The Dark Side of Ajax. Jacob West Fortify Software
|
|
|
- Austin Small
- 10 years ago
- Views:
Transcription
1 The Dark Side of Ajax Jacob West Fortify Software
2 Mashup Pink Floyd Dark Side of the Moon AJAX all purpose cleaner
3 Ajax! " Fancier and easier-to-use web applications using: Asynchronous JavaScript And XML! " Matter of degree, not kind Server (smart) Web 1.0 Ajax Web page (dumb) Server (smart) Web page (smart)
4 Success is foreseeing failure Henry Petroski
5 Cross-Site Scripting <c:if test="${param.sayhello}"> Hello ${param.name}! </c:if> We never intended the code that's in there to actually be production-ready code. - Ryan Asleson
6 Reliving Past Mistakes! " Cross-site scripting looks more and more like buffer overflow Buffer Overflow! " Allows arbitrary code execution! " Easy mistake to make in C/C++! " Exploit is hard to write! " Well known problem for decades Cross-site Scripting! " Allows arbitrary code execution! " Easy mistake to make! " Exploit is easy to write! " Well known problem for a decade
7 What s Wrong with Ajax?! " Today s rage or tomorrow s security disaster?! " Could more JavaScript possibly be better?! " Sample of the almost 400 JavaScript CVE entries: CVE : The Javascript engine in Mozilla 1.7 and earlier can allow remote attackers to execute arbitrary code. CVE Internet Explorer allows remote attackers to read files by redirecting data to a Javascript applet. CVE A remote attacker can read from a Netscape user's cache via JS CVE Internet Explorer 4.01 allows remote attackers to read local files and spoof web pages via a "%01" character in an "about:" Javascript URL, which causes Internet Explorer to use the domain specified
8 Overview! " Introduction! " Ajax for! " Developers! " Hackers! " Risks! " Old! " New! " State of the frameworks! " Automated protections! " The future of Ajax
9 AJAX FOR DEVELOPERS
10 Ajax From the Programmer s Perspective! " Increased complexity makes frameworks attractive! " Popular toolkits for Ajax development include:! " Google Web Toolkit (GWT)! " Direct Web Remoting (DWR)! " Microsoft ASP.NET AJAX (Codename Atlas)! " Client-side libraries (e.g. Prototype and Dojo)! " Also popular: ad-hoc Ajax (roll-your-own)
11 Back-of-the-Napkin Analysis high Ad-hoc Atlas DWR low GWT high
12 Ajax - The Case of the Vanishing X! " XML being replaced by more JavaScript/JSON XML JSON <book> <title>javascript, the Definitive Guide</title> <publisher>o'reilly</publisher> <author>david Flanagan</author> <cover src="/images/cover_defguide.jpg" /> <blurb>elit.</blurb> </book> { "book": { "title":"javascript, the Definitive Guide", "publisher":"o'reilly", "author":"david Flanagan", "cover":"/images/cover_defguide.jpg", "blurb": elit." } }
13 AJAX FOR HACKERS
14 Ajax For Malware! " Exploit writers buy JavaScript books too! " Web 2.0 exploits for Web 1.0 vulnerabilities! " MySpace worm! " Port scanning behind your firewall! " Jikto
15 MySpace Worm - 1/3! " MySpace does bad input validation! " Users to post a subset of HTML on their pages! " No <script> tags, no use of the word javascript, etc
16 MySpace Worm - 2/3! " User Samy discovers some holes! " Some browsers allow JavaScript in style attributes! " Some browsers interpret java\nscript as javascript! " Circumvents MySpace's efforts to prevent JavaScript
17 MySpace Worm - 3/3! " Samy adds JavaScript (Ajax) to his page! " Visitors to his page automatically add Samy as a friend and inserts Samy is my hero into their profile! " Visitors to a page where Samy is a friend take the same actions! " MySpace goes down
18 Port Scanning Behind Firewalls - 1/2 Server 1) show me dancing pigs! 2) check this out Malicious Web page scan 3) port scan results scan Browser scan Firewall
19 Port Scanning Behind Firewalls - 2/2! " Request images from internal IPs (<img src= :8080 />! " Use timeout/onerror to determine if hosts respond! " <iframe/> with timer/onload to map web servers! " Fingerprint webapps using known image names
20 Jikto - 1/2! " JavaScript vulnerability scanner (Billy Hoffman with credit to pdp for crawler)! " Spreads like worm over XSS vulnerabilities! " Uses Google as proxy to bypass same origin policy! " Same Origin Policy: basis for browser security! " JavaScript can't see content from other domains! " Protects sites from each other
21 Jikto - 2/2 "Infected" page Target Site Google Translate attack Victim Malicious Site vulnerability scanner
22 Moral to the Story! " No new vulnerabilities here, just better exploits! " Good offense makes good defense more important! " Good offense is making fast progress
23 OLD RISKS RECONSIDERED
24 Defending Ajax: Old Risks Reconsidered New name, same game! " Old vulnerabilities, new programming language! " Input validation! " Exposing the server
25 Old Vulnerabilities, New Language Cross-site scripting in pure JavaScript: q = location.search.split( q= )[1]; q = unescape(q); div.innerhtml = searching for + q;
26 Old Risks: Input validation - 1/3 Easy to lose track of where validation is performed Server Client
27 Old Risks: Input validation - 2/3! " More entry points on the server! " More, smaller, requests! " Decentralized design! " Easy to over-expose
28 Old Risks: Input validation - 3/3! " More subtle entry points on the server! " Looks like Web services! " Hard to tell if method call initiated locally (safe) or remotely (dangerous)! " Harder to tell what can be trusted
29 Old Risk: Exposing Yourself! " Example: DWR <dwr> <allow>... <create creator= new javascript= ApartmentDAO class= dwr.sample.apartmentdao > <exclude method= countapartments /> </create> </allow> </dwr>
30 NEW PROBLEMS
31 New: Harder to Test! " Dirty-data shooters rely on Web 1.0 conventions! " HTTP! " HTML forms! " 1 parameter = 1 application variable! " Ajax = more complex data structures! " Ajax requires sophisticated browser emulation! " How do you spider an Ajax application?! " Looks much more like testing conventional software
32 Old: Cross-Site Request Forgery (CSRF)! " Cross-Site Request Forgery! " JavaScript submits HTTP requests on victim's behalf! " Allows attacker to submit commands, but not inspect the response (Same Origin Policy)! " Application is vulnerable if it:! " Relies on user s identity (e.g. persistent or session cookies)! " Does not have secondary authentication mechanism! " Attack against data integrity
33 New: JavaScript Hijacking - 1/2! " Builds on CSRF! " Breaks confidentiality through loophole in SOP! " Vulnerable if:! " Site responds to HTTP GET! " Transmits sensitive data in JavaScript syntax
34 New: JavaScript Hijacking - 2/2 Ajax Application Malicious Server GET 1) show me dancing pigs! 2) check this out Mal page { witness code } <script src=... > JavaScript 3) confidential data Browser
35 Defenses Against JavaScript Hijacking! " Prevent CSRF! " Decline malicious requests by requiring unique token and remember! " Default to POST not enough (Developers add GET so that result can be cached)! " Check for a known HTTP header not enough (Flash CSRF vulnerability)! " Prevent execution of JavaScript! " while(1);, /*... */, etc and remember! " calling parsejson() rather than eval() does not help
36 STATE OF THE FRAMEWORKS
37 How 12 Popular Frameworks Stack Up Framework Summary Prevents JavaScript Hijacking? Prototype Script.aculo.us Supports JSON. Defaults to POST when no method is specified, but is easily customizable for using either POST or GET. Supports JSON. Provides additional UI controls and uses the Prototype library for generating requests. Dojo Supports JSON. Defaults to POST, but does not explicitly prevent JavaScript Hijacking. No DWR Uses an expanded version of JSON. Does not implement any JavaScript Hijacking prevention mechanisms. Moo.fx Supports JSON. Defaults to POST, but can easily be configured to use GET. No jquery Supports JSON. Defaults to GET. No Yahoo! UI Supports JSON. Responds to GET requests. No Rico Microsoft Atlas Does not currently support JSON, but will in the future. Supports XML as a data transfer format. Defaults to GET. Supports JSON. Uses POST by default, but allows programmers to easily change POST to GET and encourages doing so for performance and caching. MochiKit Supports JSON. Defaults to GET. No xajax Does not currently support JSON. Supports XML as a data transfer format. N/A GWT Supports JSON. Uses POST by default; however, documentation describes how to make GET requests instead and does not mention any security ramifications. No No No N/A No No
38 Popular Framework Responses - 1/3! " We will fix it! " Thanks for the heads up on this! " Thanks for the paper. We are looking at the issue, and we re starting to formulate some solutions that mesh well with what you re suggesting
39 Popular Framework Responses - 2/3! " This is not a client-side framework problem! " Entirely dependent on the server to do the right thing! " Why the hell should there be security documentation in client frameworks?! " I added comment stripping support so that people would shut up, not because it s useful in theory or practice
40 Popular Framework Responses - 3/3! " You are recommending bad practices! " But by recommending bad practices, and by failing to strongly recommend good practices, you are making things worse
41 Proof is in the Pudding Head-in-the-sand defense! " 3 releases that contain a fix:! " Dojo 0.4.3! " Implemented /* */, but! " Only for JSON, not JavaScript! " DWR 2.0! " Implemented double-cookie submission! " Accepted our /* */ patch! " Prototype 1.5.1! " Implemented /* */! " 3 frameworks planned a fix:! " GWT! " MochiKit! " Script.aculo.us
42 Also Good! " 4 mentioned in documentation:! " dojotoolkit.org/2007/04/02/note-javascript-hijacking! " getahead.org/dwr/security/script-tag-protection! " " developer.yahoo.com/security/
43 AUTOMATED PROTECTIONS
44 Static Analysis (Fortify SCA)! " Challenge:! " Lacking standard way to build dynamic JavaScript! " Identify the use of vulnerable frameworks! " API calls! " Configuration files! " Source files! " Identify construction of JavaScript responses! " response.setcontenttype( text/javascript )
45 Real-Time Analysis (Fortify RTA)! " Guard to prevent CSRF! " Insert CSRF token on the page using JavaScript! " Verify the unique token is present in requests
46 CONCLUSIONS
47 Confusion over JavaScript Hijacking! " A system administration problem! " Not unique just a way to parse results of CSRF! " Not interesting just View Source! " JavaScript Hijacking can be prevented by:! " Defaulting to HTTP POST! " Using parsejson() instead of eval()! " Using object notation {} rather than array notation []! " Checking for application/json in content-type
48 The Future of Ajax - 1/2! " Frameworks offer a chance to build security in! " Prevent CSRF! " Provide secure defaults! " Opportunity for better validation! " Better separation between display and controller! " Better definition for browser/server interaction
49 The Future of Ajax - 2/2! " Better Web standards! " Cookies: broken, need *working* HTTP only cookies! " Browsers: broken, need to distinguish between scripts from different domains! " Flash?! " Documented security best-practices! " Hard to mistake data and code! " Well-defined system for cross-domain communication
50 Mashups Aren t Secure! " Scripts from multiple domains == security problem! " Fine for maps, not okay for confidential data Pink Floyd Dark Side of the Moon AJAX all purpose cleaner
51 Summary! " Ajax: a matter of degree! " Attack techniques improving quickly! " Technology pushed well past original design goals! " Old best practices still apply! " Don t trust the client! " Protect the server! " New challenges! " Harder to test! " More complexity == more room for error! " A new ally! " Build security into Ajax frameworks
52 Jacob West!
A Server and Browser-Transparent CSRF Defense for Web 2.0 Applications. Slides by Connor Schnaith
A Server and Browser-Transparent CSRF Defense for Web 2.0 Applications Slides by Connor Schnaith Cross-Site Request Forgery One-click attack, session riding Recorded since 2001 Fourth out of top 25 most
WEB SECURITY CONCERNS THAT WEB VULNERABILITY SCANNING CAN IDENTIFY
WEB SECURITY CONCERNS THAT WEB VULNERABILITY SCANNING CAN IDENTIFY www.alliancetechpartners.com WEB SECURITY CONCERNS THAT WEB VULNERABILITY SCANNING CAN IDENTIFY More than 70% of all websites have vulnerabilities
Detecting and Defending Against Security Vulnerabilities for Web 2.0 Applications
Detecting and Defending Against Security Vulnerabilities for Web 2.0 Applications Ray Lai, Intuit TS-5358 Share experience how to detect and defend security vulnerabilities in Web 2.0 applications using
Web Application Security. Vulnerabilities, Weakness and Countermeasures. Massimo Cotelli CISSP. Secure
Vulnerabilities, Weakness and Countermeasures Massimo Cotelli CISSP Secure : Goal of This Talk Security awareness purpose Know the Web Application vulnerabilities Understand the impacts and consequences
Finding and Preventing Cross- Site Request Forgery. Tom Gallagher Security Test Lead, Microsoft
Finding and Preventing Cross- Site Request Forgery Tom Gallagher Security Test Lead, Microsoft Agenda Quick reminder of how HTML forms work How cross-site request forgery (CSRF) attack works Obstacles
Introduction to Computer Security
Introduction to Computer Security Web Application Security Pavel Laskov Wilhelm Schickard Institute for Computer Science Modern threat landscape The majority of modern vulnerabilities are found in web
Where every interaction matters.
Where every interaction matters. Peer 1 Vigilant Web Application Firewall Powered by Alert Logic The Open Web Application Security Project (OWASP) Top Ten Web Security Risks and Countermeasures White Paper
Web-Application Security
Web-Application Security Kristian Beilke Arbeitsgruppe Sichere Identität Fachbereich Mathematik und Informatik Freie Universität Berlin 29. Juni 2011 Overview Web Applications SQL Injection XSS Bad Practice
Detecting and Exploiting XSS with Xenotix XSS Exploit Framework
Detecting and Exploiting XSS with Xenotix XSS Exploit Framework [email protected] keralacyberforce.in Introduction Cross Site Scripting or XSS vulnerabilities have been reported and exploited since 1990s.
Chapter 1 Web Application (In)security 1
Introduction xxiii Chapter 1 Web Application (In)security 1 The Evolution of Web Applications 2 Common Web Application Functions 4 Benefits of Web Applications 5 Web Application Security 6 "This Site Is
Javascript Security, XSS, and Uncovered Topics. Pat Morin COMP 2405
Javascript Security, XSS, and Uncovered Topics Pat Morin COMP 2405 Contents The Javascript same origin policy Cross-site scripting Pure Javascript exploits Other topics 2 The JavaScript Same Origin Policy
Integrating Web Application Security into the IT Curriculum
Integrating Web Application Security into the IT Curriculum James Walden Northern Kentucky University Topics 1. 2. 3. 4. Why should we teach web application security? What material do we need to cover?
FINAL DoIT 11.03.2015 - v.4 PAYMENT CARD INDUSTRY DATA SECURITY STANDARDS APPLICATION DEVELOPMENT AND MAINTENANCE PROCEDURES
Purpose: The Department of Information Technology (DoIT) is committed to developing secure applications. DoIT s System Development Methodology (SDM) and Application Development requirements ensure that
Hack Proof Your Webapps
Hack Proof Your Webapps About ERM About the speaker Web Application Security Expert Enterprise Risk Management, Inc. Background Web Development and System Administration Florida International University
3. Broken Account and Session Management. 4. Cross-Site Scripting (XSS) Flaws. Web browsers execute code sent from websites. Account Management
What is an? s Ten Most Critical Web Application Security Vulnerabilities Anthony LAI, CISSP, CISA Chapter Leader (Hong Kong) [email protected] Open Web Application Security Project http://www.owasp.org
ArcGIS Server Security Threats & Best Practices 2014. David Cordes Michael Young
ArcGIS Server Security Threats & Best Practices 2014 David Cordes Michael Young Agenda Introduction Threats Best practice - ArcGIS Server settings - Infrastructure settings - Processes Summary Introduction
WHITE PAPER. FortiWeb and the OWASP Top 10 Mitigating the most dangerous application security threats
WHITE PAPER FortiWeb and the OWASP Top 10 PAGE 2 Introduction The Open Web Application Security project (OWASP) Top Ten provides a powerful awareness document for web application security. The OWASP Top
Exploiting Web 2.0 Next Generation Vulnerabilities
Exploiting Web 2.0 Next Generation Vulnerabilities OWASP EU09 Poland Shreeraj Shah Chapter Lead Founder & Director Blueinfy Solutions [email protected] Copyright The OWASP Foundation Permission is
What is Web Security? Motivation
[email protected] http://www.brucker.ch/ Information Security ETH Zürich Zürich, Switzerland Information Security Fundamentals March 23, 2004 The End Users View The Server Providers View What is Web
Magento Security and Vulnerabilities. Roman Stepanov
Magento Security and Vulnerabilities Roman Stepanov http://ice.eltrino.com/ Table of contents Introduction Open Web Application Security Project OWASP TOP 10 List Common issues in Magento A1 Injection
Web Application Worms & Browser Insecurity
Web Application Worms & Browser Insecurity Mike Shema Welcome Background Hacking Exposed: Web Applications The Anti-Hacker Toolkit Hack Notes: Web Security Currently working at Qualys
White Paper. Understanding Web 2.0. Technologies, Risks, and Best Practices
Understanding Web 2.0 Technologies, Risks, and Best Practices White Paper Companies of all sizes are leveraging Web 2.0 technologies to improve Web site usability and to open new channels of communication.
Criteria for web application security check. Version 2015.1
Criteria for web application security check Version 2015.1 i Content Introduction... iii ISC- P- 001 ISC- P- 001.1 ISC- P- 001.2 ISC- P- 001.3 ISC- P- 001.4 ISC- P- 001.5 ISC- P- 001.6 ISC- P- 001.7 ISC-
Security Research Advisory IBM inotes 9 Active Content Filtering Bypass
Security Research Advisory IBM inotes 9 Active Content Filtering Bypass Table of Contents SUMMARY 3 VULNERABILITY DETAILS 3 TECHNICAL DETAILS 4 LEGAL NOTICES 7 Active Content Filtering Bypass Advisory
HTTPParameter Pollution. ChrysostomosDaniel
HTTPParameter Pollution ChrysostomosDaniel Introduction Nowadays, many components from web applications are commonly run on the user s computer (such as Javascript), and not just on the application s provider
Recommended Practice Case Study: Cross-Site Scripting. February 2007
Recommended Practice Case Study: Cross-Site Scripting February 2007 iii ACKNOWLEDGEMENT This document was developed for the U.S. Department of Homeland Security to provide guidance for control system cyber
Web application testing
CL-WTS Web application testing Classroom 2 days Testing plays a very important role in ensuring security and robustness of web applications. Various approaches from high level auditing through penetration
Security features of ZK Framework
1 Security features of ZK Framework This document provides a brief overview of security concerns related to JavaScript powered enterprise web application in general and how ZK built-in features secures
Bug Report. Date: March 19, 2011 Reporter: Chris Jarabek ([email protected])
Bug Report Date: March 19, 2011 Reporter: Chris Jarabek ([email protected]) Software: Kimai Version: 0.9.1.1205 Website: http://www.kimai.org Description: Kimai is a web based time-tracking application.
CSE598i - Web 2.0 Security OWASP Top 10: The Ten Most Critical Web Application Security Vulnerabilities
CSE598i - Web 2.0 Security OWASP Top 10: The Ten Most Critical Web Application Security Vulnerabilities Thomas Moyer Spring 2010 1 Web Applications What has changed with web applications? Traditional applications
Security Products Development. Leon Juranic [email protected]
Security Products Development Leon Juranic [email protected] Security Products Development Q: Why I picked this boring topic at all? A: Avoidance of any hackingrelated topics for fsec (khm.) :) Security
WEB ATTACKS AND COUNTERMEASURES
WEB ATTACKS AND COUNTERMEASURES February 2008 The Government of the Hong Kong Special Administrative Region The contents of this document remain the property of, and may not be reproduced in whole or in
Adobe Systems Incorporated
Adobe Connect 9.2 Page 1 of 8 Adobe Systems Incorporated Adobe Connect 9.2 Hosted Solution June 20 th 2014 Adobe Connect 9.2 Page 2 of 8 Table of Contents Engagement Overview... 3 About Connect 9.2...
Ruby on Rails Secure Coding Recommendations
Introduction Altius IT s list of Ruby on Rails Secure Coding Recommendations is based upon security best practices. This list may not be complete and Altius IT recommends this list be augmented with additional
Sitefinity Security and Best Practices
Sitefinity Security and Best Practices Table of Contents Overview The Ten Most Critical Web Application Security Risks Injection Cross-Site-Scripting (XSS) Broken Authentication and Session Management
AJAX Storage: A Look at Flash Cookies and Internet Explorer Persistence
AJAX Storage: A Look at Flash Cookies and Internet Explorer Persistence Corey Benninger The AJAX Storage Dilemna AJAX (Asynchronous JavaScript and XML) applications are constantly looking for ways to increase
Network Security Exercise #8
Computer and Communication Systems Lehrstuhl für Technische Informatik Network Security Exercise #8 Falko Dressler and Christoph Sommer Computer and Communication Systems Institute of Computer Science,
Cross Site Scripting Prevention
Project Report CS 649 : Network Security Cross Site Scripting Prevention Under Guidance of Prof. Bernard Menezes Submitted By Neelamadhav (09305045) Raju Chinthala (09305056) Kiran Akipogu (09305074) Vijaya
THE SMARTEST WAY TO PROTECT WEBSITES AND WEB APPS FROM ATTACKS
THE SMARTEST WAY TO PROTECT WEBSITES AND WEB APPS FROM ATTACKS INCONVENIENT STATISTICS 70% of ALL threats are at the Web application layer. Gartner 73% of organizations have been hacked in the past two
EVALUATING COMMERCIAL WEB APPLICATION SECURITY. By Aaron Parke
EVALUATING COMMERCIAL WEB APPLICATION SECURITY By Aaron Parke Outline Project background What and why? Targeted sites Testing process Burp s findings Technical talk My findings and thoughts Questions Project
Acunetix Website Audit. 5 November, 2014. Developer Report. Generated by Acunetix WVS Reporter (v8.0 Build 20120808)
Acunetix Website Audit 5 November, 2014 Developer Report Generated by Acunetix WVS Reporter (v8.0 Build 20120808) Scan of http://filesbi.go.id:80/ Scan details Scan information Starttime 05/11/2014 14:44:06
Introduction:... 1 Security in SDLC:... 2 Penetration Testing Methodology: Case Study... 3
Table of Contents Introduction:... 1 Security in SDLC:... 2 Penetration Testing Methodology: Case Study... 3 Information Gathering... 3 Vulnerability Testing... 7 OWASP TOP 10 Vulnerabilities:... 8 Injection
The Prevalence of Flash Vulnerabilities on the Web
TECHNICAL BRIEF FLASH FLOODING The Prevalence of Flash Vulnerabilities on the Web Adobe Flash Player is a cross-platform, browser plugin that provides uncompromised viewing of expressive applications,
(WAPT) Web Application Penetration Testing
(WAPT) Web Application Penetration Testing Module 0: Introduction 1. Introduction to the course. 2. How to get most out of the course 3. Resources you will need for the course 4. What is WAPT? Module 1:
DNS Pinning and Web Proxies
DNS Pinning and Web Proxies An NGSSoftware Insight Security Research (NISR) Publication 2007 Next Generation Security Software Ltd Abstract DNS-based attacks can be used to perform a partial breach of
Java Web Application Security
Java Web Application Security RJUG Nov 11, 2003 Durkee Consulting www.rd1.net 1 Ralph Durkee SANS Certified Mentor/Instructor SANS GIAC Network Security and Software Development Consulting Durkee Consulting
Web Application Security
E-SPIN PROFESSIONAL BOOK Vulnerability Management Web Application Security ALL THE PRACTICAL KNOW HOW AND HOW TO RELATED TO THE SUBJECT MATTERS. COMBATING THE WEB VULNERABILITY THREAT Editor s Summary
Ethical Hacking as a Professional Penetration Testing Technique
Ethical Hacking as a Professional Penetration Testing Technique Rochester ISSA Chapter Rochester OWASP Chapter - Durkee Consulting, Inc. [email protected] 2 Background Founder of Durkee Consulting since 1996
Is Drupal secure? A high-level perspective on web vulnerabilities, Drupal s solutions, and how to maintain site security
Is Drupal secure? A high-level perspective on web vulnerabilities, Drupal s solutions, and how to maintain site security Presented 2009-05-29 by David Strauss Thinking Securely Security is a process, not
Cross-Site Scripting
Cross-Site Scripting (XSS) Computer and Network Security Seminar Fabrice Bodmer ([email protected]) UNIFR - Winter Semester 2006-2007 XSS: Table of contents What is Cross-Site Scripting (XSS)? Some
National Information Security Group The Top Web Application Hack Attacks. Danny Allan Director, Security Research
National Information Security Group The Top Web Application Hack Attacks Danny Allan Director, Security Research 1 Agenda Web Application Security Background What are the Top 10 Web Application Attacks?
DNS REBINDING DENIS BARANOV, POSITIVE TECHNOLOGIES
DNS REBINDING DENIS BARANOV, POSITIVE TECHNOLOGIES TABLE OF CONTENTS 1 Bypassing The Restrictions 3 2 Putting It into Practice 5 3 Actual Load 7 4 Detection Of The Application Version 5 Guessing A/The
Web Application Security 101
dotdefender Web Application Security Web Application Security 101 1 Web Application Security 101 As the Internet has evolved over the years, it has become an integral part of virtually every aspect in
Sichere Webanwendungen mit Java
Sichere Webanwendungen mit Java Karlsruher IT- Sicherheitsinitiative 16.07.2015 Dominik Schadow bridgingit Patch fast Unsafe platform unsafe web application Now lets have a look at the developers OWASP
Web applications. Web security: web basics. HTTP requests. URLs. GET request. Myrto Arapinis School of Informatics University of Edinburgh
Web applications Web security: web basics Myrto Arapinis School of Informatics University of Edinburgh HTTP March 19, 2015 Client Server Database (HTML, JavaScript) (PHP) (SQL) 1 / 24 2 / 24 URLs HTTP
Web Application Security
Web Application Security Prof. Sukumar Nandi Indian Institute of Technology Guwahati Agenda Web Application basics Web Network Security Web Host Security Web Application Security Best Practices Questions?
The Top Web Application Attacks: Are you vulnerable?
QM07 The Top Web Application Attacks: Are you vulnerable? John Burroughs, CISSP Sr Security Architect, Watchfire Solutions [email protected] Agenda Current State of Web Application Security Understanding
STOPPING LAYER 7 ATTACKS with F5 ASM. Sven Müller Security Solution Architect
STOPPING LAYER 7 ATTACKS with F5 ASM Sven Müller Security Solution Architect Agenda Who is targeted How do Layer 7 attacks look like How to protect against Layer 7 attacks Building a security policy Layer
Blackbox Reversing of XSS Filters
Blackbox Reversing of XSS Filters Alexander Sotirov [email protected] Introduction Web applications are the future Reversing web apps blackbox reversing very different environment and tools Cross-site scripting
Out of the Fire - Adding Layers of Protection When Deploying Oracle EBS to the Internet
Out of the Fire - Adding Layers of Protection When Deploying Oracle EBS to the Internet March 8, 2012 Stephen Kost Chief Technology Officer Integrigy Corporation Phil Reimann Director of Business Development
Intrusion detection for web applications
Intrusion detection for web applications Intrusion detection for web applications Łukasz Pilorz Application Security Team, Allegro.pl Reasons for using IDS solutions known weaknesses and vulnerabilities
CS 558 Internet Systems and Technologies
CS 558 Internet Systems and Technologies Dimitris Deyannis [email protected] 881 Heat seeking Honeypots: Design and Experience Abstract Compromised Web servers are used to perform many malicious activities.
RTC-Web Security Considerations
RTC-Web Security Considerations IETF 80 Eric Rescorla [email protected] IETF 80 RTC-Web Security Issues 1 The Browser Threat Model Core Web Security Guarantee: users can safely visit arbitrary web sites and
IJMIE Volume 2, Issue 9 ISSN: 2249-0558
Survey on Web Application Vulnerabilities Prevention Tools Student, Nilesh Khochare* Student,Satish Chalurkar* Professor, Dr.B.B.Meshram* Abstract There are many commercial software security assurance
Security Model for the Client-Side Web Application Environments
Security Model for the Client-Side Web Application Environments May 24, 2007 Sachiko Yoshihama, Naohiko Uramoto, Satoshi Makino, Ai Ishida, Shinya Kawanaka, and Frederik De Keukelaere IBM Tokyo Research
Barracuda Web Application Firewall vs. Intrusion Prevention Systems (IPS) Whitepaper
Barracuda Web Application Firewall vs. Intrusion Prevention Systems (IPS) Whitepaper Securing Web Applications As hackers moved from attacking the network to attacking the deployed applications, a category
5 Mistakes to Avoid on Your Drupal Website
5 Mistakes to Avoid on Your Drupal Website Table of Contents Introduction.... 3 Architecture: Content.... 4 Architecture: Display... 5 Architecture: Site or Functionality.... 6 Security.... 8 Performance...
Learn Ethical Hacking, Become a Pentester
Learn Ethical Hacking, Become a Pentester Course Syllabus & Certification Program DOCUMENT CLASSIFICATION: PUBLIC Copyrighted Material No part of this publication, in whole or in part, may be reproduced,
Secure Programming with Static Analysis. Jacob West [email protected]
Secure Programming with Static Analysis Jacob West [email protected] Software Systems that are Ubiquitous Connected Dependable Complexity U Unforeseen Consequences Software Security Today The line between
Cracking the Perimeter via Web Application Hacking. Zach Grace, CISSP, CEH [email protected] January 17, 2014 2014 Mega Conference
Cracking the Perimeter via Web Application Hacking Zach Grace, CISSP, CEH [email protected] January 17, 2014 2014 Mega Conference About 403 Labs 403 Labs is a full-service information security and compliance
OWASP AND APPLICATION SECURITY
SECURING THE 3DEXPERIENCE PLATFORM OWASP AND APPLICATION SECURITY Milan Bruchter/Shutterstock.com WHITE PAPER EXECUTIVE SUMMARY As part of Dassault Systèmes efforts to counter threats of hacking, particularly
OWASP Top Ten Tools and Tactics
OWASP Top Ten Tools and Tactics Russ McRee Copyright 2012 HolisticInfoSec.org SANSFIRE 2012 10 JULY Welcome Manager, Security Analytics for Microsoft Online Services Security & Compliance Writer (toolsmith),
Pwning Intranets with HTML5
Javier Marcos de Prado Juan Galiana Lara Pwning Intranets with HTML5 2009 IBM Corporation Agenda How our attack works? How we discover what is in your network? What does your infrastructure tell us for
Application Code Development Standards
Application Code Development Standards Overview This document is intended to provide guidance to campus system owners and software developers regarding secure software engineering practices. These standards
Hacking Intranet Websites from the Outside (Take 2) Fun With & Without JavaScript Malware
Hacking Intranet Websites from the Outside (Take 2) Fun With & Without JavaScript Malware July 2007 Jeremiah Grossman Founder and CTO, WhiteHat Security A WhiteHat Security Whitepaper 3003 Bunker Hill
Revisiting SQL Injection Will we ever get it right? Michael Sutton, Security Evangelist
Revisiting SQL Injection Will we ever get it right? Michael Sutton, Security Evangelist Overview Background What it is? How are we doing? Web 2.0 SQL injection meets AJAX Fuggle SQL Injection meets Google
AJAX. Gregorio López López [email protected] Juan Francisco López Panea [email protected]
AJAX Gregorio López López [email protected] Juan Francisco López Panea [email protected] Departamento de Ingeniería Telemática Universidad Carlos III de Madrid Contents 1. Introduction 2. Overview
Network Security Audit. Vulnerability Assessment (VA)
Network Security Audit Vulnerability Assessment (VA) Introduction Vulnerability Assessment is the systematic examination of an information system (IS) or product to determine the adequacy of security measures.
Application security testing: Protecting your application and data
E-Book Application security testing: Protecting your application and data Application security testing is critical in ensuring your data and application is safe from security attack. This ebook offers
AJAX and JSON Lessons Learned. Jim Riecken, Senior Software Engineer, Blackboard Inc.
AJAX and JSON Lessons Learned Jim Riecken, Senior Software Engineer, Blackboard Inc. About Me Jim Riecken Senior Software Engineer At Blackboard for 4 years. Work out of the Vancouver office. Working a
Web Application Penetration Testing
Web Application Penetration Testing 2010 2010 AT&T Intellectual Property. All rights reserved. AT&T and the AT&T logo are trademarks of AT&T Intellectual Property. Will Bechtel [email protected]
Thomas Röthlisberger IT Security Analyst [email protected]
Thomas Röthlisberger IT Security Analyst [email protected] Compass Security AG Werkstrasse 20 Postfach 2038 CH-8645 Jona Tel +41 55 214 41 60 Fax +41 55 214 41 61 [email protected] www.csnc.ch What
Web Application Vulnerability Testing with Nessus
The OWASP Foundation http://www.owasp.org Web Application Vulnerability Testing with Nessus Rïk A. Jones, CISSP [email protected] Rïk A. Jones Web developer since 1995 (16+ years) Involved with information
Developing ASP.NET MVC 4 Web Applications MOC 20486
Developing ASP.NET MVC 4 Web Applications MOC 20486 Course Outline Module 1: Exploring ASP.NET MVC 4 The goal of this module is to outline to the students the components of the Microsoft Web Technologies
External Vulnerability Assessment. -Technical Summary- ABC ORGANIZATION
External Vulnerability Assessment -Technical Summary- Prepared for: ABC ORGANIZATI On March 9, 2008 Prepared by: AOS Security Solutions 1 of 13 Table of Contents Executive Summary... 3 Discovered Security
Penetration Test Report
Penetration Test Report Acme Test Company ACMEIT System 26 th November 2010 Executive Summary Info-Assure Ltd was engaged by Acme Test Company to perform an IT Health Check (ITHC) on the ACMEIT System
Information Supplement: Requirement 6.6 Code Reviews and Application Firewalls Clarified
Standard: Data Security Standard (DSS) Requirement: 6.6 Date: February 2008 Information Supplement: Requirement 6.6 Code Reviews and Application Firewalls Clarified Release date: 2008-04-15 General PCI
Web Application Security
Web Application Security John Zaharopoulos ITS - Security 10/9/2012 1 Web App Security Trends Web 2.0 Dynamic Webpages Growth of Ajax / Client side Javascript Hardening of OSes Secure by default Auto-patching
Course Content: Session 1. Ethics & Hacking
Course Content: Session 1 Ethics & Hacking Hacking history : How it all begin Why is security needed? What is ethical hacking? Ethical Hacker Vs Malicious hacker Types of Hackers Building an approach for
Network Security Web Security
Network Security Web Security Anna Sperotto, Ramin Sadre Design and Analysis of Communication Systems Group University of Twente, 2012 Cross Site Scripting Cross Side Scripting (XSS) XSS is a case of (HTML)
elearning for Secure Application Development
elearning for Secure Application Development Curriculum Application Security Awareness Series 1-2 Secure Software Development Series 2-8 Secure Architectures and Threat Modeling Series 9 Application Security
SESSION IDENTIFIER ARE FOR NOW, PASSWORDS ARE FOREVER
SESSION IDENTIFIER ARE FOR NOW, PASSWORDS ARE FOREVER XSS-BASED ABUSE OF BROWSER PASSWORD MANAGERS Ben Stock, Martin Johns, Sebastian Lekies Browser choices Full disclosure: Ben was an intern with Microsoft
Client vs. Server Implementations of Mitigating XSS Security Threats on Web Applications
Journal of Basic and Applied Engineering Research pp. 50-54 Krishi Sanskriti Publications http://www.krishisanskriti.org/jbaer.html Client vs. Server Implementations of Mitigating XSS Security Threats
Table of Contents. Open-Xchange Authentication & Session Handling. 1.Introduction...3
Open-Xchange Authentication & Session Handling Table of Contents 1.Introduction...3 2.System overview/implementation...4 2.1.Overview... 4 2.1.1.Access to IMAP back end services...4 2.1.2.Basic Implementation
Integrated Network Vulnerability Scanning & Penetration Testing SAINTcorporation.com
SAINT Integrated Network Vulnerability Scanning and Penetration Testing www.saintcorporation.com Introduction While network vulnerability scanning is an important tool in proactive network security, penetration
Project 2: Web Security Pitfalls
EECS 388 September 19, 2014 Intro to Computer Security Project 2: Web Security Pitfalls Project 2: Web Security Pitfalls This project is due on Thursday, October 9 at 6 p.m. and counts for 8% of your course
Preparing for the Cross Site Request Forgery Defense
Preparing for the Cross Site Request Forgery Defense Chuck Willis [email protected] Black Hat DC 2008 February 20, 2008 About Me Principal Consultant with MANDIANT in Alexandria, VA Full spectrum
Gateway Apps - Security Summary SECURITY SUMMARY
Gateway Apps - Security Summary SECURITY SUMMARY 27/02/2015 Document Status Title Harmony Security summary Author(s) Yabing Li Version V1.0 Status draft Change Record Date Author Version Change reference
