Download presentation
Presentation is loading. Please wait.
Published byBenedict Hall Modified over 9 years ago
1
Host and Application Security Lesson 20: How the Web Does not Work
2
Remind me… Precisely how does the web work?
3
Web Vulns This is host and application security, so we’re focusing on the host issues
4
Simple Simple buffer overruns/security vulns in the browser or in its plugins Determining the list of plugins is harder than it probably needs to be
5
Javascript Pretty powerful language History of different classes of vulnerabilites… perhaps most famous is cross site scripting
6
Java Applets Tell me about Java Applets and their security model Isn’t that good enough? Why? Why not?
7
ActiveX “Safe for scripting”? ActiveX: Pros and Cons?
8
Clickjacking A really neat exploit – get the user to click on one thing when they think they are clicking on another Example: a one click bank transfer Cross-frame issues make life very interesting
9
To Do Find and read the ACM Queue paper “Browser Security: Lessons from Google Chrome” Write a demonstration of a cross site scripting attack. Do this in essay form, showing the code you would have on both ends and how it would work. What is the future for XSS attacks?
Similar presentations
© 2025 SlidePlayer.com. Inc.
All rights reserved.