Robust Defence against XSS through Context Free Grammar
|
|
|
- Dylan Nash
- 10 years ago
- Views:
Transcription
1 Robust Defence against XSS through Context Free Grammar 1 Divya Rishi Sahu, 2 Deepak Singh Tomar 1,2 Dept. of CSE, MANIT, Bhopal, MP, India Abstract JavaScript is one of the world s most widely adopted scripting languages among web developers. It is intended to provide enhanced user interface. On the other hand, researchers acquired that commonly used browser such as Chrome, Firefox, IE, etc. suffers from JavaScript bugs. Snippets written in JavaScript may also suffer from Cross Site Scripting potential security threat due to the security unconsciousness of developers. Cross Site Scripting occurs due to the injection of snippets such as JavaScript through the input field of web applications. In this paper firstly the way of exploiting Cross Site Scripting (XSS) has been acquainted. Mainly focuses on the XSS attacks, in which malicious snippets is injected through the address bar of browser. Secondly a context free grammar (CFG) has been developed for detecting XSS vulnerable snippets written in JavaScript. Finally, developed grammar for XSS detection has been embedded through developed Google Chrome Extension. The developed mechanism successfully detects the XSS vulnerabilities attempted through malicious URL string. It also blocks the infected request before executing them. Keywords XSS, Context Free Grammar, Extension I. Introduction With the proliferation of the internet, there has been a surge in the web services being offered by many organizations like e-banking, e-shopping etc. Most of these applications do not develop with defensive programming principles, which increase the number of attack vectors. Attacker may acquire material gains or steal the credentials of the novice users through attack like XSS. It is pointed in OWASP - Top 10 most critical web application security vulnerability list [1]. HTTP is a stateless protocol which maintains the session through cookies [2]. As per the report- Application Vulnerability trend report 2014 [3], XSS vulnerability has ranked as a serious threat and appears in 60% of web applications. It is a web application vulnerability that targets client side scripting language embedded in a web page such as JavaScript. XSS may launched by attacker to hijack the session, steal the cookies, compromise sensitive information, execute malicious scripts to redirect the session end so on. This paper focuses on prevention of XSS attack, which may cause any kind of harm to legitimate users due to the insertion of malicious JavaScript into Web Application through URL. Prevention mechanism focuses on developing a client side grammar based detection engine for Cross Site Scripting that differentiates XSS attack from simple script. The main goal of this work is to provide a XSS solution to novice end user to safe guard their systems from attackers. It results in enhanced and secured browsing experience without any surge in functionality. The developed plug-in chrome browser would fetch the generated Universal Resource Locator (URL) and detect it for any kind of malicious input. Such a plug-in would protect from cookie theft, key logging, phishing etc. II. Cross Side Scripting Exploitation Cross Site Scripting [4] is a type of injection attack that injects malicious script into the authentic websites. Malicious scripts may reside on the web server or be explicitly inserted when the user surf to particular website. It relies upon the resources of targeted web server such as third party cookies. Typical scenario of XSS is depicted in fig. 1. Hacker lures the victim to click on the URL containing malicious JavaScript code. Whenever victim clicks into the URL, request reach the trusted web server and it reply with error message. Reply contains the name of resource (i.e. malicious JavaScript). Hacker Lure to victim Victim Clicks on URL Fig. 1: Scenario for XSS Attack Browser Sends request to trusted server Server returns page containing malicious JavaScript code Browser Execute it Return values Attackers Server Trusted Server JavaScript code is executed and does malfunctioning as defined in code. Characteristics of web applications, relevant to the XSS through URL, are as follows: 1. Web applications take input from users (through address bar of browser). 2. It separates filtered input into two strings (i.e. path of web page and search part). 3. Subsequently, it dynamically includes the search part (if present) in Web pages fetched from specified path. 4. This search part sent with the command of Hyper Text Transfer Protocol (HTTP) and considered as the section of path. 5. HTTP URL does not pass the host details to client. According to these characteristics web application may be defined as follows: Definition (Web Application) Here Web Application P:(Σ* Σ*) Σ^* is defined as a mapping from user inputs (over an alphabet Σ) to URL (over Σ) and search part (if exist). In particular, P is given by {(p 1...p n ), (s 1...s m )} International Journal of Computer Science And Technology 113
2 ISSN : (Online) ISSN : (Print) {Where- P : is a path string i S : Σ* Σ* is a search filter } i The argument to P is an n-tupple of input string (i1...im), and P returns a command c = c c t where, for 1 j t That is, each C j is either a path of web page or a filtered search part. Attacker may tamper C j part to exploit XSS vulnerability when: 1. Script injects into web application through a distrusted source, most frequently a web request. 2. Data incorporated with dynamic content is replied to the end user and sent without validation of malware snippets. Address bar in web browser is the globally available source to inject script into web application. This paper structured the three cases to exploit vulnerable JavaScript code through URL. A. Inline Inclusion of JavaScript- Inline JavaScript code may be appended to URL by defining the malicious behavior into <script>... </script> tag. URL may contains script definition, for instancehttp://localhost/?message=<script>alert( xss ); </script> B. Through Local File: URLs also may contain the link of a local resource file (i.e. JavaScript file- xss.js). These local file defines the malicious nature of JavaScript code and stored into client machine. Client may execute locally stored JavaScript file (xss.js) through injecting the URLhttp://localhost/?message= <script src= xss.js > </script> C. Remotely script inclusion: URL may contain path of remote file for execution. These remote files define the malicious nature of JavaScript code. Remote files are fetched through anchor tag attribute value (like href). E.g. URL given below fetches the JavaScript file (xss.js) from the server ha.ckers.org (ha.ckers.org/xss.js). <script href = xss.js> </script> III. Literature Review of XSS Detection Techniques To mitigate such serious impact, Web applications should use an effective solution for Cross-Site Scripting vulnerability. Snippet containing script injected through the URL is frequently misunderstood as XSS attack. By default, Web browsers are able to interpret snippets having the script that is replied by the Web server. Such scripts are usually written in different scripting languages such as JavaScript and VBScript. These are introduced by the HTML scripting tag <SCRIPT>. NoScript is the extension of Firefox browser for blocking the execution of all JavaScript codes. In this solution, all scripts are considered as malicious in nature. Blocking all JavaScript code execution is not fruitful solution because scripting functionality provides better experience. For example, string alert( XSS ) does not considered as malicious due to the harmless nature. In contrast, string alert(document.cookie) is considered as malicious due to accessing the DOM object of browser. A. Static Detection Approaches- Static detection approaches are based on previous knowledge of XSS vulnerabilities, execution patterns and syntactic structure of 114 International Journal of Computer Science And Technology vulnerable snippets. These approaches are based on two detection models: the negative and the positive model. Positive model allowed only well known benevolent JavaScript and denied everything else. It creates white-list of trusted and benign traffic. Negative model defines denied traffic and allow everything else. It creates blacklist of malicious traffic. Static detection approaches are as follows: 1. XSS Detection through String Analysis This method involves checking for particular occurrence of string. It can be implemented as finite state machine or as a context free grammar. This technique first detects the presence of <script> tags (both opening and closing) thoroughly in whole code. However, it is not practical for finding XSS vulnerabilities through script tags due to the other ways of invoking the JavaScript. Other ways like including their own scripts into web page and existence of different interpreters. (i). Rule-Based Detection Approach This approach defines static rules which have to be defined before the analysis process. Rules may be uncomplicated like detection of particular language keyword or more complex like detection of chain of characteristics. Rule based validation is appropriate for both reflected and stored XSS. While, Special set of rules are required to address DOM Based XSS. Enormous types of attack vector and unique contexts within HTML, requires number of rules to address the XSS attack. Hence, lacking the single rules from the particular list turns out to be a complicated issue. B. Dynamic Detection Approaches- Dynamic detection approaches are based on changes occurred at run time because of vulnerability execution. 1. Syntactical Structure Analysis Analysing the difference in syntactical structure of output string is an approch to detect the malicious snippets. Mostly attacks modify the syntactic structure of the exploited system. However, only analysis of syntactic structure is not adequate to detect vulnerabilities occurred due to the interaction of multiple modules. Nadji et al. [6] analyze the difference of document structure integrity to detect XSS attacks. This approach is constructive for detecting injected snippets that does not alters the parse tree of DOM. 2. Anomaly-based Detection Anomaly rules consist of dynamic rules. As the name implies, those rules are neither static nor are they manually defined. Instead, the rules are defined through a learning phase. Learning phase defines the alteration in among behavior of trusted traffic and anomalous traffic. Here, anomalous traffic is the traffic that does not look like normal traffic. Deviations from this rule-set are flagged as anomalous traffic. 3. Taint Propagation Analysis Taint propagation analysis is used to detect flow of data to track the information flow from source to sink. This technique assumes that if sanitizing operation on all paths from source to sinks has been accomplished successfully then the application has secure. A number of XSS vectors may bypass strong filters easily. Hence, trust on end user filtering and improper sanitization function is not proficient for security. Thus, it does not provide strong security mechanism.
3 C. XSS Prevention Approaches: Selecting a XSS prevention mechanism to go with server side solution or client side solution is also a great dispute. A client side solution can help the security unconscious end users. Server side solution helps web administrator and security experts. 1. Proxy Based Solution Noxes is a web proxy used by end user to protect against XSS attack. It is a client side and rule based solution to protect end users. If any connection is mismatched with its rules then end user may allow or deny the connection. Blacklisting the link is not sufficient technique to prevent cross-site Scripting attacks. It does not have any procedure of examining the errors that increases the false positive rate. 2. Browser Enforced Embedded Policies Web applications are often their own scripts. These all benign scripts are used to create white list for particular web application. This productive idea for protecting XSS, just allows execution of white listed script. Jim et al. [7] proposed hash based whitlist to protect from injection vulnerabilities. Firstly, generates the all hash value of whitelisted JavaScript and sends them to client side agent. Client side agent validate injected scripts through hash matching. Enforcing the policy to browser requires a modification in that. Accordingly, it suffers from scalability issue in respect with web application. Every client need to have this modified version of the browser. IV. Grammar Construction for XSS Attack The proposed architecture to detect vulnerable queries is based on context-free grammar. This grammar is constructed on the basis of various patterns exhibited through most available malicious URLs available in XSS Cheat Sheet [8]. Proposed architecture catches the malicious URLs and blocks these URLs before the execution. If there is no such malicious script found in URL, it may safely be termed harmless and may be allowed to execute. Architecture of the proposed work is depicted in the Fig. 2. A. URL Extraction- URL syntax and semantics are defined into RFC-1738, where URL has two parts <scheme> and <scheme-specific-part>. First part <scheme> is the name of the protocol used (such as http). It followed by a colon. Second part <scheme-specific-part> is a string whereof interpretation is based on the first part. In this paper, mostly URL s based on HTTP URL Scheme has been adopted to test the XSS attack. Syntax of HTTP URL is as follows: Developed extension extract the URL from address bar of the Google Chrome browser and pass it to preprocessing module. B. Syntactic Validation- Firstly, verify the query string for appropriate syntactic structure according to the scheme and features of web application. The intuition behind this syntactic validation is that the attacker tries; the script has run beyond the borders of the developers. forms with respect to U. It defines subset U which may be assigned such that L includes only syntactic forms that the application programmer wants to allow to the end user. According to valid syntactic forms, XSS has defined as: Definition (XSS): To a given Web Application P and an input vector (i 1.i m ), the following XSS command script c = P(i 1.i m ), constructed by P will be a XSS attack string if it holds the following conditions: Command script c has a valid parse tree T c ; There exist k such that 1 k n and s k (i k ) is a substring in the c and is not a valid semantic form in parse tree T c ; Fig. 2: Proposed Architecture C. URL Pre-processing- In this module, URL is decomposed into three major parts: the Website Name, Separator and the Query String. Website Name contains protocol, host, port and path of webpage. Website Name does not contain any error hence it s error-free, and ignored. Second is the Separator which is used to discrete the Website Name from <search part>. And remaining part (<search part>) is treated as Query String. This part may be augmented query upended into URL for XSS so it will be processed further. D. Tokenization- Proposed framework is suitable for JavaScript in hierarchical format. Hierarchical approach comprises two parsing top-down and bottom-up and one adaptive split-and-merge approach. Adaptive split-and-merge approaches firstly separate the heterogeneous regions, and then merge homogeneous regions. Split the query string into various tokens by means of JavaScript keywords. Subsequently, parse tree has been generated in hierarchical form that is labeled by symbols of a CFG. Root node has been labeled as Query String. Second-level nodes have all the remaining test tokens as its sub-tree. Here, all these tokens will be arranged in a multi level format with a variable number of levels as and when required. It is depends on the type of query string. The tree structure has been implemented with the help of JavaScript functions and cascading style sheets (CSS). For instances if URL is than the query string will be +document.cookie. Generated parse tree has been depicted in fig. 3. Definition (Valid Syntactic Form): Let G = (V, Ʃ, S, P) be a CFG where V is non-terminals, Ʃ terminals, S a start symbol, P productions. Let U V Ʃ. Strings in the sub-language L generated by U are called valid syntactic International Journal of Computer Science And Technology 115
4 ISSN : (Online) ISSN : (Print) Query String approach can be extended to all the other server side scripting languages (like asp, jsp, etc.), so that all classes of web developers can make use of the solution. ID ARG + DOM PATH document. cookie Fig. 3: Parse Tree for Example Usage E. Context Free Grammer This module checks the parse tree with the help of passing it as input to the implemented code of developed context free grammar. This code has been designed for detecting malevolent strings based on developed CFG. Developed CFG for XSS attack has been depicted in Figure 4. Subsequently it checks the grammar for instances of keywords like script, JavaScript, location, cookie, etc. For example, if keyword like eval and alert appears with script or VBScript, then it might be a suspicious situation. If the query string is completely parsed through the grammar, it can be inferred that the string does not contain any malicious script, and so it is harmless. If the query string is not parsed completely through the grammar, it may be inferred that the string contains suspicious script therefore, it is harmful. As the final output, a popup message is displayed regarding the nature of the URL and notifies whether it must be blocked or allowed to execute. F. Performance Evaluation Traditionally, evaluation of a system measures has been done in terms of accuracy and completeness. Measuring the accuracy of an error-prone system is often done in terms of True Positive Rate (TPR), False Positive Rate (FPR). Completeness of the system may be measure though measuring result in all possible cases. To evaluate the performance, a labeled dataset of 151 URLs has been created and injected into developed environment. VI. Conclusion and Future Work In this paper a browser based XSS filtering tool has been developed to differentiate simple bona fide scripts from malevolent XSS queries. Consequently, the grammar is capable enough to detect and point out a wide array of malevolent URLs in real-time with much better precision and accuracy. The percentage and contribution of false positives and false negatives has been efficiently evaluated, which has boosted the real-time performance of the entire detection mechanism. Developing such an extension increase the security of novice end user at client side to safe guard their systems from malignant XSS attack. Thus, novice end users may enjoy the safe and better experience of browsing. This work has an immense future scope as far as implementation and improvements are concerned. The developed extension works accurately to stripping out the XSS queries however it is restricted to Google Chrome browser and JavaScript. The same logic and 116 International Journal of Computer Science And Technology Fig. 4: Developed CFG for XSS This dataset contains URLs with their respective previously identified malevolent or benevolent behavior. TPR and FPR depends on the dataset used and may vary. This experimental evaluation results that the system is % accurate as per the developed dataset. VII. Acknowledgment The work presented in this paper is not possible without the network and security laboratory of Department of Computer Science and Engineering, MA National Institute of Technology (MANIT), Bhopal, India. We would like to gratefully and sincerely thank to all of my former undergraduate lab mates for laboratory support. References [1] OWASP OWASP top , the ten most critical web application security risks, June 2013 [Online]. Available:
5 [Accessed: 1-July-2013]. [2] Divya Rishi Sahu, Deepak Singh Tomar, End user identification through proactive techniques, In Int. Conf. on Information Science 2014 (ICIS-2014), Ernakulam, Kerala, July [3] Cenzic Inc., Application vulnerability trend report:2014, [Online]. Available: Cenzic_Vulnerability_Report_2014.pdf [Accessed: 12- August-2014]. [4] Dr. E. Benoist, Cross Site Scripting, 2012 [Online]. Available: slidesxss.pdf [Accessed: June 2013]. [5] G. A. Di Luccaet Al., Identifying cross site scripting vulnerabilities in web application, In Proc. of the Web Site Evolution (WSE), Sixth IEEE Int. Workshop, Chicago, IL, September-2004, pp [6] Y. Nadji, P. Saxena, D. Song, Document Structure Integrity: A Robust Basis for Cross-Site Scripting Defence, In 16th Annual Network & Distributed System Security Symposium (NDSS), San Diego, California, USA, February [7] T. Jim, N. Swamy, H. Hicks, Defeating script injection attacks with browser-enforced embedded policies, In Proc. of the 16th Int. Conf. on World Wide Web, Banff, Alberta, Canada, May -2007, pp [8] R Snake, XSS (Cross Site Scripting) Cheat Sheet ESP: for filter evasion, [Online] Available: washington.edu/home/wstein/www/home/agc/lit/javascript/ xss.html [Accessed: August 2013]. [9] Zhendong Su, Gary Wassermann, The essence of command injection attacks in web application, Conf. record of the 33rd ACM SIGPLAN-SIGACT symposium on Principles of programming languages, USA, Jauary-2006, pp Divya Rish Sahu completed M.Tech in Information Security and BE in Information Technology branch. He is currently pursuing his PhD in CSE department from Maulana Azad National Institute of Technology (MANIT), Bhopal, India. Dr. Deepak Singh Tomar obtained his BE, M Tech and PhD in CSE. He is currently Assistant Professor of CSE department at NIT Bhopal, India. His research interests are in Web Mining and Cyber Security. He has published more than 45 papers and guided 27 M Tech thesis. He is having more than 20 year experience. International Journal of Computer Science And Technology 117
Cross Site Scripting Prevention
Project Report CS 649 : Network Security Cross Site Scripting Prevention Under Guidance of Prof. Bernard Menezes Submitted By Neelamadhav (09305045) Raju Chinthala (09305056) Kiran Akipogu (09305074) Vijaya
HOD of Dept. of CSE & IT. Asst. Prof., Dept. Of CSE AIET, Lko, India. AIET, Lko, India
Volume 5, Issue 12, December 2015 ISSN: 2277 128X International Journal of Advanced Research in Computer Science and Software Engineering Research Paper Available online at: www.ijarcsse.com Investigation
Protection, Usability and Improvements in Reflected XSS Filters
Protection, Usability and Improvements in Reflected XSS Filters Riccardo Pelizzi System Security Lab Department of Computer Science Stony Brook University May 2, 2012 1 / 19 Riccardo Pelizzi Improvements
A Tale of the Weaknesses of Current Client-Side XSS Filtering
Call To Arms: A Tale of the Weaknesses of Current Client-Side XSS Filtering Martin Johns, Ben Stock, Sebastian Lekies About us Martin Johns, Ben Stock, Sebastian Lekies Security Researchers at SAP, Uni
XSS-GUARD : Precise Dynamic Prevention of Cross Site Scripting (XSS) Attacks
XSS-GUARD : Precise Dynamic Prevention of Cross Site Scripting (XSS) Attacks Prithvi Bisht (http://cs.uic.edu/~pbisht) Joint work with : V.N. Venkatakrishnan Systems and Internet Security Laboratory Department
CS 558 Internet Systems and Technologies
CS 558 Internet Systems and Technologies Dimitris Deyannis [email protected] 881 Heat seeking Honeypots: Design and Experience Abstract Compromised Web servers are used to perform many malicious activities.
Check list for web developers
Check list for web developers Requirement Yes No Remarks 1. Input Validation 1.1) Have you done input validation for all the user inputs using white listing and/or sanitization? 1.2) Does the input validation
Webapps Vulnerability Report
Tuesday, May 1, 2012 Webapps Vulnerability Report Introduction This report provides detailed information of every vulnerability that was found and successfully exploited by CORE Impact Professional during
A Server and Browser-Transparent CSRF Defense for Web 2.0 Applications. Slides by Connor Schnaith
A Server and Browser-Transparent CSRF Defense for Web 2.0 Applications Slides by Connor Schnaith Cross-Site Request Forgery One-click attack, session riding Recorded since 2001 Fourth out of top 25 most
Web Application Security
Web Application Security John Zaharopoulos ITS - Security 10/9/2012 1 Web App Security Trends Web 2.0 Dynamic Webpages Growth of Ajax / Client side Javascript Hardening of OSes Secure by default Auto-patching
Client vs. Server Implementations of Mitigating XSS Security Threats on Web Applications
Journal of Basic and Applied Engineering Research pp. 50-54 Krishi Sanskriti Publications http://www.krishisanskriti.org/jbaer.html Client vs. Server Implementations of Mitigating XSS Security Threats
Cross Site Scripting in Joomla Acajoom Component
Whitepaper Cross Site Scripting in Joomla Acajoom Component Vandan Joshi December 2011 TABLE OF CONTENTS Abstract... 3 Introduction... 3 A Likely Scenario... 5 The Exploit... 9 The Impact... 12 Recommended
Document Structure Integrity: A Robust Basis for Cross-Site Scripting Defense
Document Structure Integrity: A Robust Basis for Cross-Site Scripting Defense Yacin Nadji Illinois Institute Of Technology Prateek Saxena UC Berkeley Dawn Song UC Berkeley 1 A Cross-Site Scripting Attack
Exploitation of Cross-Site Scripting (XSS) Vulnerability on Real World Web Applications and its Defense
Exploitation of Cross-Site Scripting (XSS) Vulnerability on Real World Web Applications and its Defense Shashank Gupta Lecturer in Department of Information Technology, Model Institute of Engineering and
Recommended Practice Case Study: Cross-Site Scripting. February 2007
Recommended Practice Case Study: Cross-Site Scripting February 2007 iii ACKNOWLEDGEMENT This document was developed for the U.S. Department of Homeland Security to provide guidance for control system cyber
What is Web Security? Motivation
[email protected] http://www.brucker.ch/ Information Security ETH Zürich Zürich, Switzerland Information Security Fundamentals March 23, 2004 The End Users View The Server Providers View What is Web
Intrusion detection for web applications
Intrusion detection for web applications Intrusion detection for web applications Łukasz Pilorz Application Security Team, Allegro.pl Reasons for using IDS solutions known weaknesses and vulnerabilities
Creating Stronger, Safer, Web Facing Code. JPL IT Security Mary Rivera June 17, 2011
Creating Stronger, Safer, Web Facing Code JPL IT Security Mary Rivera June 17, 2011 Agenda Evolving Threats Operating System Application User Generated Content JPL s Application Security Program Securing
Client Side Filter Enhancement using Web Proxy
Client Side Filter Enhancement using Web Proxy Santosh Kumar Singh 1, Rahul Shrivastava 2 1 M Tech Scholar, Computer Technology (CSE) RCET, Bhilai (CG) India, 2 Assistant Professor, CSE Department, RCET
Bug Report. Date: March 19, 2011 Reporter: Chris Jarabek ([email protected])
Bug Report Date: March 19, 2011 Reporter: Chris Jarabek ([email protected]) Software: Kimai Version: 0.9.1.1205 Website: http://www.kimai.org Description: Kimai is a web based time-tracking application.
WHITE PAPER. FortiWeb and the OWASP Top 10 Mitigating the most dangerous application security threats
WHITE PAPER FortiWeb and the OWASP Top 10 PAGE 2 Introduction The Open Web Application Security project (OWASP) Top Ten provides a powerful awareness document for web application security. The OWASP Top
Analysis of Browser Defenses against XSS Attack Vectors
Analysis of Browser Defenses against XSS Attack Vectors Shital Dhamal Department of Computer Engineering Lokmanya Tilak College of Engineering Koparkhairne,Navi Mumbai,Maharashtra,India Manisha Mathur
Phishing by data URI
Phishing by data URI Henning Klevjer [email protected] October 22, 2012 1 Abstract Historically, phishing web pages have been hosted by web servers that are either compromised or owned by the attacker.
Hack Proof Your Webapps
Hack Proof Your Webapps About ERM About the speaker Web Application Security Expert Enterprise Risk Management, Inc. Background Web Development and System Administration Florida International University
The Top Web Application Attacks: Are you vulnerable?
QM07 The Top Web Application Attacks: Are you vulnerable? John Burroughs, CISSP Sr Security Architect, Watchfire Solutions [email protected] Agenda Current State of Web Application Security Understanding
A Novel Frame Work to Detect Malicious Attacks in Web Applications
Technology, Volume-2, Issue-1, January-March, 2014, pp. 23-28, IASTER 2014, www.iaster.com, Online:2347-5099, Print:2348-0009 A Novel Frame Work to Detect Malicious Attacks in Web Applications N. Jayakanthan
Cross Site Scripting (XSS) and PHP Security. Anthony Ferrara NYPHP and OWASP Security Series June 30, 2011
Cross Site Scripting (XSS) and PHP Security Anthony Ferrara NYPHP and OWASP Security Series June 30, 2011 What Is Cross Site Scripting? Injecting Scripts Into Otherwise Benign and Trusted Browser Rendered
Toward A Taxonomy of Techniques to Detect Cross-site Scripting and SQL Injection Vulnerabilities
NCSU CSC TR 2008-4 1 Toward A Taxonomy of Techniques to Detect Cross-site Scripting and SQL Injection Vulnerabilities Yonghee SHIN, Laurie WILLIAMS, Members, IEEE Abstract Since 2002, over half of reported
How To Fix A Web Application Security Vulnerability
Proposal of Improving Web Application Security in Context of Latest Hacking Trends RADEK VALA, ROMAN JASEK Department of Informatics and Artificial Intelligence Tomas Bata University in Zlin, Faculty of
Where every interaction matters.
Where every interaction matters. Peer 1 Vigilant Web Application Firewall Powered by Alert Logic The Open Web Application Security Project (OWASP) Top Ten Web Security Risks and Countermeasures White Paper
Detect and Sanitise Encoded Cross-Site Scripting and SQL Injection Attack Strings Using a Hash Map
Detect and Sanitise Encoded Cross-Site Scripting and SQL Injection Attack Strings Using a Hash Map Erwin Adi and Irene Salomo School of Computer Science BINUS International BINUS University, Indonesia
Recent Advances in Web Application Security
Recent Advances in Web Application Security Author: Neelay S Shah Principal Security Consultant Foundstone Professional Services Table of Contents Introduction 3 Content Security Policy 3 Best Practices
Web Forensic Evidence of SQL Injection Analysis
International Journal of Science and Engineering Vol.5 No.1(2015):157-162 157 Web Forensic Evidence of SQL Injection Analysis 針 對 SQL Injection 攻 擊 鑑 識 之 分 析 Chinyang Henry Tseng 1 National Taipei University
Acunetix Website Audit. 5 November, 2014. Developer Report. Generated by Acunetix WVS Reporter (v8.0 Build 20120808)
Acunetix Website Audit 5 November, 2014 Developer Report Generated by Acunetix WVS Reporter (v8.0 Build 20120808) Scan of http://filesbi.go.id:80/ Scan details Scan information Starttime 05/11/2014 14:44:06
Detection and mitigation of Web Services Attacks using Markov Model
Detection and mitigation of Web Services Attacks using Markov Model Vivek Relan [email protected] Bhushan Sonawane [email protected] Department of Computer Science and Engineering, University of Maryland,
Web Application Security. Vulnerabilities, Weakness and Countermeasures. Massimo Cotelli CISSP. Secure
Vulnerabilities, Weakness and Countermeasures Massimo Cotelli CISSP Secure : Goal of This Talk Security awareness purpose Know the Web Application vulnerabilities Understand the impacts and consequences
Project 2: Web Security Pitfalls
EECS 388 September 19, 2014 Intro to Computer Security Project 2: Web Security Pitfalls Project 2: Web Security Pitfalls This project is due on Thursday, October 9 at 6 p.m. and counts for 8% of your course
Detection of SQL Injection and XSS Vulnerability in Web Application
International Journal of Engineering and Applied Sciences (IJEAS) ISSN: 2394-3661, Volume-2, Issue-3, March 2015 Detection of SQL Injection and XSS Vulnerability in Web Application Priti Singh, Kirthika
A Multi agent Scanner to Detect Stored XSS Vulnerabilities
A Multi agent Scanner to Detect Stored XSS Vulnerabilities E. Galán, A. Alcaide, A. Orfila, J. Blasco University Carlos III of Madrid, UC3M Leganés, Spain {edgalan,aalcaide,adiaz,jbalis}@inf.uc3m.es Abstract
Detection and Prevention of SQL Injection Attacks
Detection and Prevention of SQL Injection Attacks 1 Sailor Pratik, 2 Prof. Jaydeep Gheewala 1 Computer Department 1 Sarvajanik College of Engineering and Technology, Surat, Gujarat, India 1 [email protected],
WEB ATTACKS AND COUNTERMEASURES
WEB ATTACKS AND COUNTERMEASURES February 2008 The Government of the Hong Kong Special Administrative Region The contents of this document remain the property of, and may not be reproduced in whole or in
Bank Hacking Live! Ofer Maor CTO, Hacktics Ltd. ATC-4, 12 Jun 2006, 4:30PM
Bank Hacking Live! Ofer Maor CTO, Hacktics Ltd. ATC-4, 12 Jun 2006, 4:30PM Agenda Introduction to Application Hacking Demonstration of Attack Tool Common Web Application Attacks Live Bank Hacking Demonstration
INTRUSION PROTECTION AGAINST SQL INJECTION ATTACKS USING REVERSE PROXY
INTRUSION PROTECTION AGAINST SQL INJECTION ATTACKS USING REVERSE PROXY Asst.Prof. S.N.Wandre Computer Engg. Dept. SIT,Lonavala University of Pune, [email protected] Gitanjali Dabhade Monika Ghodake Gayatri
FINAL DoIT 11.03.2015 - v.4 PAYMENT CARD INDUSTRY DATA SECURITY STANDARDS APPLICATION DEVELOPMENT AND MAINTENANCE PROCEDURES
Purpose: The Department of Information Technology (DoIT) is committed to developing secure applications. DoIT s System Development Methodology (SDM) and Application Development requirements ensure that
HTTPParameter Pollution. ChrysostomosDaniel
HTTPParameter Pollution ChrysostomosDaniel Introduction Nowadays, many components from web applications are commonly run on the user s computer (such as Javascript), and not just on the application s provider
Magento Security and Vulnerabilities. Roman Stepanov
Magento Security and Vulnerabilities Roman Stepanov http://ice.eltrino.com/ Table of contents Introduction Open Web Application Security Project OWASP TOP 10 List Common issues in Magento A1 Injection
A Survey on Security and Vulnerabilities of Web Application
A Survey on Security and Vulnerabilities of Web Application Gopal R. Chaudhari, Prof. Madhav V. Vaidya Department of Information Technology, SGGS IE & T, Nanded, Maharashtra, India-431606 Abstract Web
Application security testing: Protecting your application and data
E-Book Application security testing: Protecting your application and data Application security testing is critical in ensuring your data and application is safe from security attack. This ebook offers
Detecting and Exploiting XSS with Xenotix XSS Exploit Framework
Detecting and Exploiting XSS with Xenotix XSS Exploit Framework [email protected] keralacyberforce.in Introduction Cross Site Scripting or XSS vulnerabilities have been reported and exploited since 1990s.
Security Research Advisory IBM inotes 9 Active Content Filtering Bypass
Security Research Advisory IBM inotes 9 Active Content Filtering Bypass Table of Contents SUMMARY 3 VULNERABILITY DETAILS 3 TECHNICAL DETAILS 4 LEGAL NOTICES 7 Active Content Filtering Bypass Advisory
Web applications. Web security: web basics. HTTP requests. URLs. GET request. Myrto Arapinis School of Informatics University of Edinburgh
Web applications Web security: web basics Myrto Arapinis School of Informatics University of Edinburgh HTTP March 19, 2015 Client Server Database (HTML, JavaScript) (PHP) (SQL) 1 / 24 2 / 24 URLs HTTP
IJMIE Volume 2, Issue 9 ISSN: 2249-0558
Survey on Web Application Vulnerabilities Prevention Tools Student, Nilesh Khochare* Student,Satish Chalurkar* Professor, Dr.B.B.Meshram* Abstract There are many commercial software security assurance
A Tale of the Weaknesses of Current Client-side XSS Filtering
A Tale of the Weaknesses of Current Client-side XSS Filtering Sebastian Lekies (@sebastianlekies), Ben Stock (@kcotsneb) and Martin Johns (@datenkeller) Attention hackers! These slides are preliminary!
Web Application Security Considerations
Web Application Security Considerations Eric Peele, Kevin Gainey International Field Directors & Technology Conference 2006 May 21 24, 2006 RTI International is a trade name of Research Triangle Institute
Cross-Site Scripting
Cross-Site Scripting (XSS) Computer and Network Security Seminar Fabrice Bodmer ([email protected]) UNIFR - Winter Semester 2006-2007 XSS: Table of contents What is Cross-Site Scripting (XSS)? Some
A DYNAMIC TOOL FOR DETECTION OF XSS ATTACKS IN A REAL-TIME ENVIRONMENT
A DYNAMIC TOOL FOR DETECTION OF XSS ATTACKS IN A REAL-TIME ENVIRONMENT K. G. Maheswari 1 and R. Anita 2 1 Department of MCA, Institute of Road and Transport Technology, Anna University, Erode, Tamil Nadu,
FINAL DoIT 04.01.2013- v.8 APPLICATION SECURITY PROCEDURE
Purpose: This procedure identifies what is required to ensure the development of a secure application. Procedure: The five basic areas covered by this document include: Standards for Privacy and Security
Protect Your IT Infrastructure from Zero-Day Attacks and New Vulnerabilities
Protect Your IT Infrastructure from Zero-Day Attacks and New Vulnerabilities Protecting a business s IT infrastructure is complex. Take, for example, a retailer operating a standard multi-tier infrastructure
How to break in. Tecniche avanzate di pen testing in ambito Web Application, Internal Network and Social Engineering
How to break in Tecniche avanzate di pen testing in ambito Web Application, Internal Network and Social Engineering Time Agenda Agenda Item 9:30 10:00 Introduction 10:00 10:45 Web Application Penetration
(WAPT) Web Application Penetration Testing
(WAPT) Web Application Penetration Testing Module 0: Introduction 1. Introduction to the course. 2. How to get most out of the course 3. Resources you will need for the course 4. What is WAPT? Module 1:
Introduction: 1. Daily 360 Website Scanning for Malware
Introduction: SiteLock scans your website to find and fix any existing malware and vulnerabilities followed by using the protective TrueShield firewall to keep the harmful traffic away for good. Moreover
Defending against XSS,CSRF, and Clickjacking David Bishop
Defending against XSS,CSRF, and Clickjacking David Bishop University of Tennessee Chattanooga ABSTRACT Whenever a person visits a website, they are running the risk of falling prey to multiple types of
Ruby on Rails Secure Coding Recommendations
Introduction Altius IT s list of Ruby on Rails Secure Coding Recommendations is based upon security best practices. This list may not be complete and Altius IT recommends this list be augmented with additional
WEB SECURITY CONCERNS THAT WEB VULNERABILITY SCANNING CAN IDENTIFY
WEB SECURITY CONCERNS THAT WEB VULNERABILITY SCANNING CAN IDENTIFY www.alliancetechpartners.com WEB SECURITY CONCERNS THAT WEB VULNERABILITY SCANNING CAN IDENTIFY More than 70% of all websites have vulnerabilities
EVALUATING COMMERCIAL WEB APPLICATION SECURITY. By Aaron Parke
EVALUATING COMMERCIAL WEB APPLICATION SECURITY By Aaron Parke Outline Project background What and why? Targeted sites Testing process Burp s findings Technical talk My findings and thoughts Questions Project
CSE598i - Web 2.0 Security OWASP Top 10: The Ten Most Critical Web Application Security Vulnerabilities
CSE598i - Web 2.0 Security OWASP Top 10: The Ten Most Critical Web Application Security Vulnerabilities Thomas Moyer Spring 2010 1 Web Applications What has changed with web applications? Traditional applications
Double guard: Detecting Interruptions in N- Tier Web Applications
Vol. 3, Issue. 4, Jul - Aug. 2013 pp-2014-2018 ISSN: 2249-6645 Double guard: Detecting Interruptions in N- Tier Web Applications P. Krishna Reddy 1, T. Manjula 2, D. Srujan Chandra Reddy 3, T. Dayakar
Hunting Cross-Site Scripting Attacks in the Network
Hunting Cross-Site Scripting Attacks in the Network Elias Athanasopoulos, Antonis Krithinakis, and Evangelos P. Markatos Institute of Computer Science Foundation for Research and Technology - Hellas N.
SECURE APPLICATION DEVELOPMENT CODING POLICY OCIO-6013-09 TABLE OF CONTENTS
OFFICE OF THE CHIEF INFORMATION OFFICER OCIO-6013-09 Date of Issuance: May 22, 2009 Effective Date: May 22, 2009 Review Date: TABLE OF CONTENTS Section I. PURPOSE II. AUTHORITY III. SCOPE IV. DEFINITIONS
LASTLINE WHITEPAPER. Using Passive DNS Analysis to Automatically Detect Malicious Domains
LASTLINE WHITEPAPER Using Passive DNS Analysis to Automatically Detect Malicious Domains Abstract The domain name service (DNS) plays an important role in the operation of the Internet, providing a two-way
Web Application Guidelines
Web Application Guidelines Web applications have become one of the most important topics in the security field. This is for several reasons: It can be simple for anyone to create working code without security
Adobe Systems Incorporated
Adobe Connect 9.2 Page 1 of 8 Adobe Systems Incorporated Adobe Connect 9.2 Hosted Solution June 20 th 2014 Adobe Connect 9.2 Page 2 of 8 Table of Contents Engagement Overview... 3 About Connect 9.2...
Advanced Web Security, Lab
Advanced Web Security, Lab Web Server Security: Attacking and Defending November 13, 2013 Read this earlier than one day before the lab! Note that you will not have any internet access during the lab,
SQL INJECTION ATTACKS By Zelinski Radu, Technical University of Moldova
SQL INJECTION ATTACKS By Zelinski Radu, Technical University of Moldova Where someone is building a Web application, often he need to use databases to store information, or to manage user accounts. And
ArcGIS Server Security Threats & Best Practices 2014. David Cordes Michael Young
ArcGIS Server Security Threats & Best Practices 2014 David Cordes Michael Young Agenda Introduction Threats Best practice - ArcGIS Server settings - Infrastructure settings - Processes Summary Introduction
LASTLINE WHITEPAPER. Large-Scale Detection of Malicious Web Pages
LASTLINE WHITEPAPER Large-Scale Detection of Malicious Web Pages Abstract Malicious web pages that host drive-by-download exploits have become a popular means for compromising hosts on the Internet and,
Application Security Testing. Erez Metula (CISSP), Founder Application Security Expert [email protected]
Application Security Testing Erez Metula (CISSP), Founder Application Security Expert [email protected] Agenda The most common security vulnerabilities you should test for Understanding the problems
Rational AppScan & Ounce Products
IBM Software Group Rational AppScan & Ounce Products Presenters Tony Sisson and Frank Sassano 2007 IBM Corporation IBM Software Group The Alarming Truth CheckFree warns 5 million customers after hack http://infosecurity.us/?p=5168
Enhanced Model of SQL Injection Detecting and Prevention
Enhanced Model of SQL Injection Detecting and Prevention Srinivas Baggam, Assistant Professor, Department of Computer Science and Engineering, MVGR College of Engineering, Vizianagaram, India. [email protected]
Network Monitoring using MMT:
Network Monitoring using MMT: An application based on the User-Agent field in HTTP headers Vinh Hoa LA Ɨ Raul FUENTES Ɨ PhD Student Prof. Ana CAVALLI Ɨ Ƭ Supervisor Ɨ Telecom SudParis, IMT Ƭ Montimage
Still Aren't Doing. Frank Kim
Ten Things Web Developers Still Aren't Doing Frank Kim Think Security Consulting Background Frank Kim Consultant, Think Security Consulting Security in the SDLC SANS Author & Instructor DEV541 Secure Coding
Email Spam Detection Using Customized SimHash Function
International Journal of Research Studies in Computer Science and Engineering (IJRSCSE) Volume 1, Issue 8, December 2014, PP 35-40 ISSN 2349-4840 (Print) & ISSN 2349-4859 (Online) www.arcjournals.org Email
Advancements in Botnet Attacks and Malware Distribution
Advancements in Botnet Attacks and Malware Distribution HOPE Conference, New York, July 2012 Aditya K Sood Rohit Bansal Richard J Enbody SecNiche Security Department of Computer Science and Engineering
Detecting Web Application Vulnerabilities Using Open Source Means. OWASP 3rd Free / Libre / Open Source Software (FLOSS) Conference 27/5/2008
Detecting Web Application Vulnerabilities Using Open Source Means OWASP 3rd Free / Libre / Open Source Software (FLOSS) Conference 27/5/2008 Kostas Papapanagiotou Committee Member OWASP Greek Chapter [email protected]
EECS 398 Project 2: Classic Web Vulnerabilities
EECS 398 Project 2: Classic Web Vulnerabilities Revision History 3.0 (October 27, 2009) Revise CSRF attacks 1 and 2 to make them possible to complete within the constraints of the project. Clarify that
Threat Modeling/ Security Testing. Tarun Banga, Adobe 1. Agenda
Threat Modeling/ Security Testing Presented by: Tarun Banga Sr. Manager Quality Engineering, Adobe Quality Leader (India) Adobe Systems India Pvt. Ltd. Agenda Security Principles Why Security Testing Security
Development and Industrial Application of Multi-Domain Security Testing Technologies. Innovation Sheet Model Inference Assisted Evolutionary Fuzzing
Development and Industrial Application of Multi-Domain Security Testing Technologies Innovation Sheet Model Inference Assisted Evolutionary Fuzzing Description The technique dynamically analyzes the application
Enterprise Application Security Workshop Series
Enterprise Application Security Workshop Series Phone 877-697-2434 fax 877-697-2434 www.thesagegrp.com Defending JAVA Applications (3 Days) In The Sage Group s Defending JAVA Applications workshop, participants
OWASP Top Ten Tools and Tactics
OWASP Top Ten Tools and Tactics Russ McRee Copyright 2012 HolisticInfoSec.org SANSFIRE 2012 10 JULY Welcome Manager, Security Analytics for Microsoft Online Services Security & Compliance Writer (toolsmith),
External Vulnerability Assessment. -Technical Summary- ABC ORGANIZATION
External Vulnerability Assessment -Technical Summary- Prepared for: ABC ORGANIZATI On March 9, 2008 Prepared by: AOS Security Solutions 1 of 13 Table of Contents Executive Summary... 3 Discovered Security
Cross-site site Scripting Attacks on Android WebView
IJCSN International Journal of Computer Science and Network, Vol 2, Issue 2, April 2013 1 Cross-site site Scripting Attacks on Android WebView 1 Bhavani A B 1 Hyderabad, Andhra Pradesh-500050, India Abstract
Preparing for the Cross Site Request Forgery Defense
Preparing for the Cross Site Request Forgery Defense Chuck Willis [email protected] Black Hat DC 2008 February 20, 2008 About Me Principal Consultant with MANDIANT in Alexandria, VA Full spectrum
Study of Cross-Site Scripting Attacks and Their Countermeasures
Study of Cross-Site Scripting Attacks and Their Countermeasures Gurvinder Kaur University Institute of Engineering and Technology Kurukshetra University India Abstract: - In present-day time, most of the
Cyber Security Workshop Ethical Web Hacking
Cyber Security Workshop Ethical Web Hacking May 2015 Setting up WebGoat and Burp Suite Hacking Challenges in WebGoat Concepts in Web Technologies and Ethical Hacking 1 P a g e Downloading WebGoat and Burp
