SlideShare a Scribd company logo
Submit Search
Upload
Login
Signup
Analiza si evolutia vulnerabilitatilor web
Report
DefCamp
Follow
DefCamp
Oct. 5, 2011
•
0 likes
•
3,219 views
1
of
67
Analiza si evolutia vulnerabilitatilor web
Oct. 5, 2011
•
0 likes
•
3,219 views
Download Now
Download to read offline
Report
Technology
DefCamp
Follow
DefCamp
Recommended
Web 2016 (05/13) Programare Web – Dezvoltarea aplicațiilor Web via Node.js
Sabin Buraga
393 views
•
190 slides
Prezentare USO - Web Application Integration
mihneasim
227 views
•
10 slides
Web 2016 (04/13) Programare Web – Dezvoltarea aplicațiilor Web în PHP
Sabin Buraga
602 views
•
145 slides
Limbajul JavaScript: o prezentare generală
Sabin Buraga
2.3K views
•
155 slides
WADe 2017-2018 Tutorial (1/3): Web Application Development with Node.js – An ...
Sabin Buraga
311 views
•
90 slides
Esență de JavaScript pentru novici
Sabin Buraga
1.5K views
•
110 slides
More Related Content
Viewers also liked
Social Engineering - DefCamp 2012
DefCamp
1.1K views
•
19 slides
Cross Site Request Forgery Attacks
DefCamp
1.2K views
•
18 slides
Vulnerabilitati 0-day in software de larg interes
DefCamp
517 views
•
17 slides
Formatul Portable Executable
DefCamp
1.2K views
•
21 slides
Defcamp 2013 - SSL Ripper
DefCamp
2.3K views
•
26 slides
How does a 0day work? - DefCamp 2012
DefCamp
790 views
•
19 slides
Viewers also liked
(9)
Social Engineering - DefCamp 2012
DefCamp
•
1.1K views
Cross Site Request Forgery Attacks
DefCamp
•
1.2K views
Vulnerabilitati 0-day in software de larg interes
DefCamp
•
517 views
Formatul Portable Executable
DefCamp
•
1.2K views
Defcamp 2013 - SSL Ripper
DefCamp
•
2.3K views
How does a 0day work? - DefCamp 2012
DefCamp
•
790 views
The importance of logs - DefCamp 2012
DefCamp
•
807 views
DefCamp 2013 - DRM To Pown NSA in Few Easy Steps
DefCamp
•
1K views
DefCamp 2013 - A few cybercrime cases that could make us think...
DefCamp
•
775 views
Similar to Analiza si evolutia vulnerabilitatilor web
Aplicații Firefox OS cu HTML5
Sabin Buraga
1.4K views
•
60 slides
Programare Web - De la CGI la servere de aplicatii
Sabin Buraga
2.3K views
•
32 slides
Programare Web - Accesul la baze de date prin PHP
Sabin Buraga
4.4K views
•
30 slides
Programare Web - PHP (o prezentare generala)
Sabin Buraga
6K views
•
38 slides
Web 2020 04/12: Programare Web – Dezvoltarea aplicaţiilor Web în PHP
Sabin Buraga
303 views
•
268 slides
Web 2020 07/12: Procesarea datelor XML & HTML – Simple API for XML. Procesări...
Sabin Buraga
192 views
•
100 slides
Similar to Analiza si evolutia vulnerabilitatilor web
(20)
Aplicații Firefox OS cu HTML5
Sabin Buraga
•
1.4K views
Programare Web - De la CGI la servere de aplicatii
Sabin Buraga
•
2.3K views
Programare Web - Accesul la baze de date prin PHP
Sabin Buraga
•
4.4K views
Programare Web - PHP (o prezentare generala)
Sabin Buraga
•
6K views
Web 2020 04/12: Programare Web – Dezvoltarea aplicaţiilor Web în PHP
Sabin Buraga
•
303 views
Web 2020 07/12: Procesarea datelor XML & HTML – Simple API for XML. Procesări...
Sabin Buraga
•
192 views
Fii linked data
mikaela200987
•
190 views
Fii linked data
mikaela200987
•
219 views
Fii linked data
mikaela200987
•
269 views
Fii linked data
teodora001
•
221 views
Fii linked data
teodora001
•
174 views
Web 2016 (09/13) Procesarea datelor XML & HTML. Simple API for XML. Procesări...
Sabin Buraga
•
219 views
WADe 2014—2015 (supliment): Dezvoltare Web via node.js
Sabin Buraga
•
611 views
CLIW 2014—2015 (11/12): Programare Web. API-uri JavaScript în contextul HTML5
Sabin Buraga
•
491 views
HTML5? HTML5!
Sabin Buraga
•
3.1K views
Dezvoltarea aplicaţiilor Web la nivel de client (cursul #12): Programare Web....
Sabin Buraga
•
1K views
CLIW 2014—2015 (10/12): Programare Web. Suita de tehnologii HTML5
Sabin Buraga
•
1.2K views
05 db server_deployment_ro
mcroitor
•
436 views
Web 2020 02/12: Programare Web – HTTP. Cookie-uri. Sesiuni Web
Sabin Buraga
•
287 views
CLIW 2017-2018 (3/12) (Re)găsirea resurselor Web. De la motoare de căutare şi...
Sabin Buraga
•
1K views
More from DefCamp
Remote Yacht Hacking
DefCamp
1.7K views
•
89 slides
Mobile, IoT, Clouds… It’s time to hire your own risk manager!
DefCamp
974 views
•
167 slides
The Charter of Trust
DefCamp
547 views
•
24 slides
Internet Balkanization: Why Are We Raising Borders Online?
DefCamp
308 views
•
22 slides
Bridging the gap between CyberSecurity R&D and UX
DefCamp
259 views
•
13 slides
Secure and privacy-preserving data transmission and processing using homomorp...
DefCamp
470 views
•
102 slides
More from DefCamp
(20)
Remote Yacht Hacking
DefCamp
•
1.7K views
Mobile, IoT, Clouds… It’s time to hire your own risk manager!
DefCamp
•
974 views
The Charter of Trust
DefCamp
•
547 views
Internet Balkanization: Why Are We Raising Borders Online?
DefCamp
•
308 views
Bridging the gap between CyberSecurity R&D and UX
DefCamp
•
259 views
Secure and privacy-preserving data transmission and processing using homomorp...
DefCamp
•
470 views
Drupalgeddon 2 – Yet Another Weapon for the Attacker
DefCamp
•
269 views
Economical Denial of Sustainability in the Cloud (EDOS)
DefCamp
•
253 views
Trust, but verify – Bypassing MFA
DefCamp
•
317 views
Threat Hunting: From Platitudes to Practical Application
DefCamp
•
218 views
Building application security with 0 money down
DefCamp
•
176 views
Implementation of information security techniques on modern android based Kio...
DefCamp
•
215 views
Lattice based Merkle for post-quantum epoch
DefCamp
•
239 views
The challenge of building a secure and safe digital environment in healthcare
DefCamp
•
323 views
Timing attacks against web applications: Are they still practical?
DefCamp
•
258 views
Tor .onions: The Good, The Rotten and The Misconfigured
DefCamp
•
811 views
Needles, Haystacks and Algorithms: Using Machine Learning to detect complex t...
DefCamp
•
294 views
We will charge you. How to [b]reach vendor’s network using EV charging station.
DefCamp
•
437 views
Connect & Inspire Cyber Security
DefCamp
•
290 views
The lions and the watering hole
DefCamp
•
224 views
Analiza si evolutia vulnerabilitatilor web
1.
2.
3.
4.
Text Editor
(e.g. Notepad++)
5.
custom php.ini
6.
Cunoștințe PHP,
HTML, MySQL, JavaScript
7.
8.
disabled_functions= N/A
9.
register_globals= on
10.
allow_url_include = on
11.
allow_url_fopen = on
12.
magic_quotes_gpc = off
13.
short_tag_open = on
14.
asp tags =
on
15.
file_uploads = on
16.
17.
are nevoie
de condiții speciale în php.ini
18.
allow_url_fopen
19.
allow_url_include
20.
vulnerabilitate cu
grad de risc extrem de ridicat
21.
funcții în
PHP care permit includerea fișierelor
22.
include
23.
include_once
24.
require
25.
require_once
26.
bypass
27.
https,
ftp etc.
28.
29.
switch()
30.
31.
vulnerabilitate cu grad
de riscridicat
32.
funcții în
PHP care permit includerea fișierelor
33.
include
34.
include_once
35.
require
36.
require_once
37.
bypass
38.
..%5C (Windows)
39.
..(Windows)
40.
41.
42.
43.
44.
vulnerabilitate cu grad
de riscmediu spre ridicat
45.
funcții în
PHP care permit citirea fișierelor
46.
file_get_contents
47.
readfile
48.
file
49.
fopen
50.
highlight_file
51.
show_source
52.
bypass
53.
..%5C (Windows)
54.
..(Windows)
55.
56.
57.
58.
vulnerabilitate cu grad
de riscmediu spre ridicat
59.
SQL Injection poate
fi realizat pe mai multe tipuri de baze date
60.
MySQL
61.
MSSQL
62.
PostgreSQL
63.
etc.
64.
există mai
multe tipuri de injecții
65.
union based
66.
error based
67.
blind
68.
69.
http://127.0.0.1/test.php?id=1+union+all+select+1,2,load_file('etc/passwd'),4--
70.
71.
72.
expresii regulate (validare
alfanumerică)
73.
mysql_real_escape_string
74.
75.
mărire privilegii (dacă
sunt stocate în cookie)
76.
vulnerabilitate cu grad
de riscmediu spre ridicat
77.
modificare variabile
78.
direct din
cookie (cookie editor)
79.
80.
funcții în PHP
care ne permit executare de comenzi
81.
exec
82.
passthru
83.
shell_exec
84.
system
85.
vulnerabilitate cu grad
de risc foarteridicat
86.
exec() nu
arată outputul comenzii, dar ea este executată
87.
88.
89.
90.
91.
92.
93.
funcții în PHP
care ne permit executare de cod
94.
eval
95.
vulnerabilitate cu grad
de risc foarteridicat
96.
97.
98.
99.
100.
funcții în PHP
care afișează variabile
101.
print
102.
echo
103.
die
104.
exit
105.
vulnerabilitate cu grad
de risc mediu
106.
metode de
exploatare
107.
cookie stealing
108.
XSS worm
109.
110.
folosirea unor funcții
PHP
111.
htmlentities (cu
sau fără ENT_QUOTES)
112.
113.
este de mai
multe feluri
114.
variabilă de
login
115.
control panel
neprotejat
116.
insecure cookie
handling (prezentat anterior)
117.
login bypass
(SQL Injection) (prezentat anterior)
118.
119.
120.
.htpasswd
121.
122.
acces la baza
de date (backup)
123.
acces la
codul sursă (.inc)
124.
125.
126.
requesturi simple
(variabile GET, POST)
127.
requesturi complexe
(formulare)
128.
requesturi cu
fișiere
129.
vulnerabilitate cu
grad de risc mediu/ridicat
130.
metode de
a trece de tokenuri
131.
via XSS
132.
133.
folosire CAPTCHA
134.
135.
poate fi
realizat în mai multe moduri
136.
este o
vulnerabilitate cu grad de risc scăzut
137.
138.
139.
140.
folosirea silent
(@) la incluziune
141.
142.
grad de
risc variabil
143.
CAPTCHA vulnerabile
144.
salvare cod
in COOKIE
145.
dimensiuni ale
imaginii generate manipulabile (DoS)
146.
folosirea unui
cod salvat TEXT în pagină
147.
148.
password reset
149.
insecure “not-so-random”
passwords
150.