Unraveling Unicode: A Bag of Tricks for Bug Hunting
|
|
|
- Lynette Bridges
- 9 years ago
- Views:
Transcription
1 Unraveling Unicode: A Bag of Tricks for Bug Hunting Black Hat USA July 2009 Chris Weber [email protected] Casaba Security
2 Can you tell the difference?
3 How about now?
4 The Transformers When good input turns bad <script> becomes <script>
5 Agenda
6 Unicode Transformations Agenda Unicode crash course Root Causes Attack Vectors Tools Find Unicode issues in Web-testing Visual Spoofing Detection
7 Unicode Transformations Agenda Unicode crash course Root Causes Attack Vectors Tools
8 Unicode Crash Course The Unicode Attack Surface End users Applications Databases Programming languages Operating Systems
9 Unicode Crash Course Unthink it
10 Unicode Crash Course A large and complex standard code points canonical mappings encodings decomposition types categorization case folding normalization best-fit mapping binary properties 17 planes case mapping private use ranges conversion tables script blocks bi-directional properties escapings
11 Unicode Crash Course Code pages and charsets Shift_jis Gb2312 ISCII Windows-1252 ISO EBCDIC 037
12 Unicode Crash Course Ad Infinitum Unicode can represent them all ASCII range is preserved U+0000 to U+007F are mapped to ASCII
13 Unicode Crash Course Code points Unicode 5.1 uses a 21-bit scalar value with space for over 1,100,000 code points: U+0000 to U+10FFFF
14 Unicode Crash Course Code Points A = U+0041 Every character has a unique number
15 Unicode Crash Course A U+0041
16 Unicode Crash Course ſ U+017F
17 Unicode Crash Course Encodings UTF-8 variable width 1 to 4 bytes (used to be 6) UTF-16 Endianess Variable width 2 or 4 bytes Surrogate pairs! UTF-32 Endianess Fixed width 4 bytes Fixed mapping, no algorithms needed
18 Unicode Crash Course Encodings and Escape sequences U+FF21 FULLWIDTH LATIN CAPITAL LETTER A %EF%BC%A1 A A \xef\xbc\xa1 \uff21
19 Unicode Transformations Agenda Unicode crash course Root Causes Attack Vectors Tools
20 Unicode Transformations Agenda Unicode crash course Root Causes Attack Vectors Tools
21 Unicode Transformations Overview Unicode crash course Root Causes Visual Spoofing and IDN s Best-fit mappings Normalization Overlong UTF-8 Over-consumption Character substitution Character deletion Casing Buffer overflows Controlling Syntax Charset transformations Charset mismatches Tools
22 Root Causes Visual Spoofing Over 100,000 assigned characters Many lookalikes within and across scripts AΑАᐱᗅᗋᗩᴀᴬ A
23 Attack Vectors IDN homograph attacks Some browsers allow.com IDN s based on script family (Latin has a big family)
24 Attack Vectors IDN homograph attacks Safari
25 Attack Vectors IDN homograph attacks Opera
26 Attack Vectors IDN homograph attacks is not gɡ Latin U+0069 Latin U+0261
27 Root Causes The state of International Domain Names ICANN guidelines v2.0 Inclusion-based Script limitations Character limitations Deny-all default seems to be the right concept. A script can cross many blocks. Even with limited script choices, there s plenty to choose from. Great for domain labels, but sub domain labels still open to punctuation and syntax spoofing.
28 Attack Vectors Visual spoofing Vectors Non-Unicode attacks Confusables Invisibles Problematic font-rendering Manipulating Combining Marks Bidi and syntax spoofing
29 Attack Vectors Non-Unicode homograph attacks rn can look like m in certain fonts is not Latin U+006D Latin U+0073 U+006E
30 Attack Vectors Non-Unicode homograph attacks Are you using mono-width fonts? 0 and O 1 and l 5 and S
31 Attack Vectors Non-Unicode homograph attacks Classic long URL s
32 Attack Vectors Single-script and The Confusables // All Latin using Latin small letter Alpha ɑ // Mixed Latin/Greek with lunate sigma symbol c // All Cyrillic abc
33 Attack Vectors IDN homograph attacks Browsers whitelist.org
34 Attack Vectors IDN homograph attacks Others don t necessarily but
35 Attack Vectors IDN homograph attacks is not Latin U+0069 Latin U+00ED
36 Attack Vectors IDN Syntax Spoofing with / lookalikes FULLWIDTH SOLIDUS U+FF0F (This case doesn t work anymore)
37 Attack Vectors IDN Syntax Spoofing with / lookalikes SOLIDUS U+002F (Normalized to a / U+002F)
38 Attack Vectors IDN Syntax Spoofing with / lookalikes Katakana No U+FF89 (However punctuation not required )
39 Attack Vectors The Invisibles
40 Attack Vectors Visual Spoofing with Bidi Explicit Directional Overrides
41 Root Causes Best-fit mappings Commonly occur in charset transformations and even innocuous API s Impact: Filter evasion, Enable code execution When σ becomes s U+03C3 GREEK SMALL LETTER SIGMA When becomes ' U+2032 PRIME
42 Root Causes Guidance for Best-Fit mappings Scrutinize character/charset manipulation API s Use EncoderFallback with System.Text.Encoding Set WC_NO_BEST_FIT_CHARS flag with WideCharToMultiByte() Use Unicode end-to-end
43 Case Study: Social Networking Best-fit mappings A popular social networking site in 2008 Implemented complex filtering logic to prevent XSS Attack: Filter evasion, code execution Exploit: Bypass filtering logic with best-fit mappings to leverage cross-site scripting Root Cause: best-fit mappings
44 Case Study: Social Networking Best-fit mappings -moz-binding() was not allowed, but. -[U+ff4d]oz-binding() would best-fit map!
45 Root Causes Normalization Normalizing strings after validation is dangerous Impact: Filter evasion, Enable code execution
46 Root Causes Normalization İ becomes I + U+0130 U+0049 U+0307
47 Root Causes Normalization But are there dangerous characters? You bet with NFKC and NFKD you could control HTML or other parsing < becomes < U+FE64 U+003C
48 Root Causes Normalization < becomes < U+FE64 U+003C tonfkc( <script> ) = <script>
49 Root Causes Guidance for Normalization Normalize strings before validation NFKC first defense against Visual spoofing
50 Root Causes Non-shortest form UTF-8 Non-shortest or overlong UTF-8 Impact: Filter evasion, Enable code execution Application gets %C0%A7 OS/Framework sees %27 Database gets '
51 Root Causes Guidance for Non-shortest form UTF-8 Unicode specification forbids Generation of non-shortest form Interpretation of non-shortest form for BMP Validate UTF-8 encoding (throw on error)
52 Attack Vectors Directory traversal How many ways can you say../
53 Attack Vectors../
54 Root Causes Handling the Unexpected Unassigned code points U+2073 Illegal code points Half a surrogate pair Code points with special meaning U+FEFF is the BOM Impact: Filter evasion, Enable code execution
55 Root Causes Handling the Unexpected: Over-consumption Over-consuming ill-formed byte sequences * Big problem with MBCS lead bytes <41 C2 3E 41> becomes <41 41>
56 Root Causes Handling the Unexpected: Over-consumption <img src="#[0xc2]"> "onerror="alert(1)"<br /> becomes <img src="#>" onerror="alert(1)"<br />
57 Root Causes Handling the Unexpected: Character-substitution Correcting insecurely rather than failing Substituting a. or a / would be bad
58 Root Causes Handling the Unexpected: Character-deletion deletion of noncharacters (UTR-36)
59 Root Causes Handling the Unexpected: Character-deletion <scr[u+feff]ipt> becomes <script>
60 Root Causes Solutions for Handling the Unexpected Fail or error Use U+FFFD instead A common alternative is?, which can be safe
61 Attack Vectors Filter evasion Bypass filters, WAF s, NIDS, and validation Exploit delivery techniques E.g. Cross-site scripting (buffer overflow of the Web)
62 Case Study: Apple and Mozilla Safari and Firefox BOM consumption Attack: Filter evasion, code execution Exploit: Bypass filtering logic with specially crafted strings to leverage cross-site scripting Root Cause: Character deletion <a href= java[u+feff]script:alert( XSS )> Can be nastier: <a h[u+feff]ref= java[u+feff]script:al[u+feff]ert( XSS )>
63 A Closer Look: The BOM BOM U+FEFF
64 Root Causes Casing Attackers manipulate casing operations to inject otherwise prohibited characters Casing can multiply the buffer sizes needed Impact: Filter evasion, Enable code execution
65 Root Causes Casing tolower( İ ) == i tolower( script ) == script
66 Root Causes Casing len(x)!= len(tolower(x))
67 Root Causes Guidance for Casing Perform casing operations before validation Leverage existing frameworks and API s ICU,.Net
68 Root Causes Buffer Overflows Incorrect assumptions about string sizes (chars vs. bytes) Improper width calculations Impact: Enable code execution
69 Root Causes Buffer Overflows Casing - maximum expansion factors Operation UTF Factor Sample Lower Ⱥ U+023A 16, 32 1 A U+0041 Upper 8, 16, 32 3 ΐ U+0390 Source: Unicode Technical Report #36
70 Root Causes Buffer Overflows Normalization- maximum expansion factors Operation UTF Factor Sample 8 3X U+1D160 NFC 16, 32 3X שּׁ U+FB2C 8 3X ΐ U+0390 NFD 16, 32 4X ᾂ U+1F X NFKC/NFKD ﷺ U+FDFA 16, 32 18X Source: Unicode Technical Report #36
71 Root Causes Guidance for Buffer Overflows Know the difference between bytes and chars Secure coding Leverage existing frameworks and API s ICU,.Net
72 Root Causes Controlling Syntax White space and line breaks E.g. when U+180E acts like U+0020 Quotation marks Impact: Filter evasion, Enable code execution
73 Attacks and Exploits Controlling syntax Manipulate HTML parsers and javascript interpreters Control protocols
74 Case Study: Opera Unicode formatter characters exploited for XSS Damage: Filter evasion, controlling syntax Exploit: Bypass filtering logic with specially crafted characters to leverage cross-site scripting. Root Cause: Interpreting white space A problem with HTML 4.0 spec?
75 Case Study: Opera <a href=#[u+180e]onclick=alert()>
76 Case Study: Opera MVS U+180E
77 Root Causes Guidance for Controlling Syntax Question specifications Be careful
78 Root Causes Specifications 1) Character stability IDNA/Nameprep based on Unicode 3.2 2) Designs Specs are carefully designed but not always perfect This could have been a problem: When designing a markup language or data protocol, the use of U+FEFF can be restricted to that of Byte Order Mark. In that case, any U+FEFF occurring in the middle of the file can be ignored, or treated as an error. HTML 4.01 Defines four whitespace characters and explicitly leaves handling other characters up to implementer.
79 Root Causes Charset Transformations Converting between charsets is dangerous Mapping tables and algorithms vary across platforms Impact: Filter evasion, Enable code execution, Data-loss
80 Root Causes Guidance for Charset Transformations Avoid if possible Use Unicode as the broker Beware the PUA mappings Transform, case, and normalize prior to validation and redisplay
81 Root Causes Charset Mismatches Some charset identifiers are ill-defined Vendor implementations vary User-agents may sniff if confused Attackers manipulate behavior Impact: Filter evasion, Enable code execution
82 Root Causes Charset Mismatches Content-Type: charset=iso Attacker-controlled input <meta http-equiv="content-type" content="text/html; charset=shift_jis"/>
83 Root Causes Guidance for Charset Mismatches Force UTF-8 Error if uncertain
84 Unicode Transformations Agenda Unicode crash course Root Causes Attack Vectors Tools
85 Unicode Transformations Agenda Unicode crash course Root Causes Attack Vectors Tools
86 Tools Watcher Passive Web-app security testing and auditing Unibomber XSS autopwn testing tool
87 Tools Watcher Some of the Passive Checks Included Unicode transformation hot-spots User-controlled HTML Cross-domain issues Insecure cookies Insecure HTTP/HTTPS transitions SSL protocol and certificate issues XSS hot-spots Flash issues Silverlight issues Information disclosure
88 Tools
89 Tools Watcher - Web-app Security Testing and Auditing
90 Tools Unibomber runtime XSS testing tool Deterministic testing Auto-inject payloads Unicode transformers < >, etc. Detect transformations and encoding hotspots
91 Casaba Security Thank you! Chris Weber Blog: LinkedIn:
Unicode Security. Software Vulnerability Testing Guide. July 2009 Casaba Security, LLC www.casabasecurity.com
Unicode Security Software Vulnerability Testing Guide (DRAFT DOCUMENT this document is currently a preview in DRAFT form. Please contact me with corrections or feedback.) Software Globalization provides
Finding XSS in Real World
Finding XSS in Real World by Alexander Korznikov [email protected] 1 April 2015 Hi there, in this tutorial, I will try to explain how to find XSS in real world, using some interesting techniques. All
Blackbox Reversing of XSS Filters
Blackbox Reversing of XSS Filters Alexander Sotirov [email protected] Introduction Web applications are the future Reversing web apps blackbox reversing very different environment and tools Cross-site scripting
Application Security Testing. Erez Metula (CISSP), Founder Application Security Expert [email protected]
Application Security Testing Erez Metula (CISSP), Founder Application Security Expert [email protected] Agenda The most common security vulnerabilities you should test for Understanding the problems
Internationalization of Domain Names
Internationalization of Domain Names Marc Blanchet ([email protected]) Co-chair of the IETF idn working group Viagénie (http://www.viagenie.qc.ca) Do You Like Quoted Printable? If yes, then
XSS Lightsabre techniques. using Hackvertor
XSS Lightsabre techniques using Hackvertor What is Hackvertor? Tag based conversion tool Javascript property checker Javascript/HTML execution DOM browser Saves you writing code Free and no ads! Whoo hoo!
Internationalizing the Domain Name System. Šimon Hochla, Anisa Azis, Fara Nabilla
Internationalizing the Domain Name System Šimon Hochla, Anisa Azis, Fara Nabilla Internationalize Internet Master in Innovation and Research in Informatics problematic of using non-ascii characters ease
FINAL DoIT 11.03.2015 - v.4 PAYMENT CARD INDUSTRY DATA SECURITY STANDARDS APPLICATION DEVELOPMENT AND MAINTENANCE PROCEDURES
Purpose: The Department of Information Technology (DoIT) is committed to developing secure applications. DoIT s System Development Methodology (SDM) and Application Development requirements ensure that
Webapps Vulnerability Report
Tuesday, May 1, 2012 Webapps Vulnerability Report Introduction This report provides detailed information of every vulnerability that was found and successfully exploited by CORE Impact Professional during
Project 2: Web Security Pitfalls
EECS 388 September 19, 2014 Intro to Computer Security Project 2: Web Security Pitfalls Project 2: Web Security Pitfalls This project is due on Thursday, October 9 at 6 p.m. and counts for 8% of your course
External Vulnerability Assessment. -Technical Summary- ABC ORGANIZATION
External Vulnerability Assessment -Technical Summary- Prepared for: ABC ORGANIZATI On March 9, 2008 Prepared by: AOS Security Solutions 1 of 13 Table of Contents Executive Summary... 3 Discovered Security
FINAL DoIT 04.01.2013- v.8 APPLICATION SECURITY PROCEDURE
Purpose: This procedure identifies what is required to ensure the development of a secure application. Procedure: The five basic areas covered by this document include: Standards for Privacy and Security
A Tale of the Weaknesses of Current Client-Side XSS Filtering
Call To Arms: A Tale of the Weaknesses of Current Client-Side XSS Filtering Martin Johns, Ben Stock, Sebastian Lekies About us Martin Johns, Ben Stock, Sebastian Lekies Security Researchers at SAP, Uni
Protection, Usability and Improvements in Reflected XSS Filters
Protection, Usability and Improvements in Reflected XSS Filters Riccardo Pelizzi System Security Lab Department of Computer Science Stony Brook University May 2, 2012 1 / 19 Riccardo Pelizzi Improvements
Threat Modeling/ Security Testing. Tarun Banga, Adobe 1. Agenda
Threat Modeling/ Security Testing Presented by: Tarun Banga Sr. Manager Quality Engineering, Adobe Quality Leader (India) Adobe Systems India Pvt. Ltd. Agenda Security Principles Why Security Testing Security
Recent Advances in Web Application Security
Recent Advances in Web Application Security Author: Neelay S Shah Principal Security Consultant Foundstone Professional Services Table of Contents Introduction 3 Content Security Policy 3 Best Practices
Input Validation Vulnerabilities, Encoded Attack Vectors and Mitigations OWASP. The OWASP Foundation. Marco Morana & Scott Nusbaum
Input Validation Vulnerabilities, Encoded Attack Vectors and Mitigations Marco Morana & Scott Nusbaum Cincinnati Chapter September 08 Meeting Copyright 2008 The Foundation Permission is granted to copy,
Critical Values for I18n Testing. Tex Texin Chief Globalization Architect XenCraft
Critical Values for I18n Testing Tex Texin Chief Globalization Architect XenCraft Abstract In this session, we recommend specific data values that are likely to identify internationalization problems in
Acunetix Website Audit. 5 November, 2014. Developer Report. Generated by Acunetix WVS Reporter (v8.0 Build 20120808)
Acunetix Website Audit 5 November, 2014 Developer Report Generated by Acunetix WVS Reporter (v8.0 Build 20120808) Scan of http://filesbi.go.id:80/ Scan details Scan information Starttime 05/11/2014 14:44:06
Intrusion detection for web applications
Intrusion detection for web applications Intrusion detection for web applications Łukasz Pilorz Application Security Team, Allegro.pl Reasons for using IDS solutions known weaknesses and vulnerabilities
The Unicode Standard Version 8.0 Core Specification
The Unicode Standard Version 8.0 Core Specification To learn about the latest version of the Unicode Standard, see http://www.unicode.org/versions/latest/. Many of the designations used by manufacturers
Bypassing Web Application Firewalls (WAFs) Ing. Pavol Lupták, CISSP, CEH Lead Security Consultant
Bypassing Web Application Firewalls (WAFs) Ing. Pavol Lupták, CISSP, CEH Lead Security Consultant Nethemba All About Security Highly experienced certified IT security experts (CISSP, C EH, SCSecA) Core
Cross Site Scripting Prevention
Project Report CS 649 : Network Security Cross Site Scripting Prevention Under Guidance of Prof. Bernard Menezes Submitted By Neelamadhav (09305045) Raju Chinthala (09305056) Kiran Akipogu (09305074) Vijaya
Universal XSS via IE8s XSS Filters
Universal XSS via IE8s XSS Filters the sordid tale of a wayward hash sign slides: http://p42.us/ie8xss/ About Us Eduardo Vela Nava aka sirdarckcat http://sirdarckcat.net http://twitter.com/sirdarckcat
Web Intrusion Detection with ModSecurity. Ivan Ristic <[email protected]>
Web Intrusion Detection with ModSecurity Ivan Ristic Aim of This Talk Discuss the state of Web Intrusion Detection Introduce ModSecurity Introduce an open source web application
Implementation of Web Application Firewall
Implementation of Web Application Firewall OuTian 1 Introduction Abstract Web 層 應 用 程 式 之 攻 擊 日 趨 嚴 重, 而 國 內 多 數 企 業 仍 不 知 該 如 何 以 資 安 設 備 阻 擋, 仍 在 採 購 傳 統 的 Firewall/IPS,
EVADING ALL WEB-APPLICATION FIREWALLS XSS FILTERS
EVADING ALL WEB-APPLICATION FIREWALLS XSS FILTERS SEPTEMBER 2015 MAZIN AHMED [email protected] @MAZEN160 Table of Contents Topic Page Number Abstract 3 Introduction 3 Testing Environment 4 Products
Web Application Hacking (Penetration Testing) 5-day Hands-On Course
Web Application Hacking (Penetration Testing) 5-day Hands-On Course Web Application Hacking (Penetration Testing) 5-day Hands-On Course Course Description Our web sites are under attack on a daily basis
Internationalizing JavaScript Applications Norbert Lindenberg. Norbert Lindenberg 2013. All rights reserved.
Internationalizing JavaScript Applications Norbert Lindenberg Norbert Lindenberg 2013. All rights reserved. Agenda Unicode support Collation Number and date/time formatting Localizable resources Message
SECURE APPLICATION DEVELOPMENT CODING POLICY OCIO-6013-09 TABLE OF CONTENTS
OFFICE OF THE CHIEF INFORMATION OFFICER OCIO-6013-09 Date of Issuance: May 22, 2009 Effective Date: May 22, 2009 Review Date: TABLE OF CONTENTS Section I. PURPOSE II. AUTHORITY III. SCOPE IV. DEFINITIONS
Out of the Fire - Adding Layers of Protection When Deploying Oracle EBS to the Internet
Out of the Fire - Adding Layers of Protection When Deploying Oracle EBS to the Internet March 8, 2012 Stephen Kost Chief Technology Officer Integrigy Corporation Phil Reimann Director of Business Development
Web Application Security
Web Application Security John Zaharopoulos ITS - Security 10/9/2012 1 Web App Security Trends Web 2.0 Dynamic Webpages Growth of Ajax / Client side Javascript Hardening of OSes Secure by default Auto-patching
Firefox, Opera, Safari for Windows BMP file handling information leak. September 2008. Discovered by: Mateusz j00ru Jurczyk, Hispasec Labs
Firefox, Opera, Safari for Windows BMP file handling information leak September 2008 Discovered by: Mateusz j00ru Jurczyk, Hispasec Labs 1. Introduction The bitmap format implementations in Mozilla Firefox
Exploits: XSS, SQLI, Buffer Overflow
Exploits: XSS, SQLI, Buffer Overflow These vulnerabilities continue to result in many active exploits. XSS Cross Site Scripting, comparable to XSRF, Cross Site Request Forgery. These vulnerabilities are
Cross-Site Scripting
Cross-Site Scripting (XSS) Computer and Network Security Seminar Fabrice Bodmer ([email protected]) UNIFR - Winter Semester 2006-2007 XSS: Table of contents What is Cross-Site Scripting (XSS)? Some
Check list for web developers
Check list for web developers Requirement Yes No Remarks 1. Input Validation 1.1) Have you done input validation for all the user inputs using white listing and/or sanitization? 1.2) Does the input validation
Web Application Security
E-SPIN PROFESSIONAL BOOK Vulnerability Management Web Application Security ALL THE PRACTICAL KNOW HOW AND HOW TO RELATED TO THE SUBJECT MATTERS. COMBATING THE WEB VULNERABILITY THREAT Editor s Summary
D. Best Practices D.1. Assurance The 5 th A
Best Practices I&C School Prof. P. Janson September 2014 D. Best Practices D.1. Assurance The 5 th A 1 of 20 IT systems are insecure for two main reasons: People are fallible and systems are complex and
Web Application Worms & Browser Insecurity
Web Application Worms & Browser Insecurity Mike Shema Welcome Background Hacking Exposed: Web Applications The Anti-Hacker Toolkit Hack Notes: Web Security Currently working at Qualys
Web Application Attacks And WAF Evasion
Web Application Attacks And WAF Evasion Ahmed ALaa (EG-CERT) 19 March 2013 What Are We Going To Talk About? - introduction to web attacks - OWASP organization - OWASP frameworks - Crawling & info. gathering
Adobe Flash Player and Adobe AIR security
Adobe Flash Player and Adobe AIR security Both Adobe Flash Platform runtimes Flash Player and AIR include built-in security and privacy features to provide strong protection for your data and privacy,
Preservation Handbook
Preservation Handbook Plain text Author Version 2 Date 17.08.05 Change History Martin Wynne and Stuart Yeates Written by MW 2004. Revised by SY May 2005. Revised by MW August 2005. Page 1 of 7 File: presplaintext_d2.doc
Last update: February 23, 2004
Last update: February 23, 2004 Web Security Glossary The Web Security Glossary is an alphabetical index of terms and terminology relating to web application security. The purpose of the Glossary is to
Thick Client Application Security
Thick Client Application Security Arindam Mandal ([email protected]) (http://www.paladion.net) January 2005 This paper discusses the critical vulnerabilities and corresponding risks in a two
Finding Your Way in Testing Jungle. A Learning Approach to Web Security Testing.
Finding Your Way in Testing Jungle A Learning Approach to Web Security Testing. Research Questions Why is it important to improve website security? What techniques are already in place to test security?
Creating Stronger, Safer, Web Facing Code. JPL IT Security Mary Rivera June 17, 2011
Creating Stronger, Safer, Web Facing Code JPL IT Security Mary Rivera June 17, 2011 Agenda Evolving Threats Operating System Application User Generated Content JPL s Application Security Program Securing
Chapter 1 Web Application (In)security 1
Introduction xxiii Chapter 1 Web Application (In)security 1 The Evolution of Web Applications 2 Common Web Application Functions 4 Benefits of Web Applications 5 Web Application Security 6 "This Site Is
Cross Site Scripting (XSS) and PHP Security. Anthony Ferrara NYPHP and OWASP Security Series June 30, 2011
Cross Site Scripting (XSS) and PHP Security Anthony Ferrara NYPHP and OWASP Security Series June 30, 2011 What Is Cross Site Scripting? Injecting Scripts Into Otherwise Benign and Trusted Browser Rendered
Detecting and Exploiting XSS with Xenotix XSS Exploit Framework
Detecting and Exploiting XSS with Xenotix XSS Exploit Framework [email protected] keralacyberforce.in Introduction Cross Site Scripting or XSS vulnerabilities have been reported and exploited since 1990s.
A Tale of the Weaknesses of Current Client-side XSS Filtering
A Tale of the Weaknesses of Current Client-side XSS Filtering Sebastian Lekies (@sebastianlekies), Ben Stock (@kcotsneb) and Martin Johns (@datenkeller) Attention hackers! These slides are preliminary!
Protocol-Level Evasion of Web Application Firewalls
Protocol-Level Evasion of Web Application Firewalls USA2012 Ivan Ristic Director of Engineering True Evasion Story Once, a long time ago, I evaded a web application firewall by adding a single character
Information Technology Policy
Information Technology Policy Enterprise Web Application Firewall ITP Number ITP-SEC004 Category Recommended Policy Contact [email protected] Effective Date January 15, 2010 Supersedes Scheduled Review
A Perfect CRIME? TIME Will Tell. Tal Be ery, Web research TL
A Perfect CRIME? TIME Will Tell Tal Be ery, Web research TL Agenda BEAST + Modes of operation CRIME + Gzip compression + Compression + encryption leak data TIME + Timing + compression leak data Attacking
HTTP Response Splitting
The Attack HTTP Response Splitting is a protocol manipulation attack, similar to Parameter Tampering The attack is valid only for applications that use HTTP to exchange data Works just as well with HTTPS
Uploaded images filter evasion for carrying out XSS attacks
February 25, 2007 Uploaded images filter evasion for carrying out XSS attacks Digitаl Security Research Group (DSecRG) Alexander Polyakov [email protected] http://dsecrg.ru Table of contents Introduction...3
Finding and Preventing Cross- Site Request Forgery. Tom Gallagher Security Test Lead, Microsoft
Finding and Preventing Cross- Site Request Forgery Tom Gallagher Security Test Lead, Microsoft Agenda Quick reminder of how HTML forms work How cross-site request forgery (CSRF) attack works Obstacles
Ecma/TC39/2013/NN. 4 th Draft ECMA-XXX. 1 st Edition / July 2013. The JSON Data Interchange Format. Reference number ECMA-123:2009
Ecma/TC39/2013/NN 4 th Draft ECMA-XXX 1 st Edition / July 2013 The JSON Data Interchange Format Reference number ECMA-123:2009 Ecma International 2009 COPYRIGHT PROTECTED DOCUMENT Ecma International 2013
Introduction to Unicode. By: Atif Gulzar Center for Research in Urdu Language Processing
Introduction to Unicode By: Atif Gulzar Center for Research in Urdu Language Processing Introduction to Unicode Unicode Why Unicode? What is Unicode? Unicode Architecture Why Unicode? Pre-Unicode Standards
WHITE PAPER. FortiWeb and the OWASP Top 10 Mitigating the most dangerous application security threats
WHITE PAPER FortiWeb and the OWASP Top 10 PAGE 2 Introduction The Open Web Application Security project (OWASP) Top Ten provides a powerful awareness document for web application security. The OWASP Top
Columbia University Web Security Standards and Practices. Objective and Scope
Columbia University Web Security Standards and Practices Objective and Scope Effective Date: January 2011 This Web Security Standards and Practices document establishes a baseline of security related requirements
Web Application Firewalls Evaluation and Analysis. University of Amsterdam System & Network Engineering MSc
Web Application Firewalls Evaluation and Analysis Andreas Karakannas [email protected] George Thessalonikefs [email protected] University of Amsterdam System & Network Engineering MSc
Secure Coding. External App Integrations. Tim Bach Product Security Engineer salesforce.com. Astha Singhal Product Security Engineer salesforce.
Secure Coding External App Integrations Astha Singhal Product Security Engineer salesforce.com Tim Bach Product Security Engineer salesforce.com Safe Harbor Safe harbor statement under the Private Securities
Strategic Information Security. Attacking and Defending Web Services
Security PS Strategic Information Security. Attacking and Defending Web Services Presented By: David W. Green, CISSP [email protected] Introduction About Security PS Application Security Assessments
Hack-proof Your Drupal App. Key Habits of Secure Drupal Coding
Hack-proof Your Drupal App Key Habits of Secure Drupal Coding DrupalCamp CT 2010 My Modules Introductions Erich Beyrent http://twitter.com/ebeyrent http://drupal.org/user/23897 Permissions API Search Lucene
Document Structure Integrity: A Robust Basis for Cross-Site Scripting Defense
Document Structure Integrity: A Robust Basis for Cross-Site Scripting Defense Yacin Nadji Illinois Institute Of Technology Prateek Saxena UC Berkeley Dawn Song UC Berkeley 1 A Cross-Site Scripting Attack
Still Aren't Doing. Frank Kim
Ten Things Web Developers Still Aren't Doing Frank Kim Think Security Consulting Background Frank Kim Consultant, Think Security Consulting Security in the SDLC SANS Author & Instructor DEV541 Secure Coding
Network Security Web Security
Network Security Web Security Anna Sperotto, Ramin Sadre Design and Analysis of Communication Systems Group University of Twente, 2012 Cross Site Scripting Cross Side Scripting (XSS) XSS is a case of (HTML)
Pemrograman Dasar. Basic Elements Of Java
Pemrograman Dasar Basic Elements Of Java Compiling and Running a Java Application 2 Portable Java Application 3 Java Platform Platform: hardware or software environment in which a program runs. Oracle
EECS 398 Project 2: Classic Web Vulnerabilities
EECS 398 Project 2: Classic Web Vulnerabilities Revision History 3.0 (October 27, 2009) Revise CSRF attacks 1 and 2 to make them possible to complete within the constraints of the project. Clarify that
WPAD TECHNOLOGY WEAKNESSES. Sergey Rublev Expert in information security, "Positive Technologies" ([email protected])
WPAD TECHNOLOGY WEAKNESSES Sergey Rublev Expert in information security, "Positive Technologies" ([email protected]) MOSCOW 2009 CONTENTS 1 INTRODUCTION... 3 2 WPAD REVIEW... 4 2.1 PROXY AUTO CONFIGURATION
SESSION IDENTIFIER ARE FOR NOW, PASSWORDS ARE FOREVER
SESSION IDENTIFIER ARE FOR NOW, PASSWORDS ARE FOREVER XSS-BASED ABUSE OF BROWSER PASSWORD MANAGERS Ben Stock, Martin Johns, Sebastian Lekies Browser choices Full disclosure: Ben was an intern with Microsoft
HTML5 and security on the new web
HTML5 and security on the new web By James Lyne, Director of Technology Strategy There are lots of changes happening to the key technologies that power the web. The new version of HTML, the dominant web
Advanced XSS. Nicolas Golubovic
Advanced XSS Nicolas Golubovic Image courtesy of chanpipat / FreeDigitalPhotos.net Today's menu 1. Starter: reboiled XSS 2. Course: spicy blacklists & filters 3. Course: sweet content sniffing 4. Course:
Secure Web Application Coding Team Introductory Meeting December 1, 2005 1:00 2:00PM Bits & Pieces Room, Sansom West Room 306 Agenda
Secure Web Application Coding Team Introductory Meeting December 1, 2005 1:00 2:00PM Bits & Pieces Room, Sansom West Room 306 Agenda 1. Introductions for new members (5 minutes) 2. Name of group 3. Current
Bypassing NoScript Security Suite Using Cross-Site Scripting and MITM Attacks
Bypassing NoScript Security Suite March 2016 Mazin Ahmed [email protected] @mazen160 Table of Contents Abstract... 3 Introduction... 3 Research... 4 Solution... 7 Recommendations... 7 Notes... 7 Disclosure
Full URLs, specified in RFC 3986 have up to eight parts. scheme://login:password@address:port/path/to/resource?query_string#fragment
Outline Recap Secure Programming Lecture 11: Web Application Security II David Aspinall 3rd March 2014 Overview Basics: URLs Output Filtering and XSS Object references Programming web applications securely
Attack Vector Detail Report Atlassian
Attack Vector Detail Report Atlassian Report As Of Tuesday, March 24, 2015 Prepared By Report Description Notes [email protected] The Attack Vector Details report provides details of vulnerability
External Network & Web Application Assessment. For The XXX Group LLC October 2012
External Network & Web Application Assessment For The XXX Group LLC October 2012 This report is solely for the use of client personal. No part of it may be circulated, quoted, or reproduced for distribution
CS 356 Lecture 23 and 24 Software Security. Spring 2013
CS 356 Lecture 23 and 24 Software Security Spring 2013 Review Chapter 1: Basic Concepts and Terminology Chapter 2: Basic Cryptographic Tools Chapter 3 User Authentication Chapter 4 Access Control Lists
Detect and Sanitise Encoded Cross-Site Scripting and SQL Injection Attack Strings Using a Hash Map
Detect and Sanitise Encoded Cross-Site Scripting and SQL Injection Attack Strings Using a Hash Map Erwin Adi and Irene Salomo School of Computer Science BINUS International BINUS University, Indonesia
Attacks on Clients: Dynamic Content & XSS
Software and Web Security 2 Attacks on Clients: Dynamic Content & XSS (Section 7.1.3 on JavaScript; 7.2.4 on Media content; 7.2.6 on XSS) sws2 1 Recap from last lecture Attacks on web server: attacker/client
Security Research Advisory IBM inotes 9 Active Content Filtering Bypass
Security Research Advisory IBM inotes 9 Active Content Filtering Bypass Table of Contents SUMMARY 3 VULNERABILITY DETAILS 3 TECHNICAL DETAILS 4 LEGAL NOTICES 7 Active Content Filtering Bypass Advisory
AJAX Storage: A Look at Flash Cookies and Internet Explorer Persistence
AJAX Storage: A Look at Flash Cookies and Internet Explorer Persistence Corey Benninger The AJAX Storage Dilemna AJAX (Asynchronous JavaScript and XML) applications are constantly looking for ways to increase
How To Write A Domain Name In Unix (Unicode) On A Pc Or Mac (Windows) On An Ipo (Windows 7) On Pc Or Ipo 8.5 (Windows 8) On Your Pc Or Pc (Windows
IDN TECHNICAL SPECIFICATION February 3rd, 2012 1 IDN technical specifications - Version 1.0 - February 3rd, 2012 IDN TECHNICAL SPECIFICATION February 3rd, 2012 2 Table of content 1. Foreword...3 1.1. Reference
EC-Council CAST CENTER FOR ADVANCED SECURITY TRAINING. CAST 619 Advanced SQLi Attacks and Countermeasures. Make The Difference CAST.
CENTER FOR ADVANCED SECURITY TRAINING 619 Advanced SQLi Attacks and Countermeasures Make The Difference About Center of Advanced Security Training () The rapidly evolving information security landscape
Next Generation Clickjacking
Next Generation Clickjacking New attacks against framed web pages Black Hat Europe, 14 th April 2010 Paul Stone [email protected] Coming Up Quick Introduction to Clickjacking Four New Cross-Browser
What is Web Security? Motivation
[email protected] http://www.brucker.ch/ Information Security ETH Zürich Zürich, Switzerland Information Security Fundamentals March 23, 2004 The End Users View The Server Providers View What is Web
Preparing for the Cross Site Request Forgery Defense
Preparing for the Cross Site Request Forgery Defense Chuck Willis [email protected] Black Hat DC 2008 February 20, 2008 About Me Principal Consultant with MANDIANT in Alexandria, VA Full spectrum
Web Application Guidelines
Web Application Guidelines Web applications have become one of the most important topics in the security field. This is for several reasons: It can be simple for anyone to create working code without security
(WAPT) Web Application Penetration Testing
(WAPT) Web Application Penetration Testing Module 0: Introduction 1. Introduction to the course. 2. How to get most out of the course 3. Resources you will need for the course 4. What is WAPT? Module 1:
Web Application Security
Web Application Security Ng Wee Kai Senior Security Consultant PulseSecure Pte Ltd About PulseSecure IT Security Consulting Company Part of Consortium in IDA (T) 606 Term Tender Cover most of the IT Security
Web applications. Web security: web basics. HTTP requests. URLs. GET request. Myrto Arapinis School of Informatics University of Edinburgh
Web applications Web security: web basics Myrto Arapinis School of Informatics University of Edinburgh HTTP March 19, 2015 Client Server Database (HTML, JavaScript) (PHP) (SQL) 1 / 24 2 / 24 URLs HTTP
Web Application Firewall Profiling and Evasion. Michael Ritter Cyber Risk Services Deloitte
Web Application Firewall Profiling and Evasion Michael Ritter Cyber Risk Services Deloitte Content 1. Introduction 2. WAF Basics 3. Identifying a WAF 4. WAF detection tools 5. WAF bypassing methods 6.
Web Application Report
Web Application Report This report includes important security information about your Web Application. Security Report This report was created by IBM Rational AppScan 8.5.0.1 11/14/2012 8:52:13 AM 11/14/2012
INTRUSION DECEPTION CZYLI BAW SIĘ W CIUCIUBABKĘ Z NAMI
INTRUSION DECEPTION CZYLI BAW SIĘ W CIUCIUBABKĘ Z NAMI Na przykładzie Junos WebApp Secure Edmund Asare INCONVENIENT STATISTICS 70% of ALL threats are at the Web application layer. Gartner 73% of organizations
3. Broken Account and Session Management. 4. Cross-Site Scripting (XSS) Flaws. Web browsers execute code sent from websites. Account Management
What is an? s Ten Most Critical Web Application Security Vulnerabilities Anthony LAI, CISSP, CISA Chapter Leader (Hong Kong) [email protected] Open Web Application Security Project http://www.owasp.org
