SlideShare a Scribd company logo
1 of 36
Download to read offline
http://nullcon.net




  NEW CONCEPTS
  DEFEATING
  WEB ATTACKS
(secure) SiteHoster
   Family Named:       AbhishekKr
    Friends Call:       ABK
    g33k Handle:        aBionic

   IndependentSecurity Enthusiast/Researcher
   Also a Member of „EvilFingers‟ (other than ‘NULL’)



   Application-Developer in ThoughtWorks Inc.
   OpenSource Lover

    http://null.co.in        http://nullcon.net   aBionic@twitter,linkedin,FB
   Other than expanding to (secure)SiteHoster




                 A Fresh               A Lab            (s)SH
                Approach                RAT




                http://sourceforge.net/projects/sitehoster

    http://null.co.in      http://nullcon.net   aBionic@twitter,linkedin,FB
http://null.co.in




http://nullcon.net




                      It‟s The Same Old Problem



aBionic@
twitter,linkedin,FB
http://null.co.in




http://nullcon.net




                      Same Old Problem

                      With A New Perspective To Solve It
aBionic@
twitter,linkedin,FB
http://null.co.in




http://nullcon.net




                      offensive security to secure



aBionic@
                      ATTACK THE ATTACKER
twitter,linkedin,FB
http://null.co.in




http://nullcon.net




                      Major Threats for Web Applications

                      Stats are not same     (of 2009)   …
aBionic@
twitter,linkedin,FB
                      But t h r e a t s             are
XSS Defeating Concept
    always aim the strongest opponent first,
    makes you win battle easily




http://null.co.in   http://nullcon.net   aBionic@twitter,linkedin,FB
IT IS JUST A PIECE OF CODE




                   aBionic@twitter,linkedin,FB
<TAGS/> R GooD




                 aBionic@twitter,linkedin,FB
And if it’s Code…




                    aBionic@twitter,linkedin,FB
http://null.co.in




http://nullcon.net




                      !dea is to



aBionic@
                      BUG
twitter,linkedin,FB
http://null.co.in




http://nullcon.net




                      3 Major XSS Attack Patterns
                      All Effect From Options of User Input, a Web2.0 Gift


aBionic@
twitter,linkedin,FB
+ Karthik calling Karthik…
http://null.co.in
                      + User (tricked) Input…



http://nullcon.net




                      Included or injected <script/>
                      What You See Is (*NOT*) What You Get


aBionic@
twitter,linkedin,FB
http://null.co.in




http://nullcon.net




                      Who calls, or who injects
                      What finally happens is unwanted <script/>


aBionic@
twitter,linkedin,FB
http://null.co.in




http://nullcon.net




                      Disarm <script/>
                      Take away all its POWER!!!!!


aBionic@
twitter,linkedin,FB
http://null.co.in




http://nullcon.net




                      Dis-Infect Entire Body
                      To kill all unwanted „Creepy-Living‟ Beings


aBionic@
twitter,linkedin,FB
Generated HyperText
                              <html>
  <head><script>function h(){alert(“some dev-script in HEAD
                    Tag”);}</script></head>
                              <body>
           <script DEFER>heavy_stuff=true;</script>
         name: <div id=”fromDB” onMouseOver=”h();”>
<script>alert(„attacker injected it, could do anything‟);</script>
                              </div>
                             </body>
                             </html>
                                             aBionic@twitter,linkedin,FB
Server Patched View
<html>
<head>
<script> function h(){alert(“this is dev-scripts in HEAD Tag”);}</script>
</head>
<BD>
<BODY >
<script DEFER>heavy_stuff=true;</script>
<script type='text/javascript'>
x=document.getElementsByTagName("BODY");
x[0].innerHTML = "name:<div id="fromDB" onclick="h();">
<script>alert('attacker injected it, could do anything');</script></div>“;
</script>
</BODY>
</BD>
</html>



                                                          aBionic@twitter,linkedin,FB
http://null.co.in




http://nullcon.net




                      But… still 
                      …other two monkeys got a chance


aBionic@
twitter,linkedin,FB
http://null.co.in




http://nullcon.net




                      „javascript:‟ may effect as



aBionic@
twitter,linkedin,FB
http://null.co.in




http://nullcon.net




                      So „javascript:<bugMe/>‟



aBionic@
twitter,linkedin,FB
http://null.co.in




http://nullcon.net




                      1 Monkey can wreck havoc
                      2 are pwn3d… but 3rd is powerful enough


aBionic@
twitter,linkedin,FB
http://null.co.in




http://nullcon.net




                      „Be Kind‟ on Entropy
                      -says „JS-Events‟


aBionic@
twitter,linkedin,FB
http://null.co.in   http://nullcon.net   aBionic@twitter,linkedin,FB
Ninja Parse User Input




                         aBionic@twitter,linkedin,FB
Bug-it-su pwn JS-Events




                      aBionic@twitter,linkedin,FB
hardcore ‘js-events’ pwnage




                         aBionic@twitter,linkedin,FB
http://null.co.in




http://nullcon.net




                      XSS Attack gets bugged
                      <TAGS/> go Green


aBionic@
twitter,linkedin,FB
http://null.co.in




http://nullcon.net




                      Innocence Is Saved
                      Normal User Input Matching Attack aint Filtered


aBionic@
twitter,linkedin,FB
http://null.co.in




http://nullcon.net




                      All Monkeys Defeated
                      And so are Script-Junkies


aBionic@
twitter,linkedin,FB
CURRENTLY JUST DEV PERSPECTIVE




                    aBionic@twitter,linkedin,FB
For Un-Privileged AXNs




                         aBionic@twitter,linkedin,FB
Old Wine, Why Not Always Used


           DB

                          all                 boss
                                Read on                Read,write.*
                                Table T1


                                Read,Write
                                on Table t2

   User-        Web-App
  Mapper



                                 aBionic@twitter,linkedin,FB
http://null.co.in




http://nullcon.net




                      & For Condition Match
                      An A Apple Hash A An Day Input
                      Keeps The Doctor Attacker Away
aBionic@
twitter,linkedin,FB
   I Tweet Tech:       http://www.twitter.com/aBionic
   I Blog Tech:        http://abhishekkr.wordpress.com/

   I OpenSource
       GitHub:         https://github.com/abhishekkr
       SourceForge:    http://sourceforge.net/users/abhishekkr

   I Socialize:        http://www.facebook.com/aBionic
   I Techalize:        http://in.linkedin.com/in/abionic
   I Deviantize:       http://abhishekkr.deviantart.com/


    http://null.co.in   http://nullcon.net   aBionic@twitter,linkedin,FB

More Related Content

What's hot

Workshop : Facebook JavaScript SDK
Workshop : Facebook JavaScript SDKWorkshop : Facebook JavaScript SDK
Workshop : Facebook JavaScript SDKDimitar Danailov
 
#Smx London SEO & Social Power tools
#Smx  London SEO & Social Power tools#Smx  London SEO & Social Power tools
#Smx London SEO & Social Power toolsNeil Walker
 
Introduction to Facebook Javascript SDK (NEW)
Introduction to Facebook Javascript SDK (NEW)Introduction to Facebook Javascript SDK (NEW)
Introduction to Facebook Javascript SDK (NEW)Colin Su
 
Facebook Connect Integration
Facebook Connect IntegrationFacebook Connect Integration
Facebook Connect Integrationmujahidslideshare
 
Использование социальных сетей и микроблогов для бизнеса
Использование социальных сетей и микроблогов для бизнесаИспользование социальных сетей и микроблогов для бизнеса
Использование социальных сетей и микроблогов для бизнесаAleksandr Shchedrin
 
How to use blogging for an allergist's practice
How to use blogging for an allergist's practiceHow to use blogging for an allergist's practice
How to use blogging for an allergist's practiceNathaniel Hare
 
Who Wants to Use QR Codes
Who Wants to Use QR CodesWho Wants to Use QR Codes
Who Wants to Use QR CodesJudy Horn
 
Pragmatic RESTful API Design: Apigee Webinar
Pragmatic RESTful API Design: Apigee WebinarPragmatic RESTful API Design: Apigee Webinar
Pragmatic RESTful API Design: Apigee WebinarApigee | Google Cloud
 
The duck soup link building guide
The duck soup link building guideThe duck soup link building guide
The duck soup link building guideTabish Javed
 
Online Reputation Management presentation
Online Reputation Management presentationOnline Reputation Management presentation
Online Reputation Management presentationTabish Javed
 
CITEC #CON2-Dirty Attack with Google Hacking
CITEC #CON2-Dirty Attack with Google HackingCITEC #CON2-Dirty Attack with Google Hacking
CITEC #CON2-Dirty Attack with Google HackingPrathan Phongthiproek
 
Free highpr backlinks
Free highpr backlinksFree highpr backlinks
Free highpr backlinkseridesktop
 
Everything you wanted to know about crawling, but didn't know where to ask
Everything you wanted to know about crawling, but didn't know where to askEverything you wanted to know about crawling, but didn't know where to ask
Everything you wanted to know about crawling, but didn't know where to askBill Slawski
 
Happy facebook developer
Happy facebook developerHappy facebook developer
Happy facebook developerYu-Wei Chuang
 

What's hot (20)

Pr7 8 clubwear-and-party-wear
Pr7 8 clubwear-and-party-wearPr7 8 clubwear-and-party-wear
Pr7 8 clubwear-and-party-wear
 
Workshop : Facebook JavaScript SDK
Workshop : Facebook JavaScript SDKWorkshop : Facebook JavaScript SDK
Workshop : Facebook JavaScript SDK
 
Facebook Coin
Facebook CoinFacebook Coin
Facebook Coin
 
#Smx London SEO & Social Power tools
#Smx  London SEO & Social Power tools#Smx  London SEO & Social Power tools
#Smx London SEO & Social Power tools
 
Prashant Sridharan
Prashant SridharanPrashant Sridharan
Prashant Sridharan
 
Introduction to Facebook Javascript SDK (NEW)
Introduction to Facebook Javascript SDK (NEW)Introduction to Facebook Javascript SDK (NEW)
Introduction to Facebook Javascript SDK (NEW)
 
Facebook Connect Integration
Facebook Connect IntegrationFacebook Connect Integration
Facebook Connect Integration
 
Использование социальных сетей и микроблогов для бизнеса
Использование социальных сетей и микроблогов для бизнесаИспользование социальных сетей и микроблогов для бизнеса
Использование социальных сетей и микроблогов для бизнеса
 
API Design - 3rd Edition
API Design - 3rd EditionAPI Design - 3rd Edition
API Design - 3rd Edition
 
How to use blogging for an allergist's practice
How to use blogging for an allergist's practiceHow to use blogging for an allergist's practice
How to use blogging for an allergist's practice
 
Who Wants to Use QR Codes
Who Wants to Use QR CodesWho Wants to Use QR Codes
Who Wants to Use QR Codes
 
Pragmatic RESTful API Design: Apigee Webinar
Pragmatic RESTful API Design: Apigee WebinarPragmatic RESTful API Design: Apigee Webinar
Pragmatic RESTful API Design: Apigee Webinar
 
The duck soup link building guide
The duck soup link building guideThe duck soup link building guide
The duck soup link building guide
 
Online Reputation Management presentation
Online Reputation Management presentationOnline Reputation Management presentation
Online Reputation Management presentation
 
CITEC #CON2-Dirty Attack with Google Hacking
CITEC #CON2-Dirty Attack with Google HackingCITEC #CON2-Dirty Attack with Google Hacking
CITEC #CON2-Dirty Attack with Google Hacking
 
I phone by tanbircox
I phone by tanbircoxI phone by tanbircox
I phone by tanbircox
 
Free highpr backlinks
Free highpr backlinksFree highpr backlinks
Free highpr backlinks
 
Google Hacking 101
Google Hacking 101Google Hacking 101
Google Hacking 101
 
Everything you wanted to know about crawling, but didn't know where to ask
Everything you wanted to know about crawling, but didn't know where to askEverything you wanted to know about crawling, but didn't know where to ask
Everything you wanted to know about crawling, but didn't know where to ask
 
Happy facebook developer
Happy facebook developerHappy facebook developer
Happy facebook developer
 

Viewers also liked

BackBox Linux e Metasploit: Una dimostrazione pratica del shellshock
BackBox Linux e Metasploit: Una dimostrazione pratica del shellshockBackBox Linux e Metasploit: Una dimostrazione pratica del shellshock
BackBox Linux e Metasploit: Una dimostrazione pratica del shellshockAndrea Draghetti
 
125524234-bugcon1-pdf
 125524234-bugcon1-pdf 125524234-bugcon1-pdf
125524234-bugcon1-pdfxavazquez
 
Exploiting and analyzing Microsoft Surface Applications
Exploiting and analyzing Microsoft Surface ApplicationsExploiting and analyzing Microsoft Surface Applications
Exploiting and analyzing Microsoft Surface ApplicationsWardell Motley, NSA IAM\IEM
 
BackBox Linux: Simulazione di un Penetration Test
BackBox Linux: Simulazione di un Penetration TestBackBox Linux: Simulazione di un Penetration Test
BackBox Linux: Simulazione di un Penetration TestAndrea Draghetti
 
Extending burp with python
Extending burp with pythonExtending burp with python
Extending burp with pythonHoang Nguyen
 
Burp Suite - JOpenspace 2016
Burp Suite - JOpenspace 2016Burp Suite - JOpenspace 2016
Burp Suite - JOpenspace 2016Jan Horalík
 
Elementary-Information-Security-Practices
Elementary-Information-Security-PracticesElementary-Information-Security-Practices
Elementary-Information-Security-PracticesOctogence
 
Learn Burp Suite, the Nr. 1 Web Hacking Tool
Learn Burp Suite, the Nr. 1 Web Hacking ToolLearn Burp Suite, the Nr. 1 Web Hacking Tool
Learn Burp Suite, the Nr. 1 Web Hacking Toolayman diab
 
Cusomizing Burp Suite - Getting the Most out of Burp Extensions
Cusomizing Burp Suite - Getting the Most out of Burp ExtensionsCusomizing Burp Suite - Getting the Most out of Burp Extensions
Cusomizing Burp Suite - Getting the Most out of Burp ExtensionsAugust Detlefsen
 
AppSec USA 2015: Customizing Burp Suite
AppSec USA 2015: Customizing Burp SuiteAppSec USA 2015: Customizing Burp Suite
AppSec USA 2015: Customizing Burp SuiteAugust Detlefsen
 
VincentChan2016Apr11
VincentChan2016Apr11VincentChan2016Apr11
VincentChan2016Apr11Vincent Chan
 
Coding for Hackers - Linux Day 2016
Coding for Hackers - Linux Day 2016Coding for Hackers - Linux Day 2016
Coding for Hackers - Linux Day 2016Andrea Draghetti
 
DEF CON 23 - Hacking Web Apps @brentwdesign
DEF CON 23 - Hacking Web Apps @brentwdesignDEF CON 23 - Hacking Web Apps @brentwdesign
DEF CON 23 - Hacking Web Apps @brentwdesignbrentwdesign
 
Hacking android apps by srini0x00
Hacking android apps by srini0x00Hacking android apps by srini0x00
Hacking android apps by srini0x00srini0x00
 
Web application penetration testing lab setup guide
Web application penetration testing lab setup guideWeb application penetration testing lab setup guide
Web application penetration testing lab setup guideSudhanshu Chauhan
 
Your Web Application Is Most Likely Insecure
Your Web Application Is Most Likely InsecureYour Web Application Is Most Likely Insecure
Your Web Application Is Most Likely InsecureAchievers Tech
 
Polyglot payloads in practice by avlidienbrunn at HackPra
Polyglot payloads in practice by avlidienbrunn at HackPraPolyglot payloads in practice by avlidienbrunn at HackPra
Polyglot payloads in practice by avlidienbrunn at HackPraMathias Karlsson
 
Burp plugin development for java n00bs (44 con)
Burp plugin development for java n00bs (44 con)Burp plugin development for java n00bs (44 con)
Burp plugin development for java n00bs (44 con)Marc Wickenden
 

Viewers also liked (20)

BackBox Linux e Metasploit: Una dimostrazione pratica del shellshock
BackBox Linux e Metasploit: Una dimostrazione pratica del shellshockBackBox Linux e Metasploit: Una dimostrazione pratica del shellshock
BackBox Linux e Metasploit: Una dimostrazione pratica del shellshock
 
125524234-bugcon1-pdf
 125524234-bugcon1-pdf 125524234-bugcon1-pdf
125524234-bugcon1-pdf
 
Exploiting and analyzing Microsoft Surface Applications
Exploiting and analyzing Microsoft Surface ApplicationsExploiting and analyzing Microsoft Surface Applications
Exploiting and analyzing Microsoft Surface Applications
 
BackBox Linux: Simulazione di un Penetration Test
BackBox Linux: Simulazione di un Penetration TestBackBox Linux: Simulazione di un Penetration Test
BackBox Linux: Simulazione di un Penetration Test
 
Extending burp with python
Extending burp with pythonExtending burp with python
Extending burp with python
 
Burp Suite - JOpenspace 2016
Burp Suite - JOpenspace 2016Burp Suite - JOpenspace 2016
Burp Suite - JOpenspace 2016
 
Elementary-Information-Security-Practices
Elementary-Information-Security-PracticesElementary-Information-Security-Practices
Elementary-Information-Security-Practices
 
Ch02
Ch02Ch02
Ch02
 
Learn Burp Suite, the Nr. 1 Web Hacking Tool
Learn Burp Suite, the Nr. 1 Web Hacking ToolLearn Burp Suite, the Nr. 1 Web Hacking Tool
Learn Burp Suite, the Nr. 1 Web Hacking Tool
 
Cusomizing Burp Suite - Getting the Most out of Burp Extensions
Cusomizing Burp Suite - Getting the Most out of Burp ExtensionsCusomizing Burp Suite - Getting the Most out of Burp Extensions
Cusomizing Burp Suite - Getting the Most out of Burp Extensions
 
AppSec USA 2015: Customizing Burp Suite
AppSec USA 2015: Customizing Burp SuiteAppSec USA 2015: Customizing Burp Suite
AppSec USA 2015: Customizing Burp Suite
 
VincentChan2016Apr11
VincentChan2016Apr11VincentChan2016Apr11
VincentChan2016Apr11
 
Coding for Hackers - Linux Day 2016
Coding for Hackers - Linux Day 2016Coding for Hackers - Linux Day 2016
Coding for Hackers - Linux Day 2016
 
DEF CON 23 - Hacking Web Apps @brentwdesign
DEF CON 23 - Hacking Web Apps @brentwdesignDEF CON 23 - Hacking Web Apps @brentwdesign
DEF CON 23 - Hacking Web Apps @brentwdesign
 
Hacking android apps by srini0x00
Hacking android apps by srini0x00Hacking android apps by srini0x00
Hacking android apps by srini0x00
 
Web application penetration testing lab setup guide
Web application penetration testing lab setup guideWeb application penetration testing lab setup guide
Web application penetration testing lab setup guide
 
Your Web Application Is Most Likely Insecure
Your Web Application Is Most Likely InsecureYour Web Application Is Most Likely Insecure
Your Web Application Is Most Likely Insecure
 
Polyglot payloads in practice by avlidienbrunn at HackPra
Polyglot payloads in practice by avlidienbrunn at HackPraPolyglot payloads in practice by avlidienbrunn at HackPra
Polyglot payloads in practice by avlidienbrunn at HackPra
 
Burp plugin development for java n00bs (44 con)
Burp plugin development for java n00bs (44 con)Burp plugin development for java n00bs (44 con)
Burp plugin development for java n00bs (44 con)
 
Ruxmon.2015-08.-.proxenet
Ruxmon.2015-08.-.proxenetRuxmon.2015-08.-.proxenet
Ruxmon.2015-08.-.proxenet
 

Similar to nullcon 2011 - (secure) SiteHoster – Disable XSS & SQL Injection

Fabian Williams SharePoint Saturday New York BCS Deck
Fabian Williams SharePoint Saturday New York BCS DeckFabian Williams SharePoint Saturday New York BCS Deck
Fabian Williams SharePoint Saturday New York BCS DeckFabian Williams
 
Getting Stuff In And Out Of Buzz (1)
Getting  Stuff In And Out Of  Buzz (1)Getting  Stuff In And Out Of  Buzz (1)
Getting Stuff In And Out Of Buzz (1)Paul Kinlan
 
Introduction to Facebook JavaScript & Python SDK
Introduction to Facebook JavaScript & Python SDKIntroduction to Facebook JavaScript & Python SDK
Introduction to Facebook JavaScript & Python SDKColin Su
 
Curiosity Bits Python Tutorial: Mining Facebook Fan Page - getting posts and ...
Curiosity Bits Python Tutorial: Mining Facebook Fan Page - getting posts and ...Curiosity Bits Python Tutorial: Mining Facebook Fan Page - getting posts and ...
Curiosity Bits Python Tutorial: Mining Facebook Fan Page - getting posts and ...Weiai Wayne Xu
 
Экспресс-анализ вредоносов / Crowdsourced Malware Triage
Экспресс-анализ вредоносов / Crowdsourced Malware TriageЭкспресс-анализ вредоносов / Crowdsourced Malware Triage
Экспресс-анализ вредоносов / Crowdsourced Malware TriagePositive Hack Days
 
Let's Build a Chatbot
Let's Build a ChatbotLet's Build a Chatbot
Let's Build a ChatbotTessa Mero
 
Grand Rapids PHP Meetup: Behavioral Driven Development with Behat
Grand Rapids PHP Meetup: Behavioral Driven Development with BehatGrand Rapids PHP Meetup: Behavioral Driven Development with Behat
Grand Rapids PHP Meetup: Behavioral Driven Development with BehatRyan Weaver
 
How to Build Innovative Technologies
How to Build Innovative TechnologiesHow to Build Innovative Technologies
How to Build Innovative TechnologiesAbby Fichtner
 
How i hacked programer computer
How i hacked programer computerHow i hacked programer computer
How i hacked programer computerBudi Khoirudin
 
REST API Pentester's perspective
REST API Pentester's perspectiveREST API Pentester's perspective
REST API Pentester's perspectiveSecuRing
 
Building Facebook Apps
Building Facebook AppsBuilding Facebook Apps
Building Facebook AppsDavid Keener
 
Introduction to Social Networking Sites and websites
Introduction to Social Networking Sites and websitesIntroduction to Social Networking Sites and websites
Introduction to Social Networking Sites and websitesShruti Arya
 
Idea2app
Idea2appIdea2app
Idea2appFlumes
 
Android.AntiSpam Lab
Android.AntiSpam LabAndroid.AntiSpam Lab
Android.AntiSpam LabLeo Nguyen
 
10 Evil(ish) Things and how they relate to Features Engineering at the WMF
10 Evil(ish) Things and how they relate to Features Engineering at the WMF10 Evil(ish) Things and how they relate to Features Engineering at the WMF
10 Evil(ish) Things and how they relate to Features Engineering at the WMFterry chay
 
Blogosphere
BlogosphereBlogosphere
Blogospheretpitre
 
MozCon Seattle 2011 - Social Design
MozCon Seattle 2011 - Social DesignMozCon Seattle 2011 - Social Design
MozCon Seattle 2011 - Social DesignMat Clayton
 
twitter ppt .pptx
twitter ppt                                  .pptxtwitter ppt                                  .pptx
twitter ppt .pptxKAnurag2
 
AtlasCamp 2011 - Five Strategies to Accelerate Plugin Development
AtlasCamp 2011 - Five Strategies to Accelerate Plugin DevelopmentAtlasCamp 2011 - Five Strategies to Accelerate Plugin Development
AtlasCamp 2011 - Five Strategies to Accelerate Plugin Developmentmrdon
 

Similar to nullcon 2011 - (secure) SiteHoster – Disable XSS & SQL Injection (20)

Fabian Williams SharePoint Saturday New York BCS Deck
Fabian Williams SharePoint Saturday New York BCS DeckFabian Williams SharePoint Saturday New York BCS Deck
Fabian Williams SharePoint Saturday New York BCS Deck
 
Getting Stuff In And Out Of Buzz (1)
Getting  Stuff In And Out Of  Buzz (1)Getting  Stuff In And Out Of  Buzz (1)
Getting Stuff In And Out Of Buzz (1)
 
Introduction to Facebook JavaScript & Python SDK
Introduction to Facebook JavaScript & Python SDKIntroduction to Facebook JavaScript & Python SDK
Introduction to Facebook JavaScript & Python SDK
 
Curiosity Bits Python Tutorial: Mining Facebook Fan Page - getting posts and ...
Curiosity Bits Python Tutorial: Mining Facebook Fan Page - getting posts and ...Curiosity Bits Python Tutorial: Mining Facebook Fan Page - getting posts and ...
Curiosity Bits Python Tutorial: Mining Facebook Fan Page - getting posts and ...
 
Экспресс-анализ вредоносов / Crowdsourced Malware Triage
Экспресс-анализ вредоносов / Crowdsourced Malware TriageЭкспресс-анализ вредоносов / Crowdsourced Malware Triage
Экспресс-анализ вредоносов / Crowdsourced Malware Triage
 
Let's Build a Chatbot
Let's Build a ChatbotLet's Build a Chatbot
Let's Build a Chatbot
 
Grand Rapids PHP Meetup: Behavioral Driven Development with Behat
Grand Rapids PHP Meetup: Behavioral Driven Development with BehatGrand Rapids PHP Meetup: Behavioral Driven Development with Behat
Grand Rapids PHP Meetup: Behavioral Driven Development with Behat
 
How to Build Innovative Technologies
How to Build Innovative TechnologiesHow to Build Innovative Technologies
How to Build Innovative Technologies
 
How i hacked programer computer
How i hacked programer computerHow i hacked programer computer
How i hacked programer computer
 
Introduction to python scrapping
Introduction to python scrappingIntroduction to python scrapping
Introduction to python scrapping
 
REST API Pentester's perspective
REST API Pentester's perspectiveREST API Pentester's perspective
REST API Pentester's perspective
 
Building Facebook Apps
Building Facebook AppsBuilding Facebook Apps
Building Facebook Apps
 
Introduction to Social Networking Sites and websites
Introduction to Social Networking Sites and websitesIntroduction to Social Networking Sites and websites
Introduction to Social Networking Sites and websites
 
Idea2app
Idea2appIdea2app
Idea2app
 
Android.AntiSpam Lab
Android.AntiSpam LabAndroid.AntiSpam Lab
Android.AntiSpam Lab
 
10 Evil(ish) Things and how they relate to Features Engineering at the WMF
10 Evil(ish) Things and how they relate to Features Engineering at the WMF10 Evil(ish) Things and how they relate to Features Engineering at the WMF
10 Evil(ish) Things and how they relate to Features Engineering at the WMF
 
Blogosphere
BlogosphereBlogosphere
Blogosphere
 
MozCon Seattle 2011 - Social Design
MozCon Seattle 2011 - Social DesignMozCon Seattle 2011 - Social Design
MozCon Seattle 2011 - Social Design
 
twitter ppt .pptx
twitter ppt                                  .pptxtwitter ppt                                  .pptx
twitter ppt .pptx
 
AtlasCamp 2011 - Five Strategies to Accelerate Plugin Development
AtlasCamp 2011 - Five Strategies to Accelerate Plugin DevelopmentAtlasCamp 2011 - Five Strategies to Accelerate Plugin Development
AtlasCamp 2011 - Five Strategies to Accelerate Plugin Development
 

More from n|u - The Open Security Community

Gibson 101 -quick_introduction_to_hacking_mainframes_in_2020_null_infosec_gir...
Gibson 101 -quick_introduction_to_hacking_mainframes_in_2020_null_infosec_gir...Gibson 101 -quick_introduction_to_hacking_mainframes_in_2020_null_infosec_gir...
Gibson 101 -quick_introduction_to_hacking_mainframes_in_2020_null_infosec_gir...n|u - The Open Security Community
 

More from n|u - The Open Security Community (20)

Hardware security testing 101 (Null - Delhi Chapter)
Hardware security testing 101 (Null - Delhi Chapter)Hardware security testing 101 (Null - Delhi Chapter)
Hardware security testing 101 (Null - Delhi Chapter)
 
Osint primer
Osint primerOsint primer
Osint primer
 
SSRF exploit the trust relationship
SSRF exploit the trust relationshipSSRF exploit the trust relationship
SSRF exploit the trust relationship
 
Nmap basics
Nmap basicsNmap basics
Nmap basics
 
Metasploit primary
Metasploit primaryMetasploit primary
Metasploit primary
 
Api security-testing
Api security-testingApi security-testing
Api security-testing
 
Introduction to TLS 1.3
Introduction to TLS 1.3Introduction to TLS 1.3
Introduction to TLS 1.3
 
Gibson 101 -quick_introduction_to_hacking_mainframes_in_2020_null_infosec_gir...
Gibson 101 -quick_introduction_to_hacking_mainframes_in_2020_null_infosec_gir...Gibson 101 -quick_introduction_to_hacking_mainframes_in_2020_null_infosec_gir...
Gibson 101 -quick_introduction_to_hacking_mainframes_in_2020_null_infosec_gir...
 
Talking About SSRF,CRLF
Talking About SSRF,CRLFTalking About SSRF,CRLF
Talking About SSRF,CRLF
 
Building active directory lab for red teaming
Building active directory lab for red teamingBuilding active directory lab for red teaming
Building active directory lab for red teaming
 
Owning a company through their logs
Owning a company through their logsOwning a company through their logs
Owning a company through their logs
 
Introduction to shodan
Introduction to shodanIntroduction to shodan
Introduction to shodan
 
Cloud security
Cloud security Cloud security
Cloud security
 
Detecting persistence in windows
Detecting persistence in windowsDetecting persistence in windows
Detecting persistence in windows
 
Frida - Objection Tool Usage
Frida - Objection Tool UsageFrida - Objection Tool Usage
Frida - Objection Tool Usage
 
OSQuery - Monitoring System Process
OSQuery - Monitoring System ProcessOSQuery - Monitoring System Process
OSQuery - Monitoring System Process
 
DevSecOps Jenkins Pipeline -Security
DevSecOps Jenkins Pipeline -SecurityDevSecOps Jenkins Pipeline -Security
DevSecOps Jenkins Pipeline -Security
 
Extensible markup language attacks
Extensible markup language attacksExtensible markup language attacks
Extensible markup language attacks
 
Linux for hackers
Linux for hackersLinux for hackers
Linux for hackers
 
Android Pentesting
Android PentestingAndroid Pentesting
Android Pentesting
 

Recently uploaded

Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...Miguel Araújo
 
Finology Group – Insurtech Innovation Award 2024
Finology Group – Insurtech Innovation Award 2024Finology Group – Insurtech Innovation Award 2024
Finology Group – Insurtech Innovation Award 2024The Digital Insurer
 
08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking Men08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking MenDelhi Call girls
 
How to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerHow to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerThousandEyes
 
Top 5 Benefits OF Using Muvi Live Paywall For Live Streams
Top 5 Benefits OF Using Muvi Live Paywall For Live StreamsTop 5 Benefits OF Using Muvi Live Paywall For Live Streams
Top 5 Benefits OF Using Muvi Live Paywall For Live StreamsRoshan Dwivedi
 
Scaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organizationScaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organizationRadu Cotescu
 
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdfThe Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdfEnterprise Knowledge
 
CNv6 Instructor Chapter 6 Quality of Service
CNv6 Instructor Chapter 6 Quality of ServiceCNv6 Instructor Chapter 6 Quality of Service
CNv6 Instructor Chapter 6 Quality of Servicegiselly40
 
[2024]Digital Global Overview Report 2024 Meltwater.pdf
[2024]Digital Global Overview Report 2024 Meltwater.pdf[2024]Digital Global Overview Report 2024 Meltwater.pdf
[2024]Digital Global Overview Report 2024 Meltwater.pdfhans926745
 
🐬 The future of MySQL is Postgres 🐘
🐬  The future of MySQL is Postgres   🐘🐬  The future of MySQL is Postgres   🐘
🐬 The future of MySQL is Postgres 🐘RTylerCroy
 
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...Igalia
 
Data Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt RobisonData Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt RobisonAnna Loughnan Colquhoun
 
A Call to Action for Generative AI in 2024
A Call to Action for Generative AI in 2024A Call to Action for Generative AI in 2024
A Call to Action for Generative AI in 2024Results
 
Presentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreterPresentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreternaman860154
 
Handwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed textsHandwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed textsMaria Levchenko
 
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptx
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptxEIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptx
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptxEarley Information Science
 
Automating Google Workspace (GWS) & more with Apps Script
Automating Google Workspace (GWS) & more with Apps ScriptAutomating Google Workspace (GWS) & more with Apps Script
Automating Google Workspace (GWS) & more with Apps Scriptwesley chun
 
Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...
Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...
Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...Neo4j
 
TrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
TrustArc Webinar - Stay Ahead of US State Data Privacy Law DevelopmentsTrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
TrustArc Webinar - Stay Ahead of US State Data Privacy Law DevelopmentsTrustArc
 
Driving Behavioral Change for Information Management through Data-Driven Gree...
Driving Behavioral Change for Information Management through Data-Driven Gree...Driving Behavioral Change for Information Management through Data-Driven Gree...
Driving Behavioral Change for Information Management through Data-Driven Gree...Enterprise Knowledge
 

Recently uploaded (20)

Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
 
Finology Group – Insurtech Innovation Award 2024
Finology Group – Insurtech Innovation Award 2024Finology Group – Insurtech Innovation Award 2024
Finology Group – Insurtech Innovation Award 2024
 
08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking Men08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking Men
 
How to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerHow to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected Worker
 
Top 5 Benefits OF Using Muvi Live Paywall For Live Streams
Top 5 Benefits OF Using Muvi Live Paywall For Live StreamsTop 5 Benefits OF Using Muvi Live Paywall For Live Streams
Top 5 Benefits OF Using Muvi Live Paywall For Live Streams
 
Scaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organizationScaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organization
 
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdfThe Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
 
CNv6 Instructor Chapter 6 Quality of Service
CNv6 Instructor Chapter 6 Quality of ServiceCNv6 Instructor Chapter 6 Quality of Service
CNv6 Instructor Chapter 6 Quality of Service
 
[2024]Digital Global Overview Report 2024 Meltwater.pdf
[2024]Digital Global Overview Report 2024 Meltwater.pdf[2024]Digital Global Overview Report 2024 Meltwater.pdf
[2024]Digital Global Overview Report 2024 Meltwater.pdf
 
🐬 The future of MySQL is Postgres 🐘
🐬  The future of MySQL is Postgres   🐘🐬  The future of MySQL is Postgres   🐘
🐬 The future of MySQL is Postgres 🐘
 
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...
 
Data Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt RobisonData Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt Robison
 
A Call to Action for Generative AI in 2024
A Call to Action for Generative AI in 2024A Call to Action for Generative AI in 2024
A Call to Action for Generative AI in 2024
 
Presentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreterPresentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreter
 
Handwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed textsHandwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed texts
 
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptx
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptxEIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptx
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptx
 
Automating Google Workspace (GWS) & more with Apps Script
Automating Google Workspace (GWS) & more with Apps ScriptAutomating Google Workspace (GWS) & more with Apps Script
Automating Google Workspace (GWS) & more with Apps Script
 
Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...
Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...
Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...
 
TrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
TrustArc Webinar - Stay Ahead of US State Data Privacy Law DevelopmentsTrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
TrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
 
Driving Behavioral Change for Information Management through Data-Driven Gree...
Driving Behavioral Change for Information Management through Data-Driven Gree...Driving Behavioral Change for Information Management through Data-Driven Gree...
Driving Behavioral Change for Information Management through Data-Driven Gree...
 

nullcon 2011 - (secure) SiteHoster – Disable XSS & SQL Injection

  • 1. http://nullcon.net NEW CONCEPTS DEFEATING WEB ATTACKS (secure) SiteHoster
  • 2. Family Named: AbhishekKr Friends Call: ABK g33k Handle: aBionic  IndependentSecurity Enthusiast/Researcher  Also a Member of „EvilFingers‟ (other than ‘NULL’)  Application-Developer in ThoughtWorks Inc.  OpenSource Lover http://null.co.in http://nullcon.net aBionic@twitter,linkedin,FB
  • 3. Other than expanding to (secure)SiteHoster A Fresh A Lab (s)SH Approach RAT http://sourceforge.net/projects/sitehoster http://null.co.in http://nullcon.net aBionic@twitter,linkedin,FB
  • 4. http://null.co.in http://nullcon.net It‟s The Same Old Problem aBionic@ twitter,linkedin,FB
  • 5. http://null.co.in http://nullcon.net Same Old Problem With A New Perspective To Solve It aBionic@ twitter,linkedin,FB
  • 6. http://null.co.in http://nullcon.net offensive security to secure aBionic@ ATTACK THE ATTACKER twitter,linkedin,FB
  • 7. http://null.co.in http://nullcon.net Major Threats for Web Applications Stats are not same (of 2009) … aBionic@ twitter,linkedin,FB But t h r e a t s are
  • 8. XSS Defeating Concept always aim the strongest opponent first, makes you win battle easily http://null.co.in http://nullcon.net aBionic@twitter,linkedin,FB
  • 9. IT IS JUST A PIECE OF CODE aBionic@twitter,linkedin,FB
  • 10. <TAGS/> R GooD aBionic@twitter,linkedin,FB
  • 11. And if it’s Code… aBionic@twitter,linkedin,FB
  • 12. http://null.co.in http://nullcon.net !dea is to aBionic@ BUG twitter,linkedin,FB
  • 13. http://null.co.in http://nullcon.net 3 Major XSS Attack Patterns All Effect From Options of User Input, a Web2.0 Gift aBionic@ twitter,linkedin,FB
  • 14. + Karthik calling Karthik… http://null.co.in + User (tricked) Input… http://nullcon.net Included or injected <script/> What You See Is (*NOT*) What You Get aBionic@ twitter,linkedin,FB
  • 15. http://null.co.in http://nullcon.net Who calls, or who injects What finally happens is unwanted <script/> aBionic@ twitter,linkedin,FB
  • 16. http://null.co.in http://nullcon.net Disarm <script/> Take away all its POWER!!!!! aBionic@ twitter,linkedin,FB
  • 17. http://null.co.in http://nullcon.net Dis-Infect Entire Body To kill all unwanted „Creepy-Living‟ Beings aBionic@ twitter,linkedin,FB
  • 18. Generated HyperText <html> <head><script>function h(){alert(“some dev-script in HEAD Tag”);}</script></head> <body> <script DEFER>heavy_stuff=true;</script> name: <div id=”fromDB” onMouseOver=”h();”> <script>alert(„attacker injected it, could do anything‟);</script> </div> </body> </html> aBionic@twitter,linkedin,FB
  • 19. Server Patched View <html> <head> <script> function h(){alert(“this is dev-scripts in HEAD Tag”);}</script> </head> <BD> <BODY > <script DEFER>heavy_stuff=true;</script> <script type='text/javascript'> x=document.getElementsByTagName("BODY"); x[0].innerHTML = "name:<div id="fromDB" onclick="h();"> <script>alert('attacker injected it, could do anything');</script></div>“; </script> </BODY> </BD> </html> aBionic@twitter,linkedin,FB
  • 20. http://null.co.in http://nullcon.net But… still  …other two monkeys got a chance aBionic@ twitter,linkedin,FB
  • 21. http://null.co.in http://nullcon.net „javascript:‟ may effect as aBionic@ twitter,linkedin,FB
  • 22. http://null.co.in http://nullcon.net So „javascript:<bugMe/>‟ aBionic@ twitter,linkedin,FB
  • 23. http://null.co.in http://nullcon.net 1 Monkey can wreck havoc 2 are pwn3d… but 3rd is powerful enough aBionic@ twitter,linkedin,FB
  • 24. http://null.co.in http://nullcon.net „Be Kind‟ on Entropy -says „JS-Events‟ aBionic@ twitter,linkedin,FB
  • 25. http://null.co.in http://nullcon.net aBionic@twitter,linkedin,FB
  • 26. Ninja Parse User Input aBionic@twitter,linkedin,FB
  • 27. Bug-it-su pwn JS-Events aBionic@twitter,linkedin,FB
  • 28. hardcore ‘js-events’ pwnage aBionic@twitter,linkedin,FB
  • 29. http://null.co.in http://nullcon.net XSS Attack gets bugged <TAGS/> go Green aBionic@ twitter,linkedin,FB
  • 30. http://null.co.in http://nullcon.net Innocence Is Saved Normal User Input Matching Attack aint Filtered aBionic@ twitter,linkedin,FB
  • 31. http://null.co.in http://nullcon.net All Monkeys Defeated And so are Script-Junkies aBionic@ twitter,linkedin,FB
  • 32. CURRENTLY JUST DEV PERSPECTIVE aBionic@twitter,linkedin,FB
  • 33. For Un-Privileged AXNs aBionic@twitter,linkedin,FB
  • 34. Old Wine, Why Not Always Used DB all boss Read on Read,write.* Table T1 Read,Write on Table t2 User- Web-App Mapper aBionic@twitter,linkedin,FB
  • 35. http://null.co.in http://nullcon.net & For Condition Match An A Apple Hash A An Day Input Keeps The Doctor Attacker Away aBionic@ twitter,linkedin,FB
  • 36. I Tweet Tech: http://www.twitter.com/aBionic  I Blog Tech: http://abhishekkr.wordpress.com/  I OpenSource  GitHub: https://github.com/abhishekkr  SourceForge: http://sourceforge.net/users/abhishekkr  I Socialize: http://www.facebook.com/aBionic  I Techalize: http://in.linkedin.com/in/abionic  I Deviantize: http://abhishekkr.deviantart.com/ http://null.co.in http://nullcon.net aBionic@twitter,linkedin,FB