
![Who am I? ,[object Object],[object Object],[object Object],[object Object],[object Object]](https://image.slidesharecdn.com/ajaxsecurity-12695072945114-phpapp01/85/ajax-security-2-320.jpg?cb=1668464514)
![Agenda ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]](https://image.slidesharecdn.com/ajaxsecurity-12695072945114-phpapp01/85/ajax-security-3-320.jpg?cb=1668464514)
![Introduction ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]](https://image.slidesharecdn.com/ajaxsecurity-12695072945114-phpapp01/85/ajax-security-4-320.jpg?cb=1668464514)
![Ajax Components (cont.) ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]](https://image.slidesharecdn.com/ajaxsecurity-12695072945114-phpapp01/85/ajax-security-5-320.jpg?cb=1668464514)
![Ajax Components ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]](https://image.slidesharecdn.com/ajaxsecurity-12695072945114-phpapp01/85/ajax-security-6-320.jpg?cb=1668464514)

![Let’s define Ajax: ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]](https://image.slidesharecdn.com/ajaxsecurity-12695072945114-phpapp01/85/ajax-security-8-320.jpg?cb=1668464514)



![Why Ajax is used? ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]](https://image.slidesharecdn.com/ajaxsecurity-12695072945114-phpapp01/85/ajax-security-12-320.jpg?cb=1668464514)

![Let’s talk about Ajax and security… ,[object Object],[object Object],[object Object],[object Object],[object Object]](https://image.slidesharecdn.com/ajaxsecurity-12695072945114-phpapp01/85/ajax-security-14-320.jpg?cb=1668464514)
![Ajax and Security – Server of origin policy ,[object Object],URLs Cross – Scripting allowed? Comments http://www.example.com:8080/script1.js No Port number doesn’t match. http://www.example.com/script2.js http://www.example.com/script1.js No Protocol type doesn’t match. https://www.example.com/script2.js http://www.example.com/script1.js No Browser will not perform domain name resolution. http://192.168.0.10/script2.js http://sub.example.com/script1.js No Subdomains treated as separate domains. http://www.example.com/script2.js http://www.example.com/hello/script1.js YES Domain name is the same. http://www.example.com/bye/script.2.js http://www.example2.com/script1.js NO Different domain names. http://www.example1.com/script2.js](https://image.slidesharecdn.com/ajaxsecurity-12695072945114-phpapp01/85/ajax-security-15-320.jpg?cb=1668464514)
![Ajax and Security – Server of origin policy ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]](https://image.slidesharecdn.com/ajaxsecurity-12695072945114-phpapp01/85/ajax-security-16-320.jpg?cb=1668464514)
![Real attacks examples ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]](https://image.slidesharecdn.com/ajaxsecurity-12695072945114-phpapp01/85/ajax-security-17-320.jpg?cb=1668464514)
![Ajax Security – Case Study – Samy worm ,[object Object],[object Object],[object Object],[object Object]](https://image.slidesharecdn.com/ajaxsecurity-12695072945114-phpapp01/85/ajax-security-18-320.jpg?cb=1668464514)
![Ajax – Case Study – Samy worm (cont) ,[object Object]](https://image.slidesharecdn.com/ajaxsecurity-12695072945114-phpapp01/85/ajax-security-19-320.jpg?cb=1668464514)


![Ajax – Case Study – Samy worm ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]](https://image.slidesharecdn.com/ajaxsecurity-12695072945114-phpapp01/85/ajax-security-22-320.jpg?cb=1668464514)
![Ajax – Case Study – Yamanner worm ,[object Object],[object Object],[object Object],[object Object],[object Object]](https://image.slidesharecdn.com/ajaxsecurity-12695072945114-phpapp01/85/ajax-security-23-320.jpg?cb=1668464514)
![Ajax – Case Study – Yamanner worm ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]](https://image.slidesharecdn.com/ajaxsecurity-12695072945114-phpapp01/85/ajax-security-24-320.jpg?cb=1668464514)
![Ajax – Case Study – Nduja - Webmail XSS worm ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]](https://image.slidesharecdn.com/ajaxsecurity-12695072945114-phpapp01/85/ajax-security-25-320.jpg?cb=1668464514)
![Ajax Security – Case Study – Nduja - Webmail XSS Worm ,[object Object],[object Object],[object Object],[object Object],[object Object]](https://image.slidesharecdn.com/ajaxsecurity-12695072945114-phpapp01/85/ajax-security-26-320.jpg?cb=1668464514)


![Questions/Conclusion ,[object Object],[object Object]](https://image.slidesharecdn.com/ajaxsecurity-12695072945114-phpapp01/85/ajax-security-29-320.jpg?cb=1668464514)
![References – Misc. ,[object Object],[object Object],[object Object],[object Object],[object Object]](https://image.slidesharecdn.com/ajaxsecurity-12695072945114-phpapp01/85/ajax-security-30-320.jpg?cb=1668464514)
![References – Misc. ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]](https://image.slidesharecdn.com/ajaxsecurity-12695072945114-phpapp01/85/ajax-security-31-320.jpg?cb=1668464514)
![References – Books ,[object Object],[object Object],[object Object]](https://image.slidesharecdn.com/ajaxsecurity-12695072945114-phpapp01/85/ajax-security-32-320.jpg?cb=1668464514)
![Table of Figures ,[object Object],[object Object],[object Object],[object Object],[object Object]](https://image.slidesharecdn.com/ajaxsecurity-12695072945114-phpapp01/85/ajax-security-33-320.jpg?cb=1668464514)
This talk highlights potential attacks against web application using Ajax and XHR technology. The first part of the talk introduces Ajax and related technologies. Second part of the talk focuses on potential attacks and consequences, including some scenario where SOP (Same of origin) policy is bypassed.
