Webseclab
Elie Bursztein Baptiste Gourdin Celine Fabry Jason Bau Gustav Rydstedt Hristo Bojinov Dan Boneh John C. Mitchell Stanford University
1
Webseclab Elie Bursztein Baptiste Gourdin Celine Fabry - - PowerPoint PPT Presentation
Webseclab Elie Bursztein Baptiste Gourdin Celine Fabry Jason Bau Gustav Rydstedt Hristo Bojinov Dan Boneh John C. Mitchell Stanford University 1 Web vs System Evolution of the number of vulnerabilties by years 3000 2793
Elie Bursztein Baptiste Gourdin Celine Fabry Jason Bau Gustav Rydstedt Hristo Bojinov Dan Boneh John C. Mitchell Stanford University
1
Elie Bursztein et al Webseclab http://ly.tl/t15
1186 2793 1528 996 1275 1095 2000 1951 1531 1647 Number of vulnerabilities 1000 2000 3000 2005 2006 2007 2008 2009 Evolution of the number of vulnerabilties by years Web System
Elie Bursztein et al Webseclab http://ly.tl/t15
Number of vulnerability 100 200 300 400 500 600 700 800 900 1000 2005 2006 2007 2008 2009 Evolution of the web vulnerabilities over the years by types XSS SQLi XCS Session CSRF SSL Infomation Leak
Elie Bursztein et al Webseclab http://ly.tl/t15
1 2 3 4 5 6 7 8 9 10 2005 2006 2007 2008 2009 2010
Elie Bursztein et al Webseclab http://ly.tl/t15
140 224 302 511 1170 1220 5070 pl do cfm jsp asp aspx php
0% 10% 20% 30% 40% 50% 60% 70% 80% 90% 100% PHP ASP ASPX JSP CFM DO PL
Elie Bursztein et al Webseclab http://ly.tl/t15
Elie Bursztein et al Webseclab http://ly.tl/t15
Cloud service VM1 VM2
VM1 VM2
Elie Bursztein Slide deck 2010 http://ly.tl/t1
Elie Bursztein et al Webseclab http://ly.tl/t15
Elie Bursztein et al Webseclab http://ly.tl/t15
Elie Bursztein et al Webseclab http://ly.tl/t15
Webseclab Webseclab
Elie Bursztein et al Webseclab http://ly.tl/t15
Virtual ¡Machine IDE Sandbox Firefox WebSecLab SQL ¡via ¡phpmyadmin Categories Exercise Objective Constraints Pitch Exercice ¡ rendered Exercice ¡ code Hints Sync Dashboard
Webseclab Webseclab
Elie Bursztein et al Webseclab http://ly.tl/t15
5 10 15 20
6 1 4 5 12 6 17 7 8 7
Introduction Browser security Mixing content XSS CSRF Session Phishing Authentication Embedding SQL injections