Home
Explore
Submit Search
Upload
Login
Signup
Ihor Bliumental - WebSockets
Report
OWASP Kyiv
Follow
OWASP Kyiv
Mar. 4, 2018
•
0 likes
•
343 views
1
of
22
Ihor Bliumental - WebSockets
Mar. 4, 2018
•
0 likes
•
343 views
Download Now
Download to read offline
Report
Technology
WebSockets security analysis methods and techniques.
OWASP Kyiv
Follow
OWASP Kyiv
Recommended
Web security
Greater Noida Institute Of Technology
155 views
•
13 slides
Wap wml
Ankit Anand
110 views
•
22 slides
IWMW 1998: Server Management (3) Controlling access
IWMW
191 views
•
11 slides
15 intro to ssl certificate & pki concept
Mostafa El Lathy
278 views
•
18 slides
KILLME NOWITSELF
Shehab Imam
254 views
•
18 slides
Proxy Presentation
primeteacher32
6K views
•
11 slides
More Related Content
Slideshows for you
Information Security Systems
Eyad Mhanna
271 views
•
16 slides
020618 Why Do we Need HTTPS
Jackio Kwok
395 views
•
23 slides
Stable proxies it's type and advantages
stableproxies
14K views
•
22 slides
Introduction to stable proxies.
stableproxies
217 views
•
22 slides
cryptography security
Zia3130
148 views
•
14 slides
Web Proxy Server
Mohit Dhankher
1K views
•
17 slides
Slideshows for you
(18)
Information Security Systems
Eyad Mhanna
•
271 views
020618 Why Do we Need HTTPS
Jackio Kwok
•
395 views
Stable proxies it's type and advantages
stableproxies
•
14K views
Introduction to stable proxies.
stableproxies
•
217 views
cryptography security
Zia3130
•
148 views
Web Proxy Server
Mohit Dhankher
•
1K views
Introduce warden
Hieu Nguyen Trung
•
385 views
12 web security
StephenKardian
•
88 views
SignalR
Sarvesh Kushwaha
•
243 views
XML Key Management Protocol for Secure Web Service
Md. Hasan Basri (Angel)
•
1.3K views
Fundamental of Webserver Hacking, Web Applications and Database Attacks
UK Defence Cyber School
•
14 views
WT - Firewall & Proxy Server
vinay arora
•
2.1K views
Proxy Servers & Firewalls
Mehdi Poustchi Amin
•
25.5K views
Introduction to OAuth
Wei-Tsung Su
•
1.3K views
Http Proxy Server
Sourav Roy
•
5.6K views
Api sec demo_updated_v2
Aravindan A
•
94 views
y3dips hacking priv8 network
idsecconf
•
1.3K views
Sqlviking
Jonn Callahan
•
291 views
Similar to Ihor Bliumental - WebSockets
Vulnerabilities in modern web applications
Niyas Nazar
1.3K views
•
34 slides
Computer Network Case Study - bajju.pptx
ShivamBajaj36
55 views
•
12 slides
The path of secure software by Katy Anton
DevSecCon
227 views
•
59 slides
HTML5 hacking
Blueinfy Solutions
3.1K views
•
84 slides
Owasp Mobile Risk Series : M3 : Insufficient Transport Layer Protection
Anant Shrivastava
40.5K views
•
21 slides
WebApps_Lecture_15.ppt
OmprakashVerma56
10 views
•
45 slides
Similar to Ihor Bliumental - WebSockets
(20)
Vulnerabilities in modern web applications
Niyas Nazar
•
1.3K views
Computer Network Case Study - bajju.pptx
ShivamBajaj36
•
55 views
The path of secure software by Katy Anton
DevSecCon
•
227 views
HTML5 hacking
Blueinfy Solutions
•
3.1K views
Owasp Mobile Risk Series : M3 : Insufficient Transport Layer Protection
Anant Shrivastava
•
40.5K views
WebApps_Lecture_15.ppt
OmprakashVerma56
•
10 views
Protecting Web Services from DDOS Attack
Ponraj
•
7.2K views
Building Client-Side Attacks with HTML5 Features
Conviso Application Security
•
3.2K views
Spa Secure Coding Guide
Geoffrey Vandiest
•
152 views
Web Services Hacking and Security
Blueinfy Solutions
•
6.1K views
DEF CON 24 - workshop - Craig Young - brainwashing embedded systems
Felipe Prado
•
42 views
a
Sandeep Kumar
•
197 views
Html5 security
Krishna T
•
2.6K views
www.webre24h.com - Ajax security
webre24h
•
189 views
Information Security Engineering
Md. Hasan Basri (Angel)
•
192 views
Cross Site Scripting - Mozilla Security Learning Center
Michael Coates
•
6.1K views
Websocket
艾鍗科技
•
2.2K views
DDD Melbourne 2014 security in ASP.Net Web API 2
Pratik Khasnabis
•
1.3K views
Post XSS Exploitation : Advanced Attacks and Remedies
Adwiteeya Agrawal
•
3.4K views
Security Patterns with WSO2 ESB
WSO2
•
5.2K views
More from OWASP Kyiv
Is there a penetration testing within PCI DSS certification? (Dmytro Diordiyc...
OWASP Kyiv
246 views
•
34 slides
Software Supply Chain Security та компоненти з відомими вразливостями
OWASP Kyiv
197 views
•
21 slides
Cloud Security Hardening та аудит хмарної безпеки за допомогою Scout Suite
OWASP Kyiv
153 views
•
31 slides
Threat Modeling with OWASP Threat Dragon
OWASP Kyiv
600 views
•
12 slides
Anastasia Vixentael - Don't Waste Time on Learning Cryptography: Better Use I...
OWASP Kyiv
693 views
•
79 slides
Vlad Styran - Cyber Security Economics 101
OWASP Kyiv
466 views
•
17 slides
More from OWASP Kyiv
(20)
Is there a penetration testing within PCI DSS certification? (Dmytro Diordiyc...
OWASP Kyiv
•
246 views
Software Supply Chain Security та компоненти з відомими вразливостями
OWASP Kyiv
•
197 views
Cloud Security Hardening та аудит хмарної безпеки за допомогою Scout Suite
OWASP Kyiv
•
153 views
Threat Modeling with OWASP Threat Dragon
OWASP Kyiv
•
600 views
Anastasia Vixentael - Don't Waste Time on Learning Cryptography: Better Use I...
OWASP Kyiv
•
693 views
Vlad Styran - Cyber Security Economics 101
OWASP Kyiv
•
466 views
Pavlo Radchuk - OWASP SAMM: Understanding Agile in Security
OWASP Kyiv
•
2.4K views
Ivan Vyshnevskyi - Not So Quiet Git Push
OWASP Kyiv
•
432 views
Dima Kovalenko - Modern SSL Pinning
OWASP Kyiv
•
525 views
Yevhen Teleshyk - OAuth Phishing
OWASP Kyiv
•
362 views
Vlada Kulish - Why So Serial?
OWASP Kyiv
•
590 views
Vlad Styran - OWASP Kyiv 2017 Report and 2018 Plans
OWASP Kyiv
•
344 views
Roman Borodin - ISC2 & ISACA Certification Programs First-hand Experience
OWASP Kyiv
•
815 views
Serhiy Korolenko - The Strength of Ukrainian Users’ P@ssw0rds2017
OWASP Kyiv
•
1.1K views
Viktor Zhora - Cyber and Geopolitics: Ukrainian factor
OWASP Kyiv
•
647 views
Andriy Shalaenko - GO security tips
OWASP Kyiv
•
1.5K views
Vlad Styran - "Hidden" Features of the Tools We All Love
OWASP Kyiv
•
636 views
Volodymyr Ilibman - Close Look at Nyetya Investigation
OWASP Kyiv
•
412 views
Ihor Bliumental - Collision CORS
OWASP Kyiv
•
370 views
Lidiia 'Alice' Skalytska - Security Checklist for Web Developers
OWASP Kyiv
•
548 views
Recently uploaded
zkStudyClub - Lasso/Jolt (Justin Thaler, GWU/a16z)
Alex Pruden
17 views
•
39 slides
AI and ML Series - Introduction to Generative AI and LLMs - Session 1
DianaGray10
179 views
•
38 slides
Info Session GDSC Mepco Sechenk Chapter.pptx
DURAIVIGNESHC
15 views
•
13 slides
GDSC INFO.pptx
AshishChanchal1
36 views
•
15 slides
GDSC SRMCEM Info Session 2023
HariOM Dwivedi
56 views
•
8 slides
GDSC Final PPT.pptx
DishaSharma737984
20 views
•
22 slides
Recently uploaded
(20)
zkStudyClub - Lasso/Jolt (Justin Thaler, GWU/a16z)
Alex Pruden
•
17 views
AI and ML Series - Introduction to Generative AI and LLMs - Session 1
DianaGray10
•
179 views
Info Session GDSC Mepco Sechenk Chapter.pptx
DURAIVIGNESHC
•
15 views
GDSC INFO.pptx
AshishChanchal1
•
36 views
GDSC SRMCEM Info Session 2023
HariOM Dwivedi
•
56 views
GDSC Final PPT.pptx
DishaSharma737984
•
20 views
[KCD GT 2023] Demystifying etcd failure scenarios for Kubernetes.pdf
William Caban
•
45 views
OpenFOAM benchmark for EPYC server: cavity medium
takuyayamamoto1800
•
31 views
dvss.ppt
SaikrishnaCheruvu1
•
354 views
Doorsvision-The-Future-of-Smart-Communities gama adj.pdf
Mustafa Kuğu
•
84 views
What’s new in Kotlin 12-08-2023 Google IO Cairo 23
Ahmed Nabil
•
66 views
Future of Virtual reality
mdpavel4
•
13 views
#11 DataWeave Extension Library using Visual Studio Code
AnoopRamachandran13
•
79 views
DigitalWisers Onepager.pdf
Mustafa Kuğu
•
165 views
What's Coming in CloudStack 4.19
ShapeBlue
•
122 views
GDSC23 - Info Session GDSC KIET (1).pptx
SnehaAggarwal40
•
119 views
Daily Scrum, Sprint Review & Retrospective.pptx
Md. Rakib Trofder
•
90 views
Workshop on IoT and Basic Home Automation_BAIUST.pptx
Redwan Ferdous
•
27 views
AWS Toolkit.pptx
Brandon Minnick, MBA
•
54 views
GDSC23 SAC - Info Session GDSC.pptx
SAC
•
221 views
Ihor Bliumental - WebSockets
Ihor Bliumental OWASP Kyiv
Chapter Lead ihor.bliumental@owasp.org WebSocket security
WebSocket handshake
WebSocket protocol
WebSocket handshake
WebSocket handshake
WebSocket – Javascript API
Authentication
Authorization • An attacker can access the data/functions without authorization • An attacker can access the data/functions which require higher level of authorization •
An attacker can access other same level user's restricted data/functions
Cross Origin Resource Sharing
Cross Origin Resource Sharing
Traffic encryption • All sensitive data should be transferred using TLS (wss://) • TLS should be implemented correctly (no weak ciphers)
Resource Exhaustion • Connection is being kept until client or server close it • An attacker can exhausts all available connections •
Modern clients have limits (e.g. Chrome: 256 total WS connections, 30 per one host; Firefox: 200 total WS connections)
Improper input validation • A1 - Injections (SQLi, Code injections, Template injections, etc.) • A4 - XXE •
A7 - XSS • A8 - Insecure deserialisation
Chrome developer tools
Simple WebSocket Client (FF/Chrome addon)
Burp Suite Community Edition
Burp Suite Pro
Burp Suite Pro
OWASP ZAP
OWASP ZAP
Example
Questions?