SlideShare une entreprise Scribd logo
1  sur  34
Application
                                           Security

           Dilan Warnakulasooriya                              Asanka Fernandopulle

           Information Security Engineer                       Senior Software Engineer
           99X Technology                                      99X Technology


1/1/2013                                   99X Technology(c)                              1
Basics of Application Security
           • HTTP and HTTPS

              •   Symmetric key
              •   Asymmetric key
              •   Session key
              •   Analyzing a certificate
              •   Sniffing HTTP and HTTPS
              •   Calomel plugin




1/1/2013                             99X Technology(c)   2
Basics of Application Security
           • Man in the middle

              • Analyzing browser requests
              • Analyzing server response
              • https communication

              •   https and s-http




1/1/2013                             99X Technology(c)   3
Basics of Application Security

           • What OWASP does

              • Builders , Breakers and Defenders




1/1/2013                             99X Technology(c)   4
Web Application penetration testing

           • Basic web testing methodology

               • Vulnerability, Threat and Exploit


           • Developer level application security overview




1/1/2013                               99X Technology(c)     5
Web Application penetration testing

           • Application Security frameworks

               •   Before development begins
               •   During definition and design
               •   During development
               •   During deployment
               •   Maintenance and operations




1/1/2013                               99X Technology(c)   6
Web Application penetration testing
              • Web application security review frameworks

                  •   Samurai WTF
                  •   Websecurify
                  •   Wapiti
                  •   Skiffish
                  •   Acunetix
                  •   Webscarab
                  •   W3af




1/1/2013                            99X Technology(c)        7
Secure Authentication
           • Authentication/Access control methods




1/1/2013                           99X Technology(c)   8
Secure Authentication

           • Authentication bypass techniques

               •   Direct page request
               •   Parameter modification
               •   Session ID prediction
               •   Sql injection


               Session predictability - webscarab/burpsuite



1/1/2013                              99X Technology(c)       9
Secure Authentication

           • Bypass authentication matrix

               •   Basic authentication
               •   Multi-Level login 1
               •   Multi-Level login 2




1/1/2013                                  99X Technology(c)   10
Secure Authentication
           • Password remember

              • Password strength
              • Forgot password


           • Browser cache management




1/1/2013                            99X Technology(c)   11
Secure Authentication
           • Parameter tampering

                • Bypass HTML Field restrictions
                • Exploit hidden fields
                • Bypass client side JavaScript validation


           •   Coding controls for Parameter Tampering




1/1/2013                                 99X Technology(c)   12
Secure Authentication
           • Access control flaws

               • Using an Access control matrix
               • Bypass a path based access control scheme
               • Bypass data layer access control




1/1/2013                              99X Technology(c)      13
Injections
           • SQL injection classes

               • In band
               • Out of band
               • Inferential




1/1/2013                             99X Technology(c)   14
Injections
           • Techniques to exploit sql injections

               •   Union operator
               •   Boolean
               •   Error based
               •   Out of band
               •   Time delay




1/1/2013                             99X Technology(c)   15
Injections
           • Standard SQL injection testing

               • SELECT * FROM Users WHERE Username='$username' AND
                 Password='$password'

               • Numeric sql injection




1/1/2013                            99X Technology(c)                 16
Injections
           • Union Exploitation technique

               • Xpath injection
               • String sql injection




1/1/2013                                99X Technology(c)   17
Injections
           • Boolean Exploitation technique


               • Sql injection : stage 1 : String sql injection

               • Stage 3 : Numeric sql injection




1/1/2013                                 99X Technology(c)        18
Injections
           • Error based Exploitation technique


                   • Modify data with sql injection

                   • Add data with sql injection




1/1/2013                             99X Technology(c)   19
Injections
           • Out of band Exploitation technique




1/1/2013                          99X Technology(c)   20
Injections
           • Time delay Exploitation technique

           • Stored procedure Exploitation technique

           • Automated Exploitation technique




1/1/2013                          99X Technology(c)    21
Injections
           • How developers work on SQL injection


           • Automate your injection

               • sqlmap




1/1/2013                         99X Technology(c)   22
Session Management
           • Session management techniques

           • Session management vulnerability

               • insufficient session id length
               • Session fixation
               • Session variable overloading




1/1/2013                               99X Technology(c)   23
Session Management
           • Check your cookies

               • Cookie collection
               • Cookie reverse engineering
               • Cookie manipulation

           • Hijack a session

               • Hijack a session
               • Spoof an authentication cookie
               • Session fixation



1/1/2013                             99X Technology(c)   24
Session Management

           • How developers work on session handling




1/1/2013                          99X Technology(c)    25
Code Quality

           • Code quality breach

               • Discover clues in the HTML




1/1/2013                             99X Technology(c)   26
Cross Site Scripting
           • Scripting types

               •   Reflected cross site scripting (non-persistent XSS)
               •   Stored cross site scripting (second-order XSS)
               •   DOM based cross site scripting (type 0 xss)




1/1/2013                                99X Technology(c)                27
Cross Site Scripting

           • Reflected cross site scripting (non-persistent XSS)


           • Testing for reflected XSS

               •   Reflected xss




1/1/2013                             99X Technology(c)             28
Cross Site Scripting

           • Bypass XSS filters

               •   Tag Attribute Value
               •   Different syntax or enconding
               •   Bypassing non-recursive filtering




1/1/2013                               99X Technology(c)   29
Cross Site Scripting


           • Stored cross site scripting (second-order XSS)

           • XSS attack scenario

               •   Stored XSS




1/1/2013                            99X Technology(c)         30
Cross Site Scripting

           • Testing for Stored cross site scripting

               •   Input forms
               •   Analyze HTML code
               •   Exploitation framework
               •   File upload




1/1/2013                            99X Technology(c)   31
Cross Site Scripting

           • How developer handle XSS and CSRF




1/1/2013                          99X Technology(c)   32
Testing Tools
           • Proxy

           • How to write secure programs




1/1/2013                          99X Technology(c)   33
Thank you




1/1/2013   99X Technology(c)   34

Contenu connexe

Similaire à Application security overview

Azure 101: Shared responsibility in the Azure Cloud
Azure 101: Shared responsibility in the Azure CloudAzure 101: Shared responsibility in the Azure Cloud
Azure 101: Shared responsibility in the Azure CloudPaulo Renato
 
tcp cloud in AVG
tcp cloud in AVGtcp cloud in AVG
tcp cloud in AVGtcp cloud
 
Understanding container security
Understanding container securityUnderstanding container security
Understanding container securityJohn Kinsella
 
Review of Hardware based solutions for trusted cloud computing.pptx
Review of Hardware based solutions for trusted cloud computing.pptxReview of Hardware based solutions for trusted cloud computing.pptx
Review of Hardware based solutions for trusted cloud computing.pptxssusere142fe
 
19-f15-mobile-security.pptx
19-f15-mobile-security.pptx19-f15-mobile-security.pptx
19-f15-mobile-security.pptxJhansigali
 
Protecting Against Web App Attacks
Protecting Against Web App AttacksProtecting Against Web App Attacks
Protecting Against Web App AttacksAlert Logic
 
Protecting microservices using secure design patterns 1.0
Protecting microservices using secure design patterns 1.0Protecting microservices using secure design patterns 1.0
Protecting microservices using secure design patterns 1.0Trupti Shiralkar, CISSP
 
Application Security - 28 Nov 2018
Application Security - 28 Nov 2018Application Security - 28 Nov 2018
Application Security - 28 Nov 2018Cheah Eng Soon
 
Deployment of Juniper Contrail in AVG Technologies
Deployment of Juniper Contrail in AVG TechnologiesDeployment of Juniper Contrail in AVG Technologies
Deployment of Juniper Contrail in AVG TechnologiesMarketingArrowECS_CZ
 
Isse 2014 homomorphic encryption and porticor post event
Isse 2014 homomorphic encryption and porticor   post eventIsse 2014 homomorphic encryption and porticor   post event
Isse 2014 homomorphic encryption and porticor post eventICT Economic Impact
 
Securing Microservices in Containerized Environments
Securing Microservices in Containerized Environments Securing Microservices in Containerized Environments
Securing Microservices in Containerized Environments DevOps.com
 
Shared Security Responsibility for the Azure Cloud
Shared Security Responsibility for the Azure CloudShared Security Responsibility for the Azure Cloud
Shared Security Responsibility for the Azure CloudAlert Logic
 
Protecting Against Web Attacks
Protecting Against Web AttacksProtecting Against Web Attacks
Protecting Against Web AttacksAlert Logic
 
java-card20232024999999999999999999999999999999999999999999999999999999999999...
java-card20232024999999999999999999999999999999999999999999999999999999999999...java-card20232024999999999999999999999999999999999999999999999999999999999999...
java-card20232024999999999999999999999999999999999999999999999999999999999999...ouahibakellou
 
Cyber Security and Cloud Computing
Cyber Security and Cloud ComputingCyber Security and Cloud Computing
Cyber Security and Cloud ComputingKeet Sugathadasa
 
Started In Security Now I'm Here
Started In Security Now I'm HereStarted In Security Now I'm Here
Started In Security Now I'm HereChristopher Grayson
 

Similaire à Application security overview (20)

Azure 101: Shared responsibility in the Azure Cloud
Azure 101: Shared responsibility in the Azure CloudAzure 101: Shared responsibility in the Azure Cloud
Azure 101: Shared responsibility in the Azure Cloud
 
tcp cloud in AVG
tcp cloud in AVGtcp cloud in AVG
tcp cloud in AVG
 
QNX Sales Engineering Presentation
QNX Sales Engineering PresentationQNX Sales Engineering Presentation
QNX Sales Engineering Presentation
 
Understanding container security
Understanding container securityUnderstanding container security
Understanding container security
 
Review of Hardware based solutions for trusted cloud computing.pptx
Review of Hardware based solutions for trusted cloud computing.pptxReview of Hardware based solutions for trusted cloud computing.pptx
Review of Hardware based solutions for trusted cloud computing.pptx
 
Fortinet sandboxing
Fortinet sandboxingFortinet sandboxing
Fortinet sandboxing
 
19-f15-mobile-security.pptx
19-f15-mobile-security.pptx19-f15-mobile-security.pptx
19-f15-mobile-security.pptx
 
Protecting Against Web App Attacks
Protecting Against Web App AttacksProtecting Against Web App Attacks
Protecting Against Web App Attacks
 
Protecting microservices using secure design patterns 1.0
Protecting microservices using secure design patterns 1.0Protecting microservices using secure design patterns 1.0
Protecting microservices using secure design patterns 1.0
 
Application Security - 28 Nov 2018
Application Security - 28 Nov 2018Application Security - 28 Nov 2018
Application Security - 28 Nov 2018
 
Deployment of Juniper Contrail in AVG Technologies
Deployment of Juniper Contrail in AVG TechnologiesDeployment of Juniper Contrail in AVG Technologies
Deployment of Juniper Contrail in AVG Technologies
 
Isse 2014 homomorphic encryption and porticor post event
Isse 2014 homomorphic encryption and porticor   post eventIsse 2014 homomorphic encryption and porticor   post event
Isse 2014 homomorphic encryption and porticor post event
 
Security for developers
Security for developersSecurity for developers
Security for developers
 
Securing Microservices in Containerized Environments
Securing Microservices in Containerized Environments Securing Microservices in Containerized Environments
Securing Microservices in Containerized Environments
 
Shared Security Responsibility for the Azure Cloud
Shared Security Responsibility for the Azure CloudShared Security Responsibility for the Azure Cloud
Shared Security Responsibility for the Azure Cloud
 
Protecting Against Web Attacks
Protecting Against Web AttacksProtecting Against Web Attacks
Protecting Against Web Attacks
 
java-card20232024999999999999999999999999999999999999999999999999999999999999...
java-card20232024999999999999999999999999999999999999999999999999999999999999...java-card20232024999999999999999999999999999999999999999999999999999999999999...
java-card20232024999999999999999999999999999999999999999999999999999999999999...
 
Cyber Security and Cloud Computing
Cyber Security and Cloud ComputingCyber Security and Cloud Computing
Cyber Security and Cloud Computing
 
Containers and Security for DevOps
Containers and Security for DevOpsContainers and Security for DevOps
Containers and Security for DevOps
 
Started In Security Now I'm Here
Started In Security Now I'm HereStarted In Security Now I'm Here
Started In Security Now I'm Here
 

Dernier

Automating Google Workspace (GWS) & more with Apps Script
Automating Google Workspace (GWS) & more with Apps ScriptAutomating Google Workspace (GWS) & more with Apps Script
Automating Google Workspace (GWS) & more with Apps Scriptwesley chun
 
What Are The Drone Anti-jamming Systems Technology?
What Are The Drone Anti-jamming Systems Technology?What Are The Drone Anti-jamming Systems Technology?
What Are The Drone Anti-jamming Systems Technology?Antenna Manufacturer Coco
 
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
04-2024-HHUG-Sales-and-Marketing-Alignment.pptxHampshireHUG
 
Data Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt RobisonData Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt RobisonAnna Loughnan Colquhoun
 
Breaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path MountBreaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path MountPuma Security, LLC
 
Tata AIG General Insurance Company - Insurer Innovation Award 2024
Tata AIG General Insurance Company - Insurer Innovation Award 2024Tata AIG General Insurance Company - Insurer Innovation Award 2024
Tata AIG General Insurance Company - Insurer Innovation Award 2024The Digital Insurer
 
08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking Men08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking MenDelhi Call girls
 
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking MenDelhi Call girls
 
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024The Digital Insurer
 
A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)Gabriella Davis
 
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...Drew Madelung
 
08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking Men08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking MenDelhi Call girls
 
The Codex of Business Writing Software for Real-World Solutions 2.pptx
The Codex of Business Writing Software for Real-World Solutions 2.pptxThe Codex of Business Writing Software for Real-World Solutions 2.pptx
The Codex of Business Writing Software for Real-World Solutions 2.pptxMalak Abu Hammad
 
Driving Behavioral Change for Information Management through Data-Driven Gree...
Driving Behavioral Change for Information Management through Data-Driven Gree...Driving Behavioral Change for Information Management through Data-Driven Gree...
Driving Behavioral Change for Information Management through Data-Driven Gree...Enterprise Knowledge
 
CNv6 Instructor Chapter 6 Quality of Service
CNv6 Instructor Chapter 6 Quality of ServiceCNv6 Instructor Chapter 6 Quality of Service
CNv6 Instructor Chapter 6 Quality of Servicegiselly40
 
Finology Group – Insurtech Innovation Award 2024
Finology Group – Insurtech Innovation Award 2024Finology Group – Insurtech Innovation Award 2024
Finology Group – Insurtech Innovation Award 2024The Digital Insurer
 
From Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time AutomationFrom Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time AutomationSafe Software
 
Presentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreterPresentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreternaman860154
 
Boost Fertility New Invention Ups Success Rates.pdf
Boost Fertility New Invention Ups Success Rates.pdfBoost Fertility New Invention Ups Success Rates.pdf
Boost Fertility New Invention Ups Success Rates.pdfsudhanshuwaghmare1
 
The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024Rafal Los
 

Dernier (20)

Automating Google Workspace (GWS) & more with Apps Script
Automating Google Workspace (GWS) & more with Apps ScriptAutomating Google Workspace (GWS) & more with Apps Script
Automating Google Workspace (GWS) & more with Apps Script
 
What Are The Drone Anti-jamming Systems Technology?
What Are The Drone Anti-jamming Systems Technology?What Are The Drone Anti-jamming Systems Technology?
What Are The Drone Anti-jamming Systems Technology?
 
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
 
Data Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt RobisonData Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt Robison
 
Breaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path MountBreaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path Mount
 
Tata AIG General Insurance Company - Insurer Innovation Award 2024
Tata AIG General Insurance Company - Insurer Innovation Award 2024Tata AIG General Insurance Company - Insurer Innovation Award 2024
Tata AIG General Insurance Company - Insurer Innovation Award 2024
 
08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking Men08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking Men
 
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
 
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024
 
A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)
 
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
 
08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking Men08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking Men
 
The Codex of Business Writing Software for Real-World Solutions 2.pptx
The Codex of Business Writing Software for Real-World Solutions 2.pptxThe Codex of Business Writing Software for Real-World Solutions 2.pptx
The Codex of Business Writing Software for Real-World Solutions 2.pptx
 
Driving Behavioral Change for Information Management through Data-Driven Gree...
Driving Behavioral Change for Information Management through Data-Driven Gree...Driving Behavioral Change for Information Management through Data-Driven Gree...
Driving Behavioral Change for Information Management through Data-Driven Gree...
 
CNv6 Instructor Chapter 6 Quality of Service
CNv6 Instructor Chapter 6 Quality of ServiceCNv6 Instructor Chapter 6 Quality of Service
CNv6 Instructor Chapter 6 Quality of Service
 
Finology Group – Insurtech Innovation Award 2024
Finology Group – Insurtech Innovation Award 2024Finology Group – Insurtech Innovation Award 2024
Finology Group – Insurtech Innovation Award 2024
 
From Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time AutomationFrom Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time Automation
 
Presentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreterPresentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreter
 
Boost Fertility New Invention Ups Success Rates.pdf
Boost Fertility New Invention Ups Success Rates.pdfBoost Fertility New Invention Ups Success Rates.pdf
Boost Fertility New Invention Ups Success Rates.pdf
 
The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024
 

Application security overview

  • 1. Application Security Dilan Warnakulasooriya Asanka Fernandopulle Information Security Engineer Senior Software Engineer 99X Technology 99X Technology 1/1/2013 99X Technology(c) 1
  • 2. Basics of Application Security • HTTP and HTTPS • Symmetric key • Asymmetric key • Session key • Analyzing a certificate • Sniffing HTTP and HTTPS • Calomel plugin 1/1/2013 99X Technology(c) 2
  • 3. Basics of Application Security • Man in the middle • Analyzing browser requests • Analyzing server response • https communication • https and s-http 1/1/2013 99X Technology(c) 3
  • 4. Basics of Application Security • What OWASP does • Builders , Breakers and Defenders 1/1/2013 99X Technology(c) 4
  • 5. Web Application penetration testing • Basic web testing methodology • Vulnerability, Threat and Exploit • Developer level application security overview 1/1/2013 99X Technology(c) 5
  • 6. Web Application penetration testing • Application Security frameworks • Before development begins • During definition and design • During development • During deployment • Maintenance and operations 1/1/2013 99X Technology(c) 6
  • 7. Web Application penetration testing • Web application security review frameworks • Samurai WTF • Websecurify • Wapiti • Skiffish • Acunetix • Webscarab • W3af 1/1/2013 99X Technology(c) 7
  • 8. Secure Authentication • Authentication/Access control methods 1/1/2013 99X Technology(c) 8
  • 9. Secure Authentication • Authentication bypass techniques • Direct page request • Parameter modification • Session ID prediction • Sql injection Session predictability - webscarab/burpsuite 1/1/2013 99X Technology(c) 9
  • 10. Secure Authentication • Bypass authentication matrix • Basic authentication • Multi-Level login 1 • Multi-Level login 2 1/1/2013 99X Technology(c) 10
  • 11. Secure Authentication • Password remember • Password strength • Forgot password • Browser cache management 1/1/2013 99X Technology(c) 11
  • 12. Secure Authentication • Parameter tampering • Bypass HTML Field restrictions • Exploit hidden fields • Bypass client side JavaScript validation • Coding controls for Parameter Tampering 1/1/2013 99X Technology(c) 12
  • 13. Secure Authentication • Access control flaws • Using an Access control matrix • Bypass a path based access control scheme • Bypass data layer access control 1/1/2013 99X Technology(c) 13
  • 14. Injections • SQL injection classes • In band • Out of band • Inferential 1/1/2013 99X Technology(c) 14
  • 15. Injections • Techniques to exploit sql injections • Union operator • Boolean • Error based • Out of band • Time delay 1/1/2013 99X Technology(c) 15
  • 16. Injections • Standard SQL injection testing • SELECT * FROM Users WHERE Username='$username' AND Password='$password' • Numeric sql injection 1/1/2013 99X Technology(c) 16
  • 17. Injections • Union Exploitation technique • Xpath injection • String sql injection 1/1/2013 99X Technology(c) 17
  • 18. Injections • Boolean Exploitation technique • Sql injection : stage 1 : String sql injection • Stage 3 : Numeric sql injection 1/1/2013 99X Technology(c) 18
  • 19. Injections • Error based Exploitation technique • Modify data with sql injection • Add data with sql injection 1/1/2013 99X Technology(c) 19
  • 20. Injections • Out of band Exploitation technique 1/1/2013 99X Technology(c) 20
  • 21. Injections • Time delay Exploitation technique • Stored procedure Exploitation technique • Automated Exploitation technique 1/1/2013 99X Technology(c) 21
  • 22. Injections • How developers work on SQL injection • Automate your injection • sqlmap 1/1/2013 99X Technology(c) 22
  • 23. Session Management • Session management techniques • Session management vulnerability • insufficient session id length • Session fixation • Session variable overloading 1/1/2013 99X Technology(c) 23
  • 24. Session Management • Check your cookies • Cookie collection • Cookie reverse engineering • Cookie manipulation • Hijack a session • Hijack a session • Spoof an authentication cookie • Session fixation 1/1/2013 99X Technology(c) 24
  • 25. Session Management • How developers work on session handling 1/1/2013 99X Technology(c) 25
  • 26. Code Quality • Code quality breach • Discover clues in the HTML 1/1/2013 99X Technology(c) 26
  • 27. Cross Site Scripting • Scripting types • Reflected cross site scripting (non-persistent XSS) • Stored cross site scripting (second-order XSS) • DOM based cross site scripting (type 0 xss) 1/1/2013 99X Technology(c) 27
  • 28. Cross Site Scripting • Reflected cross site scripting (non-persistent XSS) • Testing for reflected XSS • Reflected xss 1/1/2013 99X Technology(c) 28
  • 29. Cross Site Scripting • Bypass XSS filters • Tag Attribute Value • Different syntax or enconding • Bypassing non-recursive filtering 1/1/2013 99X Technology(c) 29
  • 30. Cross Site Scripting • Stored cross site scripting (second-order XSS) • XSS attack scenario • Stored XSS 1/1/2013 99X Technology(c) 30
  • 31. Cross Site Scripting • Testing for Stored cross site scripting • Input forms • Analyze HTML code • Exploitation framework • File upload 1/1/2013 99X Technology(c) 31
  • 32. Cross Site Scripting • How developer handle XSS and CSRF 1/1/2013 99X Technology(c) 32
  • 33. Testing Tools • Proxy • How to write secure programs 1/1/2013 99X Technology(c) 33
  • 34. Thank you 1/1/2013 99X Technology(c) 34