SlideShare une entreprise Scribd logo
1  sur  26
1
A SOLUTION FOR ATTACK VECTORS AGAINST
WEB APPLICATIONS USING AJAX
2
ABSTRACT
Web applications are most predominated applications that are accessed over a
network such as Internet. Web applications are presentation-oriented that generates
interactive web pages containing various types of markup language (HTML, XML,
and so on) and dynamic content in response to requests. As there is heavy traffic in
today‟s web world it is essential to maintain security concerns and prevention
approaches in order to protect web applications from cyber culprits. These
applications are increasingly the preferred targets of cyber criminals looking to get
profit from identity theft and other illegal activities.
There are modern tools and technologies such as AJAX technology are available to
prepare web applications as simple as user friendly. Ajax web technology, by design
makes number of calls to the web server to process a user request. As there is an
increase in session management vulnerabilities and a greater risk of hackers gaining
access to the many hidden URLs that are necessary for AJAX requests to be
processed we need to provide high-end web security measures to protect web sites
from vulnerabilities.
Web security is the act of protecting authorized users from malicious threats. The
current solution addresses most common threats occurred at client side such as
CSS(Cross Site Scripting) and SQL Injection.
3
INTRODUCTION
• Web application is software application accessed by
users over internet
• 2 variants.
– Static web sites
– Dynamic web applications
• Static web sites consists of content oriented web pages
used for blogs, wiki sites.
• Dynamic web applications are interactive and more
service based applications contains stored and
processed content.
• Developed using browser supported scripting, markup
languages on client side and efficient server side
programming.
• Used for social network activity, ecommerce business
applications …...
4
5
WEB SECURITY
• Sensitive data increasingly spread over the network.
• The more number of vulnerabilities and and security
incidents reported as there wide availability of data.
• Web applications should have control over
– Confidentiality
– Integrity
– Availability
– Authentication
– Authorization
• Common vulnerabilities
– SQL Injection Attacks
– CSRF(CSS Variant) Attacks
6
SQL Injection Attack
• SQLIA is server side attack that manipulates content in back
end database system
• Embeds malformed query statements in input data and
compromises query execution process.
• Attacks against confidentiality, availability and integrity
services
• Unauthorized access to database and attacks with
malformed DML statements.
• Various SQL injection formats:
– Tautologies.
• SELECT u.name FROM users u WHERE u.login=‟‟ OR 1=1 – „ AND u.passwd=***
– UNION Queries.
• SELECT acct FROM users WHERE login=‟ ‟ UNION SELECT transaction FROM transactions WHERE
acct_no=9012 – AND passwd=****
– Piggy back queries.
• SELECT name FROM users WHERE login=‟xyz‟ AND passwd=‟***‟ ; DROP TABLE system.users
7
SQL Injection Attack
8
SQLIA Existing Solutions
SQL Injection
• Syntax analysis and prevention.
• White list patterns and black list patterns
• Parameterized prepared statements with attributes
9
SQLIA Proposed Solution
SQL Injection Attack prevention
– Use Encode and Decode the crucial data.
– The encrypted data is persisted in database system
– User‟s input data is get encrypted before query processing
– The critical data is decrypted while retrieval from database.
Advantages:
– Malformed query formation not possible.
– No Query preprocessing or manual checks required.
Disadvantages:
– Require additional space to store cipher data instead of plain
data.
10
SQLIA Proposed Solution
11
CSRF (Cross Site Request Forgery) Attack
• CSS(Cross Site Script) is client side script attack. scripts
embedded in a page which are executed on the client-side.
• Cookie captures and hijacks legitimate users sessions.
• CSRF is typical CSS variant which sends unauthorized
commands from valid user to the server.
• Malicious script or URLs embedded into blog contents or
hidden in image tags.
– <img src=“http://buggy-site.com/hacked”/>
• Attacks against Identity theft and cheats business
transactions.
• Unauthorized crucial form data post activity.
– <script>document.getElementById(„form‟).submit()</script>
12
Existing Solutions
CSS and CSRF prevention
– User input validations
– HTML encoded characters
– Client IP Binding
– Session life time limitations
– Disable the client side script executions
13
CSRF Proposed Solution
• CSRF prevention approach
– Use secret XSRF token for each GET and POST requests.
– Generate unique XSRF secret token for every get request.
– Maintain the XSRF token in form pages on client side
– Validate the secret XSRF token from the form post data against the
previously generated XSRF token on server side
<form action=”fundTransfer.do” method=”POST”>
<input type=”hidden” name=”xsrfSecretToken”
value=”qiou3hkps986hn”/> <input type=”text”
name=”amount”/> <input type=”submit” value=”Send”>
</form>
Advantages:
– Unauthorized form submissions blocked.
14
CSRF Proposed Solution
15
Instant Media --- An E-commerce Web Application
• Is an online market place e-commerce web application.
• Provides services to sell or buy soft copies by online or
offline.
• Supports messages, comments and reviews activity.
• Handles critical operations like buying and payment
functionalities.
• Showcased the application as vulnerable to CSRF and
SQLIA threats
16
Modules
• User signup and login process.
• Publish soft copy items.
• Purchase soft copies and payment transaction
processing.
• Payment activity listing and search functionality.
• Messaging
• Account details maintainance
17
UML Designs
18
UML Designs contd…
19
Screen Captures
20
Screen Captures contd…
21
Screen Captures contd…
22
Screen Captures contd…
23
Screen Captures contd…
Search functionality prevented from SQLIA
24
Conclusion
• Vulnerabilities can result unauthorized access by injecting
malicious scripts.
• Most of the web security attacks targeted on critical e-
commerce web sites.
• Manual or automated inspections required in validating the
input submitted by end users.
• The suggested solution can prevent more number of CSRF,
SQLIA threats.
• No compute overhead, platform independent and scalable
solution for any web applications.
• Need to address website sever attacks like web site crawling
and hidden URLs spawn activities.
• Need to be alert and and get up to date with latest web
application development technologies.
25
References
• Jayamsakthi Shanmugam, M.Ponnavaikko, XSS
Application Worms, IEEE, 8th ACIS International
Conference on Software Engineering, 2007.
• Xiang Fu, A Static Analysis Framework For Detecting
SQL Injection Vulnerabilities, IEEE, 31st Annual
International Computer Software and Applications
Conference, 2007.
• Preventive Approaches Fro Web Application‟s Security
Attacks, International Conference on Software
Engineering, 2009.
• http://www.isecpartners.com
• Jeremiah Grossman, Cross-Site Request Forgery "The
sleeping giant”. www.whitehatsec.com.
• http://www.webappsec.org/projects/statistics/
26
Thank You

Contenu connexe

Tendances

Rich Web App Security - Keeping your application safe
Rich Web App Security - Keeping your application safeRich Web App Security - Keeping your application safe
Rich Web App Security - Keeping your application safeJeremiah Grossman
 
A literature survey on anti phishing
A literature survey on anti phishingA literature survey on anti phishing
A literature survey on anti phishingIJCSES Journal
 
Hacking the Web
Hacking the WebHacking the Web
Hacking the WebMike Crabb
 
Owasp Top 10 A3: Cross Site Scripting (XSS)
Owasp Top 10 A3: Cross Site Scripting (XSS)Owasp Top 10 A3: Cross Site Scripting (XSS)
Owasp Top 10 A3: Cross Site Scripting (XSS)Michael Hendrickx
 
Lecture #24 : Cross Site Request Forgery (CSRF)
Lecture #24 : Cross Site Request Forgery (CSRF)Lecture #24 : Cross Site Request Forgery (CSRF)
Lecture #24 : Cross Site Request Forgery (CSRF)Dr. Ramchandra Mangrulkar
 
Web browser privacy and security
Web browser privacy and security Web browser privacy and security
Web browser privacy and security amiable_indian
 
Website hacking and prevention (All Tools,Topics & Technique )
Website hacking and prevention (All Tools,Topics & Technique )Website hacking and prevention (All Tools,Topics & Technique )
Website hacking and prevention (All Tools,Topics & Technique )Jay Nagar
 
IRJET- Security Enhancements by Achieving Flatness in Honeyword for Web u...
IRJET-  	  Security Enhancements by Achieving Flatness in Honeyword for Web u...IRJET-  	  Security Enhancements by Achieving Flatness in Honeyword for Web u...
IRJET- Security Enhancements by Achieving Flatness in Honeyword for Web u...IRJET Journal
 
Presentation on Top 10 Vulnerabilities in Web Application
Presentation on Top 10 Vulnerabilities in Web ApplicationPresentation on Top 10 Vulnerabilities in Web Application
Presentation on Top 10 Vulnerabilities in Web ApplicationMd Mahfuzur Rahman
 
Tracing out Cross Site Scripting Vulnerabilities in Modern Scripts
Tracing out Cross Site Scripting Vulnerabilities in Modern ScriptsTracing out Cross Site Scripting Vulnerabilities in Modern Scripts
Tracing out Cross Site Scripting Vulnerabilities in Modern ScriptsEswar Publications
 
Security risks awareness
Security risks awarenessSecurity risks awareness
Security risks awarenessJanagi Kannan
 
Case Study of Django: Web Frameworks that are Secure by Default
Case Study of Django: Web Frameworks that are Secure by DefaultCase Study of Django: Web Frameworks that are Secure by Default
Case Study of Django: Web Frameworks that are Secure by DefaultMohammed ALDOUB
 

Tendances (20)

Dynamic watermarking
Dynamic watermarkingDynamic watermarking
Dynamic watermarking
 
Rich Web App Security - Keeping your application safe
Rich Web App Security - Keeping your application safeRich Web App Security - Keeping your application safe
Rich Web App Security - Keeping your application safe
 
A literature survey on anti phishing
A literature survey on anti phishingA literature survey on anti phishing
A literature survey on anti phishing
 
Starwest 2008
Starwest 2008Starwest 2008
Starwest 2008
 
Hacking the Web
Hacking the WebHacking the Web
Hacking the Web
 
Phishing with Super Bait
Phishing with Super BaitPhishing with Super Bait
Phishing with Super Bait
 
Owasp Top 10 A3: Cross Site Scripting (XSS)
Owasp Top 10 A3: Cross Site Scripting (XSS)Owasp Top 10 A3: Cross Site Scripting (XSS)
Owasp Top 10 A3: Cross Site Scripting (XSS)
 
I1804015458
I1804015458I1804015458
I1804015458
 
Lecture #22: Web Privacy & Security Breach
Lecture #22: Web Privacy & Security BreachLecture #22: Web Privacy & Security Breach
Lecture #22: Web Privacy & Security Breach
 
Lecture #24 : Cross Site Request Forgery (CSRF)
Lecture #24 : Cross Site Request Forgery (CSRF)Lecture #24 : Cross Site Request Forgery (CSRF)
Lecture #24 : Cross Site Request Forgery (CSRF)
 
Web browser privacy and security
Web browser privacy and security Web browser privacy and security
Web browser privacy and security
 
Website hacking and prevention (All Tools,Topics & Technique )
Website hacking and prevention (All Tools,Topics & Technique )Website hacking and prevention (All Tools,Topics & Technique )
Website hacking and prevention (All Tools,Topics & Technique )
 
IRJET- Security Enhancements by Achieving Flatness in Honeyword for Web u...
IRJET-  	  Security Enhancements by Achieving Flatness in Honeyword for Web u...IRJET-  	  Security Enhancements by Achieving Flatness in Honeyword for Web u...
IRJET- Security Enhancements by Achieving Flatness in Honeyword for Web u...
 
Presentation on Top 10 Vulnerabilities in Web Application
Presentation on Top 10 Vulnerabilities in Web ApplicationPresentation on Top 10 Vulnerabilities in Web Application
Presentation on Top 10 Vulnerabilities in Web Application
 
OlgerHoxha_Thesis_Final
OlgerHoxha_Thesis_FinalOlgerHoxha_Thesis_Final
OlgerHoxha_Thesis_Final
 
Tracing out Cross Site Scripting Vulnerabilities in Modern Scripts
Tracing out Cross Site Scripting Vulnerabilities in Modern ScriptsTracing out Cross Site Scripting Vulnerabilities in Modern Scripts
Tracing out Cross Site Scripting Vulnerabilities in Modern Scripts
 
Security risks awareness
Security risks awarenessSecurity risks awareness
Security risks awareness
 
Case Study of Django: Web Frameworks that are Secure by Default
Case Study of Django: Web Frameworks that are Secure by DefaultCase Study of Django: Web Frameworks that are Secure by Default
Case Study of Django: Web Frameworks that are Secure by Default
 
4.Xss
4.Xss4.Xss
4.Xss
 
Identifying XSS Vulnerabilities
Identifying XSS VulnerabilitiesIdentifying XSS Vulnerabilities
Identifying XSS Vulnerabilities
 

En vedette

Bit Torrent Protocol
Bit Torrent ProtocolBit Torrent Protocol
Bit Torrent ProtocolAli Habeeb
 
Cloud Security
Cloud SecurityCloud Security
Cloud SecurityAli Habeeb
 
Anonymous Connections And Onion Routing
Anonymous Connections And Onion RoutingAnonymous Connections And Onion Routing
Anonymous Connections And Onion RoutingAli Habeeb
 
Agl Resources Connections Magazine 2007
Agl Resources Connections Magazine 2007Agl Resources Connections Magazine 2007
Agl Resources Connections Magazine 2007guest1665a
 
Howl Backgrounds
Howl BackgroundsHowl Backgrounds
Howl Backgroundsxerothecat
 
Opinion Mining
Opinion MiningOpinion Mining
Opinion MiningAli Habeeb
 
Data-Centric Routing Protocols in Wireless Sensor Network: A survey
Data-Centric Routing Protocols in Wireless Sensor Network: A surveyData-Centric Routing Protocols in Wireless Sensor Network: A survey
Data-Centric Routing Protocols in Wireless Sensor Network: A surveyAli Habeeb
 
Peer To Peer Networking
Peer To Peer NetworkingPeer To Peer Networking
Peer To Peer Networkingicanhasfay
 

En vedette (16)

Bit Torrent Protocol
Bit Torrent ProtocolBit Torrent Protocol
Bit Torrent Protocol
 
Cloud Security
Cloud SecurityCloud Security
Cloud Security
 
Anonymous Connections And Onion Routing
Anonymous Connections And Onion RoutingAnonymous Connections And Onion Routing
Anonymous Connections And Onion Routing
 
Agl Resources Connections Magazine 2007
Agl Resources Connections Magazine 2007Agl Resources Connections Magazine 2007
Agl Resources Connections Magazine 2007
 
Inspiratie
InspiratieInspiratie
Inspiratie
 
Tombuchanan
TombuchananTombuchanan
Tombuchanan
 
José Angel
José AngelJosé Angel
José Angel
 
Howl Backgrounds
Howl BackgroundsHowl Backgrounds
Howl Backgrounds
 
Castelos
CastelosCastelos
Castelos
 
Blue Eyes
Blue EyesBlue Eyes
Blue Eyes
 
Opinion Mining
Opinion MiningOpinion Mining
Opinion Mining
 
USB 3.0
USB 3.0USB 3.0
USB 3.0
 
Data-Centric Routing Protocols in Wireless Sensor Network: A survey
Data-Centric Routing Protocols in Wireless Sensor Network: A surveyData-Centric Routing Protocols in Wireless Sensor Network: A survey
Data-Centric Routing Protocols in Wireless Sensor Network: A survey
 
Resume
ResumeResume
Resume
 
WAP
WAPWAP
WAP
 
Peer To Peer Networking
Peer To Peer NetworkingPeer To Peer Networking
Peer To Peer Networking
 

Similaire à Web Security

Jonathan Singer - Wheezing The Juice.pdf
Jonathan Singer - Wheezing The Juice.pdfJonathan Singer - Wheezing The Juice.pdf
Jonathan Singer - Wheezing The Juice.pdfJonathan Singer
 
Secure Coding BSSN Semarang Material.pdf
Secure Coding BSSN Semarang Material.pdfSecure Coding BSSN Semarang Material.pdf
Secure Coding BSSN Semarang Material.pdfnanangAris1
 
www.webre24h.com - Ajax security
www.webre24h.com - Ajax securitywww.webre24h.com - Ajax security
www.webre24h.com - Ajax securitywebre24h
 
Solvay secure application layer v2015 seba
Solvay secure application layer v2015   sebaSolvay secure application layer v2015   seba
Solvay secure application layer v2015 sebaSebastien Deleersnyder
 
2013 OWASP Top 10
2013 OWASP Top 102013 OWASP Top 10
2013 OWASP Top 10bilcorry
 
CNIT 129S: 12: Attacking Users: Cross-Site Scripting (Part 1 of 2)
CNIT 129S: 12: Attacking Users: Cross-Site Scripting (Part 1 of 2)CNIT 129S: 12: Attacking Users: Cross-Site Scripting (Part 1 of 2)
CNIT 129S: 12: Attacking Users: Cross-Site Scripting (Part 1 of 2)Sam Bowne
 
OWASP top 10-2013
OWASP top 10-2013OWASP top 10-2013
OWASP top 10-2013tmd800
 
Avoiding Application Attacks: A Guide to Preventing the OWASP Top 10 from Hap...
Avoiding Application Attacks: A Guide to Preventing the OWASP Top 10 from Hap...Avoiding Application Attacks: A Guide to Preventing the OWASP Top 10 from Hap...
Avoiding Application Attacks: A Guide to Preventing the OWASP Top 10 from Hap...IBM Security
 
Web application security part 01
Web application security part 01Web application security part 01
Web application security part 01G Prachi
 
Owasp top 10 vulnerabilities 2013
Owasp top 10 vulnerabilities   2013Owasp top 10 vulnerabilities   2013
Owasp top 10 vulnerabilities 2013Vishrut Sharma
 
Vulnerabilities in modern web applications
Vulnerabilities in modern web applicationsVulnerabilities in modern web applications
Vulnerabilities in modern web applicationsNiyas Nazar
 
Are you fighting_new_threats_with_old_weapons
Are you fighting_new_threats_with_old_weaponsAre you fighting_new_threats_with_old_weapons
Are you fighting_new_threats_with_old_weaponsBhargav Modi
 
Do You Write Secure Code? by Erez Metula
Do You Write Secure Code? by Erez MetulaDo You Write Secure Code? by Erez Metula
Do You Write Secure Code? by Erez MetulaAlphageeks
 
Web and Mobile Application Security
Web and Mobile Application SecurityWeb and Mobile Application Security
Web and Mobile Application SecurityPrateek Jain
 
Identifying and Eradicating Web Application Vulnerabilities : Cyber Security ...
Identifying and Eradicating Web Application Vulnerabilities : Cyber Security ...Identifying and Eradicating Web Application Vulnerabilities : Cyber Security ...
Identifying and Eradicating Web Application Vulnerabilities : Cyber Security ...Boston Institute of Analytics
 
Top 10 web application security risks akash mahajan
Top 10 web application security risks   akash mahajanTop 10 web application security risks   akash mahajan
Top 10 web application security risks akash mahajanAkash Mahajan
 
Secure coding guidelines
Secure coding guidelinesSecure coding guidelines
Secure coding guidelinesZakaria SMAHI
 
Domain 5 of the CEH Web Application Hacking.pptx
Domain 5 of the CEH Web Application Hacking.pptxDomain 5 of the CEH Web Application Hacking.pptx
Domain 5 of the CEH Web Application Hacking.pptxInfosectrain3
 
Blackhat11 shreeraj reverse_engineering_browser
Blackhat11 shreeraj reverse_engineering_browserBlackhat11 shreeraj reverse_engineering_browser
Blackhat11 shreeraj reverse_engineering_browserShreeraj Shah
 

Similaire à Web Security (20)

Jonathan Singer - Wheezing The Juice.pdf
Jonathan Singer - Wheezing The Juice.pdfJonathan Singer - Wheezing The Juice.pdf
Jonathan Singer - Wheezing The Juice.pdf
 
Secure Coding BSSN Semarang Material.pdf
Secure Coding BSSN Semarang Material.pdfSecure Coding BSSN Semarang Material.pdf
Secure Coding BSSN Semarang Material.pdf
 
www.webre24h.com - Ajax security
www.webre24h.com - Ajax securitywww.webre24h.com - Ajax security
www.webre24h.com - Ajax security
 
Solvay secure application layer v2015 seba
Solvay secure application layer v2015   sebaSolvay secure application layer v2015   seba
Solvay secure application layer v2015 seba
 
2013 OWASP Top 10
2013 OWASP Top 102013 OWASP Top 10
2013 OWASP Top 10
 
CNIT 129S: 12: Attacking Users: Cross-Site Scripting (Part 1 of 2)
CNIT 129S: 12: Attacking Users: Cross-Site Scripting (Part 1 of 2)CNIT 129S: 12: Attacking Users: Cross-Site Scripting (Part 1 of 2)
CNIT 129S: 12: Attacking Users: Cross-Site Scripting (Part 1 of 2)
 
OWASP top 10-2013
OWASP top 10-2013OWASP top 10-2013
OWASP top 10-2013
 
Avoiding Application Attacks: A Guide to Preventing the OWASP Top 10 from Hap...
Avoiding Application Attacks: A Guide to Preventing the OWASP Top 10 from Hap...Avoiding Application Attacks: A Guide to Preventing the OWASP Top 10 from Hap...
Avoiding Application Attacks: A Guide to Preventing the OWASP Top 10 from Hap...
 
Web application security part 01
Web application security part 01Web application security part 01
Web application security part 01
 
Owasp top 10 vulnerabilities 2013
Owasp top 10 vulnerabilities   2013Owasp top 10 vulnerabilities   2013
Owasp top 10 vulnerabilities 2013
 
Vulnerabilities in modern web applications
Vulnerabilities in modern web applicationsVulnerabilities in modern web applications
Vulnerabilities in modern web applications
 
Are you fighting_new_threats_with_old_weapons
Are you fighting_new_threats_with_old_weaponsAre you fighting_new_threats_with_old_weapons
Are you fighting_new_threats_with_old_weapons
 
Do You Write Secure Code? by Erez Metula
Do You Write Secure Code? by Erez MetulaDo You Write Secure Code? by Erez Metula
Do You Write Secure Code? by Erez Metula
 
Web and Mobile Application Security
Web and Mobile Application SecurityWeb and Mobile Application Security
Web and Mobile Application Security
 
Identifying and Eradicating Web Application Vulnerabilities : Cyber Security ...
Identifying and Eradicating Web Application Vulnerabilities : Cyber Security ...Identifying and Eradicating Web Application Vulnerabilities : Cyber Security ...
Identifying and Eradicating Web Application Vulnerabilities : Cyber Security ...
 
Top 10 web application security risks akash mahajan
Top 10 web application security risks   akash mahajanTop 10 web application security risks   akash mahajan
Top 10 web application security risks akash mahajan
 
Secure coding guidelines
Secure coding guidelinesSecure coding guidelines
Secure coding guidelines
 
Vulnerabilities in Web Applications
Vulnerabilities in Web ApplicationsVulnerabilities in Web Applications
Vulnerabilities in Web Applications
 
Domain 5 of the CEH Web Application Hacking.pptx
Domain 5 of the CEH Web Application Hacking.pptxDomain 5 of the CEH Web Application Hacking.pptx
Domain 5 of the CEH Web Application Hacking.pptx
 
Blackhat11 shreeraj reverse_engineering_browser
Blackhat11 shreeraj reverse_engineering_browserBlackhat11 shreeraj reverse_engineering_browser
Blackhat11 shreeraj reverse_engineering_browser
 

Plus de Ali Habeeb

Secure erasure code based distributed storage system with secure data forwarding
Secure erasure code based distributed storage system with secure data forwardingSecure erasure code based distributed storage system with secure data forwarding
Secure erasure code based distributed storage system with secure data forwardingAli Habeeb
 
Organizing User Search Histories
Organizing User Search HistoriesOrganizing User Search Histories
Organizing User Search HistoriesAli Habeeb
 
Detecting and Resolving Firewall Policy Anomalies
Detecting and Resolving Firewall Policy AnomaliesDetecting and Resolving Firewall Policy Anomalies
Detecting and Resolving Firewall Policy AnomaliesAli Habeeb
 
A study of Data Quality and Analytics
A study of Data Quality and AnalyticsA study of Data Quality and Analytics
A study of Data Quality and AnalyticsAli Habeeb
 
Adhoc and Sensor Networks - Chapter 10
Adhoc and Sensor Networks - Chapter 10Adhoc and Sensor Networks - Chapter 10
Adhoc and Sensor Networks - Chapter 10Ali Habeeb
 
Adhoc and Sensor Networks - Chapter 09
Adhoc and Sensor Networks - Chapter 09Adhoc and Sensor Networks - Chapter 09
Adhoc and Sensor Networks - Chapter 09Ali Habeeb
 
Adhoc and Sensor Networks - Chapter 08
Adhoc and Sensor Networks - Chapter 08Adhoc and Sensor Networks - Chapter 08
Adhoc and Sensor Networks - Chapter 08Ali Habeeb
 
Adhoc and Sensor Networks - Chapter 07
Adhoc and Sensor Networks - Chapter 07Adhoc and Sensor Networks - Chapter 07
Adhoc and Sensor Networks - Chapter 07Ali Habeeb
 
Adhoc and Sensor Networks - Chapter 06
Adhoc and Sensor Networks - Chapter 06Adhoc and Sensor Networks - Chapter 06
Adhoc and Sensor Networks - Chapter 06Ali Habeeb
 
Adhoc and Sensor Networks - Chapter 05
Adhoc and Sensor Networks - Chapter 05Adhoc and Sensor Networks - Chapter 05
Adhoc and Sensor Networks - Chapter 05Ali Habeeb
 
Adhoc and Sensor Networks - Chapter 04
Adhoc and Sensor Networks - Chapter 04Adhoc and Sensor Networks - Chapter 04
Adhoc and Sensor Networks - Chapter 04Ali Habeeb
 
Adhoc and Sensor Networks - Chapter 03
Adhoc and Sensor Networks - Chapter 03Adhoc and Sensor Networks - Chapter 03
Adhoc and Sensor Networks - Chapter 03Ali Habeeb
 
Adhoc and Sensor Networks - Chapter 02
Adhoc and Sensor Networks - Chapter 02Adhoc and Sensor Networks - Chapter 02
Adhoc and Sensor Networks - Chapter 02Ali Habeeb
 
Adhoc and Sensor Networks - Chapter 11
Adhoc and Sensor Networks - Chapter 11Adhoc and Sensor Networks - Chapter 11
Adhoc and Sensor Networks - Chapter 11Ali Habeeb
 

Plus de Ali Habeeb (20)

Secure erasure code based distributed storage system with secure data forwarding
Secure erasure code based distributed storage system with secure data forwardingSecure erasure code based distributed storage system with secure data forwarding
Secure erasure code based distributed storage system with secure data forwarding
 
Organizing User Search Histories
Organizing User Search HistoriesOrganizing User Search Histories
Organizing User Search Histories
 
Detecting and Resolving Firewall Policy Anomalies
Detecting and Resolving Firewall Policy AnomaliesDetecting and Resolving Firewall Policy Anomalies
Detecting and Resolving Firewall Policy Anomalies
 
A study of Data Quality and Analytics
A study of Data Quality and AnalyticsA study of Data Quality and Analytics
A study of Data Quality and Analytics
 
Adhoc and Sensor Networks - Chapter 10
Adhoc and Sensor Networks - Chapter 10Adhoc and Sensor Networks - Chapter 10
Adhoc and Sensor Networks - Chapter 10
 
Adhoc and Sensor Networks - Chapter 09
Adhoc and Sensor Networks - Chapter 09Adhoc and Sensor Networks - Chapter 09
Adhoc and Sensor Networks - Chapter 09
 
Adhoc and Sensor Networks - Chapter 08
Adhoc and Sensor Networks - Chapter 08Adhoc and Sensor Networks - Chapter 08
Adhoc and Sensor Networks - Chapter 08
 
Adhoc and Sensor Networks - Chapter 07
Adhoc and Sensor Networks - Chapter 07Adhoc and Sensor Networks - Chapter 07
Adhoc and Sensor Networks - Chapter 07
 
Adhoc and Sensor Networks - Chapter 06
Adhoc and Sensor Networks - Chapter 06Adhoc and Sensor Networks - Chapter 06
Adhoc and Sensor Networks - Chapter 06
 
Adhoc and Sensor Networks - Chapter 05
Adhoc and Sensor Networks - Chapter 05Adhoc and Sensor Networks - Chapter 05
Adhoc and Sensor Networks - Chapter 05
 
Adhoc and Sensor Networks - Chapter 04
Adhoc and Sensor Networks - Chapter 04Adhoc and Sensor Networks - Chapter 04
Adhoc and Sensor Networks - Chapter 04
 
Adhoc and Sensor Networks - Chapter 03
Adhoc and Sensor Networks - Chapter 03Adhoc and Sensor Networks - Chapter 03
Adhoc and Sensor Networks - Chapter 03
 
Adhoc and Sensor Networks - Chapter 02
Adhoc and Sensor Networks - Chapter 02Adhoc and Sensor Networks - Chapter 02
Adhoc and Sensor Networks - Chapter 02
 
Adhoc and Sensor Networks - Chapter 11
Adhoc and Sensor Networks - Chapter 11Adhoc and Sensor Networks - Chapter 11
Adhoc and Sensor Networks - Chapter 11
 
Iss lecture 9
Iss lecture 9Iss lecture 9
Iss lecture 9
 
Iss lecture 6
Iss lecture 6Iss lecture 6
Iss lecture 6
 
Iss lecture 5
Iss lecture 5Iss lecture 5
Iss lecture 5
 
Iss lecture 4
Iss lecture 4Iss lecture 4
Iss lecture 4
 
Iss lecture 3
Iss lecture 3Iss lecture 3
Iss lecture 3
 
Iss lecture 2
Iss lecture 2Iss lecture 2
Iss lecture 2
 

Dernier

SAP Build Work Zone - Overview L2-L3.pptx
SAP Build Work Zone - Overview L2-L3.pptxSAP Build Work Zone - Overview L2-L3.pptx
SAP Build Work Zone - Overview L2-L3.pptxNavinnSomaal
 
Nell’iperspazio con Rocket: il Framework Web di Rust!
Nell’iperspazio con Rocket: il Framework Web di Rust!Nell’iperspazio con Rocket: il Framework Web di Rust!
Nell’iperspazio con Rocket: il Framework Web di Rust!Commit University
 
Human Factors of XR: Using Human Factors to Design XR Systems
Human Factors of XR: Using Human Factors to Design XR SystemsHuman Factors of XR: Using Human Factors to Design XR Systems
Human Factors of XR: Using Human Factors to Design XR SystemsMark Billinghurst
 
"LLMs for Python Engineers: Advanced Data Analysis and Semantic Kernel",Oleks...
"LLMs for Python Engineers: Advanced Data Analysis and Semantic Kernel",Oleks..."LLMs for Python Engineers: Advanced Data Analysis and Semantic Kernel",Oleks...
"LLMs for Python Engineers: Advanced Data Analysis and Semantic Kernel",Oleks...Fwdays
 
Connect Wave/ connectwave Pitch Deck Presentation
Connect Wave/ connectwave Pitch Deck PresentationConnect Wave/ connectwave Pitch Deck Presentation
Connect Wave/ connectwave Pitch Deck PresentationSlibray Presentation
 
CloudStudio User manual (basic edition):
CloudStudio User manual (basic edition):CloudStudio User manual (basic edition):
CloudStudio User manual (basic edition):comworks
 
Leverage Zilliz Serverless - Up to 50X Saving for Your Vector Storage Cost
Leverage Zilliz Serverless - Up to 50X Saving for Your Vector Storage CostLeverage Zilliz Serverless - Up to 50X Saving for Your Vector Storage Cost
Leverage Zilliz Serverless - Up to 50X Saving for Your Vector Storage CostZilliz
 
Take control of your SAP testing with UiPath Test Suite
Take control of your SAP testing with UiPath Test SuiteTake control of your SAP testing with UiPath Test Suite
Take control of your SAP testing with UiPath Test SuiteDianaGray10
 
"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek Schlawack
"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek Schlawack"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek Schlawack
"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek SchlawackFwdays
 
Unraveling Multimodality with Large Language Models.pdf
Unraveling Multimodality with Large Language Models.pdfUnraveling Multimodality with Large Language Models.pdf
Unraveling Multimodality with Large Language Models.pdfAlex Barbosa Coqueiro
 
Hyperautomation and AI/ML: A Strategy for Digital Transformation Success.pdf
Hyperautomation and AI/ML: A Strategy for Digital Transformation Success.pdfHyperautomation and AI/ML: A Strategy for Digital Transformation Success.pdf
Hyperautomation and AI/ML: A Strategy for Digital Transformation Success.pdfPrecisely
 
Artificial intelligence in cctv survelliance.pptx
Artificial intelligence in cctv survelliance.pptxArtificial intelligence in cctv survelliance.pptx
Artificial intelligence in cctv survelliance.pptxhariprasad279825
 
Vertex AI Gemini Prompt Engineering Tips
Vertex AI Gemini Prompt Engineering TipsVertex AI Gemini Prompt Engineering Tips
Vertex AI Gemini Prompt Engineering TipsMiki Katsuragi
 
Designing IA for AI - Information Architecture Conference 2024
Designing IA for AI - Information Architecture Conference 2024Designing IA for AI - Information Architecture Conference 2024
Designing IA for AI - Information Architecture Conference 2024Enterprise Knowledge
 
Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)
Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)
Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)Mark Simos
 
DevEX - reference for building teams, processes, and platforms
DevEX - reference for building teams, processes, and platformsDevEX - reference for building teams, processes, and platforms
DevEX - reference for building teams, processes, and platformsSergiu Bodiu
 
DevoxxFR 2024 Reproducible Builds with Apache Maven
DevoxxFR 2024 Reproducible Builds with Apache MavenDevoxxFR 2024 Reproducible Builds with Apache Maven
DevoxxFR 2024 Reproducible Builds with Apache MavenHervé Boutemy
 
Advanced Computer Architecture – An Introduction
Advanced Computer Architecture – An IntroductionAdvanced Computer Architecture – An Introduction
Advanced Computer Architecture – An IntroductionDilum Bandara
 
Commit 2024 - Secret Management made easy
Commit 2024 - Secret Management made easyCommit 2024 - Secret Management made easy
Commit 2024 - Secret Management made easyAlfredo García Lavilla
 

Dernier (20)

SAP Build Work Zone - Overview L2-L3.pptx
SAP Build Work Zone - Overview L2-L3.pptxSAP Build Work Zone - Overview L2-L3.pptx
SAP Build Work Zone - Overview L2-L3.pptx
 
Nell’iperspazio con Rocket: il Framework Web di Rust!
Nell’iperspazio con Rocket: il Framework Web di Rust!Nell’iperspazio con Rocket: il Framework Web di Rust!
Nell’iperspazio con Rocket: il Framework Web di Rust!
 
Human Factors of XR: Using Human Factors to Design XR Systems
Human Factors of XR: Using Human Factors to Design XR SystemsHuman Factors of XR: Using Human Factors to Design XR Systems
Human Factors of XR: Using Human Factors to Design XR Systems
 
"LLMs for Python Engineers: Advanced Data Analysis and Semantic Kernel",Oleks...
"LLMs for Python Engineers: Advanced Data Analysis and Semantic Kernel",Oleks..."LLMs for Python Engineers: Advanced Data Analysis and Semantic Kernel",Oleks...
"LLMs for Python Engineers: Advanced Data Analysis and Semantic Kernel",Oleks...
 
Connect Wave/ connectwave Pitch Deck Presentation
Connect Wave/ connectwave Pitch Deck PresentationConnect Wave/ connectwave Pitch Deck Presentation
Connect Wave/ connectwave Pitch Deck Presentation
 
CloudStudio User manual (basic edition):
CloudStudio User manual (basic edition):CloudStudio User manual (basic edition):
CloudStudio User manual (basic edition):
 
Leverage Zilliz Serverless - Up to 50X Saving for Your Vector Storage Cost
Leverage Zilliz Serverless - Up to 50X Saving for Your Vector Storage CostLeverage Zilliz Serverless - Up to 50X Saving for Your Vector Storage Cost
Leverage Zilliz Serverless - Up to 50X Saving for Your Vector Storage Cost
 
Take control of your SAP testing with UiPath Test Suite
Take control of your SAP testing with UiPath Test SuiteTake control of your SAP testing with UiPath Test Suite
Take control of your SAP testing with UiPath Test Suite
 
"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek Schlawack
"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek Schlawack"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek Schlawack
"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek Schlawack
 
Unraveling Multimodality with Large Language Models.pdf
Unraveling Multimodality with Large Language Models.pdfUnraveling Multimodality with Large Language Models.pdf
Unraveling Multimodality with Large Language Models.pdf
 
Hyperautomation and AI/ML: A Strategy for Digital Transformation Success.pdf
Hyperautomation and AI/ML: A Strategy for Digital Transformation Success.pdfHyperautomation and AI/ML: A Strategy for Digital Transformation Success.pdf
Hyperautomation and AI/ML: A Strategy for Digital Transformation Success.pdf
 
Artificial intelligence in cctv survelliance.pptx
Artificial intelligence in cctv survelliance.pptxArtificial intelligence in cctv survelliance.pptx
Artificial intelligence in cctv survelliance.pptx
 
Vertex AI Gemini Prompt Engineering Tips
Vertex AI Gemini Prompt Engineering TipsVertex AI Gemini Prompt Engineering Tips
Vertex AI Gemini Prompt Engineering Tips
 
Designing IA for AI - Information Architecture Conference 2024
Designing IA for AI - Information Architecture Conference 2024Designing IA for AI - Information Architecture Conference 2024
Designing IA for AI - Information Architecture Conference 2024
 
Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)
Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)
Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)
 
DevEX - reference for building teams, processes, and platforms
DevEX - reference for building teams, processes, and platformsDevEX - reference for building teams, processes, and platforms
DevEX - reference for building teams, processes, and platforms
 
DevoxxFR 2024 Reproducible Builds with Apache Maven
DevoxxFR 2024 Reproducible Builds with Apache MavenDevoxxFR 2024 Reproducible Builds with Apache Maven
DevoxxFR 2024 Reproducible Builds with Apache Maven
 
DMCC Future of Trade Web3 - Special Edition
DMCC Future of Trade Web3 - Special EditionDMCC Future of Trade Web3 - Special Edition
DMCC Future of Trade Web3 - Special Edition
 
Advanced Computer Architecture – An Introduction
Advanced Computer Architecture – An IntroductionAdvanced Computer Architecture – An Introduction
Advanced Computer Architecture – An Introduction
 
Commit 2024 - Secret Management made easy
Commit 2024 - Secret Management made easyCommit 2024 - Secret Management made easy
Commit 2024 - Secret Management made easy
 

Web Security

  • 1. 1 A SOLUTION FOR ATTACK VECTORS AGAINST WEB APPLICATIONS USING AJAX
  • 2. 2 ABSTRACT Web applications are most predominated applications that are accessed over a network such as Internet. Web applications are presentation-oriented that generates interactive web pages containing various types of markup language (HTML, XML, and so on) and dynamic content in response to requests. As there is heavy traffic in today‟s web world it is essential to maintain security concerns and prevention approaches in order to protect web applications from cyber culprits. These applications are increasingly the preferred targets of cyber criminals looking to get profit from identity theft and other illegal activities. There are modern tools and technologies such as AJAX technology are available to prepare web applications as simple as user friendly. Ajax web technology, by design makes number of calls to the web server to process a user request. As there is an increase in session management vulnerabilities and a greater risk of hackers gaining access to the many hidden URLs that are necessary for AJAX requests to be processed we need to provide high-end web security measures to protect web sites from vulnerabilities. Web security is the act of protecting authorized users from malicious threats. The current solution addresses most common threats occurred at client side such as CSS(Cross Site Scripting) and SQL Injection.
  • 3. 3 INTRODUCTION • Web application is software application accessed by users over internet • 2 variants. – Static web sites – Dynamic web applications • Static web sites consists of content oriented web pages used for blogs, wiki sites. • Dynamic web applications are interactive and more service based applications contains stored and processed content. • Developed using browser supported scripting, markup languages on client side and efficient server side programming. • Used for social network activity, ecommerce business applications …...
  • 4. 4
  • 5. 5 WEB SECURITY • Sensitive data increasingly spread over the network. • The more number of vulnerabilities and and security incidents reported as there wide availability of data. • Web applications should have control over – Confidentiality – Integrity – Availability – Authentication – Authorization • Common vulnerabilities – SQL Injection Attacks – CSRF(CSS Variant) Attacks
  • 6. 6 SQL Injection Attack • SQLIA is server side attack that manipulates content in back end database system • Embeds malformed query statements in input data and compromises query execution process. • Attacks against confidentiality, availability and integrity services • Unauthorized access to database and attacks with malformed DML statements. • Various SQL injection formats: – Tautologies. • SELECT u.name FROM users u WHERE u.login=‟‟ OR 1=1 – „ AND u.passwd=*** – UNION Queries. • SELECT acct FROM users WHERE login=‟ ‟ UNION SELECT transaction FROM transactions WHERE acct_no=9012 – AND passwd=**** – Piggy back queries. • SELECT name FROM users WHERE login=‟xyz‟ AND passwd=‟***‟ ; DROP TABLE system.users
  • 8. 8 SQLIA Existing Solutions SQL Injection • Syntax analysis and prevention. • White list patterns and black list patterns • Parameterized prepared statements with attributes
  • 9. 9 SQLIA Proposed Solution SQL Injection Attack prevention – Use Encode and Decode the crucial data. – The encrypted data is persisted in database system – User‟s input data is get encrypted before query processing – The critical data is decrypted while retrieval from database. Advantages: – Malformed query formation not possible. – No Query preprocessing or manual checks required. Disadvantages: – Require additional space to store cipher data instead of plain data.
  • 11. 11 CSRF (Cross Site Request Forgery) Attack • CSS(Cross Site Script) is client side script attack. scripts embedded in a page which are executed on the client-side. • Cookie captures and hijacks legitimate users sessions. • CSRF is typical CSS variant which sends unauthorized commands from valid user to the server. • Malicious script or URLs embedded into blog contents or hidden in image tags. – <img src=“http://buggy-site.com/hacked”/> • Attacks against Identity theft and cheats business transactions. • Unauthorized crucial form data post activity. – <script>document.getElementById(„form‟).submit()</script>
  • 12. 12 Existing Solutions CSS and CSRF prevention – User input validations – HTML encoded characters – Client IP Binding – Session life time limitations – Disable the client side script executions
  • 13. 13 CSRF Proposed Solution • CSRF prevention approach – Use secret XSRF token for each GET and POST requests. – Generate unique XSRF secret token for every get request. – Maintain the XSRF token in form pages on client side – Validate the secret XSRF token from the form post data against the previously generated XSRF token on server side <form action=”fundTransfer.do” method=”POST”> <input type=”hidden” name=”xsrfSecretToken” value=”qiou3hkps986hn”/> <input type=”text” name=”amount”/> <input type=”submit” value=”Send”> </form> Advantages: – Unauthorized form submissions blocked.
  • 15. 15 Instant Media --- An E-commerce Web Application • Is an online market place e-commerce web application. • Provides services to sell or buy soft copies by online or offline. • Supports messages, comments and reviews activity. • Handles critical operations like buying and payment functionalities. • Showcased the application as vulnerable to CSRF and SQLIA threats
  • 16. 16 Modules • User signup and login process. • Publish soft copy items. • Purchase soft copies and payment transaction processing. • Payment activity listing and search functionality. • Messaging • Account details maintainance
  • 23. 23 Screen Captures contd… Search functionality prevented from SQLIA
  • 24. 24 Conclusion • Vulnerabilities can result unauthorized access by injecting malicious scripts. • Most of the web security attacks targeted on critical e- commerce web sites. • Manual or automated inspections required in validating the input submitted by end users. • The suggested solution can prevent more number of CSRF, SQLIA threats. • No compute overhead, platform independent and scalable solution for any web applications. • Need to address website sever attacks like web site crawling and hidden URLs spawn activities. • Need to be alert and and get up to date with latest web application development technologies.
  • 25. 25 References • Jayamsakthi Shanmugam, M.Ponnavaikko, XSS Application Worms, IEEE, 8th ACIS International Conference on Software Engineering, 2007. • Xiang Fu, A Static Analysis Framework For Detecting SQL Injection Vulnerabilities, IEEE, 31st Annual International Computer Software and Applications Conference, 2007. • Preventive Approaches Fro Web Application‟s Security Attacks, International Conference on Software Engineering, 2009. • http://www.isecpartners.com • Jeremiah Grossman, Cross-Site Request Forgery "The sleeping giant”. www.whitehatsec.com. • http://www.webappsec.org/projects/statistics/