SlideShare a Scribd company logo
djlogo.jpg
Lecture #18-20: Web Applications Security
Dr.Ramchandra Mangrulkar
September 14, 2020
Dr.Ramchandra Mangrulkar Lecture #18-20: Web Applications Security September 14, 2020 1 / 25
djlogo.jpg
Contents
OWASP
Web- A User Side
Web Browser : Architecture, Vulnerabilities and Attacks
Web Application Security
Dr.Ramchandra Mangrulkar Lecture #18-20: Web Applications Security September 14, 2020 2 / 25
djlogo.jpg
OWASP
Source1
1
https://owasp.org
Dr.Ramchandra Mangrulkar Lecture #18-20: Web Applications Security September 14, 2020 3 / 25
djlogo.jpg
Web-User/Client Side
The browser is the core client-side component. Its counterpart is
the web server.
Web- A User Side
Cookies
HTTPS and SSL
Web Browser : Working and Attacks
Web Application Security
Dr.Ramchandra Mangrulkar Lecture #18-20: Web Applications Security September 14, 2020 4 / 25
djlogo.jpg
The Browser Architecture: Overview
Overview of the
communication between the
web servers and web browsers.
The web server and a browser
typically running in separate
machines.
Only the web server has
access to the local disk.
The browser only has access
to the local disk by asking the
user for permission
The web server and the
browser communicate over
the network.
Dr.Ramchandra Mangrulkar Lecture #18-20: Web Applications Security September 14, 2020 5 / 25
djlogo.jpg
The Web Browser architecture
Dr.Ramchandra Mangrulkar Lecture #18-20: Web Applications Security September 14, 2020 6 / 25
djlogo.jpg
The Web Browser architecture cont...
The User Interface subsystem
-provides features such as toolbars, visual page-load progress,
smart download handling, preferences, and printing.
-may be integrated with the desktop environment to provide
browser session management or communication with other
desktop applications.
Browser Engine
-a high-level interface to the Rendering Engine.
-loads a given URL and supports primitive browsing actions such
as forward, back, and reload.
-provides hooks for viewing various aspects of the browsing
session such as current page load progress and JavaScript alerts.
-allows the querying and manipulation of Rendering Engine
settings.
Dr.Ramchandra Mangrulkar Lecture #18-20: Web Applications Security September 14, 2020 7 / 25
djlogo.jpg
The Web Browser architecture cont...
Rendering Engine
-visual representation for a given URL.
-displaying HTML and XMLdocuments, optionally styled with
CSS, embedded content ( images)
-IE(Trident), Firefox(Gecko), Safari, Chrome and
Opera(Webkit). -Chrome runs various instances of this engine
with various tabs.
Networking subsystem
-implements file transfer protocols such as HTTP and FTP.
JavaScript Interpreter
-evaluates JavaScript code, which may be embedded in web
pages.
XML Parser subsystem
-parses XML documents into a Document Object Model (DOM)
tree2
. -The most reusable subsystems in the architecture.
2
Document Object Model (DOM) tree is a web page representation that can
be accessed and modified by the script codeDr.Ramchandra Mangrulkar Lecture #18-20: Web Applications Security September 14, 2020 8 / 25
djlogo.jpg
The Web Browser architecture cont...
Display Back-end subsystem (UI Backend)
-provides drawing and windowing primitives, a set of user
interface widgets, and a set of fonts.
- may be tied closely with the operating system.
Data Persistence subsystem
- stores various data associated with the browsing session on
disk.
- high-level data such as bookmarks or toolbar settings,
- or it may be low-level data such as cookies, Preferences,
security certificates, or cache.
Dr.Ramchandra Mangrulkar Lecture #18-20: Web Applications Security September 14, 2020 9 / 25
djlogo.jpg
The Web Browser MArket Share a
a
NetMarketShare:Marketshareformobile,browsers,operating.
..netmarketshare.com
Dr.Ramchandra Mangrulkar Lecture #18-20: Web Applications Security September 14, 2020 10 / 25
djlogo.jpg
Home Assignment
Microsoft Edge
https://blogs.windows.com/msedgedev/2016/04/20/
building-a-more-accessible-web-platform/
Google Chrome
https://medium.com/@zicodeng/
explore-the-magic-behind-google-chrome-c3563dbd2739
Firefox
https://blog.mozilla.org/standard8/2015/06/30/
firefox-hello-desktop-behind-the-scenes-architecture/
Dr.Ramchandra Mangrulkar Lecture #18-20: Web Applications Security September 14, 2020 11 / 25
djlogo.jpg
Why to worry for Browsers Security
A browser often connects to more than the one address
Fetching data can entail accesses to numerous locations
Browser software can be malicious or can be corrupted to
acquire malicious functionality.
Browsers support add-ins, extra code to add new features to the
browser, but these add-ins themselves can include corrupting
code.
Data display involves a rich command set that controls
rendering, positioning, motion, layering, and even invisibility.
The browser can access any data on a user’s computer.The
browser runs with the same privileges as the user.
Data transfers to and from the user are invisible, meaning they
occur without the user’s knowledge or explicit permission.
Dr.Ramchandra Mangrulkar Lecture #18-20: Web Applications Security September 14, 2020 12 / 25
djlogo.jpg
Browser Attacks : Three Attacks Vectors
Go after the operating system so it will impede the browser’s
correct and secure functioning.
Tackle the browser or one of its components, add-ons, or
plug-ins so its activity is altered
Intercept or modify communication to or from the browser.
Dr.Ramchandra Mangrulkar Lecture #18-20: Web Applications Security September 14, 2020 13 / 25
djlogo.jpg
Browser Attacks : Three Attacks Vectors
3
3
https://zeltser.com/targeting-web-browser-user/
Dr.Ramchandra Mangrulkar Lecture #18-20: Web Applications Security September 14, 2020 14 / 25
djlogo.jpg
Browser Attacks
Man-in-the-Browser
Keystroke Logger
Page-in-the-Middle
Program Download Substitution
User-in-the-Middle
Dr.Ramchandra Mangrulkar Lecture #18-20: Web Applications Security September 14, 2020 15 / 25
djlogo.jpg
Man-in-the-Browser Attack
Man-in-the-browser is a form of man-in-the-middle attack.
An attacker is able to insert himself into the communications
channel between two trusting parties by compromising a Web
browser.
Purpose is for eavesdropping, data theft and/or session
tampering.
attackers to carry out various forms of financial fraud, typically
by manipulating Internet Banking Services.
In order to compromise the browser, adversaries can take
advantage of security vulnerabilities and/or manipulate inherent
browser functionality to change content, modify behavior, and
intercept information.
Various forms of malware,e.g. Trojan horse, can be used to carry
out the attack.
Dr.Ramchandra Mangrulkar Lecture #18-20: Web Applications Security September 14, 2020 16 / 25
djlogo.jpg
Man-in-the-Browser Attack
4
4
https://www.kratikal.com/There are many examples for
man-in-the-browser malware and attack campaigns targeting online banking and
other internet services. Infamous names of malware used include: Zeus, Spyeye,
Bugat, Carberp, Silon, Tatanga, and more.
Dr.Ramchandra Mangrulkar Lecture #18-20: Web Applications Security September 14, 2020 17 / 25
djlogo.jpg
Keystroke Logger
A keystroke logger (or key logger) is either hardware or software
that records all keystrokes entered. The logger either retains
these keystrokes for future use by the attacker or sends them to
the attacker across a network connection.
Dr.Ramchandra Mangrulkar Lecture #18-20: Web Applications Security September 14, 2020 18 / 25
djlogo.jpg
Page-in-the-Middle Attack
A page-in-the-middle attack is another type of browser attack in
which a user is redirected to another page.
when the user clicks “login” to go to the login page of any site,
the attack might redirect the user to the attacker’s page, where
the attacker can also capture the user’s credentials.
Dr.Ramchandra Mangrulkar Lecture #18-20: Web Applications Security September 14, 2020 19 / 25
djlogo.jpg
Program Download Substitution
Coupled with a page-in-the-middle attack is a download
substitution.
The attacker presents a page with a desirable and seemingly
innocuous program for the user to download, for example, a
browser toolbar or a photo organizer utility.
Attack also defeats users’ access controls that would normally
block software downloads and installations, because the user
intentionally accepts this software.
Dr.Ramchandra Mangrulkar Lecture #18-20: Web Applications Security September 14, 2020 20 / 25
djlogo.jpg
User-in-the-Middle
Attack puts a human between two automated processes so that
the human unwittingly helps spammers register automatically for
free email accounts.
A CAPTCHA is a puzzle that supposedly only a human can
solve, so a server application can distinguish between a human
who makes a request and an automated program generating the
same request repeatedly.
Dr.Ramchandra Mangrulkar Lecture #18-20: Web Applications Security September 14, 2020 21 / 25
djlogo.jpg
Web Applications Security vulnerabilities (Risks)
Injection
-Injection flaws, such as SQL, NoSQL, OS, and LDAP injection
Broken Authentication
-Application functions implemented incorrectly
-allowing attackers to compromise passwords, keys, or session
tokens
Sensitive Data Exposure
-applications do not properly protect sensitive data, such as
financial, healthcare.
XML External Entities (XXE)
- disclose internal files using the file URI handler
-internal file shares, internal port scanning, remote code
execution, and denial of service attacks.
Dr.Ramchandra Mangrulkar Lecture #18-20: Web Applications Security September 14, 2020 22 / 25
djlogo.jpg
Web Applications Security vulnerabilities (Risks)
Broken Access Control
- Restrictions on what authenticated users are allowed if not
properly enforced.
-exploit these flaws to access unauthorized functionality and/or
data
Security Misconfiguration
- result of insecure default configurations
- frameworks, libraries, and applications be securely configured &
must be patched/upgraded in a timely fashion.
Dr.Ramchandra Mangrulkar Lecture #18-20: Web Applications Security September 14, 2020 23 / 25
djlogo.jpg
Web Applications Security vulnerabilities (Risks)
Cross-Site Scripting XSS
-includes untrusted data in a new web page without proper
validation or escaping, or updates an existing web page with
user-supplied data using a browser API that can create HTML or
JavaScript. -to execute scripts in the victim’s browser which can
hijack user sessions, deface web sites, or redirect the user to
malicious sites.
Insecure Deserialization
-remote code execution.
-used to perform attacks, including replay attacks, injection
attacks, and privilege escalation attacks.
Using Components with Known Vulnerabilities
-Components, such as libraries, frameworks, and other software
modules, run with the same privileges as the application. -an
attack can facilitate serious data loss or server takeover.
Dr.Ramchandra Mangrulkar Lecture #18-20: Web Applications Security September 14, 2020 24 / 25
djlogo.jpg
Web Applications Security vulnerabilities (Risks)
Insufficient Logging Monitoring
-allows attackers to further attack systems, maintain persistence,
pivot to more systems, and tamper, extract, or destroy data.
Dr.Ramchandra Mangrulkar Lecture #18-20: Web Applications Security September 14, 2020 25 / 25
Ad

More Related Content

What's hot (20)

PACE-IT, Security+ 6.2: Cryptographic Methods (part 2)
PACE-IT, Security+ 6.2: Cryptographic Methods (part 2)PACE-IT, Security+ 6.2: Cryptographic Methods (part 2)
PACE-IT, Security+ 6.2: Cryptographic Methods (part 2)
Pace IT at Edmonds Community College
 
How To Protect Your Website From Bot Attacks
How To Protect Your Website From Bot AttacksHow To Protect Your Website From Bot Attacks
How To Protect Your Website From Bot Attacks
London School of Cyber Security
 
Lecture #8: Clark-Wilson & Chinese Wall Model for Multilevel Security
Lecture #8: Clark-Wilson & Chinese Wall Model for Multilevel SecurityLecture #8: Clark-Wilson & Chinese Wall Model for Multilevel Security
Lecture #8: Clark-Wilson & Chinese Wall Model for Multilevel Security
Dr. Ramchandra Mangrulkar
 
Lecture #21: HTTPS , SSL & TLS
Lecture #21: HTTPS , SSL & TLSLecture #21: HTTPS , SSL & TLS
Lecture #21: HTTPS , SSL & TLS
Dr. Ramchandra Mangrulkar
 
How To Defeat Advanced Malware. New Tools for Protection and Forensics
How To Defeat Advanced Malware. New Tools for Protection and ForensicsHow To Defeat Advanced Malware. New Tools for Protection and Forensics
How To Defeat Advanced Malware. New Tools for Protection and Forensics
London School of Cyber Security
 
PACE-IT, Security+ 6.2: Cryptographic Methods (part 1)
PACE-IT, Security+ 6.2: Cryptographic Methods (part 1)PACE-IT, Security+ 6.2: Cryptographic Methods (part 1)
PACE-IT, Security+ 6.2: Cryptographic Methods (part 1)
Pace IT at Edmonds Community College
 
Bulletproof IT Security
Bulletproof IT SecurityBulletproof IT Security
Bulletproof IT Security
London School of Cyber Security
 
PACE-IT, Security + 5.3: Security Controls for Account Management
PACE-IT, Security + 5.3: Security Controls for Account ManagementPACE-IT, Security + 5.3: Security Controls for Account Management
PACE-IT, Security + 5.3: Security Controls for Account Management
Pace IT at Edmonds Community College
 
Advanced Threat Detection in ICS – SCADA Environments
Advanced Threat Detection in ICS – SCADA EnvironmentsAdvanced Threat Detection in ICS – SCADA Environments
Advanced Threat Detection in ICS – SCADA Environments
London School of Cyber Security
 
Combating Software Piracy Using Code Encryption Technique
Combating Software Piracy Using Code Encryption TechniqueCombating Software Piracy Using Code Encryption Technique
Combating Software Piracy Using Code Encryption Technique
theijes
 
Ethical hacking interview questions and answers
Ethical hacking interview questions and answersEthical hacking interview questions and answers
Ethical hacking interview questions and answers
ShivamSharma909
 
PACE-IT, Security+ 4.5: Mitigating Risks in Alternative Environments
PACE-IT, Security+ 4.5: Mitigating Risks in Alternative EnvironmentsPACE-IT, Security+ 4.5: Mitigating Risks in Alternative Environments
PACE-IT, Security+ 4.5: Mitigating Risks in Alternative Environments
Pace IT at Edmonds Community College
 
Invesitigation of Malware and Forensic Tools on Internet
Invesitigation of Malware and Forensic Tools on Internet Invesitigation of Malware and Forensic Tools on Internet
Invesitigation of Malware and Forensic Tools on Internet
IJECEIAES
 
A security note for web developers
A security note for web developersA security note for web developers
A security note for web developers
John Ombagi
 
A tale story of building and maturing threat hunting program
A tale story of building and maturing threat hunting programA tale story of building and maturing threat hunting program
A tale story of building and maturing threat hunting program
idsecconf
 
IDSECCONF 2020 : A Tale Story of Building and Maturing Threat Hunting Program
IDSECCONF 2020 :  A Tale Story of Building and Maturing Threat Hunting ProgramIDSECCONF 2020 :  A Tale Story of Building and Maturing Threat Hunting Program
IDSECCONF 2020 : A Tale Story of Building and Maturing Threat Hunting Program
Digit Oktavianto
 
M-Pass: Web Authentication Protocol
M-Pass: Web Authentication ProtocolM-Pass: Web Authentication Protocol
M-Pass: Web Authentication Protocol
IJERD Editor
 
PACE-IT, Security+ 6.1: Introduction to Cryptography (part 2)
PACE-IT, Security+ 6.1: Introduction to Cryptography (part 2)PACE-IT, Security+ 6.1: Introduction to Cryptography (part 2)
PACE-IT, Security+ 6.1: Introduction to Cryptography (part 2)
Pace IT at Edmonds Community College
 
OlgerHoxha_Thesis_Final
OlgerHoxha_Thesis_FinalOlgerHoxha_Thesis_Final
OlgerHoxha_Thesis_Final
Olger Hoxha, CISSP CISM
 
What is Penetration Testing?
What is Penetration Testing?What is Penetration Testing?
What is Penetration Testing?
Rapid7
 
Lecture #8: Clark-Wilson & Chinese Wall Model for Multilevel Security
Lecture #8: Clark-Wilson & Chinese Wall Model for Multilevel SecurityLecture #8: Clark-Wilson & Chinese Wall Model for Multilevel Security
Lecture #8: Clark-Wilson & Chinese Wall Model for Multilevel Security
Dr. Ramchandra Mangrulkar
 
How To Defeat Advanced Malware. New Tools for Protection and Forensics
How To Defeat Advanced Malware. New Tools for Protection and ForensicsHow To Defeat Advanced Malware. New Tools for Protection and Forensics
How To Defeat Advanced Malware. New Tools for Protection and Forensics
London School of Cyber Security
 
Combating Software Piracy Using Code Encryption Technique
Combating Software Piracy Using Code Encryption TechniqueCombating Software Piracy Using Code Encryption Technique
Combating Software Piracy Using Code Encryption Technique
theijes
 
Ethical hacking interview questions and answers
Ethical hacking interview questions and answersEthical hacking interview questions and answers
Ethical hacking interview questions and answers
ShivamSharma909
 
PACE-IT, Security+ 4.5: Mitigating Risks in Alternative Environments
PACE-IT, Security+ 4.5: Mitigating Risks in Alternative EnvironmentsPACE-IT, Security+ 4.5: Mitigating Risks in Alternative Environments
PACE-IT, Security+ 4.5: Mitigating Risks in Alternative Environments
Pace IT at Edmonds Community College
 
Invesitigation of Malware and Forensic Tools on Internet
Invesitigation of Malware and Forensic Tools on Internet Invesitigation of Malware and Forensic Tools on Internet
Invesitigation of Malware and Forensic Tools on Internet
IJECEIAES
 
A security note for web developers
A security note for web developersA security note for web developers
A security note for web developers
John Ombagi
 
A tale story of building and maturing threat hunting program
A tale story of building and maturing threat hunting programA tale story of building and maturing threat hunting program
A tale story of building and maturing threat hunting program
idsecconf
 
IDSECCONF 2020 : A Tale Story of Building and Maturing Threat Hunting Program
IDSECCONF 2020 :  A Tale Story of Building and Maturing Threat Hunting ProgramIDSECCONF 2020 :  A Tale Story of Building and Maturing Threat Hunting Program
IDSECCONF 2020 : A Tale Story of Building and Maturing Threat Hunting Program
Digit Oktavianto
 
M-Pass: Web Authentication Protocol
M-Pass: Web Authentication ProtocolM-Pass: Web Authentication Protocol
M-Pass: Web Authentication Protocol
IJERD Editor
 
What is Penetration Testing?
What is Penetration Testing?What is Penetration Testing?
What is Penetration Testing?
Rapid7
 

Similar to Lecture #18 - #20: Web Browser and Web Application Security (20)

Sql Injection Attacks And A Web Application Environment
Sql Injection Attacks And A Web Application EnvironmentSql Injection Attacks And A Web Application Environment
Sql Injection Attacks And A Web Application Environment
Sheri Elliott
 
OFFTECH TOOL AND END URL FINDER
OFFTECH TOOL AND END URL FINDEROFFTECH TOOL AND END URL FINDER
OFFTECH TOOL AND END URL FINDER
IRJET Journal
 
Protect Your IT Infrastructure from Zero-Day Attacks and New Vulnerabilities
Protect Your IT Infrastructure from Zero-Day Attacks and New VulnerabilitiesProtect Your IT Infrastructure from Zero-Day Attacks and New Vulnerabilities
Protect Your IT Infrastructure from Zero-Day Attacks and New Vulnerabilities
Symantec
 
IRJET- Bug Hunting using Web Application Penetration Testing Techniques.
IRJET- Bug Hunting using Web Application Penetration Testing Techniques.IRJET- Bug Hunting using Web Application Penetration Testing Techniques.
IRJET- Bug Hunting using Web Application Penetration Testing Techniques.
IRJET Journal
 
Module 12 (web application vulnerabilities)
Module 12 (web application vulnerabilities)Module 12 (web application vulnerabilities)
Module 12 (web application vulnerabilities)
Wail Hassan
 
A Multidimensional View of Critical Web Application Security Risks: A Novel '...
A Multidimensional View of Critical Web Application Security Risks: A Novel '...A Multidimensional View of Critical Web Application Security Risks: A Novel '...
A Multidimensional View of Critical Web Application Security Risks: A Novel '...
Cognizant
 
Tracing out Cross Site Scripting Vulnerabilities in Modern Scripts
Tracing out Cross Site Scripting Vulnerabilities in Modern ScriptsTracing out Cross Site Scripting Vulnerabilities in Modern Scripts
Tracing out Cross Site Scripting Vulnerabilities in Modern Scripts
Eswar Publications
 
Browser Security – Issues and Best Practices1Outli
Browser Security – Issues and Best Practices1OutliBrowser Security – Issues and Best Practices1Outli
Browser Security – Issues and Best Practices1Outli
VannaSchrader3
 
A Survey of Keylogger in Cybersecurity Education
A Survey of Keylogger in Cybersecurity EducationA Survey of Keylogger in Cybersecurity Education
A Survey of Keylogger in Cybersecurity Education
ijtsrd
 
Research Paper
Research PaperResearch Paper
Research Paper
David Chaponniere
 
Analysis of XSS attack Mitigation techniques based on Platforms and Browsers
Analysis of XSS attack Mitigation techniques based on Platforms and BrowsersAnalysis of XSS attack Mitigation techniques based on Platforms and Browsers
Analysis of XSS attack Mitigation techniques based on Platforms and Browsers
cscpconf
 
Web vulnerabilities
Web vulnerabilitiesWeb vulnerabilities
Web vulnerabilities
Krishna Gehlot
 
So You Want a Job in Cybersecurity
So You Want a Job in CybersecuritySo You Want a Job in Cybersecurity
So You Want a Job in Cybersecurity
Teri Radichel
 
cybersecurity-careers.pdf
cybersecurity-careers.pdfcybersecurity-careers.pdf
cybersecurity-careers.pdf
RakeshKumar442494
 
IRJET - Web Vulnerability Scanner
IRJET - Web Vulnerability ScannerIRJET - Web Vulnerability Scanner
IRJET - Web Vulnerability Scanner
IRJET Journal
 
Cross-Site Scripting (XSS)
Cross-Site Scripting (XSS)Cross-Site Scripting (XSS)
Cross-Site Scripting (XSS)
Daniel Tumser
 
XSS filter on Server side
XSS filter on Server sideXSS filter on Server side
XSS filter on Server side
cuteboysmith
 
Get Ready for Web Application Security Testing
Get Ready for Web Application Security TestingGet Ready for Web Application Security Testing
Get Ready for Web Application Security Testing
Alan Kan
 
React security vulnerabilities
React security vulnerabilitiesReact security vulnerabilities
React security vulnerabilities
AngelinaJasper
 
HallTumserFinalPaper
HallTumserFinalPaperHallTumserFinalPaper
HallTumserFinalPaper
Daniel Tumser
 
Sql Injection Attacks And A Web Application Environment
Sql Injection Attacks And A Web Application EnvironmentSql Injection Attacks And A Web Application Environment
Sql Injection Attacks And A Web Application Environment
Sheri Elliott
 
OFFTECH TOOL AND END URL FINDER
OFFTECH TOOL AND END URL FINDEROFFTECH TOOL AND END URL FINDER
OFFTECH TOOL AND END URL FINDER
IRJET Journal
 
Protect Your IT Infrastructure from Zero-Day Attacks and New Vulnerabilities
Protect Your IT Infrastructure from Zero-Day Attacks and New VulnerabilitiesProtect Your IT Infrastructure from Zero-Day Attacks and New Vulnerabilities
Protect Your IT Infrastructure from Zero-Day Attacks and New Vulnerabilities
Symantec
 
IRJET- Bug Hunting using Web Application Penetration Testing Techniques.
IRJET- Bug Hunting using Web Application Penetration Testing Techniques.IRJET- Bug Hunting using Web Application Penetration Testing Techniques.
IRJET- Bug Hunting using Web Application Penetration Testing Techniques.
IRJET Journal
 
Module 12 (web application vulnerabilities)
Module 12 (web application vulnerabilities)Module 12 (web application vulnerabilities)
Module 12 (web application vulnerabilities)
Wail Hassan
 
A Multidimensional View of Critical Web Application Security Risks: A Novel '...
A Multidimensional View of Critical Web Application Security Risks: A Novel '...A Multidimensional View of Critical Web Application Security Risks: A Novel '...
A Multidimensional View of Critical Web Application Security Risks: A Novel '...
Cognizant
 
Tracing out Cross Site Scripting Vulnerabilities in Modern Scripts
Tracing out Cross Site Scripting Vulnerabilities in Modern ScriptsTracing out Cross Site Scripting Vulnerabilities in Modern Scripts
Tracing out Cross Site Scripting Vulnerabilities in Modern Scripts
Eswar Publications
 
Browser Security – Issues and Best Practices1Outli
Browser Security – Issues and Best Practices1OutliBrowser Security – Issues and Best Practices1Outli
Browser Security – Issues and Best Practices1Outli
VannaSchrader3
 
A Survey of Keylogger in Cybersecurity Education
A Survey of Keylogger in Cybersecurity EducationA Survey of Keylogger in Cybersecurity Education
A Survey of Keylogger in Cybersecurity Education
ijtsrd
 
Analysis of XSS attack Mitigation techniques based on Platforms and Browsers
Analysis of XSS attack Mitigation techniques based on Platforms and BrowsersAnalysis of XSS attack Mitigation techniques based on Platforms and Browsers
Analysis of XSS attack Mitigation techniques based on Platforms and Browsers
cscpconf
 
So You Want a Job in Cybersecurity
So You Want a Job in CybersecuritySo You Want a Job in Cybersecurity
So You Want a Job in Cybersecurity
Teri Radichel
 
IRJET - Web Vulnerability Scanner
IRJET - Web Vulnerability ScannerIRJET - Web Vulnerability Scanner
IRJET - Web Vulnerability Scanner
IRJET Journal
 
Cross-Site Scripting (XSS)
Cross-Site Scripting (XSS)Cross-Site Scripting (XSS)
Cross-Site Scripting (XSS)
Daniel Tumser
 
XSS filter on Server side
XSS filter on Server sideXSS filter on Server side
XSS filter on Server side
cuteboysmith
 
Get Ready for Web Application Security Testing
Get Ready for Web Application Security TestingGet Ready for Web Application Security Testing
Get Ready for Web Application Security Testing
Alan Kan
 
React security vulnerabilities
React security vulnerabilitiesReact security vulnerabilities
React security vulnerabilities
AngelinaJasper
 
HallTumserFinalPaper
HallTumserFinalPaperHallTumserFinalPaper
HallTumserFinalPaper
Daniel Tumser
 
Ad

More from Dr. Ramchandra Mangrulkar (20)

Gibbs sampling is a Markov Chain Monte Carlo (MCMC)
Gibbs sampling is a Markov Chain Monte Carlo (MCMC)Gibbs sampling is a Markov Chain Monte Carlo (MCMC)
Gibbs sampling is a Markov Chain Monte Carlo (MCMC)
Dr. Ramchandra Mangrulkar
 
Introduction to Research and Publications Tools.pdf
Introduction to Research and Publications Tools.pdfIntroduction to Research and Publications Tools.pdf
Introduction to Research and Publications Tools.pdf
Dr. Ramchandra Mangrulkar
 
Blockchain#2.pdf
Blockchain#2.pdfBlockchain#2.pdf
Blockchain#2.pdf
Dr. Ramchandra Mangrulkar
 
Blockchain#1.pdf
Blockchain#1.pdfBlockchain#1.pdf
Blockchain#1.pdf
Dr. Ramchandra Mangrulkar
 
Blockchain#3.pdf
Blockchain#3.pdfBlockchain#3.pdf
Blockchain#3.pdf
Dr. Ramchandra Mangrulkar
 
Manuscript Preparation using Latex: A Cloud Based Approach(Overleaf)
Manuscript Preparation using Latex: A Cloud Based Approach(Overleaf)Manuscript Preparation using Latex: A Cloud Based Approach(Overleaf)
Manuscript Preparation using Latex: A Cloud Based Approach(Overleaf)
Dr. Ramchandra Mangrulkar
 
Lecture #32: Forensic Duplication
Lecture #32: Forensic DuplicationLecture #32: Forensic Duplication
Lecture #32: Forensic Duplication
Dr. Ramchandra Mangrulkar
 
Lecture #32: Digital Forensics : Evidence Handling, Validation and Reporting
Lecture #32: Digital Forensics : Evidence Handling, Validation and ReportingLecture #32: Digital Forensics : Evidence Handling, Validation and Reporting
Lecture #32: Digital Forensics : Evidence Handling, Validation and Reporting
Dr. Ramchandra Mangrulkar
 
LEcture #28-#30
LEcture #28-#30LEcture #28-#30
LEcture #28-#30
Dr. Ramchandra Mangrulkar
 
Lecture #25 : Oauth 2.0
Lecture #25 : Oauth 2.0Lecture #25 : Oauth 2.0
Lecture #25 : Oauth 2.0
Dr. Ramchandra Mangrulkar
 
Lecture # 14: Salami and Linearization Attacks
Lecture # 14: Salami and Linearization Attacks Lecture # 14: Salami and Linearization Attacks
Lecture # 14: Salami and Linearization Attacks
Dr. Ramchandra Mangrulkar
 
Lecture #12,#13 : Program and OS Security -Part I
Lecture #12,#13 : Program and OS Security -Part ILecture #12,#13 : Program and OS Security -Part I
Lecture #12,#13 : Program and OS Security -Part I
Dr. Ramchandra Mangrulkar
 
Lecture #6: Multilevel Security Models
Lecture #6: Multilevel Security ModelsLecture #6: Multilevel Security Models
Lecture #6: Multilevel Security Models
Dr. Ramchandra Mangrulkar
 
Lecture #7: Bell Lapdula and Biba Model of Multilevel Security
Lecture #7: Bell Lapdula and Biba Model of Multilevel SecurityLecture #7: Bell Lapdula and Biba Model of Multilevel Security
Lecture #7: Bell Lapdula and Biba Model of Multilevel Security
Dr. Ramchandra Mangrulkar
 
Lecture #4: Access Control Policies
Lecture #4: Access Control PoliciesLecture #4: Access Control Policies
Lecture #4: Access Control Policies
Dr. Ramchandra Mangrulkar
 
Lecture #3: Defense Strategies and Techniques: Part II
 Lecture #3: Defense Strategies and Techniques: Part II Lecture #3: Defense Strategies and Techniques: Part II
Lecture #3: Defense Strategies and Techniques: Part II
Dr. Ramchandra Mangrulkar
 
Lecture #2: Defence Strategies and Techniques (Security): Part I
Lecture #2: Defence Strategies and Techniques (Security): Part ILecture #2: Defence Strategies and Techniques (Security): Part I
Lecture #2: Defence Strategies and Techniques (Security): Part I
Dr. Ramchandra Mangrulkar
 
Lecture #1: Access Control : Various Cyber attacks and Latest Statistics
Lecture #1: Access Control : Various Cyber attacks and Latest StatisticsLecture #1: Access Control : Various Cyber attacks and Latest Statistics
Lecture #1: Access Control : Various Cyber attacks and Latest Statistics
Dr. Ramchandra Mangrulkar
 
Stream cipher: Play Fair, Hill Cipher, Product Cipher
Stream cipher: Play Fair, Hill Cipher, Product CipherStream cipher: Play Fair, Hill Cipher, Product Cipher
Stream cipher: Play Fair, Hill Cipher, Product Cipher
Dr. Ramchandra Mangrulkar
 
Idea
IdeaIdea
Idea
Dr. Ramchandra Mangrulkar
 
Gibbs sampling is a Markov Chain Monte Carlo (MCMC)
Gibbs sampling is a Markov Chain Monte Carlo (MCMC)Gibbs sampling is a Markov Chain Monte Carlo (MCMC)
Gibbs sampling is a Markov Chain Monte Carlo (MCMC)
Dr. Ramchandra Mangrulkar
 
Introduction to Research and Publications Tools.pdf
Introduction to Research and Publications Tools.pdfIntroduction to Research and Publications Tools.pdf
Introduction to Research and Publications Tools.pdf
Dr. Ramchandra Mangrulkar
 
Manuscript Preparation using Latex: A Cloud Based Approach(Overleaf)
Manuscript Preparation using Latex: A Cloud Based Approach(Overleaf)Manuscript Preparation using Latex: A Cloud Based Approach(Overleaf)
Manuscript Preparation using Latex: A Cloud Based Approach(Overleaf)
Dr. Ramchandra Mangrulkar
 
Lecture #32: Digital Forensics : Evidence Handling, Validation and Reporting
Lecture #32: Digital Forensics : Evidence Handling, Validation and ReportingLecture #32: Digital Forensics : Evidence Handling, Validation and Reporting
Lecture #32: Digital Forensics : Evidence Handling, Validation and Reporting
Dr. Ramchandra Mangrulkar
 
Lecture # 14: Salami and Linearization Attacks
Lecture # 14: Salami and Linearization Attacks Lecture # 14: Salami and Linearization Attacks
Lecture # 14: Salami and Linearization Attacks
Dr. Ramchandra Mangrulkar
 
Lecture #12,#13 : Program and OS Security -Part I
Lecture #12,#13 : Program and OS Security -Part ILecture #12,#13 : Program and OS Security -Part I
Lecture #12,#13 : Program and OS Security -Part I
Dr. Ramchandra Mangrulkar
 
Lecture #7: Bell Lapdula and Biba Model of Multilevel Security
Lecture #7: Bell Lapdula and Biba Model of Multilevel SecurityLecture #7: Bell Lapdula and Biba Model of Multilevel Security
Lecture #7: Bell Lapdula and Biba Model of Multilevel Security
Dr. Ramchandra Mangrulkar
 
Lecture #3: Defense Strategies and Techniques: Part II
 Lecture #3: Defense Strategies and Techniques: Part II Lecture #3: Defense Strategies and Techniques: Part II
Lecture #3: Defense Strategies and Techniques: Part II
Dr. Ramchandra Mangrulkar
 
Lecture #2: Defence Strategies and Techniques (Security): Part I
Lecture #2: Defence Strategies and Techniques (Security): Part ILecture #2: Defence Strategies and Techniques (Security): Part I
Lecture #2: Defence Strategies and Techniques (Security): Part I
Dr. Ramchandra Mangrulkar
 
Lecture #1: Access Control : Various Cyber attacks and Latest Statistics
Lecture #1: Access Control : Various Cyber attacks and Latest StatisticsLecture #1: Access Control : Various Cyber attacks and Latest Statistics
Lecture #1: Access Control : Various Cyber attacks and Latest Statistics
Dr. Ramchandra Mangrulkar
 
Stream cipher: Play Fair, Hill Cipher, Product Cipher
Stream cipher: Play Fair, Hill Cipher, Product CipherStream cipher: Play Fair, Hill Cipher, Product Cipher
Stream cipher: Play Fair, Hill Cipher, Product Cipher
Dr. Ramchandra Mangrulkar
 
Ad

Recently uploaded (20)

Value Stream Mapping Worskshops for Intelligent Continuous Security
Value Stream Mapping Worskshops for Intelligent Continuous SecurityValue Stream Mapping Worskshops for Intelligent Continuous Security
Value Stream Mapping Worskshops for Intelligent Continuous Security
Marc Hornbeek
 
Data Structures_Introduction to algorithms.pptx
Data Structures_Introduction to algorithms.pptxData Structures_Introduction to algorithms.pptx
Data Structures_Introduction to algorithms.pptx
RushaliDeshmukh2
 
Degree_of_Automation.pdf for Instrumentation and industrial specialist
Degree_of_Automation.pdf for  Instrumentation  and industrial specialistDegree_of_Automation.pdf for  Instrumentation  and industrial specialist
Degree_of_Automation.pdf for Instrumentation and industrial specialist
shreyabhosale19
 
lecture5.pptxJHKGJFHDGTFGYIUOIUIPIOIPUOHIYGUYFGIH
lecture5.pptxJHKGJFHDGTFGYIUOIUIPIOIPUOHIYGUYFGIHlecture5.pptxJHKGJFHDGTFGYIUOIUIPIOIPUOHIYGUYFGIH
lecture5.pptxJHKGJFHDGTFGYIUOIUIPIOIPUOHIYGUYFGIH
Abodahab
 
Artificial Intelligence (AI) basics.pptx
Artificial Intelligence (AI) basics.pptxArtificial Intelligence (AI) basics.pptx
Artificial Intelligence (AI) basics.pptx
aditichinar
 
DT REPORT by Tech titan GROUP to introduce the subject design Thinking
DT REPORT by Tech titan GROUP to introduce the subject design ThinkingDT REPORT by Tech titan GROUP to introduce the subject design Thinking
DT REPORT by Tech titan GROUP to introduce the subject design Thinking
DhruvChotaliya2
 
Artificial Intelligence introduction.pptx
Artificial Intelligence introduction.pptxArtificial Intelligence introduction.pptx
Artificial Intelligence introduction.pptx
DrMarwaElsherif
 
The Gaussian Process Modeling Module in UQLab
The Gaussian Process Modeling Module in UQLabThe Gaussian Process Modeling Module in UQLab
The Gaussian Process Modeling Module in UQLab
Journal of Soft Computing in Civil Engineering
 
theory-slides-for react for beginners.pptx
theory-slides-for react for beginners.pptxtheory-slides-for react for beginners.pptx
theory-slides-for react for beginners.pptx
sanchezvanessa7896
 
15th International Conference on Computer Science, Engineering and Applicatio...
15th International Conference on Computer Science, Engineering and Applicatio...15th International Conference on Computer Science, Engineering and Applicatio...
15th International Conference on Computer Science, Engineering and Applicatio...
IJCSES Journal
 
Data Structures_Searching and Sorting.pptx
Data Structures_Searching and Sorting.pptxData Structures_Searching and Sorting.pptx
Data Structures_Searching and Sorting.pptx
RushaliDeshmukh2
 
ADVXAI IN MALWARE ANALYSIS FRAMEWORK: BALANCING EXPLAINABILITY WITH SECURITY
ADVXAI IN MALWARE ANALYSIS FRAMEWORK: BALANCING EXPLAINABILITY WITH SECURITYADVXAI IN MALWARE ANALYSIS FRAMEWORK: BALANCING EXPLAINABILITY WITH SECURITY
ADVXAI IN MALWARE ANALYSIS FRAMEWORK: BALANCING EXPLAINABILITY WITH SECURITY
ijscai
 
fluke dealers in bangalore..............
fluke dealers in bangalore..............fluke dealers in bangalore..............
fluke dealers in bangalore..............
Haresh Vaswani
 
Development of MLR, ANN and ANFIS Models for Estimation of PCUs at Different ...
Development of MLR, ANN and ANFIS Models for Estimation of PCUs at Different ...Development of MLR, ANN and ANFIS Models for Estimation of PCUs at Different ...
Development of MLR, ANN and ANFIS Models for Estimation of PCUs at Different ...
Journal of Soft Computing in Civil Engineering
 
Structural Response of Reinforced Self-Compacting Concrete Deep Beam Using Fi...
Structural Response of Reinforced Self-Compacting Concrete Deep Beam Using Fi...Structural Response of Reinforced Self-Compacting Concrete Deep Beam Using Fi...
Structural Response of Reinforced Self-Compacting Concrete Deep Beam Using Fi...
Journal of Soft Computing in Civil Engineering
 
Smart Storage Solutions.pptx for production engineering
Smart Storage Solutions.pptx for production engineeringSmart Storage Solutions.pptx for production engineering
Smart Storage Solutions.pptx for production engineering
rushikeshnavghare94
 
New Microsoft PowerPoint Presentation.pdf
New Microsoft PowerPoint Presentation.pdfNew Microsoft PowerPoint Presentation.pdf
New Microsoft PowerPoint Presentation.pdf
mohamedezzat18803
 
introduction to machine learining for beginers
introduction to machine learining for beginersintroduction to machine learining for beginers
introduction to machine learining for beginers
JoydebSheet
 
Data Structures_Linear data structures Linked Lists.pptx
Data Structures_Linear data structures Linked Lists.pptxData Structures_Linear data structures Linked Lists.pptx
Data Structures_Linear data structures Linked Lists.pptx
RushaliDeshmukh2
 
Introduction to FLUID MECHANICS & KINEMATICS
Introduction to FLUID MECHANICS &  KINEMATICSIntroduction to FLUID MECHANICS &  KINEMATICS
Introduction to FLUID MECHANICS & KINEMATICS
narayanaswamygdas
 
Value Stream Mapping Worskshops for Intelligent Continuous Security
Value Stream Mapping Worskshops for Intelligent Continuous SecurityValue Stream Mapping Worskshops for Intelligent Continuous Security
Value Stream Mapping Worskshops for Intelligent Continuous Security
Marc Hornbeek
 
Data Structures_Introduction to algorithms.pptx
Data Structures_Introduction to algorithms.pptxData Structures_Introduction to algorithms.pptx
Data Structures_Introduction to algorithms.pptx
RushaliDeshmukh2
 
Degree_of_Automation.pdf for Instrumentation and industrial specialist
Degree_of_Automation.pdf for  Instrumentation  and industrial specialistDegree_of_Automation.pdf for  Instrumentation  and industrial specialist
Degree_of_Automation.pdf for Instrumentation and industrial specialist
shreyabhosale19
 
lecture5.pptxJHKGJFHDGTFGYIUOIUIPIOIPUOHIYGUYFGIH
lecture5.pptxJHKGJFHDGTFGYIUOIUIPIOIPUOHIYGUYFGIHlecture5.pptxJHKGJFHDGTFGYIUOIUIPIOIPUOHIYGUYFGIH
lecture5.pptxJHKGJFHDGTFGYIUOIUIPIOIPUOHIYGUYFGIH
Abodahab
 
Artificial Intelligence (AI) basics.pptx
Artificial Intelligence (AI) basics.pptxArtificial Intelligence (AI) basics.pptx
Artificial Intelligence (AI) basics.pptx
aditichinar
 
DT REPORT by Tech titan GROUP to introduce the subject design Thinking
DT REPORT by Tech titan GROUP to introduce the subject design ThinkingDT REPORT by Tech titan GROUP to introduce the subject design Thinking
DT REPORT by Tech titan GROUP to introduce the subject design Thinking
DhruvChotaliya2
 
Artificial Intelligence introduction.pptx
Artificial Intelligence introduction.pptxArtificial Intelligence introduction.pptx
Artificial Intelligence introduction.pptx
DrMarwaElsherif
 
theory-slides-for react for beginners.pptx
theory-slides-for react for beginners.pptxtheory-slides-for react for beginners.pptx
theory-slides-for react for beginners.pptx
sanchezvanessa7896
 
15th International Conference on Computer Science, Engineering and Applicatio...
15th International Conference on Computer Science, Engineering and Applicatio...15th International Conference on Computer Science, Engineering and Applicatio...
15th International Conference on Computer Science, Engineering and Applicatio...
IJCSES Journal
 
Data Structures_Searching and Sorting.pptx
Data Structures_Searching and Sorting.pptxData Structures_Searching and Sorting.pptx
Data Structures_Searching and Sorting.pptx
RushaliDeshmukh2
 
ADVXAI IN MALWARE ANALYSIS FRAMEWORK: BALANCING EXPLAINABILITY WITH SECURITY
ADVXAI IN MALWARE ANALYSIS FRAMEWORK: BALANCING EXPLAINABILITY WITH SECURITYADVXAI IN MALWARE ANALYSIS FRAMEWORK: BALANCING EXPLAINABILITY WITH SECURITY
ADVXAI IN MALWARE ANALYSIS FRAMEWORK: BALANCING EXPLAINABILITY WITH SECURITY
ijscai
 
fluke dealers in bangalore..............
fluke dealers in bangalore..............fluke dealers in bangalore..............
fluke dealers in bangalore..............
Haresh Vaswani
 
Smart Storage Solutions.pptx for production engineering
Smart Storage Solutions.pptx for production engineeringSmart Storage Solutions.pptx for production engineering
Smart Storage Solutions.pptx for production engineering
rushikeshnavghare94
 
New Microsoft PowerPoint Presentation.pdf
New Microsoft PowerPoint Presentation.pdfNew Microsoft PowerPoint Presentation.pdf
New Microsoft PowerPoint Presentation.pdf
mohamedezzat18803
 
introduction to machine learining for beginers
introduction to machine learining for beginersintroduction to machine learining for beginers
introduction to machine learining for beginers
JoydebSheet
 
Data Structures_Linear data structures Linked Lists.pptx
Data Structures_Linear data structures Linked Lists.pptxData Structures_Linear data structures Linked Lists.pptx
Data Structures_Linear data structures Linked Lists.pptx
RushaliDeshmukh2
 
Introduction to FLUID MECHANICS & KINEMATICS
Introduction to FLUID MECHANICS &  KINEMATICSIntroduction to FLUID MECHANICS &  KINEMATICS
Introduction to FLUID MECHANICS & KINEMATICS
narayanaswamygdas
 

Lecture #18 - #20: Web Browser and Web Application Security

  • 1. djlogo.jpg Lecture #18-20: Web Applications Security Dr.Ramchandra Mangrulkar September 14, 2020 Dr.Ramchandra Mangrulkar Lecture #18-20: Web Applications Security September 14, 2020 1 / 25
  • 2. djlogo.jpg Contents OWASP Web- A User Side Web Browser : Architecture, Vulnerabilities and Attacks Web Application Security Dr.Ramchandra Mangrulkar Lecture #18-20: Web Applications Security September 14, 2020 2 / 25
  • 4. djlogo.jpg Web-User/Client Side The browser is the core client-side component. Its counterpart is the web server. Web- A User Side Cookies HTTPS and SSL Web Browser : Working and Attacks Web Application Security Dr.Ramchandra Mangrulkar Lecture #18-20: Web Applications Security September 14, 2020 4 / 25
  • 5. djlogo.jpg The Browser Architecture: Overview Overview of the communication between the web servers and web browsers. The web server and a browser typically running in separate machines. Only the web server has access to the local disk. The browser only has access to the local disk by asking the user for permission The web server and the browser communicate over the network. Dr.Ramchandra Mangrulkar Lecture #18-20: Web Applications Security September 14, 2020 5 / 25
  • 6. djlogo.jpg The Web Browser architecture Dr.Ramchandra Mangrulkar Lecture #18-20: Web Applications Security September 14, 2020 6 / 25
  • 7. djlogo.jpg The Web Browser architecture cont... The User Interface subsystem -provides features such as toolbars, visual page-load progress, smart download handling, preferences, and printing. -may be integrated with the desktop environment to provide browser session management or communication with other desktop applications. Browser Engine -a high-level interface to the Rendering Engine. -loads a given URL and supports primitive browsing actions such as forward, back, and reload. -provides hooks for viewing various aspects of the browsing session such as current page load progress and JavaScript alerts. -allows the querying and manipulation of Rendering Engine settings. Dr.Ramchandra Mangrulkar Lecture #18-20: Web Applications Security September 14, 2020 7 / 25
  • 8. djlogo.jpg The Web Browser architecture cont... Rendering Engine -visual representation for a given URL. -displaying HTML and XMLdocuments, optionally styled with CSS, embedded content ( images) -IE(Trident), Firefox(Gecko), Safari, Chrome and Opera(Webkit). -Chrome runs various instances of this engine with various tabs. Networking subsystem -implements file transfer protocols such as HTTP and FTP. JavaScript Interpreter -evaluates JavaScript code, which may be embedded in web pages. XML Parser subsystem -parses XML documents into a Document Object Model (DOM) tree2 . -The most reusable subsystems in the architecture. 2 Document Object Model (DOM) tree is a web page representation that can be accessed and modified by the script codeDr.Ramchandra Mangrulkar Lecture #18-20: Web Applications Security September 14, 2020 8 / 25
  • 9. djlogo.jpg The Web Browser architecture cont... Display Back-end subsystem (UI Backend) -provides drawing and windowing primitives, a set of user interface widgets, and a set of fonts. - may be tied closely with the operating system. Data Persistence subsystem - stores various data associated with the browsing session on disk. - high-level data such as bookmarks or toolbar settings, - or it may be low-level data such as cookies, Preferences, security certificates, or cache. Dr.Ramchandra Mangrulkar Lecture #18-20: Web Applications Security September 14, 2020 9 / 25
  • 10. djlogo.jpg The Web Browser MArket Share a a NetMarketShare:Marketshareformobile,browsers,operating. ..netmarketshare.com Dr.Ramchandra Mangrulkar Lecture #18-20: Web Applications Security September 14, 2020 10 / 25
  • 11. djlogo.jpg Home Assignment Microsoft Edge https://blogs.windows.com/msedgedev/2016/04/20/ building-a-more-accessible-web-platform/ Google Chrome https://medium.com/@zicodeng/ explore-the-magic-behind-google-chrome-c3563dbd2739 Firefox https://blog.mozilla.org/standard8/2015/06/30/ firefox-hello-desktop-behind-the-scenes-architecture/ Dr.Ramchandra Mangrulkar Lecture #18-20: Web Applications Security September 14, 2020 11 / 25
  • 12. djlogo.jpg Why to worry for Browsers Security A browser often connects to more than the one address Fetching data can entail accesses to numerous locations Browser software can be malicious or can be corrupted to acquire malicious functionality. Browsers support add-ins, extra code to add new features to the browser, but these add-ins themselves can include corrupting code. Data display involves a rich command set that controls rendering, positioning, motion, layering, and even invisibility. The browser can access any data on a user’s computer.The browser runs with the same privileges as the user. Data transfers to and from the user are invisible, meaning they occur without the user’s knowledge or explicit permission. Dr.Ramchandra Mangrulkar Lecture #18-20: Web Applications Security September 14, 2020 12 / 25
  • 13. djlogo.jpg Browser Attacks : Three Attacks Vectors Go after the operating system so it will impede the browser’s correct and secure functioning. Tackle the browser or one of its components, add-ons, or plug-ins so its activity is altered Intercept or modify communication to or from the browser. Dr.Ramchandra Mangrulkar Lecture #18-20: Web Applications Security September 14, 2020 13 / 25
  • 14. djlogo.jpg Browser Attacks : Three Attacks Vectors 3 3 https://zeltser.com/targeting-web-browser-user/ Dr.Ramchandra Mangrulkar Lecture #18-20: Web Applications Security September 14, 2020 14 / 25
  • 15. djlogo.jpg Browser Attacks Man-in-the-Browser Keystroke Logger Page-in-the-Middle Program Download Substitution User-in-the-Middle Dr.Ramchandra Mangrulkar Lecture #18-20: Web Applications Security September 14, 2020 15 / 25
  • 16. djlogo.jpg Man-in-the-Browser Attack Man-in-the-browser is a form of man-in-the-middle attack. An attacker is able to insert himself into the communications channel between two trusting parties by compromising a Web browser. Purpose is for eavesdropping, data theft and/or session tampering. attackers to carry out various forms of financial fraud, typically by manipulating Internet Banking Services. In order to compromise the browser, adversaries can take advantage of security vulnerabilities and/or manipulate inherent browser functionality to change content, modify behavior, and intercept information. Various forms of malware,e.g. Trojan horse, can be used to carry out the attack. Dr.Ramchandra Mangrulkar Lecture #18-20: Web Applications Security September 14, 2020 16 / 25
  • 17. djlogo.jpg Man-in-the-Browser Attack 4 4 https://www.kratikal.com/There are many examples for man-in-the-browser malware and attack campaigns targeting online banking and other internet services. Infamous names of malware used include: Zeus, Spyeye, Bugat, Carberp, Silon, Tatanga, and more. Dr.Ramchandra Mangrulkar Lecture #18-20: Web Applications Security September 14, 2020 17 / 25
  • 18. djlogo.jpg Keystroke Logger A keystroke logger (or key logger) is either hardware or software that records all keystrokes entered. The logger either retains these keystrokes for future use by the attacker or sends them to the attacker across a network connection. Dr.Ramchandra Mangrulkar Lecture #18-20: Web Applications Security September 14, 2020 18 / 25
  • 19. djlogo.jpg Page-in-the-Middle Attack A page-in-the-middle attack is another type of browser attack in which a user is redirected to another page. when the user clicks “login” to go to the login page of any site, the attack might redirect the user to the attacker’s page, where the attacker can also capture the user’s credentials. Dr.Ramchandra Mangrulkar Lecture #18-20: Web Applications Security September 14, 2020 19 / 25
  • 20. djlogo.jpg Program Download Substitution Coupled with a page-in-the-middle attack is a download substitution. The attacker presents a page with a desirable and seemingly innocuous program for the user to download, for example, a browser toolbar or a photo organizer utility. Attack also defeats users’ access controls that would normally block software downloads and installations, because the user intentionally accepts this software. Dr.Ramchandra Mangrulkar Lecture #18-20: Web Applications Security September 14, 2020 20 / 25
  • 21. djlogo.jpg User-in-the-Middle Attack puts a human between two automated processes so that the human unwittingly helps spammers register automatically for free email accounts. A CAPTCHA is a puzzle that supposedly only a human can solve, so a server application can distinguish between a human who makes a request and an automated program generating the same request repeatedly. Dr.Ramchandra Mangrulkar Lecture #18-20: Web Applications Security September 14, 2020 21 / 25
  • 22. djlogo.jpg Web Applications Security vulnerabilities (Risks) Injection -Injection flaws, such as SQL, NoSQL, OS, and LDAP injection Broken Authentication -Application functions implemented incorrectly -allowing attackers to compromise passwords, keys, or session tokens Sensitive Data Exposure -applications do not properly protect sensitive data, such as financial, healthcare. XML External Entities (XXE) - disclose internal files using the file URI handler -internal file shares, internal port scanning, remote code execution, and denial of service attacks. Dr.Ramchandra Mangrulkar Lecture #18-20: Web Applications Security September 14, 2020 22 / 25
  • 23. djlogo.jpg Web Applications Security vulnerabilities (Risks) Broken Access Control - Restrictions on what authenticated users are allowed if not properly enforced. -exploit these flaws to access unauthorized functionality and/or data Security Misconfiguration - result of insecure default configurations - frameworks, libraries, and applications be securely configured & must be patched/upgraded in a timely fashion. Dr.Ramchandra Mangrulkar Lecture #18-20: Web Applications Security September 14, 2020 23 / 25
  • 24. djlogo.jpg Web Applications Security vulnerabilities (Risks) Cross-Site Scripting XSS -includes untrusted data in a new web page without proper validation or escaping, or updates an existing web page with user-supplied data using a browser API that can create HTML or JavaScript. -to execute scripts in the victim’s browser which can hijack user sessions, deface web sites, or redirect the user to malicious sites. Insecure Deserialization -remote code execution. -used to perform attacks, including replay attacks, injection attacks, and privilege escalation attacks. Using Components with Known Vulnerabilities -Components, such as libraries, frameworks, and other software modules, run with the same privileges as the application. -an attack can facilitate serious data loss or server takeover. Dr.Ramchandra Mangrulkar Lecture #18-20: Web Applications Security September 14, 2020 24 / 25
  • 25. djlogo.jpg Web Applications Security vulnerabilities (Risks) Insufficient Logging Monitoring -allows attackers to further attack systems, maintain persistence, pivot to more systems, and tamper, extract, or destroy data. Dr.Ramchandra Mangrulkar Lecture #18-20: Web Applications Security September 14, 2020 25 / 25