• Share
  • Email
  • Embed
  • Like
  • Save
  • Private Content
Ajax Fingerprinting Filtering Wth Mod Security2
 

Ajax Fingerprinting Filtering Wth Mod Security2

on

  • 581 views

 

Statistics

Views

Total Views
581
Views on SlideShare
580
Embed Views
1

Actions

Likes
0
Downloads
10
Comments
0

1 Embed 1

http://www.dustinschmidt.com 1

Accessibility

Upload Details

Uploaded via as Adobe PDF

Usage Rights

© All Rights Reserved

Report content

Flagged as inappropriate Flag as inappropriate
Flag as inappropriate

Select your reason for flagging this presentation as inappropriate.

Cancel
  • Full Name Full Name Comment goes here.
    Are you sure you want to
    Your message goes here
    Processing…
Post Comment
Edit your comment

    Ajax Fingerprinting Filtering Wth Mod Security2 Ajax Fingerprinting Filtering Wth Mod Security2 Presentation Transcript

    • ModSecurity Use Case: Web 2.0 Defense with Ajax Fingerprinting and Filtering Ajax is fast becoming an integral part of new generation Web applications known as Web 2.0 applications. This evolution has led to new attack vectors coming into existence around these new technologies. This article is largely based on Shreeraj Shah’s article of the same name that appeared in the December 2006 edition of Insecure Magazine (http://www.net- security.org/dl/insecure/INSECURE-Mag-9.pdf). Ryan C. Barnett, Director of Application Security Training at Breach Security, has updated numerous sections to reflect the advanced ModSecurity 2.0 rules language. To combat these new threats one needs to look at different strategies as well. In this paper we shall look at different approaches and tools to improve security posture at both, the server as well as browser ends. Listed below are the key learning objectives: • The need for Ajax fingerprinting and con