Download presentation
Presentation is loading. Please wait.
1
Web Application Security Raymond Camden jedimaster@allaire.com
2
What We Will Discuss… Identify and Protect Input Points Security Through Obscurity… Cross-site scripting Web Server Tips Resources Q & A
3
Input Points Web communication is stateless Page A passes information to Page B – URL parameters – Form fields – Cookies
4
Input Points – URL parameters Visible to the user Easy to change
5
Input Points – Form variables Like URL variables, form variables should be checked before being passed to SQL Don’t rely on JavaScript checking Hidden fields are harder to change, but not impossible
6
Input Points – Cookies Don’t store information in unencrypted form Treat them just like URL vars.
7
Security Through Obscurity… Is not really security! If you are going to do it, do it right. Keep includes and custom tags out of the web root. Encrypt URL values, give them weird names.
8
Cross-site scripting Again, it’s the input! User input displayed on screen, and in context For more info, see: http://www.cert.org/advisories/CA-2000-02.html
9
Web Server Tips Turn off Directory Browsing! Beware IIS and +.htr and ::$DATA This URL patches +.htr – http://www.microsoft.com/technet/security/bulletin/m s00-031.asp http://www.microsoft.com/technet/security/bulletin/m s00-031.asp Info on ::$DATA – http://www.allaire.com/handlers/index.cfm?ID=8729 &Method=Full
10
Resources Allaire’s Security Zone – http://www.allaire.com/developer/SecurityZone/ Security Best Practices – http://www.allaire.com/handlers/index.cfm?id=10956 &method=full
11
Q & A Contact Information: – jedimaster@allaire.com jedimaster@allaire.com
Similar presentations
© 2025 SlidePlayer.com. Inc.
All rights reserved.