Software Security Lecture 5 Fang Yu Dept. of MIS, National Chengchi University Spring 2011.

Slides:



Advertisements
Similar presentations
Intrusion Detection/Prevention Systems Charles Poff Bearing Point.
Advertisements

1 Web Applications development and testing Alessandro Marchetto Fondazione Bruno Kessler-IRST,
Hands on Demonstration for Testing Security in Web Applications
Software Security Lecture 4 Fang Yu Dept. of MIS, National Chengchi University Spring 2011.
Copyright © The OWASP Foundation Permission is granted to copy, distribute and/or modify this document under the terms of the OWASP License. The OWASP.
The OWASP Foundation Copyright © The OWASP Foundation Permission is granted to copy, distribute and/or modify this document under.
Software Security Lecture 11 Fang Yu Dept. of MIS, National Chengchi University Spring 2011.
OWASP Xenotix XSS Exploit Framework
Automating Bespoke Attack Ruei-Jiun Chapter 13. Outline Uses of bespoke automation ◦ Enumerating identifiers ◦ Harvesting data ◦ Web application fuzzing.
Software Security Lecture 9 Fang Yu Dept. of MIS, National Chengchi University Spring 2011.
Software Security Lecture 12 Fang Yu Dept. of MIS, National Chengchi University Spring 2011.
Software Security Lecture 8 Fang Yu Dept. of MIS, National Chengchi University Spring 2011.
Software Security Lecture 10 Fang Yu Dept. of MIS, National Chengchi University Spring 2011.
Software Security Lecture 0 Fang Yu Dept. of MIS National Chengchi University Spring 2011.
Software Security Lecture 6 Fang Yu Dept. of MIS, National Chengchi University Spring 2011.
Mod Security (Is it worth it?) By Rich Helton. Abstract (see my paper for sources)  Based on statistics, Apache is the most used web server being used.
Mgt 240 Lecture Exam Review February 1, Homework Three Due Friday 2/4 at 5pm Due Friday 2/4 at 5pm Any questions? Any questions? Posted on course.
CSCD 434 Spring 2011 Lecture 1 Course Overview. Contact Information Instructor Carol Taylor 315 CEB Phone: Office.
MIS Week 3 Site:
1 Session-13 CSIT 121 Spring 2006 Test-1 is on March 9 th ; Demo-5 due date extended to March 7 Test-1 is on March 9 th ; Demo-5 due date extended to.
December 6, 2001DIMI, Universita’ di Udine, Italy Graduate Course on Computer Security Lecture 8: Intruder Models Iliano Cervesato
Prophiler: A fast filter for the large-scale detection of malicious web pages Reporter : 鄭志欣 Advisor: Hsing-Kuo Pao Date : 2011/03/31 1.
Leveraging User Interactions for In-Depth Testing of Web Application Sean McAllister Secure System Lab, Technical University Vienna, Austria Engin Kirda.
Computer Crime and Information Technology Security
Computer Security Fundamentals Chuck Easttom Chapter 1 Introduction to to Computer Security.
Introduction to Network Security J. H. Wang Feb. 24, 2011.
Computer & Network Security
Springl 2008 MIS380: Object-Oriented Programming using Java 1 Spring 2008.
Network Security by Behzad Akbari Spring 2012 In the Name of the Most High.
A web based lesson on main idea, cause and effect.
CSCD 434 Network Security Spring 2014 Lecture 1 Course Overview.
Internet Information Retrieval Sun Wu. Course Goal To learn the basic concepts and techniques of internet search engines –How to use and evaluate search.
Introduction to Information Security J. H. Wang Sep. 10, 2013.
MA in ICT in Education Tim Brosnan Module Tutor Overview of the module ‘Design and Use of Interactive Multimedia’
BIT 115: Introduction To Programming Instructor: Jon Peck
Welcome to HLSC 1000 Introduction to Addictions Today’s Agenda: Instructor Introduction / House Rules Student Introduction Cover Outline.
Lecture 4.2: Hash Functions: Design* CS 436/636/736 Spring 2012 Nitesh Saxena * some slides borrowed from Gene Tsudik.
MIS 2000 Information Systems for Management Introduction to Course Section Bob Travica.
New Techniques in Application Intrusion Detection Al Huizenga, Mykonos Product Manager May 2010.
Introduction to Information Security J. H. Wang Sep. 18, 2012.
Strategic Security, Inc. © Application Security is Easy Right?
IAEA Training in Emergency Preparedness and Response Lecture Preparing, Conduct and Evaluation of Exercises to Test Preparedness for a Nuclear or Radiological.
Module: Software Engineering of Web Applications Chapter 3: user-input-validation testing of web applications 1.
Decision Making Under Uncertainty Lec #1: Introduction UIUC CS 598: Section EA Professor: Eyal Amir Spring Semester 2005.
Chapter 10 Studycast Marilee Betz.  is NOT private or confidential.  Created by committees.  Vary  GAME PLAN  Common elements  Glossary of.
Remove [Browser Hijackers] For more information regarding [Browser Hijackers] Please Visit:
Page 1 Ethical Hacking by Douglas Williams. Page 2 Intro Attackers can potentially use many different paths through your application to do harm to your.
Page 1 This is page one. I’m talking about it now….
Chapter 13 Network Security Auditing Antivirus Firewalls Authentication Authorization Encryption.
E Safety & Security Tools 13 th March 2009 Martin Quinn - The Westfield Centre.
BUS 644 Week 2 Assignment Design of Work Systems Design of Work Systems. Read the “Making Hotplates” case. Answer questions 1-4 in a two to four (2-4)
EDU 626 W EEK 3 P ROCEDURES OR M ETHODS C HECK THIS A+ TUTORIAL GUIDELINE AT HTTP :// WWW. ASSIGNMENTCLOUD. COM / EDU ASH / EDU WEEK -3- PROCEDURES.
IT 244 Complete Class To purchase this material link 244/IT-244-Complete-Class. For more courses visit our website
IT 244 Week 6 DQ 1 To purchase this material link Week-6-DQ-1 For more courses visit our website
Module: Software Engineering of Web Applications
Module: Software Engineering of Web Applications
Lecture 1. Introduction to Information and Web Technologies
UFEHT-15-M Overview of course 2006.
CSCD 434 Network Security Spring 2012 Lecture 1 Course Overview.
الانترنت والبريد الإلكتروني
Search engines By Isabella Thorpe and Scarlet Hartley.
Burp Suite Web Analysis
Lecture 01: Introduction
Roberto Nogueda Introductions to Ethical Hacking
Exam Preparation Spring 2017
MGT 326 Spring 2018 Homework Assignments
CSCD 434 Network Security Spring 2019 Lecture 1 Course Overview.
HTML5 Level II CyberAdvantage
Exam Preparation Spring 2018
Exam Preparation Spring 2012
Presentation transcript:

Software Security Lecture 5 Fang Yu Dept. of MIS, National Chengchi University Spring 2011

Outline  Today we will have Juliette presenting how to attack session management (Ch7) and Jorina presenting how to attack access control (Ch8)  We will also have Hsing demonstrating the tool: Burp Suite which provides:  Intercepting proxy, spider, scanner, intruder etc.  I will continue to talk about Stranger at the end of today’s class  The course website : 

Next Meeting (Apr. 12)  We will have Eric presenting Attacking Application Logics (Chapter 11), Ruei-Jiun presenting Bespoke Attack Controls (Chapter 13)  We will also have Tony lead the discussion on the paper: Prophiler: a Fast Filter for the Large-Scale Detection of Malicious Web Page, WWW 2011