Veiled A Browser Darknet
|
|
|
- Theodore Barnett
- 10 years ago
- Views:
Transcription
1 Veiled A Browser Darknet Matt Wood [email protected] & Billy Hoffman [email protected] Web Security Research Group -- HP Software
2 What is a Darknet? A private network where users can freely exchange ideas and content. Darknets typically have additional features like strong encryption, digital identities, or storage systems 2
3 Innovation and Turmoil Abound! New Set of Browser Wars Desktop App <-> Web App Server/Client <-> Peer-2-Peer Browser Platform + Traditional Darknet +??? = Profit 3
4 Original Darknets Sneaknets Yokel with floppy Freenet (1999) Strong Crypto Shared Storage WASTE (2000) Private/sharing Gnutella(~2000) P2P qualities Clones (2001-) 4
5 Tor is *not* a Darknet! 5
6 Barriers to Darknet Adoption Technical Barriers Installing/Configuring Firewall NAT Not for Joe the Plumber Social Barriers People are unaware they exist Freenet/Gnutella/Kazaa are basically open networks Difficult to set-up your own Creating your own scene 6
7 Web Ecosystem HTML 5 Features Browser Storage CORS/XDomainRequest JavaScript Advances V8/TraceMonkey Lots of high quality JS libraries UI/DOM AES/RSA Ubiquitousnesslyosity Everyone has it Everyone can use it 7
8 A Browser Based Darknet Properties we want Distributed Redundant File Storage Some anonymity Web in the Web Communication entirely over HTTP Differentiating Properties Zero-footprint Install Web Clients are the new Web Server P2P on top of HTTP Simple to create/destroy/join Focused on small to medium sized network/mesh 8
9 WHY? Barriers are Bad! Removing Barriers is Good! Fewer Barriers allows more Participation! More participation allows Innovation! 9
10 Veiled : Agenda Architecture Demo Tech Overview Features Private Chat Redundant Distributed File Storage Web in the Web Distributed JS Computation Server Failover Threat Analysis Next Steps/New Tech 10
11 High Level Architecture Router is single server script file Routers can peer Client is Pure JS and HTML Clients connect to Routers Messages can traverse whole network 11
12 Veiled Demo 12
13 Veiled Router Single Dynamic Page Provides COMET connection to Client Provides Ajax Targets for Client Provides Peering hooks for other Routers Provides transient storage (server memory) 13
14 Veiled Client Pure JS/HTML Content served by a Router Provide callbacks for COMET data pipe Contains API to use browser storage Whatwg_db/LocalStorage/Cookies/GlobalStorage Contains JS Encryption Routines UI 14
15 COMET? Traditional HTTP pulls data COMET is a hack to make HTTP push possible faster than long polling for lots of messages 15
16 Messaging in Veiled Client-Client Communication Client-Router Communication Router-Router Communication 16
17 Client-Client Messaging Two Types of Messages Multicast Routed Occurs above HTTP Layer Message Format Type Action Origin ID Target ID Data Distance Unique ID 17
18 Router-Client Communication Client initiates COMET connection Hidden iframe Easy Messages streamed to client via individual <script> tag function calls Higher bandwidth than long-polling Times out after 2-5 minutes, refreshes Client uses AJAX to forward local messages/events to Router Can Use HTTP Auth Can Use SSL 18
19 Router-Router Peering HTTP/S Connection Comet-y No need for JS Tricks Uses JSON for interop PHP s fsockopen First connection contains connect back information Both Servers need to be mutually accessible Performs Routing Can be setup with HTTP Auth to prevent vagabonds 19
20 Routing with Modified AODV AODV Ad-hoc On-demand Distance Vector Used for mesh networks Modified specifically to take advantage of protocol between clients Why? Reduces Traffic Minimizes clients receiving traffic not meant for them 20
21 Veiled Features Global Chat More of a debugging mechanism Private Chat Redundant Distributed File Storage Web in the Web Distributed JavaScript Jobs Server Failover 21
22 Private Chat RSA Key Exchange Keys generated by OpenSSL Uses PidCrypt JS Library Exchange AES 256 Key using RSA AES + CBC AES Key generated from Hash(RSA Priv Key/Time/Domain) Completely Encrypted on the Client Possible MITM Verify public keys 22
23 Private Chat Protocol Request Peers from Darknet Can opt-out Receive Client Aliases and Public Keys on Darknet Start Chat Session with Client Initiator generates AES Key Encrypt with Remote Client s public key Send AES Key Exchanged Begin chat encrypting with AES 23
24 Redundant Distributed File Storage Goals Survive Clients leaving the network Secure Upload/Download of content Utilize browser storage Why How Challenges JS has no access to local files Two Options Trust Router to distribute slices Use Flash/Java to read local file and provide to JS 24
25 RDFS Protocol Upload Select file and Submit HTML form Router slices into 1k chunks Multicast request for storage on darknet Wait for slices to be registered Send registered clients routed data packed Download Multicast file identifier for retrieval Client s check if their data store contains file identifier Send routed data packet if found 25
26 Web in the Web Builds on top of File Distribution Retrieve Files from Magnet Hashes JavaScript API to Support Embedded Images Embedded (i)frames Rewriting Links to Magnet Hash 26
27 Distributed JS Computation Distribute JavaScript Jobs to Clients Inspired by JavaScript Provide Client API for: Receiving jobs Reporting results Challenges Dangerous JavaScript/XSS Threading/Blocking the UI Worker threads (HTML5/Gears) Execute jobs in sandbox Gareth Hayes: JSReg? Google s caja too much 27
28 Server Failover Router Peering Publicize connect-back details to local clients Inform clients if peer goes down If Client COMET connection goes down Retry Connect to router peer 28
29 Challenges Debugging a hidden php connection blows! COMET, distributes PHP files, threading, multiple clients Pretty much left with printf() style debugging! Shared Memory Locking/Threading Over Reliance on Router Untrusted Router Local Storage vs Global Storage Domain restrictions 29
30 Threading in PHP Each connection is a thread Use flock(windows) or semaphore (sys-v) for locking Shared Memory message queue In transient Memory PHP s shmop 30
31 Veiled Threat Analysis 31
32 Veiled External Threats Malicious Client Disrupt/Inject faulty communications HTTPS and HTTP Auth can defuse this mostly Autodestruct network new one needed Malicious Router Process Rogue PHP script (since all are run by apache) Modify Shared Memory Alter Message Queue Remove Messages Not sure if there is a better was to secure shared mem MITM Mitigated with use of HTTPS 32
33 Veiled Internal Threats Malicious Client Advertise false routes by sending spoofed packets Saturate Network with Multicast Traffic Send Bogus File slices during retrieval Malicious Router Can MITM Private Chat RSA Key Exchange Compromise Clients IP s connected to it 33
34 Advances/Next Steps NAT Busting File Storage with Browser Cache Using Clients as Routers Persistent-XSS as Com Port Very low bandwidth Multiple Client-Router connections with CORS/ XDomainRequest Using Completely Untrusted/Public Routers Cloud Based Routers 34
35 NAT Busting with HTTP Request Server Behind NAT Connection #1 Initiate connection to Remote Send HTTP Request Parse Response as it Arrives for Data Connection #2 Initiate connection to Remote Send long HTTP Request Remote parses Request as it Arrives Vanilla PHP can t inspect incomplete requests Perl has this built in 35
36 File Storage with Browser Cache Use Browser Caching to Store File Slices Storage Make hash from file hash and slice # Router serves up page, client caches it Retrieval Make hash from file hash Ajax Request to router Cached Response Server Response 36
37 Using Clients as Routers Listen for messages on two routers Mediate Requests/Responses between them Benefits Link inaccessible routers with a client Cons Requires constant browser session/tab Easier to MITM a network 37
38 Persistent-XSS as Shared Storage/Queue Use Persistent XSS s on the internet as storage. Hundreds of online notepads, lots are vulnerable to pxss Decentralizes Network Further How? Create JavaScript API to abstract PXSS as storage device Use iframe communication from pxss to local window JSONP if possible 38
39 Multiple Client-Router Connections Using CORS/XDomainRequest Benefits Redundant connection to Darknet Increased bandwidth Stronger connected Mesh Challenges Reduce/Identify duplicate traffic 39
40 Others Using Completely Untrusted/Public Routers Use strong encryption on top of all messages However still allow routing somehow Cloud Based Router Google App Engine Router One Way Communication Darknet 40
41 Sorry Wikileaks! Wikileaks is an amazing valuable service Made misinformed comments about system properties Wikileaks created their infrastructure from OS to Web Server to avoid the collection of any user data There is nothing to subpena You guys rock! 41
42 Ask Questions! s Matt Wood -- Billy Hoffman -- Twitterlicious 42
Guidance Regarding Skype and Other P2P VoIP Solutions
Guidance Regarding Skype and Other P2P VoIP Solutions Ver. 1.1 June 2012 Guidance Regarding Skype and Other P2P VoIP Solutions Scope This paper relates to the use of peer-to-peer (P2P) VoIP protocols,
Topics in Network Security
Topics in Network Security Jem Berkes MASc. ECE, University of Waterloo B.Sc. ECE, University of Manitoba www.berkes.ca February, 2009 Ver. 2 In this presentation Wi-Fi security (802.11) Protecting insecure
Some Issues on Ajax Invocation
Some Issues on Ajax Invocation I. Introduction AJAX is a set of technologies that together a website to be -or appear to be- highly responsive. This is achievable due to the following natures of AJAX[1]:
Thomas Röthlisberger IT Security Analyst [email protected]
Thomas Röthlisberger IT Security Analyst [email protected] Compass Security AG Werkstrasse 20 Postfach 2038 CH-8645 Jona Tel +41 55 214 41 60 Fax +41 55 214 41 61 [email protected] www.csnc.ch What
Performance Testing for Ajax Applications
Radview Software How to Performance Testing for Ajax Applications Rich internet applications are growing rapidly and AJAX technologies serve as the building blocks for such applications. These new technologies
1. Introduction. 2. Web Application. 3. Components. 4. Common Vulnerabilities. 5. Improving security in Web applications
1. Introduction 2. Web Application 3. Components 4. Common Vulnerabilities 5. Improving security in Web applications 2 What does World Wide Web security mean? Webmasters=> confidence that their site won
RSA SecurID Ready Implementation Guide
RSA SecurID Ready Implementation Guide Partner Information Last Modified: December 18, 2006 Product Information Partner Name Microsoft Web Site http://www.microsoft.com/isaserver Product Name Internet
Mobile Push Architectures
Praktikum Mobile und Verteilte Systeme Mobile Push Architectures Prof. Dr. Claudia Linnhoff-Popien Michael Beck, André Ebert http://www.mobile.ifi.lmu.de WS 2015/2016 Asynchronous communications How to
CS5008: Internet Computing
CS5008: Internet Computing Lecture 22: Internet Security A. O Riordan, 2009, latest revision 2015 Internet Security When a computer connects to the Internet and begins communicating with others, it is
YouServ: A Web Hosting and Content Sharing Tool for the Masses
YouServ: A Web Hosting and Content Sharing Tool for the Masses Roberto Bayardo IBM Almaden Research Center Joint work with Rakesh Agrawal, Daniel Gruhl, and Amit Somani Goal Allow people to easily share
PAVING THE PATH TO THE ELIMINATION OF THE TRADITIONAL DMZ
PAVING THE PATH TO THE ELIMINATION A RSACCESS WHITE PAPER 1 The Traditional Role of DMZ 2 The Challenges of today s DMZ deployments 2.1 Ensuring the Security of Application and Data Located in the DMZ
Sync Security and Privacy Brief
Introduction Security and privacy are two of the leading issues for users when transferring important files. Keeping data on-premises makes business and IT leaders feel more secure, but comes with technical
Bit Chat: A Peer-to-Peer Instant Messenger
Bit Chat: A Peer-to-Peer Instant Messenger Shreyas Zare [email protected] https://technitium.com December 20, 2015 Abstract. Bit Chat is a peer-to-peer instant messaging concept, allowing one-to-one
Michael Seltzer COMP 116: Security Final Paper. Client Side Encryption in the Web Browser Mentor: Ming Chow
Michael Seltzer COMP 116: Security Final Paper Client Side Encryption in the Web Browser Mentor: Ming Chow 1 Abstract Web service providers generally look to encryption as a means of ensuring data privacy
Relax Everybody: HTML5 Is Securer Than You Think
Relax Everybody: HTML5 Is Securer Than You Think Martin Johns (@datenkeller) SAP AG Session ID: ADS-W08 Session Classification: Advanced Motivation For some reason, there is a preconception that HTML5
WildFire Cloud File Analysis
WildFire Cloud File Analysis The following topics describe the different methods for sending files to the WildFire Cloud for analysis. Forward Files to the WildFire Cloud Verify Firewall File Forwarding
CS 665: Computer System Security. Network Security. Usage environment. Sources of vulnerabilities. Information Assurance Module
CS 665: Computer System Security Network Security Bojan Cukic Lane Department of Computer Science and Electrical Engineering West Virginia University 1 Usage environment Anonymity Automation, minimal human
Bayeux Protocol: la nuova frontiera della comunicazione a portata di mano. Relatore Nino Guarnacci
Bayeux Protocol: la nuova frontiera della comunicazione a portata di mano Relatore Nino Guarnacci to understand the phenomenon of Comet and Reverse AJAX, we need to consider why there is a need for it
STOPPING LAYER 7 ATTACKS with F5 ASM. Sven Müller Security Solution Architect
STOPPING LAYER 7 ATTACKS with F5 ASM Sven Müller Security Solution Architect Agenda Who is targeted How do Layer 7 attacks look like How to protect against Layer 7 attacks Building a security policy Layer
Client Server Registration Protocol
Client Server Registration Protocol The Client-Server protocol involves these following steps: 1. Login 2. Discovery phase User (Alice or Bob) has K s Server (S) has hash[pw A ].The passwords hashes are
BlackBerry Enterprise Service 10. Secure Work Space for ios and Android Version: 10.1.1. Security Note
BlackBerry Enterprise Service 10 Secure Work Space for ios and Android Version: 10.1.1 Security Note Published: 2013-06-21 SWD-20130621110651069 Contents 1 About this guide...4 2 What is BlackBerry Enterprise
Hack Proof Your Webapps
Hack Proof Your Webapps About ERM About the speaker Web Application Security Expert Enterprise Risk Management, Inc. Background Web Development and System Administration Florida International University
Windows Remote Access
Windows Remote Access A newsletter for IT Professionals Education Sector Updates Issue 1 I. Background of Remote Desktop for Windows Remote Desktop Protocol (RDP) is a proprietary protocol developed by
Gateway Apps - Security Summary SECURITY SUMMARY
Gateway Apps - Security Summary SECURITY SUMMARY 27/02/2015 Document Status Title Harmony Security summary Author(s) Yabing Li Version V1.0 Status draft Change Record Date Author Version Change reference
Network setup and troubleshooting
ACTi Knowledge Base Category: Troubleshooting Note Sub-category: Network Model: All Firmware: All Software: NVR Author: Jane.Chen Published: 2009/12/21 Reviewed: 2010/10/11 Network setup and troubleshooting
Brocade Virtual Traffic Manager and Magento Deployment Guide
September 2015 Brocade Virtual Traffic Manager and Magento Deployment Guide 2015 Brocade Communications Systems, Inc. All Rights Reserved. ADX, Brocade, Brocade Assurance, the B-wing symbol, DCX, Fabric
MEASURING WORKLOAD PERFORMANCE IS THE INFRASTRUCTURE A PROBLEM?
MEASURING WORKLOAD PERFORMANCE IS THE INFRASTRUCTURE A PROBLEM? Ashutosh Shinde Performance Architect [email protected] Validating if the workload generated by the load generating tools is applied
Repeater. BrowserStack Local. browserstack.com 1. BrowserStack Local makes a REST call using the user s access key to browserstack.
Connection Setup Process makes a REST call using the user s access key to chooses a repeater for establishing a secure connection for Local Testing. The repeater exists within the BrowserStack cloud infrastructure.
SiteCelerate white paper
SiteCelerate white paper Arahe Solutions SITECELERATE OVERVIEW As enterprises increases their investment in Web applications, Portal and websites and as usage of these applications increase, performance
Secure Sockets Layer (SSL ) / Transport Layer Security (TLS) Network Security Products S31213
Secure Sockets Layer (SSL ) / Transport Layer Security (TLS) Network Security Products S31213 UNCLASSIFIED Example http ://www. greatstuf f. com Wants credit card number ^ Look at lock on browser Use https
Developing ASP.NET MVC 4 Web Applications MOC 20486
Developing ASP.NET MVC 4 Web Applications MOC 20486 Course Outline Module 1: Exploring ASP.NET MVC 4 The goal of this module is to outline to the students the components of the Microsoft Web Technologies
"ASM s INTERNATIONAL E-Journal on Ongoing Research in Management and IT"
To Study the Overall Cloud Computing Security Using Virtual Private Network. Aparna Gaurav Jaisingpure/Gulhane Email id: [email protected] Dr.D.Y.Patil Vidya Pratishthan s Dr. D.Y Patil College of
The Key to Secure Online Financial Transactions
Transaction Security The Key to Secure Online Financial Transactions Transferring money, shopping, or paying debts online is no longer a novelty. These days, it s just one of many daily occurrences on
WEB SITE SECURITY. Jeff Aliber Verizon Digital Media Services
WEB SITE SECURITY Jeff Aliber Verizon Digital Media Services 1 SECURITY & THE CLOUD The Cloud (Web) o The Cloud is becoming the de-facto way for enterprises to leverage common infrastructure while innovating
Using the Push Notifications Extension Part 1: Certificates and Setup
// tutorial Using the Push Notifications Extension Part 1: Certificates and Setup Version 1.0 This tutorial is the second part of our tutorials covering setting up and running the Push Notifications Native
Risks with web programming technologies. Steve Branigan Lucent Technologies
Risks with web programming technologies Steve Branigan Lucent Technologies Risks with web programming technologies Abstract Java applets and their kind are bringing new life to the World Wide Web. Through
1. The Web: HTTP; file transfer: FTP; remote login: Telnet; Network News: NNTP; e-mail: SMTP.
Chapter 2 Review Questions 1. The Web: HTTP; file transfer: FTP; remote login: Telnet; Network News: NNTP; e-mail: SMTP. 2. Network architecture refers to the organization of the communication process
PEER-TO-PEER NETWORK
PEER-TO-PEER NETWORK February 2008 The Government of the Hong Kong Special Administrative Region The contents of this document remain the property of, and may not be reproduced in whole or in part without
Stopping secure Web traffic from bypassing your content filter. BLACK BOX
Stopping secure Web traffic from bypassing your content filter. BLACK BOX 724-746-5500 blackbox.com Table of Contents Introduction... 3 Implications... 4 Approaches... 4 SSL CGI Proxy... 5 SSL Full Proxy...
Web Application Hacking (Penetration Testing) 5-day Hands-On Course
Web Application Hacking (Penetration Testing) 5-day Hands-On Course Web Application Hacking (Penetration Testing) 5-day Hands-On Course Course Description Our web sites are under attack on a daily basis
Is Your SSL Website and Mobile App Really Secure?
Is Your SSL Website and Mobile App Really Secure? Agenda What is SSL / TLS SSL Vulnerabilities PC/Server Mobile Advice to the Public Hong Kong Computer Emergency Response Team Coordination Centre 香 港 電
Understanding Evolution's Architecture A Technical Overview
Understanding Evolution's Architecture A Technical Overview Contents Introduction Understanding Evolution's Design Evolution Architecture Evolution Server Transports Evolution Benefits How Does Evolution
Configuration Guide. BES12 Cloud
Configuration Guide BES12 Cloud Published: 2016-04-08 SWD-20160408113328879 Contents About this guide... 6 Getting started... 7 Configuring BES12 for the first time...7 Administrator permissions you need
Citrix Receiver for Mobile Devices Troubleshooting Guide
Citrix Receiver for Mobile Devices Troubleshooting Guide www.citrix.com Contents REQUIREMENTS...3 KNOWN LIMITATIONS...3 TROUBLESHOOTING QUESTIONS TO ASK...3 TROUBLESHOOTING TOOLS...4 BASIC TROUBLESHOOTING
How to Prevent Secure Web Traffic (HTTPS) from Crippling Your Content Filter. A Cymphonix White Paper
How to Prevent Secure Web Traffic (HTTPS) from Crippling Your Content Filter A Cymphonix White Paper How to Prevent Secure Web Traffic (HTTPS) from Crippling Your Content Filter Introduction Internet connectivity
Common P2P Examples. Peer to Peer Networks. Client-Server Architecture. Uses of P2P. Napster Morpheus Gnutella Freenet BitTorrent Skype
Peer to Peer Networks Common P2P Examples Napster Morpheus Gnutella Freenet BitTorrent Skype 1 2 Uses of P2P Client-Server Architecture File sharing Instant messaging Voice communication Collaboration
WatchGuard Technologies, Inc. 505 Fifth Avenue South Suite 500, Seattle, WA 98104 www.watchguard.com
SMALL BUSINESS NETWORK SECURITY GUIDE WHY A REAL FIREWALL PROVIDES THE BEST NETWORK PROTECTION AUGUST 2004 SMALL BUSINESS NETWORK SECURITY GUIDE: WHY A REAL FIREWALL PROVIDES THE BEST NETWORK PROTECTION
Detecting peer-to-peer botnets
Detecting peer-to-peer botnets Reinier Schoof & Ralph Koning System and Network Engineering University of Amsterdam mail: [email protected], [email protected] February 4, 2007 1 Introduction Spam,
Web-Application Security
Web-Application Security Kristian Beilke Arbeitsgruppe Sichere Identität Fachbereich Mathematik und Informatik Freie Universität Berlin 29. Juni 2011 Overview Web Applications SQL Injection XSS Bad Practice
CGHub Client Security Guide Documentation
CGHub Client Security Guide Documentation Release 3.1 University of California, Santa Cruz April 16, 2014 CONTENTS 1 Abstract 1 2 GeneTorrent: a secure, client/server BitTorrent 2 2.1 GeneTorrent protocols.....................................
Decentralized Peer-to-Peer Network Architecture: Gnutella and Freenet
Decentralized Peer-to-Peer Network Architecture: Gnutella and Freenet AUTHOR: Jem E. Berkes [email protected] University of Manitoba Winnipeg, Manitoba Canada April 9, 2003 Introduction Although
DISTRIBUTED SYSTEMS [COMP9243] Lecture 9a: Cloud Computing WHAT IS CLOUD COMPUTING? 2
DISTRIBUTED SYSTEMS [COMP9243] Lecture 9a: Cloud Computing Slide 1 Slide 3 A style of computing in which dynamically scalable and often virtualized resources are provided as a service over the Internet.
Overview of Network Security The need for network security Desirable security properties Common vulnerabilities Security policy designs
Overview of Network Security The need for network security Desirable security properties Common vulnerabilities Security policy designs Why Network Security? Keep the bad guys out. (1) Closed networks
INUVIKA OPEN VIRTUAL DESKTOP FOUNDATION SERVER
INUVIKA OPEN VIRTUAL DESKTOP FOUNDATION SERVER ARCHITECTURE OVERVIEW AND SYSTEM REQUIREMENTS Mathieu SCHIRES Version: 1.0.0 Published March 5, 2015 http://www.inuvika.com Contents 1 Introduction 3 2 Architecture
DNS REBINDING DENIS BARANOV, POSITIVE TECHNOLOGIES
DNS REBINDING DENIS BARANOV, POSITIVE TECHNOLOGIES TABLE OF CONTENTS 1 Bypassing The Restrictions 3 2 Putting It into Practice 5 3 Actual Load 7 4 Detection Of The Application Version 5 Guessing A/The
Barracuda Web Application Firewall vs. Intrusion Prevention Systems (IPS) Whitepaper
Barracuda Web Application Firewall vs. Intrusion Prevention Systems (IPS) Whitepaper Securing Web Applications As hackers moved from attacking the network to attacking the deployed applications, a category
Intro to Firewalls. Summary
Topic 3: Lesson 2 Intro to Firewalls Summary Basic questions What is a firewall? What can a firewall do? What is packet filtering? What is proxying? What is stateful packet filtering? Compare network layer
District of Columbia Courts Attachment 1 Video Conference Bridge Infrastructure Equipment Performance Specification
1.1 Multipoint Control Unit (MCU) A. The MCU shall be capable of supporting (20) continuous presence HD Video Ports at 720P/30Hz resolution and (40) continuous presence ports at 480P/30Hz resolution. B.
CrashPlan Security SECURITY CONTEXT TECHNOLOGY
TECHNICAL SPECIFICATIONS CrashPlan Security CrashPlan is a continuous, multi-destination solution engineered to back up mission-critical data whenever and wherever it is created. Because mobile laptops
Breaking the Myths of Extended Validation SSL Certificates
BlackHat Briefings, 2009 Breaking the Myths of Extended Validation SSL Certificates Alexander Sotirov phmsecurity.com Mike Zusman intrepidusgroup.com Introduction Chosen-prefix MD5 collisions allowed us
FINAL DoIT 04.01.2013- v.8 APPLICATION SECURITY PROCEDURE
Purpose: This procedure identifies what is required to ensure the development of a secure application. Procedure: The five basic areas covered by this document include: Standards for Privacy and Security
Integrating Web Application Security into the IT Curriculum
Integrating Web Application Security into the IT Curriculum James Walden Northern Kentucky University Topics 1. 2. 3. 4. Why should we teach web application security? What material do we need to cover?
Securing ios Applications. Dr. Bruce Sams, OPTIMAbit GmbH
Securing ios Applications Dr. Bruce Sams, OPTIMAbit GmbH About Me President of OPTIMAbit GmbH Responsible for > 200 Pentests per Year Ca 50 ios Pentests and code reviews in the last two years. Overview
Breaking the Security Myths of Extended Validation SSL Certificates
Breaking the Security Myths of Extended Validation SSL Certificates Alexander Sotirov phreedom.org Mike Zusman intrepidusgroup.com Introduction SSL certificate authorities have been thoroughly broken in
Out of the Fire - Adding Layers of Protection When Deploying Oracle EBS to the Internet
Out of the Fire - Adding Layers of Protection When Deploying Oracle EBS to the Internet March 8, 2012 Stephen Kost Chief Technology Officer Integrigy Corporation Phil Reimann Director of Business Development
Dashlane Security Whitepaper
Dashlane Security Whitepaper November 2014 Protection of User Data in Dashlane Protection of User Data in Dashlane relies on 3 separate secrets: The User Master Password Never stored locally nor remotely.
FormAPI, AJAX and Node.js
FormAPI, AJAX and Node.js Overview session for people who are new to coding in Drupal. Ryan Weal Kafei Interactive Inc. http://kafei.ca These slides posted to: http://verbosity.ca Why? New developers bring
Table of Contents. Chapter 1: Installing Endpoint Application Control. Chapter 2: Getting Support. Index
Table of Contents Chapter 1: Installing Endpoint Application Control System Requirements... 1-2 Installation Flow... 1-2 Required Components... 1-3 Welcome... 1-4 License Agreement... 1-5 Proxy Server...
White Paper How to Remotely Access Ethernet I/O Over the Internet
White Paper How to Remotely Access Ethernet I/O Over the Internet ACROMAG INCORPORATED Tel: (248) 295-0880 30765 South Wixom Road Fax: (248) 624-9234 P.O. BOX 437 Wixom, MI 48393-7037 U.S.A. Copyright
GlobalSCAPE DMZ Gateway, v1. User Guide
GlobalSCAPE DMZ Gateway, v1 User Guide GlobalSCAPE, Inc. (GSB) Address: 4500 Lockhill-Selma Road, Suite 150 San Antonio, TX (USA) 78249 Sales: (210) 308-8267 Sales (Toll Free): (800) 290-5054 Technical
Bridgit Conferencing Software: Security, Firewalls, Bandwidth and Scalability
Bridgit Conferencing Software: Security, Firewalls, Bandwidth and Scalability Overview... 3 Installing Bridgit Software... 4 Installing Bridgit Software Services... 4 Creating a Server Cluster... 4 Using
Developing ASP.NET MVC 4 Web Applications
Course M20486 5 Day(s) 30:00 Hours Developing ASP.NET MVC 4 Web Applications Introduction In this course, students will learn to develop advanced ASP.NET MVC applications using.net Framework 4.5 tools
STABLE & SECURE BANK lab writeup. Page 1 of 21
STABLE & SECURE BANK lab writeup 1 of 21 Penetrating an imaginary bank through real present-date security vulnerabilities PENTESTIT, a Russian Information Security company has launched its new, eighth
How To Set Up A Net Integration Firewall
Net Integration Technologies, Inc. http://www.net itech.com Net Integrator Firewall Technical Overview Version 1.00 TABLE OF CONTENTS 1 Introduction...1 2 Firewall Architecture...2 2.1 The Life of a Packet...2
Workday Mobile Security FAQ
Workday Mobile Security FAQ Workday Mobile Security FAQ Contents The Workday Approach 2 Authentication 3 Session 3 Mobile Device Management (MDM) 3 Workday Applications 4 Web 4 Transport Security 5 Privacy
GUI and Web Programming
GUI and Web Programming CSE 403 (based on a lecture by James Fogarty) Event-based programming Sequential Programs Interacting with the user 1. Program takes control 2. Program does something 3. Program
FileCloud Security FAQ
is currently used by many large organizations including banks, health care organizations, educational institutions and government agencies. Thousands of organizations rely on File- Cloud for their file
TFE listener architecture. Matt Klein, Staff Software Engineer Twitter Front End
TFE listener architecture Matt Klein, Staff Software Engineer Twitter Front End Agenda TFE architecture overview TSA architecture overview TSA hot restart Future plans Q&A TFE architecture overview Listener:
Brocade Virtual Traffic Manager and Microsoft IIS Deployment Guide
September 2015 Brocade Virtual Traffic Manager and Microsoft IIS Deployment Guide 2015 Brocade Communications Systems, Inc. All Rights Reserved. ADX, Brocade, Brocade Assurance, the B-wing symbol, DCX,
The Top Web Application Attacks: Are you vulnerable?
QM07 The Top Web Application Attacks: Are you vulnerable? John Burroughs, CISSP Sr Security Architect, Watchfire Solutions [email protected] Agenda Current State of Web Application Security Understanding
Recommended IP Telephony Architecture
Report Number: I332-009R-2006 Recommended IP Telephony Architecture Systems and Network Attack Center (SNAC) Updated: 1 May 2006 Version 1.0 [email protected] This Page Intentionally Left Blank ii Warnings
Configuring Security Features of Session Recording
Configuring Security Features of Session Recording Summary This article provides information about the security features of Citrix Session Recording and outlines the process of configuring Session Recording
SAFE-T RSACCESS REPLACEMENT FOR MICROSOFT FOREFRONT UNIFIED ACCESS GATEWAY (UAG)
SAFE-T RSACCESS REPLACEMENT FOR MICROSOFT FOREFRONT UNIFIED ACCESS GATEWAY (UAG) A RSACCESS WHITE PAPER 1 Microsoft Forefront Unified Access Gateway Overview 2 Safe-T RSAccess Secure Front-end Overview
March 2010 Webcasting: Dealing with significant audiences behind the corporate firewall
March 2010 Webcasting: Dealing with significant audiences behind the corporate firewall Ed Van Petten CIO / Vice President, Network Operations ON24, Inc. Introduction Webcasts sometimes involve significant
MEGA Web Application Architecture Overview MEGA 2009 SP4
Revised: September 2, 2010 Created: March 31, 2010 Author: Jérôme Horber CONTENTS Summary This document describes the system requirements and possible deployment architectures for MEGA Web Application.
JAVA WEB START OVERVIEW
JAVA WEB START OVERVIEW White Paper May 2005 Sun Microsystems, Inc. Table of Contents Table of Contents 1 Introduction................................................................. 1 2 A Java Web Start
State of The Art: Automated Black Box Web Application Vulnerability Testing. Jason Bau, Elie Bursztein, Divij Gupta, John Mitchell
Stanford Computer Security Lab State of The Art: Automated Black Box Web Application Vulnerability Testing, Elie Bursztein, Divij Gupta, John Mitchell Background Web Application Vulnerability Protection
SyncThru TM Web Admin Service Administrator Manual
SyncThru TM Web Admin Service Administrator Manual 2007 Samsung Electronics Co., Ltd. All rights reserved. This administrator's guide is provided for information purposes only. All information included
Configuration Guide. BlackBerry Enterprise Service 12. Version 12.0
Configuration Guide BlackBerry Enterprise Service 12 Version 12.0 Published: 2014-12-19 SWD-20141219132902639 Contents Introduction... 7 About this guide...7 What is BES12?...7 Key features of BES12...
How To Develop A Mobile App With Phonegap
Introduction to Mobile Development with PhoneGap Yeah it s pretty awesome. Who is this guy? Andrew Trice Technical Evangelist, Adobe [email protected] http://tricedesigns.com @andytrice http://github.com/triceam
CSIS 3230. CSIS 3230 Spring 2012. Networking, its all about the apps! Apps on the Edge. Application Architectures. Pure P2P Architecture
Networking, its all about the apps! CSIS 3230 Chapter 2: Layer Concepts Chapter 5.4: Link Layer Addressing Networks exist to support apps Web Social ing Multimedia Communications Email File transfer Remote
Load Balancing Web Applications
Mon Jan 26 2004 18:14:15 America/New_York Published on The O'Reilly Network (http://www.oreillynet.com/) http://www.oreillynet.com/pub/a/onjava/2001/09/26/load.html See this if you're having trouble printing
Mobile Device Management Version 8. Last updated: 17-10-14
Mobile Device Management Version 8 Last updated: 17-10-14 Copyright 2013, 2X Ltd. http://www.2x.com E mail: [email protected] Information in this document is subject to change without notice. Companies names
