SlideShare uma empresa Scribd logo
1 de 9
Security in Hacking Silverlight
Avoid being hacked
Miguel Madero
•   Job: Senior Consultant - Readify
•   Blog: www.miguelmadero.com
•   Twitter: @mamadero
•   Mail: me@miguelmadero.com
Survey
Typical Application (Demo version)
Roles
New Requirements
New Requirements
Security - Conclusion
• You can’t trust
  ▫   The client
  ▫   The network
  ▫   The server
  ▫   Your users
  ▫   The compiler
Miguel Madero
•   Job: Senior Developer en Readify
•   Blog: www.miguelmadero.com
•   Twitter: @mamadero
•   Mail: me@miguelmadero.com

Mais conteúdo relacionado

Destaque

Ioug 2010 oracle critical patch updates unwrapped presentation
Ioug 2010 oracle critical patch updates unwrapped presentationIoug 2010 oracle critical patch updates unwrapped presentation
Ioug 2010 oracle critical patch updates unwrapped presentation
maclean liu
 
Upgrade 11.2.0.1 rac db to 11.2.0.2 in linux
Upgrade 11.2.0.1 rac db to 11.2.0.2 in linuxUpgrade 11.2.0.1 rac db to 11.2.0.2 in linux
Upgrade 11.2.0.1 rac db to 11.2.0.2 in linux
maclean liu
 
11g新特性streams同步捕获
11g新特性streams同步捕获11g新特性streams同步捕获
11g新特性streams同步捕获
maclean liu
 
Oracle数据库升级前必要的准备工作
Oracle数据库升级前必要的准备工作Oracle数据库升级前必要的准备工作
Oracle数据库升级前必要的准备工作
maclean liu
 
Oracle中比对2张表之间数据是否一致的几种方法
Oracle中比对2张表之间数据是否一致的几种方法Oracle中比对2张表之间数据是否一致的几种方法
Oracle中比对2张表之间数据是否一致的几种方法
maclean liu
 
Evaluating my trailer
Evaluating my trailerEvaluating my trailer
Evaluating my trailer
abcdsmile
 
Protecting polish borders against illicit trafficking od radioactive sources ...
Protecting polish borders against illicit trafficking od radioactive sources ...Protecting polish borders against illicit trafficking od radioactive sources ...
Protecting polish borders against illicit trafficking od radioactive sources ...
Leishman Associates
 

Destaque (19)

Gandhi Ultimate Marketing Guru1234 X5555
Gandhi  Ultimate Marketing Guru1234 X5555Gandhi  Ultimate Marketing Guru1234 X5555
Gandhi Ultimate Marketing Guru1234 X5555
 
还原Oracle中真实的cache recovery
还原Oracle中真实的cache recovery还原Oracle中真实的cache recovery
还原Oracle中真实的cache recovery
 
Ioug 2010 oracle critical patch updates unwrapped presentation
Ioug 2010 oracle critical patch updates unwrapped presentationIoug 2010 oracle critical patch updates unwrapped presentation
Ioug 2010 oracle critical patch updates unwrapped presentation
 
Upgrade 11.2.0.1 rac db to 11.2.0.2 in linux
Upgrade 11.2.0.1 rac db to 11.2.0.2 in linuxUpgrade 11.2.0.1 rac db to 11.2.0.2 in linux
Upgrade 11.2.0.1 rac db to 11.2.0.2 in linux
 
PR Moment event 26 March 2015: What do journalists want from PRs?
PR Moment event 26 March 2015: What do journalists want from PRs? PR Moment event 26 March 2015: What do journalists want from PRs?
PR Moment event 26 March 2015: What do journalists want from PRs?
 
11g新特性streams同步捕获
11g新特性streams同步捕获11g新特性streams同步捕获
11g新特性streams同步捕获
 
Facebook for PR Pros
Facebook for PR ProsFacebook for PR Pros
Facebook for PR Pros
 
Oracle数据库升级前必要的准备工作
Oracle数据库升级前必要的准备工作Oracle数据库升级前必要的准备工作
Oracle数据库升级前必要的准备工作
 
Presentation for Workshop on RTTC Curriculum Revision workshop
Presentation for Workshop on RTTC Curriculum Revision workshopPresentation for Workshop on RTTC Curriculum Revision workshop
Presentation for Workshop on RTTC Curriculum Revision workshop
 
Varamobaden Vision 2025
Varamobaden Vision 2025 Varamobaden Vision 2025
Varamobaden Vision 2025
 
Implementasi TLS dan SRTP pada VoIP Server
Implementasi TLS dan SRTP pada VoIP ServerImplementasi TLS dan SRTP pada VoIP Server
Implementasi TLS dan SRTP pada VoIP Server
 
Oracle中比对2张表之间数据是否一致的几种方法
Oracle中比对2张表之间数据是否一致的几种方法Oracle中比对2张表之间数据是否一致的几种方法
Oracle中比对2张表之间数据是否一致的几种方法
 
Pitch Perfect: Giving Journalists What they Want
Pitch Perfect: Giving Journalists What they WantPitch Perfect: Giving Journalists What they Want
Pitch Perfect: Giving Journalists What they Want
 
Hallgrímur.P.
Hallgrímur.P.Hallgrímur.P.
Hallgrímur.P.
 
Angular js 의존관계 주입과 서비스
Angular js 의존관계 주입과 서비스Angular js 의존관계 주입과 서비스
Angular js 의존관계 주입과 서비스
 
Evaluating my trailer
Evaluating my trailerEvaluating my trailer
Evaluating my trailer
 
HTML5
HTML5HTML5
HTML5
 
castironknickers
castironknickerscastironknickers
castironknickers
 
Protecting polish borders against illicit trafficking od radioactive sources ...
Protecting polish borders against illicit trafficking od radioactive sources ...Protecting polish borders against illicit trafficking od radioactive sources ...
Protecting polish borders against illicit trafficking od radioactive sources ...
 

Último

Último (20)

Powerful Google developer tools for immediate impact! (2023-24 C)
Powerful Google developer tools for immediate impact! (2023-24 C)Powerful Google developer tools for immediate impact! (2023-24 C)
Powerful Google developer tools for immediate impact! (2023-24 C)
 
Artificial Intelligence Chap.5 : Uncertainty
Artificial Intelligence Chap.5 : UncertaintyArtificial Intelligence Chap.5 : Uncertainty
Artificial Intelligence Chap.5 : Uncertainty
 
TrustArc Webinar - Unlock the Power of AI-Driven Data Discovery
TrustArc Webinar - Unlock the Power of AI-Driven Data DiscoveryTrustArc Webinar - Unlock the Power of AI-Driven Data Discovery
TrustArc Webinar - Unlock the Power of AI-Driven Data Discovery
 
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
 
ProductAnonymous-April2024-WinProductDiscovery-MelissaKlemke
ProductAnonymous-April2024-WinProductDiscovery-MelissaKlemkeProductAnonymous-April2024-WinProductDiscovery-MelissaKlemke
ProductAnonymous-April2024-WinProductDiscovery-MelissaKlemke
 
The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024
 
Boost Fertility New Invention Ups Success Rates.pdf
Boost Fertility New Invention Ups Success Rates.pdfBoost Fertility New Invention Ups Success Rates.pdf
Boost Fertility New Invention Ups Success Rates.pdf
 
🐬 The future of MySQL is Postgres 🐘
🐬  The future of MySQL is Postgres   🐘🐬  The future of MySQL is Postgres   🐘
🐬 The future of MySQL is Postgres 🐘
 
Scaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organizationScaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organization
 
Top 5 Benefits OF Using Muvi Live Paywall For Live Streams
Top 5 Benefits OF Using Muvi Live Paywall For Live StreamsTop 5 Benefits OF Using Muvi Live Paywall For Live Streams
Top 5 Benefits OF Using Muvi Live Paywall For Live Streams
 
Workshop - Best of Both Worlds_ Combine KG and Vector search for enhanced R...
Workshop - Best of Both Worlds_ Combine  KG and Vector search for  enhanced R...Workshop - Best of Both Worlds_ Combine  KG and Vector search for  enhanced R...
Workshop - Best of Both Worlds_ Combine KG and Vector search for enhanced R...
 
Strategies for Landing an Oracle DBA Job as a Fresher
Strategies for Landing an Oracle DBA Job as a FresherStrategies for Landing an Oracle DBA Job as a Fresher
Strategies for Landing an Oracle DBA Job as a Fresher
 
2024: Domino Containers - The Next Step. News from the Domino Container commu...
2024: Domino Containers - The Next Step. News from the Domino Container commu...2024: Domino Containers - The Next Step. News from the Domino Container commu...
2024: Domino Containers - The Next Step. News from the Domino Container commu...
 
presentation ICT roal in 21st century education
presentation ICT roal in 21st century educationpresentation ICT roal in 21st century education
presentation ICT roal in 21st century education
 
GenAI Risks & Security Meetup 01052024.pdf
GenAI Risks & Security Meetup 01052024.pdfGenAI Risks & Security Meetup 01052024.pdf
GenAI Risks & Security Meetup 01052024.pdf
 
How to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerHow to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected Worker
 
Repurposing LNG terminals for Hydrogen Ammonia: Feasibility and Cost Saving
Repurposing LNG terminals for Hydrogen Ammonia: Feasibility and Cost SavingRepurposing LNG terminals for Hydrogen Ammonia: Feasibility and Cost Saving
Repurposing LNG terminals for Hydrogen Ammonia: Feasibility and Cost Saving
 
Tata AIG General Insurance Company - Insurer Innovation Award 2024
Tata AIG General Insurance Company - Insurer Innovation Award 2024Tata AIG General Insurance Company - Insurer Innovation Award 2024
Tata AIG General Insurance Company - Insurer Innovation Award 2024
 
Apidays New York 2024 - The value of a flexible API Management solution for O...
Apidays New York 2024 - The value of a flexible API Management solution for O...Apidays New York 2024 - The value of a flexible API Management solution for O...
Apidays New York 2024 - The value of a flexible API Management solution for O...
 
Deploy with confidence: VMware Cloud Foundation 5.1 on next gen Dell PowerEdg...
Deploy with confidence: VMware Cloud Foundation 5.1 on next gen Dell PowerEdg...Deploy with confidence: VMware Cloud Foundation 5.1 on next gen Dell PowerEdg...
Deploy with confidence: VMware Cloud Foundation 5.1 on next gen Dell PowerEdg...
 

Security in Silverlight/Hacking Silverlight Applications

Notas do Editor

  1. Welcome... BlablablablaWe’ll wait until more ppl gets in with their beers and are ready to start. And you can ask questions during the talk. Just if I lost the track you’ll have to remind me where I was.
  2. Before starting, I’ll introduce myself.
  3. Who writes secure apps? Who hacks secure apps? For fun? Or work?
  4. We all write this type of apps. Get some data. Made some changes Send some data backWe also sometimes need to Authenticate users Authorize users Limit the data accessed by each userBut sometimes we need to go beyond that. Silverlight poses especial risks that we need to take into account as well as other RIA platforms AJAX and Flex apps for example. Some AJAX app just generate HTML on the Server and update it on the client, although they provide a nice experience, they’re not Rich in the sense that they don’t have business logic running in the client, we’ll see later why this make the Security concerns specially different. Also other smart apps, like WinForms or WPF, present similar issues, specially when they’re using Services. Those risks are commonly over looked because ‘everything behind the firewall is safe’
  5. First of all we need a way to authenticate the users and securely exchange tokens. -ASP.NET Membership, Custom User Mechanism http://miguelmadero.blogspot.com/2008/08/using-aspnet-providers-from-silverlight.htmlWe can have security at different levels:-Server, Data and Network Security are as important as with ASP.NET and WinForms. Can’t say more. NA-Solution. At the UI we can hide, disabled certain controls based on claims. Security ADPs. Explain how cool is to use AttachedProperties. -Hack with sniffers Sniffer (http://miguelmadero.blogspot.com/2008/07/sniffers-and-silverlight.html)-Solution HTTPS? Message Level Security? -Hack. Attach Debugger and See Data. -Solution. Send only what we need. Similar to AJAX and Services in general, we should only send what we need. We can trust our app (?) but not the guys in the middle our app and server-Hack. Identity Theft-Solution. The Service should have similar validations. i.e. Can’t call a certain method. Use Attributes and AOP. Security Attributes (AOP) and PostSharp-Explain. Sensitive strings?
  6. We can’t trues anyone. We saw that UI Level Security, hidden/showing fields to protect functions and data is not enoughWe can spy the network, just as everyone in between can do it. The server. You might be sending the information to someone else (phishing). Your users are authenticated, but that’s not enough. You need to authorize them based on claims, roles or whatever. We saw that SL apps can easily be reversed engineered. Our assemblies on the server might be a bit safer (that doesn’t justify storing critical data there), it just means SL is more vulnerable.
  7. Before starting, I’ll introduce myself.