Created by Johannes Hoppe. Security
|
|
|
- Jerome Young
- 9 years ago
- Views:
Transcription
1 Created by Johannes Hoppe Security
2 Ziel Angriffsvektoren aufzeigen. Strategien besprechen. Mehr nicht!
3 Features Neue Angriffsvektoren
4 Ein Formular Username: Password: Login <form id="login" action="#"> Username: <input type="text" name="username"> Password: <input type="password" name="password"> <input type="submit" value="login"> </form>
5 Formaction Username: Password: Login Klick mich! <form id="login" action="#"> Username: <input type="text" name="username"> Password: <input type="password" name="password"> <input type="submit" value="login"> </form> <button type="submit" form="login" formaction=" Klick mich! </button>
6 SVG Presto, WebKit, Gecko und sogar Trident 9 <?xml version="1.0"?> <svg xmlns=" width="40" height="40"> <circle cx="20" cy="20" r="15" fill="yellow" stroke="black"/> <circle cx="15" cy="15" r="2" fill="black" stroke="black"/> <circle cx="25" cy="15" r="2" fill="black" stroke="black"/> <path d="m A " stroke="black" fill="none" stroke -width="2"/> </svg>
7 SVG kann JavaScript enthalten! Test <?xml version="1.0"?> <svg xmlns=" width="200" height="50"> <defs><style> <![CDATA[ text { font-size:6pt; } ]]> </style></defs> <circle cx="20" cy="20" r="15" fill="yellow" stroke="black"/> <circle cx="15" cy="15" r="2" fill="black" stroke="black"/> <circle cx="25" cy="15" r="2" fill="black" stroke="black"/> <path d="m A " stroke="black" fill="none" stroke -width="2" transform="rotate(180, 20, 28)"/> <text x="11" y="50" id="display">test</text> <script> alert(document.cookie); document.getelementbyid('display').textcontent = document.cookie; </script> </svg>
8
9 Business as usual HTML5 es ist auch nicht schlimmer als HTML 4»
10 XSS Eingeschleuster JavaScript-Code
11 Oldies but Goldies index.html?message=daten gespeichert index.html?message=<script>alert('xss')</script> <script> var message = $.url().param('message'); if (message) { Notifier.success(message); } </script>
12 Eval everywhere Eval is evil <!-- Self-executing onfocus event via autofocus --> <input onfocus="alert('xss onfocus')" autofocus> <!-- Video OnError --> <video><source onerror="javascript:alert('xss onerror')"></video> <!-- Presto only: Form surveillance --> <form id=test onforminput=alert('xss onforminput')> <input> </form> <button form=test onformchange=alert('xss onformchange')>x</button>» Demo 1 2 3
13 OWASP Open Web Application Security Project XSS Filter Evasion Cheat Sheet <!-- Long UTF-8 Unicode encoding without semicolons --> <IMG SRC="" onerror="al& #101rt('XSS');">» Old IE Demo
14 XSS Vorbeugen
15 <script> HIER </script> <!-- HIER --> <div HIER="test"/> <HIER href="test" /> <style> HIER </style> 1. Hier sollten dynamische Daten niemals verwendet werden
16 2. HTML escape dynamic data <div>html ESCAPE</div> & & < < > > " " ' ' / '
17 Testen? function htmlencode(input) { // jquery.text == document.createtextnode return ($('<div/>').text(input).html()); } var saveformat = function () { var args = Array.prototype.slice.call(arguments); var txt = args.shift(); }; $.each(args, function (i, item) { item = htmlencode(item); txt = txt.replace("{" + i + "}", item); }); return txt;
18 Testen! describe("saveformat", function () { var original = '{0} - {1} - {2}'; it("should replace placeholders", function () { var expected = 'A - B - C'; var formated = saveformat(original, 'A', 'B', 'C'); expect(formated).toequal(expected); }); it("should encode injected content", function () { var expected = 'A - <b>test</b> - C'; var formated = saveformat(original, 'A', '<b>test</b>', 'C'); expect(formated).toequal(expected); }); });
19 Test Jasmine revision Passing 2 specs finished in 0.007s No try/catch saveformat should replace placeholders should encode injected content» Demo
20 Moment... describe("saveformat", function () { var original = '<a title="{0}">test</a>'; it("should replace quotes", function () { var expected = '<a title=""">test</a>'; var formated = saveformat(original, '"'); expect(formated).toequal(expected); }); });
21 Richtig testen! Jasmine revision x Failing 1 spec 1 spec 1 failing finished in 0.006s No try/catch saveformat should replace quotes. Expected '<a title=""">test</a>' to equal '<a title=""">test</a>'. Error: Expected '<a title=""">test</a>' to equal '<a title=""">test</a>'. at new jasmine.expectationresult ( at null.toequal ( at null.<anonymous> ( at jasmine.block.execute ( at jasmine.queue.next_ ( Demo
22 3. Attribute escape dynamic data <div attr="attribute ESCAPE"></div> <!-- NIEMALS ohne quotes! --> <div attr=attribute ESCAPE></div> a-z A-Z 0-9 immun,. - _ immun Rest &#xhh;
23 4. DO NOT JavaScript escape dynamic data HTML parser runs before the JavaScript parser! you are doing it wrong
24 Das hier ist Alltag UserList.cshtml / Kendo UI Template # if(id!= 0) { # <a href="javascript:dialogmanager.showpartialdialog('@url.action("userm anagement", "Management")', { userid : '#= htmlencode(id) #' }, {title: '#= htmlencode(alias) #'})"#= htmlencode(alias) #</a> # } else { # #= htmlencode(alias) # # } #
25 ? Offensichtlich läuft beim Umgang mit Daten etwas prinzipiell falsch!
26 Storage
27 Egal ob Cookies ob Session Storage ob Local Storage ob WebSQL die Daten sind nicht vertrauenswürdig!
28 Resident XSS richtig fies!
29 Vertraulichen Informationen gehören in die SERVER-Session!
30 Session Storage bevorzugen!
31 WebSQL SQL Injection: executesql("select foo FROM bar WHERE value=" + value); Prepared Statement: executesql("select foo FROM bar WHERE value=?", [value]);
32 Kommunikation
33 Mashups! define(['jquery', 'knockout', 'knockout.mapping', 'domready!'], function ($, ko, mapping) { var url =' $.getjson(url).done(function (data) { var viewmodel = mapping.fromjs(data); ko.applybindings(viewmodel, $('#tweets').get(0)); }); });
34 Loading...
35 JSON {"hello": "world"} JSON with Padding <script> var foo = function(json) { $('#output').text(json.stringify(json, undefined, 2)); }; </script> <script src=" foo"></script> foo({"hello": "world"});» Demo
36 JSONP
37 SOP Same origin policy Not macht erfinderisch (JSONP) CORS Cross-Origin Resource Sharing Access-Control-Allow-Origin: * WebSockets do what you want
38 JS-Recon Shell of the Future
39
40 Intranet == Internet
41 Danke!
42
43 » Sicherheit von Web-Anwendungen
Website Login Integration
SSO Widget Website Login Integration October 2015 Table of Contents Introduction... 3 Getting Started... 5 Creating your Login Form... 5 Full code for the example (including CSS and JavaScript):... 7 2
A Tale of the Weaknesses of Current Client-side XSS Filtering
A Tale of the Weaknesses of Current Client-side XSS Filtering Sebastian Lekies (@sebastianlekies), Ben Stock (@kcotsneb) and Martin Johns (@datenkeller) Attention hackers! These slides are preliminary!
Intell-a-Keeper Reporting System Technical Programming Guide. Tracking your Bookings without going Nuts! http://www.acorn-is.
Intell-a-Keeper Reporting System Technical Programming Guide Tracking your Bookings without going Nuts! http://www.acorn-is.com 877-ACORN-99 Step 1: Contact Marian Talbert at Acorn Internet Services at
Cross Site Scripting (XSS) and PHP Security. Anthony Ferrara NYPHP and OWASP Security Series June 30, 2011
Cross Site Scripting (XSS) and PHP Security Anthony Ferrara NYPHP and OWASP Security Series June 30, 2011 What Is Cross Site Scripting? Injecting Scripts Into Otherwise Benign and Trusted Browser Rendered
Advanced XSS. Nicolas Golubovic
Advanced XSS Nicolas Golubovic Image courtesy of chanpipat / FreeDigitalPhotos.net Today's menu 1. Starter: reboiled XSS 2. Course: spicy blacklists & filters 3. Course: sweet content sniffing 4. Course:
What about MongoDB? can req.body.input 0; var date = new Date(); do {curdate = new Date();} while(curdate-date<10000)
Security What about MongoDB? Even though MongoDB doesn t use SQL, it can be vulnerable to injection attacks db.collection.find( {active: true, $where: function() { return obj.credits - obj.debits < req.body.input;
In order for the form to process and send correctly the follow objects must be in the form tag.
Creating Forms Creating an email form within the dotcms platform, all the HTML for the form must be in the Body field of a Content Structure. All names are case sensitive. In order for the form to process
Investigation Report Regarding Security Issues of Web Applications Using HTML5
Investigation Report Regarding Security Issues of Web Applications Using HTML5 JPCERT Coordination Center October 30, 2013 Contents 1. Introduction... 2 2. Purpose and Method of This Investigation... 4
Finding XSS in Real World
Finding XSS in Real World by Alexander Korznikov [email protected] 1 April 2015 Hi there, in this tutorial, I will try to explain how to find XSS in real world, using some interesting techniques. All
c. Write a JavaScript statement to print out as an alert box the value of the third Radio button (whether or not selected) in the second form.
Practice Problems: These problems are intended to clarify some of the basic concepts related to access to some of the form controls. In the process you should enter the problems in the computer and run
InternetVista Web scenario documentation
InternetVista Web scenario documentation Version 1.2 1 Contents 1. Change History... 3 2. Introduction to Web Scenario... 4 3. XML scenario description... 5 3.1. General scenario structure... 5 3.2. Steps
Web App Security Keeping your application safe Joe Walker
Web App Security Keeping your application safe Joe Walker CSRF = Cross Site Request Forgery You are at risk of a CSRF attack whenever you assume that a request containing an authentication header (e.g.
Acunetix Website Audit. 5 November, 2014. Developer Report. Generated by Acunetix WVS Reporter (v8.0 Build 20120808)
Acunetix Website Audit 5 November, 2014 Developer Report Generated by Acunetix WVS Reporter (v8.0 Build 20120808) Scan of http://filesbi.go.id:80/ Scan details Scan information Starttime 05/11/2014 14:44:06
<?php if (Login::isLogged(Login::$_login_front)) { Helper::redirect(Login::$_dashboard_front); }
HTML5 Top 10 Threats - Stealth Attacks and Silent Exploits
HTML5 Top 10 Threats - Stealth Attacks and Silent Exploits By Shreeraj Shah, Founder & Director, Blueinfy Solutions Abstract HTML5 is an emerging stack for next generation applications. HTML5 is enhancing
Advanced Web Technology 10) XSS, CSRF and SQL Injection 2
Berner Fachhochschule, Technik und Informatik Advanced Web Technology 10) XSS, CSRF and SQL Injection Dr. E. Benoist Fall Semester 2010/2011 Table of Contents Cross Site Request Forgery - CSRF Presentation
A Tale of the Weaknesses of Current Client-Side XSS Filtering
Call To Arms: A Tale of the Weaknesses of Current Client-Side XSS Filtering Martin Johns, Ben Stock, Sebastian Lekies About us Martin Johns, Ben Stock, Sebastian Lekies Security Researchers at SAP, Uni
CTF Web Security Training. Engin Kirda [email protected]
CTF Web Security Training Engin Kirda [email protected] Web Security Why It is Important Easiest way to compromise hosts, networks and users Widely deployed ( payload No Logs! (POST Request Difficult to defend
JavaScript Basics & HTML DOM. Sang Shin Java Technology Architect Sun Microsystems, Inc. [email protected] www.javapassion.com
JavaScript Basics & HTML DOM Sang Shin Java Technology Architect Sun Microsystems, Inc. [email protected] www.javapassion.com 2 Disclaimer & Acknowledgments Even though Sang Shin is a full-time employee
Lab 5 Introduction to Java Scripts
King Abdul-Aziz University Faculty of Computing and Information Technology Department of Information Technology Internet Applications CPIT405 Lab Instructor: Akbar Badhusha MOHIDEEN Lab 5 Introduction
HTML5. Eoin Keary CTO BCC Risk Advisory. www.bccriskadvisory.com www.edgescan.com
HTML5 Eoin Keary CTO BCC Risk Advisory www.bccriskadvisory.com www.edgescan.com Where are we going? WebSockets HTML5 AngularJS HTML5 Sinks WebSockets: Full duplex communications between client or server
XSS Lightsabre techniques. using Hackvertor
XSS Lightsabre techniques using Hackvertor What is Hackvertor? Tag based conversion tool Javascript property checker Javascript/HTML execution DOM browser Saves you writing code Free and no ads! Whoo hoo!
JavaScript Security. John Graham Cumming
JavaScript Security John Graham Cumming Living in a powder keg and giving off sparks JavaScript security is a mess The security model is outdated Key examples AGacking DNS to agack JavaScript What are
Project 2: Web Security Pitfalls
EECS 388 September 19, 2014 Intro to Computer Security Project 2: Web Security Pitfalls Project 2: Web Security Pitfalls This project is due on Thursday, October 9 at 6 p.m. and counts for 8% of your course
XSS PROTECTION CHEATSHEET FOR DEVELOPERS V1.0. Author of OWASP Xenotix XSS Exploit Framework opensecurity.in
THE ULTIMATE XSS PROTECTION CHEATSHEET FOR DEVELOPERS V1.0 Ajin Abraham Author of OWASP Xenotix XSS Exploit Framework opensecurity.in The quick guide for developers to protect their web applications from
Client-side Web Engineering From HTML to AJAX
Client-side Web Engineering From HTML to AJAX SWE 642, Spring 2008 Nick Duan 1 What is Client-side Engineering? The concepts, tools and techniques for creating standard web browser and browser extensions
WEB APPLICATION SECURITY USING JSFLOW
WEB APPLICATION SECURITY USING JSFLOW Daniel Hedin SYNASC 2015 22 September 2015 Based on joint work with Andrei Sabelfeld et al. TUTORIAL WEB PAGE The tutorial web page contains more information the Tortoise
Security starts in the head(er)
Security starts in the head(er) JavaOne 2014 Dominik Schadow bridgingit Policies are independent of framework and language response.addheader(! "Policy name",! "Policy value"! ); User agent must understand
Web Accessibility Checker atutor.ca/achecker. Thursday June 18, 2015 10:08:58
Thursday June 18, 2015 10:08:58 Source URL: http://www.alentejo.portugal2020.pt Source Title: Home Accessibility Review (Guidelines: WCAG 2.0 (Level A)) Report on known problems (0 found): Congratulations!
Abusing HTML5. DEF CON 19 Ming Chow Lecturer, Department of Computer Science TuCs University Medford, MA 02155 [email protected]
Abusing HTML5 DEF CON 19 Ming Chow Lecturer, Department of Computer Science TuCs University Medford, MA 02155 [email protected] What is HTML5? The next major revision of HTML. To replace XHTML? Yes Close
Web Development 1 A4 Project Description Web Architecture
Web Development 1 Introduction to A4, Architecture, Core Technologies A4 Project Description 2 Web Architecture 3 Web Service Web Service Web Service Browser Javascript Database Javascript Other Stuff:
JavaScript and Dreamweaver Examples
JavaScript and Dreamweaver Examples CSC 103 October 15, 2007 Overview The World is Flat discussion JavaScript Examples Using Dreamweaver HTML in Dreamweaver JavaScript Homework 3 (due Friday) 1 JavaScript
Script Handbook for Interactive Scientific Website Building
Script Handbook for Interactive Scientific Website Building Version: 173205 Released: March 25, 2014 Chung-Lin Shan Contents 1 Basic Structures 1 11 Preparation 2 12 form 4 13 switch for the further step
Guide to Integrate ADSelfService Plus with Outlook Web App
Guide to Integrate ADSelfService Plus with Outlook Web App Contents Document Summary... 3 ADSelfService Plus Overview... 3 ADSelfService Plus Integration with Outlook Web App... 3 Steps Involved... 4 For
Web Application Security Considerations
Web Application Security Considerations Eric Peele, Kevin Gainey International Field Directors & Technology Conference 2006 May 21 24, 2006 RTI International is a trade name of Research Triangle Institute
UI Redressing and Clickjacking. About click fraud and data theft
: About click fraud and data theft Marcus Niemietz [email protected] Ruhr-University Bochum Chair for Network and Data Security 25th of November 2011 Short and crisp details about me Studying IT-Security/Information
Using Form Tools (admin)
EUROPEAN COMMISSION DIRECTORATE-GENERAL INFORMATICS Directorate A - Corporate IT Solutions & Services Corporate Infrastructure Solutions for Information Systems (LUX) Using Form Tools (admin) Commission
Web Application Exploits
Monday, November 10, 2014 Resources: see final slide CS342 Computer Security Department of Computer Science Wellesley College Web Evolution o Static content: Server serves web pages created by people.
JAVASCRIPT AND COOKIES
JAVASCRIPT AND COOKIES http://www.tutorialspoint.com/javascript/javascript_cookies.htm Copyright tutorialspoint.com What are Cookies? Web Browsers and Servers use HTTP protocol to communicate and HTTP
Sichere Webanwendungen mit Java
Sichere Webanwendungen mit Java Karlsruher IT- Sicherheitsinitiative 16.07.2015 Dominik Schadow bridgingit Patch fast Unsafe platform unsafe web application Now lets have a look at the developers OWASP
Hacking HTML5. http://10.10.0.1/ No VirtualBox? VirtualBox (~4 gb needed) Apache + PHP Chrome + Firefox. unpack zeronights.zip
VirtualBox (~4 gb needed) http://10.10.0.1/ No VirtualBox? Apache + PHP Chrome + Firefox unpack zeronights.zip host root dir as //localvictim and //127.0.0.1 shared folder - dir with upacked zeronights.zip
Intrusion detection for web applications
Intrusion detection for web applications Intrusion detection for web applications Łukasz Pilorz Application Security Team, Allegro.pl Reasons for using IDS solutions known weaknesses and vulnerabilities
2- Forms and JavaScript Course: Developing web- based applica<ons
2- Forms and JavaScript Course: Cris*na Puente, Rafael Palacios 2010- 1 Crea*ng forms Forms An HTML form is a special section of a document which gathers the usual content plus codes, special elements
Login with Amazon. Getting Started Guide for Websites. Version 1.0
Login with Amazon Getting Started Guide for Websites Version 1.0 Login with Amazon: Getting Started Guide for Websites Copyright 2016 Amazon Services, LLC or its affiliates. All rights reserved. Amazon
EVALUATING COMMERCIAL WEB APPLICATION SECURITY. By Aaron Parke
EVALUATING COMMERCIAL WEB APPLICATION SECURITY By Aaron Parke Outline Project background What and why? Targeted sites Testing process Burp s findings Technical talk My findings and thoughts Questions Project
Visualizing an OrientDB Graph Database with KeyLines
Visualizing an OrientDB Graph Database with KeyLines Visualizing an OrientDB Graph Database with KeyLines 1! Introduction 2! What is a graph database? 2! What is OrientDB? 2! Why visualize OrientDB? 3!
Creating Stronger, Safer, Web Facing Code. JPL IT Security Mary Rivera June 17, 2011
Creating Stronger, Safer, Web Facing Code JPL IT Security Mary Rivera June 17, 2011 Agenda Evolving Threats Operating System Application User Generated Content JPL s Application Security Program Securing
Yandex.Widgets Quick start
17.09.2013 .. Version 2 Document build date: 17.09.2013. This volume is a part of Yandex technical documentation. Yandex helpdesk site: http://help.yandex.ru 2008 2013 Yandex LLC. All rights reserved.
Chapter 22 How to send email and access other web sites
Chapter 22 How to send email and access other web sites Murach's PHP and MySQL, C22 2010, Mike Murach & Associates, Inc. Slide 1 Objectives Applied 1. Install and use the PEAR Mail package to send email
Defending against XSS,CSRF, and Clickjacking David Bishop
Defending against XSS,CSRF, and Clickjacking David Bishop University of Tennessee Chattanooga ABSTRACT Whenever a person visits a website, they are running the risk of falling prey to multiple types of
Table of Contents. Page ii
Table of Contents Abstract... 1 1. Introduction... 2 1.1 Form Validation in HTML 4... 2 1.2 Form Validation in HTML5... 3 2. HTML5 Security Concerns... 4 2.1 Web Storage Attacks... 4 3.1 Session Storage...
Web Application Security
Web Application Security John Zaharopoulos ITS - Security 10/9/2012 1 Web App Security Trends Web 2.0 Dynamic Webpages Growth of Ajax / Client side Javascript Hardening of OSes Secure by default Auto-patching
Security Model for the Client-Side Web Application Environments
Security Model for the Client-Side Web Application Environments May 24, 2007 Sachiko Yoshihama, Naohiko Uramoto, Satoshi Makino, Ai Ishida, Shinya Kawanaka, and Frederik De Keukelaere IBM Tokyo Research
Attacks on Clients: Dynamic Content & XSS
Software and Web Security 2 Attacks on Clients: Dynamic Content & XSS (Section 7.1.3 on JavaScript; 7.2.4 on Media content; 7.2.6 on XSS) sws2 1 Recap from last lecture Attacks on web server: attacker/client
UNTAMED XSS WARS FILTERS VS PAYLOADS
UNTAMED XSS WARS FILTERS VS PAYLOADS Aditya K Sood, Sr. Security Researcher Vulnerability Research Labs (VRL) COSEINC, Singapore Session ID: HT1-303 Session Track: Hackers and Threats ABOUT ME Security
Bypassing XSS Auditor: Taking Advantage of Badly Written PHP Code
Bypassing XSS Auditor: Taking Advantage of Badly Written PHP Code Anastasios Stasinopoulos, Christoforos Ntantogian, Christos Xenakis Department of Digital Systems, University of Piraeus {stasinopoulos,
Visualizing a Neo4j Graph Database with KeyLines
Visualizing a Neo4j Graph Database with KeyLines Introduction 2! What is a graph database? 2! What is Neo4j? 2! Why visualize Neo4j? 3! Visualization Architecture 4! Benefits of the KeyLines/Neo4j architecture
Universal XSS via IE8s XSS Filters
Universal XSS via IE8s XSS Filters the sordid tale of a wayward hash sign slides: http://p42.us/ie8xss/ About Us Eduardo Vela Nava aka sirdarckcat http://sirdarckcat.net http://twitter.com/sirdarckcat
<script type="text/javascript"> var _gaq = _gaq []; _gaq.push(['_setaccount', 'UA 2418840 25']); _gaq.push(['_trackpageview']);
Article Widgets for publishers
JavaScript integration guide Article Widgets for publishers 2 / 6 The use of plista Article Widgets for publishers is based on the integration of a small piece of JavaScript into the HTML code of your
Secure Coding. External App Integrations. Tim Bach Product Security Engineer salesforce.com. Astha Singhal Product Security Engineer salesforce.
Secure Coding External App Integrations Astha Singhal Product Security Engineer salesforce.com Tim Bach Product Security Engineer salesforce.com Safe Harbor Safe harbor statement under the Private Securities
Fortigate SSL VPN 4 With PINsafe Installation Notes
Fortigate SSL VPN 4 With PINsafe Installation Notes Table of Contents Fortigate SSL VPN 4 With PINsafe Installation Notes... 1 1. Introduction... 2 2. Overview... 2 2.1. Prerequisites... 2 2.2. Baseline...
Network Security Web Security
Network Security Web Security Anna Sperotto, Ramin Sadre Design and Analysis of Communication Systems Group University of Twente, 2012 Cross Site Scripting Cross Side Scripting (XSS) XSS is a case of (HTML)
Sabine Reich SAP. Test Workbench - Introduction
Sabine Reich SAP Test Workbench - Introduction Agenda 1 General Concepts 2 Functions of the Test Workbench 3 A Typical Test Procedure 4 Integration into the SAP Solution Manager SAP AG 2002, Title of Presentation,
Towards More Security in Data Exchange
Towards More Security in Data Exchange Defining Unparsers with Context-Sensitive Encoders for Context-Free Grammars Lars Hermerschmidt, Stephan Kugelmann, Bernhard Rumpe Software http://www.se-rwth.de/
Web Application Guidelines
Web Application Guidelines Web applications have become one of the most important topics in the security field. This is for several reasons: It can be simple for anyone to create working code without security
How To Fix A Web Application Security Vulnerability
Proposal of Improving Web Application Security in Context of Latest Hacking Trends RADEK VALA, ROMAN JASEK Department of Informatics and Artificial Intelligence Tomas Bata University in Zlin, Faculty of
Relax Everybody: HTML5 Is Securer Than You Think
Relax Everybody: HTML5 Is Securer Than You Think Martin Johns (@datenkeller) SAP AG Session ID: ADS-W08 Session Classification: Advanced Motivation For some reason, there is a preconception that HTML5
Dynamic Web-Enabled Data Collection
Dynamic Web-Enabled Data Collection S. David Riba, Introduction Web-based Data Collection Forms Error Trapping Server Side Validation Client Side Validation Dynamic generation of web pages with Scripting
Attacking with HTML5. By,
By, Lavakumar Kuppan w ww.andlabs.org October 18, 2010 1 Introduction: HTML5 is redefining the ground rules for future Web Applications by providing a rich set of new features and by extending existing
JavaScript: Arrays. 2008 Pearson Education, Inc. All rights reserved.
1 10 JavaScript: Arrays 2 With sobs and tears he sorted out Those of the largest size... Lewis Carroll Attempt the end, and never stand to doubt; Nothing s so hard, but search will find it out. Robert
Understanding Cross Site Scripting
Understanding Cross Site Scripting Hardik Shah Understanding cross site scripting attacks Introduction: there are many techniques which a intruder can use to compromise the webapplications. one such techniques
Application Security Testing. Erez Metula (CISSP), Founder Application Security Expert [email protected]
Application Security Testing Erez Metula (CISSP), Founder Application Security Expert [email protected] Agenda The most common security vulnerabilities you should test for Understanding the problems
InPost UK Limited GeoWidget Integration Guide Version 1.1
InPost UK Limited GeoWidget Integration Guide Version 1.1 Contents 1.0. Introduction... 3 1.0.1. Using this Document... 3 1.0.1.1. Document Purpose... 3 1.0.1.2. Intended Audience... 3 1.0.2. Background...
Exploits: XSS, SQLI, Buffer Overflow
Exploits: XSS, SQLI, Buffer Overflow These vulnerabilities continue to result in many active exploits. XSS Cross Site Scripting, comparable to XSRF, Cross Site Request Forgery. These vulnerabilities are
SQL injection attacks SQL injection user input SQL injection SQL Command parameters Database account. SQL injection attacks Data Code
SQL Injection Attack SQL injection attacks SQL injection user input SQL injection SQL Command parameters Database account Login page application database over-privileged account database Attacker SQL injection
NO SQL! NO INJECTION?
NO SQL! NO INJECTION? A talk on the state of NoSQL security IBM Cyber Security Center of Excellence Aviv Ron Alexandra Shulman-Peleg IBM AppScan Emanuel Bronshtein AVIV RON Security Researcher for IBM
Protection, Usability and Improvements in Reflected XSS Filters
Protection, Usability and Improvements in Reflected XSS Filters Riccardo Pelizzi System Security Lab Department of Computer Science Stony Brook University May 2, 2012 1 / 19 Riccardo Pelizzi Improvements
Document Structure Integrity: A Robust Basis for Cross-Site Scripting Defense
Document Structure Integrity: A Robust Basis for Cross-Site Scripting Defense Yacin Nadji Illinois Institute Of Technology Prateek Saxena UC Berkeley Dawn Song UC Berkeley 1 A Cross-Site Scripting Attack
MASTERTAG DEVELOPER GUIDE
MASTERTAG DEVELOPER GUIDE TABLE OF CONTENTS 1 Introduction... 4 1.1 What is the zanox MasterTag?... 4 1.2 What is the zanox page type?... 4 2 Create a MasterTag application in the zanox Application Store...
Tutorial: Building a Dojo Application using IBM Rational Application Developer Loan Payment Calculator
Tutorial: Building a Dojo Application using IBM Rational Application Developer Loan Payment Calculator Written by: Chris Jaun ([email protected]) Sudha Piddaparti ([email protected]) Objective In this
PHP Tutorial From beginner to master
PHP Tutorial From beginner to master PHP is a powerful tool for making dynamic and interactive Web pages. PHP is the widely-used, free, and efficient alternative to competitors such as Microsoft's ASP.
Uploaded images filter evasion for carrying out XSS attacks
February 25, 2007 Uploaded images filter evasion for carrying out XSS attacks Digitаl Security Research Group (DSecRG) Alexander Polyakov [email protected] http://dsecrg.ru Table of contents Introduction...3
Implementing Specialized Data Capture Applications with InVision Development Tools (Part 2)
Implementing Specialized Data Capture Applications with InVision Development Tools (Part 2) [This is the second of a series of white papers on implementing applications with special requirements for data
WEB DESIGN LAB PART- A HTML LABORATORY MANUAL FOR 3 RD SEM IS AND CS (2011-2012)
WEB DESIGN LAB PART- A HTML LABORATORY MANUAL FOR 3 RD SEM IS AND CS (2011-2012) BY MISS. SAVITHA R LECTURER INFORMATION SCIENCE DEPTATMENT GOVERNMENT POLYTECHNIC GULBARGA FOR ANY FEEDBACK CONTACT TO EMAIL:
HTML Web Page That Shows Its Own Source Code
HTML Web Page That Shows Its Own Source Code Tom Verhoeff November 2009 1 Introduction A well-known programming challenge is to write a program that prints its own source code. For interpreted languages,
Analysis of Browser Defenses against XSS Attack Vectors
Analysis of Browser Defenses against XSS Attack Vectors Shital Dhamal Department of Computer Engineering Lokmanya Tilak College of Engineering Koparkhairne,Navi Mumbai,Maharashtra,India Manisha Mathur
" # Portal Integration SAP AG 2004, 3
! SAP AG 2004, 2 " # Portal Integration SAP AG 2004, 3 $ %"&' # SAP Netweaver People Integration Multi Channel access Portal Coll Information Integration Information Broadcasting Pre-Calculated, online
