Presentation is loading. Please wait.

Presentation is loading. Please wait.

Host and Application Security Lesson 20: How the Web Does not Work.

Similar presentations


Presentation on theme: "Host and Application Security Lesson 20: How the Web Does not Work."— Presentation transcript:

1 Host and Application Security Lesson 20: How the Web Does not Work

2 Remind me…  Precisely how does the web work?

3 Web Vulns  This is host and application security, so we’re focusing on the host issues

4 Simple  Simple buffer overruns/security vulns in the browser or in its plugins  Determining the list of plugins is harder than it probably needs to be

5 Javascript  Pretty powerful language  History of different classes of vulnerabilites… perhaps most famous is cross site scripting

6 Java Applets  Tell me about Java Applets and their security model  Isn’t that good enough? Why? Why not?

7 ActiveX  “Safe for scripting”?  ActiveX: Pros and Cons?

8 Clickjacking  A really neat exploit – get the user to click on one thing when they think they are clicking on another  Example: a one click bank transfer  Cross-frame issues make life very interesting

9 To Do  Find and read the ACM Queue paper “Browser Security: Lessons from Google Chrome”  Write a demonstration of a cross site scripting attack. Do this in essay form, showing the code you would have on both ends and how it would work. What is the future for XSS attacks?


Download ppt "Host and Application Security Lesson 20: How the Web Does not Work."

Similar presentations


Ads by Google