Web Application Forensics:
                           The Uncharted Territory
                       By Ory Segal, Sanctum...
Web App Forensics
Web App Forensics
Web App Forensics
Web App Forensics
Web App Forensics
Web App Forensics
Web App Forensics
Web App Forensics
Upcoming SlideShare
Loading in...5
×

Web App Forensics

269

Published on

Published in: Technology
0 Comments
0 Likes
Statistics
Notes
  • Be the first to comment

  • Be the first to like this

No Downloads
Views
Total Views
269
On Slideshare
0
From Embeds
0
Number of Embeds
0
Actions
Shares
0
Downloads
12
Comments
0
Likes
0
Embeds 0
No embeds

No notes for slide

Web App Forensics

  1. 1. Web Application Forensics: The Uncharted Territory By Ory Segal, Sanctum Security Group Introduction “If criminals would always schedule their movements like railway trains, it would certainly be more convenient for all of us” (Sherlock Holmes – “The valley of fear”) Well, web application hackers don’t schedule their movements – and they certainly don’t use tools and attacks, that are easily spotted or investigated. Names such as: Cross Site Scripting, Poison Null Byte and SQL Injection are just the tip of the iceberg in a new war front. IT professionals are used to monitoring network traffic, using network sniffers and state- of-the-art intrusion detection systems which analyze bizarre network behavior and watch patterns of weird packets considered as network attacks. Many companies also install tripwires and honey pots to catch hackers who are trying to hack in through defected telnet daemon
  1. A particular slide catching your eye?

    Clipping is a handy way to collect important slides you want to go back to later.

×