+ All Categories
Home > Technology > Practical web-attacks2

Practical web-attacks2

Date post: 25-Dec-2014
Category:
Upload: pavol-luptak
View: 3,193 times
Download: 0 times
Share this document with a friend
Description:
 
15
       www.nethemba.com            www.nethemba.com      Web application attacks – practical demonstration Ing. Pavol Lupták, CISSP, CEH
Transcript
Page 1: Practical web-attacks2

   

     www.nethemba.com            www.nethemba.com      

Web application attacks – practical

demonstrationIng. Pavol Lupták, CISSP, CEH

Page 2: Practical web-attacks2

   

     www.nethemba.com       

Agenda Unvalidates Parameters Access Control Flaws Session Management Flaws Cross Site Scripting (XSS) Injection flaws (bonus) Improper Error Handling (bonus) AJAX Security (bonus)

Page 3: Practical web-attacks2

   

     www.nethemba.com       

Access Controls Flaws

Bypass a Path Based Access Control Scheme Bypass Data Layer Access Control Bypass Business Layer Access Control Remote Admin Access

Page 4: Practical web-attacks2

   

     www.nethemba.com       

AJAX Security DOM­based XSS Client Side Filtering Same Origin Policy (SOP) Protection XML Injection JSON Injection Silent Transaction Attacks Dangerous Use of Eval

Page 5: Practical web-attacks2

   

     www.nethemba.com       

Authentication flaws Forgot Password Multilevel Login 1 Multilevel Login 2

Page 6: Practical web-attacks2

   

     www.nethemba.com       

Code Quality Discover Clues in the HTML code

Page 7: Practical web-attacks2

   

     www.nethemba.com       

Concurrency Shopping Card Concurrency Flaw

Page 8: Practical web-attacks2

   

     www.nethemba.com       

Cross Site Scripting (XSS)

Stored XSS Reflected XSS Cross Site Request Forgery (CSRF) HTTPonly test

Page 9: Practical web-attacks2

   

     www.nethemba.com       

Improper Error Handling

Fail Open Authentication Scheme

Page 10: Practical web-attacks2

   

     www.nethemba.com       

Injection flaws

Blind SQL injection Numeric SQL injection String SQL injection XPATH injection

Page 11: Practical web-attacks2

   

     www.nethemba.com       

Parameter tampering

Exploit Hidden Fields Exploit Unchecked Email Bypass Client Side JavaScript Validation

Page 12: Practical web-attacks2

   

     www.nethemba.com       

Session Management Flaws

Spoof an Authentication Cookie Hijack a Session Session Fixation Attack

Page 13: Practical web-attacks2

   

     www.nethemba.com       

Used tools WebGoat project 

http://www.owasp.org/index.php/Category:OWASP_WebGoat_Project

WebScarab http://www.owasp.org/index.php/Category:OWASP_WebScarab_Project

Tamperdata http://tamperdata.mozdev.org/

LiveHTTPHeaders http://livehttpheaders.mozdev.org/

Foxy Proxy http://foxyproxy.mozdev.org/

Page 14: Practical web-attacks2

   

     www.nethemba.com       

References

New Web Applications Attacks http://www.nethemba.com/new_web_attacks­nethemba.pdf

LAMP and PHP security hardening (in Slovak language)  http://www.nethemba.com/php­sec.pdf

Page 15: Practical web-attacks2

   

     www.nethemba.com       

Thank you for listening!

Ing. Pavol Lupták, CISSP, [email protected]


Recommended