host and application security lesson 20: how the web does not work

9
Host and Application Security Lesson 20: How the Web Does not Work

Upload: benedict-hall

Post on 20-Jan-2016

216 views

Category:

Documents


0 download

TRANSCRIPT

Page 1: Host and Application Security Lesson 20: How the Web Does not Work

Host and Application SecurityLesson 20: How the Web Does not Work

Page 2: Host and Application Security Lesson 20: How the Web Does not Work

Remind me… Precisely how does the web work?

Page 3: Host and Application Security Lesson 20: How the Web Does not Work

Web Vulns This is host and application security, so we’re

focusing on the host issues

Page 4: Host and Application Security Lesson 20: How the Web Does not Work

Simple Simple buffer overruns/security vulns in the

browser or in its plugins Determining the list of plugins is harder than

it probably needs to be

Page 5: Host and Application Security Lesson 20: How the Web Does not Work

Javascript Pretty powerful language History of different classes of vulnerabilites…

perhaps most famous is cross site scripting

Page 6: Host and Application Security Lesson 20: How the Web Does not Work

Java Applets Tell me about Java Applets and their security

model Isn’t that good enough? Why? Why not?

Page 7: Host and Application Security Lesson 20: How the Web Does not Work

ActiveX “Safe for scripting”? ActiveX: Pros and Cons?

Page 8: Host and Application Security Lesson 20: How the Web Does not Work

Clickjacking A really neat exploit – get the user to click on

one thing when they think they are clicking on another

Example: a one click bank transfer Cross-frame issues make life very interesting

Page 9: Host and Application Security Lesson 20: How the Web Does not Work

To Do Find and read the ACM Queue paper

“Browser Security: Lessons from Google Chrome”

Write a demonstration of a cross site scripting attack. Do this in essay form, showing the code you would have on both ends and how it would work. What is the future for XSS attacks?