Ihor Bliumental - WebSockets

OWASP Kyiv
Mar. 4, 2018
Ihor Bliumental - WebSockets
Ihor Bliumental - WebSockets
Ihor Bliumental - WebSockets
Ihor Bliumental - WebSockets
Ihor Bliumental - WebSockets
Ihor Bliumental - WebSockets
Ihor Bliumental - WebSockets
Ihor Bliumental - WebSockets
Ihor Bliumental - WebSockets
Ihor Bliumental - WebSockets
Ihor Bliumental - WebSockets
Ihor Bliumental - WebSockets
Ihor Bliumental - WebSockets
Ihor Bliumental - WebSockets
Ihor Bliumental - WebSockets
Ihor Bliumental - WebSockets
Ihor Bliumental - WebSockets
Ihor Bliumental - WebSockets
Ihor Bliumental - WebSockets
Ihor Bliumental - WebSockets
Ihor Bliumental - WebSockets
Ihor Bliumental - WebSockets
1 of 22

More Related Content

Slideshows for you

Information Security SystemsInformation Security Systems
Information Security SystemsEyad Mhanna
020618 Why Do we Need HTTPS020618 Why Do we Need HTTPS
020618 Why Do we Need HTTPSJackio Kwok
Stable proxies it's type and advantagesStable proxies it's type and advantages
Stable proxies it's type and advantagesstableproxies
Introduction to stable proxies.Introduction to stable proxies.
Introduction to stable proxies.stableproxies
  cryptography security  cryptography security
cryptography securityZia3130
Web Proxy ServerWeb Proxy Server
Web Proxy ServerMohit Dhankher

Similar to Ihor Bliumental - WebSockets

Vulnerabilities in modern web applicationsVulnerabilities in modern web applications
Vulnerabilities in modern web applicationsNiyas Nazar
Computer Network Case Study - bajju.pptxComputer Network Case Study - bajju.pptx
Computer Network Case Study - bajju.pptxShivamBajaj36
The path of secure software by Katy AntonThe path of secure software by Katy Anton
The path of secure software by Katy AntonDevSecCon
HTML5 hackingHTML5 hacking
HTML5 hackingBlueinfy Solutions
Owasp Mobile Risk Series : M3 : Insufficient Transport Layer ProtectionOwasp Mobile Risk Series : M3 : Insufficient Transport Layer Protection
Owasp Mobile Risk Series : M3 : Insufficient Transport Layer ProtectionAnant Shrivastava
WebApps_Lecture_15.pptWebApps_Lecture_15.ppt
WebApps_Lecture_15.pptOmprakashVerma56

More from OWASP Kyiv

Is there a penetration testing within PCI DSS certification? (Dmytro Diordiyc...Is there a penetration testing within PCI DSS certification? (Dmytro Diordiyc...
Is there a penetration testing within PCI DSS certification? (Dmytro Diordiyc...OWASP Kyiv
Software Supply Chain Security та компоненти з відомими вразливостямиSoftware Supply Chain Security та компоненти з відомими вразливостями
Software Supply Chain Security та компоненти з відомими вразливостямиOWASP Kyiv
Cloud Security Hardening та аудит хмарної безпеки за допомогою Scout SuiteCloud Security Hardening та аудит хмарної безпеки за допомогою Scout Suite
Cloud Security Hardening та аудит хмарної безпеки за допомогою Scout SuiteOWASP Kyiv
Threat Modeling with OWASP Threat DragonThreat Modeling with OWASP Threat Dragon
Threat Modeling with OWASP Threat DragonOWASP Kyiv
Anastasia Vixentael - Don't Waste Time on Learning Cryptography: Better Use I...Anastasia Vixentael - Don't Waste Time on Learning Cryptography: Better Use I...
Anastasia Vixentael - Don't Waste Time on Learning Cryptography: Better Use I...OWASP Kyiv
Vlad Styran - Cyber Security Economics 101Vlad Styran - Cyber Security Economics 101
Vlad Styran - Cyber Security Economics 101OWASP Kyiv

More from OWASP Kyiv(20)

Recently uploaded

zkStudyClub - Lasso/Jolt (Justin Thaler, GWU/a16z)zkStudyClub - Lasso/Jolt (Justin Thaler, GWU/a16z)
zkStudyClub - Lasso/Jolt (Justin Thaler, GWU/a16z)Alex Pruden
AI and ML Series - Introduction to Generative AI and LLMs - Session 1AI and ML Series - Introduction to Generative AI and LLMs - Session 1
AI and ML Series - Introduction to Generative AI and LLMs - Session 1DianaGray10
Info Session GDSC  Mepco Sechenk Chapter.pptxInfo Session GDSC  Mepco Sechenk Chapter.pptx
Info Session GDSC Mepco Sechenk Chapter.pptxDURAIVIGNESHC
GDSC INFO.pptxGDSC INFO.pptx
GDSC INFO.pptxAshishChanchal1
GDSC SRMCEM Info Session 2023GDSC SRMCEM Info Session 2023
GDSC SRMCEM Info Session 2023HariOM Dwivedi
GDSC Final PPT.pptxGDSC Final PPT.pptx
GDSC Final PPT.pptxDishaSharma737984

Ihor Bliumental - WebSockets

  1. Ihor Bliumental OWASP Kyiv Chapter Lead ihor.bliumental@owasp.org WebSocket security
  2. WebSocket handshake
  3. WebSocket protocol
  4. WebSocket handshake
  5. WebSocket handshake
  6. WebSocket – Javascript API
  7. Authentication
  8. Authorization • An attacker can access the data/functions without authorization • An attacker can access the data/functions which require higher level of authorization • An attacker can access other same level user's restricted data/functions
  9. Cross Origin Resource Sharing
  10. Cross Origin Resource Sharing
  11. Traffic encryption • All sensitive data should be transferred using TLS (wss://) • TLS should be implemented correctly (no weak ciphers)
  12. Resource Exhaustion • Connection is being kept until client or server close it • An attacker can exhausts all available connections • Modern clients have limits (e.g. Chrome: 256 total WS connections, 30 per one host; Firefox: 200 total WS connections)
  13. Improper input validation • A1 - Injections (SQLi, Code injections, Template injections, etc.) • A4 - XXE • A7 - XSS • A8 - Insecure deserialisation
  14. Chrome developer tools
  15. Simple WebSocket Client (FF/Chrome addon)
  16. Burp Suite Community Edition
  17. Burp Suite Pro
  18. Burp Suite Pro
  19. OWASP ZAP
  20. OWASP ZAP
  21. Example
  22. Questions?