SlideShare a Scribd company logo
1 of 10
Data security in Online
       Commerce

PRESENTATION BY ANAND NAIR FOR DATA
     SECURITY MEET UP. 03/2008
Introduction

 About me:
   More than a decade experience as a researcher and
    developer of secure web services for online infrastructure
   Contributor to open source projects
   Speaker in various meet ups for technology and approach
    for highly scalable secure architecture.
   Recognized as technologist in gaming industry in
    research and development of online infrastructure.
 What’s in presentation
   Data security discussion
   Tools to test security risk
Data vulnerability

The most common web application security weakness is
the failure to properly validate input coming from the
client or environment before using it. This weakness
leads to almost all of the major vulnerabilities in web
applications, such as cross site scripting, SQL injection,
interpreter injection, locale/Unicode attacks, file system
attacks and buffer overflows.
Data Security : Watch the input data


 Data from an external entity or client should never
  be trusted, since it can be arbitrarily tampered with
  by an attacker.
 Unfortunately, complex applications like often have
  a large number of data input points, which makes it
  difficult for a developer to enforce this rule.
Data Security : Types of Attack

 A MitM attack can be performed in two different
 ways:
    The attacker is in control of a router along the normal point of
     traffic communication between the victim and the server the
     victim is communicating with.
    The attacker is located on the same broadcast domain (e.g.
     subnet) as the victim.
    The attacker is located on the same broadcast domain (e.g.
     subnet) as any of the routing devices used by the victim to
     route traffic.
Data Security: Transport Protocol

 Attacker has the ability to view and modify any TCP
  traffic sent to or from the victim machine.
 HTTP traffic is unencrypted and contains no
  authentication. Therefore, all HTTP traffic can be
  trivially monitored/modified by the attacker.
Data Security: Secure transport protocol


 Man in the middle enables the attacker to view most
  exchanged data, but does not enable the attacker to intercept
  data exchanged of protocols that implement their own
  authentication and encryption (e.g. SSH, SSL/TLS).
 The purpose of HTTPS is to create a secure communication
  over top of HTTP by the use of SSL or TLS. On its own
  SSL/TLS can be very effective and secure. However, there are
  significant problems
     The browsers handling of SSL/TLS can lead to issues when both HTTPS
      and HTTP sites are visited by the user.
     Man in middle would present a certificate warning message in the user’s
      browser and likely alert the user to the attack that most users would
      ignore the warning and continue – thus exposing all of their data.
     Alternatively, the attacker could try and use tools such as SSLstrip to
      leverage poor application design with regards to SSL/TLS.
Using Tools



 Toolkit:
   Platform to run the application

   Network switch to create a closed network environment

   Wireshark (www.wireshark.org)

   Burp Suite (www.portswigger.net/burp/download.html)
Using Tools: Wireshark
Using Tools: Burp Wire

More Related Content

What's hot

Security Mechanisms
Security MechanismsSecurity Mechanisms
Security Mechanismspriya_trehan
 
webinos Security privacy
webinos Security privacywebinos Security privacy
webinos Security privacywebinos project
 
Types of attack -Part3 (Malware Part -2)
Types of attack -Part3 (Malware Part -2)Types of attack -Part3 (Malware Part -2)
Types of attack -Part3 (Malware Part -2)SHUBHA CHATURVEDI
 
Chapter 1 Introduction of Cryptography and Network security
Chapter 1 Introduction of Cryptography and Network security Chapter 1 Introduction of Cryptography and Network security
Chapter 1 Introduction of Cryptography and Network security Dr. Kapil Gupta
 
What are various types of cyber attacks
What are various types of cyber attacksWhat are various types of cyber attacks
What are various types of cyber attackskanika sharma
 
Computer security 7.pptx
Computer security 7.pptxComputer security 7.pptx
Computer security 7.pptxKhappiyo
 
cisco security training
cisco security trainingcisco security training
cisco security trainingqosnetworking
 
8 palo alto security policy concepts
8 palo alto security policy concepts8 palo alto security policy concepts
8 palo alto security policy conceptsMostafa El Lathy
 
WEB APPLICATION SECURITY
WEB APPLICATION SECURITYWEB APPLICATION SECURITY
WEB APPLICATION SECURITYyashwanthlavu
 
System Security enviroment in operating system
System Security enviroment in operating system System Security enviroment in operating system
System Security enviroment in operating system Kushagr sharma
 
Security communication
Security communicationSecurity communication
Security communicationSay Shyong
 
Formal and Practical Aspects of Security of Operating System
Formal and Practical Aspects of Security of Operating SystemFormal and Practical Aspects of Security of Operating System
Formal and Practical Aspects of Security of Operating SystemMeghaj Mallick
 
3 palo alto ngfw architecture overview
3 palo alto ngfw architecture overview3 palo alto ngfw architecture overview
3 palo alto ngfw architecture overviewMostafa El Lathy
 

What's hot (20)

Security Mechanisms
Security MechanismsSecurity Mechanisms
Security Mechanisms
 
webinos Security privacy
webinos Security privacywebinos Security privacy
webinos Security privacy
 
Types of attack -Part3 (Malware Part -2)
Types of attack -Part3 (Malware Part -2)Types of attack -Part3 (Malware Part -2)
Types of attack -Part3 (Malware Part -2)
 
Chapter 1 Introduction of Cryptography and Network security
Chapter 1 Introduction of Cryptography and Network security Chapter 1 Introduction of Cryptography and Network security
Chapter 1 Introduction of Cryptography and Network security
 
What are various types of cyber attacks
What are various types of cyber attacksWhat are various types of cyber attacks
What are various types of cyber attacks
 
Computer security 7.pptx
Computer security 7.pptxComputer security 7.pptx
Computer security 7.pptx
 
Chapter- I introduction
Chapter- I introductionChapter- I introduction
Chapter- I introduction
 
Network security
Network securityNetwork security
Network security
 
Network attacks
Network attacksNetwork attacks
Network attacks
 
Konica Arora
Konica AroraKonica Arora
Konica Arora
 
cisco security training
cisco security trainingcisco security training
cisco security training
 
8 palo alto security policy concepts
8 palo alto security policy concepts8 palo alto security policy concepts
8 palo alto security policy concepts
 
Web server security challenges
Web server security challengesWeb server security challenges
Web server security challenges
 
WEB APPLICATION SECURITY
WEB APPLICATION SECURITYWEB APPLICATION SECURITY
WEB APPLICATION SECURITY
 
Web security
Web securityWeb security
Web security
 
Chapter 01
Chapter 01Chapter 01
Chapter 01
 
System Security enviroment in operating system
System Security enviroment in operating system System Security enviroment in operating system
System Security enviroment in operating system
 
Security communication
Security communicationSecurity communication
Security communication
 
Formal and Practical Aspects of Security of Operating System
Formal and Practical Aspects of Security of Operating SystemFormal and Practical Aspects of Security of Operating System
Formal and Practical Aspects of Security of Operating System
 
3 palo alto ngfw architecture overview
3 palo alto ngfw architecture overview3 palo alto ngfw architecture overview
3 palo alto ngfw architecture overview
 

Viewers also liked

Computing Science Dissertation
Computing Science DissertationComputing Science Dissertation
Computing Science Dissertationrmc1987
 
Leadership academy power point
Leadership academy power pointLeadership academy power point
Leadership academy power pointlshores
 
Social media landscape 2013 Geraud Montigny
Social media landscape 2013 Geraud MontignySocial media landscape 2013 Geraud Montigny
Social media landscape 2013 Geraud MontignyGéraud Montigny
 
Breve histórico da pedologia
Breve histórico da pedologiaBreve histórico da pedologia
Breve histórico da pedologiaLinuxterra Eudes
 
The businessman app
The businessman appThe businessman app
The businessman appmdivt13
 
The businessman app
The businessman appThe businessman app
The businessman appmdivt13
 
Prototype
PrototypePrototype
Prototypemdivt13
 
Community development
Community developmentCommunity development
Community developmentJoseph Berry
 
Community development
Community developmentCommunity development
Community developmentJoseph Berry
 

Viewers also liked (13)

Vgjyhf
VgjyhfVgjyhf
Vgjyhf
 
Computing Science Dissertation
Computing Science DissertationComputing Science Dissertation
Computing Science Dissertation
 
Face to-face
Face to-faceFace to-face
Face to-face
 
Leadership academy power point
Leadership academy power pointLeadership academy power point
Leadership academy power point
 
Social media landscape 2013 Geraud Montigny
Social media landscape 2013 Geraud MontignySocial media landscape 2013 Geraud Montigny
Social media landscape 2013 Geraud Montigny
 
Breve histórico da pedologia
Breve histórico da pedologiaBreve histórico da pedologia
Breve histórico da pedologia
 
Doc1
Doc1Doc1
Doc1
 
The businessman app
The businessman appThe businessman app
The businessman app
 
The businessman app
The businessman appThe businessman app
The businessman app
 
Prototype
PrototypePrototype
Prototype
 
The History of Injectables
The History of InjectablesThe History of Injectables
The History of Injectables
 
Community development
Community developmentCommunity development
Community development
 
Community development
Community developmentCommunity development
Community development
 

Similar to Data security in Online Commerce: Protecting Sensitive Data

Communications Technologies
Communications TechnologiesCommunications Technologies
Communications TechnologiesSarah Jimenez
 
Network security protocols.pptx
Network security protocols.pptxNetwork security protocols.pptx
Network security protocols.pptxSamyLacheheub
 
Mattias eriksson
Mattias erikssonMattias eriksson
Mattias erikssonHai Nguyen
 
CTO-CybersecurityForum-2010-RonWilliams
CTO-CybersecurityForum-2010-RonWilliamsCTO-CybersecurityForum-2010-RonWilliams
CTO-CybersecurityForum-2010-RonWilliamssegughana
 
WebRTC Security
WebRTC SecurityWebRTC Security
WebRTC SecurityAlex Hunte
 
Security and identity management on WebRTC
Security and identity management on WebRTCSecurity and identity management on WebRTC
Security and identity management on WebRTCQuobis
 
Cryptography and network security.
Cryptography and network security.Cryptography and network security.
Cryptography and network security.RAVI RAJ
 
Network security by sandhya
Network security by sandhyaNetwork security by sandhya
Network security by sandhyasandeepsandy75
 
Corporate Security Issues and countering them using Unified Threat Management...
Corporate Security Issues and countering them using Unified Threat Management...Corporate Security Issues and countering them using Unified Threat Management...
Corporate Security Issues and countering them using Unified Threat Management...Rishabh Dangwal
 
Network Security & Ethical Hacking
Network Security & Ethical HackingNetwork Security & Ethical Hacking
Network Security & Ethical HackingSripati Mahapatra
 
Protecting location privacy in sensor networks against a global eavesdropper
Protecting location privacy in sensor networks against a global eavesdropperProtecting location privacy in sensor networks against a global eavesdropper
Protecting location privacy in sensor networks against a global eavesdropperShakas Technologies
 
Protecting location privacy in sensor networks against a global eavesdropper
Protecting location privacy in sensor networks against a global eavesdropperProtecting location privacy in sensor networks against a global eavesdropper
Protecting location privacy in sensor networks against a global eavesdropperShakas Technologies
 
VULNERABILITIES OF THE SSL/TLS PROTOCOL
VULNERABILITIES OF THE SSL/TLS PROTOCOLVULNERABILITIES OF THE SSL/TLS PROTOCOL
VULNERABILITIES OF THE SSL/TLS PROTOCOLcscpconf
 
Vulnerabilities of the SSL/TLS Protocol
Vulnerabilities of the SSL/TLS ProtocolVulnerabilities of the SSL/TLS Protocol
Vulnerabilities of the SSL/TLS Protocolcsandit
 

Similar to Data security in Online Commerce: Protecting Sensitive Data (20)

Communications Technologies
Communications TechnologiesCommunications Technologies
Communications Technologies
 
Network security protocols.pptx
Network security protocols.pptxNetwork security protocols.pptx
Network security protocols.pptx
 
Netdefender
NetdefenderNetdefender
Netdefender
 
Net Defender
Net DefenderNet Defender
Net Defender
 
Mattias eriksson
Mattias erikssonMattias eriksson
Mattias eriksson
 
CTO-CybersecurityForum-2010-RonWilliams
CTO-CybersecurityForum-2010-RonWilliamsCTO-CybersecurityForum-2010-RonWilliams
CTO-CybersecurityForum-2010-RonWilliams
 
Chapter 4.ppt
Chapter 4.pptChapter 4.ppt
Chapter 4.ppt
 
WebRTC Security
WebRTC SecurityWebRTC Security
WebRTC Security
 
Security and identity management on WebRTC
Security and identity management on WebRTCSecurity and identity management on WebRTC
Security and identity management on WebRTC
 
Cryptography and network security.
Cryptography and network security.Cryptography and network security.
Cryptography and network security.
 
Network security by sandhya
Network security by sandhyaNetwork security by sandhya
Network security by sandhya
 
Security - ch5.ppt
Security - ch5.pptSecurity - ch5.ppt
Security - ch5.ppt
 
Corporate Security Issues and countering them using Unified Threat Management...
Corporate Security Issues and countering them using Unified Threat Management...Corporate Security Issues and countering them using Unified Threat Management...
Corporate Security Issues and countering them using Unified Threat Management...
 
Network Security & Ethical Hacking
Network Security & Ethical HackingNetwork Security & Ethical Hacking
Network Security & Ethical Hacking
 
Protecting location privacy in sensor networks against a global eavesdropper
Protecting location privacy in sensor networks against a global eavesdropperProtecting location privacy in sensor networks against a global eavesdropper
Protecting location privacy in sensor networks against a global eavesdropper
 
Protecting location privacy in sensor networks against a global eavesdropper
Protecting location privacy in sensor networks against a global eavesdropperProtecting location privacy in sensor networks against a global eavesdropper
Protecting location privacy in sensor networks against a global eavesdropper
 
VULNERABILITIES OF THE SSL/TLS PROTOCOL
VULNERABILITIES OF THE SSL/TLS PROTOCOLVULNERABILITIES OF THE SSL/TLS PROTOCOL
VULNERABILITIES OF THE SSL/TLS PROTOCOL
 
Vulnerabilities of the SSL/TLS Protocol
Vulnerabilities of the SSL/TLS ProtocolVulnerabilities of the SSL/TLS Protocol
Vulnerabilities of the SSL/TLS Protocol
 
Ecommerce final ppt
Ecommerce final pptEcommerce final ppt
Ecommerce final ppt
 
cybersecurity
cybersecuritycybersecurity
cybersecurity
 

Recently uploaded

Artificial intelligence in cctv survelliance.pptx
Artificial intelligence in cctv survelliance.pptxArtificial intelligence in cctv survelliance.pptx
Artificial intelligence in cctv survelliance.pptxhariprasad279825
 
Beyond Boundaries: Leveraging No-Code Solutions for Industry Innovation
Beyond Boundaries: Leveraging No-Code Solutions for Industry InnovationBeyond Boundaries: Leveraging No-Code Solutions for Industry Innovation
Beyond Boundaries: Leveraging No-Code Solutions for Industry InnovationSafe Software
 
Ensuring Technical Readiness For Copilot in Microsoft 365
Ensuring Technical Readiness For Copilot in Microsoft 365Ensuring Technical Readiness For Copilot in Microsoft 365
Ensuring Technical Readiness For Copilot in Microsoft 3652toLead Limited
 
Are Multi-Cloud and Serverless Good or Bad?
Are Multi-Cloud and Serverless Good or Bad?Are Multi-Cloud and Serverless Good or Bad?
Are Multi-Cloud and Serverless Good or Bad?Mattias Andersson
 
Human Factors of XR: Using Human Factors to Design XR Systems
Human Factors of XR: Using Human Factors to Design XR SystemsHuman Factors of XR: Using Human Factors to Design XR Systems
Human Factors of XR: Using Human Factors to Design XR SystemsMark Billinghurst
 
"Federated learning: out of reach no matter how close",Oleksandr Lapshyn
"Federated learning: out of reach no matter how close",Oleksandr Lapshyn"Federated learning: out of reach no matter how close",Oleksandr Lapshyn
"Federated learning: out of reach no matter how close",Oleksandr LapshynFwdays
 
Designing IA for AI - Information Architecture Conference 2024
Designing IA for AI - Information Architecture Conference 2024Designing IA for AI - Information Architecture Conference 2024
Designing IA for AI - Information Architecture Conference 2024Enterprise Knowledge
 
Nell’iperspazio con Rocket: il Framework Web di Rust!
Nell’iperspazio con Rocket: il Framework Web di Rust!Nell’iperspazio con Rocket: il Framework Web di Rust!
Nell’iperspazio con Rocket: il Framework Web di Rust!Commit University
 
DevEX - reference for building teams, processes, and platforms
DevEX - reference for building teams, processes, and platformsDevEX - reference for building teams, processes, and platforms
DevEX - reference for building teams, processes, and platformsSergiu Bodiu
 
"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek Schlawack
"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek Schlawack"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek Schlawack
"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek SchlawackFwdays
 
"ML in Production",Oleksandr Bagan
"ML in Production",Oleksandr Bagan"ML in Production",Oleksandr Bagan
"ML in Production",Oleksandr BaganFwdays
 
"LLMs for Python Engineers: Advanced Data Analysis and Semantic Kernel",Oleks...
"LLMs for Python Engineers: Advanced Data Analysis and Semantic Kernel",Oleks..."LLMs for Python Engineers: Advanced Data Analysis and Semantic Kernel",Oleks...
"LLMs for Python Engineers: Advanced Data Analysis and Semantic Kernel",Oleks...Fwdays
 
SAP Build Work Zone - Overview L2-L3.pptx
SAP Build Work Zone - Overview L2-L3.pptxSAP Build Work Zone - Overview L2-L3.pptx
SAP Build Work Zone - Overview L2-L3.pptxNavinnSomaal
 
Gen AI in Business - Global Trends Report 2024.pdf
Gen AI in Business - Global Trends Report 2024.pdfGen AI in Business - Global Trends Report 2024.pdf
Gen AI in Business - Global Trends Report 2024.pdfAddepto
 
SIP trunking in Janus @ Kamailio World 2024
SIP trunking in Janus @ Kamailio World 2024SIP trunking in Janus @ Kamailio World 2024
SIP trunking in Janus @ Kamailio World 2024Lorenzo Miniero
 
WordPress Websites for Engineers: Elevate Your Brand
WordPress Websites for Engineers: Elevate Your BrandWordPress Websites for Engineers: Elevate Your Brand
WordPress Websites for Engineers: Elevate Your Brandgvaughan
 
Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024BookNet Canada
 
Install Stable Diffusion in windows machine
Install Stable Diffusion in windows machineInstall Stable Diffusion in windows machine
Install Stable Diffusion in windows machinePadma Pradeep
 
SQL Database Design For Developers at php[tek] 2024
SQL Database Design For Developers at php[tek] 2024SQL Database Design For Developers at php[tek] 2024
SQL Database Design For Developers at php[tek] 2024Scott Keck-Warren
 
Commit 2024 - Secret Management made easy
Commit 2024 - Secret Management made easyCommit 2024 - Secret Management made easy
Commit 2024 - Secret Management made easyAlfredo García Lavilla
 

Recently uploaded (20)

Artificial intelligence in cctv survelliance.pptx
Artificial intelligence in cctv survelliance.pptxArtificial intelligence in cctv survelliance.pptx
Artificial intelligence in cctv survelliance.pptx
 
Beyond Boundaries: Leveraging No-Code Solutions for Industry Innovation
Beyond Boundaries: Leveraging No-Code Solutions for Industry InnovationBeyond Boundaries: Leveraging No-Code Solutions for Industry Innovation
Beyond Boundaries: Leveraging No-Code Solutions for Industry Innovation
 
Ensuring Technical Readiness For Copilot in Microsoft 365
Ensuring Technical Readiness For Copilot in Microsoft 365Ensuring Technical Readiness For Copilot in Microsoft 365
Ensuring Technical Readiness For Copilot in Microsoft 365
 
Are Multi-Cloud and Serverless Good or Bad?
Are Multi-Cloud and Serverless Good or Bad?Are Multi-Cloud and Serverless Good or Bad?
Are Multi-Cloud and Serverless Good or Bad?
 
Human Factors of XR: Using Human Factors to Design XR Systems
Human Factors of XR: Using Human Factors to Design XR SystemsHuman Factors of XR: Using Human Factors to Design XR Systems
Human Factors of XR: Using Human Factors to Design XR Systems
 
"Federated learning: out of reach no matter how close",Oleksandr Lapshyn
"Federated learning: out of reach no matter how close",Oleksandr Lapshyn"Federated learning: out of reach no matter how close",Oleksandr Lapshyn
"Federated learning: out of reach no matter how close",Oleksandr Lapshyn
 
Designing IA for AI - Information Architecture Conference 2024
Designing IA for AI - Information Architecture Conference 2024Designing IA for AI - Information Architecture Conference 2024
Designing IA for AI - Information Architecture Conference 2024
 
Nell’iperspazio con Rocket: il Framework Web di Rust!
Nell’iperspazio con Rocket: il Framework Web di Rust!Nell’iperspazio con Rocket: il Framework Web di Rust!
Nell’iperspazio con Rocket: il Framework Web di Rust!
 
DevEX - reference for building teams, processes, and platforms
DevEX - reference for building teams, processes, and platformsDevEX - reference for building teams, processes, and platforms
DevEX - reference for building teams, processes, and platforms
 
"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek Schlawack
"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek Schlawack"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek Schlawack
"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek Schlawack
 
"ML in Production",Oleksandr Bagan
"ML in Production",Oleksandr Bagan"ML in Production",Oleksandr Bagan
"ML in Production",Oleksandr Bagan
 
"LLMs for Python Engineers: Advanced Data Analysis and Semantic Kernel",Oleks...
"LLMs for Python Engineers: Advanced Data Analysis and Semantic Kernel",Oleks..."LLMs for Python Engineers: Advanced Data Analysis and Semantic Kernel",Oleks...
"LLMs for Python Engineers: Advanced Data Analysis and Semantic Kernel",Oleks...
 
SAP Build Work Zone - Overview L2-L3.pptx
SAP Build Work Zone - Overview L2-L3.pptxSAP Build Work Zone - Overview L2-L3.pptx
SAP Build Work Zone - Overview L2-L3.pptx
 
Gen AI in Business - Global Trends Report 2024.pdf
Gen AI in Business - Global Trends Report 2024.pdfGen AI in Business - Global Trends Report 2024.pdf
Gen AI in Business - Global Trends Report 2024.pdf
 
SIP trunking in Janus @ Kamailio World 2024
SIP trunking in Janus @ Kamailio World 2024SIP trunking in Janus @ Kamailio World 2024
SIP trunking in Janus @ Kamailio World 2024
 
WordPress Websites for Engineers: Elevate Your Brand
WordPress Websites for Engineers: Elevate Your BrandWordPress Websites for Engineers: Elevate Your Brand
WordPress Websites for Engineers: Elevate Your Brand
 
Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
 
Install Stable Diffusion in windows machine
Install Stable Diffusion in windows machineInstall Stable Diffusion in windows machine
Install Stable Diffusion in windows machine
 
SQL Database Design For Developers at php[tek] 2024
SQL Database Design For Developers at php[tek] 2024SQL Database Design For Developers at php[tek] 2024
SQL Database Design For Developers at php[tek] 2024
 
Commit 2024 - Secret Management made easy
Commit 2024 - Secret Management made easyCommit 2024 - Secret Management made easy
Commit 2024 - Secret Management made easy
 

Data security in Online Commerce: Protecting Sensitive Data

  • 1. Data security in Online Commerce PRESENTATION BY ANAND NAIR FOR DATA SECURITY MEET UP. 03/2008
  • 2. Introduction  About me:  More than a decade experience as a researcher and developer of secure web services for online infrastructure  Contributor to open source projects  Speaker in various meet ups for technology and approach for highly scalable secure architecture.  Recognized as technologist in gaming industry in research and development of online infrastructure.  What’s in presentation  Data security discussion  Tools to test security risk
  • 3. Data vulnerability The most common web application security weakness is the failure to properly validate input coming from the client or environment before using it. This weakness leads to almost all of the major vulnerabilities in web applications, such as cross site scripting, SQL injection, interpreter injection, locale/Unicode attacks, file system attacks and buffer overflows.
  • 4. Data Security : Watch the input data  Data from an external entity or client should never be trusted, since it can be arbitrarily tampered with by an attacker.  Unfortunately, complex applications like often have a large number of data input points, which makes it difficult for a developer to enforce this rule.
  • 5. Data Security : Types of Attack  A MitM attack can be performed in two different ways:  The attacker is in control of a router along the normal point of traffic communication between the victim and the server the victim is communicating with.  The attacker is located on the same broadcast domain (e.g. subnet) as the victim.  The attacker is located on the same broadcast domain (e.g. subnet) as any of the routing devices used by the victim to route traffic.
  • 6. Data Security: Transport Protocol  Attacker has the ability to view and modify any TCP traffic sent to or from the victim machine.  HTTP traffic is unencrypted and contains no authentication. Therefore, all HTTP traffic can be trivially monitored/modified by the attacker.
  • 7. Data Security: Secure transport protocol  Man in the middle enables the attacker to view most exchanged data, but does not enable the attacker to intercept data exchanged of protocols that implement their own authentication and encryption (e.g. SSH, SSL/TLS).  The purpose of HTTPS is to create a secure communication over top of HTTP by the use of SSL or TLS. On its own SSL/TLS can be very effective and secure. However, there are significant problems  The browsers handling of SSL/TLS can lead to issues when both HTTPS and HTTP sites are visited by the user.  Man in middle would present a certificate warning message in the user’s browser and likely alert the user to the attack that most users would ignore the warning and continue – thus exposing all of their data.  Alternatively, the attacker could try and use tools such as SSLstrip to leverage poor application design with regards to SSL/TLS.
  • 8. Using Tools  Toolkit:  Platform to run the application  Network switch to create a closed network environment  Wireshark (www.wireshark.org)  Burp Suite (www.portswigger.net/burp/download.html)