SlideShare a Scribd company logo
1 of 14
Security vulnerabilities
1
Why does have this presentation?
 Sharing is learning
 Understand a little bit knowledge about Security
 How to use the tools to explore
2
Agenda
 Security vulnerabilities
 Data
 Cookies
 Tools
 How to explore it efficiency
3
Security vulnerabilities
 Data
 Sensitive
 Secure
 Redundant
Rubbish
Repeatable
 Corrective
 Cookies
4
Sensitive data
 What is type of information that an
attacker want to get?
 The personal information
 Money
 Documents
 What is type of information that
normal use should not be seen?
 CPR number on other side
 Fee on other side
5
Secure data
 Replace a valid data by an invalid
 Data protected (in third services) have
not allowed to change
6
Redundant data
 Rubbish data
 Browser send data to Service
 Browser receive data from
Service
 Repeatable
 An information is repeated
many times
7
Corrective data
 Required field
 Date time
 Disable field
 Break rule for validation
8
Cookies
 Make a copy the cookie and use that
cookie to send request to system
 From then on, keeps on accessing the
system using the cookie
9
Tools - Why use tool?
 Postman
 https://www.getpostman.com/
 Fiddler
 https://www.telerik.com/fiddler
 ARC
 Burp Suite
 https://portswigger.net/burp
10
Demo - Session hijacking
 Scenario: As an attacker, I want to send GET
and POST request to the system even
though I have been logged out
 Steps:
1. User logs in
2. Use Postman tool to make a copy the
cookie
3. User logs out
4. Use Postman tool keeps on accessing the
system using the cookie
11
log in
log out
User
Browser
Attacker
Demo - Middle Attack
 Scenario: As an attacker, I want to
change sender a document by another
one
 Steps:
1. User A add a document
2. Use fiddler to catch request
3. Replace sender from user A to user B
4. Send request to Service
12
Browser
Attacker
send
Service
send
How to explore efficiency
 Understanding clearly the logic of system
 Observation how the system work
 F12
 See the API work between Browser and Service
 Think the possible situations that can happen
 Based on the problems that customer reported in the specification
 Try to reproduce it
 Ask developer about the confused with the behavior of system
 What if question
 What expected outcome
13
Q&A 14

More Related Content

Similar to Security vulnerabilities in software

Daniel billing exploring the security testers toolbox
Daniel billing   exploring the security testers toolboxDaniel billing   exploring the security testers toolbox
Daniel billing exploring the security testers toolbox
Romania Testing
 
How Software Works in system environment
How Software Works in system environmentHow Software Works in system environment
How Software Works in system environment
ItcHcm1
 
Project 1 Template (Due on Week 4)Name.docx
Project 1 Template (Due on Week 4)Name.docxProject 1 Template (Due on Week 4)Name.docx
Project 1 Template (Due on Week 4)Name.docx
simonlbentley59018
 
1.8 Exercises1. Distinguish between vulnerability, threat, and con.docx
1.8 Exercises1. Distinguish between vulnerability, threat, and con.docx1.8 Exercises1. Distinguish between vulnerability, threat, and con.docx
1.8 Exercises1. Distinguish between vulnerability, threat, and con.docx
hacksoni
 
Web PenTest Sample Report
Web PenTest Sample ReportWeb PenTest Sample Report
Web PenTest Sample Report
Octogence
 
Web Application Security
Web Application SecurityWeb Application Security
Web Application Security
Colin English
 

Similar to Security vulnerabilities in software (20)

Open Id, O Auth And Webservices
Open Id, O Auth And WebservicesOpen Id, O Auth And Webservices
Open Id, O Auth And Webservices
 
Daniel billing exploring the security testers toolbox
Daniel billing   exploring the security testers toolboxDaniel billing   exploring the security testers toolbox
Daniel billing exploring the security testers toolbox
 
U2F Case Study: Examining the U2F Paradox
U2F Case Study: Examining the U2F ParadoxU2F Case Study: Examining the U2F Paradox
U2F Case Study: Examining the U2F Paradox
 
Understanding Cross-site Request Forgery
Understanding Cross-site Request ForgeryUnderstanding Cross-site Request Forgery
Understanding Cross-site Request Forgery
 
How Software Works in system environment
How Software Works in system environmentHow Software Works in system environment
How Software Works in system environment
 
Project 1 Template (Due on Week 4)Name.docx
Project 1 Template (Due on Week 4)Name.docxProject 1 Template (Due on Week 4)Name.docx
Project 1 Template (Due on Week 4)Name.docx
 
firewalls
firewallsfirewalls
firewalls
 
A novel way of integrating voice recognition and one time passwords to preven...
A novel way of integrating voice recognition and one time passwords to preven...A novel way of integrating voice recognition and one time passwords to preven...
A novel way of integrating voice recognition and one time passwords to preven...
 
Owasp top-10-mobile-risks-v-1-3 publish
Owasp top-10-mobile-risks-v-1-3 publishOwasp top-10-mobile-risks-v-1-3 publish
Owasp top-10-mobile-risks-v-1-3 publish
 
Secure Code Warrior - Robust error checking
Secure Code Warrior - Robust error checkingSecure Code Warrior - Robust error checking
Secure Code Warrior - Robust error checking
 
INTERNSHIPREVIEW-ISHAQ (1) [Recovered].pptx
INTERNSHIPREVIEW-ISHAQ (1) [Recovered].pptxINTERNSHIPREVIEW-ISHAQ (1) [Recovered].pptx
INTERNSHIPREVIEW-ISHAQ (1) [Recovered].pptx
 
Real estate management system
Real estate management systemReal estate management system
Real estate management system
 
1.8 Exercises1. Distinguish between vulnerability, threat, and con.docx
1.8 Exercises1. Distinguish between vulnerability, threat, and con.docx1.8 Exercises1. Distinguish between vulnerability, threat, and con.docx
1.8 Exercises1. Distinguish between vulnerability, threat, and con.docx
 
Unit 5
Unit 5Unit 5
Unit 5
 
KMS (1)
KMS (1)KMS (1)
KMS (1)
 
Web PenTest Sample Report
Web PenTest Sample ReportWeb PenTest Sample Report
Web PenTest Sample Report
 
unit 2 -program security.pdf
unit 2 -program security.pdfunit 2 -program security.pdf
unit 2 -program security.pdf
 
Web Application Security
Web Application SecurityWeb Application Security
Web Application Security
 
IRJET- Securing Internet Voting Protocol using Implicit Security Model and On...
IRJET- Securing Internet Voting Protocol using Implicit Security Model and On...IRJET- Securing Internet Voting Protocol using Implicit Security Model and On...
IRJET- Securing Internet Voting Protocol using Implicit Security Model and On...
 
FIDO-U2F-Case-Study_Hanson.pptx
FIDO-U2F-Case-Study_Hanson.pptxFIDO-U2F-Case-Study_Hanson.pptx
FIDO-U2F-Case-Study_Hanson.pptx
 

Recently uploaded

%+27788225528 love spells in new york Psychic Readings, Attraction spells,Bri...
%+27788225528 love spells in new york Psychic Readings, Attraction spells,Bri...%+27788225528 love spells in new york Psychic Readings, Attraction spells,Bri...
%+27788225528 love spells in new york Psychic Readings, Attraction spells,Bri...
masabamasaba
 
%+27788225528 love spells in Boston Psychic Readings, Attraction spells,Bring...
%+27788225528 love spells in Boston Psychic Readings, Attraction spells,Bring...%+27788225528 love spells in Boston Psychic Readings, Attraction spells,Bring...
%+27788225528 love spells in Boston Psychic Readings, Attraction spells,Bring...
masabamasaba
 
The title is not connected to what is inside
The title is not connected to what is insideThe title is not connected to what is inside
The title is not connected to what is inside
shinachiaurasa2
 

Recently uploaded (20)

%+27788225528 love spells in new york Psychic Readings, Attraction spells,Bri...
%+27788225528 love spells in new york Psychic Readings, Attraction spells,Bri...%+27788225528 love spells in new york Psychic Readings, Attraction spells,Bri...
%+27788225528 love spells in new york Psychic Readings, Attraction spells,Bri...
 
AI & Machine Learning Presentation Template
AI & Machine Learning Presentation TemplateAI & Machine Learning Presentation Template
AI & Machine Learning Presentation Template
 
%in Bahrain+277-882-255-28 abortion pills for sale in Bahrain
%in Bahrain+277-882-255-28 abortion pills for sale in Bahrain%in Bahrain+277-882-255-28 abortion pills for sale in Bahrain
%in Bahrain+277-882-255-28 abortion pills for sale in Bahrain
 
%in tembisa+277-882-255-28 abortion pills for sale in tembisa
%in tembisa+277-882-255-28 abortion pills for sale in tembisa%in tembisa+277-882-255-28 abortion pills for sale in tembisa
%in tembisa+277-882-255-28 abortion pills for sale in tembisa
 
WSO2CON 2024 - Cloud Native Middleware: Domain-Driven Design, Cell-Based Arch...
WSO2CON 2024 - Cloud Native Middleware: Domain-Driven Design, Cell-Based Arch...WSO2CON 2024 - Cloud Native Middleware: Domain-Driven Design, Cell-Based Arch...
WSO2CON 2024 - Cloud Native Middleware: Domain-Driven Design, Cell-Based Arch...
 
Shapes for Sharing between Graph Data Spaces - and Epistemic Querying of RDF-...
Shapes for Sharing between Graph Data Spaces - and Epistemic Querying of RDF-...Shapes for Sharing between Graph Data Spaces - and Epistemic Querying of RDF-...
Shapes for Sharing between Graph Data Spaces - and Epistemic Querying of RDF-...
 
Introducing Microsoft’s new Enterprise Work Management (EWM) Solution
Introducing Microsoft’s new Enterprise Work Management (EWM) SolutionIntroducing Microsoft’s new Enterprise Work Management (EWM) Solution
Introducing Microsoft’s new Enterprise Work Management (EWM) Solution
 
%+27788225528 love spells in Boston Psychic Readings, Attraction spells,Bring...
%+27788225528 love spells in Boston Psychic Readings, Attraction spells,Bring...%+27788225528 love spells in Boston Psychic Readings, Attraction spells,Bring...
%+27788225528 love spells in Boston Psychic Readings, Attraction spells,Bring...
 
WSO2CON2024 - It's time to go Platformless
WSO2CON2024 - It's time to go PlatformlessWSO2CON2024 - It's time to go Platformless
WSO2CON2024 - It's time to go Platformless
 
WSO2Con2024 - Enabling Transactional System's Exponential Growth With Simplicity
WSO2Con2024 - Enabling Transactional System's Exponential Growth With SimplicityWSO2Con2024 - Enabling Transactional System's Exponential Growth With Simplicity
WSO2Con2024 - Enabling Transactional System's Exponential Growth With Simplicity
 
MarTech Trend 2024 Book : Marketing Technology Trends (2024 Edition) How Data...
MarTech Trend 2024 Book : Marketing Technology Trends (2024 Edition) How Data...MarTech Trend 2024 Book : Marketing Technology Trends (2024 Edition) How Data...
MarTech Trend 2024 Book : Marketing Technology Trends (2024 Edition) How Data...
 
Announcing Codolex 2.0 from GDK Software
Announcing Codolex 2.0 from GDK SoftwareAnnouncing Codolex 2.0 from GDK Software
Announcing Codolex 2.0 from GDK Software
 
VTU technical seminar 8Th Sem on Scikit-learn
VTU technical seminar 8Th Sem on Scikit-learnVTU technical seminar 8Th Sem on Scikit-learn
VTU technical seminar 8Th Sem on Scikit-learn
 
%in ivory park+277-882-255-28 abortion pills for sale in ivory park
%in ivory park+277-882-255-28 abortion pills for sale in ivory park %in ivory park+277-882-255-28 abortion pills for sale in ivory park
%in ivory park+277-882-255-28 abortion pills for sale in ivory park
 
Right Money Management App For Your Financial Goals
Right Money Management App For Your Financial GoalsRight Money Management App For Your Financial Goals
Right Money Management App For Your Financial Goals
 
%in Hazyview+277-882-255-28 abortion pills for sale in Hazyview
%in Hazyview+277-882-255-28 abortion pills for sale in Hazyview%in Hazyview+277-882-255-28 abortion pills for sale in Hazyview
%in Hazyview+277-882-255-28 abortion pills for sale in Hazyview
 
The title is not connected to what is inside
The title is not connected to what is insideThe title is not connected to what is inside
The title is not connected to what is inside
 
Payment Gateway Testing Simplified_ A Step-by-Step Guide for Beginners.pdf
Payment Gateway Testing Simplified_ A Step-by-Step Guide for Beginners.pdfPayment Gateway Testing Simplified_ A Step-by-Step Guide for Beginners.pdf
Payment Gateway Testing Simplified_ A Step-by-Step Guide for Beginners.pdf
 
WSO2CON 2024 - Does Open Source Still Matter?
WSO2CON 2024 - Does Open Source Still Matter?WSO2CON 2024 - Does Open Source Still Matter?
WSO2CON 2024 - Does Open Source Still Matter?
 
Harnessing ChatGPT - Elevating Productivity in Today's Agile Environment
Harnessing ChatGPT  - Elevating Productivity in Today's Agile EnvironmentHarnessing ChatGPT  - Elevating Productivity in Today's Agile Environment
Harnessing ChatGPT - Elevating Productivity in Today's Agile Environment
 

Security vulnerabilities in software

  • 2. Why does have this presentation?  Sharing is learning  Understand a little bit knowledge about Security  How to use the tools to explore 2
  • 3. Agenda  Security vulnerabilities  Data  Cookies  Tools  How to explore it efficiency 3
  • 4. Security vulnerabilities  Data  Sensitive  Secure  Redundant Rubbish Repeatable  Corrective  Cookies 4
  • 5. Sensitive data  What is type of information that an attacker want to get?  The personal information  Money  Documents  What is type of information that normal use should not be seen?  CPR number on other side  Fee on other side 5
  • 6. Secure data  Replace a valid data by an invalid  Data protected (in third services) have not allowed to change 6
  • 7. Redundant data  Rubbish data  Browser send data to Service  Browser receive data from Service  Repeatable  An information is repeated many times 7
  • 8. Corrective data  Required field  Date time  Disable field  Break rule for validation 8
  • 9. Cookies  Make a copy the cookie and use that cookie to send request to system  From then on, keeps on accessing the system using the cookie 9
  • 10. Tools - Why use tool?  Postman  https://www.getpostman.com/  Fiddler  https://www.telerik.com/fiddler  ARC  Burp Suite  https://portswigger.net/burp 10
  • 11. Demo - Session hijacking  Scenario: As an attacker, I want to send GET and POST request to the system even though I have been logged out  Steps: 1. User logs in 2. Use Postman tool to make a copy the cookie 3. User logs out 4. Use Postman tool keeps on accessing the system using the cookie 11 log in log out User Browser Attacker
  • 12. Demo - Middle Attack  Scenario: As an attacker, I want to change sender a document by another one  Steps: 1. User A add a document 2. Use fiddler to catch request 3. Replace sender from user A to user B 4. Send request to Service 12 Browser Attacker send Service send
  • 13. How to explore efficiency  Understanding clearly the logic of system  Observation how the system work  F12  See the API work between Browser and Service  Think the possible situations that can happen  Based on the problems that customer reported in the specification  Try to reproduce it  Ask developer about the confused with the behavior of system  What if question  What expected outcome 13

Editor's Notes

  1. The personal information CPR number or CVR number Money => Claim, Fee Document => Type of document, Sender, receiver
  2. Replace a valid data by an invalid Replace sender document by another sender Data protected ( in third services) had been changed In creation case, there is a function called Adding lawyer to part. However, as an attacker, I can able to change information of that lawyer from Browser and send to Services What is type of information that normal use should not be seen? CPR number on other side Fee on other side
  3. Browser send data to Service => Sending data is redundant information or not Example: When creating a part, the information about 'Postnummer' and 'By' (Postal code,Town) are sending the whole address of Danmark to Services Browser receive data from Service => Should just receive enough information to display Example: A meeting should use name and exchange ID for showing
  4. Disable field An information show to user (disbale file - only see ) - ensure that user could not change when submit from Portal Break rule for validation Have to at least 5 characters
  5. Why use tool? Fake information of user and able to send to server Interact a request between Browser and Servers and able to change information