A WOLF IN SHEEP'S CLOTHING The Dangers of Persistent Web Browser Storage
|
|
|
- Anthony Nigel Farmer
- 10 years ago
- Views:
Transcription
1 Michael Su+on VP, Security Research A WOLF IN SHEEP'S CLOTHING The Dangers of Persistent Web Browser Storage Twi+er
2 Who Am I? Company Zscaler SaaS solu9on for web browser security VP, Security Research Background SPI Dynamics acquired by HP idefense acquired by VeriSign Research Web security Client side vulnerabili9es Fuzzing
3 Overview Background Data Privacy HTTP Cookies Flash Local SharedObjects Data Integrity and Confiden9ality Gears HTML 5 Structured Client Side Storage Future
4 Background
5 Evolu9on of Web Applica9ons Largely sta9c, site generated content Web 1.0 Dynamic, user generated content Web 2.0 Offline web applica9ons Web 3.0 Time Warner/ AOL merger Dot com bubble bursts Google IPO O Reilly Media Web 2.0 Conference Google Gears released Safari 3.1 supports HTML 5 database storage
6 Browser Storage HTTP Cookies Ini9ally supported by Mosaic Netscape v0.9 beta released Oct. 13, 1994 Internet Explorer v2.0 support in Oct Primarily used for personaliza9on/tracking RFC 2109 recommends minimum storage capacity of 4KB per cookie Flash Local Shared Objects First introduced in Flash Player 6.0 User controlled sejngs to manage Flash cookies introduced in Flash Player 8.0 Default storage capacity of 100KB (Google) Gears Launched May 31, 2007 Full local rela9onal database HTML 5 Database Storage Supported by Safari 3.1, released March 18, 2007 Full local rela9onal database
7 HTTP Cookies
8 HTTP Cookies Origin Mosaic Netscape v0.9 beta Oct. 13, 1994 Patented by Netscape in 1995 Purpose Primarily used for tracking Allow sites to iden9fy a combina9on of user, browser and computer Details Restricted by same origin policy RFC 2109 HTTP State Management Mechanism At least 4096 bytes per cookie At least 20 cookies per unique host Controllable expira9on Abuse Cookie hijacking Cookie poisoning
9 Persistent csxss
10 Sony Search
11 Sony Persistent csxss
12 Sony Persistent csxss
13 Persistent csxss Unique Aspects Persistent only on client Automa9cally triggered whenever page is revisited A+ack Poten9al Leverage for user specific XSS a+acks Not possible with tradi9onal persistent XSS Inform a+acker whenever you ve returned to a site Timing is an issue with a+acks such as CSRF Prevalence Surprisingly common, especially on sites which feature a search history
14 Flash Local SharedObjects
15 Flash LSOs Origin Flash Player 6.0 March 2002 Flash Player 8.0 User controlled sejngs to manage Flash cookies Purpose Primarily used for tracking/default sejngs Larger capacity permits use for addi9onal purposes Popular my laptop currently has LSOs from 102 domains all from regular browsing Details Default storage of 100K can be unlimited No expira9on Difficult to delete not 9ed to browser caches Abuse Cookie hijacking Cookie poisoning Data leakage
16 What s Stored in Flash LSO s? Tracking Iden9fiers Most common Configura9on Sejngs Typical on audio/video streaming sites Authen9ca9on Creden9als Pandora (Encoded password) Easter Eggs Hey. You've just found another easter egg. Congrats you gained nothing :)! Portal Flash game by Armor Games
17 SharedObject Sandboxing Programming Adobe ActionScript 3.0 for Adobe Flash SharedObjects
18 Flash LSO Storage Loca9ons Windows XP $user\applica9on Data\Macromedia\Flash Player\#SharedObjects. Windows Vista it is in each user's $user\appdata\roaming\macromedia\flash Player\#SharedObjects. Mac OS X ~/Library/Preferences/Macromedia/Flash Player/#SharedObjects. Linux /home/$user/.macromedia/flash_player/#sharedobjects.
19 LSO Files Format Binary files *.sol extension Store text data SharedObject readers FD3 SOLReader User Control Website Storage Sejngs in Flash Player Sejngs Manager Firefox add ons Objec9on, Be+er Privacy
20 Reading/Wri9ng From/To Flash Cookies Limita9ons Same origin policy Origin determined by path Sites can write LSO s at a predefined level (e.g. SharedObject.getLocal("zscaler, / )) Requirements Ability to upload SWF files Increasingly common on Web 2.0 sites Vic9m must visit site with uploaded content
21 Wri9ng To a Flash Cookie package { import flash.net.sharedobject; import flash.display.sprite; public class zscaler extends Sprite { private var user:sharedobject; private var firstname :String; private var lastname:string; public func9on zscaler() { user = SharedObject.getLocal("zscaler"); firstname = "Michael ; lastname = "Su+on"; user.data.firstname = firstname; user.data.lastname = lastname; } user.flush(); } }
22 Reading From a Flash Cookie public func9on zscaler() { var label:textfield; user = SharedObject.getLocal("zscaler"); firstname = user.data.firstname; lastname = user.data.lastname; label = new TextField(); label.autosize = TextFieldAutoSize.LEFT; label.background = true; label.border = true; label.text = "Firstname: " + firstname + "\nlastname: " + lastname; addchild(label); } user.flush();
23 Reading From a Flash Cookie
24 Pros/Cons of Flash Cookies Pros Model increases complexity of cookie stealing Sandboxing limits scope of a+acks similar to HTTP cookies Cons Greater default storage capacity (100KB) increases likelihood that storage will be used for sensi9ve data Difficult to delete No expira9on
25 (Google) Gears
26 Gears Origin Launched as Google Gears on May 31, 2007 Google dropped from project 9tle on 1 st anniversary Purpose Ini9al offline enabling applica9ons Overall close the gap between web apps and na9ve apps by giving the browser new capabili9es Details Primary components: LocalServer Local HTTP/HTTPS capable server for delivering content Database Local implementa9on of SQLite rela9onal database for storing content WorkerPool Run resource intensive JavaScript in the background to improve performance Abuse Data confiden9ality Data integrity
27 Gears Ac9va9on Allow User must permit Gears access Install SQLite database installed on local file system
28 Gears Storage Loca9ons Windows XP Internet Explorer: C:\Documents and Sejngs\<user>\Local Sejngs\Applica9on Data\Google\Google Gears for Internet Explorer Firefox: C:\Documents and Sejngs\<user>\Local Sejngs\Applica9on Data\Mozilla\Firefox\Profiles\{PROFILE}.default \Google Gears for Firefox Google Chrome: C:\Documents and Sejngs\<user>\Local Sejngs\Applica9on Data\Google\Chrome\User Data\Default \Plugin Data\Google Gears Windows Vista Internet Explorer: C:\Users\<user>\AppData\LocalLow\Google\Google Gears for Internet Explorer Firefox: C:\Users\<user>\AppData\Local\Mozilla\Firefox\Profiles\{PROFILE}.default\Google Gears for Firefox Google Chrome C:\Users\<user>\AppData\Local\Google\Chrome\User Data\Default\Plugin Data\Google Gears Mac OS X: FirefoxUsers/<user>/Library/Caches/Firefox/Profiles/{PROFILE}.default/Google Gears for Firefox Safari: ~/Library/Applica9on Support/Google/Google Gears for Safari Linux Firefox: <user>/.mozilla/firefox/{profile}.default/google Gears for Firefox Windows Mobile Mobile Internet Explorer: \Applica9on Data\Google\Google Gears for Internet Explorer
29 cssqli
30 cssqli Defini9on Ability to read/write to/from a database stored on a client machine Facilitator Browser databases are accessed via JavaScript XSS on a vulnerable site can expose any web browser to cssqli, regardless of patch level Targets Gears HTML 5
31 A Big Thank You To Paymo.biz Timeline Feb 4 Vulnerability reported to Paymo.biz Feb. 5 Ini9al response reques9ng addi9onal informa9on Feb. 5 9 Addi9onal Correspondence Feb. 9 Fix implemented Thank You Paymo went out of their way quickly respond to the reported vulnerability in order to protect their clients. They were gracious and a pleasure to work with. Web applica9on vendors everywhere can learn from their example. and they offered a free year of service! How s that for gra9tude.
32 Paymo Injec9on Point <h2>sqli</h2> <p><strong>client</strong> <a href="/clients/view/?id=16392">default Client</a></p> <p>***injection_point***</p> <div style="float: left; padding-bottom: 10px;"> Injec9on point Within paragraph tag Tag will need to be closed </p>
33 Read Paymo Data </p> <script type="text/javascript src=" <script type="text/javascript"> var db = google.gears.factory.create('beta.database'); db.open('dot_store_http zscaler_paymo_biz_client_2_0_client_html'); var data; var rs = db.execute('select * FROM DOJO_STORAGE'); while (rs.isvalidrow()) { data = data + (rs.field(0) + '@' + rs.field(1)); data = data + '\n'; rs.next(); } 1 Close paragraph tag alert(data); rs.close(); 2 Include Gears API </script> 3 Open exis9ng local database <p> 4 Execute SQL query
34 Paymo cssqli
35 Gears cssqli BulitIn SQLi Protec9on Secure db.execute('insert into MyTable values (?)', data); Insecure db.execute('insert into MyTable values (' + data + ')'); Meaningless if a site is vulnerable to XSS 67% of sites likely to have XSS [Whitehat Security December 2008]
36 SQLi vs cssqli SQLi cssqli Iden9fy database structure through verbose error messages or brute force Database structure is readily accessible Online a+acks Online and offline a+acks SQL statement must be vulnerable XSS makes any site vulnerable, regardless of SQL syntax
37 cssqli vs Cookie The Ques9on Couldn t I access the same informa9on by stealing a user s cookie and accessing their online data? Answer Cookie the does not guarantee data access Site may not use cookies for authen9ca9on Addi9onal ACLs (i.e. IP source address) would prevent access Session creden9als have expired or user has logged out Offline data does not have to mirror online data Verdict No
38 Sites Using Gears
39 Pros/Cons of Gears Pros Requires explicit user acceptance Has built in protec9ons for vulnerabili9es such as SQLi Cons Despite default protec9ons, being JavaScript based, it is open to a+ack should injec9on flaws such as XSS exist in the host applica9on Implemen9ng a secure technology on an insecure site invalidates the built in protec9ons Increases the a+ack surface cssqli is a reality Data can be remotely accessed from a local rela9onal database
40 HTML 5 Structured Client Side Storage
41 HTML 5 Origin WHATWG began work on specifica9on in 2004 W3C published first public working dra Jan. 22, 2008 Purpose New markup, APIs, error handling, etc. Includes sec9on on Structured Client Side Storage Details Session Storage Similar to HTTP session cookies with greater flexibility Local Storage Similar to HTTP persistent cookies with greater flexibility Database Storage Local rela9onal database Abuse Data confiden9ality Data integrity
42 HTML 5 Browser DB Support Internet Explorer 8 Supports session storage and local storage, not database storage Firefox Supports session storage and local storage, not database storage Safari 3.2x Full support Opera No HTML 5 support Chrome Despite using the latest branch of the local database features didn t make it into Chrome s first release Chrome s isolated sandbox system would break the built in WebKit database func9onality [monkey_bites]
43 HTML 5 Database Storage Loca9ons Mac OS X /Users/[username]/Library/Safari/ Databases Others Currently, Webkit based browsers are the only ones suppor9ng HTML Database Storage
44 HTML 5 cssqli Resources Paper by Alberto Trivero describes poten9al abuse of HTML 5 structured client side storage h+p://trivero.secdiscover.com/html5whitepaper.pdf Various issues covered including cssqli via XSS Same overall issue as demonstrated in Paymo.biz example Gears vs. HTML 5 Blog pos9ngs from Google indicate a desire to ul9mately make Gears compa9ble with the HTML 5 specifica9on
45 Explicit Acceptance Comparison of Local Storage Technologies HTTP Cookies Flash LSOs Gears HTML 5 No No Yes No Storage Limit 4KB Unlimited (100KB default) Unlimited Unlimited Expiry Custom Never Never Never File Format Text Binary Binary (SQLite) Binary (SQLite) Deployment Universal Near universal Minimal Beta only
46 How Gears and HTML 5 Change the Game for A+ackers Offline Targets can be a+acked regardless of current Internet connec9vity e.g. Offline Phishing read while from Gmail, linked clicked and Gears enabled applica9on a+acked Open No need to determine data structure for SQLi everyone has it A+ack surface Poten9ally confiden9al data moves from a single, centralized loca9on (server) to poten9ally millions of individual loca9ons (client) All targets (clients) can be a+acked from one loca9on (web app w/ XSS vuln.)
47 Predic9ons Adop9on Expect increased adop9on of Gears thanks to favorable exposure from Gmail integra9on HTML 5 and Gears are unlikely to compete Google has already expressed a desire to make Gears compa9ble with the HTML 5 specifica9on Vulnerable Sites Sites will con9nue to push the limits of widely adopted technologies such as HTTP cookies and Flash LSOs, resul9ng in exploitable vulnerabili9es A significant por9on of sites adop9ng local database technologies will have injec9on flaws that leave them open to a+ack A+acks A+ack prevalence will increase in propor9on to adop9on rates
48 Ques9ons? Michael Su+on VP, Security Research h+p://research.zscaler.com
AJAX Storage: A Look at Flash Cookies and Internet Explorer Persistence
AJAX Storage: A Look at Flash Cookies and Internet Explorer Persistence Corey Benninger The AJAX Storage Dilemna AJAX (Asynchronous JavaScript and XML) applications are constantly looking for ways to increase
VoIP Security How to prevent eavesdropping on VoIP conversa8ons. Dmitry Dessiatnikov
VoIP Security How to prevent eavesdropping on VoIP conversa8ons Dmitry Dessiatnikov DISCLAIMER All informa8on in this presenta8on is provided for informa8on purposes only and in no event shall Security
Adobe Flash Player and Adobe AIR security
Adobe Flash Player and Adobe AIR security Both Adobe Flash Platform runtimes Flash Player and AIR include built-in security and privacy features to provide strong protection for your data and privacy,
UAB Cyber Security Ini1a1ve
UAB Cyber Security Ini1a1ve Purpose of the Cyber Security Ini1a1ve? To provide a secure Compu1ng Environment Individual Mechanisms Single Source for Inventory and Asset Management Current Repor1ng Environment
Developing Offline Web Application
Developing Offline Web Application Kanda Runapongsa Saikaew ([email protected]) Art Nanakorn Thana Pitisuwannarat Computer Engineering Khon Kaen University, Thailand 1 Agenda Motivation Offline web application
Adding Value to Automated Web Scans. Burp Suite and Beyond
Adding Value to Automated Web Scans Burp Suite and Beyond Automated Scanning vs Manual Tes;ng Manual Tes;ng Tools/Suites At MSU - QualysGuard WAS & Burp Suite Automated Scanning - iden;fy acack surface
How To Understand The History Of The Web (Web)
(World Wide) Web WWW A way to connect computers that provide information (servers) with computers that ask for it (clients like you and me) uses the Internet, but it's not the same as the Internet URL
Mobile Applica,on and BYOD (Bring Your Own Device) Security Implica,ons to Your Business. Dmitry Dessiatnikov
Mobile Applica,on and BYOD (Bring Your Own Device) Security Implica,ons to Your Business Dmitry Dessiatnikov DISCLAIMER All informa,on in this presenta,on is provided for informa,on purposes only and in
ADOBE FLASH PLAYER Local Settings Manager
ADOBE FLASH PLAYER Local Settings Manager Legal notices Legal notices For legal notices, see http://help.adobe.com/en_us/legalnotices/index.html. iii Contents Storage...............................................................................................................
HTML5 and security on the new web
HTML5 and security on the new web By James Lyne, Director of Technology Strategy There are lots of changes happening to the key technologies that power the web. The new version of HTML, the dominant web
CSE598i - Web 2.0 Security OWASP Top 10: The Ten Most Critical Web Application Security Vulnerabilities
CSE598i - Web 2.0 Security OWASP Top 10: The Ten Most Critical Web Application Security Vulnerabilities Thomas Moyer Spring 2010 1 Web Applications What has changed with web applications? Traditional applications
Alexander Polyakov CTO ERPScan
Invest in security to secure investments ERP Security. Myths, Problems, Solu6ons Alexander Polyakov CTO ERPScan About ERPScan The only 360- degree SAP Security solu8on - ERPScan Security Monitoring Suite
Defending Against Web App A0acks Using ModSecurity. Jason Wood Principal Security Consultant Secure Ideas
Defending Against Web App A0acks Using ModSecurity Jason Wood Principal Security Consultant Secure Ideas Background Info! Penetra?on Tester, Security Engineer & Systems Administrator!!!! Web environments
The Risks of Client-Side Data Storage From cookie to database
The Risks of Client-Side Data Storage From cookie to database GOVCERT.NL Symposium - 15 November 2010 Agenda Client-Side Data Storage (CSDS): What it is Why it s used How it s implemented Demo SecurSearch
Checking Browser Settings, and Basic System Requirements for QuestionPoint
Checking Browser Settings, and Basic System Requirements for QuestionPoint This document covers basic IE settings and system requirements necessary for QuestionPoint. These settings and requirements apply
Hack Yourself First. Troy Hunt @troyhunt troyhunt.com [email protected]
Hack Yourself First Troy Hunt @troyhunt troyhunt.com [email protected] We re gonna turn you into lean, mean hacking machines! Because if we don t, these kids are going to hack you Jake Davies, 19 (and
Abusing HTML5. DEF CON 19 Ming Chow Lecturer, Department of Computer Science TuCs University Medford, MA 02155 [email protected]
Abusing HTML5 DEF CON 19 Ming Chow Lecturer, Department of Computer Science TuCs University Medford, MA 02155 [email protected] What is HTML5? The next major revision of HTML. To replace XHTML? Yes Close
Telephone Related Queries (TeRQ) IETF 85 (Atlanta)
Telephone Related Queries (TeRQ) IETF 85 (Atlanta) Telephones and the Internet Our long- term goal: migrate telephone rou?ng and directory services to the Internet ENUM: Deviated significantly from its
How To Manage A Mobile Device Management At Harvard
Demys&fying Mobile Device Management Challenges Indir Avdagic Director of Informa.on Security and Risk Management, SEAS Objec&ves Our hope is that this conversa0on will get people thinking about mobile
Web Tracking for You. Gregory Fleischer
Web Tracking for You Gregory Fleischer 1 INTRODUCTION 2 Me Gregory Fleischer Senior Security Consultant at FishNet Security 3 Disclaimer Why do you hate? 4 Reasons For Tracking TradiFonal reasons for tracking
HTML5 the new. standard for Interactive Web
WHITE PAPER HTML the new standard for Interactive Web by Gokul Seenivasan, Aspire Systems HTML is everywhere these days. Whether desktop or mobile, windows or Mac, or just about any other modern form factor
Web Application Worms & Browser Insecurity
Web Application Worms & Browser Insecurity Mike Shema Welcome Background Hacking Exposed: Web Applications The Anti-Hacker Toolkit Hack Notes: Web Security Currently working at Qualys
Frequently Asked Questions Ag Banking Online
Table of Contents Note: To quickly navigate to the answer, click on the question. What is Multi-Factor Authentication (MFA) and its purpose?... 2 This is my first time accessing the online application.
Tidspunkt 18-08-2015 11:58 01-07-2015 00:00-18-08-2015 23:59 (49 dag(e)) Operativsystem (OS) fordelt på browsere Total: 267852. Safari9 ios 7921 100%
Indstillinger Tidspunkt 18-08-2015 11:58 Periode 01-07-2015 00:00-18-08-2015 23:59 (49 dag(e)) Operativsystem (OS) fordelt på browsere Total: 267852 Safari9 ios 7921 100% MAC OS X 1 0% Safari8 ios 572
Instructions for Configuring Your Browser Settings and Online Security FAQ s. ios8 Settings for iphone and ipad app
Instructions for Configuring Your Browser Settings and Online Security FAQ s ios8 Settings for iphone and ipad app General Settings The following browser settings and plug-ins are required to properly
Offensive & Defensive & Forensic Techniques for Determining Web User Iden<ty
Offensive & Defensive & Forensic Techniques for Determining Web User Iden
ArcGIS Server Security Threats & Best Practices 2014. David Cordes Michael Young
ArcGIS Server Security Threats & Best Practices 2014 David Cordes Michael Young Agenda Introduction Threats Best practice - ArcGIS Server settings - Infrastructure settings - Processes Summary Introduction
Web Application Vulnerability Testing with Nessus
The OWASP Foundation http://www.owasp.org Web Application Vulnerability Testing with Nessus Rïk A. Jones, CISSP [email protected] Rïk A. Jones Web developer since 1995 (16+ years) Involved with information
How to break in. Tecniche avanzate di pen testing in ambito Web Application, Internal Network and Social Engineering
How to break in Tecniche avanzate di pen testing in ambito Web Application, Internal Network and Social Engineering Time Agenda Agenda Item 9:30 10:00 Introduction 10:00 10:45 Web Application Penetration
Deepak Patil (Technical Director) [email protected] iasys Technologies Pvt. Ltd.
Deepak Patil (Technical Director) [email protected] iasys Technologies Pvt. Ltd. The term rich Internet application (RIA) combines the flexibility, responsiveness, and ease of use of desktop applications
Project 2: Web Security Pitfalls
EECS 388 September 19, 2014 Intro to Computer Security Project 2: Web Security Pitfalls Project 2: Web Security Pitfalls This project is due on Thursday, October 9 at 6 p.m. and counts for 8% of your course
Still Aren't Doing. Frank Kim
Ten Things Web Developers Still Aren't Doing Frank Kim Think Security Consulting Background Frank Kim Consultant, Think Security Consulting Security in the SDLC SANS Author & Instructor DEV541 Secure Coding
Authen'cator Leakage Through Backup Channels on Android
Authen'cator Leakage Through Backup Channels on Android Guangdong Bai Na'onal University of Singapore Web services are increasingly delivered through mobile apps Social Networking Online Banking Email
Revisiting SQL Injection Will we ever get it right? Michael Sutton, Security Evangelist
Revisiting SQL Injection Will we ever get it right? Michael Sutton, Security Evangelist Overview Background What it is? How are we doing? Web 2.0 SQL injection meets AJAX Fuggle SQL Injection meets Google
Web Application Penetration Testing
Web Application Penetration Testing 2010 2010 AT&T Intellectual Property. All rights reserved. AT&T and the AT&T logo are trademarks of AT&T Intellectual Property. Will Bechtel [email protected]
NETWORK DEVICE SECURITY AUDITING
E-SPIN PROFESSIONAL BOOK VULNERABILITY MANAGEMENT NETWORK DEVICE SECURITY AUDITING ALL THE PRACTICAL KNOW HOW AND HOW TO RELATED TO THE SUBJECT MATTERS. NETWORK DEVICE SECURITY, CONFIGURATION AUDITING,
The Prevalence of Flash Vulnerabilities on the Web
TECHNICAL BRIEF FLASH FLOODING The Prevalence of Flash Vulnerabilities on the Web Adobe Flash Player is a cross-platform, browser plugin that provides uncompromised viewing of expressive applications,
Kaseya Fundamentals Workshop DAY THREE. Developed by Kaseya University. Powered by IT Scholars
Kaseya Fundamentals Workshop DAY THREE Developed by Kaseya University Powered by IT Scholars Kaseya Version 6.5 Last updated March, 2014 Day Two Overview Day Two Lab Review Patch Management Configura;on
Web Browser. Fetches/displays documents from web servers. Mosaic 1993
HTML5 and CSS3 Web Browser Fetches/displays documents from web servers Mosaic 1993 Firefox,IE,Chrome,Safari,Opera,Lynx,Mosaic,Konqueror There are standards, but wide variation in features Desktop Browser
System Administration Training Guide. S100 Installation and Site Management
System Administration Training Guide S100 Installation and Site Management Table of contents System Requirements for Acumatica ERP 4.2... 5 Learning Objects:... 5 Web Browser... 5 Server Software... 5
Bacula Open Source Project Bacula Systems (professional support)
Bacula Open Source Project Bacula Systems (professional support) The Enterprise Ready Open Source Network Backup Solu
Technical Guide for Remote access
Technical Guide for Remote access Frequently Asked Questions about using EZ Proxy to access Library resources off campus. Login Help Who is allowed access? I m having trouble logging in. Finding Articles
(WAPT) Web Application Penetration Testing
(WAPT) Web Application Penetration Testing Module 0: Introduction 1. Introduction to the course. 2. How to get most out of the course 3. Resources you will need for the course 4. What is WAPT? Module 1:
Web applications. Web security: web basics. HTTP requests. URLs. GET request. Myrto Arapinis School of Informatics University of Edinburgh
Web applications Web security: web basics Myrto Arapinis School of Informatics University of Edinburgh HTTP March 19, 2015 Client Server Database (HTML, JavaScript) (PHP) (SQL) 1 / 24 2 / 24 URLs HTTP
CYCLOPE let s talk productivity
Cyclope 6 Installation Guide CYCLOPE let s talk productivity Cyclope Employee Surveillance Solution is provided by Cyclope Series 2003-2014 1 P age Table of Contents 1. Cyclope Employee Surveillance Solution
Next Generation Clickjacking
Next Generation Clickjacking New attacks against framed web pages Black Hat Europe, 14 th April 2010 Paul Stone [email protected] Coming Up Quick Introduction to Clickjacking Four New Cross-Browser
Web Development. How the Web Works 3/3/2015. Clients / Server
Web Development WWW part of the Internet (others: Email, FTP, Telnet) Loaded to a Server Viewed in a Browser (Client) Clients / Server Client: Request & Render Content Browsers, mobile devices, screen
Complete Patch Management
Complete Patch Management Complete - Flexible Unique In- Depth Secunia CSI 7 Corporate Software Inspector Take control of the vulnerability threat and optimize your IT security investments. The Secunia
Web Application Hacking (Penetration Testing) 5-day Hands-On Course
Web Application Hacking (Penetration Testing) 5-day Hands-On Course Web Application Hacking (Penetration Testing) 5-day Hands-On Course Course Description Our web sites are under attack on a daily basis
1. Introduction. 2. Web Application. 3. Components. 4. Common Vulnerabilities. 5. Improving security in Web applications
1. Introduction 2. Web Application 3. Components 4. Common Vulnerabilities 5. Improving security in Web applications 2 What does World Wide Web security mean? Webmasters=> confidence that their site won
Five Tips to Reduce Risk From Modern Web Threats
Five Tips to Reduce Risk From Modern Web Threats By Chris McCormack, Senior Product Marketing Manager and Chester Wisniewski, Senior Security Advisor Modern web threats can infect your network, subvert
Top 10 most interes.ng SAP vulnerabili.es and a9acks
Invest in security to secure investments Top 10 most interes.ng SAP vulnerabili.es and a9acks Alexander Polyakov CTO at ERPScan About ERPScan The only 360- degree SAP Security solu8on - ERPScan Security
Security testing the Internet-of-things
Security testing the Internet-of-things Lindholmen Software Development Day 2014-10-16 Emilie Lundin Barse Informa(on Security Consultant, Combitech [email protected] Contents State of security
Web Conferencing Version 8.3 Troubleshooting Guide
System Requirements General Requirements Web Conferencing Version 8.3 Troubleshooting Guide Listed below are the minimum requirements for participants accessing the web conferencing service. Systems which
Adobe Systems Incorporated
Adobe Connect 9.2 Page 1 of 8 Adobe Systems Incorporated Adobe Connect 9.2 Hosted Solution June 20 th 2014 Adobe Connect 9.2 Page 2 of 8 Table of Contents Engagement Overview... 3 About Connect 9.2...
Cyber Security Presentation Cyber Security Month Curtis McNay, Director of IT Security
Cyber Security Presentation Cyber Security Month Curtis McNay, Director of IT Security The IT Security Office (ITSO) What We Do? Risk Assessment Network and System Security Monitoring Vulnerability Scanning
2X Cloud Portal v10.5
2X Cloud Portal v10.5 URL: www.2x.com E-mail: [email protected] Information in this document is subject to change without notice. Companies, names, and data used in examples herein are fictitious unless otherwise
An Insight into Cookie Security
An Insight into Cookie Security Today most websites and web based applications use cookies. Cookies are primarily used by the web server to track an authenticated user or other user specific details. This
Privacy- Preserving P2P Data Sharing with OneSwarm. Presented by. Adnan Malik
Privacy- Preserving P2P Data Sharing with OneSwarm Presented by Adnan Malik Privacy The protec?on of informa?on from unauthorized disclosure Centraliza?on and privacy threat Websites Facebook TwiFer Peer
Is Drupal secure? A high-level perspective on web vulnerabilities, Drupal s solutions, and how to maintain site security
Is Drupal secure? A high-level perspective on web vulnerabilities, Drupal s solutions, and how to maintain site security Presented 2009-05-29 by David Strauss Thinking Securely Security is a process, not
Chapter 1 Web Application (In)security 1
Introduction xxiii Chapter 1 Web Application (In)security 1 The Evolution of Web Applications 2 Common Web Application Functions 4 Benefits of Web Applications 5 Web Application Security 6 "This Site Is
Live Guide System Architecture and Security TECHNICAL ARTICLE
Live Guide System Architecture and Security TECHNICAL ARTICLE Contents 1. Introduction... 2 2. Hosting Environment... 2 2.1. Standards - Compliancy... 3 2.2. Business Continuity Management... 3 2.3. Network
Portal Instructions for Mac
Portal Instructions for Mac Table of Contents Introduction... 1 Preparing Safari... 2 Advanced Access Instructions... 3 Installing Java... 3 Setting the Default Browser... 3 Installing the Browser Plug-in...
Check list for web developers
Check list for web developers Requirement Yes No Remarks 1. Input Validation 1.1) Have you done input validation for all the user inputs using white listing and/or sanitization? 1.2) Does the input validation
Where every interaction matters.
Where every interaction matters. Peer 1 Vigilant Web Application Firewall Powered by Alert Logic The Open Web Application Security Project (OWASP) Top Ten Web Security Risks and Countermeasures White Paper
Assessing BYOD with the Smarthpone Pentest Framework. Georgia Weidman
Assessing BYOD with the Smarthpone Pentest Framework Georgia Weidman BYOD Is Not New Contractor Laptop Rogue Access Point Gaming Console Tradi>onal Vulnerability Scanning The iphone in Ques>on Is
HTML5. Eoin Keary CTO BCC Risk Advisory. www.bccriskadvisory.com www.edgescan.com
HTML5 Eoin Keary CTO BCC Risk Advisory www.bccriskadvisory.com www.edgescan.com Where are we going? WebSockets HTML5 AngularJS HTML5 Sinks WebSockets: Full duplex communications between client or server
Bank Hacking Live! Ofer Maor CTO, Hacktics Ltd. ATC-4, 12 Jun 2006, 4:30PM
Bank Hacking Live! Ofer Maor CTO, Hacktics Ltd. ATC-4, 12 Jun 2006, 4:30PM Agenda Introduction to Application Hacking Demonstration of Attack Tool Common Web Application Attacks Live Bank Hacking Demonstration
Thomas Röthlisberger IT Security Analyst [email protected]
Thomas Röthlisberger IT Security Analyst [email protected] Compass Security AG Werkstrasse 20 Postfach 2038 CH-8645 Jona Tel +41 55 214 41 60 Fax +41 55 214 41 61 [email protected] www.csnc.ch What
Domain Name System Security
Domain Name System Security Guevara Noubir Network Security Northeastern University 1 Domain Name System DNS is a fundamental applica=on layer protocol Not visible but invoked every =me a remote site is
Cyber Security Challenge Australia 2014
Cyber Security Challenge Australia 2014 www.cyberchallenge.com.au CySCA2014 Web Penetration Testing Writeup Background: Pentest the web server that is hosted in the environment at www.fortcerts.cysca Web
Web application security
Web application security Sebastian Lopienski CERN Computer Security Team openlab and summer lectures 2010 (non-web question) Is this OK? int set_non_root_uid(int uid) { // making sure that uid is not 0
STOPPING LAYER 7 ATTACKS with F5 ASM. Sven Müller Security Solution Architect
STOPPING LAYER 7 ATTACKS with F5 ASM Sven Müller Security Solution Architect Agenda Who is targeted How do Layer 7 attacks look like How to protect against Layer 7 attacks Building a security policy Layer
How To Protect Virtualized Data From Security Threats
S24 Virtualiza.on Security from the Auditor Perspec.ve Rob Clyde, CEO, Adap.ve Compu.ng; former CTO, Symantec David Lu, Senior Product Manager, Trend Micro Hemma Prafullchandra, CTO/SVP Products, HyTrust
Magento Security and Vulnerabilities. Roman Stepanov
Magento Security and Vulnerabilities Roman Stepanov http://ice.eltrino.com/ Table of contents Introduction Open Web Application Security Project OWASP TOP 10 List Common issues in Magento A1 Injection
Conducting Web Application Pentests. From Scoping to Report For Education Purposes Only
Conducting Web Application Pentests From Scoping to Report For Education Purposes Only Web App Pen Tests According to OWASP: A Web Application Penetration Test focuses only on evaluating the security of
Main Research Gaps in Cyber Security
Comprehensive Approach to cyber roadmap coordina5on and development Main Research Gaps in Cyber Security María Pilar Torres Bruna everis Aerospace and Defence Index CAMINO WP2: Iden8fica8on and Analysis
Mirtrak 6 Powered by Cyclope
Mirtrak 6 Powered by Cyclope Installation Guide Mirtrak Activity Monitoring Solution v6 is powered by Cyclope Series 2003-2013 Info Technology Supply Ltd. 2 Hobbs House, Harrovian Business Village, Bessborough
Webapps Vulnerability Report
Tuesday, May 1, 2012 Webapps Vulnerability Report Introduction This report provides detailed information of every vulnerability that was found and successfully exploited by CORE Impact Professional during
Cyber Security Workshop Ethical Web Hacking
Cyber Security Workshop Ethical Web Hacking May 2015 Setting up WebGoat and Burp Suite Hacking Challenges in WebGoat Concepts in Web Technologies and Ethical Hacking 1 P a g e Downloading WebGoat and Burp
ASL IT SECURITY BEGINNERS WEB HACKING AND EXPLOITATION
ASL IT SECURITY BEGINNERS WEB HACKING AND EXPLOITATION V 2.0 A S L I T S e c u r i t y P v t L t d. Page 1 Overview: Learn the various attacks like sql injections, cross site scripting, command execution
Web Applica+on Security: Be Offensive! About Me
Web Applica+on Security: Be Offensive! Eric Johnson Cypress Data Defense 1 About Me Eric Johnson (Twi
Web Application Report
Web Application Report This report includes important security information about your Web Application. Security Report This report was created by IBM Rational AppScan 8.5.0.1 11/14/2012 8:52:13 AM 11/14/2012
FINAL DoIT 04.01.2013- v.8 APPLICATION SECURITY PROCEDURE
Purpose: This procedure identifies what is required to ensure the development of a secure application. Procedure: The five basic areas covered by this document include: Standards for Privacy and Security
Detecting Web Application Vulnerabilities Using Open Source Means. OWASP 3rd Free / Libre / Open Source Software (FLOSS) Conference 27/5/2008
Detecting Web Application Vulnerabilities Using Open Source Means OWASP 3rd Free / Libre / Open Source Software (FLOSS) Conference 27/5/2008 Kostas Papapanagiotou Committee Member OWASP Greek Chapter [email protected]
Hacking Web Apps. Detecting and Preventing Web Application Security Problems. Jorge Blanco Alcover. Mike Shema. Technical Editor SYNGRESS
Hacking Web Apps Detecting and Preventing Web Application Security Problems Mike Shema Technical Editor Jorge Blanco Alcover AMSTERDAM BOSTON HEIDELBERG LONDON NEW YORK OXFORD PARIS SAN DIEGO SAN FRANCISCO
PLATO Learning Environment System and Configuration Requirements for workstations. October 27th, 2008
PLATO Learning Environment System and Configuration Requirements for workstations October 27th, 2008 Windows 2000 Professional with SP4 Windows XP Professional with SP2 Windows XP Home Edition with SP2
