Document Structure Integrity: A Robust Basis for Cross-Site Scripting Defense
|
|
|
- Solomon Adams
- 9 years ago
- Views:
Transcription
1 Document Structure Integrity: A Robust Basis for Cross-Site Scripting Defense Yacin Nadji Illinois Institute Of Technology Prateek Saxena UC Berkeley Dawn Song UC Berkeley 1
2 A Cross-Site Scripting Attack Hi Joe, <img src= > <script src= > Cookies, Password Policy: ALLOW {a, img, } Hi Joe, <img src= > <script src= > 2
3 Limitations of Server-side Sanitization <IMG SRC="javascript:alert('XSS') > <IMG SRC=JaVaScRiPt:alert('XSS')> <IMG SRC=java scrip 16;:aler& #116;('XSS&# 39;)> Cookies, Password Policy: ALLOW {a, img, } Hi Joe, <img src= > 3
4 Limitations of Server-side Sanitization Over 90 ways to inject JS [RSnake07] Multiple Languages» JS, Flash, CSS, XUL, VBScript Cookies, Password Hi Joe, <img src= > 4
5 A Different Approach Previous defenses: XSS is a sanitization problem Our view: XSS is a document structure integrity problem IMG IMG SRC SRC javascript: String 5
6 Concept of Document Structure div id STATIC DOCUMENT STRUCTURE div id DYNAMIC DOCUMENT STRUCTURE Joe; online Joe; online document.write() JAVASCRIPT DOCUMENT STRUCTURE 6
7 Document Structure Integrity (DSI) Definition: Given a server s policy P, Restrict untrusted content to allowable syntactic elements Policy in terms of client-side languages Central idea for DSI enforcement Dynamic information flow tracking (server & browser) Policy based parser-level confinement Default policy: Only leaf nodes untrusted 7
8 Talk Outline Power of DSI Defense: Examples Design Goals Architecture Implementation Evaluation Conclusion & Related Work 8
9 Talk Outline Power of DSI Defense: Examples Design Goals Architecture Implementation Evaluation Conclusion & Related Work 9
10 DSI Defense: A Powerful Approach DSI enforcement prevents Not just cookie-theft» Form injection for phishing [Netcraft08]» Profile Worms [Samy05, Yammaner06]» Web site defacement through XSS DOM-Based XSS (Attacks on client-side languages) Vulnerabilities due to browser-server inconsistency 10
11 Example 1: DOM-Based XSS DOM-based client-side XSS [Klein05] <div id= Joe; online > <div id= Joe; online > div + id Joe; online Joe online JAVASCRIPT DYNAMIC UPDATE 11
12 Example 1: DOM-Based XSS DOM-based client-side XSS [Klein05] <div id= Devil; <script>..</script> > <div id= Devil; <script>..</script> > JAVASCRIPT 12
13 Example 1: DOM-Based XSS DOM-based client-side XSS [Klein05] <div id= Devil; <script>..</script> > <div id= Devil; <script>..</script> > Devil script JAVASCRIPT.. DYNAMIC UPDATE 13
14 Example 2: Inconsistency Bugs Browser-Server Inconsistency Bugs IMG ONLOAD alert (1) <img onload=alert(1)> <img onload:=alert(1)> IMG onload:=alert(1) <img onload:=alert(1)> Assumed Parse Tree 14
15 Talk Outline Defense in Depth: Examples Design Goals Architecture Implementation Evaluation Conclusion & Related Work 15
16 Design Goals Clear separation between policy and mechanism No dependence on sanitization No changes to web application code Minimize false positives Minimizes impact to backwards compatibility Robustness Address static & dynamic integrity attacks Defeat adaptive adversaries 16
17 Mechanisms Client-server architecture Server Step 1: Identify trust boundaries in HTML response Step 2: Serialize» Encoding data & trust boundaries in HTML Client Step 3: De-serialize» Initialize HTTP response page into static document structure Step 4: Dynamic information flow tracking» Modified semantics of client-side interpretation 17
18 Talk Outline Defense in Depth: Examples Design Goals Architecture Implementation Evaluation Conclusion & Related Work 18
19 Approach Overview: Static DSI SERIALIZER DE-SERIALIZER <img src= > <script src= > <a href = > [[<img src= > <script src= >]] <a href = > img script SERVER P BROWSER 19
20 Approach Overview: Dynamic DSI SERIALIZER DE-SERIALIZER TAINT TRACKING <div id= Devil; <script>..</scri pt> > <div id= [[Devil; <script>..</scrip t>]] > div id Devil;<script>.. </script> SERVER BROWSER 20
21 Approach Overview: Dynamic DSI (II) SERIALIZER DE-SERIALIZER TAINT TRACKING <div id= Devil; <script>..</scri pt> > <div id= [[Devil; <script>..</scrip t>]] > id Devil script.. SERVER BROWSER 21
22 Serialization Design: Key Challenge Safety against an adaptive adversary <CONFINE> USER BLOG </CONFINE> <CONFINE> </CONFINE> <script> </script> </CONFINE> </CONFINE> 22
23 Serialization: Key Challenge Do not rely on sanitization <CONFINE ID= N5 ></CONFINE> <SCRIPT> document.getelementbyid( N5 ).innerhtml = USER BLOG What to disallow? ; </SCRIPT> 23
24 Serialization Design: Key Challenge Attack on sanitization mechanism for JS strings <CONFINE ID= N5 ></CONFINE> <SCRIPT> document.getelementbyid( N5 ).innerhtml = </SCRIPT> <SCRIPT> Attack ; </SCRIPT> 24
25 Markup Randomization Markup Randomization Mechanism independent of the policy Does not depend on any sanitization R [[00101 R ]]00101 Valid Nonces: 00101,11010,01110 Policy: ALLOW {a, a@aref... } 25
26 Markup Randomization Markup Randomization Mechanism independent of the policy Does not depend on any sanitization [[00101 R ]]00101 Valid Nonces: 00101,11010,01110 Policy: ALLOW {a, a@aref} [[00101 R ]]00101 OK! 26
27 Markup Randomization Markup Randomization Mechanism independent of the policy Does not depend on any sanitization [[00101 R ]]00101 Valid Nonces: 00101,11010,01110 Policy: ALLOW {a, a@aref} [[00101 R ]]
28 Browser-side Taint Tracking Dynamic DSI Client Language Interpreters enhanced Ubiquitous tracking of untrusted data in the browser 28
29 Talk Outline Advantages of DSI in Attack Coverage Design Goals Architecture Implementation Evaluation Conclusion & Related Work 29
30 Implementation Full Prototype Implementation DSI-enable server Utilized existing taint tracking in PHP [IBM07] DSI-compliant browser Implemented in KDE Konqueror Client side taint tracking in JS interpreter of KDE
31 You are 0wned! 31
32 In a DSI-compliant Browser <script>alert(document.cookie)</script> 32
33 Talk Outline Advantages of DSI in Attack Coverage Design Goals Architecture Implementation Evaluation Conclusion & Related Work 33
34 Evaluation: Attack Detection Stored XSS attacks Vulnerable phpbb forum application 25 public attack vectors [RSnake07] 30 benign posts Results 100% attack prevention No changes required to the application No false positives 34
35 Evaluation: Real-World XSS Attacks 5,328 real-world vulnerabilities [xssed.com] 500 most popular benign web sites [alexa.com] Default Policy: Coerce untrusted data to leaf nodes Results 98.4% attack prevention False Negatives:» Due to exact string matching in instrumentation False Positives: 1%» Due to instrumentation for tainting (<title> on Slashdot) 35
36 Evaluation: Performance Browser Overhead 1.8% Server overhead 1-3% Static page size increase 1.1% 36
37 Related Work Client-server Approaches» BEEP [Jim07]» <jail> [Eich07]» Hypertext Isolation [Louw08] Client-side approaches» IE 8 Beta XSS Filter [IE8Blog]» Client-side Firewalls [Kirda06]» Sensitive Info. Flow Tracking [Vogt07] Server-side approaches» Server-side taint-based defenses [Xu06, Nan07, Ngu05, Pie04]» XSS-Guard [Bisht08]» Program Analysis for XSS vulnerabilities [Balz08, Mar05, Mar08, Jov06, Hua04] 37
38 Conclusion DSI: A fundamental integrity property for web applications XSS as a DSI violation Multifaceted Approach Clearly separates mechanism and policy Defeats adaptive adversaries Markup randomization Evaluation on a large real-world dataset Low performance overhead No web application code changes No false positives with configurable policies 38
39 Questions Thank you! 39
40 Client-Side Proxy user=joe Hi [[Joe]]! Hi Joe! 40
41 Markup Randomization: Adaptive Attacks Multiple valid parse trees [[ N1 [[ N3 ]] N1 [[ N2 ]] N3 ]] N2 [[ N1 [[ N3 ]] N1 [[ N2 ]] N3 ]] N2 OR [[ N1 [[ N3 ]] N1 [[ N2 ]] N3 ]] N2 41
42 Attack Coverage (II): Inconsistency Bugs Browser-Server Inconsistency Bugs Inconsistency Bugs Browser Processing Server Processing 42
XSS-GUARD : Precise Dynamic Prevention of Cross Site Scripting (XSS) Attacks
XSS-GUARD : Precise Dynamic Prevention of Cross Site Scripting (XSS) Attacks Prithvi Bisht (http://cs.uic.edu/~pbisht) Joint work with : V.N. Venkatakrishnan Systems and Internet Security Laboratory Department
Cross Site Scripting Prevention
Project Report CS 649 : Network Security Cross Site Scripting Prevention Under Guidance of Prof. Bernard Menezes Submitted By Neelamadhav (09305045) Raju Chinthala (09305056) Kiran Akipogu (09305074) Vijaya
A Tale of the Weaknesses of Current Client-side XSS Filtering
A Tale of the Weaknesses of Current Client-side XSS Filtering Sebastian Lekies (@sebastianlekies), Ben Stock (@kcotsneb) and Martin Johns (@datenkeller) Attention hackers! These slides are preliminary!
Protection, Usability and Improvements in Reflected XSS Filters
Protection, Usability and Improvements in Reflected XSS Filters Riccardo Pelizzi System Security Lab Department of Computer Science Stony Brook University May 2, 2012 1 / 19 Riccardo Pelizzi Improvements
CSE598i - Web 2.0 Security OWASP Top 10: The Ten Most Critical Web Application Security Vulnerabilities
CSE598i - Web 2.0 Security OWASP Top 10: The Ten Most Critical Web Application Security Vulnerabilities Thomas Moyer Spring 2010 1 Web Applications What has changed with web applications? Traditional applications
XSS-GUARD: Precise Dynamic Prevention of Cross-Site Scripting Attacks
XSS-GUARD: Precise Dynamic Prevention of Cross-Site Scripting Attacks Prithvi Bisht and V.N. Venkatakrishnan Systems and Internet Security Lab, Department of Computer Science, University of Illinois, Chicago
Cross Site Scripting (XSS) and PHP Security. Anthony Ferrara NYPHP and OWASP Security Series June 30, 2011
Cross Site Scripting (XSS) and PHP Security Anthony Ferrara NYPHP and OWASP Security Series June 30, 2011 What Is Cross Site Scripting? Injecting Scripts Into Otherwise Benign and Trusted Browser Rendered
Cross-Site Scripting
Cross-Site Scripting (XSS) Computer and Network Security Seminar Fabrice Bodmer ([email protected]) UNIFR - Winter Semester 2006-2007 XSS: Table of contents What is Cross-Site Scripting (XSS)? Some
A Tale of the Weaknesses of Current Client-Side XSS Filtering
Call To Arms: A Tale of the Weaknesses of Current Client-Side XSS Filtering Martin Johns, Ben Stock, Sebastian Lekies About us Martin Johns, Ben Stock, Sebastian Lekies Security Researchers at SAP, Uni
Acunetix Website Audit. 5 November, 2014. Developer Report. Generated by Acunetix WVS Reporter (v8.0 Build 20120808)
Acunetix Website Audit 5 November, 2014 Developer Report Generated by Acunetix WVS Reporter (v8.0 Build 20120808) Scan of http://filesbi.go.id:80/ Scan details Scan information Starttime 05/11/2014 14:44:06
Web-Application Security
Web-Application Security Kristian Beilke Arbeitsgruppe Sichere Identität Fachbereich Mathematik und Informatik Freie Universität Berlin 29. Juni 2011 Overview Web Applications SQL Injection XSS Bad Practice
What about MongoDB? can req.body.input 0; var date = new Date(); do {curdate = new Date();} while(curdate-date<10000)
Security What about MongoDB? Even though MongoDB doesn t use SQL, it can be vulnerable to injection attacks db.collection.find( {active: true, $where: function() { return obj.credits - obj.debits < req.body.input;
Attacks on Clients: Dynamic Content & XSS
Software and Web Security 2 Attacks on Clients: Dynamic Content & XSS (Section 7.1.3 on JavaScript; 7.2.4 on Media content; 7.2.6 on XSS) sws2 1 Recap from last lecture Attacks on web server: attacker/client
Blackbox Reversing of XSS Filters
Blackbox Reversing of XSS Filters Alexander Sotirov [email protected] Introduction Web applications are the future Reversing web apps blackbox reversing very different environment and tools Cross-site scripting
EVALUATING COMMERCIAL WEB APPLICATION SECURITY. By Aaron Parke
EVALUATING COMMERCIAL WEB APPLICATION SECURITY By Aaron Parke Outline Project background What and why? Targeted sites Testing process Burp s findings Technical talk My findings and thoughts Questions Project
25 Million Flows Later - Large-scale Detection of DOM-based XSS
25 Million Flows Later - Large-scale Detection of DOM-based XSS Sebastian Lekies SAP AG [email protected] Ben Stock FAU Erlangen-Nuremberg [email protected] Martin Johns SAP AG [email protected]
Robust Defence against XSS through Context Free Grammar
Robust Defence against XSS through Context Free Grammar 1 Divya Rishi Sahu, 2 Deepak Singh Tomar 1,2 Dept. of CSE, MANIT, Bhopal, MP, India Abstract JavaScript is one of the world s most widely adopted
Finding Your Way in Testing Jungle. A Learning Approach to Web Security Testing.
Finding Your Way in Testing Jungle A Learning Approach to Web Security Testing. Research Questions Why is it important to improve website security? What techniques are already in place to test security?
Bug Report. Date: March 19, 2011 Reporter: Chris Jarabek ([email protected])
Bug Report Date: March 19, 2011 Reporter: Chris Jarabek ([email protected]) Software: Kimai Version: 0.9.1.1205 Website: http://www.kimai.org Description: Kimai is a web based time-tracking application.
Security Model for the Client-Side Web Application Environments
Security Model for the Client-Side Web Application Environments May 24, 2007 Sachiko Yoshihama, Naohiko Uramoto, Satoshi Makino, Ai Ishida, Shinya Kawanaka, and Frederik De Keukelaere IBM Tokyo Research
Advanced XSS. Nicolas Golubovic
Advanced XSS Nicolas Golubovic Image courtesy of chanpipat / FreeDigitalPhotos.net Today's menu 1. Starter: reboiled XSS 2. Course: spicy blacklists & filters 3. Course: sweet content sniffing 4. Course:
Finding XSS in Real World
Finding XSS in Real World by Alexander Korznikov [email protected] 1 April 2015 Hi there, in this tutorial, I will try to explain how to find XSS in real world, using some interesting techniques. All
HOD of Dept. of CSE & IT. Asst. Prof., Dept. Of CSE AIET, Lko, India. AIET, Lko, India
Volume 5, Issue 12, December 2015 ISSN: 2277 128X International Journal of Advanced Research in Computer Science and Software Engineering Research Paper Available online at: www.ijarcsse.com Investigation
Web Application Guidelines
Web Application Guidelines Web applications have become one of the most important topics in the security field. This is for several reasons: It can be simple for anyone to create working code without security
Check list for web developers
Check list for web developers Requirement Yes No Remarks 1. Input Validation 1.1) Have you done input validation for all the user inputs using white listing and/or sanitization? 1.2) Does the input validation
A Server and Browser-Transparent CSRF Defense for Web 2.0 Applications. Slides by Connor Schnaith
A Server and Browser-Transparent CSRF Defense for Web 2.0 Applications Slides by Connor Schnaith Cross-Site Request Forgery One-click attack, session riding Recorded since 2001 Fourth out of top 25 most
Client vs. Server Implementations of Mitigating XSS Security Threats on Web Applications
Journal of Basic and Applied Engineering Research pp. 50-54 Krishi Sanskriti Publications http://www.krishisanskriti.org/jbaer.html Client vs. Server Implementations of Mitigating XSS Security Threats
Project 2: Web Security Pitfalls
EECS 388 September 19, 2014 Intro to Computer Security Project 2: Web Security Pitfalls Project 2: Web Security Pitfalls This project is due on Thursday, October 9 at 6 p.m. and counts for 8% of your course
Universal XSS via IE8s XSS Filters
Universal XSS via IE8s XSS Filters the sordid tale of a wayward hash sign slides: http://p42.us/ie8xss/ About Us Eduardo Vela Nava aka sirdarckcat http://sirdarckcat.net http://twitter.com/sirdarckcat
End-to-end Web Application Security
End-to-end Web Application Security Úlfar Erlingsson Benjamin Livshits Microsoft Research Yinglian Xie Abstract Web applications are important, ubiquitous distributed systems whose current security relies
Cross Site Scripting (XSS) Exploits & Defenses. OWASP Denver, Colorado USA. The OWASP Foundation. David Campbell Eric Duprey. http://www.owasp.
Cross Site Scripting (XSS) Exploits & Defenses Denver, Colorado USA David Campbell Eric Duprey Copyright 2007 The Foundation Permission is granted to copy, distribute and/or modify this document under
Hunting Cross-Site Scripting Attacks in the Network
Hunting Cross-Site Scripting Attacks in the Network Elias Athanasopoulos, Antonis Krithinakis, and Evangelos P. Markatos Institute of Computer Science Foundation for Research and Technology - Hellas N.
Uploaded images filter evasion for carrying out XSS attacks
February 25, 2007 Uploaded images filter evasion for carrying out XSS attacks Digitаl Security Research Group (DSecRG) Alexander Polyakov [email protected] http://dsecrg.ru Table of contents Introduction...3
Recommended Practice Case Study: Cross-Site Scripting. February 2007
Recommended Practice Case Study: Cross-Site Scripting February 2007 iii ACKNOWLEDGEMENT This document was developed for the U.S. Department of Homeland Security to provide guidance for control system cyber
HTTPParameter Pollution. ChrysostomosDaniel
HTTPParameter Pollution ChrysostomosDaniel Introduction Nowadays, many components from web applications are commonly run on the user s computer (such as Javascript), and not just on the application s provider
Reliable Mitigation of DOM-based XSS
Intro XSS Implementation Evaluation Q&A Reliable Mitigation of DOM-based XSS Tobias Mueller 2014-09-07 1 / 39 Intro XSS Implementation Evaluation Q&A About me The results Motivation about:me MSc. cand.
Exploitation of Cross-Site Scripting (XSS) Vulnerability on Real World Web Applications and its Defense
Exploitation of Cross-Site Scripting (XSS) Vulnerability on Real World Web Applications and its Defense Shashank Gupta Lecturer in Department of Information Technology, Model Institute of Engineering and
Network Security Web Security
Network Security Web Security Anna Sperotto, Ramin Sadre Design and Analysis of Communication Systems Group University of Twente, 2012 Cross Site Scripting Cross Side Scripting (XSS) XSS is a case of (HTML)
An Empirical Analysis of XSS Sanitization in Web Application Frameworks
An Empirical Analysis of XSS Sanitization in Web Application Frameworks Joel Weinberger Prateek Saxena Devdatta Akhawe Matthew Finifter Richard Shin Dawn Song Electrical Engineering and Computer Sciences
What is Web Security? Motivation
[email protected] http://www.brucker.ch/ Information Security ETH Zürich Zürich, Switzerland Information Security Fundamentals March 23, 2004 The End Users View The Server Providers View What is Web
Chapter 1 Web Application (In)security 1
Introduction xxiii Chapter 1 Web Application (In)security 1 The Evolution of Web Applications 2 Common Web Application Functions 4 Benefits of Web Applications 5 Web Application Security 6 "This Site Is
Chapter 4: Networking and the Internet
Chapter 4: Networking and the Internet Computer Science: An Overview Eleventh Edition by J. Glenn Brookshear Copyright 2012 Pearson Education, Inc. Chapter 4: Networking and the Internet 4.1 Network Fundamentals
Web Application Security
Web Application Security John Zaharopoulos ITS - Security 10/9/2012 1 Web App Security Trends Web 2.0 Dynamic Webpages Growth of Ajax / Client side Javascript Hardening of OSes Secure by default Auto-patching
An Efficient Black-box Technique for Defeating Web Application Attacks
2/9/2009 An Efficient Black-box Technique for Defeating Web Application Attacks R. Sekar Stony Brook University (Research supported by DARPA, NSF and ONR) Example: SquirrelMail Command Injection Attack:
Complete Cross-site Scripting Walkthrough
Complete Cross-site Scripting Walkthrough Author : Ahmed Elhady Mohamed Email : [email protected] website: www.infosec4all.tk blog : www.1nfosec4all.blogspot.com/ [+] Introduction wikipedia
Defending against XSS,CSRF, and Clickjacking David Bishop
Defending against XSS,CSRF, and Clickjacking David Bishop University of Tennessee Chattanooga ABSTRACT Whenever a person visits a website, they are running the risk of falling prey to multiple types of
Detection of DOM-based Cross-Site Scripting by Analyzing Dynamically Extracted Scripts
Detection of DOM-based Cross-Site Scripting by Analyzing Dynamically Extracted Scripts Suman Saha 1, Shizhen Jin 2,3 and Kyung-Goo Doh 3 1 LIP6-Regal, France [email protected] 2 GTOne, Seoul, Korea [email protected]
(WAPT) Web Application Penetration Testing
(WAPT) Web Application Penetration Testing Module 0: Introduction 1. Introduction to the course. 2. How to get most out of the course 3. Resources you will need for the course 4. What is WAPT? Module 1:
Is Drupal secure? A high-level perspective on web vulnerabilities, Drupal s solutions, and how to maintain site security
Is Drupal secure? A high-level perspective on web vulnerabilities, Drupal s solutions, and how to maintain site security Presented 2009-05-29 by David Strauss Thinking Securely Security is a process, not
Security Research Advisory IBM inotes 9 Active Content Filtering Bypass
Security Research Advisory IBM inotes 9 Active Content Filtering Bypass Table of Contents SUMMARY 3 VULNERABILITY DETAILS 3 TECHNICAL DETAILS 4 LEGAL NOTICES 7 Active Content Filtering Bypass Advisory
CS 558 Internet Systems and Technologies
CS 558 Internet Systems and Technologies Dimitris Deyannis [email protected] 881 Heat seeking Honeypots: Design and Experience Abstract Compromised Web servers are used to perform many malicious activities.
Relax Everybody: HTML5 Is Securer Than You Think
Relax Everybody: HTML5 Is Securer Than You Think Martin Johns (@datenkeller) SAP AG Session ID: ADS-W08 Session Classification: Advanced Motivation For some reason, there is a preconception that HTML5
Secure Coding. External App Integrations. Tim Bach Product Security Engineer salesforce.com. Astha Singhal Product Security Engineer salesforce.
Secure Coding External App Integrations Astha Singhal Product Security Engineer salesforce.com Tim Bach Product Security Engineer salesforce.com Safe Harbor Safe harbor statement under the Private Securities
Introduction to Computer Security
Introduction to Computer Security Web Application Security Pavel Laskov Wilhelm Schickard Institute for Computer Science Modern threat landscape The majority of modern vulnerabilities are found in web
Cross Site Scripting in Joomla Acajoom Component
Whitepaper Cross Site Scripting in Joomla Acajoom Component Vandan Joshi December 2011 TABLE OF CONTENTS Abstract... 3 Introduction... 3 A Likely Scenario... 5 The Exploit... 9 The Impact... 12 Recommended
Securing Server/Client side Applications against XSS attack via XSS-Obliterator
Securing Server/Client side Applications against XSS attack via XSS-Obliterator Amit Singh #1, Suraj Singh Tomer *2 Mtech Computer Science Engineering, RGPV Airport Bypass Road, Gandhi Nagar, Bhopal, Madhya
Analysis of Browser Defenses against XSS Attack Vectors
Analysis of Browser Defenses against XSS Attack Vectors Shital Dhamal Department of Computer Engineering Lokmanya Tilak College of Engineering Koparkhairne,Navi Mumbai,Maharashtra,India Manisha Mathur
Precise client-side protection against DOM-based Cross-Site Scripting
Precise client-side protection against DOM-based Cross-Site Scripting Ben Stock FAU Erlangen-Nuremberg [email protected] Patrick Spiegel SAP AG [email protected] Sebastian Lekies SAP AG [email protected]
Short notes on webpage programming languages
Short notes on webpage programming languages What is HTML? HTML is a language for describing web pages. HTML stands for Hyper Text Markup Language HTML is a markup language A markup language is a set of
External Network & Web Application Assessment. For The XXX Group LLC October 2012
External Network & Web Application Assessment For The XXX Group LLC October 2012 This report is solely for the use of client personal. No part of it may be circulated, quoted, or reproduced for distribution
Creating Stronger, Safer, Web Facing Code. JPL IT Security Mary Rivera June 17, 2011
Creating Stronger, Safer, Web Facing Code JPL IT Security Mary Rivera June 17, 2011 Agenda Evolving Threats Operating System Application User Generated Content JPL s Application Security Program Securing
Sichere Webanwendungen mit Java
Sichere Webanwendungen mit Java Karlsruher IT- Sicherheitsinitiative 16.07.2015 Dominik Schadow bridgingit Patch fast Unsafe platform unsafe web application Now lets have a look at the developers OWASP
A Multi agent Scanner to Detect Stored XSS Vulnerabilities
A Multi agent Scanner to Detect Stored XSS Vulnerabilities E. Galán, A. Alcaide, A. Orfila, J. Blasco University Carlos III of Madrid, UC3M Leganés, Spain {edgalan,aalcaide,adiaz,jbalis}@inf.uc3m.es Abstract
Analysis and Enforcement of Web Application Security Policies
Analysis and Enforcement of Web Application Security Policies Joel Weinberger Electrical Engineering and Computer Sciences University of California at Berkeley Technical Report No. UCB/EECS-2012-232 http://www.eecs.berkeley.edu/pubs/techrpts/2012/eecs-2012-232.html
1. Introduction. 2. Web Application. 3. Components. 4. Common Vulnerabilities. 5. Improving security in Web applications
1. Introduction 2. Web Application 3. Components 4. Common Vulnerabilities 5. Improving security in Web applications 2 What does World Wide Web security mean? Webmasters=> confidence that their site won
A Survey on Threats and Vulnerabilities of Web Services
A Survey on Threats and Vulnerabilities of Web Services A Thesis submitted in partial fulfillment of the requirements for the degree of Master of Computer Science and Engineering of Jadavpur University
Web and Email Security 1 / 40
Web and 1 / 40 Untrusted Clients Repeat: Untrusted Clients Server-Side Storage Cryptographic Sealing Hidden Values Cookies Protecting Data Sidebar: Cookies and JavaScript Cross-Site Scripting (XSS) Why
Institutionen för datavetenskap
Institutionen för datavetenskap Department of Computer and Information Science Final thesis Generating web applications containing XSS and CSRF vulnerabilities by Gustav Ahlberg LIU-IDA/LITH-EX-A--14/054--SE
L-WMxD: Lexical based Webmail XSS Discoverer
The First International Workshop on Security in Computers, Networking and Communications LWMxD: Lexical based Webmail XSS Discoverer Zhushou Tang, Haojin Zhu, Zhenfu Cao, Shuai Zhao Department of Computer
AJAX and JSON Lessons Learned. Jim Riecken, Senior Software Engineer, Blackboard Inc.
AJAX and JSON Lessons Learned Jim Riecken, Senior Software Engineer, Blackboard Inc. About Me Jim Riecken Senior Software Engineer At Blackboard for 4 years. Work out of the Vancouver office. Working a
SQL INJECTION IN MYSQL
SQL INJECTION IN MYSQL WHAT IS SQL? SQL (pronounced "ess-que-el") stands for Structured Query Language. SQL is used to communicate with a database. extracted from http://www.sqlcourse.com/intro.html SELECT
Webapps Vulnerability Report
Tuesday, May 1, 2012 Webapps Vulnerability Report Introduction This report provides detailed information of every vulnerability that was found and successfully exploited by CORE Impact Professional during
WEB ATTACKS AND COUNTERMEASURES
WEB ATTACKS AND COUNTERMEASURES February 2008 The Government of the Hong Kong Special Administrative Region The contents of this document remain the property of, and may not be reproduced in whole or in
Intrusion detection for web applications
Intrusion detection for web applications Intrusion detection for web applications Łukasz Pilorz Application Security Team, Allegro.pl Reasons for using IDS solutions known weaknesses and vulnerabilities
Protecting cookies against Cross-site scripting attacks using cryptography
Protecting cookies against Cross-site scripting attacks using cryptography S. MOHAMMADI FARHAD KOOHBOR Department of Industrial Engineering, K.N. Toosi University of Technology, Tehran, Iran Department
Toward A Taxonomy of Techniques to Detect Cross-site Scripting and SQL Injection Vulnerabilities
NCSU CSC TR 2008-4 1 Toward A Taxonomy of Techniques to Detect Cross-site Scripting and SQL Injection Vulnerabilities Yonghee SHIN, Laurie WILLIAMS, Members, IEEE Abstract Since 2002, over half of reported
Preparing for the Cross Site Request Forgery Defense
Preparing for the Cross Site Request Forgery Defense Chuck Willis [email protected] Black Hat DC 2008 February 20, 2008 About Me Principal Consultant with MANDIANT in Alexandria, VA Full spectrum
XSS PROTECTION CHEATSHEET FOR DEVELOPERS V1.0. Author of OWASP Xenotix XSS Exploit Framework opensecurity.in
THE ULTIMATE XSS PROTECTION CHEATSHEET FOR DEVELOPERS V1.0 Ajin Abraham Author of OWASP Xenotix XSS Exploit Framework opensecurity.in The quick guide for developers to protect their web applications from
PathCutter: Severing the Self-Propagation Path of XSS JavaScript Worms in Social Web Networks
PathCutter: Severing the Self-Propagation Path of XSS JavaScript Worms in Social Web Networks Yinzhi Cao, Vinod Yegneswaran, Phillip Porras, and Yan Chen [email protected], {vinod, porras}@csl.sri.com,
CROSS-SITE SCRIPTING BROWSERS PROTECTION ANALYSIS
STUDIA UNIV. BABEŞ BOLYAI, INFORMATICA, Volume LVII, Number 4, 2012 CROSS-SITE SCRIPTING BROWSERS PROTECTION ANALYSIS ADRIANA NEAGOŞ AND SIMONA MOTOGNA Abstract. The purpose of this paper is to present
Client-Side Cross-Site Scripting Protection
Client-Side Cross-Site Scripting Protection Engin Kirda, Nenad Jovanovic, Christopher Kruegel, and Giovanni Vigna Institute Eurecom [email protected] Secure Systems Lab Technical University Vienna [email protected]
Revisiting XSS Sanitization
Revisiting XSS Sanitization Ashar Javed Chair for Network and Data Security Horst Görtz Institute for IT-Security, Ruhr-University Bochum [email protected] Abstract. Cross-Site Scripting (XSS) around
Ruby on Rails Secure Coding Recommendations
Introduction Altius IT s list of Ruby on Rails Secure Coding Recommendations is based upon security best practices. This list may not be complete and Altius IT recommends this list be augmented with additional
Study of Cross-Site Scripting Attacks and Their Countermeasures
Study of Cross-Site Scripting Attacks and Their Countermeasures Gurvinder Kaur University Institute of Engineering and Technology Kurukshetra University India Abstract: - In present-day time, most of the
Advanced Security for Systems Engineering VO 01: Web Application Security
Advanced Security for Systems Engineering VO 01: Web Application Security Stefan Taber, Christian Schanes INSO Industrial Software Institute of Computer Aided Automation Faculty of Informatics TU Wien
A Survey on Web Application Security
A Survey on Web Application Security Xiaowei Li and Yuan Xue Department of Electrical Engineering and Computer Science Vanderbilt University xiaowei.li, [email protected] Abstract Web applications
A tale of the weaknesses of current client-side XSS filtering
A tale of the weaknesses of current client-side XSS filtering Sebastian Lekies SAP AG [email protected] @sebastianlekies Martin Johns SAP AG [email protected] @datenkeller Ben Stock FAU Erlangen-Nuremberg
