securing web applications at the network layer · 2020-01-17 · 3 55 1st owasp spain chapter...

22
1 Internet Internet Securing Web Applications at the Network Layer Securing Web Applications at the Network Layer 2006 2006 Jessland Jessland Security Security Services Services www.jessland.net Securing Web Applications... ...at the Network Layer Carlos Fragoso Mariscal Chief Technical Director [email protected] OWASP Spain Chapter Meeting 16 th June, 2006 – Barcelona (ES) 2 www.jessland.net 1st OWASP Spain Chapter Meeting Securing Web Applications at the Network Layer Securing Web Applications at the Network Layer 2006 2006 Jessland Jessland Security Security Services Services Consider network security as a defense-in-depth approach for web application security Learn how security architecture could provide a robust topology to enforce security in web services environments Have fun with our case-based scenario Goals

Upload: others

Post on 28-Jun-2020

2 views

Category:

Documents


0 download

TRANSCRIPT

Page 1: Securing Web Applications at the Network Layer · 2020-01-17 · 3 55 1st OWASP Spain Chapter Meeting Securing Web Applications at the Network LayerSecuring Web Applications at the

11

InternetInternet

Securing Web Applications at the Network LayerSecuring Web Applications at the Network Layer -- ©© 2006 2006 JesslandJessland SecuritySecurity ServicesServices www.jessland.net

Securing Web Applications... ...at the Network Layer

Carlos Fragoso Mariscal

Chief Technical Director

[email protected]

OWASP Spain Chapter Meeting16th June, 2006 – Barcelona (ES)

22 www.jessland.net

1st OWASP Spain Chapter Meeting

Securing Web Applications at the Network LayerSecuring Web Applications at the Network Layer -- ©© 2006 2006 JesslandJessland SecuritySecurity ServicesServices

� Consider network security as a defense-in-depth approach for web application security

� Learn how security architecture could provide a robust topology to enforce security in web services environments

� Have fun with our case-based scenario

Goals

Page 2: Securing Web Applications at the Network Layer · 2020-01-17 · 3 55 1st OWASP Spain Chapter Meeting Securing Web Applications at the Network LayerSecuring Web Applications at the

22

33 www.jessland.net

1st OWASP Spain Chapter Meeting

Securing Web Applications at the Network LayerSecuring Web Applications at the Network Layer -- ©© 2006 2006 JesslandJessland SecuritySecurity ServicesServices

� Web Applications

� Security Architecture

� Case Study

� Conclusions

� References

Agenda

44 www.jessland.net

1st OWASP Spain Chapter Meeting

Securing Web Applications at the Network LayerSecuring Web Applications at the Network Layer -- ©© 2006 2006 JesslandJessland SecuritySecurity ServicesServices

� Web Applications

� Security Architecture

� Case Study

� Conclusions

� References

Agenda

Page 3: Securing Web Applications at the Network Layer · 2020-01-17 · 3 55 1st OWASP Spain Chapter Meeting Securing Web Applications at the Network LayerSecuring Web Applications at the

33

55 www.jessland.net

1st OWASP Spain Chapter Meeting

Securing Web Applications at the Network LayerSecuring Web Applications at the Network Layer -- ©© 2006 2006 JesslandJessland SecuritySecurity ServicesServices

� Web application clients mainly use HTTP protocol as their interface to the application

� Users (B2C) and hosts (B2B) reside on external or business partners networks

Web Applications’ Interface

66 www.jessland.net

1st OWASP Spain Chapter Meeting

Securing Web Applications at the Network LayerSecuring Web Applications at the Network Layer -- ©© 2006 2006 JesslandJessland SecuritySecurity ServicesServices

� Some web applications are not able to separate interface and application layers so they are just one

� Data layer is commonly a filesystem or a database

InterfaceInterface

ApplicationApplication

DataData

Web Application’s layered model

Page 4: Securing Web Applications at the Network Layer · 2020-01-17 · 3 55 1st OWASP Spain Chapter Meeting Securing Web Applications at the Network LayerSecuring Web Applications at the

44

77 www.jessland.net

1st OWASP Spain Chapter Meeting

Securing Web Applications at the Network LayerSecuring Web Applications at the Network Layer -- ©© 2006 2006 JesslandJessland SecuritySecurity ServicesServices

� First operational and security approach is to separate the EVERY layers on DIFFERENT hosts

InterfaceInterface

ApplicationApplication

DataData

Web Application Layers’ segmentation

88 www.jessland.net

1st OWASP Spain Chapter Meeting

Securing Web Applications at the Network LayerSecuring Web Applications at the Network Layer -- ©© 2006 2006 JesslandJessland SecuritySecurity ServicesServices

� Web Applications

� Security Architecture

� Case Study

� Conclusions

� References

Agenda

Page 5: Securing Web Applications at the Network Layer · 2020-01-17 · 3 55 1st OWASP Spain Chapter Meeting Securing Web Applications at the Network LayerSecuring Web Applications at the

55

99 www.jessland.net

1st OWASP Spain Chapter Meeting

Securing Web Applications at the Network LayerSecuring Web Applications at the Network Layer -- ©© 2006 2006 JesslandJessland SecuritySecurity ServicesServices

� Defense-in-depth

� Technology balance

� Least privilege principle

� Simplicity

� Biodiversity

� Access control

� Operational/Risk balance

� Escalability

� Redundancy

Design Parameters

1010 www.jessland.net

1st OWASP Spain Chapter Meeting

Securing Web Applications at the Network LayerSecuring Web Applications at the Network Layer -- ©© 2006 2006 JesslandJessland SecuritySecurity ServicesServices

What does Perimeter mean?

Page 6: Securing Web Applications at the Network Layer · 2020-01-17 · 3 55 1st OWASP Spain Chapter Meeting Securing Web Applications at the Network LayerSecuring Web Applications at the

66

1111 www.jessland.net

1st OWASP Spain Chapter Meeting

Securing Web Applications at the Network LayerSecuring Web Applications at the Network Layer -- ©© 2006 2006 JesslandJessland SecuritySecurity ServicesServices

� Internet

� Extranets

–Business partner or remote sites

� DMZ’s

–External

–Internal

� Intranets

–Users network

–Protected network

Security Areas

1212 www.jessland.net

1st OWASP Spain Chapter Meeting

Securing Web Applications at the Network LayerSecuring Web Applications at the Network Layer -- ©© 2006 2006 JesslandJessland SecuritySecurity ServicesServices

� Firewalls

� Routers

� Switches

� Intrusion Detection/Prevention Systems

� Honeypots and Honeynets

� Security Event Managers

� Servers

� Desktop and mobile end-user systems

� Wireless Access Points

� Hybrids

Devices

Page 7: Securing Web Applications at the Network Layer · 2020-01-17 · 3 55 1st OWASP Spain Chapter Meeting Securing Web Applications at the Network LayerSecuring Web Applications at the

77

1313 www.jessland.net

1st OWASP Spain Chapter Meeting

Securing Web Applications at the Network LayerSecuring Web Applications at the Network Layer -- ©© 2006 2006 JesslandJessland SecuritySecurity ServicesServices

� Security policy

� Security levels classification

� Deploy network devices

� Segmentation with firewalls

� Deploy additional security devices

–IDS/IPS

–Content inspection

–VPNs

Network Design step-by-step

1414 www.jessland.net

1st OWASP Spain Chapter Meeting

Securing Web Applications at the Network LayerSecuring Web Applications at the Network Layer -- ©© 2006 2006 JesslandJessland SecuritySecurity ServicesServices

� Interconnects different security level networks providing traffic access control

� Technology:– Stateless: each packet handled individually

– Stateful: keeps state of network flows

– Stateful Inspection: understand application layer protocols

� Value-added features:– Load balancing, failover, address translation, VPNs, packet normalization, content inspection, etc.

� Ruleset:– Firewall lockdown

–No logging

– Log denied

– Sneaky rule

Network Firewalls

Page 8: Securing Web Applications at the Network Layer · 2020-01-17 · 3 55 1st OWASP Spain Chapter Meeting Securing Web Applications at the Network LayerSecuring Web Applications at the

88

1515 www.jessland.net

1st OWASP Spain Chapter Meeting

Securing Web Applications at the Network LayerSecuring Web Applications at the Network Layer -- ©© 2006 2006 JesslandJessland SecuritySecurity ServicesServices

DMZ ext

DMZ int

DMZ Protegida

Internet

R int

M ext

R ext

Red Protegida

M

R

M int

Intranet 1

Intranet 2

DMZ ext

DMZ int

DMZ Protegida

Internet

R int

M ext

R ext

Red Protegida

M

R

M int

Intranet 1

Intranet 2

1616 www.jessland.net

1st OWASP Spain Chapter Meeting

Securing Web Applications at the Network LayerSecuring Web Applications at the Network Layer -- ©© 2006 2006 JesslandJessland SecuritySecurity ServicesServices

� Their job is to provide network audit features and intrusion detection/prevention over the network

� Types: network, node (IDS) and in-line (IDS, IPS)� Traffic capture: taps, hubs, span ports, balancing...� Advantages:

– Easy to deploy– Effective–Good scalability

� Disadvantages– False positives– False negatives–Non-textual alarms–High-volume of data–Ciphered traffic

� An IPS is not a firewall !!!

Network Intrusion/Prevention Systems

Page 9: Securing Web Applications at the Network Layer · 2020-01-17 · 3 55 1st OWASP Spain Chapter Meeting Securing Web Applications at the Network LayerSecuring Web Applications at the

99

1717 www.jessland.net

1st OWASP Spain Chapter Meeting

Securing Web Applications at the Network LayerSecuring Web Applications at the Network Layer -- ©© 2006 2006 JesslandJessland SecuritySecurity ServicesServices

Workstations

Servers

External Services

ID Network

IDSManagement & Analysis

Log Server/ SEM

1818 www.jessland.net

1st OWASP Spain Chapter Meeting

Securing Web Applications at the Network LayerSecuring Web Applications at the Network Layer -- ©© 2006 2006 JesslandJessland SecuritySecurity ServicesServices

� Critical information must be placed FAR AWAY from possible risky areas

� Network security does NOT patch your hosts for you!

� Some critical services have a low rate of possible vulnerabilities because they have been heavily tested

� Sometimes information must be replicatedto give a limited-scope view

Tips’n’hints ☺☺☺☺

Page 10: Securing Web Applications at the Network Layer · 2020-01-17 · 3 55 1st OWASP Spain Chapter Meeting Securing Web Applications at the Network LayerSecuring Web Applications at the

1010

1919 www.jessland.net

1st OWASP Spain Chapter Meeting

Securing Web Applications at the Network LayerSecuring Web Applications at the Network Layer -- ©© 2006 2006 JesslandJessland SecuritySecurity ServicesServices

PreventionPrevention

DetectionDetection

Reaction !Reaction !

2020 www.jessland.net

1st OWASP Spain Chapter Meeting

Securing Web Applications at the Network LayerSecuring Web Applications at the Network Layer -- ©© 2006 2006 JesslandJessland SecuritySecurity ServicesServices

� Web Applications

� Security Architecture

� Case Study

� Conclusions

� References

Agenda

Page 11: Securing Web Applications at the Network Layer · 2020-01-17 · 3 55 1st OWASP Spain Chapter Meeting Securing Web Applications at the Network LayerSecuring Web Applications at the

1111

2121 www.jessland.net

1st OWASP Spain Chapter Meeting

Securing Web Applications at the Network LayerSecuring Web Applications at the Network Layer -- ©© 2006 2006 JesslandJessland SecuritySecurity ServicesServices

Hackobo vs Armando

Clueless to

smart admin

3l33t to

deceived hacker

Security Architecture Case Study

2222 www.jessland.net

1st OWASP Spain Chapter Meeting

Securing Web Applications at the Network LayerSecuring Web Applications at the Network Layer -- ©© 2006 2006 JesslandJessland SecuritySecurity ServicesServices

IntranetIntranet

Internet

External

Servers

Workstations

Internal

Server

� Corporate network grew WITHOUT a security-minded approach

� Several security INCIDENTS lead to a security architecture redesign

� Let’s help Armando about how to face common issues on his way to a new architecture deployment

Armando’s Network Overview

Page 12: Securing Web Applications at the Network Layer · 2020-01-17 · 3 55 1st OWASP Spain Chapter Meeting Securing Web Applications at the Network LayerSecuring Web Applications at the

1212

2323 www.jessland.net

1st OWASP Spain Chapter Meeting

Securing Web Applications at the Network LayerSecuring Web Applications at the Network Layer -- ©© 2006 2006 JesslandJessland SecuritySecurity ServicesServices

� External users access external servers

� Some external servers (web, app, dns, smtp) need to access internal server

� Workstation users manage servers and have Internet access

IntranetIntranet

Internet

External

Servers

Workstations

Internal

Server

Identify how systems talk to each other

2424 www.jessland.net

1st OWASP Spain Chapter Meeting

Securing Web Applications at the Network LayerSecuring Web Applications at the Network Layer -- ©© 2006 2006 JesslandJessland SecuritySecurity ServicesServices

IntranetIntranet

Internet

External

Servers

Workstations

Internal

Server

� Internal server contains corporate “JEWELS OF THE CROWN”

� Workstation users manage corporate infrastructure

� External servers provide services to the outside

� Internet is a public, least-secure, network

Identifying security areas

Page 13: Securing Web Applications at the Network Layer · 2020-01-17 · 3 55 1st OWASP Spain Chapter Meeting Securing Web Applications at the Network LayerSecuring Web Applications at the

1313

2525 www.jessland.net

1st OWASP Spain Chapter Meeting

Securing Web Applications at the Network LayerSecuring Web Applications at the Network Layer -- ©© 2006 2006 JesslandJessland SecuritySecurity ServicesServices

� LACK of firewalling

� DIFFERENT security areas in the SAME network

IntranetIntranet

Internet

External

Servers

Workstations

Internal

Server

Oh my god !

Step 0: Plain Network

2626 www.jessland.net

1st OWASP Spain Chapter Meeting

Securing Web Applications at the Network LayerSecuring Web Applications at the Network Layer -- ©© 2006 2006 JesslandJessland SecuritySecurity ServicesServices

t00 e9sy f0r m3!

1. Reconaissance and exploit launch to compromise external web server

2. Internal reconaissance attack trying to compromiseinternal workstations or servers

IntranetIntranet

Internet

External

Servers

Workstations

Internal

Server

Step 0: Plain Network

Page 14: Securing Web Applications at the Network Layer · 2020-01-17 · 3 55 1st OWASP Spain Chapter Meeting Securing Web Applications at the Network LayerSecuring Web Applications at the

1414

2727 www.jessland.net

1st OWASP Spain Chapter Meeting

Securing Web Applications at the Network LayerSecuring Web Applications at the Network Layer -- ©© 2006 2006 JesslandJessland SecuritySecurity ServicesServices

� Sharing the DMZ between critical services (dns, smtp) and the web server

Still a lot to do !

External

Servers

Internal

ServersWorkstations

DMZDMZ

IntranetIntranet

InternetInternetInternet

Step 1: DMZ deployment

2828 www.jessland.net

1st OWASP Spain Chapter Meeting

Securing Web Applications at the Network LayerSecuring Web Applications at the Network Layer -- ©© 2006 2006 JesslandJessland SecuritySecurity ServicesServices

P1nch3 9dm1n !

1. Reconaissance and exploit launch to compromise Armando’s external web server

2. Firewall allows web server to download hacking tools

3. Local layer-3 compromise or DoS attack against DNS and SMTP external servers

External

Servers

Internal

ServersWorkstations

DMZDMZ

IntranetIntranet

InternetInternetInternet

Step 1: DMZ deployment

Page 15: Securing Web Applications at the Network Layer · 2020-01-17 · 3 55 1st OWASP Spain Chapter Meeting Securing Web Applications at the Network LayerSecuring Web Applications at the

1515

2929 www.jessland.net

1st OWASP Spain Chapter Meeting

Securing Web Applications at the Network LayerSecuring Web Applications at the Network Layer -- ©© 2006 2006 JesslandJessland SecuritySecurity ServicesServices

DMZ

VLAN 3VLAN 4

DMZ

VLAN 2VLAN 3

VLAN 4

External

Servers

Internal

ServersWorkstations

IntranetIntranet

InternetInternetInternet

Looks better !

� Logical isolation (VLAN) on the same physical switch could encourage the hacker to perform L2 DoS or VLAN hopping attacks

� Same software vendor could ease multilayer compromise

Step 2: VLAN-based DMZ deployment

3030 www.jessland.net

1st OWASP Spain Chapter Meeting

Securing Web Applications at the Network LayerSecuring Web Applications at the Network Layer -- ©© 2006 2006 JesslandJessland SecuritySecurity ServicesServices

a) Compromise webserver and perform layer-2 vlan hopping in order to try to breach the other servers

b) Launch exploit against smtp or dns server and relaunch it again to get internal access (nicer if possible)

h3h3, n1c3 try !

DMZ

VLAN 3VLAN 4

DMZ

VLAN 2VLAN 3

VLAN 4

External

Servers

Internal

ServersWorkstations

IntranetIntranet

Internet

Step 2: VLAN-based DMZ deployment

Page 16: Securing Web Applications at the Network Layer · 2020-01-17 · 3 55 1st OWASP Spain Chapter Meeting Securing Web Applications at the Network LayerSecuring Web Applications at the

1616

3131 www.jessland.net

1st OWASP Spain Chapter Meeting

Securing Web Applications at the Network LayerSecuring Web Applications at the Network Layer -- ©© 2006 2006 JesslandJessland SecuritySecurity ServicesServices

DMZ

VLAN 3VLAN 4

DMZ-2

VLAN 3VLAN 4

External

Servers

Internal

ServersWorkstations

Intranet

InternetInternetInternet

I’m doing my best!

� Vulnerability over the single firewall could allow direct communication to intranet

� Malware injection could compromise workstations

DMZ-1

External

Server

Step 3: Dual public DMZ

3232 www.jessland.net

1st OWASP Spain Chapter Meeting

Securing Web Applications at the Network LayerSecuring Web Applications at the Network Layer -- ©© 2006 2006 JesslandJessland SecuritySecurity ServicesServices

DMZ

VLAN 3VLAN 4

DMZ-2

VLAN 3VLAN 4

External

Servers

Internal

ServersWorkstations

Intranet

InternetInternetInternet

a) Specially crafted packets are sent so that filtering is overcomed and sent directly to internal server

b) Malware is injected through a URL (malware site) on fake email

DMZ-1

Br3ak d9 p3r1m1t3r

External

Server

Step 3: Dual public DMZ

Page 17: Securing Web Applications at the Network Layer · 2020-01-17 · 3 55 1st OWASP Spain Chapter Meeting Securing Web Applications at the Network LayerSecuring Web Applications at the

1717

3333 www.jessland.net

1st OWASP Spain Chapter Meeting

Securing Web Applications at the Network LayerSecuring Web Applications at the Network Layer -- ©© 2006 2006 JesslandJessland SecuritySecurity ServicesServices

� Vulnerabilities such as SQLInjection on AppServer or Internal Server database could compromise the boxes and probably disclose sensitive information

VLAN 3VLAN 4

DMZ-2

VLAN 3VLAN 4

External

Servers

Database

ServerWorkstations

Intranet

InternetInternet

Proxy

DMZ-1

Internal

Servers

Web

ServerApp

Server

Paranoia is your friend

Step 4: Multilayered service-leg-based double DMZ

3434 www.jessland.net

1st OWASP Spain Chapter Meeting

Securing Web Applications at the Network LayerSecuring Web Applications at the Network Layer -- ©© 2006 2006 JesslandJessland SecuritySecurity ServicesServices

1. Reconaissance against web/app server to identify database internal server

2. Perform SQL Injection in order to get sensitive data back to thehacker

VLAN 3VLAN 4

DMZ-2

VLAN 3VLAN 4

External

Servers

Database

Server

Intranet

InternetInternetInternet

Proxy

DMZ-1

Internal

Servers

Web

ServerApp

Server

W0w, th9t’s n0t 39sy

Workstations

Step 4: Multilayered service-leg-based double DMZ

Page 18: Securing Web Applications at the Network Layer · 2020-01-17 · 3 55 1st OWASP Spain Chapter Meeting Securing Web Applications at the Network LayerSecuring Web Applications at the

1818

3535 www.jessland.net

1st OWASP Spain Chapter Meeting

Securing Web Applications at the Network LayerSecuring Web Applications at the Network Layer -- ©© 2006 2006 JesslandJessland SecuritySecurity ServicesServices

Yiiiiiihaaaaaa !!!

VLAN 3VLAN 4

DMZ-2

VLAN 3VLAN 4

External

Servers

Database

ServerWorkstations

Intranet

InternetInternetInternet

Proxy

DMZ-1

Internal

Servers

Web

ServerApp

Server

Internal

Database

� Database replication of necessary data

Protected Network

Step 5: Protected Network with Data Replication

3636 www.jessland.net

1st OWASP Spain Chapter Meeting

Securing Web Applications at the Network LayerSecuring Web Applications at the Network Layer -- ©© 2006 2006 JesslandJessland SecuritySecurity ServicesServices

� Lack of multilayer firewalling

� Sharing of different network security areas

� Outbound traffic control on DMZ areas

� “Relaxed” server patching policy

� Shared resource used for critical information

� Logical vs physical isolation

� OS, Software and hardware biodiversity

� Sensitive data access

Remarkable Security Issues

Page 19: Securing Web Applications at the Network Layer · 2020-01-17 · 3 55 1st OWASP Spain Chapter Meeting Securing Web Applications at the Network LayerSecuring Web Applications at the

1919

3737 www.jessland.net

1st OWASP Spain Chapter Meeting

Securing Web Applications at the Network LayerSecuring Web Applications at the Network Layer -- ©© 2006 2006 JesslandJessland SecuritySecurity ServicesServices

IntranetIntranet

Internet

External

Servers

Workstations

Internal

Server

VLAN 3VLAN 4

DMZ-2

VLAN 3VLAN 4

External

Servers

Database

Server

Intranet

InternetInternetInternet

Proxy

DMZ-1

Internal

Servers

Web

ServerApp

Server

Internal

Database

Protected Network

Bad old daysImpressive

Long life to Armando’s network

3838 www.jessland.net

1st OWASP Spain Chapter Meeting

Securing Web Applications at the Network LayerSecuring Web Applications at the Network Layer -- ©© 2006 2006 JesslandJessland SecuritySecurity ServicesServices

� Web Applications

� Security Architecture

� Case Study

� Conclusions

� References

Agenda

Page 20: Securing Web Applications at the Network Layer · 2020-01-17 · 3 55 1st OWASP Spain Chapter Meeting Securing Web Applications at the Network LayerSecuring Web Applications at the

2020

3939 www.jessland.net

1st OWASP Spain Chapter Meeting

Securing Web Applications at the Network LayerSecuring Web Applications at the Network Layer -- ©© 2006 2006 JesslandJessland SecuritySecurity ServicesServices

� Security architecture definitively helps to improve the global state of security for web services

� It is highly recommended to separate interface, application and data layers

� Knowing your environment is half-the-battle in order to choose a good topology approach

� Place hosts according to their data security level, sometimes splitting or replicating the information is necessary

� What has been described makes thing MORE difficult to the hacker but NOT impossible! ����

Conclusion

4040 www.jessland.net

1st OWASP Spain Chapter Meeting

Securing Web Applications at the Network LayerSecuring Web Applications at the Network Layer -- ©© 2006 2006 JesslandJessland SecuritySecurity ServicesServices

� Web Applications

� Security Architecture

� Case Study

� Conclusions

� References

Agenda

Page 21: Securing Web Applications at the Network Layer · 2020-01-17 · 3 55 1st OWASP Spain Chapter Meeting Securing Web Applications at the Network LayerSecuring Web Applications at the

2121

4141 www.jessland.net

1st OWASP Spain Chapter Meeting

Securing Web Applications at the Network LayerSecuring Web Applications at the Network Layer -- ©© 2006 2006 JesslandJessland SecuritySecurity ServicesServices

� “Inside Network Perimeter Security”, S.Northcutt���� ISBN: 0735712328

� “The Tao of Network Security Monitoring”, R.Beijlitch���� ISBN: 0321246772

� “Jessland Information Security Knowledgebase (JISK)”���� URL: http://www.jessland.net/JISK.php

� “Protecting your IP network infrastructure”, Securite.og���� URL: http://www.securite.org/presentations/secip/

� “Network Intrusion Detection”, S.Northcutt & Judy Novak���� ISBN: 0735710082

� “Warriors of the Net”���� URL: http://www.warriorsofthenet.com

References

4242 www.jessland.net

1st OWASP Spain Chapter Meeting

Securing Web Applications at the Network LayerSecuring Web Applications at the Network Layer -- ©© 2006 2006 JesslandJessland SecuritySecurity ServicesServices

Take care of your perimeter !!!

E3B5 8908 57CA 5B67 83DD 9400 085A 29FF D539 69A3

[email protected] information at: http://www.jessland.net

Page 22: Securing Web Applications at the Network Layer · 2020-01-17 · 3 55 1st OWASP Spain Chapter Meeting Securing Web Applications at the Network LayerSecuring Web Applications at the

2222

4343 www.jessland.net

1st OWASP Spain Chapter Meeting

Securing Web Applications at the Network LayerSecuring Web Applications at the Network Layer -- ©© 2006 2006 JesslandJessland SecuritySecurity ServicesServices

E3B5 8908 57CA 5B67 83DD 9400 085A 29FF D539 69A3

http://carlos.fragoso.es [email protected]

Thank you !!!