Top Banner
SeCURITY 101 Navneet Kumar
20

Securty 101

Apr 13, 2017

Download

Software

Navneet Kumar
Welcome message from author
This document is posted to help you gain knowledge. Please leave a comment to let me know what you think about it! Share it to your friends and learn new things together.
Transcript
Page 1: Securty 101

SeCURITY 101

Navneet Kumar

Page 2: Securty 101

AGENDA✘ SQLi

○ Auth Bypass○ Blind SQLi

✘ CSRF✘ XSS✘ Session Management✘ Attack Chaining

Page 3: Securty 101

SQL InJECTION

Injection of a SQL query via input data plane To modify/query

sensitive data from database

Page 4: Securty 101

SQL InJECTION

statement = "SELECT * FROM users WHERE name = '" +

userName + "';"

SELECT * FROM users WHERE name = '' OR '1'='1';

' OR '1'='1' --

' OR '1'='1' ({

' OR '1'='1' /*

UserName =

Page 5: Securty 101

BliND SQL InJECTION

SQLi where attacker is Blind to SQL error response and uses true/false

response to exploit

https://www.facebook.com?id=1008 AND substring(@@version, 1, 1)=5

Page 6: Securty 101

DEMO

Page 7: Securty 101

Cross Site REQUEST FORGERY (CSRF)

Attacker executes request on vulnerable domain with victim’s

authenticated context to perform state changing actions

Page 8: Securty 101

SAME ORIGIN POLICY

Origin = Scheme + Hostname + Port

http://www.example.com:81/dir/page2.html

Page 9: Securty 101

CSRF Exploit

<form action="http://bank.com/transfer.do" method="POST">

<input type="hidden" name="acct" value="Navneet"/>

<input type="hidden" name="amount" value="1000$"/>

<input type="submit" value="Win An iPad"/>

</form>

Browser sends the session cookies automatically

Page 10: Securty 101

CSRF PreventION

<input type="hidden" name="csrfmiddlewaretoken" value="KbyUmh" /> Token Pattern

Set-Cookie: Csrf-token=i8XNjC; expires=23-Jul-2015 Max-Age=31449600; Path=/

X-Csrf-Token: i8XNjC

Header Pattern

1

2

Page 11: Securty 101

DEMO

Page 12: Securty 101

Cross Site SCRIPTING (XSS)

Attacker injects malicious client side scripts to be executed in context of

vulnerable domain

Reflected

Persistent

DOM XSS

Page 13: Securty 101

XSS type

http://facebook.com?q=<script>alert('xss')</script> Reflected

<script>

document.write("Site is at: " + document.location.href + ".");

</script>]

Dom XSS

$('div').html('welcome to' + username + 'Meeting')

//My username is saved as

userName = "<script>alert('xss')</script>"

Persistent

Page 14: Securty 101

XSS reflectionAn alert is common XSS reflection

Page 15: Securty 101

DEMO

Page 16: Securty 101

Session MaNAGEMENT

HTTP is stateless protocol so a web session is created to maintain state

Page 17: Securty 101

COOKIE Security

Attribute Value Meaning

Secure true Only send through https

http-only True Disable script access

Domain secure.example.com Send for that domain & subdomains

Expires 31-Jul-2016 13:45 Persist it till expiry date

Set-Cookie:SID=AYQEV;Domain=.gmail.com; Path=/; Expires=Wed, 13 Jan

2021 22:23:01 GMT;Secure;HttpOnly

Page 18: Securty 101

Attack ChaiNING

CSRF XSS Cookie

Page 19: Securty 101

DEMO

Page 20: Securty 101

thanks!Any questions?