SlideShare une entreprise Scribd logo
1  sur  34
Application
                                           Security

           Dilan Warnakulasooriya                              Asanka Fernandopulle

           Information Security Engineer                       Senior Software Engineer
           99X Technology                                      99X Technology


1/1/2013                                   99X Technology(c)                              1
Basics of Application Security
           • HTTP and HTTPS

              •   Symmetric key
              •   Asymmetric key
              •   Session key
              •   Analyzing a certificate
              •   Sniffing HTTP and HTTPS
              •   Calomel plugin




1/1/2013                             99X Technology(c)   2
Basics of Application Security
           • Man in the middle

              • Analyzing browser requests
              • Analyzing server response
              • https communication

              •   https and s-http




1/1/2013                             99X Technology(c)   3
Basics of Application Security

           • What OWASP does

              • Builders , Breakers and Defenders




1/1/2013                             99X Technology(c)   4
Web Application penetration testing

           • Basic web testing methodology

               • Vulnerability, Threat and Exploit


           • Developer level application security overview




1/1/2013                               99X Technology(c)     5
Web Application penetration testing

           • Application Security frameworks

               •   Before development begins
               •   During definition and design
               •   During development
               •   During deployment
               •   Maintenance and operations




1/1/2013                               99X Technology(c)   6
Web Application penetration testing
              • Web application security review frameworks

                  •   Samurai WTF
                  •   Websecurify
                  •   Wapiti
                  •   Skiffish
                  •   Acunetix
                  •   Webscarab
                  •   W3af




1/1/2013                            99X Technology(c)        7
Secure Authentication
           • Authentication/Access control methods




1/1/2013                           99X Technology(c)   8
Secure Authentication

           • Authentication bypass techniques

               •   Direct page request
               •   Parameter modification
               •   Session ID prediction
               •   Sql injection


               Session predictability - webscarab/burpsuite



1/1/2013                              99X Technology(c)       9
Secure Authentication

           • Bypass authentication matrix

               •   Basic authentication
               •   Multi-Level login 1
               •   Multi-Level login 2




1/1/2013                                  99X Technology(c)   10
Secure Authentication
           • Password remember

              • Password strength
              • Forgot password


           • Browser cache management




1/1/2013                            99X Technology(c)   11
Secure Authentication
           • Parameter tampering

                • Bypass HTML Field restrictions
                • Exploit hidden fields
                • Bypass client side JavaScript validation


           •   Coding controls for Parameter Tampering




1/1/2013                                 99X Technology(c)   12
Secure Authentication
           • Access control flaws

               • Using an Access control matrix
               • Bypass a path based access control scheme
               • Bypass data layer access control




1/1/2013                              99X Technology(c)      13
Injections
           • SQL injection classes

               • In band
               • Out of band
               • Inferential




1/1/2013                             99X Technology(c)   14
Injections
           • Techniques to exploit sql injections

               •   Union operator
               •   Boolean
               •   Error based
               •   Out of band
               •   Time delay




1/1/2013                             99X Technology(c)   15
Injections
           • Standard SQL injection testing

               • SELECT * FROM Users WHERE Username='$username' AND
                 Password='$password'

               • Numeric sql injection




1/1/2013                            99X Technology(c)                 16
Injections
           • Union Exploitation technique

               • Xpath injection
               • String sql injection




1/1/2013                                99X Technology(c)   17
Injections
           • Boolean Exploitation technique


               • Sql injection : stage 1 : String sql injection

               • Stage 3 : Numeric sql injection




1/1/2013                                 99X Technology(c)        18
Injections
           • Error based Exploitation technique


                   • Modify data with sql injection

                   • Add data with sql injection




1/1/2013                             99X Technology(c)   19
Injections
           • Out of band Exploitation technique




1/1/2013                          99X Technology(c)   20
Injections
           • Time delay Exploitation technique

           • Stored procedure Exploitation technique

           • Automated Exploitation technique




1/1/2013                          99X Technology(c)    21
Injections
           • How developers work on SQL injection


           • Automate your injection

               • sqlmap




1/1/2013                         99X Technology(c)   22
Session Management
           • Session management techniques

           • Session management vulnerability

               • insufficient session id length
               • Session fixation
               • Session variable overloading




1/1/2013                               99X Technology(c)   23
Session Management
           • Check your cookies

               • Cookie collection
               • Cookie reverse engineering
               • Cookie manipulation

           • Hijack a session

               • Hijack a session
               • Spoof an authentication cookie
               • Session fixation



1/1/2013                             99X Technology(c)   24
Session Management

           • How developers work on session handling




1/1/2013                          99X Technology(c)    25
Code Quality

           • Code quality breach

               • Discover clues in the HTML




1/1/2013                             99X Technology(c)   26
Cross Site Scripting
           • Scripting types

               •   Reflected cross site scripting (non-persistent XSS)
               •   Stored cross site scripting (second-order XSS)
               •   DOM based cross site scripting (type 0 xss)




1/1/2013                                99X Technology(c)                27
Cross Site Scripting

           • Reflected cross site scripting (non-persistent XSS)


           • Testing for reflected XSS

               •   Reflected xss




1/1/2013                             99X Technology(c)             28
Cross Site Scripting

           • Bypass XSS filters

               •   Tag Attribute Value
               •   Different syntax or enconding
               •   Bypassing non-recursive filtering




1/1/2013                               99X Technology(c)   29
Cross Site Scripting


           • Stored cross site scripting (second-order XSS)

           • XSS attack scenario

               •   Stored XSS




1/1/2013                            99X Technology(c)         30
Cross Site Scripting

           • Testing for Stored cross site scripting

               •   Input forms
               •   Analyze HTML code
               •   Exploitation framework
               •   File upload




1/1/2013                            99X Technology(c)   31
Cross Site Scripting

           • How developer handle XSS and CSRF




1/1/2013                          99X Technology(c)   32
Testing Tools
           • Proxy

           • How to write secure programs




1/1/2013                          99X Technology(c)   33
Thank you




1/1/2013   99X Technology(c)   34

Contenu connexe

Similaire à Application security overview

Azure 101: Shared responsibility in the Azure Cloud
Azure 101: Shared responsibility in the Azure CloudAzure 101: Shared responsibility in the Azure Cloud
Azure 101: Shared responsibility in the Azure CloudPaulo Renato
 
tcp cloud in AVG
tcp cloud in AVGtcp cloud in AVG
tcp cloud in AVGtcp cloud
 
Understanding container security
Understanding container securityUnderstanding container security
Understanding container securityJohn Kinsella
 
Review of Hardware based solutions for trusted cloud computing.pptx
Review of Hardware based solutions for trusted cloud computing.pptxReview of Hardware based solutions for trusted cloud computing.pptx
Review of Hardware based solutions for trusted cloud computing.pptxssusere142fe
 
19-f15-mobile-security.pptx
19-f15-mobile-security.pptx19-f15-mobile-security.pptx
19-f15-mobile-security.pptxJhansigali
 
Protecting Against Web App Attacks
Protecting Against Web App AttacksProtecting Against Web App Attacks
Protecting Against Web App AttacksAlert Logic
 
Protecting microservices using secure design patterns 1.0
Protecting microservices using secure design patterns 1.0Protecting microservices using secure design patterns 1.0
Protecting microservices using secure design patterns 1.0Trupti Shiralkar, CISSP
 
Application Security - 28 Nov 2018
Application Security - 28 Nov 2018Application Security - 28 Nov 2018
Application Security - 28 Nov 2018Cheah Eng Soon
 
Deployment of Juniper Contrail in AVG Technologies
Deployment of Juniper Contrail in AVG TechnologiesDeployment of Juniper Contrail in AVG Technologies
Deployment of Juniper Contrail in AVG TechnologiesMarketingArrowECS_CZ
 
Isse 2014 homomorphic encryption and porticor post event
Isse 2014 homomorphic encryption and porticor   post eventIsse 2014 homomorphic encryption and porticor   post event
Isse 2014 homomorphic encryption and porticor post eventICT Economic Impact
 
Securing Microservices in Containerized Environments
Securing Microservices in Containerized Environments Securing Microservices in Containerized Environments
Securing Microservices in Containerized Environments DevOps.com
 
Shared Security Responsibility for the Azure Cloud
Shared Security Responsibility for the Azure CloudShared Security Responsibility for the Azure Cloud
Shared Security Responsibility for the Azure CloudAlert Logic
 
Protecting Against Web Attacks
Protecting Against Web AttacksProtecting Against Web Attacks
Protecting Against Web AttacksAlert Logic
 
java-card20232024999999999999999999999999999999999999999999999999999999999999...
java-card20232024999999999999999999999999999999999999999999999999999999999999...java-card20232024999999999999999999999999999999999999999999999999999999999999...
java-card20232024999999999999999999999999999999999999999999999999999999999999...ouahibakellou
 
Cyber Security and Cloud Computing
Cyber Security and Cloud ComputingCyber Security and Cloud Computing
Cyber Security and Cloud ComputingKeet Sugathadasa
 
Started In Security Now I'm Here
Started In Security Now I'm HereStarted In Security Now I'm Here
Started In Security Now I'm HereChristopher Grayson
 

Similaire à Application security overview (20)

Azure 101: Shared responsibility in the Azure Cloud
Azure 101: Shared responsibility in the Azure CloudAzure 101: Shared responsibility in the Azure Cloud
Azure 101: Shared responsibility in the Azure Cloud
 
tcp cloud in AVG
tcp cloud in AVGtcp cloud in AVG
tcp cloud in AVG
 
QNX Sales Engineering Presentation
QNX Sales Engineering PresentationQNX Sales Engineering Presentation
QNX Sales Engineering Presentation
 
Understanding container security
Understanding container securityUnderstanding container security
Understanding container security
 
Review of Hardware based solutions for trusted cloud computing.pptx
Review of Hardware based solutions for trusted cloud computing.pptxReview of Hardware based solutions for trusted cloud computing.pptx
Review of Hardware based solutions for trusted cloud computing.pptx
 
Fortinet sandboxing
Fortinet sandboxingFortinet sandboxing
Fortinet sandboxing
 
19-f15-mobile-security.pptx
19-f15-mobile-security.pptx19-f15-mobile-security.pptx
19-f15-mobile-security.pptx
 
Protecting Against Web App Attacks
Protecting Against Web App AttacksProtecting Against Web App Attacks
Protecting Against Web App Attacks
 
Protecting microservices using secure design patterns 1.0
Protecting microservices using secure design patterns 1.0Protecting microservices using secure design patterns 1.0
Protecting microservices using secure design patterns 1.0
 
Application Security - 28 Nov 2018
Application Security - 28 Nov 2018Application Security - 28 Nov 2018
Application Security - 28 Nov 2018
 
Deployment of Juniper Contrail in AVG Technologies
Deployment of Juniper Contrail in AVG TechnologiesDeployment of Juniper Contrail in AVG Technologies
Deployment of Juniper Contrail in AVG Technologies
 
Isse 2014 homomorphic encryption and porticor post event
Isse 2014 homomorphic encryption and porticor   post eventIsse 2014 homomorphic encryption and porticor   post event
Isse 2014 homomorphic encryption and porticor post event
 
Security for developers
Security for developersSecurity for developers
Security for developers
 
Securing Microservices in Containerized Environments
Securing Microservices in Containerized Environments Securing Microservices in Containerized Environments
Securing Microservices in Containerized Environments
 
Shared Security Responsibility for the Azure Cloud
Shared Security Responsibility for the Azure CloudShared Security Responsibility for the Azure Cloud
Shared Security Responsibility for the Azure Cloud
 
Protecting Against Web Attacks
Protecting Against Web AttacksProtecting Against Web Attacks
Protecting Against Web Attacks
 
java-card20232024999999999999999999999999999999999999999999999999999999999999...
java-card20232024999999999999999999999999999999999999999999999999999999999999...java-card20232024999999999999999999999999999999999999999999999999999999999999...
java-card20232024999999999999999999999999999999999999999999999999999999999999...
 
Cyber Security and Cloud Computing
Cyber Security and Cloud ComputingCyber Security and Cloud Computing
Cyber Security and Cloud Computing
 
Containers and Security for DevOps
Containers and Security for DevOpsContainers and Security for DevOps
Containers and Security for DevOps
 
Started In Security Now I'm Here
Started In Security Now I'm HereStarted In Security Now I'm Here
Started In Security Now I'm Here
 

Dernier

Developer Data Modeling Mistakes: From Postgres to NoSQL
Developer Data Modeling Mistakes: From Postgres to NoSQLDeveloper Data Modeling Mistakes: From Postgres to NoSQL
Developer Data Modeling Mistakes: From Postgres to NoSQLScyllaDB
 
What's New in Teams Calling, Meetings and Devices March 2024
What's New in Teams Calling, Meetings and Devices March 2024What's New in Teams Calling, Meetings and Devices March 2024
What's New in Teams Calling, Meetings and Devices March 2024Stephanie Beckett
 
Commit 2024 - Secret Management made easy
Commit 2024 - Secret Management made easyCommit 2024 - Secret Management made easy
Commit 2024 - Secret Management made easyAlfredo García Lavilla
 
TeamStation AI System Report LATAM IT Salaries 2024
TeamStation AI System Report LATAM IT Salaries 2024TeamStation AI System Report LATAM IT Salaries 2024
TeamStation AI System Report LATAM IT Salaries 2024Lonnie McRorey
 
From Family Reminiscence to Scholarly Archive .
From Family Reminiscence to Scholarly Archive .From Family Reminiscence to Scholarly Archive .
From Family Reminiscence to Scholarly Archive .Alan Dix
 
Take control of your SAP testing with UiPath Test Suite
Take control of your SAP testing with UiPath Test SuiteTake control of your SAP testing with UiPath Test Suite
Take control of your SAP testing with UiPath Test SuiteDianaGray10
 
"ML in Production",Oleksandr Bagan
"ML in Production",Oleksandr Bagan"ML in Production",Oleksandr Bagan
"ML in Production",Oleksandr BaganFwdays
 
Merck Moving Beyond Passwords: FIDO Paris Seminar.pptx
Merck Moving Beyond Passwords: FIDO Paris Seminar.pptxMerck Moving Beyond Passwords: FIDO Paris Seminar.pptx
Merck Moving Beyond Passwords: FIDO Paris Seminar.pptxLoriGlavin3
 
Artificial intelligence in cctv survelliance.pptx
Artificial intelligence in cctv survelliance.pptxArtificial intelligence in cctv survelliance.pptx
Artificial intelligence in cctv survelliance.pptxhariprasad279825
 
DSPy a system for AI to Write Prompts and Do Fine Tuning
DSPy a system for AI to Write Prompts and Do Fine TuningDSPy a system for AI to Write Prompts and Do Fine Tuning
DSPy a system for AI to Write Prompts and Do Fine TuningLars Bell
 
Anypoint Exchange: It’s Not Just a Repo!
Anypoint Exchange: It’s Not Just a Repo!Anypoint Exchange: It’s Not Just a Repo!
Anypoint Exchange: It’s Not Just a Repo!Manik S Magar
 
New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024BookNet Canada
 
Nell’iperspazio con Rocket: il Framework Web di Rust!
Nell’iperspazio con Rocket: il Framework Web di Rust!Nell’iperspazio con Rocket: il Framework Web di Rust!
Nell’iperspazio con Rocket: il Framework Web di Rust!Commit University
 
How AI, OpenAI, and ChatGPT impact business and software.
How AI, OpenAI, and ChatGPT impact business and software.How AI, OpenAI, and ChatGPT impact business and software.
How AI, OpenAI, and ChatGPT impact business and software.Curtis Poe
 
Leverage Zilliz Serverless - Up to 50X Saving for Your Vector Storage Cost
Leverage Zilliz Serverless - Up to 50X Saving for Your Vector Storage CostLeverage Zilliz Serverless - Up to 50X Saving for Your Vector Storage Cost
Leverage Zilliz Serverless - Up to 50X Saving for Your Vector Storage CostZilliz
 
"LLMs for Python Engineers: Advanced Data Analysis and Semantic Kernel",Oleks...
"LLMs for Python Engineers: Advanced Data Analysis and Semantic Kernel",Oleks..."LLMs for Python Engineers: Advanced Data Analysis and Semantic Kernel",Oleks...
"LLMs for Python Engineers: Advanced Data Analysis and Semantic Kernel",Oleks...Fwdays
 
"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek Schlawack
"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek Schlawack"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek Schlawack
"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek SchlawackFwdays
 
Powerpoint exploring the locations used in television show Time Clash
Powerpoint exploring the locations used in television show Time ClashPowerpoint exploring the locations used in television show Time Clash
Powerpoint exploring the locations used in television show Time Clashcharlottematthew16
 
Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024BookNet Canada
 

Dernier (20)

Developer Data Modeling Mistakes: From Postgres to NoSQL
Developer Data Modeling Mistakes: From Postgres to NoSQLDeveloper Data Modeling Mistakes: From Postgres to NoSQL
Developer Data Modeling Mistakes: From Postgres to NoSQL
 
What's New in Teams Calling, Meetings and Devices March 2024
What's New in Teams Calling, Meetings and Devices March 2024What's New in Teams Calling, Meetings and Devices March 2024
What's New in Teams Calling, Meetings and Devices March 2024
 
Commit 2024 - Secret Management made easy
Commit 2024 - Secret Management made easyCommit 2024 - Secret Management made easy
Commit 2024 - Secret Management made easy
 
TeamStation AI System Report LATAM IT Salaries 2024
TeamStation AI System Report LATAM IT Salaries 2024TeamStation AI System Report LATAM IT Salaries 2024
TeamStation AI System Report LATAM IT Salaries 2024
 
From Family Reminiscence to Scholarly Archive .
From Family Reminiscence to Scholarly Archive .From Family Reminiscence to Scholarly Archive .
From Family Reminiscence to Scholarly Archive .
 
Take control of your SAP testing with UiPath Test Suite
Take control of your SAP testing with UiPath Test SuiteTake control of your SAP testing with UiPath Test Suite
Take control of your SAP testing with UiPath Test Suite
 
"ML in Production",Oleksandr Bagan
"ML in Production",Oleksandr Bagan"ML in Production",Oleksandr Bagan
"ML in Production",Oleksandr Bagan
 
Merck Moving Beyond Passwords: FIDO Paris Seminar.pptx
Merck Moving Beyond Passwords: FIDO Paris Seminar.pptxMerck Moving Beyond Passwords: FIDO Paris Seminar.pptx
Merck Moving Beyond Passwords: FIDO Paris Seminar.pptx
 
Artificial intelligence in cctv survelliance.pptx
Artificial intelligence in cctv survelliance.pptxArtificial intelligence in cctv survelliance.pptx
Artificial intelligence in cctv survelliance.pptx
 
DSPy a system for AI to Write Prompts and Do Fine Tuning
DSPy a system for AI to Write Prompts and Do Fine TuningDSPy a system for AI to Write Prompts and Do Fine Tuning
DSPy a system for AI to Write Prompts and Do Fine Tuning
 
Anypoint Exchange: It’s Not Just a Repo!
Anypoint Exchange: It’s Not Just a Repo!Anypoint Exchange: It’s Not Just a Repo!
Anypoint Exchange: It’s Not Just a Repo!
 
New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
 
Nell’iperspazio con Rocket: il Framework Web di Rust!
Nell’iperspazio con Rocket: il Framework Web di Rust!Nell’iperspazio con Rocket: il Framework Web di Rust!
Nell’iperspazio con Rocket: il Framework Web di Rust!
 
DMCC Future of Trade Web3 - Special Edition
DMCC Future of Trade Web3 - Special EditionDMCC Future of Trade Web3 - Special Edition
DMCC Future of Trade Web3 - Special Edition
 
How AI, OpenAI, and ChatGPT impact business and software.
How AI, OpenAI, and ChatGPT impact business and software.How AI, OpenAI, and ChatGPT impact business and software.
How AI, OpenAI, and ChatGPT impact business and software.
 
Leverage Zilliz Serverless - Up to 50X Saving for Your Vector Storage Cost
Leverage Zilliz Serverless - Up to 50X Saving for Your Vector Storage CostLeverage Zilliz Serverless - Up to 50X Saving for Your Vector Storage Cost
Leverage Zilliz Serverless - Up to 50X Saving for Your Vector Storage Cost
 
"LLMs for Python Engineers: Advanced Data Analysis and Semantic Kernel",Oleks...
"LLMs for Python Engineers: Advanced Data Analysis and Semantic Kernel",Oleks..."LLMs for Python Engineers: Advanced Data Analysis and Semantic Kernel",Oleks...
"LLMs for Python Engineers: Advanced Data Analysis and Semantic Kernel",Oleks...
 
"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek Schlawack
"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek Schlawack"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek Schlawack
"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek Schlawack
 
Powerpoint exploring the locations used in television show Time Clash
Powerpoint exploring the locations used in television show Time ClashPowerpoint exploring the locations used in television show Time Clash
Powerpoint exploring the locations used in television show Time Clash
 
Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
 

Application security overview

  • 1. Application Security Dilan Warnakulasooriya Asanka Fernandopulle Information Security Engineer Senior Software Engineer 99X Technology 99X Technology 1/1/2013 99X Technology(c) 1
  • 2. Basics of Application Security • HTTP and HTTPS • Symmetric key • Asymmetric key • Session key • Analyzing a certificate • Sniffing HTTP and HTTPS • Calomel plugin 1/1/2013 99X Technology(c) 2
  • 3. Basics of Application Security • Man in the middle • Analyzing browser requests • Analyzing server response • https communication • https and s-http 1/1/2013 99X Technology(c) 3
  • 4. Basics of Application Security • What OWASP does • Builders , Breakers and Defenders 1/1/2013 99X Technology(c) 4
  • 5. Web Application penetration testing • Basic web testing methodology • Vulnerability, Threat and Exploit • Developer level application security overview 1/1/2013 99X Technology(c) 5
  • 6. Web Application penetration testing • Application Security frameworks • Before development begins • During definition and design • During development • During deployment • Maintenance and operations 1/1/2013 99X Technology(c) 6
  • 7. Web Application penetration testing • Web application security review frameworks • Samurai WTF • Websecurify • Wapiti • Skiffish • Acunetix • Webscarab • W3af 1/1/2013 99X Technology(c) 7
  • 8. Secure Authentication • Authentication/Access control methods 1/1/2013 99X Technology(c) 8
  • 9. Secure Authentication • Authentication bypass techniques • Direct page request • Parameter modification • Session ID prediction • Sql injection Session predictability - webscarab/burpsuite 1/1/2013 99X Technology(c) 9
  • 10. Secure Authentication • Bypass authentication matrix • Basic authentication • Multi-Level login 1 • Multi-Level login 2 1/1/2013 99X Technology(c) 10
  • 11. Secure Authentication • Password remember • Password strength • Forgot password • Browser cache management 1/1/2013 99X Technology(c) 11
  • 12. Secure Authentication • Parameter tampering • Bypass HTML Field restrictions • Exploit hidden fields • Bypass client side JavaScript validation • Coding controls for Parameter Tampering 1/1/2013 99X Technology(c) 12
  • 13. Secure Authentication • Access control flaws • Using an Access control matrix • Bypass a path based access control scheme • Bypass data layer access control 1/1/2013 99X Technology(c) 13
  • 14. Injections • SQL injection classes • In band • Out of band • Inferential 1/1/2013 99X Technology(c) 14
  • 15. Injections • Techniques to exploit sql injections • Union operator • Boolean • Error based • Out of band • Time delay 1/1/2013 99X Technology(c) 15
  • 16. Injections • Standard SQL injection testing • SELECT * FROM Users WHERE Username='$username' AND Password='$password' • Numeric sql injection 1/1/2013 99X Technology(c) 16
  • 17. Injections • Union Exploitation technique • Xpath injection • String sql injection 1/1/2013 99X Technology(c) 17
  • 18. Injections • Boolean Exploitation technique • Sql injection : stage 1 : String sql injection • Stage 3 : Numeric sql injection 1/1/2013 99X Technology(c) 18
  • 19. Injections • Error based Exploitation technique • Modify data with sql injection • Add data with sql injection 1/1/2013 99X Technology(c) 19
  • 20. Injections • Out of band Exploitation technique 1/1/2013 99X Technology(c) 20
  • 21. Injections • Time delay Exploitation technique • Stored procedure Exploitation technique • Automated Exploitation technique 1/1/2013 99X Technology(c) 21
  • 22. Injections • How developers work on SQL injection • Automate your injection • sqlmap 1/1/2013 99X Technology(c) 22
  • 23. Session Management • Session management techniques • Session management vulnerability • insufficient session id length • Session fixation • Session variable overloading 1/1/2013 99X Technology(c) 23
  • 24. Session Management • Check your cookies • Cookie collection • Cookie reverse engineering • Cookie manipulation • Hijack a session • Hijack a session • Spoof an authentication cookie • Session fixation 1/1/2013 99X Technology(c) 24
  • 25. Session Management • How developers work on session handling 1/1/2013 99X Technology(c) 25
  • 26. Code Quality • Code quality breach • Discover clues in the HTML 1/1/2013 99X Technology(c) 26
  • 27. Cross Site Scripting • Scripting types • Reflected cross site scripting (non-persistent XSS) • Stored cross site scripting (second-order XSS) • DOM based cross site scripting (type 0 xss) 1/1/2013 99X Technology(c) 27
  • 28. Cross Site Scripting • Reflected cross site scripting (non-persistent XSS) • Testing for reflected XSS • Reflected xss 1/1/2013 99X Technology(c) 28
  • 29. Cross Site Scripting • Bypass XSS filters • Tag Attribute Value • Different syntax or enconding • Bypassing non-recursive filtering 1/1/2013 99X Technology(c) 29
  • 30. Cross Site Scripting • Stored cross site scripting (second-order XSS) • XSS attack scenario • Stored XSS 1/1/2013 99X Technology(c) 30
  • 31. Cross Site Scripting • Testing for Stored cross site scripting • Input forms • Analyze HTML code • Exploitation framework • File upload 1/1/2013 99X Technology(c) 31
  • 32. Cross Site Scripting • How developer handle XSS and CSRF 1/1/2013 99X Technology(c) 32
  • 33. Testing Tools • Proxy • How to write secure programs 1/1/2013 99X Technology(c) 33
  • 34. Thank you 1/1/2013 99X Technology(c) 34