Web Application with AJAX CS 526 advanced interned and Web system Presenters Faris Kateb Mohammed AbdulAziz Omar Alzahrani.

Slides:



Advertisements
Similar presentations
Cross-Site Scripting Issues and Defenses Ed Skoudis Predictive Systems © 2002, Predictive Systems.
Advertisements

What is code injection? Code injection is the exploitation of a computer bug that is caused by processing invalid data. Code injection can be used by.
1/7 ITApplications XML Module Session 8: Introduction to Programming with XML.
1 CGICGI Common Gateway Interface Server-side Programming Lecture.
EECS 354 Network Security Cross Site Scripting (XSS)
Web 2.0 security Kushal Karanjkar Under guidance of Prof. Richard Sinn.
IS 360 Course Introduction. Slide 2 What you will Learn (1) The role of Web servers and clients How to create HTML, XHTML, and HTML 5 pages suitable for.
Cloud Computing Lecture #7 Introduction to Ajax Jimmy Lin The iSchool University of Maryland Wednesday, October 15, 2008 This work is licensed under a.
Multiple Tiers in Action
Introduction to Web Based Application. Web-based application TCP/IP (HTTP) protocol Using WWW technology & software Distributed environment.
Does Ajax suck? CS575 Spring 2007 Chanwit Suebsureekul.
Part or all of this lesson was adapted from the University of Washington’s “Web Design & Development I” Course materials.
ITM352 Javascript and Dynamic Web Pages: Client Side Processing.
Sys Prog & Scripting - HW Univ1 Systems Programming & Scripting Lecture 15: PHP Introduction.
Is Your Website Hackable? Check with Acunetix Web Vulnerability Scanner. Acunetix Web Vulnerability Scanner V9.
Chris Pinski.  History  What is Ajax  Who uses Ajax  Underlying Technologies  SE Aspect  Common Problems  Conclusion.
CGI and AJAX CS-260 Dick Steflik.
Prevent Cross-Site Scripting (XSS) attack
Lecture 12 – AJAX SFDV3011 – Advanced Web Development Reference: 1.
GIS technologies and Web Mapping Services
ASP.NET + Ajax Jesper Tørresø ITNET2 F08. Ajax Ajax (Asynchronous JavaScript and XML) A group of interrelated web development techniques used for creating.
Lecture 14 – Web Security SFDV3011 – Advanced Web Development 1.
JavaScript, Fourth Edition Chapter 12 Updating Web Pages with AJAX.
November 13, 2008 Ohio Information Security Forum Attack Surface of Web Applications James Walden Northern Kentucky University
Copyright 2007 © The OWASP Foundation Permission is granted to copy, distribute and/or modify this document under the terms of the OWASP License. The OWASP.
AJAX Making Dynamic Web pages more Dynamic Jim Hendricks April 25th, 2006.
Instructor, Dr. Khalili Bahram Jeevan Kumar Gogineni.
Client side web programming Introduction Jaana Holvikivi, DSc. School of ICT.
Cross Site Integration “mashups” cross site scripting.
Web Pages with Features. Features on Web Pages Interactive Pages –Shows current date, get server’s IP, interactive quizzes Processing Forms –Serach a.
By Sean Rose and Erik Hazzard.  SQL Injection is a technique that exploits security weaknesses of the database layer of an application in order to gain.
Cross Site Scripting and its Issues By Odion Oisamoje.
JSON and A Comparison of Scripts. JSON: JavaScript Object Notation Based on a subset of the JavaScript Programming Language provides a standardized data.
1 Robust Defenses for Cross-Site Request Forgery Adam Barth, Collin Jackson, John C. Mitchell Stanford University 15th ACM CCS.
Asynchronous Javascript And XML AJAX : an introduction UFCEUS-20-2 : Web Programming.
Web Application with AJAX CS 526 advanced interned and Web system Presenters Faris Kateb Mohammed AbdulAziz Omar Alzahrani.
Ajax for Dynamic Web Development Gregory McChesney.
 Previous lessons have focused on client-side scripts  Programs embedded in the page’s HTML code  Can also execute scripts on the server  Server-side.
JSON – Java Script Object Notation. What is JSON JSON is a data interchange format Interactive Web 2.0 applications, no more use page replacement. Data.
 Web pages originally static  Page is delivered exactly as stored on server  Same information displayed for all users, from all contexts  Dynamic.
CHAPTER 13 COMMUNICATING WITH AJAX. LEARNING OBJECTIVES AJAX, which stands for Asynchronous JavaScript and XMLprovides a way for a browser to send and.
Event Handling & AJAX IT210 Web Systems. Question How do we enable users to dynamically interact with a website? Answer: Use mouse and keyboard to trigger.
What Is XSS ? ! Cross-site scripting (XSS) is a type of computer security vulnerability typically found in Web applications. XSS enables attackers to.
EECS 354: Network Security Group Members: Patrick Wong Eric Chan Shira Schneidman Web Attacks Project: Detecting XSS and SQL Injection Vulnerabilities.
Introduction to AJAX Sue Brandreth. What is Ajax?
AJAX CS456 Fall Examples Where is AJAX used? Why do we care?
Introduction to AJAX MIS 3502, Spring 2016 Jeremy Shafer Department of MIS Fox School of Business Temple University 2/4/2016.
JavaScript, Sixth Edition Chapter 11 Updating Web Pages with Ajax.
By Collin Donaldson. Hacking is only legal under the following circumstances: 1.You hack (penetration test) a device/network you own. 2.You gain explicit,
Web Application with AJAX CS 526 advanced interned and Web system Presenters Faris Kateb Mohammed AbdulAziz Omar Alzahrani.
NCCUCS 軟體工程概論 Lecture 5: Ajax, Mashups April 29, 2014.
SlideSet #20: Input Validation and Cross-site Scripting Attacks (XSS) SY306 Web and Databases for Cyber Operations.
Introduction to AJAX Pat Morin COMP Outline What is AJAX? – History – Uses – Pros and Cons An XML HTTP Transaction – Creating an XMLHTTPRequest.
An Introduction to Web Application Security
JavaScript and Ajax (Ajax Tutorial)
World Wide Web policy.
Application with Cross-Platform GUI
AJAX.
Asynchronous Java script And XML Technology
AJAX.
IS 360 Course Introduction
Introduction to AJAX Sue Brandreth.
MIS JavaScript and API Workshop (Part 3)
Introduction to AJAX and JSON
AJAX CS-422 Dick Steflik.
DR. JOHN ABRAHAM PROFESSOR UTPA
Cross-Site Scripting Issues and Defenses Ed Skoudis Predictive Systems
Ajax and JSON Jeremy Shafer Department of MIS Fox School of Business
Ajax and JSON Jeremy Shafer Department of MIS Fox School of Business
Exploring DOM-Based Cross Site Attacks
Presentation transcript:

Web Application with AJAX CS 526 advanced interned and Web system Presenters Faris Kateb Mohammed AbdulAziz Omar Alzahrani

Agenda Introduction to Ajax General Techniques used by Ajax? Ajax Security Vulnerabilities JS Array poisoning Flash-based cross domain access Malformed JS Object serialization JSON pair injection Manipulated XML stream Script injection in DOM April 30, 2012AJAX/Faris Kateb, Mohammed Abdulaziz & Omar Alzahrani 2

History - Suggest remove this slide. You - Have very little time. Should zero in - On next slide with unique features of AJAX - What is “web application”? - Client side scripts. - Common Gateway Interface (CGI). - Servlets. - ASP, PHP …etc. - AJAX. April 30, 2012AJAX/Faris Kateb, Mohammed Abdulaziz & Omar Alzahrani 3

- Country : - State : - Country : - City : - State : Server Database USA CO Denver - City : - State : CO Denver - City : - State : - City : Before AJAX April 30, 2012AJAX/Faris Kateb, Mohammed Abdulaziz & Omar Alzahrani 4

- Country : - City : - State : Server Database USA CO Denver After AJAX April 30, 2012AJAX/Faris Kateb, Mohammed Abdulaziz & Omar Alzahrani 5

AJAX - What’s AJAX? Asynchronous Javascript And XML E.g., Google Search String Matching/Suggestions - How it achieve that? - The XMLHttpRequest Object Base object for AJAX Allows your javascript code…… Available in most browsers ThroughThe XMLHttpRequest object you can : April 30, 2012AJAX/Faris Kateb, Mohammed Abdulaziz & Omar Alzahrani 6

General Technique April 30, 2012AJAX/Faris Kateb, Mohammed Abdulaziz & Omar Alzahrani 7

Ajax vulnerabilities There are many vulnerabilities Our concentration are on the security holes A list of these security holes included in our research JS Array poisoning Flash-based cross domain access Malformed JS Object serialization JSON pair injection Manipulated XML stream Script injection in DOM April 30, 2012AJAX/Faris Kateb, Mohammed Abdulaziz & Omar Alzahrani 8

JS Array poisoning Popular object for serialization Easy and effective Poisoning a JS array spoils the DOM context. A JS array can be exploited with simple cross-site scripting in the browser. Example (need more concrete example, and explanation; I can not understand the following statement by itself.) new Array(“Android”, “iphone”, “Tmobile”, “900$”, “28 years”) April 30, 2012AJAX/Faris Kateb, Mohammed Abdulaziz & Omar Alzahrani 9

Flash-based cross domain access It is possible to make GET and POST requests from JavaScripts within a browser by using a Flash plugin’s Ajax interface. This also enables cross-domain calls to be made from any particular domain. Example (same complaints as previous slide; no explanation> April 30, 2012AJAX/Faris Kateb, Mohammed Abdulaziz & Omar Alzahrani 10

Malformed JS Object serialization JavaScript supports (OOP). Allows the user to create an object using "New Object()“. Object can be serialized using Ajax and used by JavaScript code. Attacker can sends a malicious “subject” line embedded with script then it makes the receiver a victim of XSS. [3] April 30, 2012AJAX/Faris Kateb, Mohammed Abdulaziz & Omar Alzahrani 11

JSON pair injection JavaScript Object Notation (JSON) is a simple data exchange format which can contain object. Attacker can inject a malicious script in either "Link" or "Desc" (XSS). Show the example, or scripts. Another way to serialize malicious content to the user. [3] April 30, 2012AJAX/Faris Kateb, Mohammed Abdulaziz & Omar Alzahrani 12

April 30, 2012AJAX/Faris Kateb, Mohammed Abdulaziz & Omar Alzahrani 13

REFERENCES [1] [2] [3] Ajax Security Holes and Driving Factors [4] SC Magazine, Article: Hot or not: AJAX vulnerabilities, [5] What is AJAX? [6] Article: AJAX Vulnerabilities: How Big the Threat?, April 30, 2012AJAX/Faris Kateb, Mohammed Abdulaziz & Omar Alzahrani 14