Web App Forensics
Upcoming SlideShare
Loading in...5
×

Like this? Share it with your network

Share

Web App Forensics

  • 546 views
Uploaded on

 

More in: Technology
  • Full Name Full Name Comment goes here.
    Are you sure you want to
    Your message goes here
    Be the first to comment
    Be the first to like this
No Downloads

Views

Total Views
546
On Slideshare
546
From Embeds
0
Number of Embeds
0

Actions

Shares
Downloads
11
Comments
0
Likes
0

Embeds 0

No embeds

Report content

Flagged as inappropriate Flag as inappropriate
Flag as inappropriate

Select your reason for flagging this presentation as inappropriate.

Cancel
    No notes for slide

Transcript

  • 1. Web Application Forensics: The Uncharted Territory By Ory Segal, Sanctum Security Group Introduction “If criminals would always schedule their movements like railway trains, it would certainly be more convenient for all of us” (Sherlock Holmes – “The valley of fear”) Well, web application hackers don’t schedule their movements – and they certainly don’t use tools and attacks, that are easily spotted or investigated. Names such as: Cross Site Scripting, Poison Null Byte and SQL Injection are just the tip of the iceberg in a new war front. IT professionals are used to monitoring network traffic, using network sniffers and state- of-the-art intrusion detection systems which analyze bizarre network behavior and watch patterns of weird packets considered as network attacks. Many companies also install tripwires and honey pots to catch hackers who are trying to hack in through defected telnet daemon