Your SlideShare is downloading. ×
Jan 2008 Allup
Upcoming SlideShare
Loading in...5
×

Thanks for flagging this SlideShare!

Oops! An error has occurred.

×
Saving this for later? Get the SlideShare app to save on your phone or tablet. Read anywhere, anytime – even offline.
Text the download link to your phone
Standard text messaging rates apply

Jan 2008 Allup

2,822

Published on

Deck from my Jan 2008 MSDN presentations - download presentations at http://www.msdnevents.com/resources/2008-winter-resources.aspx

Deck from my Jan 2008 MSDN presentations - download presentations at http://www.msdnevents.com/resources/2008-winter-resources.aspx

Published in: Economy & Finance, Technology
0 Comments
0 Likes
Statistics
Notes
  • Be the first to comment

  • Be the first to like this

No Downloads
Views
Total Views
2,822
On Slideshare
0
From Embeds
0
Number of Embeds
0
Actions
Shares
0
Downloads
39
Comments
0
Likes
0
Embeds 0
No embeds

Report content
Flagged as inappropriate Flag as inappropriate
Flag as inappropriate

Select your reason for flagging this presentation as inappropriate.

Cancel
No notes for slide
  • Transcript

    • 1. MSDN Events – January 2008
      • Lynn Langit SoCal MSDN dev evangelist
      • blogs.msdn.com/SoCalDevGal
      • blogs.msdn.com/geekSpeak
    • 2. Today’s Topics
      • IIS 7.0 for developers
      • Security Sidebars – fixing common vulnerabilities
      • ASP.NET Membership Provider customization
    • 3. Today’s Schedule – Irvine, CA (am)
      • 12 pm to 1:45 pm – IIS 7.0
      • 2:00 pm to 3:45 pm – Security Sidebars
      • 4:00 pm to 5:00 pm – ASP.NET Membership Provider
    • 4. Some Housekeeping…
      • Please set all cell phones to silent
      • Evaluations are important!!
        • 9 = A
        • 8 = B
        • 7 = C
        • If < 7 please include comments
      • Resource DVD – our way of saying “Thanks!”
      • Giveaways!!
    • 5. BUSINESS AND TECHNICAL EXECUTIVES SMALL BUSINESS IT PROFESSIONALS IT DEVELOPERS PARTNERS
        • Events designed to show business and technical executives how to streamline operations and increase efficiency through technology
      Information for small business decision makers who want to improve productivity, efficiency, and security in their workplace “ How-To” sessions delivering highly technical content -- direct from a Microsoft technology specialist with real-world experience
        • Sessions designed for developers to get the latest tools and tips, chat with fellow developers and learn how to create rich new applications
      Designed for technology providers who are seeking to enhance technical knowledge, to improve selling skills and to learn about various programs and offers for partners.
    • 6. What’s on in West Region
      • SoCal code camp Fullerton – Jan 26/27
      • Sleepless SharePoint Dev Event SoCal – Jan 26/27
      • Office Dev Conf (SanJose) – Feb 11-13
      • Launch LA – Feb 27
      • BarCampLA – Mar 1-2
      • SharePoint Dev Conf (Redmond) – March 3-6
      • Mix08 (Las Vegas) – March 5-7
      • CodeTrip (SoCal) – March 26-31
    • 7. HP Compaq dc7800 desktop PC with Intel ® Core ™ 2 Processor with vPro ™ Technology Special Offer: HP Compaq dc7800 Smart Buy*: Price:   $1,059.00 Save $340! www.hp.com/go/smartbuy Intel® Core™2 Duo processor E6550 2.33 GHz 4 MB L2 cache 1333 MHz front side bus Intel Q35 Express Chipset 2 GB 667 MHz DDR2 SDRAM 160 GB 7200 rpm SATA 3 year warranty P/N: RU026UT *HP Smart Buys are the easiest way to get the most popular, expertly pre-configured, ready-to-ship business solutions at discounted prices.
    • 8. Promotional Offer
      • Visit the New Horizons CLC/Microsoft Learning table today and ask for your 40% discount exam voucher. Please visit us at: www.NewHorizons.com
      • or www.microsoft.com/learning
    • 9. What’s new for developers in IIS7
    • 10. What Will We cover?
      • The new processing pipeline in IIS7
      • Using technologies such as PHP with IIS7
      • Customizing IIS7 with managed code
    • 11. Agenda
      • Introducing IIS7 Architecture
      • Securing IIS7
      • Extending IIS7
    • 12. Architecture Overview HTTP Request HTTP Response Authentication Basic NTLM Anon CGI Static File ISAPI Send Response Compression Log HTTP Request Determine Handler aspnet_isapi.dll Authentication Windows ASPX Trace … Forms Map Handler HTTP Response Basic Anon Static File ISAPI Send Response Compression Log Execute Handler aspnet_isapi.dll Authentication Windows ASPX Trace … Forms Map Handler Authorization ResolveCache UpdateCache Authentication
    • 13. Windows Activation Service
      • Independent from IIS
      • Application pools
        • Identity
        • Isolates corruption
      • Message based activation
        • HTTP requests
        • Non-HTTP requests
    • 14. Hosting a WCF Service in WAS Demo
    • 15. Configuration Files
      • IIS/WAS global settings
        • applicationHost.config
      • Application specific settings
        • web.config
      • No metabase
      • Remote configuration
    • 16. Configuring IIS Demo
    • 17. Agenda
      • Introducing IIS7 Architecture
      • Securing IIS7
      • Extending IIS7
    • 18. Secure by Default
      • Less surface area
      • Request filtering
      • Handler permissions
      • Hardened listeners
    • 19. Authentication Modules Method Security Level How Passwords are Sent Crosses Proxy Servers and Firewalls Client Requirements Anonymous authentication None N/A Yes Any Browser ASP.NET Impersonation Medium Obscured Yes .NET Basic authentication Low Base64 encoded clear text Yes Most Browsers Digest authentication Medium Hashed Yes IE 5.0 or later FORMS authentication None Plain text Yes Windows authentication High Hashed or Kerberos ticket No, unless over VPN IE 2.0 for NTLM/ W2K and IE 5.0 for Kerberos Certificate authentication High N/A Yes, using a SSL connection IE and Netscape
    • 20. Managing modules Demo
    • 21. Agenda
      • Introducing IIS7 Architecture
      • Securing IIS7
      • Extending IIS7
    • 22. Type of Extensibility
      • Modules and Handlers
      • Extending configuration
      • Extending IIS Manager
      • Extending Diagnostics
    • 23. Modules and Handlers
      • Modules
        • Similar to ISAPI filters
        • Broader scope
      • Handlers
        • Similar to ISAPI extension
        • Narrower scope
    • 24. Extending IIS with managed code Demo
    • 25. Session Summary
      • IIS7 has a granular design
      • IIS7 has an integrated pipeline for handling requests
      • IIS7 is easily extensible with managed code
      • Links on Lynn’s blog – http://blogs.msdn.com/SoCalDevGal
    • 26. Web Security Sidebars MSDN Events
    • 27. What Will We cover?
      • Creating Secure Web Applications
      • Common Threats Faced
        • How Does It Work?
        • What are the risks?
        • Real World Examples
        • How do I protect my web site?
    • 28. Agenda
      • Growing importance of security
      • 5 Most Common Threats
      • Cross Site Scripting
      • SQL Injection
      • Integer Overflow
      • One-Click Attack / Cross Site Request Forgery
      • Insecure Direct Object Reference & Securing Sensitive Information
    • 29. www.HelloSecureWorld.com
      • Security is an increasingly important factor for web applications.
        • People place an increasing dependence on technology
        • Potential threats also increasing
      • ASP.NET integrates a number of built-in defensive barriers which make it easier to create secure web sites.
    • 30. How To Build Secure Web Apps
    • 31. Facets Of Web Security Web Security
    • 32. 5 Most Common Security Risks
    • 33. Cross Site Scripting
      • What is it Cross Site Scripting?
      • Allows hackers to run malicious script in a client’s Web browser
      • Any Web page that renders dynamic HTML based on content that users submit is vulnerable
    • 34. Cross Site Scripting
      • Potential Risks
      • Hackers can embed <script>, <object>, <applet>, and <embed> tags
      • Hackers can steal Web session information, modify the user’s screen
    • 35. Cross Site Scripting
      • How To Mitigate
      • Validate and constrain input
      • Properly encode output
      • Microsoft Anti-Cross Site Scripting Library
      • What about Server.HTMLEncode?
        • Uses blacklist for exclusion
        • Less secure
    • 36. Cross Site Scripting
      • Real World Example
      • Attackers redirected PayPal visitors to a page warning users their accounts had been compromised.
      • Victims were then redirected to a phishing site and prompted to enter sensitive financial data. Source: http://www.acunetix.com/news/paypal.htm
    • 37. Cross Site Scripting
    • 38. SQL Injection
      • What SQL Injection?
      • Affects dynamic SQL queries which utilize user input as part of the query
      • Attacker submits data containing a command that SQL server executes
      • Attack Vectors
        • Query strings
        • Forms
        • Web Services
    • 39. SQL Injection
      • Potential Risks
      • Probe databases
      • Bypass authorization
      • Execute multiple SQL statements
      • Call built-in stored procedures (e.g. xp_cmdshell)
    • 40. SQL Injection
      • How to Mitigate
      • Constrain and sanitize input data.
      • Use type-safe SQL parameters
      • Restrict permissions for account used to access database
      • Do not disclose error information
      • Use LINQ to SQL to access and interact with data
    • 41. SQL Injection
      • Real World Example
      • The official government website for the state of Rhode Island (www.ri.gov) was the victim of a SQL Injection attack in January of last year.
      • Hackers allegedly stole credit card data from individuals who have done business online with state agencies.
      • The hackers claimed to have stolen as many as 53,000 credit card numbers
        • Source: http://www.webappsec.org/projects/whid/list_id_2006-3.shtml
    • 42. SQL Injection
    • 43. Integer Overflow
      • What is Integer Overflow?
      • Occurs when an calculation causes an integer to exceed the max or min value allowed by its data type
    • 44. Integer Overflow
      • Potential Risks
      • Data corruption
      • Application crashes, instability
      • Execution of arbitrary code
    • 45. Preventing Integer Overflow
      • How To Mitigate
      • Validate user input
        • Check for min and max values
      • Use the correct data type
      • Execute your code in a checked context
    • 46. Integer Overflow
      • Real World Example
      • Apple’s OS X operating system contained a vulnerability which could be exploited remotely by an attacker to compromise a user's system.
      • The ffs_mountfs() method was vulnerable to an integer overflow which could potentially allow abritrary code to be executed. Source: http://searchsecurity.techtarget.com/originalContent/0,289142,sid14_gci1238554,00.html
    • 47. Integer Overflow
    • 48. Cross Site Request Forgery
      • What is Cross Site Request Forgery?
      • Forces a logged-on victim’s browser to send a request to a vulnerable web application
      • Request is sent by the victim, not the attacker
      • Can be difficult to detect
      • Also known as “One-Click” vulnerability
    • 49. Cross Site Request Forgery
      • Potential Risks
      • Exposes victims private information to attacker
      • Attacker can alter data, make purchases, retrieve account info.
      • Victim is usually unaware any changes have taken place
    • 50. Cross Site Request Forgery
      • How to Mitigate
      • Include unique token which the server validates when a request is received
        • ASP.NET: ViewStateUserKey
          • Ties view state content to a specific user
          • Must use unique value for each user
          • Recommended: ViewStateUserKey = Session.ID
      • Require user confirmation with a shared secret
    • 51. Cross Site Request Forgery
      • Real World Example
      • A security flaw at FTD.com made it possible to access customer data simply by copying a cookie from one computer to another.
      • In addition, sequential values were used as identifiers, making it easier to guess the numbers of other valid cookies. Source: http://www.news.com/2100-1017-984585.html
    • 52. Cross Site Request Forgery
    • 53. Insecure Direct Object Reference
      • What is Insecure Direct Object Reference?
      • Occurs when a direct reference to a file, directory, database record, etc. is exposed to users
      • Typically exposed in the URL as a querystring or form parameter
      • Hacker can manipulate reference to access other objects
    • 54. Insecure Direct Object Reference
      • Potential Risks
      • Attacker can access other files or resources on the server
        • Web.Config – contains database connection and user account info
        • SAM file – Holds the user names and password hashes for every account on the local machine
        • This data can be used to create additional attacks
    • 55. Insecure Direct Object Reference
      • Steps To Mitigate
      • Avoid directly referencing objects wherever possible
      • Use an index to assign a unique id, then reference the id
      • If a direct reference must be used employ methods to ensure only authorized objects are shown
      • Encrypt sensitive sections in web.config
    • 56. Insecure Direct Object Reference
      • Real World Example
      • Cahoot (www.cahoot.com) a UK based online bank, allowed allowed customers to access other people's account simply by changing the username in the URL
      • The website was closed down for 10 hours to repair the vulnerability
      • Source: http://news.bbc.co.uk/2/hi/business/3984845.stm
    • 57. Insecure Direct Object Reference
    • 58. Session Summary
      • Validate Input / Encode Output (Anti-XSS library)
      • Parameterize SQL Queries
      • Least privilege Account
      • Execute in a checked context
      • ViewStateUserKey = Session.ID
      • Reference objects Indirectly
      • Encrypt Web.Config
    • 59. For More Information
      • Anti XSS Library
        • http://www.microsoft.com/downloads/details.aspx?familyid=9a2b9c92-7ad9-496c-9a89-af08de2e5982&displaylang=en
      • Built-in ASP.NET security features
        • http://msdn2.microsoft.com/en-us/library/ms972969.aspx
        • HelloSecureWorld.com
          • http://www.hellosecureworld.com
    • 60. Extending ASP.NET Application Services MSDN Events Winter, 2007
    • 61. What Will We cover?
      • ASP.NET Provider Model
      • Application Services
      • Rich Clients in .NET 3.5
    • 62. Helpful Experience
      • ASP.NET 2.0 Login Controls
      • Microsoft Ajax Library
      • Silverlight
      • Building a WinForms application
      Level 200
    • 63. Agenda
      • Understanding ASP.NET providers and the Provider Model
      • Using Built-in Providers and Application Services
      • Using Application Services in .NET 3.5
    • 64. The Provider Model
      • Provider Design Pattern
      MembershipProvider:ProviderBase MySQLMembershipProvider:MembershipProvider Methods and Properties Overridden Methods and Properties Methods and Properties ProviderBase
      • Built-in Providers
      • Custom Providers
    • 65. Working with Providers
      • Integration with ASP.NET 2.0 controls
        • Login Controls
        • Other Controls
      • Provider Configuration
        • ASP.NET Server Setup
        • ASP.NET Configuration Tool
    • 66. Introducing Providers
    • 67. Agenda
      • Understanding ASP.NET providers and the Provider Model
      • Using Built-in Providers and Application Services
      • Using Application Services in .NET 3.5
    • 68. Application Service Flexibility ASP.NET Silverlight Web Services SOAP Clients Application Services Ajax
    • 69. Application Services with Ajax
      • Ajax
        • ASP.NET 2.0 – 3.5
        • Silverlight 1.0
      • Web Services
        • Silverlight 2.0
        • Other SOAP Clients
    • 70. Sharing Providers with Ajax and Silverlight
    • 71. Agenda
      • Understanding ASP.NET providers and the Provider Model
      • Using Built-in Providers and Application Services
      • Using Application Services in .NET 3.5
    • 72. Services in Visual Studio 2008
      • Application Services Integration
      • Services Page
      • New Libraries
        • System.Web.ClientServices
      • Offline Support
        • SQL/CE
        • Customized
    • 73. Using Application Services from a Rich Client
    • 74. Session Summary
      • Simplified storage solutions with the Provider Model
      • Using Application Services to increase productivity
      • Harness Application Services from different clients
      • http://www.msdnevents.com/resources
    • 75. Thanks for attending! Lynn Langit MSDN Developer Evangelist – Southern California http://blogs.msdn.com/SoCalDevGal

    ×