Successfully reported this slideshow.
We use your LinkedIn profile and activity data to personalize ads and to show you more relevant ads. You can change your ad preferences anytime.
When Ajax Attacks!
 Web application security fundamentals

 Simon Willison, @media Ajax 2008
I’m here to scare you
• XSS               • PDF
• CSRF              • XBL
• UTF-7             • HTC
• crossdomain.xml   • ...
A few years ago...

• Web application security tutorials tended to
  boil down to three things:
  • Don’t trust input from...
A few years ago...

• Web application security tutorials tended to
  boil down to three things:
  • Don’t trust input from...
When Ajax Attacks! Web application security fundamentals
When Ajax Attacks! Web application security fundamentals
When Ajax Attacks! Web application security fundamentals
When Ajax Attacks! Web application security fundamentals
When Ajax Attacks! Web application security fundamentals
When Ajax Attacks! Web application security fundamentals
When Ajax Attacks! Web application security fundamentals
When Ajax Attacks! Web application security fundamentals
When Ajax Attacks! Web application security fundamentals
When Ajax Attacks! Web application security fundamentals
When Ajax Attacks! Web application security fundamentals
When Ajax Attacks! Web application security fundamentals
When Ajax Attacks! Web application security fundamentals
When Ajax Attacks! Web application security fundamentals
When Ajax Attacks! Web application security fundamentals
When Ajax Attacks! Web application security fundamentals
When Ajax Attacks! Web application security fundamentals
When Ajax Attacks! Web application security fundamentals
When Ajax Attacks! Web application security fundamentals
When Ajax Attacks! Web application security fundamentals
When Ajax Attacks! Web application security fundamentals
When Ajax Attacks! Web application security fundamentals
When Ajax Attacks! Web application security fundamentals
When Ajax Attacks! Web application security fundamentals
When Ajax Attacks! Web application security fundamentals
When Ajax Attacks! Web application security fundamentals
When Ajax Attacks! Web application security fundamentals
When Ajax Attacks! Web application security fundamentals
When Ajax Attacks! Web application security fundamentals
When Ajax Attacks! Web application security fundamentals
When Ajax Attacks! Web application security fundamentals
When Ajax Attacks! Web application security fundamentals
When Ajax Attacks! Web application security fundamentals
When Ajax Attacks! Web application security fundamentals
When Ajax Attacks! Web application security fundamentals
When Ajax Attacks! Web application security fundamentals
When Ajax Attacks! Web application security fundamentals
When Ajax Attacks! Web application security fundamentals
When Ajax Attacks! Web application security fundamentals
When Ajax Attacks! Web application security fundamentals
When Ajax Attacks! Web application security fundamentals
When Ajax Attacks! Web application security fundamentals
When Ajax Attacks! Web application security fundamentals
When Ajax Attacks! Web application security fundamentals
When Ajax Attacks! Web application security fundamentals
When Ajax Attacks! Web application security fundamentals
When Ajax Attacks! Web application security fundamentals
When Ajax Attacks! Web application security fundamentals
When Ajax Attacks! Web application security fundamentals
When Ajax Attacks! Web application security fundamentals
When Ajax Attacks! Web application security fundamentals
When Ajax Attacks! Web application security fundamentals
When Ajax Attacks! Web application security fundamentals
When Ajax Attacks! Web application security fundamentals
Upcoming SlideShare
Loading in …5
×

When Ajax Attacks! Web application security fundamentals

20,006 views

Published on

Web application security is hard, and getting harder. New technologies and techniques mean new vulnerabilities, and keeping on top of them all is a significant challenge. This talk will dive deep in to the underbelly of JavaScript security, exploring topics ranging from basic cross-site scripting to CSRF, social network worms, HTML sanitisation, securing JSON, safe cross-domain JavaScript and more besides.

Presented at @media Ajax 2008 on the 16th of September.

Published in: Technology

When Ajax Attacks! Web application security fundamentals

  1. When Ajax Attacks! Web application security fundamentals Simon Willison, @media Ajax 2008
  2. I’m here to scare you • XSS • PDF • CSRF • XBL • UTF-7 • HTC • crossdomain.xml • JSON and JSONP
  3. A few years ago... • Web application security tutorials tended to boil down to three things: • Don’t trust input from users • Avoid SQL injection attacks • Don’t let people inject JS in to your pages
  4. A few years ago... • Web application security tutorials tended to boil down to three things: • Don’t trust input from users Boring! • Avoid SQL injection attacks • Don’t let people inject JS in to your pages

×