Presented by Paul Gilzow Web Communications University of Missouri #hew08xss.

Slides:



Advertisements
Similar presentations
Cross-Site Scripting Issues and Defenses Ed Skoudis Predictive Systems © 2002, Predictive Systems.
Advertisements

Nick Feamster CS 6262 Spring 2009
What is code injection? Code injection is the exploitation of a computer bug that is caused by processing invalid data. Code injection can be used by.
The XSS Files Find, Exploit, and Eliminate. Josh Little Security Engineer at global vertical market business intelligence company. 9 years in application.
©2009 Justin C. Klein Keane PHP Code Auditing Session 5 XSS & XSRF Justin C. Klein Keane
Cross Site Scripting & SQL injection
WebGoat & WebScarab “What is computer security for $1000 Alex?”
EECS 354 Network Security Cross Site Scripting (XSS)
Cross Site Scripting a.k.a. XSS Szymon Siewior. Disclaimer Everything that will be shown, was created for strictly educational purposes. You may reuse.
CROSS SITE SCRIPTING..! (XSS). Overview What is XSS? Types of XSS Real world Example Impact of XSS How to protect against XSS?
Lab 3 Cookie Stealing using XSS Kara James, Chelsea Collins, Trevor Norwood, David Johnson.
Handling Security Threats in Kentico CMS Karol Jarkovsky Sr. Solution Architect Kentico Software
WEB SECURITY WORKSHOP TEXSAW 2013 Presented by Joshua Hammond Prepared by Scott Hand.
Presenter Deddie Tjahjono.  Introduction  Website Application Layer  Why Web Application Security  Web Apps Security Scanner  About  Feature  How.
How It Applies In A Virtual World
 A cookie is a piece of text that a Web server can store on a user's hard disk.  Cookie data is simply name-value pairs stored on your hard disk by.
Introduction to InfoSec – Recitation 10 Nir Krakowski (nirkrako at post.tau.ac.il) Itamar Gilad (itamargi at post.tau.ac.il)
D ATABASE S ECURITY Proposed by Abdulrahman Aldekhelallah University of Scranton – CS521 Spring2015.
Security and Risk Management. Who Am I Matthew Strahan from Content Security Principal Security Consultant I look young, but I’ve been doing this for.
Web Security Demystified Justin C. Klein Keane Sr. InfoSec Specialist University of Pennsylvania School of Arts and Sciences Information Security and Unix.
OWASP Zed Attack Proxy Project Lead
Cosc 4765 Server side Web security. Web security issues From Cenzic Vulnerability report
Drupal Security Securing your Configuration Justin C. Klein Keane University of Pennsylvania School of Arts and Sciences Information Security and Unix.
Prevent Cross-Site Scripting (XSS) attack
+ Websites Vulnerabilities. + Content Expand of The Internet Use of the Internet Examples Importance of the Internet How to find Security Vulnerabilities.
Juha Siivikko SECURITY IN SOCIAL MEDIA.
WEB SECURITY WEEK 3 Computer Security Group University of Texas at Dallas.
CSCI 6962: Server-side Design and Programming Secure Web Programming.
November 13, 2008 Ohio Information Security Forum Attack Surface of Web Applications James Walden Northern Kentucky University
Copyright 2007 © The OWASP Foundation Permission is granted to copy, distribute and/or modify this document under the terms of the OWASP License. The OWASP.
3-Protecting Systems Dr. John P. Abraham Professor UTPA.
Srikar Nadipally. Outline Finding and Exploiting XSS Vulnerabilities Standard Reflected XSS Stored XSS DOM based XSS Prevention of XSS attack Reflect.
Cross-Site Attacks James Walden Northern Kentucky University.
Top Five Web Application Vulnerabilities Vebjørn Moen Selmersenteret/NoWires.org Norsk Kryptoseminar Trondheim
PHP2010/11 : [‹#›] PHP Security. PHP2010/11 : [‹#›] Two Golden Rules 1.FILTER external input Obvious.. $_POST, $_COOKIE, etc. Less obvious.. $_SERVER.
Week 10-11c Attacks and Malware III. Remote Control Facility distinguishes a bot from a worm distinguishes a bot from a worm worm propagates itself and.
October 3, 2008IMI Security Symposium Application Security through a Hacker’s Eyes James Walden Northern Kentucky University
By Sean Rose and Erik Hazzard.  SQL Injection is a technique that exploits security weaknesses of the database layer of an application in order to gain.
What is risk online operation:  massive movement of operation to the internet has attracted hackers who try to interrupt such operation daily.  To unauthorized.
Module 2 – User Safety Privacy Attacks on end users Browser vulnerabilities.
Web Application Vulnerabilities ECE 4112 Internetwork Security, Spring 2005 Chris Kelly Chris Lewis April 28, 2005 ECE 4112 Internetwork Security, Spring.
PwC New Technologies New Risks. PricewaterhouseCoopers Technology and Security Evolution Mainframe Technology –Single host –Limited Trusted users Security.
Presented By: Chandra Kollipara. Cross-Site Scripting: Cross-Site Scripting attacks are a type of injection problem, in which malicious scripts are injected.
Web Security Lesson Summary ●Overview of Web and security vulnerabilities ●Cross Site Scripting ●Cross Site Request Forgery ●SQL Injection.
PHP Error Handling & Reporting. Error Handling Never allow a default error message or error number returned by the mysql_error() and mysql_errno() functions.
Web2.0 Secure Development Practice Bruce Xia
EECS 354: Network Security Group Members: Patrick Wong Eric Chan Shira Schneidman Web Attacks Project: Detecting XSS and SQL Injection Vulnerabilities.
Week 7 - Wednesday.  Web security – user side.
Computer Security Mike Asoodeh & Ray Dejean Office of Technology Southeastern Louisiana University.
By Collin Donaldson. Hacking is only legal under the following circumstances: 1.You hack (penetration test) a device/network you own. 2.You gain explicit,
SlideSet #20: Input Validation and Cross-site Scripting Attacks (XSS) SY306 Web and Databases for Cyber Operations.
XSS 101 Jason Clark 12/20.
CSCE 548 Student Presentation Ryan Labrador
An Introduction to Web Application Security
TMG Client Protection 6NPS – Session 7.
Web Application Vulnerabilities, Detection Mechanisms, and Defenses
TOPIC: Web Security (Part-4)
Cross-Site Scripting Travis Deyarmin.
ISYM 540 Current Topics in Information System Management
Static Detection of Cross-Site Scripting Vulnerabilities
Web Applications Security XSS
Riding Someone Else’s Wave with CSRF
CSC 495/583 Topics of Software Security Intro to Web Security
Lecture 2 - SQL Injection
Protecting Against Common Web Application Vulnerabilities
Cross-Site Scripting Issues and Defenses Ed Skoudis Predictive Systems
Exploring DOM-Based Cross Site Attacks
Cross-Site Scripting Attack (XSS)
Presentation transcript:

Presented by Paul Gilzow Web Communications University of Missouri #hew08xss

 Division of IT initiative to increase awareness of the need to improve overall security for applications utilized at the University of Missouri-Columbia, with an emphasis on Web development and the systems upon which those applications reside or depend.  BPPM Chapter 13 Section 120 

 The MU Data Classification System (DCS) consists of four levels with corresponding security requirements for each level  Level 1 : Public  Level 2 : Confidential  Level 3 : Restricted  Level 4 : National Security Interest

 Application owners, developers and system administrators must register their custom and vended applications and ensure such systems meet the security requirements of the MU DCS.  The Division of IT uses the Application Registry to schedule applications for initial and ongoing security inspections. 

 Really aren't that bad!  New Security Audit tool coming soon (2-3 weeks)  Code audit tool coming Q1 ’08  Contact Mike Morrison or anyone else at ISAM if you have questions

 An Injection attack, usually in the form of  HTML Code  Client-side scripts  Exploits the trust a user has for a site  Usually an indication of a much larger problem

2006 Statistics (January 1 – December 31)

The overall statistics includes analysis results of 32,717 sites and 69,476 vulnerabilities 2007 Statistics (January 1 – December 31)

Percentage of websites with an URGENT, CRITICAL or HIGH severity vulnerability

 XSS is usually just the first step in a larger attack  Platform independent  Can spread much faster than traditional viruses/malware  Defacement  Phishing  Spam  CSRF  Identity Theft  URI / JAR Exploit  Whatever your devious little mind can imagine

People trust edu sites

A recent report from North Carolina State University showed that most internet users are unable to tell the difference between genuine and fake pop-up messages. Despite being told some of the messages were fake, people hit the OK button 63% of the time.

 Non-Persistent/Reflective  Most common  Relies on Social Engineering  Persistent/Stored  Web Forums, Social Sites, etc.  Local  Less likely, but still dangerous

 Applicants have to register at OAPA, and save sensitive data with their account  OAPA is susceptible to a reflective XSS injection  Sean sends Jane a spoofed that contains a URL to OAPA (social engineering)  Embedded in the URL is the payload script. If Jane visits the URL while already logged into OAPA, the script is able to run within the context of OAPA (bypassing the Same Origin Policy) and can send her data (session ID, etc.) back to Sean

 OAPA has a web forum that is susceptible to XSS injection  Sean posts a thread to the forum that contains an injection  Jane views this thread and the injection is able to run within the context of the page (bypassing the Same Origin Policy) and can send back her information to Sean  Everyone that views the thread is affected – no need for social engineering

 Jane visits a compromised site  Malicious JavaScript on the page launches an HTML file on Jane’s computer that also contains malicious JavaScript  That JavaScript can now run with the same privileges that Jane’s user account has on that computer

 Reflective demo  Persistent demo

So, What Can We Do To Protect Our Applications???

 Be paranoid, be very paranoid  Trust no one  Layers, layers, layers

 Input Filtering  Input Validation  Output Encoding  Intrusion Detection System (IDS)  PHPIDS (  Tidy the output  HTML Purifier (  AntiSamy (