SlideShare a Scribd company logo
1 of 16
Web Security: Tech Talk Mallik http://codeinspections.blogspot.com March 20 th , 2009
Introduction ,[object Object],[object Object],[object Object]
Where do security bugs hide ? Functional Bugs Security Bugs Design Implementation
Web Vulnerabilities ,[object Object],[object Object],[object Object],[object Object],[object Object]
XSS (Cross Site Scripting) ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
XSS (Cross Site Scripting) ,[object Object],[object Object],[object Object],[object Object]
Preventing XSS ,[object Object],[object Object],[object Object],[object Object]
SQL Injection ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
SQL Injection ,[object Object],[object Object],[object Object],[object Object]
Preventing SQL Injection  ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
Remote File Inclusion ,[object Object],[object Object],[object Object],[object Object]
RFI Example ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
Input Validation ,[object Object],[object Object],[object Object],[object Object],[object Object]
Security Vulnerability Via Browser Bugs  ,[object Object],[object Object],[object Object],[object Object],[object Object]
Lessons to Learn ,[object Object],[object Object],[object Object],[object Object]
Thank You

More Related Content

What's hot

Reliable and fast security audits - The modern and offensive way-Mohan Gandhi
Reliable and fast security audits - The modern and offensive way-Mohan GandhiReliable and fast security audits - The modern and offensive way-Mohan Gandhi
Reliable and fast security audits - The modern and offensive way-Mohan Gandhi
bhumika2108
 

What's hot (20)

Web Application Security
Web Application SecurityWeb Application Security
Web Application Security
 
Web application attack Presentation
Web application attack PresentationWeb application attack Presentation
Web application attack Presentation
 
Top 10 Web Security Vulnerabilities (OWASP Top 10)
Top 10 Web Security Vulnerabilities (OWASP Top 10)Top 10 Web Security Vulnerabilities (OWASP Top 10)
Top 10 Web Security Vulnerabilities (OWASP Top 10)
 
Secure Code Warrior - Trust no input
Secure Code Warrior - Trust no inputSecure Code Warrior - Trust no input
Secure Code Warrior - Trust no input
 
State of Web Security RailsConf 2016
State of Web Security RailsConf 2016State of Web Security RailsConf 2016
State of Web Security RailsConf 2016
 
Owasp top 10 web application security hazards - Part 1
Owasp top 10 web application security hazards - Part 1Owasp top 10 web application security hazards - Part 1
Owasp top 10 web application security hazards - Part 1
 
Top 10 Web Security Vulnerabilities
Top 10 Web Security VulnerabilitiesTop 10 Web Security Vulnerabilities
Top 10 Web Security Vulnerabilities
 
A7 Missing Function Level Access Control
A7   Missing Function Level Access ControlA7   Missing Function Level Access Control
A7 Missing Function Level Access Control
 
Testing Web Application Security
Testing Web Application SecurityTesting Web Application Security
Testing Web Application Security
 
Owasp top 10 web application security hazards part 2
Owasp top 10 web application security hazards part 2Owasp top 10 web application security hazards part 2
Owasp top 10 web application security hazards part 2
 
What Should Go Into A Web Application Penetration Testing Checklist?
What Should Go Into A Web Application Penetration Testing Checklist?What Should Go Into A Web Application Penetration Testing Checklist?
What Should Go Into A Web Application Penetration Testing Checklist?
 
Security testing
Security testingSecurity testing
Security testing
 
Attackers Vs Programmers
Attackers Vs ProgrammersAttackers Vs Programmers
Attackers Vs Programmers
 
Penetration testing web application web application (in) security
Penetration testing web application web application (in) securityPenetration testing web application web application (in) security
Penetration testing web application web application (in) security
 
Owasp top 10 security threats
Owasp top 10 security threatsOwasp top 10 security threats
Owasp top 10 security threats
 
Web Security 101
Web Security 101Web Security 101
Web Security 101
 
Reliable and fast security audits - The modern and offensive way-Mohan Gandhi
Reliable and fast security audits - The modern and offensive way-Mohan GandhiReliable and fast security audits - The modern and offensive way-Mohan Gandhi
Reliable and fast security audits - The modern and offensive way-Mohan Gandhi
 
OWASP top 10-2013
OWASP top 10-2013OWASP top 10-2013
OWASP top 10-2013
 
Web Hacking
Web HackingWeb Hacking
Web Hacking
 
Broken access controls
Broken access controlsBroken access controls
Broken access controls
 

Viewers also liked

Latvia - Presentation from Veronika
Latvia - Presentation from VeronikaLatvia - Presentation from Veronika
Latvia - Presentation from Veronika
brixi1
 
Facts About The Tundra Brigger
Facts About The Tundra BriggerFacts About The Tundra Brigger
Facts About The Tundra Brigger
Michelle McGinnis
 
Waddell Slideshowpdf
Waddell SlideshowpdfWaddell Slideshowpdf
Waddell Slideshowpdf
ambersalmon
 
Prayer
PrayerPrayer
Prayer
hockdy
 
Innerwealth Living Inspired Magazine August Issue
Innerwealth Living Inspired Magazine August IssueInnerwealth Living Inspired Magazine August Issue
Innerwealth Living Inspired Magazine August Issue
Chris Walker
 
Dimensional Modeling
Dimensional ModelingDimensional Modeling
Dimensional Modeling
jamessnape
 

Viewers also liked (20)

Latvia - Presentation from Veronika
Latvia - Presentation from VeronikaLatvia - Presentation from Veronika
Latvia - Presentation from Veronika
 
Facts About The Tundra Brigger
Facts About The Tundra BriggerFacts About The Tundra Brigger
Facts About The Tundra Brigger
 
Green-White Dialoog ZL 3 Maart
Green-White Dialoog ZL 3 MaartGreen-White Dialoog ZL 3 Maart
Green-White Dialoog ZL 3 Maart
 
Waddell Slideshowpdf
Waddell SlideshowpdfWaddell Slideshowpdf
Waddell Slideshowpdf
 
Itb Chap 11
Itb Chap 11Itb Chap 11
Itb Chap 11
 
Prayer
PrayerPrayer
Prayer
 
Innerwealth Living Inspired Magazine August Issue
Innerwealth Living Inspired Magazine August IssueInnerwealth Living Inspired Magazine August Issue
Innerwealth Living Inspired Magazine August Issue
 
About
AboutAbout
About
 
Itb Chap 07
Itb Chap 07Itb Chap 07
Itb Chap 07
 
Fortheinternet
FortheinternetFortheinternet
Fortheinternet
 
Oli1
Oli1Oli1
Oli1
 
Dimensional Modeling
Dimensional ModelingDimensional Modeling
Dimensional Modeling
 
Social network_2010
Social network_2010Social network_2010
Social network_2010
 
Axfood q2 2010_presentation
Axfood q2 2010_presentationAxfood q2 2010_presentation
Axfood q2 2010_presentation
 
Mapping of HIV/AIDS Facilities in Maharashtra by Dr. C. A. K. Yesudian
Mapping of HIV/AIDS Facilities in Maharashtra by Dr. C. A. K. YesudianMapping of HIV/AIDS Facilities in Maharashtra by Dr. C. A. K. Yesudian
Mapping of HIV/AIDS Facilities in Maharashtra by Dr. C. A. K. Yesudian
 
Talent Connect Live Stream Behind the Scenes
Talent Connect Live Stream Behind the ScenesTalent Connect Live Stream Behind the Scenes
Talent Connect Live Stream Behind the Scenes
 
Badges, Badgers, Mushrooms, and a Snake
Badges, Badgers, Mushrooms, and a SnakeBadges, Badgers, Mushrooms, and a Snake
Badges, Badgers, Mushrooms, and a Snake
 
Interim report Axfood Q3 2010
Interim report Axfood Q3 2010Interim report Axfood Q3 2010
Interim report Axfood Q3 2010
 
Test Driven Development
Test Driven DevelopmentTest Driven Development
Test Driven Development
 
Cold Tundra Project Watts
Cold Tundra Project WattsCold Tundra Project Watts
Cold Tundra Project Watts
 

Similar to Security Tech Talk

Application Security
Application SecurityApplication Security
Application Security
nirola
 
Web Application Security
Web Application SecurityWeb Application Security
Web Application Security
Abdul Wahid
 
Web Application Security: The Land that Information Security Forgot
Web Application Security: The Land that Information Security ForgotWeb Application Security: The Land that Information Security Forgot
Web Application Security: The Land that Information Security Forgot
Jeremiah Grossman
 
Rich Web App Security - Keeping your application safe
Rich Web App Security - Keeping your application safeRich Web App Security - Keeping your application safe
Rich Web App Security - Keeping your application safe
Jeremiah Grossman
 
Best practices of web app security (samvel gevorgyan)
Best practices of web app security (samvel gevorgyan)Best practices of web app security (samvel gevorgyan)
Best practices of web app security (samvel gevorgyan)
ClubHack
 
Andrews whitakrer lecture18-security.ppt
Andrews whitakrer lecture18-security.pptAndrews whitakrer lecture18-security.ppt
Andrews whitakrer lecture18-security.ppt
SilverGold16
 

Similar to Security Tech Talk (20)

Application Security
Application SecurityApplication Security
Application Security
 
04. xss and encoding
04.  xss and encoding04.  xss and encoding
04. xss and encoding
 
ieee
ieeeieee
ieee
 
4.Xss
4.Xss4.Xss
4.Xss
 
Owasp Top 10 - Owasp Pune Chapter - January 2008
Owasp Top 10 - Owasp Pune Chapter - January 2008Owasp Top 10 - Owasp Pune Chapter - January 2008
Owasp Top 10 - Owasp Pune Chapter - January 2008
 
Top Ten Web Hacking Techniques – 2008
Top Ten Web Hacking Techniques – 2008Top Ten Web Hacking Techniques – 2008
Top Ten Web Hacking Techniques – 2008
 
Why You Need A Web Application Firewall
Why You Need A Web Application FirewallWhy You Need A Web Application Firewall
Why You Need A Web Application Firewall
 
Cross Site Scripting ( XSS)
Cross Site Scripting ( XSS)Cross Site Scripting ( XSS)
Cross Site Scripting ( XSS)
 
Web Attacks - Top threats - 2010
Web Attacks - Top threats - 2010Web Attacks - Top threats - 2010
Web Attacks - Top threats - 2010
 
Web Application Security
Web Application SecurityWeb Application Security
Web Application Security
 
WEB APPLICATION VULNERABILITIES: DAWN, DETECTION, EXPLOITATION AND DEFENSE
WEB APPLICATION VULNERABILITIES: DAWN, DETECTION, EXPLOITATION AND DEFENSEWEB APPLICATION VULNERABILITIES: DAWN, DETECTION, EXPLOITATION AND DEFENSE
WEB APPLICATION VULNERABILITIES: DAWN, DETECTION, EXPLOITATION AND DEFENSE
 
Sql Injection and XSS
Sql Injection and XSSSql Injection and XSS
Sql Injection and XSS
 
[CB16] Electron - Build cross platform desktop XSS, it’s easier than you thin...
[CB16] Electron - Build cross platform desktop XSS, it’s easier than you thin...[CB16] Electron - Build cross platform desktop XSS, it’s easier than you thin...
[CB16] Electron - Build cross platform desktop XSS, it’s easier than you thin...
 
Web Application Security: The Land that Information Security Forgot
Web Application Security: The Land that Information Security ForgotWeb Application Security: The Land that Information Security Forgot
Web Application Security: The Land that Information Security Forgot
 
Rich Web App Security - Keeping your application safe
Rich Web App Security - Keeping your application safeRich Web App Security - Keeping your application safe
Rich Web App Security - Keeping your application safe
 
SeanRobertsThesis
SeanRobertsThesisSeanRobertsThesis
SeanRobertsThesis
 
Best practices of web app security (samvel gevorgyan)
Best practices of web app security (samvel gevorgyan)Best practices of web app security (samvel gevorgyan)
Best practices of web app security (samvel gevorgyan)
 
Web Application Security - Folio3
Web Application Security - Folio3Web Application Security - Folio3
Web Application Security - Folio3
 
Andrews whitakrer lecture18-security.ppt
Andrews whitakrer lecture18-security.pptAndrews whitakrer lecture18-security.ppt
Andrews whitakrer lecture18-security.ppt
 
Web Security
Web SecurityWeb Security
Web Security
 

Recently uploaded

Salient Features of India constitution especially power and functions
Salient Features of India constitution especially power and functionsSalient Features of India constitution especially power and functions
Salient Features of India constitution especially power and functions
KarakKing
 
The basics of sentences session 3pptx.pptx
The basics of sentences session 3pptx.pptxThe basics of sentences session 3pptx.pptx
The basics of sentences session 3pptx.pptx
heathfieldcps1
 

Recently uploaded (20)

This PowerPoint helps students to consider the concept of infinity.
This PowerPoint helps students to consider the concept of infinity.This PowerPoint helps students to consider the concept of infinity.
This PowerPoint helps students to consider the concept of infinity.
 
Fostering Friendships - Enhancing Social Bonds in the Classroom
Fostering Friendships - Enhancing Social Bonds  in the ClassroomFostering Friendships - Enhancing Social Bonds  in the Classroom
Fostering Friendships - Enhancing Social Bonds in the Classroom
 
Salient Features of India constitution especially power and functions
Salient Features of India constitution especially power and functionsSalient Features of India constitution especially power and functions
Salient Features of India constitution especially power and functions
 
Key note speaker Neum_Admir Softic_ENG.pdf
Key note speaker Neum_Admir Softic_ENG.pdfKey note speaker Neum_Admir Softic_ENG.pdf
Key note speaker Neum_Admir Softic_ENG.pdf
 
Graduate Outcomes Presentation Slides - English
Graduate Outcomes Presentation Slides - EnglishGraduate Outcomes Presentation Slides - English
Graduate Outcomes Presentation Slides - English
 
The basics of sentences session 3pptx.pptx
The basics of sentences session 3pptx.pptxThe basics of sentences session 3pptx.pptx
The basics of sentences session 3pptx.pptx
 
FSB Advising Checklist - Orientation 2024
FSB Advising Checklist - Orientation 2024FSB Advising Checklist - Orientation 2024
FSB Advising Checklist - Orientation 2024
 
Understanding Accommodations and Modifications
Understanding  Accommodations and ModificationsUnderstanding  Accommodations and Modifications
Understanding Accommodations and Modifications
 
ICT Role in 21st Century Education & its Challenges.pptx
ICT Role in 21st Century Education & its Challenges.pptxICT Role in 21st Century Education & its Challenges.pptx
ICT Role in 21st Century Education & its Challenges.pptx
 
On National Teacher Day, meet the 2024-25 Kenan Fellows
On National Teacher Day, meet the 2024-25 Kenan FellowsOn National Teacher Day, meet the 2024-25 Kenan Fellows
On National Teacher Day, meet the 2024-25 Kenan Fellows
 
TỔNG ÔN TẬP THI VÀO LỚP 10 MÔN TIẾNG ANH NĂM HỌC 2023 - 2024 CÓ ĐÁP ÁN (NGỮ Â...
TỔNG ÔN TẬP THI VÀO LỚP 10 MÔN TIẾNG ANH NĂM HỌC 2023 - 2024 CÓ ĐÁP ÁN (NGỮ Â...TỔNG ÔN TẬP THI VÀO LỚP 10 MÔN TIẾNG ANH NĂM HỌC 2023 - 2024 CÓ ĐÁP ÁN (NGỮ Â...
TỔNG ÔN TẬP THI VÀO LỚP 10 MÔN TIẾNG ANH NĂM HỌC 2023 - 2024 CÓ ĐÁP ÁN (NGỮ Â...
 
Unit-V; Pricing (Pharma Marketing Management).pptx
Unit-V; Pricing (Pharma Marketing Management).pptxUnit-V; Pricing (Pharma Marketing Management).pptx
Unit-V; Pricing (Pharma Marketing Management).pptx
 
Basic Civil Engineering first year Notes- Chapter 4 Building.pptx
Basic Civil Engineering first year Notes- Chapter 4 Building.pptxBasic Civil Engineering first year Notes- Chapter 4 Building.pptx
Basic Civil Engineering first year Notes- Chapter 4 Building.pptx
 
SOC 101 Demonstration of Learning Presentation
SOC 101 Demonstration of Learning PresentationSOC 101 Demonstration of Learning Presentation
SOC 101 Demonstration of Learning Presentation
 
Beyond_Borders_Understanding_Anime_and_Manga_Fandom_A_Comprehensive_Audience_...
Beyond_Borders_Understanding_Anime_and_Manga_Fandom_A_Comprehensive_Audience_...Beyond_Borders_Understanding_Anime_and_Manga_Fandom_A_Comprehensive_Audience_...
Beyond_Borders_Understanding_Anime_and_Manga_Fandom_A_Comprehensive_Audience_...
 
SKILL OF INTRODUCING THE LESSON MICRO SKILLS.pptx
SKILL OF INTRODUCING THE LESSON MICRO SKILLS.pptxSKILL OF INTRODUCING THE LESSON MICRO SKILLS.pptx
SKILL OF INTRODUCING THE LESSON MICRO SKILLS.pptx
 
Mehran University Newsletter Vol-X, Issue-I, 2024
Mehran University Newsletter Vol-X, Issue-I, 2024Mehran University Newsletter Vol-X, Issue-I, 2024
Mehran University Newsletter Vol-X, Issue-I, 2024
 
REMIFENTANIL: An Ultra short acting opioid.pptx
REMIFENTANIL: An Ultra short acting opioid.pptxREMIFENTANIL: An Ultra short acting opioid.pptx
REMIFENTANIL: An Ultra short acting opioid.pptx
 
Sensory_Experience_and_Emotional_Resonance_in_Gabriel_Okaras_The_Piano_and_Th...
Sensory_Experience_and_Emotional_Resonance_in_Gabriel_Okaras_The_Piano_and_Th...Sensory_Experience_and_Emotional_Resonance_in_Gabriel_Okaras_The_Piano_and_Th...
Sensory_Experience_and_Emotional_Resonance_in_Gabriel_Okaras_The_Piano_and_Th...
 
How to Manage Global Discount in Odoo 17 POS
How to Manage Global Discount in Odoo 17 POSHow to Manage Global Discount in Odoo 17 POS
How to Manage Global Discount in Odoo 17 POS
 

Security Tech Talk