Copyright © 2007 - The OWASP Foundation Permission is granted to copy, distribute and/or modify this document under the terms of the Creative Commons Attribution-ShareAlike.

Slides:



Advertisements
Similar presentations
The OWASP Foundation Copyright © The OWASP Foundation Permission is granted to copy, distribute and/or modify this document under.
Advertisements

Copyright © The OWASP Foundation Permission is granted to copy, distribute and/or modify this document under the terms of the Creative Commons Attribution-ShareAlike.
The OWASP Foundation Copyright © The OWASP Foundation Permission is granted to copy, distribute and/or modify this document under.
Copyright © The OWASP Foundation Permission is granted to copy, distribute and/or modify this document under the terms of the Creative Commons Attribution-ShareAlike.
Copyright © The OWASP Foundation Permission is granted to copy, distribute and/or modify this document under the terms of the GNU Free Documentation.
Creating Stronger, Safer, Web Facing Code JPL IT Security Mary Rivera June 17, 2011.
Copyright © The OWASP Foundation Permission is granted to copy, distribute and/or modify this document under the terms of the Creative Commons Attribution-ShareAlike.
The OWASP Foundation Copyright © The OWASP Foundation Permission is granted to copy, distribute and/or modify this document under.
WEB 2.0. What we are speaking about… Transformation of WEB, the WEB 2.0 –New generation of websites… –Importance of Open Data… –Importance of Users… –Web.
The OWASP Foundation Copyright © The OWASP Foundation Permission is granted to copy, distribute and/or modify this document under.
Copyright © The OWASP Foundation Permission is granted to copy, distribute and/or modify this document under the terms of the Creative Commons Attribution-ShareAlike.
ITCS 6010 DATA INTEGRATION Krishna Kant Sri Harsha Pokala Vamsi Krishna Jamulapati.
Cloud Computing Lecture #7 Introduction to Ajax Jimmy Lin The iSchool University of Maryland Wednesday, October 15, 2008 This work is licensed under a.
Does Ajax suck? CS575 Spring 2007 Chanwit Suebsureekul.
The OWASP Foundation Copyright © The OWASP Foundation Permission is granted to copy, distribute and/or modify this document under.
Copyright © The OWASP Foundation Permission is granted to copy, distribute and/or modify this document under the terms of the OWASP License. The OWASP.
When Good Services Go Wild: Reassembling Web Services for Unintended Purposes Feng Lu, Jiaqi Zhang, Stefan Savage UC San Diego.
Copyright © The OWASP Foundation Permission is granted to copy, distribute and/or modify this document under the terms of the Creative Commons Attribution-ShareAlike.
Copyright © The OWASP Foundation Permission is granted to copy, distribute and/or modify this document under the terms of the Creative Commons Attribution-ShareAlike.
Copyright © The OWASP Foundation Permission is granted to copy, distribute and/or modify this document under the terms of the Creative Commons Attribution-ShareAlike.
Lightning Talk Fred Rodriguez Nguyen Do CPSC 473 May 6, 2012.
Online communications for development Nick Scott 26 November 2008.
Cross-Site Scripting Vulnerabilities Adam Doupé 11/24/2014.
Web engineering. Topic: DHTML Presented by: Shah Rukh Presented to: Sir Ahsan raza.
Copyright © The OWASP Foundation Permission is granted to copy, distribute and/or modify this document under the terms of the Creative Commons Attribution-ShareAlike.
Copyright © The OWASP Foundation Permission is granted to copy, distribute and/or modify this document under the terms of the OWASP License. The OWASP.
Copyright © The OWASP Foundation Permission is granted to copy, distribute and/or modify this document under the terms of the Creative Commons Attribution-ShareAlike.
Copyright 2007 © The OWASP Foundation Permission is granted to copy, distribute and/or modify this document under the terms of the OWASP License. The OWASP.
Copyright 2007 © The OWASP Foundation Permission is granted to copy, distribute and/or modify this document under the terms of the OWASP License. The OWASP.
Web Application with AJAX CS 526 advanced interned and Web system Presenters Faris Kateb Mohammed AbdulAziz Omar Alzahrani.
Copyright 2007 © The OWASP Foundation Permission is granted to copy, distribute and/or modify this document under the terms of the OWASP License. The OWASP.
Web Mashups -Nirav Shah.
Instructor, Dr. Khalili Bahram Jeevan Kumar Gogineni.
International Telecommunication Union Geneva, 9(pm)-10 February 2009 ITU-T Security Standardization on Mobile Web Services Lee, Jae Seung Special Fellow,
Copyright © The OWASP Foundation Permission is granted to copy, distribute and/or modify this document under the terms of the Creative Commons Attribution-ShareAlike.
Copyright © The OWASP Foundation Permission is granted to copy, distribute and/or modify this document under the terms of the OWASP License. The OWASP.
Cross Site Integration “mashups” cross site scripting.
© Copyright 2013 Hewlett-Packard Development Company, L.P. The information contained herein is subject to change without notice. 1 RubyJax Brent Morris/
SIGITE 2008: Oct Integrating Web Application Security into the IT Curriculum James Walden Northern Kentucky University.
Interception and Analysis Framework for Win32 Scripts (not for public release) Tim Hollebeek, Ph.D.
Copyright © The OWASP Foundation Permission is granted to copy, distribute and/or modify this document under the terms of the GNU Free Documentation.
Copyright © The OWASP Foundation Permission is granted to copy, distribute and/or modify this document under the terms of the OWASP License. The OWASP.
Copyright © The OWASP Foundation Permission is granted to copy, distribute and/or modify this document under the terms of the OWASP License. The OWASP.
Web Applications Testing By Jamie Rougvie Supported by.
Copyright © The OWASP Foundation Permission is granted to copy, distribute and/or modify this document under the terms of the OWASP License. The OWASP.
Copyright © - The OWASP Foundation Permission is granted to copy, distribute and/or modify this document under the terms of the GNU Free Documentation.
Copyright © The OWASP Foundation Permission is granted to copy, distribute and/or modify this document under the terms of the Creative Commons Attribution-ShareAlike.
Copyright © The OWASP Foundation Permission is granted to copy, distribute and/or modify this document under the terms of the GNU Free Documentation.
Library Mashups for the Virtual Campus: Using Web 2.0 Tools to Create a New Current Awareness Service Linda Absher, Adriene Lim and Kerry Wu Portland State.
Web Application with AJAX CS 526 advanced interned and Web system Presenters Faris Kateb Mohammed AbdulAziz Omar Alzahrani.
Copyright © The OWASP Foundation Permission is granted to copy, distribute and/or modify this document under the terms of the OWASP License. The OWASP.
Jason Braun, Bryan Hurley, Anthony Varner, Andrew Winder snewsr The gnizr social news readr.
Copyright © The OWASP Foundation Permission is granted to copy, distribute and/or modify this document under the terms of the OWASP License. The OWASP.
Copyright © The OWASP Foundation Permission is granted to copy, distribute and/or modify this document under the terms of the Creative Commons Attribution-ShareAlike.
Copyright © The OWASP Foundation Permission is granted to copy, distribute and/or modify this document under the terms of the Creative Commons Attribution-ShareAlike.
Copyright © The OWASP Foundation Permission is granted to copy, distribute and/or modify this document under the terms of the Creative Commons Attribution-ShareAlike.
Copyright © The OWASP Foundation This work is available under the Creative Commons SA 2.5 license The OWASP Foundation OWASP Denver February 2012.
Copyright © The OWASP Foundation Permission is granted to copy, distribute and/or modify this document under the terms of the OWASP License. The OWASP.
Copyright © The OWASP Foundation Permission is granted to copy, distribute and/or modify this document under the terms of the OWASP License. The OWASP.
Copyright © The OWASP Foundation Permission is granted to copy, distribute and/or modify this document under the terms of the OWASP License. The OWASP.
Copyright 2007 © The OWASP Foundation Permission is granted to copy, distribute and/or modify this document under the terms of the OWASP License. The OWASP.
Modern Development Technologies in SharePoint SHAREPOINT SATURDAY OMAHA APRIL, 2016.
By Collin Donaldson. Hacking is only legal under the following circumstances: 1.You hack (penetration test) a device/network you own. 2.You gain explicit,
Copyright 2007 © The OWASP Foundation Permission is granted to copy, distribute and/or modify this document under the terms of the OWASP License. The OWASP.
Javascript worms By Benjamin Mossé SecPro
An Introduction to Web Application Security
Web Mashups -Nirav Shah.
Finding and Fighting the Causes of Insecure Applications
Petko D. Petkov Senior IT Security Consultant
Finding and Fighting the Causes of Insecure Applications
Presentation transcript:

Copyright © The OWASP Foundation Permission is granted to copy, distribute and/or modify this document under the terms of the Creative Commons Attribution-ShareAlike 2.5 License. To view this license, visit The OWASP Foundation 6 th OWASP AppSec Conference Milan - May Advanced Web Hacking Petko D. Petkov Senior IT Security Consultant

6 th OWASP AppSec Conference – Milan – May Powered by...

6 th OWASP AppSec Conference – Milan – May Clarifications!!!  Not everything is in the slides!  The subject is quite big!  Talk to me after the presentation!  Check the references!

6 th OWASP AppSec Conference – Milan – May Topics to Discuss  Introduction  Web Security since 2005  The State of JavaScript Hacking  Main  Web Security 2007  Web Exploits  Security Mashups  Worms and Bots

6 th OWASP AppSec Conference – Milan – May Web Security since 2005  They have always been with us  XSS  CSRF  Browser Port Scanners  CSS History Stealers  Application State Scanners  Inter-protocol Communication Techniques  Same Origin Policy Unification Techniques  JIKTO – browser based security scanner

6 th OWASP AppSec Conference – Milan – May The State of JavaScript Hacking  JavaScript is a GLUE Technology  Web Pages  Adobe Products  WSCRIPT and CSCRIPT  Mobile Devices  One Language to Rule Them All  Cross-site scripting  Cross-zone scripting

6 th OWASP AppSec Conference – Milan – May Web Security 2007  Web Exploits  Security Mashups  Worms and Botnets

6 th OWASP AppSec Conference – Milan – May Web Exploits  The need for web exploits  for testing purposes  for demonstration purposes  non-exploitative web app testing does not exist  How to test for SQL Injection without exploiting the application?  How to test for Cross-site scripting without exploiting the application?  My name is O‘Neill.

6 th OWASP AppSec Conference – Milan – May Web Exploits  Hundreds of them available online already!  Milw0rm  Full-disclosure  Who is going to unify them?  Exploit Environments  Metasploit –good but limiting  The Browser –probably what we want

6 th OWASP AppSec Conference – Milan – May Web Exploits  The browser as exploit development framework

6 th OWASP AppSec Conference – Milan – May Web Exploits  Pragmatics  Code  Semantics  Database  Services  All together  Mashup

6 th OWASP AppSec Conference – Milan – May Security Mashups  A Mashup is…  a website or application that combines content from more than one source into an integrated experience. Wikipedia  largely based on online services and APIs.  a way to circumvent various browser limitations.

6 th OWASP AppSec Conference – Milan – May Security Mashups  Technology  XML – it all started with that  XMLRPC – unifies the data structure  SOAP – defines the transportation mechanism  JSON – plays nice with browsers  Benefits  Distributed Knowledge  Distributed Processing Power

6 th OWASP AppSec Conference – Milan – May Security Mashups  A Security Mashup is…  a way to create largely distributed testing infrastructures.  a mechanism for instantly accruing dynamic knowledge.  a mechanism that has a lot of potential for bad purposes.  a way to bypass the Same Origin Policies to an extent.

6 th OWASP AppSec Conference – Milan – May Security Mashups  Origin Unification with Proxies

6 th OWASP AppSec Conference – Milan – May Security Mashups  Origin Unification with Services  we are interested in the data not the data retrieving mechanism

6 th OWASP AppSec Conference – Milan – May Security Mashups  APIs  Google  AJAX Search API – search API  AJAX Feed API – RSS feed API  Yahoo  Pipes – mashup power tool  Dapper  Dapper – screen scraping tool

6 th OWASP AppSec Conference – Milan – May Security Mashups  Services  DIGG  DIGG – user powered content  TinyURL  TinyURL – URL/data storage service

6 th OWASP AppSec Conference – Milan – May Security Mashups  Yahoo Pipes TinyURL FS

6 th OWASP AppSec Conference – Milan – May Security Mashups  Yahoo Pipes Google Proxy

6 th OWASP AppSec Conference – Milan – May Security Mashups  JIKTO in a lot less lines of code  function handleData(d) { for (var i d.items) ypipeProxy(target + d.items[i]); } function handleYPipeProxy(d) { // read the data from here }  JavaScript on demand (aka JSON) in YPipes  id=nvTyLSDv2xGkB7MlJhOy0Q&_run=1&_render =json&_callback=handleYPipeProxy&url=htt p%3A//example.com

6 th OWASP AppSec Conference – Milan – May Security Mashups  JavaScript Spider  quite stable  function spider(url, callback, conf) { var conf = (conf != undefined)?conf:{}; conf.pipe = (conf.pipe != undefined)?conf.pipe:'lruY6uXk2xGdxK66l7okhQ'; conf.depth = (conf.depth != undefined)?conf.depth:3; function walkJSON(j, c) { if (typeof(c) != 'function') { return; …

6 th OWASP AppSec Conference – Milan – May Security Mashups  Malicious code and security testing tools

6 th OWASP AppSec Conference – Milan – May Security Mashups  Possibilities are endless!  Time for a demo!

6 th OWASP AppSec Conference – Milan – May Worms and Bots  No hosting required  Totally distributed  Dynamically managed  Impossible to fight against  Do you have any ideas?  How shall we handle this problem?

6 th OWASP AppSec Conference – Milan – May Worms and Bots  Worms and Bots look like normal Web applications  JavaScript malware is too dynamic to be handled by signatures

6 th OWASP AppSec Conference – Milan – May Worms and Bots  Controlling Botnets through DIGG

6 th OWASP AppSec Conference – Milan – May Worms and Bots  Where does this leave us?  Even experts can’t tell.  What shell we do?  Improve community awareness.  Will we see 2NG Sammy?  It is inevitable.  How to protect against?  Be very conscious with your Web Activities.

6 th OWASP AppSec Conference – Milan – May References  GNUCITIZEN   conference  Yahoo Pipes   Google APIs   Dapper 

6 th OWASP AppSec Conference – Milan – May Questions?  Win a book.  Share your thoughts.