OWASP – Top 10
Patrik Karlsson patrik@cqure.net Martin Holst Swende martin.swende@2secure.se 2012-09-24
OWASP Top 10 Patrik Karlsson patrik@cqure.net Martin Holst Swende - - PowerPoint PPT Presentation
OWASP Top 10 Patrik Karlsson patrik@cqure.net Martin Holst Swende martin.swende@2secure.se 2012-09-24 Patrik Karlsson Director at NASDAQ OMX 13+ years of IT-Security experience Speaker at OWASP, Defcon, SEC- T, T2
Patrik Karlsson patrik@cqure.net Martin Holst Swende martin.swende@2secure.se 2012-09-24
Corporate Security Screening Services Executive Security Information Security
Infosec Management
IT Security
Executive protection Risk assessment Security analyses Training Incident management Chief Security Officer Security analysis Security audit Crisis management Incident management Training Investigations Background checks
Investigations
and implementation flaws.
implementation flaws.
the SDLC.
sending him an e-mail
tab and walks away.
is still authenticated.
the proper profile can be loaded.
can access other users profiles.
http://app/download.aspx?id=1234&document=cv.doc
../../download.aspx and download the application source code.
nAccount=4673243243
the victim‟s account to their account
stored on various sites under the attacker‟s control.
src="http://example.com/app/transferFunds?amount=1500&dest inationAccount=attackersAcct#" width="0" height="0" />
authenticated to example.com, any forged requests will include the user‟s session info, inadvertently authorizing the request.
access control flaw in your application.
against the credit card columns
credit card information in plain-text
applications to decrypt them, not the front end web application.
the attacker may be able to get unauthorized access
inactive links to pages that require higher privileges
these pages and their functionality
use SSL for all pages that require authentication.
network traffic and observes an authenticated victim‟s session cookie.
cookie and takes over the user‟s session
malicious site that performs phishing and installs malware.
the user should be sent if a transaction is successful.
application‟s access control check and pass her to admin.jsp
Conversion failed when converting the nvarchar value 'Microsoft SQL Server 2005”
attacker could study the behavior of the application
powerful application user
the application account
total compromise of the system
placeholders
the application to SQL injection
it cannot harvest your contacts or spam all your friends
and issue payments
victim
detect
document.location
http://twitter.com/mhswende
(e.g. lose money in a poker application)
in an internal administration interface)
information)
data is being placed.
https://www.owasp.org/index.php/XSS_(Cross_Site_Scripting)_Prev ention_Cheat_Sheet
using white-list approach.
usernames.
HTML Body HTML Attributes <STYLE> Context <SCRIPT> Context URL Context
from reading the value of cookies.
anyway.
allowed to be loaded from
browsers now have native XSS-protection (while still not perfect, they become better all the time)