SlideShare une entreprise Scribd logo
1  sur  54
Télécharger pour lire hors ligne
Web Application Security (PHP)
Zakieh Alizadeh
zakiehalizadeh@gmail.com
APALaboratory – FerdowsiUniversity of Mashhad
Session 1
Web Application Architecture
Web Application Architecture
q Table of Content
§ Description	of	"Web	Application	Architecture"
§ Web	Application	Technologies
§ Scenario	:	"	Tampering	HTTP	Requests	"
o Introducing	HTTP	Protocol
• HTTP	Requests	and	Responses
• HTTP	Methods
• URLs
• HTTP	Headers
• Cookies
• HTTP	Proxies
o Web	Functionality
• Server-Side	Functionality
• Client-Side	Functionality
Web Application Architecture
oWeb	Application	Architecture
o HTTP
oWeb	Functionality
• Server-Side	Functionality
• Client-Side	Functionality
Web Application Architecture
q Web Application Architecture
§ Web	applications	are	computer	programs	allowing	website	visitors	to	submit	and	retrieve	
data	to/from	a	database over	the	Internet	using	their	preferred	web	browser.	The	data	is	
then	presented	to	the	user	within	their	browser	as	information	is	generated	dynamically	(in	
a	specific	format,	e.g.	in	HTML	using	CSS)	by	the	web	application	through	a	web	server.
§ Web	browsers	are	software	applications	that	allow	users	to	retrieve	data	and	interact	with	
content	located	on	web	pages	within	a	website
Web Application Architecture
qWeb Application Architecture
§ How	to	server	and	client	communicate?	
HTTP
Protcol
Web Application Architecture
q Web Application Architecture
1. A	person	types	in	the	URL	of	the	internet	website	that	he/she	wants	to	visit:
o http://www.cert.um.ac.ir/login.php?username=test&&pass=123456
2. The	client	browser	then	splits	the	URL	to	three	separate	parts:
o the	protocol	(in	this	example	it’s	“http”),	
o the	server	address/server	name	(in	this	case	www.cert.um.ac.ir)	
o part	of	the	URL	(i.e.thefile	name)	which	you	requested	for	(in	this	case	it’s	“login.php”).
3. The	next	step	for	the	browser	is	to	send	a	special	“GET”	request	to	the	web	server	in	
order	to	retrieve	the	address	and	the	page	it	has	been	provided.
4. The	browser	will	translate	all	the	data	into	the	HTML	format	and	render	the	result	to	the	
user	on	his/her	screen.
Web Application Architecture
qWeb Application Architecture
Login.php
Code:
If	($user==ali &&	pass==123456)
Username					password
see
Response
DB
Server
http://www.cert.um.ac.ir/login.php?	 username=test&&pass=123456
Web Application Architecture
oWeb	Application	Architecture
o HTTP
oWeb	Functionality
• Server-Side	Functionality
• Client-Side	Functionality
HTTP
qHTTP
§ HTTP	is	Client-Server	Protocole.	Http	uses	a	message-based	model	in	
which	a	client	sends	a	request	message,and the	server	returns	a	response	
message.
HTTP
qWeb Application Architecture
§ HTTP
HTTP
q HTTP History
§ HTTP	v0.9	: The	first	documented	version	of	HTTP	was	HTTP	V0.9 (1991).	The	first	version	of	the	protocol	
had	only	one	method,	namely	GET,	which	would	request	a	page	from	a	server
o Request	Methode :Get
§ HTTP/1.0:		RFC	1945	officially	introduced	and	recognized	HTTP	V1.0	in	1996.
o Request	Methode s:	GET,	POST	and	HEAD
§ HTTP	/1.1	:	The	HTTP/1.1	standard	as	defined	in	RFC	2068	was	officially	released	in	January	1997
o Request	Methode s:	GET,	POST	,HEAD,	HTTP/1.1	added	5	new	methods:	 OPTIONS,	PUT,	DELETE,	 TRACE	and	
CONNECT
q Http Messages
§ Http	request	message
§ Http	response	message
HTTP
qHTTP Requests
§ All	HTTP	messages	(requests	and	responses)	consist	of	one	or	more	headers
,each	on	a	separate	line,	followed	by	a	mandatory	blank	line,	followed	by	an	
optional	message	body.	A	typical	HTTP	request	is	as	follows:
HTTP
qHTTP Requests
HTTP
qHTTP Headers
§ All	HTTP	messages	(requests	and	responses)	consist	of	one	or	more	
headers ,each	on	a	separate	line,	followed	by	a	mandatory	blank	line,	
followed	by	an	optional	message	body.
HTTP
qHTTP Headers
HTTP
qHTTP Requests
§ All	HTTP	messages	(requests	and	responses)	consist	of	one	or	more	headers
,each	on	a	separate	line,	followed	by	a	mandatory	blank	line,	followed	by	an	
optional	message	body.	A	typical	HTTP	request	is	as	follows:
HTTP
qHTTP Request Methods
§ HTTP	defines	methods	to	indicate	the	desired	action	to	be	performed	on	
the	identified	resource.
HTTP
qHTTP Request Methods
§ HTTP	defines	methods	to	indicate	the	desired	action	to	be	performed	on	
the	identified	resource.
HTTP
q HTTP Response
§ The	response	message	consists	of	the	following:
o A	Status-Line	(for	example	HTTP/1.1	200	OK)
o Response	Headers,	such	as	Content-Type:	 text/html
o An	empty	line
o An	optional	message	 body
HTTP
qHTTP Status Code
§ Each	HTTP	response	message	must	contain	a	status	code	in	its	first	line,	
indicating	the	result	of	the	request.	The	status	codes	fall	into	five	groups,	
according	to	the	first	digit	of	the	code:
Code Desc Example
1xx Informational. 101	:	Switching	Protocols
2xx The	request	was	successful. 200	:	OK
3xx The	client	is	redirected	to	a	different	resource. 300	:	Multiple	Choices
4xx The	request	contains	an	error	of	some	kind. 400:Bad	Request
5xx The	server	encountered	an	error	fulfilling	the	request. 503	Service	Unavailable
HTTP
qURL
§ A	uniform	resource	locator	(URL)	is	a	unique	identifier	for	a	web	
resource,	via	which	that	resource	can	be	retrieved.
protocol://hostname[:port]/[path/]file[?param=value]
http://cert.um.ac.ir/login.php?	user=Ali	&&	pass=123456
hostname parameterspath
HTTP
qURL
Login.php
Code:
If	($user==ali &&	pass==123456)
Username					password
see
Response
DB
Server
http://cert.um.ac.ir/login.php?	user=Ali	&&	pass=123456
hostname parameterspath
HTTP
q Cookies
§ The	cookie	mechanism	enables	the	server	to	send	items	of	data	to	the	client,	which	
the	client	stores	and	resubmits	back	to	the	server.	Unlike	the	other	types	of	request	
parameters	(those	within	the	URL	query	string	or	the	message	body),	cookies	continue	
to	be	resubmitted	in	each	subsequent	request	without	any	particular	action	required	
by	the	application	or	the	user.
§ A	server	issues	a	cookie	using	the	Set-Cookie	response	header,	as	already	observed:
Set-Cookie			:	theme=black
header value
HTTP
qHTTPS
§ The	The HTTP	protocol	uses	plain	TCP	as	its	transport	mechanism,	which	is	
unencrypted and	so	can	be	intercepted	by	an	attacker	who	is	suitably	
positioned	on	the	network.
§ HTTPS	is	essentially	the	same	application-layer	protocol	as	HTTP,	but	this	is	
tunneled	over	the	secure	transport	mechanism,	Secure	Sockets	Layer	(SSL).
HTTP
qProxy Server
§ In	computer	networks,	a	proxy	server is	a	server (a	computer	system	or	an	
application)	that	acts	as	an	intermediary	for	requests	from	clients seeking	
resources	from	other	servers.
§ A	server that	sits	between	a	client	application,	such	as	a	Web	browser,	and	a	
real	server.	It	intercepts	all	requests	to	the	real	server	to	see	if	it	can	fulfill	the	
requests	itself.	If	not,	it	forwards	the	request	to	the	real	server.
HTTP
qType of Proxy Server
ü Http	proxy	Servser
ü A	one	way	request	retrive web	app.
§ FTP	proxy	Servser
§ SSL	proxy	Servser
§ Socks	Proxy	Server
§ NAT	Proxy	Server
§ Caching	Proxy	Server
§ Web	Proxy	Server
HTTP
qHTTP Proxies
§ An	HTTP	proxy	server	is	a	server	that	mediates	access	between	the	client	
browser	and	the	destination	web	server.	
§ When	a	browser	has	been	configured	to	use	a	proxy	server,	it	makes	all	of	
its	requests	to	that	server,	and	the	proxy	relays	the	requests	to	the	
relevant	web	servers,	and	forwards	their	responses	back	to	the	browser.
HTTP
qHTTP Proxies
§ When	doing	a	manual	security	assessment	of	a	web	application	you	
generally	only	require	a	web	browser	and	a	local	proxy	server	that	allows	
you	to	trap	and	modify	requests.	Some	proxies:
ü Tamper	Data
o Burp	Proxy	
o Owasp Web	Scarab
Other..
HTTP
q HTTP Proxies
ü Tamper	Data
ü Use	tamperdata to	view	and	modify	HTTP/HTTPS	headers	and	post	parameters.	Trace	and	time	http	
response/requests.	 Security	test	web	applications	by	modifying	POST	parameters.
§ Burp	Proxy	
o Burp	Proxy	is	an	interactive	HTTP/S	proxy	server	for	attacking	and	testing	web	applications.	It	
operates	as	a	man-in-the-middle	 between	the	end	browser	and	the	target	web	server,	and	allows	
the	user	to	intercept,	inspect	and	modify	the	raw	traffic	passing	in	both	directions.	
§ Owasp Web	Scarab
o WebScarab is	a	framework	for	analysing applications	that	communicate	using	the	HTTP	and	HTTPS	
protocols.	It	is	written	in	Java,	and	is	thus	portable	to	many	platforms.
Web Application Architecture
oWeb	Application	Architecture
o HTTP
oWeb	Functionality
• Server-Side	Functionality
• Client-Side	Functionality
Web Functionality
q Web Functionality
§ Client	side	is	the	user;s end	of	the	experience,	while	server	side	is	based	on	the	
server's	end.	As	a	developer
o Server-Side	Functionality
o Client-Side	Functionality
Web Functionality
qServer-Side Functionality
§ Server	side,	however,	you	decide	which	platforms,	operating	systems,	
programming	languages,	frameworks,	and	libraries	will	be	used.	a	wide	
range	of	technologies	on	the	server	side	to	deliver	their	functionality:
• Scripting	languages	such	as	PHP,	VBScript,	and	Perl
• Web	application	platforms	such	as	ASP.NET	and	Java.
• Web	servers	such	as	Apache,	IIS,	and	Netscape	Enterprise
• Databases	such	as	MS-SQL,	Oracle,	and	MySQL.
• Other	back-end	components	such	as	file	systems,	SOAP-based	web	services,and
directory	services.
Web Functionality
q Client-Side Functionality
§ In	order	for	the	server-side	application	to	receive	user	input	and	actions,	and	present	the	
results	of	these	back	to	the	user,	it	needs	to	provide	a	client-side.
§ Client	side	Scripting	is	possible	to	be	blocked	,	where	as	server	side	scripting	can't	be	
blocked	by	the	user	,	so	if	you	validate	using	CLIENT	SIDE	only	,	and	client	side	scripting	
blocked	then	even	validation	can	not	be	done	and	directly	even	wrong	data	can	be	accepted	
and	thus	makes	a	flaw	in	the	system.
o HTML
o Hyperlinks
o Forms
o JavaScript
o Java	applets	
o ActiveX	controls
Web Functionality
qIntroducing Some Security Testing Firefox Extensions
§ Cookieh manager.
§ tamperdata
Web Functionality
qScenario : " Tampering HTTPRequests “
§ Instal l	tmper data	add	ons in	firefox
§ Change	username		sent	to	web	app
Web Functionality
qSetting Headers in php
Web Functionality
q4 HTTP Security headers
§ Content-Security-Policy
§ X-Frame-Options
§ X-Content-Type-Options
§ Strict-Transport-Security
Web Functionality
qContent-Security-Policy
§ Adding	the	Content-Security-Policy	header	with	the	appropriate	value	allows	
you	to	restrict	the origin of	the	following:
o script-src: JavaScript	code	(biggest	reason	to	use	this	header)
o connect-src: XMLHttpRequest,	WebSockets,	and	EventSource.
o font-src: fonts
o frame-src: frame	ulrs
o img-src:	images
o media-src: audio	&	video
o object-src: Flash	(and	other	plugins)
o style-src: CSS
Web Functionality
qContent-Security-Policy
Content-Security-Policy:	script-src 'self'	https://apis.google.com
Content-Security-Policy-Report-Only:			script-src 'self';	
report-uri /csp-report-endpoint/
Note:	The	Content-Security-Policy-Report-Only	 header	is	not	supported	inside	a	meta	element.
Web Functionality
qContent-Security-Policy
Web Functionality
qContent-Security-Policy
Web Functionality
qContent-Security-Policy
§ Enforcing	multiple	policies.
Content-Security-Policy:	default-src 'self'	http://example.com	http://example.net;	
connect-src 'none';	
Content-Security-Policy:	connect-src http://example.com/;			
script-src http://example.com
Web Functionality
qWhere does it work?
Web Functionality
qX-Frame-Options
§ This	will	cause	browsers	to	refuse	requests	for	framing	in	that	page.
§ 'SAMEORIGIN'	will	allow	framing	only	from	the	same	origin
§ 'ALLOW	FROM	http://url-here.example.com'	will	allow	you	to	specify	an	
origin	(unsupported	by	IE).
X-Frame-Options:	 DENY
X-Frame-Options:	 SAMEORIGIN
X-Frame-Options:	 ALLOW FROM http://url-here.example.com
Web Functionality
q X-Content-Type-Options
§ This	isn't	made	any	easier	by	browsers	second-guessing	the	Content-Type	of	what	
you're	serving	by	doing	Mime	Sniffing.
§ The	X-Content-Type-Options	allows	you	to,	in	effect,	say	to	browsers	that	yes,	you	
know	what	you're	doing,	the	Content-Type	is	correct	with	it's	only	allowed	
value: 'nosniff'.
§ This	reduces	exposure	to	drive-by	download	attacks
X-Content-Type-Options: nosniff
Web Functionality
qX-Content-Type-Options
Web Functionality
qStrict-Transport-Security
§ Then	even	typing	in	http://hsts.example.com	will	make	the	browser	connect	
to	https://hsts.example.com.
§ It	will	do	this	for	as	long	as	the	HSTS	header	is	valid,	which	in	the	case	of	the	
example	is	1	year since	the	last	response	that	sent	the	HSTS	header.	So	if	I	
visit	the	site	once	on	January	1st	2013,	it	will	be	valid	until	January	1st	2014.
Strict-Transport-Security:	max-age=31536000;	includeSubDomains
Web Functionality
qStrict-Transport-Security
Web Functionality
qHSTS mechanism overview
§ A	server	implements	an	HSTS	policy	by	supplying	a	header	over	an	
HTTPS	connection	(HSTS	headers	over	HTTP	are	ignored).
§ For	example,	a	server	could	send	a	header	such	that	future	requests	to	
the	domain	for	the	next	year	(max-age	is	specified	in	seconds,	31536000	
is	approximately	one	year)	use	only	HTTPS:	Strict-Transport-Security:	
max-age=31536000
Web Functionality
qHSTS mechanism overview
§ .		When	a	web	application	issues	HSTS	Policy	to	user	agents,	conformant	
user	agents	behave	as	follows:
1. Automatically	turn	any	insecure	links	referencing	the	web	application	into	
secure	links.	(For	instance,	http://example.com/some/page/	will	be	
modified	 to	https://example.com/some/page/	before	accessing	the	server.)
2. If	the	security	of	the	connection	cannot	be	ensured	(e.g.	the	server's	TLS	
certificate	is	not	trusted),	show	an	error	message	and	do	not	allow	the	user	
to	access	the	web	application.[15]
Web Functionality
qFacebook
§ As	of	January	2013	Facebook main	page	was	setting	these	security	
related	HTTP	headers.
Web Functionality
qFacebook
§ As	of	July	2014,	the	following	headers	were	set:
Web Application Architecture

Contenu connexe

Tendances

Authentication and Authorization in Asp.Net
Authentication and Authorization in Asp.NetAuthentication and Authorization in Asp.Net
Authentication and Authorization in Asp.NetShivanand Arur
 
Application Security
Application SecurityApplication Security
Application Securityflorinc
 
Intro to AWS: EC2 & Compute Services
Intro to AWS: EC2 & Compute ServicesIntro to AWS: EC2 & Compute Services
Intro to AWS: EC2 & Compute ServicesAmazon Web Services
 
Cross Site Scripting ( XSS)
Cross Site Scripting ( XSS)Cross Site Scripting ( XSS)
Cross Site Scripting ( XSS)Amit Tyagi
 
Web Servers: Architecture and Security
Web Servers: Architecture and SecurityWeb Servers: Architecture and Security
Web Servers: Architecture and Securitygeorge.james
 
F5 ASM v12 DDoS best practices
F5 ASM v12 DDoS best practices F5 ASM v12 DDoS best practices
F5 ASM v12 DDoS best practices Lior Rotkovitch
 
透過Amazon CloudFront 和AWS WAF來執行安全的內容傳輸
透過Amazon CloudFront 和AWS WAF來執行安全的內容傳輸透過Amazon CloudFront 和AWS WAF來執行安全的內容傳輸
透過Amazon CloudFront 和AWS WAF來執行安全的內容傳輸Amazon Web Services
 
HTTP Request Header and HTTP Status Code
HTTP Request Header and HTTP Status CodeHTTP Request Header and HTTP Status Code
HTTP Request Header and HTTP Status CodeAbhishek L.R
 
Introduction to Web Programming - first course
Introduction to Web Programming - first courseIntroduction to Web Programming - first course
Introduction to Web Programming - first courseVlad Posea
 

Tendances (20)

Authentication and Authorization in Asp.Net
Authentication and Authorization in Asp.NetAuthentication and Authorization in Asp.Net
Authentication and Authorization in Asp.Net
 
Application Security
Application SecurityApplication Security
Application Security
 
Web servers
Web serversWeb servers
Web servers
 
Intro to AWS: EC2 & Compute Services
Intro to AWS: EC2 & Compute ServicesIntro to AWS: EC2 & Compute Services
Intro to AWS: EC2 & Compute Services
 
REST & RESTful Web Services
REST & RESTful Web ServicesREST & RESTful Web Services
REST & RESTful Web Services
 
Cross Site Scripting ( XSS)
Cross Site Scripting ( XSS)Cross Site Scripting ( XSS)
Cross Site Scripting ( XSS)
 
Web Servers: Architecture and Security
Web Servers: Architecture and SecurityWeb Servers: Architecture and Security
Web Servers: Architecture and Security
 
Client side scripting and server side scripting
Client side scripting and server side scriptingClient side scripting and server side scripting
Client side scripting and server side scripting
 
Burp suite
Burp suiteBurp suite
Burp suite
 
Web Application Security 101
Web Application Security 101Web Application Security 101
Web Application Security 101
 
F5 ASM v12 DDoS best practices
F5 ASM v12 DDoS best practices F5 ASM v12 DDoS best practices
F5 ASM v12 DDoS best practices
 
AWS WAF - A Web App Firewall
AWS WAF - A Web App FirewallAWS WAF - A Web App Firewall
AWS WAF - A Web App Firewall
 
透過Amazon CloudFront 和AWS WAF來執行安全的內容傳輸
透過Amazon CloudFront 和AWS WAF來執行安全的內容傳輸透過Amazon CloudFront 和AWS WAF來執行安全的內容傳輸
透過Amazon CloudFront 和AWS WAF來執行安全的內容傳輸
 
Xss attack
Xss attackXss attack
Xss attack
 
HTTP Request Header and HTTP Status Code
HTTP Request Header and HTTP Status CodeHTTP Request Header and HTTP Status Code
HTTP Request Header and HTTP Status Code
 
Web services SOAP
Web services SOAPWeb services SOAP
Web services SOAP
 
Introduction to Web Programming - first course
Introduction to Web Programming - first courseIntroduction to Web Programming - first course
Introduction to Web Programming - first course
 
AWS IAM Introduction
AWS IAM IntroductionAWS IAM Introduction
AWS IAM Introduction
 
What is an API?
What is an API?What is an API?
What is an API?
 
SOAP-based Web Services
SOAP-based Web ServicesSOAP-based Web Services
SOAP-based Web Services
 

Similaire à Session1-Introduce Http-HTTP Security headers

Web Database
Web DatabaseWeb Database
Web Databaseidroos7
 
446-FUNDAMENTALS OF WEB FOR NON DEVELOPERS (Useful-Knowledge)
446-FUNDAMENTALS OF WEB FOR NON DEVELOPERS (Useful-Knowledge)446-FUNDAMENTALS OF WEB FOR NON DEVELOPERS (Useful-Knowledge)
446-FUNDAMENTALS OF WEB FOR NON DEVELOPERS (Useful-Knowledge)nrvalluri
 
Fundamentals of Web for Non-Developers
Fundamentals of Web for Non-DevelopersFundamentals of Web for Non-Developers
Fundamentals of Web for Non-DevelopersLemi Orhan Ergin
 
Web Design Lecture1.pptx
Web Design Lecture1.pptxWeb Design Lecture1.pptx
Web Design Lecture1.pptxMohammedNoor74
 
Ajax:From Desktop Applications towards Ajax Web Applications
Ajax:From Desktop Applications towards Ajax Web ApplicationsAjax:From Desktop Applications towards Ajax Web Applications
Ajax:From Desktop Applications towards Ajax Web ApplicationsSiva Kumar
 
Evolution Of The Web Platform & Browser Security
Evolution Of The Web Platform & Browser SecurityEvolution Of The Web Platform & Browser Security
Evolution Of The Web Platform & Browser SecuritySanjeev Verma, PhD
 
Web development: Why do we need it ?
Web development: Why do we need it ?Web development: Why do we need it ?
Web development: Why do we need it ?anubhavdoodleblue123
 
1) Web Technology - Introduction.pptx
1) Web Technology - Introduction.pptx1) Web Technology - Introduction.pptx
1) Web Technology - Introduction.pptxSujataKangune2
 
Introductiontowebarchitecture 090922221506-phpapp01
Introductiontowebarchitecture 090922221506-phpapp01Introductiontowebarchitecture 090922221506-phpapp01
Introductiontowebarchitecture 090922221506-phpapp01Maisha Price
 
Lecture 1 - Introduction.pptx
Lecture 1 - Introduction.pptxLecture 1 - Introduction.pptx
Lecture 1 - Introduction.pptxKhalilAhmed352943
 
Introduction to Web Architecture
Introduction to Web ArchitectureIntroduction to Web Architecture
Introduction to Web ArchitectureChamnap Chhorn
 
World wide web architecture presentation
World wide web architecture presentationWorld wide web architecture presentation
World wide web architecture presentationImMe Khan
 
Amish Umesh - Future Of Web App Testing - ClubHack2007
Amish Umesh - Future Of Web App Testing  - ClubHack2007Amish Umesh - Future Of Web App Testing  - ClubHack2007
Amish Umesh - Future Of Web App Testing - ClubHack2007ClubHack
 
Introduction to web technology
Introduction to web technologyIntroduction to web technology
Introduction to web technologyVARSHAKUMARI49
 

Similaire à Session1-Introduce Http-HTTP Security headers (20)

Web Database
Web DatabaseWeb Database
Web Database
 
446-FUNDAMENTALS OF WEB FOR NON DEVELOPERS (Useful-Knowledge)
446-FUNDAMENTALS OF WEB FOR NON DEVELOPERS (Useful-Knowledge)446-FUNDAMENTALS OF WEB FOR NON DEVELOPERS (Useful-Knowledge)
446-FUNDAMENTALS OF WEB FOR NON DEVELOPERS (Useful-Knowledge)
 
Fundamentals of Web for Non-Developers
Fundamentals of Web for Non-DevelopersFundamentals of Web for Non-Developers
Fundamentals of Web for Non-Developers
 
Web Design Lecture1.pptx
Web Design Lecture1.pptxWeb Design Lecture1.pptx
Web Design Lecture1.pptx
 
Ajax:From Desktop Applications towards Ajax Web Applications
Ajax:From Desktop Applications towards Ajax Web ApplicationsAjax:From Desktop Applications towards Ajax Web Applications
Ajax:From Desktop Applications towards Ajax Web Applications
 
sell idea
sell ideasell idea
sell idea
 
Basics of the Web Platform
Basics of the Web PlatformBasics of the Web Platform
Basics of the Web Platform
 
Evolution Of The Web Platform & Browser Security
Evolution Of The Web Platform & Browser SecurityEvolution Of The Web Platform & Browser Security
Evolution Of The Web Platform & Browser Security
 
Webapplication ppt prepared by krishna ballabh gupta
Webapplication ppt prepared by krishna ballabh guptaWebapplication ppt prepared by krishna ballabh gupta
Webapplication ppt prepared by krishna ballabh gupta
 
Web development: Why do we need it ?
Web development: Why do we need it ?Web development: Why do we need it ?
Web development: Why do we need it ?
 
1) Web Technology - Introduction.pptx
1) Web Technology - Introduction.pptx1) Web Technology - Introduction.pptx
1) Web Technology - Introduction.pptx
 
Introductiontowebarchitecture 090922221506-phpapp01
Introductiontowebarchitecture 090922221506-phpapp01Introductiontowebarchitecture 090922221506-phpapp01
Introductiontowebarchitecture 090922221506-phpapp01
 
Lecture 1 - Introduction.pptx
Lecture 1 - Introduction.pptxLecture 1 - Introduction.pptx
Lecture 1 - Introduction.pptx
 
Introduction to Web Architecture
Introduction to Web ArchitectureIntroduction to Web Architecture
Introduction to Web Architecture
 
World wide web architecture presentation
World wide web architecture presentationWorld wide web architecture presentation
World wide web architecture presentation
 
Microsoft Web Technology Stack
Microsoft Web Technology StackMicrosoft Web Technology Stack
Microsoft Web Technology Stack
 
Amish Umesh - Future Of Web App Testing - ClubHack2007
Amish Umesh - Future Of Web App Testing  - ClubHack2007Amish Umesh - Future Of Web App Testing  - ClubHack2007
Amish Umesh - Future Of Web App Testing - ClubHack2007
 
AJAX - An introduction
AJAX - An introductionAJAX - An introduction
AJAX - An introduction
 
Introduction to web technology
Introduction to web technologyIntroduction to web technology
Introduction to web technology
 
WP Chap 1 & 2.pptx
WP Chap 1 & 2.pptxWP Chap 1 & 2.pptx
WP Chap 1 & 2.pptx
 

Plus de zakieh alizadeh

Session11-NoSQL InjectionPHP Injection
Session11-NoSQL InjectionPHP Injection Session11-NoSQL InjectionPHP Injection
Session11-NoSQL InjectionPHP Injection zakieh alizadeh
 
Session10-PHP Misconfiguration
Session10-PHP MisconfigurationSession10-PHP Misconfiguration
Session10-PHP Misconfigurationzakieh alizadeh
 
Session9-File Upload Security
Session9-File Upload SecuritySession9-File Upload Security
Session9-File Upload Securityzakieh alizadeh
 
Session6-Protecct Sensetive Data
Session6-Protecct Sensetive DataSession6-Protecct Sensetive Data
Session6-Protecct Sensetive Datazakieh alizadeh
 
Session3 data-validation-sql injection
Session3 data-validation-sql injectionSession3 data-validation-sql injection
Session3 data-validation-sql injectionzakieh alizadeh
 
Session2-Application Threat Modeling
Session2-Application Threat ModelingSession2-Application Threat Modeling
Session2-Application Threat Modelingzakieh alizadeh
 
Validating and Sanitizing User Data
Validating and Sanitizing  User DataValidating and Sanitizing  User Data
Validating and Sanitizing User Datazakieh alizadeh
 
Session3 data-validation
Session3 data-validationSession3 data-validation
Session3 data-validationzakieh alizadeh
 

Plus de zakieh alizadeh (15)

Session11-NoSQL InjectionPHP Injection
Session11-NoSQL InjectionPHP Injection Session11-NoSQL InjectionPHP Injection
Session11-NoSQL InjectionPHP Injection
 
Session10-PHP Misconfiguration
Session10-PHP MisconfigurationSession10-PHP Misconfiguration
Session10-PHP Misconfiguration
 
Session9-File Upload Security
Session9-File Upload SecuritySession9-File Upload Security
Session9-File Upload Security
 
S8-Session Managment
S8-Session ManagmentS8-Session Managment
S8-Session Managment
 
Session7-XSS & CSRF
Session7-XSS & CSRFSession7-XSS & CSRF
Session7-XSS & CSRF
 
Session6-Protecct Sensetive Data
Session6-Protecct Sensetive DataSession6-Protecct Sensetive Data
Session6-Protecct Sensetive Data
 
S5-Authorization
S5-AuthorizationS5-Authorization
S5-Authorization
 
Session4-Authentication
Session4-AuthenticationSession4-Authentication
Session4-Authentication
 
Session3 data-validation-sql injection
Session3 data-validation-sql injectionSession3 data-validation-sql injection
Session3 data-validation-sql injection
 
Session2-Application Threat Modeling
Session2-Application Threat ModelingSession2-Application Threat Modeling
Session2-Application Threat Modeling
 
yii framework
yii frameworkyii framework
yii framework
 
Web security Contents
Web security ContentsWeb security Contents
Web security Contents
 
Validating and Sanitizing User Data
Validating and Sanitizing  User DataValidating and Sanitizing  User Data
Validating and Sanitizing User Data
 
Session3 data-validation
Session3 data-validationSession3 data-validation
Session3 data-validation
 
Introduce Yii
Introduce YiiIntroduce Yii
Introduce Yii
 

Dernier

Call Girls In The Ocean Pearl Retreat Hotel New Delhi 9873777170
Call Girls In The Ocean Pearl Retreat Hotel New Delhi 9873777170Call Girls In The Ocean Pearl Retreat Hotel New Delhi 9873777170
Call Girls In The Ocean Pearl Retreat Hotel New Delhi 9873777170Sonam Pathan
 
Font Performance - NYC WebPerf Meetup April '24
Font Performance - NYC WebPerf Meetup April '24Font Performance - NYC WebPerf Meetup April '24
Font Performance - NYC WebPerf Meetup April '24Paul Calvano
 
Q4-1-Illustrating-Hypothesis-Testing.pptx
Q4-1-Illustrating-Hypothesis-Testing.pptxQ4-1-Illustrating-Hypothesis-Testing.pptx
Q4-1-Illustrating-Hypothesis-Testing.pptxeditsforyah
 
Contact Rya Baby for Call Girls New Delhi
Contact Rya Baby for Call Girls New DelhiContact Rya Baby for Call Girls New Delhi
Contact Rya Baby for Call Girls New Delhimiss dipika
 
PHP-based rendering of TYPO3 Documentation
PHP-based rendering of TYPO3 DocumentationPHP-based rendering of TYPO3 Documentation
PHP-based rendering of TYPO3 DocumentationLinaWolf1
 
Potsdam FH学位证,波茨坦应用技术大学毕业证书1:1制作
Potsdam FH学位证,波茨坦应用技术大学毕业证书1:1制作Potsdam FH学位证,波茨坦应用技术大学毕业证书1:1制作
Potsdam FH学位证,波茨坦应用技术大学毕业证书1:1制作ys8omjxb
 
办理多伦多大学毕业证成绩单|购买加拿大UTSG文凭证书
办理多伦多大学毕业证成绩单|购买加拿大UTSG文凭证书办理多伦多大学毕业证成绩单|购买加拿大UTSG文凭证书
办理多伦多大学毕业证成绩单|购买加拿大UTSG文凭证书zdzoqco
 
办理(UofR毕业证书)罗切斯特大学毕业证成绩单原版一比一
办理(UofR毕业证书)罗切斯特大学毕业证成绩单原版一比一办理(UofR毕业证书)罗切斯特大学毕业证成绩单原版一比一
办理(UofR毕业证书)罗切斯特大学毕业证成绩单原版一比一z xss
 
『澳洲文凭』买拉筹伯大学毕业证书成绩单办理澳洲LTU文凭学位证书
『澳洲文凭』买拉筹伯大学毕业证书成绩单办理澳洲LTU文凭学位证书『澳洲文凭』买拉筹伯大学毕业证书成绩单办理澳洲LTU文凭学位证书
『澳洲文凭』买拉筹伯大学毕业证书成绩单办理澳洲LTU文凭学位证书rnrncn29
 
Call Girls Near The Suryaa Hotel New Delhi 9873777170
Call Girls Near The Suryaa Hotel New Delhi 9873777170Call Girls Near The Suryaa Hotel New Delhi 9873777170
Call Girls Near The Suryaa Hotel New Delhi 9873777170Sonam Pathan
 
Film cover research (1).pptxsdasdasdasdasdasa
Film cover research (1).pptxsdasdasdasdasdasaFilm cover research (1).pptxsdasdasdasdasdasa
Film cover research (1).pptxsdasdasdasdasdasa494f574xmv
 
SCM Symposium PPT Format Customer loyalty is predi
SCM Symposium PPT Format Customer loyalty is prediSCM Symposium PPT Format Customer loyalty is predi
SCM Symposium PPT Format Customer loyalty is predieusebiomeyer
 
NSX-T and Service Interfaces presentation
NSX-T and Service Interfaces presentationNSX-T and Service Interfaces presentation
NSX-T and Service Interfaces presentationMarko4394
 
『澳洲文凭』买詹姆士库克大学毕业证书成绩单办理澳洲JCU文凭学位证书
『澳洲文凭』买詹姆士库克大学毕业证书成绩单办理澳洲JCU文凭学位证书『澳洲文凭』买詹姆士库克大学毕业证书成绩单办理澳洲JCU文凭学位证书
『澳洲文凭』买詹姆士库克大学毕业证书成绩单办理澳洲JCU文凭学位证书rnrncn29
 
Top 10 Interactive Website Design Trends in 2024.pptx
Top 10 Interactive Website Design Trends in 2024.pptxTop 10 Interactive Website Design Trends in 2024.pptx
Top 10 Interactive Website Design Trends in 2024.pptxDyna Gilbert
 

Dernier (17)

Call Girls In The Ocean Pearl Retreat Hotel New Delhi 9873777170
Call Girls In The Ocean Pearl Retreat Hotel New Delhi 9873777170Call Girls In The Ocean Pearl Retreat Hotel New Delhi 9873777170
Call Girls In The Ocean Pearl Retreat Hotel New Delhi 9873777170
 
Font Performance - NYC WebPerf Meetup April '24
Font Performance - NYC WebPerf Meetup April '24Font Performance - NYC WebPerf Meetup April '24
Font Performance - NYC WebPerf Meetup April '24
 
Q4-1-Illustrating-Hypothesis-Testing.pptx
Q4-1-Illustrating-Hypothesis-Testing.pptxQ4-1-Illustrating-Hypothesis-Testing.pptx
Q4-1-Illustrating-Hypothesis-Testing.pptx
 
Contact Rya Baby for Call Girls New Delhi
Contact Rya Baby for Call Girls New DelhiContact Rya Baby for Call Girls New Delhi
Contact Rya Baby for Call Girls New Delhi
 
PHP-based rendering of TYPO3 Documentation
PHP-based rendering of TYPO3 DocumentationPHP-based rendering of TYPO3 Documentation
PHP-based rendering of TYPO3 Documentation
 
Potsdam FH学位证,波茨坦应用技术大学毕业证书1:1制作
Potsdam FH学位证,波茨坦应用技术大学毕业证书1:1制作Potsdam FH学位证,波茨坦应用技术大学毕业证书1:1制作
Potsdam FH学位证,波茨坦应用技术大学毕业证书1:1制作
 
办理多伦多大学毕业证成绩单|购买加拿大UTSG文凭证书
办理多伦多大学毕业证成绩单|购买加拿大UTSG文凭证书办理多伦多大学毕业证成绩单|购买加拿大UTSG文凭证书
办理多伦多大学毕业证成绩单|购买加拿大UTSG文凭证书
 
办理(UofR毕业证书)罗切斯特大学毕业证成绩单原版一比一
办理(UofR毕业证书)罗切斯特大学毕业证成绩单原版一比一办理(UofR毕业证书)罗切斯特大学毕业证成绩单原版一比一
办理(UofR毕业证书)罗切斯特大学毕业证成绩单原版一比一
 
『澳洲文凭』买拉筹伯大学毕业证书成绩单办理澳洲LTU文凭学位证书
『澳洲文凭』买拉筹伯大学毕业证书成绩单办理澳洲LTU文凭学位证书『澳洲文凭』买拉筹伯大学毕业证书成绩单办理澳洲LTU文凭学位证书
『澳洲文凭』买拉筹伯大学毕业证书成绩单办理澳洲LTU文凭学位证书
 
Call Girls Near The Suryaa Hotel New Delhi 9873777170
Call Girls Near The Suryaa Hotel New Delhi 9873777170Call Girls Near The Suryaa Hotel New Delhi 9873777170
Call Girls Near The Suryaa Hotel New Delhi 9873777170
 
Film cover research (1).pptxsdasdasdasdasdasa
Film cover research (1).pptxsdasdasdasdasdasaFilm cover research (1).pptxsdasdasdasdasdasa
Film cover research (1).pptxsdasdasdasdasdasa
 
SCM Symposium PPT Format Customer loyalty is predi
SCM Symposium PPT Format Customer loyalty is prediSCM Symposium PPT Format Customer loyalty is predi
SCM Symposium PPT Format Customer loyalty is predi
 
young call girls in Uttam Nagar🔝 9953056974 🔝 Delhi escort Service
young call girls in Uttam Nagar🔝 9953056974 🔝 Delhi escort Serviceyoung call girls in Uttam Nagar🔝 9953056974 🔝 Delhi escort Service
young call girls in Uttam Nagar🔝 9953056974 🔝 Delhi escort Service
 
NSX-T and Service Interfaces presentation
NSX-T and Service Interfaces presentationNSX-T and Service Interfaces presentation
NSX-T and Service Interfaces presentation
 
『澳洲文凭』买詹姆士库克大学毕业证书成绩单办理澳洲JCU文凭学位证书
『澳洲文凭』买詹姆士库克大学毕业证书成绩单办理澳洲JCU文凭学位证书『澳洲文凭』买詹姆士库克大学毕业证书成绩单办理澳洲JCU文凭学位证书
『澳洲文凭』买詹姆士库克大学毕业证书成绩单办理澳洲JCU文凭学位证书
 
Top 10 Interactive Website Design Trends in 2024.pptx
Top 10 Interactive Website Design Trends in 2024.pptxTop 10 Interactive Website Design Trends in 2024.pptx
Top 10 Interactive Website Design Trends in 2024.pptx
 
Hot Sexy call girls in Rk Puram 🔝 9953056974 🔝 Delhi escort Service
Hot Sexy call girls in  Rk Puram 🔝 9953056974 🔝 Delhi escort ServiceHot Sexy call girls in  Rk Puram 🔝 9953056974 🔝 Delhi escort Service
Hot Sexy call girls in Rk Puram 🔝 9953056974 🔝 Delhi escort Service
 

Session1-Introduce Http-HTTP Security headers