Practical web-attacks2

5,603 views

Published on

Published in: Technology
0 Comments
0 Likes
Statistics
Notes
  • Be the first to comment

  • Be the first to like this

No Downloads
Views
Total views
5,603
On SlideShare
0
From Embeds
0
Number of Embeds
2,808
Actions
Shares
0
Downloads
67
Comments
0
Likes
0
Embeds 0
No embeds

No notes for slide

Practical web-attacks2

  1. 1. Web application attacks – practical demonstration Ing. Pavol Lupták, CISSP, CEH          www.nethemba.com             www.nethemba.com      
  2. 2. Agenda  Unvalidates Parameters  Access Control Flaws  Session Management Flaws  Cross Site Scripting (XSS)  Injection flaws (bonus)  Improper Error Handling (bonus)  AJAX Security (bonus)          www.nethemba.com       
  3. 3. Access Controls Flaws  Bypass a Path Based Access Control Scheme  Bypass Data Layer Access Control  Bypass Business Layer Access Control  Remote Admin Access          www.nethemba.com       
  4. 4. AJAX Security  DOM­based XSS  Client Side Filtering  Same Origin Policy (SOP) Protection  XML Injection  JSON Injection  Silent Transaction Attacks   Dangerous Use of Eval        www.nethemba.com       
  5. 5. Authentication flaws  Forgot Password  Multilevel Login 1  Multilevel Login 2          www.nethemba.com       
  6. 6. Code Quality  Discover Clues in the HTML code          www.nethemba.com       
  7. 7. Concurrency  Shopping Card Concurrency Flaw           www.nethemba.com       
  8. 8. Cross Site Scripting (XSS)  Stored XSS  Reflected XSS  Cross Site Request Forgery (CSRF)  HTTPonly test          www.nethemba.com       
  9. 9. Improper Error Handling  Fail Open Authentication Scheme          www.nethemba.com       
  10. 10. Injection flaws  Blind SQL injection  Numeric SQL injection  String SQL injection  XPATH injection          www.nethemba.com       
  11. 11. Parameter tampering  Exploit Hidden Fields  Exploit Unchecked Email  Bypass Client Side JavaScript Validation          www.nethemba.com       
  12. 12. Session Management Flaws  Spoof an Authentication Cookie  Hijack a Session  Session Fixation Attack          www.nethemba.com       
  13. 13. Used tools  WebGoat project  http://www.owasp.org/index.php/Category:OWASP_WebGoat_P  WebScarab  http://www.owasp.org/index.php/Category:OWASP_WebScarab  Tamperdata http://tamperdata.mozdev.org/  LiveHTTPHeaders http://livehttpheaders.mozdev.org/  Foxy Proxy http://foxyproxy.mozdev.org/          www.nethemba.com       
  14. 14. References  New Web Applications Attacks  http://www.nethemba.com/new_web_attacks­nethe  LAMP and PHP security hardening (in Slovak  language)   http://www.nethemba.com/php­sec.pdf          www.nethemba.com       
  15. 15. Thank you for listening! Ing. Pavol Lupták, CISSP, CEH pavol.luptak@nethemba.com          www.nethemba.com       

×