47 Policies Inline Policy for inlined code (<script>...</script>, data URLs, etc) Whole Script Injection: a substring of a parameter is found at the beginning of a script. Partial Injection: a parameter is found in a substring of a script, breaking out of a JavaScript string. External Policy for external resources (<script src=...>, objects, etc): Permit same-origin resources and maintain a cache of valid origins to check each origin only once. 14 / 19 Riccardo Pelizzi Improvements in Reflected XSS Filters
48 Policies Inline Policy for inlined code (<script>...</script>, data URLs, etc) Whole Script Injection: a substring of a parameter is found at the beginning of a script. Partial Injection: a parameter is found in a substring of a script, breaking out of a JavaScript string. External Policy for external resources (<script src=...>, objects, etc): Permit same-origin resources and maintain a cache of valid origins to check each origin only once. Partial Injection: only flag as attack if the attacker controls the domain. 14 / 19 Riccardo Pelizzi Improvements in Reflected XSS Filters
49 Protection Dataset XSSAuditor NoScript xssed 399/ / /400 cheatsheet 20/20 18/20 20/20 Figure: for xssed and cheatsheet dataset Dataset Partial Script Injection String Transformation xssed 16 5 cheatsheet 2 0 Figure: XSSAuditor failures 15 / 19 Riccardo Pelizzi Improvements in Reflected XSS Filters
50 Protection Dataset XSSAuditor NoScript xssed 399/ / /400 cheatsheet 20/20 18/20 20/20 Figure: for xssed and cheatsheet dataset Dataset Partial Script Injection String Transformation xssed 16 5 cheatsheet 2 0 Figure: XSSAuditor failures 8% of web pages from the xssed website are vulnerable to partial injection. 15 / 19 Riccardo Pelizzi Improvements in Reflected XSS Filters
51 Protection Dataset XSSAuditor NoScript xssed 399/ / /400 cheatsheet 20/20 18/20 20/20 Figure: for xssed and cheatsheet dataset Dataset Partial Script Injection String Transformation xssed 16 5 cheatsheet 2 0 Figure: XSSAuditor failures 8% of web pages from the xssed website are vulnerable to partial injection. 18% for a large-scale survey we performed. 15 / 19 Riccardo Pelizzi Improvements in Reflected XSS Filters
52 Protection Dataset XSSAuditor NoScript xssed 399/ / /400 cheatsheet 20/20 18/20 20/20 Figure: for xssed and cheatsheet dataset Dataset Partial Script Injection String Transformation xssed 16 5 cheatsheet 2 0 Figure: XSSAuditor failures 8% of web pages from the xssed website are vulnerable to partial injection. 18% for a large-scale survey we performed. 9% of pages from the 1000 most popular websites have dynamically generated scripts. 15 / 19 Riccardo Pelizzi Improvements in Reflected XSS Filters
53 Compatibility Crawled pages Filter XSSAuditor NoScript # of violations Figure: Compatibility Comparison 16 / 19 Riccardo Pelizzi Improvements in Reflected XSS Filters
54 Compatibility Crawled pages Filter XSSAuditor NoScript # of violations Figure: Compatibility Comparison Most requests did not contain special characters 16 / 19 Riccardo Pelizzi Improvements in Reflected XSS Filters
55 Compatibility Crawled pages Filter XSSAuditor NoScript # of violations Figure: Compatibility Comparison Most requests did not contain special characters Most NoScript violations are puzzling. n=phnjcmlwdp25pljmo9mci%2bpc9zy3jpchq %2B h=55e1652a / 19 Riccardo Pelizzi Improvements in Reflected XSS Filters
56 Compatibility Crawled pages Filter XSSAuditor NoScript # of violations Figure: Compatibility Comparison Most requests did not contain special characters Most NoScript violations are puzzling. n=phnjcmlwdp25pljmo9mci%2bpc9zy3jpchq %2B h=55e1652a183 Discounted 43 actual vulnerabilities from violations. 16 / 19 Riccardo Pelizzi Improvements in Reflected XSS Filters
57 Performance has higher overhead. How much? 17 / 19 Riccardo Pelizzi Improvements in Reflected XSS Filters
58 Performance has higher overhead. How much? modified tp4: 2.5% Responses are served locally. 17 / 19 Riccardo Pelizzi Improvements in Reflected XSS Filters
59 Performance has higher overhead. How much? modified tp4: 2.5% Responses are served locally. Time spent in the taint-inference algorithm from a program trace / page load time: 0.5% Ultimately negligible when factoring in network delay. 17 / 19 Riccardo Pelizzi Improvements in Reflected XSS Filters
60 Implementation Firefox Trunk patch available shortly for download. 18 / 19 Riccardo Pelizzi Improvements in Reflected XSS Filters
61 Implementation Firefox Trunk patch available shortly for download. Implemented as an extension to CSPs, with a separate XPCOM module for taint inference. 18 / 19 Riccardo Pelizzi Improvements in Reflected XSS Filters
62 Implementation Firefox Trunk patch available shortly for download. Implemented as an extension to CSPs, with a separate XPCOM module for taint inference. A subset of the functionalities is being properly introduced into Firefox (Bug #528661) 18 / 19 Riccardo Pelizzi Improvements in Reflected XSS Filters
63 and Q&A XSSAuditor s architecture offers many advantages. 19 / 19 Riccardo Pelizzi Improvements in Reflected XSS Filters
64 and Q&A XSSAuditor s architecture offers many advantages. Our improvements over XSSAuditor increase protection without compromising usability or performance. 19 / 19 Riccardo Pelizzi Improvements in Reflected XSS Filters
65 and Q&A XSSAuditor s architecture offers many advantages. Our improvements over XSSAuditor increase protection without compromising usability or performance. Questions? 19 / 19 Riccardo Pelizzi Improvements in Reflected XSS Filters
A Tale of the Weaknesses of Current Client-Side XSS Filtering
Call To Arms: A Tale of the Weaknesses of Current Client-Side XSS Filtering Martin Johns, Ben Stock, Sebastian Lekies About us Martin Johns, Ben Stock, Sebastian Lekies Security Researchers at SAP, Uni
Document Structure Integrity: A Robust Basis for Cross-Site Scripting Defense
Document Structure Integrity: A Robust Basis for Cross-Site Scripting Defense Yacin Nadji Illinois Institute Of Technology Prateek Saxena UC Berkeley Dawn Song UC Berkeley 1 A Cross-Site Scripting Attack
EVALUATING COMMERCIAL WEB APPLICATION SECURITY. By Aaron Parke
EVALUATING COMMERCIAL WEB APPLICATION SECURITY By Aaron Parke Outline Project background What and why? Targeted sites Testing process Burp s findings Technical talk My findings and thoughts Questions Project
A Tale of the Weaknesses of Current Client-side XSS Filtering
A Tale of the Weaknesses of Current Client-side XSS Filtering Sebastian Lekies (@sebastianlekies), Ben Stock (@kcotsneb) and Martin Johns (@datenkeller) Attention hackers! These slides are preliminary!
A Server and Browser-Transparent CSRF Defense for Web 2.0 Applications. Slides by Connor Schnaith
A Server and Browser-Transparent CSRF Defense for Web 2.0 Applications Slides by Connor Schnaith Cross-Site Request Forgery One-click attack, session riding Recorded since 2001 Fourth out of top 25 most
Webapps Vulnerability Report
Tuesday, May 1, 2012 Webapps Vulnerability Report Introduction This report provides detailed information of every vulnerability that was found and successfully exploited by CORE Impact Professional during
Web Application Security
Web Application Security John Zaharopoulos ITS - Security 10/9/2012 1 Web App Security Trends Web 2.0 Dynamic Webpages Growth of Ajax / Client side Javascript Hardening of OSes Secure by default Auto-patching
Web Application Attacks And WAF Evasion
Web Application Attacks And WAF Evasion Ahmed ALaa (EG-CERT) 19 March 2013 What Are We Going To Talk About? - introduction to web attacks - OWASP organization - OWASP frameworks - Crawling & info. gathering
Finding XSS in Real World
Finding XSS in Real World by Alexander Korznikov [email protected] 1 April 2015 Hi there, in this tutorial, I will try to explain how to find XSS in real world, using some interesting techniques. All
Acunetix Website Audit. 5 November, 2014. Developer Report. Generated by Acunetix WVS Reporter (v8.0 Build 20120808)
Acunetix Website Audit 5 November, 2014 Developer Report Generated by Acunetix WVS Reporter (v8.0 Build 20120808) Scan of http://filesbi.go.id:80/ Scan details Scan information Starttime 05/11/2014 14:44:06
Robust Defence against XSS through Context Free Grammar
Robust Defence against XSS through Context Free Grammar 1 Divya Rishi Sahu, 2 Deepak Singh Tomar 1,2 Dept. of CSE, MANIT, Bhopal, MP, India Abstract JavaScript is one of the world s most widely adopted
Client vs. Server Implementations of Mitigating XSS Security Threats on Web Applications
Journal of Basic and Applied Engineering Research pp. 50-54 Krishi Sanskriti Publications http://www.krishisanskriti.org/jbaer.html Client vs. Server Implementations of Mitigating XSS Security Threats
XSS-GUARD : Precise Dynamic Prevention of Cross Site Scripting (XSS) Attacks
XSS-GUARD : Precise Dynamic Prevention of Cross Site Scripting (XSS) Attacks Prithvi Bisht (http://cs.uic.edu/~pbisht) Joint work with : V.N. Venkatakrishnan Systems and Internet Security Laboratory Department
Universal XSS via IE8s XSS Filters
Universal XSS via IE8s XSS Filters the sordid tale of a wayward hash sign slides: http://p42.us/ie8xss/ About Us Eduardo Vela Nava aka sirdarckcat http://sirdarckcat.net http://twitter.com/sirdarckcat
Cross Site Scripting Prevention
Project Report CS 649 : Network Security Cross Site Scripting Prevention Under Guidance of Prof. Bernard Menezes Submitted By Neelamadhav (09305045) Raju Chinthala (09305056) Kiran Akipogu (09305074) Vijaya
Finding Your Way in Testing Jungle. A Learning Approach to Web Security Testing.
Finding Your Way in Testing Jungle A Learning Approach to Web Security Testing. Research Questions Why is it important to improve website security? What techniques are already in place to test security?
CS 558 Internet Systems and Technologies
CS 558 Internet Systems and Technologies Dimitris Deyannis [email protected] 881 Heat seeking Honeypots: Design and Experience Abstract Compromised Web servers are used to perform many malicious activities.
Check list for web developers
Check list for web developers Requirement Yes No Remarks 1. Input Validation 1.1) Have you done input validation for all the user inputs using white listing and/or sanitization? 1.2) Does the input validation
What about MongoDB? can req.body.input 0; var date = new Date(); do {curdate = new Date();} while(curdate-date<10000)
Security What about MongoDB? Even though MongoDB doesn t use SQL, it can be vulnerable to injection attacks db.collection.find( {active: true, $where: function() { return obj.credits - obj.debits < req.body.input;
Introduction to Computer Security
Introduction to Computer Security Web Application Security Pavel Laskov Wilhelm Schickard Institute for Computer Science Modern threat landscape The majority of modern vulnerabilities are found in web
Intrusion detection for web applications
Intrusion detection for web applications Intrusion detection for web applications Łukasz Pilorz Application Security Team, Allegro.pl Reasons for using IDS solutions known weaknesses and vulnerabilities
Cross Site Scripting in Joomla Acajoom Component
Whitepaper Cross Site Scripting in Joomla Acajoom Component Vandan Joshi December 2011 TABLE OF CONTENTS Abstract... 3 Introduction... 3 A Likely Scenario... 5 The Exploit... 9 The Impact... 12 Recommended
An Efficient Black-box Technique for Defeating Web Application Attacks
2/9/2009 An Efficient Black-box Technique for Defeating Web Application Attacks R. Sekar Stony Brook University (Research supported by DARPA, NSF and ONR) Example: SquirrelMail Command Injection Attack:
Analysis of Browser Defenses against XSS Attack Vectors
Analysis of Browser Defenses against XSS Attack Vectors Shital Dhamal Department of Computer Engineering Lokmanya Tilak College of Engineering Koparkhairne,Navi Mumbai,Maharashtra,India Manisha Mathur
Detect and Sanitise Encoded Cross-Site Scripting and SQL Injection Attack Strings Using a Hash Map
Detect and Sanitise Encoded Cross-Site Scripting and SQL Injection Attack Strings Using a Hash Map Erwin Adi and Irene Salomo School of Computer Science BINUS International BINUS University, Indonesia
Creating Stronger, Safer, Web Facing Code. JPL IT Security Mary Rivera June 17, 2011
Creating Stronger, Safer, Web Facing Code JPL IT Security Mary Rivera June 17, 2011 Agenda Evolving Threats Operating System Application User Generated Content JPL s Application Security Program Securing
Understanding Cross Site Scripting
Understanding Cross Site Scripting Hardik Shah Understanding cross site scripting attacks Introduction: there are many techniques which a intruder can use to compromise the webapplications. one such techniques
Criteria for web application security check. Version 2015.1
Criteria for web application security check Version 2015.1 i Content Introduction... iii ISC- P- 001 ISC- P- 001.1 ISC- P- 001.2 ISC- P- 001.3 ISC- P- 001.4 ISC- P- 001.5 ISC- P- 001.6 ISC- P- 001.7 ISC-
The purpose of this report is to educate our prospective clients about capabilities of Hackers Locked.
This sample report is published with prior consent of our client in view of the fact that the current release of this web application is three major releases ahead in its life cycle. Issues pointed out
Data Breaches and Web Servers: The Giant Sucking Sound
Data Breaches and Web Servers: The Giant Sucking Sound Guy Helmer CTO, Palisade Systems, Inc. Lecturer, Iowa State University @ghelmer Session ID: DAS-204 Session Classification: Intermediate The Giant
Study of Cross-Site Scripting Attacks and Their Countermeasures
Study of Cross-Site Scripting Attacks and Their Countermeasures Gurvinder Kaur University Institute of Engineering and Technology Kurukshetra University India Abstract: - In present-day time, most of the
What is Web Security? Motivation
[email protected] http://www.brucker.ch/ Information Security ETH Zürich Zürich, Switzerland Information Security Fundamentals March 23, 2004 The End Users View The Server Providers View What is Web
Cross Site Scripting (XSS) and PHP Security. Anthony Ferrara NYPHP and OWASP Security Series June 30, 2011
Cross Site Scripting (XSS) and PHP Security Anthony Ferrara NYPHP and OWASP Security Series June 30, 2011 What Is Cross Site Scripting? Injecting Scripts Into Otherwise Benign and Trusted Browser Rendered
Web-Application Security
Web-Application Security Kristian Beilke Arbeitsgruppe Sichere Identität Fachbereich Mathematik und Informatik Freie Universität Berlin 29. Juni 2011 Overview Web Applications SQL Injection XSS Bad Practice
SESSION IDENTIFIER ARE FOR NOW, PASSWORDS ARE FOREVER
SESSION IDENTIFIER ARE FOR NOW, PASSWORDS ARE FOREVER XSS-BASED ABUSE OF BROWSER PASSWORD MANAGERS Ben Stock, Martin Johns, Sebastian Lekies Browser choices Full disclosure: Ben was an intern with Microsoft
Bug Report. Date: March 19, 2011 Reporter: Chris Jarabek ([email protected])
Bug Report Date: March 19, 2011 Reporter: Chris Jarabek ([email protected]) Software: Kimai Version: 0.9.1.1205 Website: http://www.kimai.org Description: Kimai is a web based time-tracking application.
Is Drupal secure? A high-level perspective on web vulnerabilities, Drupal s solutions, and how to maintain site security
Is Drupal secure? A high-level perspective on web vulnerabilities, Drupal s solutions, and how to maintain site security Presented 2009-05-29 by David Strauss Thinking Securely Security is a process, not
A DYNAMIC TOOL FOR DETECTION OF XSS ATTACKS IN A REAL-TIME ENVIRONMENT
A DYNAMIC TOOL FOR DETECTION OF XSS ATTACKS IN A REAL-TIME ENVIRONMENT K. G. Maheswari 1 and R. Anita 2 1 Department of MCA, Institute of Road and Transport Technology, Anna University, Erode, Tamil Nadu,
A Practical Attack to De Anonymize Social Network Users
A Practical Attack to De Anonymize Social Network Users Gilbert Wondracek () Thorsten Holz () Engin Kirda (Institute Eurecom) Christopher Kruegel (UC Santa Barbara) http://iseclab.org 1 Attack Overview
Protecting Web Applications and Users
Protecting Web Applications and Users Technical guidance for improving web application security through implementing web browser based mitigations. Defence Signals Directorate February 2012 Contents 1
Network Security Web Security
Network Security Web Security Anna Sperotto, Ramin Sadre Design and Analysis of Communication Systems Group University of Twente, 2012 Cross Site Scripting Cross Side Scripting (XSS) XSS is a case of (HTML)
Java Program Vulnerabilities
Java Program Vulnerabilities Sheetal Thakare, Dr.B.B.Meshram Abstract The Java programming language provides a lot of security features, build directly into the language and also supplied by security relevant
Web application security
Web application security Sebastian Lopienski CERN Computer Security Team openlab and summer lectures 2010 (non-web question) Is this OK? int set_non_root_uid(int uid) { // making sure that uid is not 0
Bypassing NoScript Security Suite Using Cross-Site Scripting and MITM Attacks
Bypassing NoScript Security Suite March 2016 Mazin Ahmed [email protected] @mazen160 Table of Contents Abstract... 3 Introduction... 3 Research... 4 Solution... 7 Recommendations... 7 Notes... 7 Disclosure
Precise client-side protection against DOM-based Cross-Site Scripting
Precise client-side protection against DOM-based Cross-Site Scripting Ben Stock FAU Erlangen-Nuremberg [email protected] Patrick Spiegel SAP AG [email protected] Sebastian Lekies SAP AG [email protected]
OWASP TOP 10 ILIA ALSHANETSKY @ILIAA HTTPS://JOIND.IN/15741
OWASP TOP 10 ILIA ALSHANETSKY @ILIAA HTTPS://JOIND.IN/15741 ME, MYSELF & I PHP Core Developer Author of Guide to PHP Security Security Aficionado THE CONUNDRUM USABILITY SECURITY YOU CAN HAVE ONE ;-) OPEN
Using Free Tools To Test Web Application Security
Using Free Tools To Test Web Application Security Speaker Biography Matt Neely, CISSP, CTGA, GCIH, and GCWN Manager of the Profiling Team at SecureState Areas of expertise: wireless, penetration testing,
Network Monitoring using MMT:
Network Monitoring using MMT: An application based on the User-Agent field in HTTP headers Vinh Hoa LA Ɨ Raul FUENTES Ɨ PhD Student Prof. Ana CAVALLI Ɨ Ƭ Supervisor Ɨ Telecom SudParis, IMT Ƭ Montimage
Perl In Secure Web Development
Perl In Secure Web Development Jonathan Worthington ([email protected]) August 31, 2005 Perl is used extensively today to build server side web applications. Using the vast array of modules on CPAN, one
Attacks on Clients: Dynamic Content & XSS
Software and Web Security 2 Attacks on Clients: Dynamic Content & XSS (Section 7.1.3 on JavaScript; 7.2.4 on Media content; 7.2.6 on XSS) sws2 1 Recap from last lecture Attacks on web server: attacker/client
CSE598i - Web 2.0 Security OWASP Top 10: The Ten Most Critical Web Application Security Vulnerabilities
CSE598i - Web 2.0 Security OWASP Top 10: The Ten Most Critical Web Application Security Vulnerabilities Thomas Moyer Spring 2010 1 Web Applications What has changed with web applications? Traditional applications
HTTPParameter Pollution. ChrysostomosDaniel
HTTPParameter Pollution ChrysostomosDaniel Introduction Nowadays, many components from web applications are commonly run on the user s computer (such as Javascript), and not just on the application s provider
HTML5. Eoin Keary CTO BCC Risk Advisory. www.bccriskadvisory.com www.edgescan.com
HTML5 Eoin Keary CTO BCC Risk Advisory www.bccriskadvisory.com www.edgescan.com Where are we going? WebSockets HTML5 AngularJS HTML5 Sinks WebSockets: Full duplex communications between client or server
Web applications. Web security: web basics. HTTP requests. URLs. GET request. Myrto Arapinis School of Informatics University of Edinburgh
Web applications Web security: web basics Myrto Arapinis School of Informatics University of Edinburgh HTTP March 19, 2015 Client Server Database (HTML, JavaScript) (PHP) (SQL) 1 / 24 2 / 24 URLs HTTP
Hack Proof Your Webapps
Hack Proof Your Webapps About ERM About the speaker Web Application Security Expert Enterprise Risk Management, Inc. Background Web Development and System Administration Florida International University
Cyber Security Challenge Australia 2014
Cyber Security Challenge Australia 2014 www.cyberchallenge.com.au CySCA2014 Web Penetration Testing Writeup Background: Pentest the web server that is hosted in the environment at www.fortcerts.cysca Web
Ruby on Rails Secure Coding Recommendations
Introduction Altius IT s list of Ruby on Rails Secure Coding Recommendations is based upon security best practices. This list may not be complete and Altius IT recommends this list be augmented with additional
Detection of SQL Injection and XSS Vulnerability in Web Application
International Journal of Engineering and Applied Sciences (IJEAS) ISSN: 2394-3661, Volume-2, Issue-3, March 2015 Detection of SQL Injection and XSS Vulnerability in Web Application Priti Singh, Kirthika
BASELINE SECURITY TEST PLAN FOR EDUCATIONAL WEB AND MOBILE APPLICATIONS
BASELINE SECURITY TEST PLAN FOR EDUCATIONAL WEB AND MOBILE APPLICATIONS Published by Tony Porterfield Feb 1, 2015. Overview The intent of this test plan is to evaluate a baseline set of data security practices
Course Information Course Number: IWT 1229 Course Name: Web Development and Design Foundation
Course Information Course Number: IWT 1229 Course Name: Web Development and Design Foundation Credit-By-Assessment (CBA) Competency List Written Assessment Competency List Introduction to the Internet
External Vulnerability Assessment. -Technical Summary- ABC ORGANIZATION
External Vulnerability Assessment -Technical Summary- Prepared for: ABC ORGANIZATI On March 9, 2008 Prepared by: AOS Security Solutions 1 of 13 Table of Contents Executive Summary... 3 Discovered Security
Bypassing Internet Explorer s XSS Filter
Bypassing Internet Explorer s XSS Filter Or: Oops, that s not supposed to happen. Carlos @RTWaysea About Me Mechanical Drafting Background Engine parts, Architectural fixtures, etc. Friend said Try This
SECURITY ADVISORY. December 2008 Barracuda Load Balancer admin login Cross-site Scripting
SECURITY ADVISORY December 2008 Barracuda Load Balancer admin login Cross-site Scripting Discovered in December 2008 by FortConsult s Security Research Team/Jan Skovgren WARNING NOT FOR DISCLOSURE BEFORE
A Perfect CRIME? TIME Will Tell. Tal Be ery, Web research TL
A Perfect CRIME? TIME Will Tell Tal Be ery, Web research TL Agenda BEAST + Modes of operation CRIME + Gzip compression + Compression + encryption leak data TIME + Timing + compression leak data Attacking
Magento Security and Vulnerabilities. Roman Stepanov
Magento Security and Vulnerabilities Roman Stepanov http://ice.eltrino.com/ Table of contents Introduction Open Web Application Security Project OWASP TOP 10 List Common issues in Magento A1 Injection
Advanced XSS. Nicolas Golubovic
Advanced XSS Nicolas Golubovic Image courtesy of chanpipat / FreeDigitalPhotos.net Today's menu 1. Starter: reboiled XSS 2. Course: spicy blacklists & filters 3. Course: sweet content sniffing 4. Course:
Application security testing: Protecting your application and data
E-Book Application security testing: Protecting your application and data Application security testing is critical in ensuring your data and application is safe from security attack. This ebook offers
Carlos Muñoz Application Security Engineer WhiteHat Security @RTWaysea
Carlos Muñoz Application Security Engineer WhiteHat Security @RTWaysea Bypass: History Explanation: What Is Going On Process: Things To Look For Demos: alert(1) Done Live (hopefully) CSP: Content Security
AJAX and JSON Lessons Learned. Jim Riecken, Senior Software Engineer, Blackboard Inc.
AJAX and JSON Lessons Learned Jim Riecken, Senior Software Engineer, Blackboard Inc. About Me Jim Riecken Senior Software Engineer At Blackboard for 4 years. Work out of the Vancouver office. Working a
1. Introduction. 2. Web Application. 3. Components. 4. Common Vulnerabilities. 5. Improving security in Web applications
1. Introduction 2. Web Application 3. Components 4. Common Vulnerabilities 5. Improving security in Web applications 2 What does World Wide Web security mean? Webmasters=> confidence that their site won
Uploaded images filter evasion for carrying out XSS attacks
February 25, 2007 Uploaded images filter evasion for carrying out XSS attacks Digitаl Security Research Group (DSecRG) Alexander Polyakov [email protected] http://dsecrg.ru Table of contents Introduction...3
Developing ASP.NET MVC 4 Web Applications MOC 20486
Developing ASP.NET MVC 4 Web Applications MOC 20486 Course Outline Module 1: Exploring ASP.NET MVC 4 The goal of this module is to outline to the students the components of the Microsoft Web Technologies
IMRG Peermap API Documentation V 5.0
IMRG Peermap API Documentation V 5.0 An Introduction to the IMRG Peermap Service... 2 Using a Tag Manager... 2 Inserting your Unique API Key within the Script... 2 The JavaScript Snippet... 3 Adding the
EVILSEED: A Guided Approach to Finding Malicious Web Pages
+ EVILSEED: A Guided Approach to Finding Malicious Web Pages Presented by: Alaa Hassan Supervised by: Dr. Tom Chothia + Outline Introduction Introducing EVILSEED. EVILSEED Architecture. Effectiveness of
RIPS - A static source code analyser for vulnerabilities in PHP scripts
RIPS - A static source code analyser for vulnerabilities in PHP scripts Johannes Dahse 1 Introduction The amount of websites have increased rapidly during the last years. While websites consisted mostly
Visualizing a Neo4j Graph Database with KeyLines
Visualizing a Neo4j Graph Database with KeyLines Introduction 2! What is a graph database? 2! What is Neo4j? 2! Why visualize Neo4j? 3! Visualization Architecture 4! Benefits of the KeyLines/Neo4j architecture
Next Generation Clickjacking
Next Generation Clickjacking New attacks against framed web pages Black Hat Europe, 14 th April 2010 Paul Stone [email protected] Coming Up Quick Introduction to Clickjacking Four New Cross-Browser
Security Research Advisory SugarCRM 6.5.17 Cross-Site Scripting Vulnerability
Security Research Advisory SugarCRM 6.5.17 Cross-Site Scripting Vulnerability Table of Contents SUMMARY 3 VULNERABILITY DETAILS 3 TECHNICAL DETAILS 4 LEGAL NOTICES 6 Cross Site Scripting Advisory Number
Security Model for the Client-Side Web Application Environments
Security Model for the Client-Side Web Application Environments May 24, 2007 Sachiko Yoshihama, Naohiko Uramoto, Satoshi Makino, Ai Ishida, Shinya Kawanaka, and Frederik De Keukelaere IBM Tokyo Research
FINAL DoIT 11.03.2015 - v.4 PAYMENT CARD INDUSTRY DATA SECURITY STANDARDS APPLICATION DEVELOPMENT AND MAINTENANCE PROCEDURES
Purpose: The Department of Information Technology (DoIT) is committed to developing secure applications. DoIT s System Development Methodology (SDM) and Application Development requirements ensure that
Network Security in Practice
Network Security in Practice Practices of Network Security ccess control: firewalls ttacks and counter measures Security protocol case studies Kai Shen 12/8/2014 CSC 257/457 - Fall 2014 1 12/8/2014 CSC
The Top Web Application Attacks: Are you vulnerable?
QM07 The Top Web Application Attacks: Are you vulnerable? John Burroughs, CISSP Sr Security Architect, Watchfire Solutions [email protected] Agenda Current State of Web Application Security Understanding
2009-12-26 PST_WEBZINE_0X04. How to solve XSS and mix user's HTML/JavaScript code with your content with just one script
ACS - Active Content Signatures By Eduardo Vela Nava ACS - Active Content Signatures How to solve XSS and mix user's HTML/JavaScript code with your content with just one script Eduardo Vela Nava ([email protected])
Detecting and Exploiting XSS with Xenotix XSS Exploit Framework
Detecting and Exploiting XSS with Xenotix XSS Exploit Framework [email protected] keralacyberforce.in Introduction Cross Site Scripting or XSS vulnerabilities have been reported and exploited since 1990s.
Team Members: Christopher Copper Philip Eittreim Jeremiah Jekich Andrew Reisdorph. Client: Brian Krzys
Team Members: Christopher Copper Philip Eittreim Jeremiah Jekich Andrew Reisdorph Client: Brian Krzys June 17, 2014 Introduction Newmont Mining is a resource extraction company with a research and development
Recent Advances in Web Application Security
Recent Advances in Web Application Security Author: Neelay S Shah Principal Security Consultant Foundstone Professional Services Table of Contents Introduction 3 Content Security Policy 3 Best Practices
Towards More Security in Data Exchange
Towards More Security in Data Exchange Defining Unparsers with Context-Sensitive Encoders for Context-Free Grammars Lars Hermerschmidt, Stephan Kugelmann, Bernhard Rumpe Software http://www.se-rwth.de/
Project 2: Web Security Pitfalls
EECS 388 September 19, 2014 Intro to Computer Security Project 2: Web Security Pitfalls Project 2: Web Security Pitfalls This project is due on Thursday, October 9 at 6 p.m. and counts for 8% of your course
University of Wisconsin Platteville SE411. Senior Seminar. Web System Attacks. Maxwell Friederichs. April 18, 2013
University of Wisconsin Platteville SE411 Senior Seminar Web System Attacks Maxwell Friederichs April 18, 2013 Abstract 1 Data driven web applications are at the cutting edge of technology, and changing
Relax Everybody: HTML5 Is Securer Than You Think
Relax Everybody: HTML5 Is Securer Than You Think Martin Johns (@datenkeller) SAP AG Session ID: ADS-W08 Session Classification: Advanced Motivation For some reason, there is a preconception that HTML5
WEB ATTACKS AND COUNTERMEASURES
WEB ATTACKS AND COUNTERMEASURES February 2008 The Government of the Hong Kong Special Administrative Region The contents of this document remain the property of, and may not be reproduced in whole or in
25 Million Flows Later - Large-scale Detection of DOM-based XSS
25 Million Flows Later - Large-scale Detection of DOM-based XSS Sebastian Lekies SAP AG [email protected] Ben Stock FAU Erlangen-Nuremberg [email protected] Martin Johns SAP AG [email protected]
Security features of ZK Framework
1 Security features of ZK Framework This document provides a brief overview of security concerns related to JavaScript powered enterprise web application in general and how ZK built-in features secures
Reliable Mitigation of DOM-based XSS
Intro XSS Implementation Evaluation Q&A Reliable Mitigation of DOM-based XSS Tobias Mueller 2014-09-07 1 / 39 Intro XSS Implementation Evaluation Q&A About me The results Motivation about:me MSc. cand.
Blackbox Reversing of XSS Filters
Blackbox Reversing of XSS Filters Alexander Sotirov [email protected] Introduction Web applications are the future Reversing web apps blackbox reversing very different environment and tools Cross-site scripting
