Top Banner
Varun Sharma Application Consulting and Engineering (ACE) Team, Microsoft India
17

Varun Sharma Application Consulting and Engineering (ACE) Team, Microsoft India.

Dec 31, 2015

Download

Documents

Welcome message from author
This document is posted to help you gain knowledge. Please leave a comment to let me know what you think about it! Share it to your friends and learn new things together.
Transcript
Page 1: Varun Sharma Application Consulting and Engineering (ACE) Team, Microsoft India.

Varun Sharma

Application Consulting and Engineering (ACE) Team,

Microsoft India

Page 2: Varun Sharma Application Consulting and Engineering (ACE) Team, Microsoft India.

Flaw – 1 Custom AuthenticationFlaw – 2 Lack of Rule based AuthorizationFlaw – 3 Black list input validationFlaw – 4 Improper use of CryptoFlaw – 5 App layer DOS attack

Page 3: Varun Sharma Application Consulting and Engineering (ACE) Team, Microsoft India.

Site implements custom forms authenticationBuggy codeDemo

Page 4: Varun Sharma Application Consulting and Engineering (ACE) Team, Microsoft India.

Principles:-Use well known and time tested, system provided methods for authentication. Avoid writing custom authentication code.

Page 5: Varun Sharma Application Consulting and Engineering (ACE) Team, Microsoft India.

Authorization implemented by disabling UIRule based authorization not consideredDemo

Page 6: Varun Sharma Application Consulting and Engineering (ACE) Team, Microsoft India.

Principles:-Do not rely on UI for authorizationDisabled buttons is not authorizationConsider rule based authorization in your design

Page 7: Varun Sharma Application Consulting and Engineering (ACE) Team, Microsoft India.

Only set of bad characters are checked forBecomes vulnerable in special situationsDemo

Page 8: Varun Sharma Application Consulting and Engineering (ACE) Team, Microsoft India.

Principles:-Validate for valid allowed values (white list)If white list validation is not possible,

Encode to prevent XSSParameterize to prevent SQL Injection…

Page 9: Varun Sharma Application Consulting and Engineering (ACE) Team, Microsoft India.

Not knowing what services are provided by what mechanisms

For example, what services do Digital Signatures provide?

Demo

Page 10: Varun Sharma Application Consulting and Engineering (ACE) Team, Microsoft India.

Product 1 ‘s Site

Product 2 ‘s Site

Product 3 ‘s Site

Central Payment Site

Signed XML POST

Page 11: Varun Sharma Application Consulting and Engineering (ACE) Team, Microsoft India.

Principles:-Know what service each mechanism providesDo not implement crypto mechanisms yourselfUse system provided methods

Page 12: Varun Sharma Application Consulting and Engineering (ACE) Team, Microsoft India.

Book movie ticket Screen 1 for User 1

Page 13: Varun Sharma Application Consulting and Engineering (ACE) Team, Microsoft India.

Book movie ticket Screen 2 for User 1

You have 7 minutes left

Enter Payment details:-

Name:-Credit Card Number:-Address:-….

Click to Book

Page 14: Varun Sharma Application Consulting and Engineering (ACE) Team, Microsoft India.

Book movie ticket Screen 1 for User 2

Page 15: Varun Sharma Application Consulting and Engineering (ACE) Team, Microsoft India.

Book movie ticket Screen 1 for User 2 after 7 minutes

Page 16: Varun Sharma Application Consulting and Engineering (ACE) Team, Microsoft India.

Principles:-Use CAPTCHA to avoid automated attacksDesign with security in mind

Page 17: Varun Sharma Application Consulting and Engineering (ACE) Team, Microsoft India.