Dissecting Java Server Faces for Penetration Testing
|
|
|
- Allen Patterson
- 10 years ago
- Views:
Transcription
1 Dissecting Java Server Faces for Penetration Testing Aditya K Sood (Cigital Labs) & Krishna Raja (Security Compass) Version 0.1 August 25, 2011 Abstract This paper sheds light on the findings of security testing of Java Server Faces (JSF). JSF has been widely used as an open source web framework for developing efficient applications using J2EE. JSF is compared with ASP.NET framework to unearth potential security flaws. 1
2 Contents 1 Acknowledgments 3 2 Overview 4 3 Inside JSF Framework JSF Security Architecture JSF Faces-Config.xml and Web.xml Penetration Testing JSF Framework JSF ViewState Anatomy Differential Behavior - ViewState in ASP.NET and JSF Scrutinizing Padding - Testing Oracle Experiment - Fuzzing Oracle JSF Anti CSRF - Truth Behind the Scenes Implementing CSRF Protection - The Right Way Security Descriptors Fallacy - Configuration Secure Way of Configuring Security Descriptors JSF Version Tracking and Disclosure JSF Data Validation JSF 1.2 Validation JSF 2.0 Validation Custom Validations Conclusion 20 6 About the Authors 21 7 References 22 2
3 1 Acknowledgments We would like to thank couple of our friends and security researchers who helped us in shaping this paper. Giorge Maone (NoScript) Juliano Rizzo (Netifera) In addition, we would also like to thank Gary McGraw for providing useful insight into the paper. A sincere gratitude to all the researchers who are engaged in constructive research for the security community. Lastly, we sincerely want to thank our security teams at SecNiche Security Labs and Security Compass respectively for supporting us in doing security research. 3
4 2 Overview In present times, software security has become an indispensable part of software development life cycle. The penetration testing approach varies with respect to web development frameworks and platforms. With the advent of advanced level of attacks, it has become crucial to raise the standards of penetration testing. An aggressive security testing approach is required to detect the inherent vulnerabilities and to develop robust security solutions in order to thwart sophisticated attacks. Owing to the seamless pace of security research, a plethora of vulnerabilities are being unearthed in web frameworks and software. Thus, for effective penetration testing, the security model and web framework architecture should be dissected appropriately. OWASP has been used widely as the de facto standard of penetration testing of web applications and frameworks with its Top 10 attack vectors. However, the penetration testing methodology should not be constrained to this standard and must cover the advanced set of attack vectors that should be tested to validate the strength of web frameworks. This paper is divided into two parts. In the first part, we discuss the internals of JSF, a Java based web application framework and its inherent security model. In the second part, we discuss about the security weaknesses and applied security features in the JSF. In addition, we also raise a flag on the security issues present in JSF in order to conduct effective penetration testing. 4
5 3 Inside JSF Framework Java Server Faces (JSF) is an industry standard and a framework for building component-based user interfaces for web applications. JSF has certain standards and is implemented using Reference Implementation (RI) by Sun Microsystems, Apache MyFaces and Oracles ADF Faces. JSF primarily consists of Java Beans, Event Driven development and JSF component tree. With the advent of JSF, the control has been handed over to the developers for implementing security features such as authorization. As a result of this change, it has become more crucial for the developers to understand the implementation of security controls in JSF framework. A good security design practice requires that authorization (security controls) should be handled at a central location (Servlet Filter associated with the application front controller). JSF has built-in extension points provided by the JSF architecture. As JSF has no proprietary security architecture, the security has to be imposed in a customized fashion. This is usually done in two ways The developer can design a custom ViewHandler that adds security checks for createview and restoreview. However, it is not considered as the best security practice because there is no guarantee that the custom security ViewHandler is executed before the default ViewHandler. This leads to security exceptions while handling requests from the web clients The developer can design a phaselistener that adds security definitions to restoreview and invokeaction phases. This can be implemented in JSF faces-config.xml file or the developer can do it dynamically by writing a customphase listener. 3.1 JSF Security Architecture JSF is used for designing web based rich internet applications over the J2EE framework. Java applications are mostly designed using Model, View, and Controller (MVC) architecture due to the need for real time deployment. J2EE security can be implemented through Java Authentication and Authorization Service (JAAS) and container-managed security. JAAS implements fine-grained access control through external Java permission classes, which provides user with a list of resources and allowed actions. Before J2EE, the security controls were implemented within the logic itself. J2EE framework has a declarative security mechanism in which security controls are applied through web.xml deployment descriptors which in turn are handled by the J2EE container at runtime. In container managed security, controls are applied using authorization which is explicitly enforced on the URL patterns (requests that are issued by the web client). Generally, the controller is responsible for implementing security controls whereas the view and model part are used for hiding information and applying logic based on the access roles of the user respectively. However, a good design 5
6 practice suggests that the security should be implemented over all three layers. as presented in figure 1. Figure 1: MVC - Model View and Controller Architecture JSF has implemented the concept of validators which can be used to verify user input at a view level and model level JSF Faces-Config.xml and Web.xml The rich life cycle of various individual phases are explicitly specified in the facesconfig.xml file. Some of the events included in the file are Restore View, Apply Request Values, Process Validation, Update Model Values, Invoke Application, and Render Response. Developers should always consider the fact that facesconfig.xml file has no mention of security and all security constraints must be specified in web.xml file. 6
7 4 Penetration Testing JSF Framework In this section, we are going to present the variation in the applied security model in JSF frameworks, security weaknesses and the right way to test them. 4.1 JSF ViewState Anatomy JSF uses ViewState functionality as similar to ASP.NET. However, there are certain differences in the way JSF and ASP.NET handle ViewState. Generally, as we all know, the ViewState parameter is used to maintain the state of HTTP request specific to a web page. This functionality proves beneficial, but it requires appropriate implementation in the deployed environment. It has been noticed that ViewState analysis of ASP.NET and JSF is misunderstood Differential Behavior - ViewState in ASP.NET and JSF There are number of differences in ViewState implementation in JSF and ASP.NET which should be taken into consideration while performing analysis of the View- State. These are discussed as follows JSF does not encrypt the ViewState parameters by default. JSF works on the concept of serialization and compression. In general scenarios, once the information is serialized, it is compressed using the GZIP algorithm before being pushed onto a base-64 encoder. Mojarra displays this behavior, whereas latest versions of Apache My faces perform encryption by default but MAC is not enabled (prone to padding oracle attack). Compression plays a critical role in optimizing requests in JSF and this is primarily implemented through the com.sun.faces.compressviewstate context parameter. JSF also uses the com.sun.faces.compressjavascript context parameter to remove the whitespaces in rendering JavaScript. However, this parameter does not have much impact on security testing. In Apache JSF and Mojarra (SUNs RI), the encryption of ViewState is only possible through explicit declaration in the Java Naming and Declaration Interface (JNDI) using a password string as presented in listing 1. <env entry> <env entry name>com. sun. f a c e s. ClientStateSavingPassword </env entry name> <env entry type>java. lang. String </env entry type> <env entry value >[ Provide Random Value ] </ env entry value> </env entry> Listing 1: Implementing Encryption using JNDI In ASP.NET applications, session state is enabled by default which requires session cookies to navigate through browser sessions, which is well 7
8 understood. In ASP.Net, the ViewStateEncryptionMode.Auto mode is set by default which decides whether a specific web page has to have an encrypted ViewState or not in order to reduce the processing load. However, it is always advised to encrypt the full ViewState in every webpage by declaring the <%@Page ViewStateEncryptionMode= Always %> property. This ensures that ViewState data could not be retrieved. In ASP.NET, Message Authentication Code (MAC) is also computed by default and appended in the base 64 encoding in order to avoid the tampering of ViewState with arbitrary data. The biggest problem in implementing MAC is that it has to be explicitly specified on the webpage with the enabledviewstatemac parameter to be true otherwise MAC is not enabled by default. It is advised that the MAC key should be larger in size in order to reduce the attack surface. Usually, the GUID of the machine is used as a MAC key. Some of the generic ViewState decoders which fail in JSF may work fine in ASP.NET ViewState decoding. ViewState decoder designed by plural-sight [2] fails for JSF and works fine for ASP.NET as it only works in.net environment. Figure 2 shows that tool raises red alert while handling JSF ViewState and should not be used for the analysis of JSF ViewState. Figure 2: ViewState Decoder Fails for JSF 8
9 Netifera group has also released a tool termed as POET [3] which should be used for testing ViewState in JSF. Figure 2 shows the successful decoding of ViewState in JSF. However, some of the data is gzipped which can be further unzipped fully. Even this information raises an alert about the insecure implementation of ViewState in JSF. Figure 3: Successful Decoding of ViewState One can also use the Deface [4],[5] tool for testing ViewState in JSF which is released by SpiderLabs for aggressive testing of JSF framework. 4.2 Scrutinizing Padding - Testing Oracle With the advent of new technologies, more sophisticated attack patterns are being noticed in the routine life. Last year, the discovery of padding oracle attacks [6] has dismantled the implementation of encryption in web frameworks. 9
10 Due to the padding problem, it is possible to decrypt the ViewState effectively. In certain versions of ASP.NET, it is possible to download the web.config file on the local machine by decrypting the content of files using padding oracle attacks. This is implemented by exploiting the encrypted string that is passed to ScriptResource.axd and WebResource.axd and padding it appropriately. Microsoft released patches for the insecure cryptographic implementation in ASP.NET due to padding oracle attacks [10]. It was noticed that some of the applied patches were not correct and robust. Figure 3 shows how exactly the robustness of applied patch can be verified. As demonstrated at IEEE Security Symposium this year, it is possible to build rogue requests using padding oracle which can be further exploited to query sensitive information from the web server. This has proved the fact that erroneous implementation of cryptography [7] can seriously dismantle the system and the web is no exception. Figure 4: Checking Validity of Applied Patch [WebResource.axd/ ScriptResource.axd] This can be successfully done through Padbuster [8] tool in ASP.NET. However, this tool and its variant successfully work for vulnerable versions of ASP.NET, provided insecure encryption is applied. This tool has also been added in the latest version of Backtrack penetration testing framework. The padding oracle attacks can be successfully conducted in JSF. The first step is that encryption is not applied in ViewState by default (Mojarra frameworks). Even if encryption is applied in certain deployed JSF frameworks (Apache MyFaces), the integrity is not protected using MAC as discussed earlier by default. This is the most frivolous flaw that is impacting JSF at 10
11 a large scale. A number of websites using JSF in a real time environment are still vulnerable and are running in default insecure state. The ViewState encryption strength in JSF can be checked using POET as discussed. The tool verifies whether the encryption is applied or not. If it is applied, then it has an inbuilt module to decrypt the ViewState using oracle padding. The tool follows the concept of tampering a single byte in the encrypted JSF ViewState (last block) to verify whether ViewState padding is done appropriately or not based on HTTP error fingerprinting. JSF usually ignores the inserted block during serialization which helps the tool to go on decrypting the ViewState without any hassles. The practical usage of tool can be seen here [9] Experiment - Fuzzing Oracle We conducted a number of tests on one of the vulnerable websites to show the impacts of the padding oracle. The tests are based on manual fuzzing. The aim is to present the variation in the error responses when encrypted ViewState is tampered. One thing that should be taken into account while performing this test is that ViewState has to be encrypted. The test should not be executed against ViewState that is compressed using GZIP. In addition, the ViewState should be fuzzed using multiples of 8 because the block size that is used in CBC encryption has a similar technique. The nature of a response to a padded buffer varies between applications. Step 1: Injecting random buffer in ViewState as a multiple of 8. Figure 5 shows how the application reacts. Step 2: At this point, we got a crypto padding error in step 2, on continuous playing around with padding in ViewState; we received different error as presented in figure 6. Considering this scenario, one can continue fuzzing the request, until it is accepted by the application. There is a typical way of doing padding in CBC and that can be used in all scenarios as discussed here [11]. One can opt for various methods to pad CBC encryption. 4.3 JSF Anti CSRF - Truth Behind the Scenes In reality, JSF does not have an aggressive built-in CSRF protection. Anti CSRF support is required for protection against Cross Site Request Forging (CSRF) attacks. However, the implementation of anti CSRF depends a lot on the design of he in the required framework. ViewState is used for preserving the state of web pages and can be used in conjunction with another configuration parameters to prevent CSRF attacks. However, one can perform certain logic tests to initially detect whether the application is vulnerable to CSRF attacks or not. 11
12 Figure 5: Fuzzing Request / Error in Block Size Generally, if the ViewState is implemented on the server side, then it is a good security practice that the application should send a ViewState ID token as a hidden element in the HTML tag so that it can accompany legitimate requests from the client side. If the application is only implementing ViewState on the server side and is not using any ViewState ID, then it is possible that CSRF is not handled appropriately. Tokens generated by using javax.faces.viewstate (sequential) are easy to guess if not encrypted properly. <input type= hidden name= javax. f a c e s. ViewState i d= javax. f a c e s. ViewState value= j i d 2 /> Listing 2: Implementing ViewState Tracking on Server Side As presented in listing 2, the j id2 parameter is set for the ViewState tracking on the server side. The attacker designs the next request in that session with ViewState id as j id3, j id4 and so on which will be treated as legitimate by the server. In Apache MyFaces org.apache.myfaces.number OF VIEWS IN SESSION has a default value of 20 where as IBM Web sphere com.sun.faces.numberofviewsinsession has 15. These parameters specify the number of views that are stored in the session when server side state saving is used. NOTE: In JSF, it is considered that ViewState can be used to prevent CSRF 12
13 Figure 6: Fuzzing Request / Error in Last Block attacks when collaboratively used with the JSESSIONID. As we have been discussing, ViewState implementation matters a lot. Now it has become possible to re encrypt the tampered ViewState and deliver it back to the server. Encrypting ViewState and sending data over HTTPS are not the protection mechanisms against CSRF attacks. This has been widely misunderstood in the developer community Implementing CSRF Protection - The Right Way Strong CSRF implementation in JSF can be implemented as Applying Anti CSRF filters such as org.apache.catalina.filters.csrfpreventionfilter. The inbuilt class uses the java.util.random if explicitly specified by the developer otherwise java.security.securerandom will be used by default. One can also use OWASP CSRF Guard to integrate third party filters into JSF. If the ViewState session Id is to be used with every request then it must be strongly encrypted and an appropriate MAC should be applied in order 13
14 to preserve integrity. It is also possible to design custom CSRF filters with strong functions that generate random tokens. This is possible by creating a CSRF Session listener class that overrides every request with HTTP listener class and appends a random token in every request for a particular session. There is also a possibility of adding <s: token> an element in <h:form> the tag that automatically initiates the CSRF protection. Framework that supports <s: token> are Apache Shale, MyFaces and JBOSS Seam. The real world examples will look like as presented in listing 3 <input type= hidden name= j i d t 7 : j idt7 CSRFToken value= 0 c776040ff77d3af5acce4d4c59a51411eb960bd /> Listing 3: Implementing CSRF Tokens in JSF 4.4 Security Descriptors Fallacy - Configuration The declaration of security parameters in web.xml are imperative especially the security elements that are used for preserving the confidentiality and integrity of the ViewState. It has been noticed that declaration of ALGORTIHM in uppercase in org.apache.myfaces.algorithm does not initialize the Initialization Vector (IV) in Apache MyFaces. This is a bad design practice and could have devastative impacts on the security of a JSF application. The source code of the utils.stateuitils class (which holds security configuration elements) as presented in listing 4 which clearly reflects that these parameters have to be applied in lower case but the documentation of various JSF versions is not written appropriately and is not inline with the real code. In other words, the documentation is misleading. p u b l i c s t a t i c f i n a l S t r i n g INIT PREFIX = org. apache. myfaces. ; p u b l i c s t a t i c f i n a l S t r i n g INIT ALGORITHM = INIT PREFIX + ALGORITHM ; p r i v a t e s t a t i c S t r i n g findalgorithm ( ExternalContext ctx ) { S t r i n g a l g o r i t h m = ctx. g e t I n i t P a r a m e t e r (INIT ALGORITHM) ; i f ( a l g o r i t h m == n u l l ) { a l g o r i t h m = ctx. g e t I n i t P a r a m e t e r (INIT ALGORITHM. tolowercase ( ) ) ; } r e t u r n findalgorithm ( algorithm ) ; }.. Truncated.. Listing 4: Explicit Specification - Implementing to Lower Case 14
15 4.4.1 Secure Way of Configuring Security Descriptors The best practice is to declare the configuration parameters in web.xml as presented in listing 5. <context param> <param name>javax. f a c e s. STATE SAVING METHOD</param name> <param value>c l i e n t </param value> </context param> <context param> <param name>org. apache. myfaces. s e c r e t </param name> <param value>mdeymzq1njc4otaxmjm0nty3odkwmtiz</param value> </context param> <context param> <param name>org. apache. myfaces. algorithm </param name> <param value>aes</param value> </context param> <context param> <param name>org. apache. myfaces. algorithm. parameters </param name > <param value>cbc/pkcs5padding</param value> </context param> <context param> <param name>org. apache. myfaces. algorithm. iv </param name> <param value>nzy1ndmymta3nju0mzixma==</param value> </context param> <context param> <param name>org. apache. myfaces. s e c r e t. cache </param name> <param value>false </param value> </context param> </web app> Listing 5: Secure Way of Declaring Encryption Parameters in JSF This point should be taken into account while doing penetration testing so that enhanced attacks can be tested against the inappropriate implementation of JSF security. NOTE: It has been noticed that JSF framework only encrypts ViewState in order to provide confidentiality but there is no standard implementation of MAC by default so that the integrity of ViewState is preserved. While we know that JSF security greatly depends on the web.xml file, the MAC functionality is also introduced in it. The developer has to explicitly specify the MAC algorithm, key and caching. The parameters that are used nowadays are org.apache.myfaces.mac ALGORITHM, org.apache.myfaces.mac SECRET and org.apache.myfaces.mac SECRET.CACHE respectively. Always declare all of these parameters in lower case. 15
16 4.5 JSF Version Tracking and Disclosure JSF configuration has inbuilt configuration parameters that are used to disclose the version of the installed framework. However, it is always taken lightly and is not fixed by the developers or administrators to avoid leakage of the information in HTTP response headers. It has been noticed that version disclosure may result in detecting critical flaws in JSF applications because publicly available exploit databases can be used to fingerprint the security vulnerabilities present in the installed JSF framework. In Suns RI JSF implementation, the com.sun.faces.disableversiontracking configuration parameter is defined explicitly. By default, it is set to false which means application running on the web server will throw the JSF version into the response headers when the web client queries for it. The collaborative disclosure of web server version and framework version can be devastative from the developers point of view but it is fruitful for pen testing purposes. JSF is not immune to security vulnerabilities [12, 13, and 14] as seen in the recent past. These security issues should be taken into consideration while deploying JSF applications because information leakage is the basis of a number of web attacks. We conducted generic tests on several websites that are using JSF and found that more than 85% of the websites are throwing JSF version number in their response headers out of which several of them were running old and vulnerable versions. 4.6 JSF Data Validation Anyone involved in security understands the importance of proper input validation. JSF offers a few different techniques for validation in order to prevent web attacks such as Cross Site Scripting (XSS). Some of the input validation modules have been available since JSF 1.2, and others are unique to JSF JSF 1.2 Validation Apache MyFaces and the Apache Tomahawk library provide JSF components that can allow for data validation within the UI page itself. One of the more powerful ways of validating input is by leveraging regular expressions via the t:validateregexpr tag provided by Tomahawk [15]. Consider an example where we wish to validate a ZIP code. A MyFaces example of data validation using Tomahawk [16] is presented in listing 6. <%@ t a g l i b u r i= http : / / myfaces. apache. org /tomahawk p r e f i x= t %> <h : outputlabel for= z i p 1 value= Zip /> <t : inputtext value= #{o r d e r. zipcode } i d= z i p 1 > <t : validateregexpr p a t t e r n= \d{5} message= ZIP Code /> </t : inputtext> Listing 6: Generic MyFaces Example - Tomahawk 16
17 In this particular example, a regular expression is being used to limit the zip code to five digits. Notice that you can include an error message as well, and all of this is done within the.xhtml page itself. A similar example using Facelets [17] is presented in listing 7. <html... xmlns : u i= http : / / java. sun. com/ j s f / f a c e l e t s xmlns : t= http : / / myfaces. apache. org /tomahawk > <h : inputtext type= t e x t i d= v a l value= #{ SimpleBean. v a l } r e q u i r e d= t r u e > <t : validateregexpr p a t t e r n= [ a za Z ] { 1, } /> </h : inputtext> Listing 7: Generic Facelets Example The JSF Reference Implementation (RI), codenamed Mojarra, comes with its own tag library that also leverages regular expressions. Mojarra s <mj: regexvalidator> will perform the same operation as discussed above. Furthermore, Mojarra s tag library is armed with an <mj: creditcardvalidator> to validate the proper format of credit cards [18] JSF 2.0 Validation JSF 2.0 contains a collection of tags called validators. These are built in to the JSF 2.0 core library. JSF developers will find the following tags particularly useful for data validation: <f:validatelength> : use this to validate that input falls between a minimum and maximum length <f:validatelongrange> : use this to validate that numeric input falls between a minimum and maximum value <f:validatedoublerange> : similar to validatelongrange, but used for double values <f:validateregex> : use this to leverage regular expression validation Here is an example of JSF validators in use as presented in listing 8. <tr > <td>user ID : <td>user ID : <h : inputtext value= #{bidbean2. userid } r e q u i r e d= t r u e requiredmessage= You must e n t e r a u s e r ID v a l i d a t o r M e s s a g e= ID must be 5 or 6 c h a r s i d= userid > <f : v a l i d a t e L e n g t h minimum= 5 maximum= 6 /> </h : inputtext ></td> <td><h : message for= userid s t y l e C l a s s= e r r o r /></td> </tr > Listing 8: Generic Usage of JSF Validators 17
18 Notice in the above example that the <h: inputtext> contains a required, requiredmessage and validatormessage attribute. The required attribute indicates that this value must be input by the end user and an error message is displayed if it is not provided Custom Validations All of the above approaches work well when the values are not tied closely to business logic, or if these validators and tag libraries are suitable to perform the validation we need. Sometimes there is a need to build custom validation components for data types that arent supported by standard JSF validators [19]. In this scenario, the validator attribute of the <h: inputtext> tag references a validator method that is defined within the bean class [20] as presented in listing 9. <tr > <td>bid Amount : <td>bid Amount : $<h : inputtext value= #{bidbean2. bidamount} r e q u i r e d= t r u e requiredmessage= You must e n t e r an a m o u n t convertermessage= Amount must be a number v a l i d a t o r= #{ bidbean2. validatebidamount } i d= amount /> </td> <td><h : message for= amount s t y l e C l a s s= e r r o r /></td> </tr > Listing 9: Example : Bid Bean Class In the BidBean2 class, we would define our custom validation method as presented in listing 10, validatebidamount(): p u b l i c void validatebidamount ( FacesContext context, UIComponent componenttovalidate, UIComponent componenttovalidate, Object value ) throws V a l i d a t o r E x c e p t i o n { double bidamount = ( ( Double ) value ). doublevalue ( ) ; double p r e v i o u s H i g h e s t B i d = c u r r e n t H i g h e s t B i d ( ) ; i f ( bidamount <= p r e v i o u s H i g h e s t B i d ) { FacesMessage message = new FacesMessage ( Bid must be h i g h e r than c u r r e n t + new FacesMessage ( Bid must be h i g h e r than current + h i g h e s t bid ( $ + p r e v i o u s H i g h e s t B i d + ). ) ; throw new V a l i d a t o r E x c e p t i o n ( message ) ; } } Listing 10: Custom Bean Validator Class 18
19 As we can see, this approach allows more flexibility while validating input data. The validators play a significant role in curing many security vulnerabilities at the source level. 19
20 5 Conclusion In this paper, we have presented the security issues in JSF architecture. Web frameworks have unique semantics and security models. A thorough understanding of the internal architecture of the frameworks is imperative to undertake productive penetration testing. We have discussed the advance features that should be tested for complete and extensive penetration testing of JSF. In general, JSF is similar to ASP.NET from security perspective but differs in deployment of inherent security controls. Every web framework is required to be dissected so that step by step testing can be performed in a robust manner. 20
21 6 About the Authors Aditya K Sood is a Senior Security Practitioner and PhD candidate at Michigan State University. He has already worked in the security domain for Armorize, COSEINC and KPMG. He is also a founder of SecNiche Security Labs, an independent security research arena for cutting edge computer security research. He has been an active speaker at industry conferences and already spoken at RSA, HackInTheBox, ToorCon, HackerHalted, Source, TRISC, AAVAR, EuSecwest, XCON, Troopers, OWASP AppSec USA, FOSS, CERT-IN, etc. He has written content for Virus Bulletin, HITB Ezine, Hakin9, ISSA, ISACA, CrossTalk, Usenix Login, and Elsevier Journals such as NESE and CFS. He is also a co author for debugged magazine. He is also associated with Cigital Labs for doing applied security research in the field of software and application security. adi ks [at] secniche.org Personal Website: Company Website : Krishna Raja is a Senior Application Security Consultant at Security Compass with an extensive background in Java EE application development. He has performed comprehensive security assessments for financial, government, and health care organizations across Canada and the United States. Krishna has carried out the role of security advisor, security analyst, project manager and trainer. He has given lectures and taught courses at RSA, Source Boston, ISSA Secure San Diego and OWASP AppSec DC. Krishna graduated from the University of Western Ontario in 2004 with an Honors BSc. in Computer Science with Software Engineering specialization. He is also an ISC2 Certified Secure Software Lifecycle Professional (CSSLP). krish [at] securitycompass.com Company Website: 21
22 7 References [1] Apache Java Server Faces, [2] ViewState Decoder, [3] POET Tool, [4] Deface Tool, [5] Beware of Serialized GUI Objects Bearing Data, David/BlackHat-DC-2010-Byrne-SGUI-slides.pdf [6] Padding Oracle Attacks, papers/rizzo.pdf [7] Cryptography in the Web: The Case of Cryptographic Design Flaws in ASP.NET, [8] Automated Padding Oracle Attacks with PadBuster, automated-padding-oracle-attacks-with-padbuster/ [9] Cracking ViewState Encryption in JSF, [10] Microsoft Patch Padding Oracle Attacks, [11] Using Padding in Encryption, [12] Sun Java Server Faces Cross-Site Scripting Vulnerability, [13] Apache MyFaces Tomahawk JSF Framework Cross-Site Scripting (XSS) Vulnerability, [14] Sun Glassfish Enterprise Server - Multiple Linked XSS vulnerabilies, [15] MyFaces Tomahawk, [16] Tomahawk ValidateRegExpr, [17] Facelets, [18] JSF Majorra Extension Tags Validation and Focus, 22
23 [19] JSF Validation Tutorial, jsf-validation-tutorial.html?showall=1 [20] JSF: Validating User Input, Validation.pdf 23
Web Maniac Hacking Trust. Aditya K Sood [adi_ks [at] secniche.org] SecNiche Security
Web Maniac Hacking Trust Aditya K Sood [adi_ks [at] secniche.org] SecNiche Security Disclaimer Web Maniac - Hacking Trust Pentesting web applications in a hacker s way. Attack surface varies from application
FINAL DoIT 11.03.2015 - v.4 PAYMENT CARD INDUSTRY DATA SECURITY STANDARDS APPLICATION DEVELOPMENT AND MAINTENANCE PROCEDURES
Purpose: The Department of Information Technology (DoIT) is committed to developing secure applications. DoIT s System Development Methodology (SDM) and Application Development requirements ensure that
Where every interaction matters.
Where every interaction matters. Peer 1 Vigilant Web Application Firewall Powered by Alert Logic The Open Web Application Security Project (OWASP) Top Ten Web Security Risks and Countermeasures White Paper
elearning for Secure Application Development
elearning for Secure Application Development Curriculum Application Security Awareness Series 1-2 Secure Software Development Series 2-8 Secure Architectures and Threat Modeling Series 9 Application Security
Adobe Systems Incorporated
Adobe Connect 9.2 Page 1 of 8 Adobe Systems Incorporated Adobe Connect 9.2 Hosted Solution June 20 th 2014 Adobe Connect 9.2 Page 2 of 8 Table of Contents Engagement Overview... 3 About Connect 9.2...
Secure Web Application Coding Team Introductory Meeting December 1, 2005 1:00 2:00PM Bits & Pieces Room, Sansom West Room 306 Agenda
Secure Web Application Coding Team Introductory Meeting December 1, 2005 1:00 2:00PM Bits & Pieces Room, Sansom West Room 306 Agenda 1. Introductions for new members (5 minutes) 2. Name of group 3. Current
Defeating XSS and XSRF with JSF Frameworks
Defeating XSS and XSRF with JSF Frameworks About Me Steve Wolf Vice President, Application Security AsTech Consulting, Inc. [email protected] www.astechconsulting.com OWASP Chapter Lead Sacramento,
JVA-122. Secure Java Web Development
JVA-122. Secure Java Web Development Version 7.0 This comprehensive course shows experienced developers of Java EE applications how to secure those applications and to apply best practices with regard
What is Web Security? Motivation
[email protected] http://www.brucker.ch/ Information Security ETH Zürich Zürich, Switzerland Information Security Fundamentals March 23, 2004 The End Users View The Server Providers View What is Web
Web Application Security Assessment and Vulnerability Mitigation Tests
White paper BMC Remedy Action Request System 7.6.04 Web Application Security Assessment and Vulnerability Mitigation Tests January 2011 www.bmc.com Contacting BMC Software You can access the BMC Software
Thick Client Application Security
Thick Client Application Security Arindam Mandal ([email protected]) (http://www.paladion.net) January 2005 This paper discusses the critical vulnerabilities and corresponding risks in a two
OWASP and OWASP Top 10 (2007 Update) OWASP. The OWASP Foundation. Dave Wichers. The OWASP Foundation. OWASP Conferences Chair dave.wichers@owasp.
and Top 10 (2007 Update) Dave Wichers The Foundation Conferences Chair [email protected] COO, Aspect Security [email protected] Copyright 2007 - The Foundation This work is available
The Top Web Application Attacks: Are you vulnerable?
QM07 The Top Web Application Attacks: Are you vulnerable? John Burroughs, CISSP Sr Security Architect, Watchfire Solutions [email protected] Agenda Current State of Web Application Security Understanding
3. Broken Account and Session Management. 4. Cross-Site Scripting (XSS) Flaws. Web browsers execute code sent from websites. Account Management
What is an? s Ten Most Critical Web Application Security Vulnerabilities Anthony LAI, CISSP, CISA Chapter Leader (Hong Kong) [email protected] Open Web Application Security Project http://www.owasp.org
Web Application Guidelines
Web Application Guidelines Web applications have become one of the most important topics in the security field. This is for several reasons: It can be simple for anyone to create working code without security
WHITE PAPER. FortiWeb and the OWASP Top 10 Mitigating the most dangerous application security threats
WHITE PAPER FortiWeb and the OWASP Top 10 PAGE 2 Introduction The Open Web Application Security project (OWASP) Top Ten provides a powerful awareness document for web application security. The OWASP Top
Exploiting Fundamental Weaknesses in Command and Control (C&C) Panels
Exploiting Fundamental Weaknesses in Command and Control (C&C) Panels What Goes Around Comes Back Around! Aditya K Sood Senior Security Researcher and Engineer 1 Dr. Aditya K Sood About the Speaker! Senior
An introduction to creating JSF applications in Rational Application Developer Version 8.0
An introduction to creating JSF applications in Rational Application Developer Version 8.0 September 2010 Copyright IBM Corporation 2010. 1 Overview Although you can use several Web technologies to create
Security features of ZK Framework
1 Security features of ZK Framework This document provides a brief overview of security concerns related to JavaScript powered enterprise web application in general and how ZK built-in features secures
Threat Modeling. A workshop on how to create threat models by creating a hands-on example
Threat Modeling A workshop on how to create threat models by creating a hands-on example Introduction 2 Introduction 3 Part 1: Application- Layer Attacks A brief primer on some web application attacks
Identifying and Exploiting Padding Oracles. Brian Holyfield Gotham Digital Science
Identifying and Exploiting Padding Oracles Brian Holyfield Gotham Digital Science Session ID: ASEC-403 Session Classification: Intermediate What is a Padding Oracle? We re a SQL Server Shop, we don t use
OWASP TOP 10 ILIA ALSHANETSKY @ILIAA HTTPS://JOIND.IN/15741
OWASP TOP 10 ILIA ALSHANETSKY @ILIAA HTTPS://JOIND.IN/15741 ME, MYSELF & I PHP Core Developer Author of Guide to PHP Security Security Aficionado THE CONUNDRUM USABILITY SECURITY YOU CAN HAVE ONE ;-) OPEN
Chapter 17. Transport-Level Security
Chapter 17 Transport-Level Security Web Security Considerations The World Wide Web is fundamentally a client/server application running over the Internet and TCP/IP intranets The following characteristics
Criteria for web application security check. Version 2015.1
Criteria for web application security check Version 2015.1 i Content Introduction... iii ISC- P- 001 ISC- P- 001.1 ISC- P- 001.2 ISC- P- 001.3 ISC- P- 001.4 ISC- P- 001.5 ISC- P- 001.6 ISC- P- 001.7 ISC-
ASP.NET MVC Secure Coding 4-Day hands on Course. Course Syllabus
ASP.NET MVC Secure Coding 4-Day hands on Course Course Syllabus Course description ASP.NET MVC Secure Coding 4-Day hands on Course Secure programming is the best defense against hackers. This multilayered
Enterprise Application Security Workshop Series
Enterprise Application Security Workshop Series Phone 877-697-2434 fax 877-697-2434 www.thesagegrp.com Defending JAVA Applications (3 Days) In The Sage Group s Defending JAVA Applications workshop, participants
Out of the Fire - Adding Layers of Protection When Deploying Oracle EBS to the Internet
Out of the Fire - Adding Layers of Protection When Deploying Oracle EBS to the Internet March 8, 2012 Stephen Kost Chief Technology Officer Integrigy Corporation Phil Reimann Director of Business Development
Web Application Penetration Testing
Web Application Penetration Testing 2010 2010 AT&T Intellectual Property. All rights reserved. AT&T and the AT&T logo are trademarks of AT&T Intellectual Property. Will Bechtel [email protected]
Project 2: Web Security Pitfalls
EECS 388 September 19, 2014 Intro to Computer Security Project 2: Web Security Pitfalls Project 2: Web Security Pitfalls This project is due on Thursday, October 9 at 6 p.m. and counts for 8% of your course
OWASP Top Ten Tools and Tactics
OWASP Top Ten Tools and Tactics Russ McRee Copyright 2012 HolisticInfoSec.org SANSFIRE 2012 10 JULY Welcome Manager, Security Analytics for Microsoft Online Services Security & Compliance Writer (toolsmith),
External Vulnerability Assessment. -Technical Summary- ABC ORGANIZATION
External Vulnerability Assessment -Technical Summary- Prepared for: ABC ORGANIZATI On March 9, 2008 Prepared by: AOS Security Solutions 1 of 13 Table of Contents Executive Summary... 3 Discovered Security
Using Foundstone CookieDigger to Analyze Web Session Management
Using Foundstone CookieDigger to Analyze Web Session Management Foundstone Professional Services May 2005 Web Session Management Managing web sessions has become a critical component of secure coding techniques.
Web Application Attacks and Countermeasures: Case Studies from Financial Systems
Web Application Attacks and Countermeasures: Case Studies from Financial Systems Dr. Michael Liu, CISSP, Senior Application Security Consultant, HSBC Inc Overview Information Security Briefing Web Applications
Testing the OWASP Top 10 Security Issues
Testing the OWASP Top 10 Security Issues Andy Tinkham & Zach Bergman, Magenic Technologies Contact Us 1600 Utica Avenue South, Suite 800 St. Louis Park, MN 55416 1 (877)-277-1044 [email protected] Who Are
Web Application Security
Chapter 1 Web Application Security In this chapter: OWASP Top 10..........................................................2 General Principles to Live By.............................................. 4
Finding and Preventing Cross- Site Request Forgery. Tom Gallagher Security Test Lead, Microsoft
Finding and Preventing Cross- Site Request Forgery Tom Gallagher Security Test Lead, Microsoft Agenda Quick reminder of how HTML forms work How cross-site request forgery (CSRF) attack works Obstacles
WEB SECURITY CONCERNS THAT WEB VULNERABILITY SCANNING CAN IDENTIFY
WEB SECURITY CONCERNS THAT WEB VULNERABILITY SCANNING CAN IDENTIFY www.alliancetechpartners.com WEB SECURITY CONCERNS THAT WEB VULNERABILITY SCANNING CAN IDENTIFY More than 70% of all websites have vulnerabilities
Web Application Security. Vulnerabilities, Weakness and Countermeasures. Massimo Cotelli CISSP. Secure
Vulnerabilities, Weakness and Countermeasures Massimo Cotelli CISSP Secure : Goal of This Talk Security awareness purpose Know the Web Application vulnerabilities Understand the impacts and consequences
05.0 Application Development
Number 5.0 Policy Owner Information Security and Technology Policy Application Development Effective 01/01/2014 Last Revision 12/30/2013 Department of Innovation and Technology 5. Application Development
Securing Your Web Application against security vulnerabilities. Ong Khai Wei, IT Specialist, Development Tools (Rational) IBM Software Group
Securing Your Web Application against security vulnerabilities Ong Khai Wei, IT Specialist, Development Tools (Rational) IBM Software Group Agenda Security Landscape Vulnerability Analysis Automated Vulnerability
Magento Security and Vulnerabilities. Roman Stepanov
Magento Security and Vulnerabilities Roman Stepanov http://ice.eltrino.com/ Table of contents Introduction Open Web Application Security Project OWASP TOP 10 List Common issues in Magento A1 Injection
Detecting Web Application Vulnerabilities Using Open Source Means. OWASP 3rd Free / Libre / Open Source Software (FLOSS) Conference 27/5/2008
Detecting Web Application Vulnerabilities Using Open Source Means OWASP 3rd Free / Libre / Open Source Software (FLOSS) Conference 27/5/2008 Kostas Papapanagiotou Committee Member OWASP Greek Chapter [email protected]
Web application security
Web application security Sebastian Lopienski CERN Computer Security Team openlab and summer lectures 2010 (non-web question) Is this OK? int set_non_root_uid(int uid) { // making sure that uid is not 0
Check list for web developers
Check list for web developers Requirement Yes No Remarks 1. Input Validation 1.1) Have you done input validation for all the user inputs using white listing and/or sanitization? 1.2) Does the input validation
Using weblock s Servlet Filters for Application-Level Security
Using weblock s Servlet Filters for Application-Level Security September 2006 www.2ab.com Introduction Access management is a simple concept. Every business has information that needs to be protected from
(WAPT) Web Application Penetration Testing
(WAPT) Web Application Penetration Testing Module 0: Introduction 1. Introduction to the course. 2. How to get most out of the course 3. Resources you will need for the course 4. What is WAPT? Module 1:
PCI-DSS and Application Security Achieving PCI DSS Compliance with Seeker
PCI-DSS and Application Security Achieving PCI DSS Compliance with Seeker www.quotium.com 1/14 Summary Abstract 3 PCI DSS Statistics 4 PCI DSS Application Security 5 How Seeker Helps You Achieve PCI DSS
EC-Council CAST CENTER FOR ADVANCED SECURITY TRAINING. CAST 619 Advanced SQLi Attacks and Countermeasures. Make The Difference CAST.
CENTER FOR ADVANCED SECURITY TRAINING 619 Advanced SQLi Attacks and Countermeasures Make The Difference About Center of Advanced Security Training () The rapidly evolving information security landscape
Table of Contents. Page 2/13
Page 1/13 Table of Contents Introduction...3 Top Reasons Firewalls Are Not Enough...3 Extreme Vulnerabilities...3 TD Ameritrade Security Breach...3 OWASP s Top 10 Web Application Security Vulnerabilities
HP WebInspect Tutorial
HP WebInspect Tutorial Introduction: With the exponential increase in internet usage, companies around the world are now obsessed about having a web application of their own which would provide all the
OWASP Application Security Building and Breaking Applications
OWASP Application Security Building and Breaking Applications Rochester OWASP Chapter - Durkee Consulting, Inc. [email protected] Who's? Principal Security Consultant Durkee Consulting Inc. Founder of Rochester
Web-Application Security
Web-Application Security Kristian Beilke Arbeitsgruppe Sichere Identität Fachbereich Mathematik und Informatik Freie Universität Berlin 29. Juni 2011 Overview Web Applications SQL Injection XSS Bad Practice
Security Protocols/Standards
Security Protocols/Standards Security Protocols/Standards Security Protocols/Standards How do we actually communicate securely across a hostile network? Provide integrity, confidentiality, authenticity
A Server and Browser-Transparent CSRF Defense for Web 2.0 Applications. Slides by Connor Schnaith
A Server and Browser-Transparent CSRF Defense for Web 2.0 Applications Slides by Connor Schnaith Cross-Site Request Forgery One-click attack, session riding Recorded since 2001 Fourth out of top 25 most
Creating Stronger, Safer, Web Facing Code. JPL IT Security Mary Rivera June 17, 2011
Creating Stronger, Safer, Web Facing Code JPL IT Security Mary Rivera June 17, 2011 Agenda Evolving Threats Operating System Application User Generated Content JPL s Application Security Program Securing
Java Web Application Security
Java Web Application Security RJUG Nov 11, 2003 Durkee Consulting www.rd1.net 1 Ralph Durkee SANS Certified Mentor/Instructor SANS GIAC Network Security and Software Development Consulting Durkee Consulting
FINAL DoIT 04.01.2013- v.8 APPLICATION SECURITY PROCEDURE
Purpose: This procedure identifies what is required to ensure the development of a secure application. Procedure: The five basic areas covered by this document include: Standards for Privacy and Security
How to break in. Tecniche avanzate di pen testing in ambito Web Application, Internal Network and Social Engineering
How to break in Tecniche avanzate di pen testing in ambito Web Application, Internal Network and Social Engineering Time Agenda Agenda Item 9:30 10:00 Introduction 10:00 10:45 Web Application Penetration
CrashPlan Security SECURITY CONTEXT TECHNOLOGY
TECHNICAL SPECIFICATIONS CrashPlan Security CrashPlan is a continuous, multi-destination solution engineered to back up mission-critical data whenever and wherever it is created. Because mobile laptops
Acunetix Website Audit. 5 November, 2014. Developer Report. Generated by Acunetix WVS Reporter (v8.0 Build 20120808)
Acunetix Website Audit 5 November, 2014 Developer Report Generated by Acunetix WVS Reporter (v8.0 Build 20120808) Scan of http://filesbi.go.id:80/ Scan details Scan information Starttime 05/11/2014 14:44:06
Columbia University Web Security Standards and Practices. Objective and Scope
Columbia University Web Security Standards and Practices Objective and Scope Effective Date: January 2011 This Web Security Standards and Practices document establishes a baseline of security related requirements
Complete Java Web Development
Complete Java Web Development JAVA-WD Rev 11.14 4 days Description Complete Java Web Development is a crash course in developing cutting edge Web applications using the latest Java EE 6 technologies from
Chapter 1 Web Application (In)security 1
Introduction xxiii Chapter 1 Web Application (In)security 1 The Evolution of Web Applications 2 Common Web Application Functions 4 Benefits of Web Applications 5 Web Application Security 6 "This Site Is
Integrigy Corporate Overview
mission critical applications mission critical security Application and Database Security Auditing, Vulnerability Assessment, and Compliance Integrigy Corporate Overview Integrigy Overview Integrigy Corporation
Application Code Development Standards
Application Code Development Standards Overview This document is intended to provide guidance to campus system owners and software developers regarding secure software engineering practices. These standards
Is Drupal secure? A high-level perspective on web vulnerabilities, Drupal s solutions, and how to maintain site security
Is Drupal secure? A high-level perspective on web vulnerabilities, Drupal s solutions, and how to maintain site security Presented 2009-05-29 by David Strauss Thinking Securely Security is a process, not
Kenna Platform Security. A technical overview of the comprehensive security measures Kenna uses to protect your data
Kenna Platform Security A technical overview of the comprehensive security measures Kenna uses to protect your data V2.0, JULY 2015 Multiple Layers of Protection Overview Password Salted-Hash Thank you
Last update: February 23, 2004
Last update: February 23, 2004 Web Security Glossary The Web Security Glossary is an alphabetical index of terms and terminology relating to web application security. The purpose of the Glossary is to
Introduction:... 1 Security in SDLC:... 2 Penetration Testing Methodology: Case Study... 3
Table of Contents Introduction:... 1 Security in SDLC:... 2 Penetration Testing Methodology: Case Study... 3 Information Gathering... 3 Vulnerability Testing... 7 OWASP TOP 10 Vulnerabilities:... 8 Injection
Intrusion detection for web applications
Intrusion detection for web applications Intrusion detection for web applications Łukasz Pilorz Application Security Team, Allegro.pl Reasons for using IDS solutions known weaknesses and vulnerabilities
Top Ten Web Application Vulnerabilities in J2EE. Vincent Partington and Eelco Klaver Xebia
Top Ten Web Application Vulnerabilities in J2EE Vincent Partington and Eelco Klaver Xebia Introduction Open Web Application Security Project is an open project aimed at identifying and preventing causes
Hacking Web Apps. Detecting and Preventing Web Application Security Problems. Jorge Blanco Alcover. Mike Shema. Technical Editor SYNGRESS
Hacking Web Apps Detecting and Preventing Web Application Security Problems Mike Shema Technical Editor Jorge Blanco Alcover AMSTERDAM BOSTON HEIDELBERG LONDON NEW YORK OXFORD PARIS SAN DIEGO SAN FRANCISCO
STOPPING LAYER 7 ATTACKS with F5 ASM. Sven Müller Security Solution Architect
STOPPING LAYER 7 ATTACKS with F5 ASM Sven Müller Security Solution Architect Agenda Who is targeted How do Layer 7 attacks look like How to protect against Layer 7 attacks Building a security policy Layer
Data Breaches and Web Servers: The Giant Sucking Sound
Data Breaches and Web Servers: The Giant Sucking Sound Guy Helmer CTO, Palisade Systems, Inc. Lecturer, Iowa State University @ghelmer Session ID: DAS-204 Session Classification: Intermediate The Giant
DFW INTERNATIONAL AIRPORT STANDARD OPERATING PROCEDURE (SOP)
Title: Functional Category: Information Technology Services Issuing Department: Information Technology Services Code Number: xx.xxx.xx Effective Date: xx/xx/2014 1.0 PURPOSE 1.1 To appropriately manage
Advancements in Botnet Attacks and Malware Distribution
Advancements in Botnet Attacks and Malware Distribution HOPE Conference, New York, July 2012 Aditya K Sood Rohit Bansal Richard J Enbody SecNiche Security Department of Computer Science and Engineering
Implementation of Web Application Firewall
Implementation of Web Application Firewall OuTian 1 Introduction Abstract Web 層 應 用 程 式 之 攻 擊 日 趨 嚴 重, 而 國 內 多 數 企 業 仍 不 知 該 如 何 以 資 安 設 備 阻 擋, 仍 在 採 購 傳 統 的 Firewall/IPS,
Secure Web Development Teaching Modules 1. Threat Assessment
Secure Web Development Teaching Modules 1 Threat Assessment Contents 1 Concepts... 1 1.1 Software Assurance Maturity Model... 1 1.2 Security practices for construction... 3 1.3 Web application security
Using Free Tools To Test Web Application Security
Using Free Tools To Test Web Application Security Speaker Biography Matt Neely, CISSP, CTGA, GCIH, and GCWN Manager of the Profiling Team at SecureState Areas of expertise: wireless, penetration testing,
Passing PCI Compliance How to Address the Application Security Mandates
Passing PCI Compliance How to Address the Application Security Mandates The Payment Card Industry Data Security Standards includes several requirements that mandate security at the application layer. These
WHITE PAPER FORTIWEB WEB APPLICATION FIREWALL. Ensuring Compliance for PCI DSS 6.5 and 6.6
WHITE PAPER FORTIWEB WEB APPLICATION FIREWALL Ensuring Compliance for PCI DSS 6.5 and 6.6 CONTENTS 04 04 06 08 11 12 13 Overview Payment Card Industry Data Security Standard PCI Compliance for Web Applications
Web Application Report
Web Application Report This report includes important security information about your Web Application. OWASP Top Ten 2010 The Ten Most Critical Web Application Report This report was created by IBM Rational
Developing ASP.NET MVC 4 Web Applications MOC 20486
Developing ASP.NET MVC 4 Web Applications MOC 20486 Course Outline Module 1: Exploring ASP.NET MVC 4 The goal of this module is to outline to the students the components of the Microsoft Web Technologies
Using SAP Logon Tickets for Single Sign on to Microsoft based web applications
Collaboration Technology Support Center - Microsoft - Collaboration Brief March 2005 Using SAP Logon Tickets for Single Sign on to Microsoft based web applications André Fischer, Project Manager CTSC,
Web applications. Web security: web basics. HTTP requests. URLs. GET request. Myrto Arapinis School of Informatics University of Edinburgh
Web applications Web security: web basics Myrto Arapinis School of Informatics University of Edinburgh HTTP March 19, 2015 Client Server Database (HTML, JavaScript) (PHP) (SQL) 1 / 24 2 / 24 URLs HTTP
Common Security Vulnerabilities in Online Payment Systems
Common Security Vulnerabilities in Online Payment Systems Author- Hitesh Malviya(Information Security analyst) Qualifications: C!EH, EC!SA, MCITP, CCNA, MCP Current Position: CEO at HCF Infosec Limited
Advanced Web Technology 10) XSS, CSRF and SQL Injection 2
Berner Fachhochschule, Technik und Informatik Advanced Web Technology 10) XSS, CSRF and SQL Injection Dr. E. Benoist Fall Semester 2010/2011 Table of Contents Cross Site Request Forgery - CSRF Presentation
Architectural Design Patterns. Design and Use Cases for OWASP. Wei Zhang & Marco Morana OWASP Cincinnati, U.S.A. http://www.owasp.
Architectural Design Patterns for SSO (Single Sign On) Design and Use Cases for Financial i Web Applications Wei Zhang & Marco Morana OWASP Cincinnati, U.S.A. OWASP Copyright The OWASP Foundation Permission
Barracuda Web Application Firewall vs. Intrusion Prevention Systems (IPS) Whitepaper
Barracuda Web Application Firewall vs. Intrusion Prevention Systems (IPS) Whitepaper Securing Web Applications As hackers moved from attacking the network to attacking the deployed applications, a category
APPLICATION SECURITY: FROM WEB TO MOBILE. DIFFERENT VECTORS AND NEW ATTACK
APPLICATION SECURITY: FROM WEB TO MOBILE. DIFFERENT VECTORS AND NEW ATTACK John T Lounsbury Vice President Professional Services, Asia Pacific INTEGRALIS Session ID: MBS-W01 Session Classification: Advanced
Automatic vs. Manual Code Analysis
Automatic vs. Manual Code Analysis 2009-11-17 Ari Kesäniemi Senior Security Architect Nixu Oy [email protected] Copyright The Foundation Permission is granted to copy, distribute and/or modify this
Enabling SSL and Client Certificates on the SAP J2EE Engine
Enabling SSL and Client Certificates on the SAP J2EE Engine Angel Dichev RIG, SAP Labs SAP AG 1 Learning Objectives As a result of this session, you will be able to: Understand the different SAP J2EE Engine
Chapter 4 Application, Data and Host Security
Chapter 4 Application, Data and Host Security 4.1 Application Security Chapter 4 Application Security Concepts Concepts include fuzzing, secure coding, cross-site scripting prevention, crosssite request
Web App Security Audit Services
locuz.com Professional Services Web App Security Audit Services The unsecured world today Today, over 80% of attacks against a company s network come at the Application Layer not the Network or System
Spring Security 3. rpafktl Pen source. intruders with this easy to follow practical guide. Secure your web applications against malicious
Spring Security 3 Secure your web applications against malicious intruders with this easy to follow practical guide Peter Mularien rpafktl Pen source cfb II nv.iv I I community experience distilled
Essential IT Security Testing
Essential IT Security Testing Application Security Testing for System Testers By Andrew Muller Director of Ionize Who is this guy? IT Security consultant to the stars Member of OWASP Member of IT-012-04
How To Fix A Web Application Security Vulnerability
Proposal of Improving Web Application Security in Context of Latest Hacking Trends RADEK VALA, ROMAN JASEK Department of Informatics and Artificial Intelligence Tomas Bata University in Zlin, Faculty of
Sichere Software- Entwicklung für Java Entwickler
Sichere Software- Entwicklung für Java Entwickler Dominik Schadow Senior Consultant Trivadis GmbH 05/09/2012 BASEL BERN LAUSANNE ZÜRICH DÜSSELDORF FRANKFURT A.M. FREIBURG I.BR. HAMBURG MÜNCHEN STUTTGART
SOCIAL NETWORKS AND INFECTION MODEL
Feature Chain Exploitation Social Networks Malware Aditya K. Sood has more than five years of experience in computer security and has worked in the security domain for Armorize, COSEINC and KPMG. He is
Adobe ColdFusion. Secure Profile Web Application Penetration Test. July 31, 2014. Neohapsis 217 North Jefferson Street, Suite 200 Chicago, IL 60661
Adobe ColdFusion Secure Profile Web Application Penetration Test July 31, 2014 Neohapsis 217 North Jefferson Street, Suite 200 Chicago, IL 60661 Chicago Dallas This document contains and constitutes the
