Host and Application Security Lesson 20: How the Web Does not Work.

9
Host and Application Security Lesson 20: How the Web Does not Work

Transcript of Host and Application Security Lesson 20: How the Web Does not Work.

Page 1: Host and Application Security Lesson 20: How the Web Does not Work.

Host and Application SecurityLesson 20: How the Web Does not Work

Page 2: Host and Application Security Lesson 20: How the Web Does not Work.

Remind me… Precisely how does the web work?

Page 3: Host and Application Security Lesson 20: How the Web Does not Work.

Web Vulns This is host and application security, so we’re

focusing on the host issues

Page 4: Host and Application Security Lesson 20: How the Web Does not Work.

Simple Simple buffer overruns/security vulns in the

browser or in its plugins Determining the list of plugins is harder than

it probably needs to be

Page 5: Host and Application Security Lesson 20: How the Web Does not Work.

Javascript Pretty powerful language History of different classes of vulnerabilites…

perhaps most famous is cross site scripting

Page 6: Host and Application Security Lesson 20: How the Web Does not Work.

Java Applets Tell me about Java Applets and their security

model Isn’t that good enough? Why? Why not?

Page 7: Host and Application Security Lesson 20: How the Web Does not Work.

ActiveX “Safe for scripting”? ActiveX: Pros and Cons?

Page 8: Host and Application Security Lesson 20: How the Web Does not Work.

Clickjacking A really neat exploit – get the user to click on

one thing when they think they are clicking on another

Example: a one click bank transfer Cross-frame issues make life very interesting

Page 9: Host and Application Security Lesson 20: How the Web Does not Work.

To Do Find and read the ACM Queue paper

“Browser Security: Lessons from Google Chrome”

Write a demonstration of a cross site scripting attack. Do this in essay form, showing the code you would have on both ends and how it would work. What is the future for XSS attacks?