Weird New Tricks for Browser Fingerprinting. yan ToorCon 2015
|
|
|
- Lisa Phelps
- 10 years ago
- Views:
Transcription
1 Weird New Tricks for Browser Fingerprinting yan ToorCon 2015
2 real pic of me also work on these things
3 EFF staff photo, 2015
4 BETTER TRACKING METHODS
5 Tracking web users is all the rage Show ads! Inject QUANTUM malware Cybercatch cybercriminals Gather website analytics Detect fraud / droidnets Enforce paywalls etc.
6 A long time ago in a galaxy far, far away... Obi-Wan tracked Luke using: cookies passive fingerprinting* (IP address, locales, user-agent, OS, etc.) sweet Jedi mind tricks * In this presentation, fingerprinting == any non-cookie web tracking method.
7 THE ADBLOCKERS* STRIKE BACK * In this presentation, adblocker == any tool that blocks web tracking (including nonadvertising)
8 THE PHANTOM ADBLOCKER BLOCKERS
9 REVENGE OF THE ADBLOCKER BLOCKER BLOCKERS!!!
10 A New Hope: Browser Fingerprinting Evade blocking algorithms that blacklist domains based on cookie frequency (ex: Privacy Badger). Track users who disable 3rd party cookies (ex: Safari). Harder to delete than cookies. Can reveal new information about a user.
11 new web features == new fingerprinting techniques
12
13 HOLY SHIT I HAVE 4 LIGHTSABERS ZOMG!!1 active fingerprinting (HTML5 canvas, clock skew, installed fonts & plugins, WebRTC...) supercookies (Flash cookies, caches, HSTS, etags...)
14 Fingerprinting attacks in the wild
15 geez thx a lot Samy
16 #realtalk
17 How would you track a paranoid user who clears cookies & uses an adblocker?
18 Could fingerprint them, but adblockers & browsers will get better at blocking you
19 unless blocking causes too much collateral damage.
20 Collateral: Privacy-conscious users usually care about security. Can we fingerprint them using security features that are too important for them to turn off?
21 Trick #1: Abuse HTTP Public Key Pinning
22 HPKP (RFC 7469) Server: One of these hashes must be in the TLS cert chain you receive from me. Browser: DOPE!! NEXT TIME I SEE YOU I WILL CHECK IT BEFORE I WRECK IT
23 Public-Key-Pins: max-age=3000; How long to cache this shit for pin-sha256=" d6qzru9zoecb90uez27xwltnsj0e1md 7GkYYkVoZWmM="; pin-sha256=" E9CZ9INDbd+2eRQozYqqbQ2yXLVKB9+ xcprmf+44u1g="; report-uri= com/report ; includesubdomains; SHA-256 of a pub. key in the cert chain. Browser checks & caches this. SHA-256 of a backup pub. key (required). Must NOT be in the cert chain. Browser caches this. POST endpoint to report pin validation failures (optional). Whether to pin for the host s subdomains as well (optional).
24 Supercookie #1: fake backup pins 1. sets a unique backup pin for each user + includesubdomains + report-uri. 2. <img src= > serves a chain that deliberately fails pin validation. 3. A validation failure report is sent which includes a unique cached backup pin!
25 Trick #2: Abuse HTTP Strict Transport Security + Content Security Policy
26 HSTS (RFC 6797) Server: Hey, I just met you, and this is crazy, but please only call me over HTTPS for the next seconds. Browser: OK
27 Strict-Transport-Security: max-age=3000; How long to remember to only connect to this host via HTTPS includesubdomains; Whether subdomains should also only be connected to over HTTPS (optional).
28 Supercookie #2: HSTS cache state 1. sneaky.com wants to fingerprint users. 2. example.com is known to support HSTS. 3. sneaky.com/index.html embeds <img src= >.
29 What happens then? Case 1: Browser has never visited example.com -> makes a network round-trip, gets 301/302 to Case 2: Browser visited example.com before. -> HSTS causes an internal redirect (307) to ~immediately
30 If we can measure the HTTP to HTTPS redirect latency, we can distinguish Case 1 from Case 2!
31 Q: How do we measure that? A: Abuse one more browser security feature.
32 Content Security Policy (W3C spec) Server: For your safety, please only allow resources of type <X> from origins <A> & <B> while on this page. Browser: I GOT U FAM
33 Content-Security-Policy: Allow images to load from HTTPS origins only img-src: script-src: self *. scripts.com cdn.example.com Allow scripts to load from the page s origin, *.scripts.com, and cdn. example.com only.
34 The Missing Ingredient: Set CSP to img-src HTTPS image requests are blocked and fire an error event to JS listeners.
35 Why is this useful? 1. JS only lets us listen for img onerror and onload events. Turns out CSP violation triggers onerror consistently and early in the fetch pipeline. 2. If browser ever completes a request for it will get the HSTS pin and future results are polluted. CSP prevents this from happening!
36 After setting CSP: Case 1: Browser has never visited example.com -> makes network request, gets 301/302 to img onerror fires. Case 2: Browser visited example.com before. -> HSTS rewrites src to ~immediately, img onerror fires.
37 How long does the HTTP to HTTPS redirect take? Case 1: Browser has never visited example.com -> Order of 100ms depending on network latency and site response time. Case 2: Browser visited example.com before. -> Order of 1ms, independent of the site and network conditions.
38 Putting it all together
39 Remember the CSS visited-selector bug? Slide from Michael Coates, >
40 That was soooooo 2010 New plan: 1. Scrape Alexa Top 1M for hosts that send HSTS and aren t preloaded. 2. Load all the HSTS hosts asynchronously on one page. 3. Measure the onerror timing & separate hosts into visited and unvisited.
41 Turns out... Redirect timing is hard to measure accurately for 300+ async image loads at once. Improved by calibrating timing drift using a request to a preloaded HSTS host every other request. Chrome still had many false positives; confirmed timings for positive results using synchronous loads.
42 demo:
43
44 scraper + tracker code:
45 Your mileage may vary Results depend on latest HSTS preload list. HTTPS Everywhere & other extensions cause false positives. Doesn t work as-is in Tor Browser thanks to 100 ms timing buckets.
46 Your mileage may vary Only leaks origin, not full path... or does it? Actually, looks feasible to adapt this attack to leak the 301 redirect cache instead of the HSTS cache. :)
47
48 The End Call me maybe: Special thanks to Scott Helme, Jan Schaumann, Chris Palmer, and Chris Rohlf for feedback and demo testing. Many <3 s to White Ops for sponsoring my trip to ToorCon!
AppSec USA 2014 Denver, Colorado Security Header Injection Module (SHIM)
AppSec USA 2014 Denver, Colorado Security Header Injection Module (SHIM) Inspired By: The OWASP Secure Headers Project Introduction Eric Johnson (@emjohn20) Cypress Data Defense Security Consultant SANS
Securing the SSL/TLS channel against man-in-the-middle attacks: Future technologies - HTTP Strict Transport Security and Pinning of Certs
OWASP AppSec APAC 2012 The OWASP Foundation http://www.owasp.org Securing the SSL/TLS channel against man-in-the-middle attacks: Future technologies - HTTP Strict Transport Security and Pinning of Certs
Security starts in the head(er)
Security starts in the head(er) JavaOne 2014 Dominik Schadow bridgingit Policies are independent of framework and language response.addheader(! "Policy name",! "Policy value"! ); User agent must understand
Recent Advances in Web Application Security
Recent Advances in Web Application Security Author: Neelay S Shah Principal Security Consultant Foundstone Professional Services Table of Contents Introduction 3 Content Security Policy 3 Best Practices
Web Tracking for You. Gregory Fleischer
Web Tracking for You Gregory Fleischer 1 INTRODUCTION 2 Me Gregory Fleischer Senior Security Consultant at FishNet Security 3 Disclaimer Why do you hate? 4 Reasons For Tracking TradiFonal reasons for tracking
Real World Java Web Security
Real World Java Web Security Java User Group Karlsruhe Dominik Schadow bridgingit Who thinks about architecture while coding? architecture before coding? Who thinks about security while coding? security
Protecting Web Applications and Users
Protecting Web Applications and Users Technical guidance for improving web application security through implementing web browser based mitigations. Defence Signals Directorate February 2012 Contents 1
A Study of What Really Breaks SSL HITB Amsterdam 2011
A Study of What Really Breaks SSL HITB Amsterdam 2011 v1.0 Ivan Ristic Michael Small 20 May 2011 Agenda 1. State of SSL 2. Quick intro to SSL Labs 3. SSL Configuration Surveys 4. Survey of Actual SSL Usage
Carlos Muñoz Application Security Engineer WhiteHat Security @RTWaysea
Carlos Muñoz Application Security Engineer WhiteHat Security @RTWaysea Bypass: History Explanation: What Is Going On Process: Things To Look For Demos: alert(1) Done Live (hopefully) CSP: Content Security
Web Application and API Security The Latest Trends and Threats. 03/19/15 Sean Leach
Web Application and API Security The Latest Trends and Threats 03/19/15 Sean Leach Who am I? Sean Leach Vice President, Product and Chief Security Officer - Fastly >>> len("vice President, Product and
Is preventing browser fingerprinting a lost cause?
Is preventing browser fingerprinting a lost cause? Obligations of W3C specification authors and reviewers to preserve passive privacy properties of the user agent. What are we talking about? You call it
Criteria for web application security check. Version 2015.1
Criteria for web application security check Version 2015.1 i Content Introduction... iii ISC- P- 001 ISC- P- 001.1 ISC- P- 001.2 ISC- P- 001.3 ISC- P- 001.4 ISC- P- 001.5 ISC- P- 001.6 ISC- P- 001.7 ISC-
Sichere Webanwendungen mit Java
Sichere Webanwendungen mit Java Karlsruher IT- Sicherheitsinitiative 16.07.2015 Dominik Schadow bridgingit Patch fast Unsafe platform unsafe web application Now lets have a look at the developers OWASP
Project X Mass interception of encrypted connections
Project X Mass interception of encrypted connections What? SSL/TLS interception TOR interception ...a thorny path Common Issues Public Key Pinning avoids rogue CA to sign certs Common Issues Google and
SSL BEST PRACTICES OVERVIEW
SSL BEST PRACTICES OVERVIEW THESE PROBLEMS ARE PERVASIVE 77.9% 5.2% 19.2% 42.3% 77.9% of sites are HTTP 5.2% have an incomplete chain 19.2% support weak/insecure cipher suites 42.3% support SSL 3.0 83.1%
Bypassing Internet Explorer s XSS Filter
Bypassing Internet Explorer s XSS Filter Or: Oops, that s not supposed to happen. Carlos @RTWaysea About Me Mechanical Drafting Background Engine parts, Architectural fixtures, etc. Friend said Try This
Zeitgemäße Webserver-Konfiguration. Ein Serviervorschlag
Zeitgemäße Webserver-Konfiguration Ein Serviervorschlag Protokolle HTTP Seit 1991 TLS 1.0 1999 TLS 1.1 2006 TLS 1.2 2008 HTTP/S SPDY 2009 HTTP/2 2012.. 2015 HTTP/2 2012.. 2015 Motivation 2016 Szenarien
Web Application Security
Web Application Security The OWASP Foundation Securing the application Input validation Authorization Session mgmt Config mgmt Authenticatio n Error handling Web server App server DB server Secure storage
Attacks on Clients: Dynamic Content & XSS
Software and Web Security 2 Attacks on Clients: Dynamic Content & XSS (Section 7.1.3 on JavaScript; 7.2.4 on Media content; 7.2.6 on XSS) sws2 1 Recap from last lecture Attacks on web server: attacker/client
A Tale of the Weaknesses of Current Client-Side XSS Filtering
Call To Arms: A Tale of the Weaknesses of Current Client-Side XSS Filtering Martin Johns, Ben Stock, Sebastian Lekies About us Martin Johns, Ben Stock, Sebastian Lekies Security Researchers at SAP, Uni
of HTTP Headers Dirk Wetter @drwetter Licence: http://creativecommons.org/licenses/by-nc-sa/4.0/
Security Security and and Insecurity Insecurity of of HTTP HTTP Headers Headers Dirk Dirk Wetter Wetter @drwetter Licence: http://creativecommons.org/licenses/by-nc-sa/4.0/ imaohw Independent Security
A Server and Browser-Transparent CSRF Defense for Web 2.0 Applications. Slides by Connor Schnaith
A Server and Browser-Transparent CSRF Defense for Web 2.0 Applications Slides by Connor Schnaith Cross-Site Request Forgery One-click attack, session riding Recorded since 2001 Fourth out of top 25 most
Protecting Browser State from Web Privacy Attacks. Collin Jackson, Andrew Bortz, Dan Boneh, John Mitchell Stanford University
Protecting Browser State from Web Privacy Attacks Collin Jackson, Andrew Bortz, Dan Boneh, John Mitchell Stanford University Context-aware Phishing Bank of America customers see: Wells Fargo customers
Vulnerabilità dei protocolli SSL/TLS
Università degli Studi di Milano Facoltà di Scienze Matematiche, Fisiche e Naturali Dipartimento di Informatica e Comunicazione Vulnerabilità dei protocolli SSL/TLS Andrea Visconti Overview Introduction
Improving Magento Front-End Performance
Improving Magento Front-End Performance If your Magento website consistently loads in less than two seconds, congratulations! You already have a high-performing site. But if your site is like the vast
Maximizing Performance with SPDY & SSL. Billy Hoffman [email protected] @zoompf
Maximizing Performance with SPDY & SSL Billy Hoffman [email protected] @zoompf What is SPDY? Massive Browser Support Massive Server Support Cast of Characters TCP HTTP SSL X.509 Certificate Cryptography
Department of Computing Imperial College London. BrowserAudit. A web application that tests the security of browser implementations
Department of Computing Imperial College London BrowserAudit A web application that tests the security of browser implementations Charlie Hothersall-Thomas Supervisor: Dr. Sergio Maffeis June 2014 Submitted
Document Structure Integrity: A Robust Basis for Cross-Site Scripting Defense
Document Structure Integrity: A Robust Basis for Cross-Site Scripting Defense Yacin Nadji Illinois Institute Of Technology Prateek Saxena UC Berkeley Dawn Song UC Berkeley 1 A Cross-Site Scripting Attack
SSL Report: ebfl.srpskabanka.rs (91.240.6.48)
Home Projects Qualys.com Contact You are here: Home > Projects > SSL Server Test > SSL Report: (91.240.6.48) Assessed on: Sun, 03 Jan 2016 15:46:07 UTC HIDDEN Clear cache Scan Another» Summary Overall
SESSION IDENTIFIER ARE FOR NOW, PASSWORDS ARE FOREVER
SESSION IDENTIFIER ARE FOR NOW, PASSWORDS ARE FOREVER XSS-BASED ABUSE OF BROWSER PASSWORD MANAGERS Ben Stock, Martin Johns, Sebastian Lekies Browser choices Full disclosure: Ben was an intern with Microsoft
Web Application Guidelines
Web Application Guidelines Web applications have become one of the most important topics in the security field. This is for several reasons: It can be simple for anyone to create working code without security
HTTP. Internet Engineering. Fall 2015. Bahador Bakhshi CE & IT Department, Amirkabir University of Technology
HTTP Internet Engineering Fall 2015 Bahador Bakhshi CE & IT Department, Amirkabir University of Technology Questions Q1) How do web server and client browser talk to each other? Q1.1) What is the common
WEB APPLICATION SECURITY USING JSFLOW
WEB APPLICATION SECURITY USING JSFLOW Daniel Hedin SYNASC 2015 22 September 2015 Based on joint work with Andrei Sabelfeld et al. TUTORIAL WEB PAGE The tutorial web page contains more information the Tortoise
Pwning Intranets with HTML5
Javier Marcos de Prado Juan Galiana Lara Pwning Intranets with HTML5 2009 IBM Corporation Agenda How our attack works? How we discover what is in your network? What does your infrastructure tell us for
2009-12-26 PST_WEBZINE_0X04. How to solve XSS and mix user's HTML/JavaScript code with your content with just one script
ACS - Active Content Signatures By Eduardo Vela Nava ACS - Active Content Signatures How to solve XSS and mix user's HTML/JavaScript code with your content with just one script Eduardo Vela Nava ([email protected])
Fast, Scalable And Secure Web Hosting For Entrepreneurs
Fast, Scalable And Secure Web Hosting For Entrepreneurs Learn to set up your server and website Wim Bervoets This book is for sale at http://leanpub.com/fastscalableandsecurewebhostingforentrepreneurs
WordPress Optimization
WordPress Optimization markkelnar WP Engine @renderandserve [email protected] wpengine.com/optimizing-wordpress WordCamp Atlanta 2012 Who is this guy? Head of Technology, System Administration, database,
A more detailed list of types of fingerprinting is included below. A similar definition is provided by [[RFC6973]].
This is the abstract for your specification. What is fingerprinting? In short, browser fingerprinting is the capability of a site to identify or re-identify a visiting user, user agent or device via configuration
365-Day: HTTPS Cookie Stealing. Mike Perry Riverbed Technology DEFCON 2008
365-Day: HTTPS Cookie Stealing Mike Perry Riverbed Technology DEFCON 2008 Who am I? Volunteer Tor developer Work on Torbutton, TorFlow Privacy advocate, censorship opponent Forward+Reverse Engineer at
Michael Coates [email protected] michael-coates.blogspot.com
Michael Coates [email protected] michael-coates.blogspot.com Who am I? Web Security Engineer @ Mozilla Contributor OWASP 2010 Top 10 Author OWASP TLS Cheat Sheet Creator & Leader OWASP AppSensor Security
Hacking HTML5. http://10.10.0.1/ No VirtualBox? VirtualBox (~4 gb needed) Apache + PHP Chrome + Firefox. unpack zeronights.zip
VirtualBox (~4 gb needed) http://10.10.0.1/ No VirtualBox? Apache + PHP Chrome + Firefox unpack zeronights.zip host root dir as //localvictim and //127.0.0.1 shared folder - dir with upacked zeronights.zip
Is Your SSL Website and Mobile App Really Secure?
Is Your SSL Website and Mobile App Really Secure? Agenda What is SSL / TLS SSL Vulnerabilities PC/Server Mobile Advice to the Public Hong Kong Computer Emergency Response Team Coordination Centre 香 港 電
Relax Everybody: HTML5 Is Securer Than You Think
Relax Everybody: HTML5 Is Securer Than You Think Martin Johns (@datenkeller) SAP AG Session ID: ADS-W08 Session Classification: Advanced Motivation For some reason, there is a preconception that HTML5
20/20 Insight and WebResponse Whitelist & Settings Information
Below is the general "whitelist" and settings information for 20/20 Insight & WebResponse. Most of the time, 20/20 Insight works "out-of-the-box". In some cases, strict firewalls or other security settings
Preventing Abuse of Cookies Stolen by XSS
Preventing Abuse of Cookies Stolen by XSS Hiroya Takahashi Kenji Yasunaga Masahiro Mambo Kwangjo Kim KAIST Korea Heung Youl Youm Soonchunhyang University Korea Abstract Cross Site Scripting (XSS) makes
Internet Measurement Research
Internet Measurement Research Matthäus Wander Kassel, October 1, 2013 Overview How to get measurement data? Research projects Case studies of past projects Ideas and inspiration
Next Generation Clickjacking
Next Generation Clickjacking New attacks against framed web pages Black Hat Europe, 14 th April 2010 Paul Stone [email protected] Coming Up Quick Introduction to Clickjacking Four New Cross-Browser
Installation and usage of SSL certificates: Your guide to getting it right
Installation and usage of SSL certificates: Your guide to getting it right So, you ve bought your SSL Certificate(s). Buying your certificate is only the first of many steps involved in securing your website.
API Documentation. Introduction. General request structure. Authentication. Account and Site Identifiers. Name Description Optional
API Documentation Introduction Incapsula provides customers and partners with the ability to manage accounts and sites via an API. The API has the following characteristics: Requests are HTTP POST Parameters
TLS all the tubes! TLS Fast Yet? IsWebRTC. It can be. Making TLS fast(er)... the nuts and bolts. +Ilya Grigorik @igrigorik
TLS all the tubes! IsWebRTC TLS Fast Yet? It can be. Making TLS fast(er)... the nuts and bolts. +Ilya Grigorik @igrigorik All communication should be secure, always, and by default! HTTPS everywhere! ...
RTCWEB Generic Identity Service
RTCWEB Generic Identity Service IETF 83 Eric Rescorla [email protected] IETF 83 RTCWeb Generic Identity Provision 1 What are we trying to accomplish? Allow Alice and Bob to have a secure call Authenticated
Java Web Security Antipatterns
Java Web Security Antipatterns JavaOne 2015 Dominik Schadow bridgingit Failed with nothing but the best intentions Architect Implement Maintain Architect Skipping threat modeling Software that is secure
WompMobile Technical FAQ
WompMobile Technical FAQ What are the technical benefits of WompMobile? The mobile site has the same exact URL as the desktop website. The mobile site automatically and instantly syncs with the desktop
MPI Frequently Asked Questions
MPI Frequently Asked Questions 1 Table of contents 1. General... 4 1.1. I want to use the Europabank MPI to handle the payments for my webshop.... 4 Where do I start?... 4 1.2. Should my shop be hosted
A Tale of the Weaknesses of Current Client-side XSS Filtering
A Tale of the Weaknesses of Current Client-side XSS Filtering Sebastian Lekies (@sebastianlekies), Ben Stock (@kcotsneb) and Martin Johns (@datenkeller) Attention hackers! These slides are preliminary!
Abusing HTML5. DEF CON 19 Ming Chow Lecturer, Department of Computer Science TuCs University Medford, MA 02155 [email protected]
Abusing HTML5 DEF CON 19 Ming Chow Lecturer, Department of Computer Science TuCs University Medford, MA 02155 [email protected] What is HTML5? The next major revision of HTML. To replace XHTML? Yes Close
DNS REBINDING DENIS BARANOV, POSITIVE TECHNOLOGIES
DNS REBINDING DENIS BARANOV, POSITIVE TECHNOLOGIES TABLE OF CONTENTS 1 Bypassing The Restrictions 3 2 Putting It into Practice 5 3 Actual Load 7 4 Detection Of The Application Version 5 Guessing A/The
Secure development and the SDLC. Presented By Jerry Hoff @jerryhoff
Secure development and the SDLC Presented By Jerry Hoff @jerryhoff Agenda Part 1: The Big Picture Part 2: Web Attacks Part 3: Secure Development Part 4: Organizational Defense Part 1: The Big Picture Non
MyReports Recommended Browser Settings MYR-200a
MyReports Recommended Browser Settings MYR-200a Note: If you have installed an additional Tool Bar on your browser, such as Yahoo Tool Bar or Google Tool Bar, be sure that it is also configured to allow
8ch.net Privacy Policy
8ch.net Privacy Policy Supersedes previous privacy policy dated December 28 2014 Wednesday, July 8, 2015; Effective Wednesday, July 22, 2015 Contents 1 Changelog 2 1.1 Changes between the December 28 2014
Web tracking technologies & price discrimina5on in e- commerce Nataliia Bielova INDES team
Web tracking technologies & price discrimina5on in e- commerce Nataliia Bielova INDES team 11 February 2016 Back in 1993 2 Today 3 Today Web Tracking google- analyhcs.com doubleclick.com Bigger browsing
Accelerating Wordpress for Pagerank and Profit
Slide No. 1 Accelerating Wordpress for Pagerank and Profit Practical tips and tricks to increase the speed of your site, improve conversions and climb the search rankings By: Allan Jude November 2011 Vice
Advanced XSS. Nicolas Golubovic
Advanced XSS Nicolas Golubovic Image courtesy of chanpipat / FreeDigitalPhotos.net Today's menu 1. Starter: reboiled XSS 2. Course: spicy blacklists & filters 3. Course: sweet content sniffing 4. Course:
Device Fingerprinting and Fraud Protection Whitepaper
Device Fingerprinting and Fraud Protection Whitepaper 1 of 6 Table Of Contents 1 Overview... 3 2 What is Device Fingerprinting?... 3 3 Why is Device fingerprinting necessary?... 3 4 How can Device Fingerprinting
STABLE & SECURE BANK lab writeup. Page 1 of 21
STABLE & SECURE BANK lab writeup 1 of 21 Penetrating an imaginary bank through real present-date security vulnerabilities PENTESTIT, a Russian Information Security company has launched its new, eighth
Cyber Security Workshop Ethical Web Hacking
Cyber Security Workshop Ethical Web Hacking May 2015 Setting up WebGoat and Burp Suite Hacking Challenges in WebGoat Concepts in Web Technologies and Ethical Hacking 1 P a g e Downloading WebGoat and Burp
Secure Coding in Node.js
Secure Coding in Node.js Advanced Edition Copyright 2015 nvisium LLC 590 Herndon Parkway Suite 120, Herndon VA 20170 571.353.7551 www.nvisium.com 1 Introduction Seth Law VP of Research & Development @
Trend Micro Worry- Free Business Security 8.0. 1 st time setup Tips & Tricks
Trend Micro Worry- Free Business Security 8.0 WFBS installation best practise, preparations and how to Preparation for 2008 Server IIS: Configuring the required Internet Information Services (IIS) roles
Sichere Software- Entwicklung für Java Entwickler
Sichere Software- Entwicklung für Java Entwickler Dominik Schadow Senior Consultant Trivadis GmbH 05/09/2012 BASEL BERN LAUSANNE ZÜRICH DÜSSELDORF FRANKFURT A.M. FREIBURG I.BR. HAMBURG MÜNCHEN STUTTGART
Thomas Röthlisberger IT Security Analyst [email protected]
Thomas Röthlisberger IT Security Analyst [email protected] Compass Security AG Werkstrasse 20 Postfach 2038 CH-8645 Jona Tel +41 55 214 41 60 Fax +41 55 214 41 61 [email protected] www.csnc.ch What
present the complete guide to ssl and seo
present the complete guide to ssl and seo The Complete Guide to Setting up SSL and SEO Google recently announced that HTTPS is now being used as a ranking signal in its search engine algorithm. Websites
Public Key Infrastructures
Public Key Infrastructures Ralph Holz Network Architectures and Services Technische Universität München November 2014 Ralph Holz: Public Key Infrastructures 1 Part 2: Recent results or: the sorry state
AUDIT REPORT EXAMPLE
AUDIT REPORT EXAMPLE Severity levels: low, average, high, critical Difficulty levels: low, average, high I. General information and server configuration Problem: Too many HTTP requests. Found (on homepage):
A guide to affilinet s tracking technology
A guide to affilinet s tracking technology Content Introduction 1 What s covered in this Paper? 1 1. Why does affilinet use cookies? 1 Figure 1 the Commercial Model for Performance Marketing 1 2. How does
Breaking the Myths of Extended Validation SSL Certificates
BlackHat Briefings, 2009 Breaking the Myths of Extended Validation SSL Certificates Alexander Sotirov phmsecurity.com Mike Zusman intrepidusgroup.com Introduction Chosen-prefix MD5 collisions allowed us
End User Monitoring. AppDynamics Pro Documentation. Version 4.1.8. Page 1
End User Monitoring AppDynamics Pro Documentation Version 4.1.8 Page 1 End User Monitoring....................................................... 4 Browser Real User Monitoring.............................................
Best Practice Guide (SSL Implementation) for Mobile App Development 最 佳 行 事 指 引. Jointly published by. Publication version 1.
Best Practice Guide (SSL Implementation) for Mobile App Development 流 動 應 用 程 式 (SSL 實 施 ) 最 佳 行 事 指 引 香 港 電 腦 事 故 協 調 中 心 ] Jointly published by [ 專 業 資 訊 保 安 協 會 ] Hong Kong Computer Emergency Response
Obfuscation for and against device fingerprinting Position Paper for Symposium on Obfuscation New York University, February 15, 2014
Obfuscation for and against device fingerprinting Position Paper for Symposium on Obfuscation New York University, February 15, 2014 Gunes Acar KU Leuven, Dept. of Electrical Engineering (ESAT), COSIC,
Getting Started with AWS. Hosting a Static Website
Getting Started with AWS Hosting a Static Website Getting Started with AWS: Hosting a Static Website Copyright 2016 Amazon Web Services, Inc. and/or its affiliates. All rights reserved. Amazon's trademarks
Web Marketing. Website Pre-launch Checklist
Web Marketing Website Pre-launch Checklist Fall 2014 Web Marketing 1-888-673-8485 [email protected] www.accelweb.ca Content Has Grammar and Spell check been performed on all content? Has a second set of
What do a banking Trojan, Chrome and a government mail server have in common? Analysis of a piece of Brazilian malware
What do a banking Trojan, Chrome and a government mail server have in common? Analysis of a piece of Brazilian malware Contents Introduction.................................2 Installation: Social engineering
HTTP/2: Operable and Performant. Mark Nottingham @mnot (@akamai)
HTTP/2: Operable and Performant Mark Nottingham @mnot (@akamai) This talk may be disappointing. As we know, there are known knowns; there are things we know we know. We also know there are known unknowns;
Finding and Preventing Cross- Site Request Forgery. Tom Gallagher Security Test Lead, Microsoft
Finding and Preventing Cross- Site Request Forgery Tom Gallagher Security Test Lead, Microsoft Agenda Quick reminder of how HTML forms work How cross-site request forgery (CSRF) attack works Obstacles
Chrome Extensions: Threat Analysis and Countermeasures
Chrome Extensions: Threat Analysis and Countermeasures Lei Liu, Xinwen Zhang*, Guanhua Yan*, and Songqing Chen George Mason University Huawei R&D Center Los Alamos NaIonal Laboratory NDSS 12 * Does not
CONTENT of this CHAPTER
CONTENT of this CHAPTER v DNS v HTTP and WWW v EMAIL v SNMP 3.2.1 WWW and HTTP: Basic Concepts With a browser you can request for remote resource (e.g. an HTML file) Web server replies to queries (e.g.
Breaking the Security Myths of Extended Validation SSL Certificates
Breaking the Security Myths of Extended Validation SSL Certificates Alexander Sotirov phreedom.org Mike Zusman intrepidusgroup.com Introduction SSL certificate authorities have been thoroughly broken in
1 Introduction: Network Applications
1 Introduction: Network Applications Some Network Apps E-mail Web Instant messaging Remote login P2P file sharing Multi-user network games Streaming stored video clips Internet telephone Real-time video
Demystifying cache. Kristian Lyngstøl Product Specialist Varnish Software AS
Demystifying cache Kristian Lyngstøl Product Specialist Varnish Software AS Montreal, March 2013 Agenda - The types of caches involved - The benefits of a cache - HTTP - Reverse proxy specifics Not: L1/L2
Privacy leakage vs. Protection measures: the growing disconnect
Privacy leakage vs. Protection measures: the growing disconnect Balachander Krishnamurthy (AT&T Labs Research) Konstantin Naryshkin (Worcester Polytechnic Institute) Craig E. Wills (Worcester Polytechnic
