SlideShare a Scribd company logo
Security 101: Just
don’t do it
Recently…
Yammer
A hypothetical world…
• You’re working for a company that has:
• a web browser used by 45% of internet
users
• a web server visited by 90% of internet
users
(Stats made up)
http://www.w3schools.com/browsers/browsers_stats.asp
http://www.guardian.co.uk/technology/2012/nov/06/google-bing-uk-search-share
Your product manager says…
• FASTER!
• Our web browser and our web server
must work awesomely fast together
• Users have slow internet connections,
especially their upload
So…
• I want you to embrace, extend and
extinguish the HTTP/HTTPS standard
• We’re going to add a proprietary
extension so that our web browser &
our web server compress HTTP
headers (even over HTTPS)
Your response?
• Okay
• Nope, that would introduce a security
vulnerability
• Interesting, I’d need to work out what
our threat model is
Threat model
• “Attacker-centric threat modelling
starts with an attacker, and evaluates
their goals, and how they might
achieve them”
• Implicit in this is what their capabilities
are
http://en.wikipedia.org/wiki/Threat_model
The attack…
• The attacker’s goal is to obtain your login
cookie so that they can impersonate you on
the target site.
• Whilst observing your network traffic (e.g. on a
public Wi-Fi network),
• and whilst you are logged in to the target site,
• the attacker gets you to visit their evil site,
• which has a whole bunch of Javascript that
(slowly) adds images to the DOM.
http://en.wikipedia.org/wiki/CRIME_(security_exploit)
HTTP headers
GET / HTTP/1.1
Host: deploymentmanager.red-gate.com
Connection: keep-alive
Cache-Control: max-age=0
User-Agent: Mozilla/5.0 (Windows NT 6.2; WOW64) AppleWebKit/537.11
(KHTML, like Gecko) Chrome/23.0.1271.95 Safari/537.11
Accept:
text/html,application/xhtml+xml,application/xml;q=0.9,*/*;q=0.8
DNT: 1
Accept-Encoding: gzip,deflate,sdch
Accept-Language: en-GB,en;q=0.8
Accept-Charset: ISO-8859-1,utf-8;q=0.7,*;q=0.3
Cookie: DeploymentManagerAuthenticationTicket=0166AE259D1D0CE54C73A0FB
69E6A550E153A196C381EF4F2C5F96D96FA2D768E65621...
Fiddler
Images of the form…
GET /404.png?DeploymentManagerAuthenticationTicket=0 HTTP/1.1
...
Cookie: DeploymentManagerAuthenticationTicket=0166AE259D1D0CE54C73A0FB
69E6A550E153A196C381EF4F2C5F96D96FA2D768E65621...
GET /404.png?DeploymentManagerAuthenticationTicket=1 HTTP/1.1
...
Cookie: DeploymentManagerAuthenticationTicket=0166AE259D1D0CE54C73A0FB
69E6A550E153A196C381EF4F2C5F96D96FA2D768E65621...
GET /404.png?DeploymentManagerAuthenticationTicket=2 HTTP/1.1
...
Cookie: DeploymentManagerAuthenticationTicket=0166AE259D1D0CE54C73A0FB
69E6A550E153A196C381EF4F2C5F96D96FA2D768E65621...
http://en.wikipedia.org/wiki/CRIME_(security_exploit)
Takeaway…
Takeaways…
• Just don’t do it!
• Writing software where security matters is
hard
• If you can, use an existing library to do all
the functionality (in as few method calls as
possible). If that library doesn’t have the
feature you want, there’s probably a reason
• If you can’t, then you’ve got a big problem

More Related Content

What's hot (20)

PDF
WordPress Security Basics - Melbourne WordPress User Meetup
Chris Burgess
 
PDF
Javascript issues and tools in production for developers
Michael Haberman
 
PDF
8 Simple Ways to Hack Your Joomla
SiteGround.com
 
ODP
Drupal Security for Coders and Themers - XSS and CSRF
knaddison
 
PPTX
WordPress.org & Optimizing Security for your WordPress sites
GovLoop
 
PDF
Word press security checklist
Sanjay Dabhoya
 
PPTX
Word press security 101 2018
Laura Hartwig
 
PPTX
Word camp pune 2013 security
Gaurav Singh
 
PPTX
How to Secure your WordPress Website - WordCamp UK 2014
Primary Image Ltd
 
PPTX
Wordcampcolumbus 2009
Brian Lockrey
 
PPTX
Creating Secure Web Apps: What Every Developer Needs to Know About HTTPS Today
Heroku
 
PPTX
Sucuri Webinar: Beginner's Guide to CDNs
Sucuri
 
PDF
Word press beirut 9th meetup march
Fadi Nicolas Zahhar
 
PPTX
Word press security basics
East Bay WordPress Meetup
 
PPT
High Performance WordPress
Barry Abrahamson
 
PPT
High Performance Wordpress: “Faster, Cheaper, Easier : Pick Three”
Valent Mustamin
 
PPTX
How it's made - MyGet.org - AzureConf
Maarten Balliauw
 
PPTX
WordPress Zurich Meetup #5: mobilesport.ch insights
Blogwerk AG
 
PDF
High Performance WordPress
vnsavage
 
PPT
Why wordpress is not completely safe
Brainwork Technologies
 
WordPress Security Basics - Melbourne WordPress User Meetup
Chris Burgess
 
Javascript issues and tools in production for developers
Michael Haberman
 
8 Simple Ways to Hack Your Joomla
SiteGround.com
 
Drupal Security for Coders and Themers - XSS and CSRF
knaddison
 
WordPress.org & Optimizing Security for your WordPress sites
GovLoop
 
Word press security checklist
Sanjay Dabhoya
 
Word press security 101 2018
Laura Hartwig
 
Word camp pune 2013 security
Gaurav Singh
 
How to Secure your WordPress Website - WordCamp UK 2014
Primary Image Ltd
 
Wordcampcolumbus 2009
Brian Lockrey
 
Creating Secure Web Apps: What Every Developer Needs to Know About HTTPS Today
Heroku
 
Sucuri Webinar: Beginner's Guide to CDNs
Sucuri
 
Word press beirut 9th meetup march
Fadi Nicolas Zahhar
 
Word press security basics
East Bay WordPress Meetup
 
High Performance WordPress
Barry Abrahamson
 
High Performance Wordpress: “Faster, Cheaper, Easier : Pick Three”
Valent Mustamin
 
How it's made - MyGet.org - AzureConf
Maarten Balliauw
 
WordPress Zurich Meetup #5: mobilesport.ch insights
Blogwerk AG
 
High Performance WordPress
vnsavage
 
Why wordpress is not completely safe
Brainwork Technologies
 

Viewers also liked (18)

PPTX
Security - 101 - ISSA
Pedro Serrano
 
PPT
Information Technology Security A Brief Overview 2001
Donald E. Hester
 
PDF
Computer security 101
Khairulmizam Samsudin
 
PPT
Computer Security
Cristian Mihai
 
PDF
Information Security Management 101
Jerod Brennen
 
PPTX
Basic concepts in computer security
Arzath Areeff
 
PPTX
Cyber Security 101: Training, awareness, strategies for small to medium sized...
Stephen Cobb
 
PPTX
Computer security threats & prevention
PriSim
 
PDF
Computer Security and Safety, Ethics & Privacy
Samudin Kassan
 
PPTX
Computer Security 101
Progressive Integrations
 
PDF
Computer Security and Risks
Miguel Rebollo
 
PPT
Introduction to Information Security
Dr. Loganathan R
 
PPT
Introduction To Information Security
belsis
 
PDF
Computer Security
Frederik Questier
 
PPT
Introduction to Cyber Security
Stephen Lahanas
 
PDF
Top Cyber Security Trends for 2016
Imperva
 
PPTX
INFORMATION SECURITY
Ahmed Moussa
 
PPTX
Cyber crime and security ppt
Lipsita Behera
 
Security - 101 - ISSA
Pedro Serrano
 
Information Technology Security A Brief Overview 2001
Donald E. Hester
 
Computer security 101
Khairulmizam Samsudin
 
Computer Security
Cristian Mihai
 
Information Security Management 101
Jerod Brennen
 
Basic concepts in computer security
Arzath Areeff
 
Cyber Security 101: Training, awareness, strategies for small to medium sized...
Stephen Cobb
 
Computer security threats & prevention
PriSim
 
Computer Security and Safety, Ethics & Privacy
Samudin Kassan
 
Computer Security 101
Progressive Integrations
 
Computer Security and Risks
Miguel Rebollo
 
Introduction to Information Security
Dr. Loganathan R
 
Introduction To Information Security
belsis
 
Computer Security
Frederik Questier
 
Introduction to Cyber Security
Stephen Lahanas
 
Top Cyber Security Trends for 2016
Imperva
 
INFORMATION SECURITY
Ahmed Moussa
 
Cyber crime and security ppt
Lipsita Behera
 
Ad

Similar to Security 101 (20)

PDF
VoxxedDays Luxembourg - Abuse web browsers for fun & profits - Dominique Righ...
YaJUG
 
PDF
ZeroNights2012_BeEF_Workshop_antisnatchor
Michele Orru
 
PDF
Antisnatchor all you ever wanted to know about beef
DefconRussia
 
PDF
Thinking Outside the Sand[box]
Juniper Networks
 
PPTX
External JavaScript Widget Development Best Practices (updated) (v.1.1)
Volkan Özçelik
 
PPTX
CollabSphere SC 103 : Domino on the Web : Yes, It's (Probably) Hackable
Darren Duke
 
PDF
Rails security: above and beyond the defaults
Matias Korhonen
 
PDF
Chrome extensions threat analysis and countermeasures
Roel Palmaers
 
PPTX
Top 10 Web Hacks 2012
Matt Johansen
 
PPTX
Browser Hacking For Fun and Profit | Null Bangalore Meetup 2019 | Divyanshu S...
Divyanshu
 
PPTX
Creating Havoc using Human Interface Device
Positive Hack Days
 
PPTX
Top Ten Web Hacking Techniques of 2012
Jeremiah Grossman
 
PDF
HTTP cookie hijacking in the wild: security and privacy implications
Priyanka Aash
 
PPTX
[Wroclaw #2] Web Application Security Headers
OWASP
 
PDF
Threat_Modelling.pdf
MarlboroAbyad
 
PDF
Are we security yet
Cristian Vat
 
PDF
Active Https Cookie Stealing
SecurityTube.Net
 
PPTX
Java scriptwidgetdevelopmentjstanbul2012
Volkan Özçelik
 
PPTX
External JavaScript Widget Development Best Practices
Volkan Özçelik
 
PPTX
Malware Analysis For The Enterprise
Jason Ross
 
VoxxedDays Luxembourg - Abuse web browsers for fun & profits - Dominique Righ...
YaJUG
 
ZeroNights2012_BeEF_Workshop_antisnatchor
Michele Orru
 
Antisnatchor all you ever wanted to know about beef
DefconRussia
 
Thinking Outside the Sand[box]
Juniper Networks
 
External JavaScript Widget Development Best Practices (updated) (v.1.1)
Volkan Özçelik
 
CollabSphere SC 103 : Domino on the Web : Yes, It's (Probably) Hackable
Darren Duke
 
Rails security: above and beyond the defaults
Matias Korhonen
 
Chrome extensions threat analysis and countermeasures
Roel Palmaers
 
Top 10 Web Hacks 2012
Matt Johansen
 
Browser Hacking For Fun and Profit | Null Bangalore Meetup 2019 | Divyanshu S...
Divyanshu
 
Creating Havoc using Human Interface Device
Positive Hack Days
 
Top Ten Web Hacking Techniques of 2012
Jeremiah Grossman
 
HTTP cookie hijacking in the wild: security and privacy implications
Priyanka Aash
 
[Wroclaw #2] Web Application Security Headers
OWASP
 
Threat_Modelling.pdf
MarlboroAbyad
 
Are we security yet
Cristian Vat
 
Active Https Cookie Stealing
SecurityTube.Net
 
Java scriptwidgetdevelopmentjstanbul2012
Volkan Özçelik
 
External JavaScript Widget Development Best Practices
Volkan Özçelik
 
Malware Analysis For The Enterprise
Jason Ross
 
Ad

More from Red Gate Software (20)

PDF
The future of DevOps: fully left-shifted deployments with version control and...
Red Gate Software
 
PDF
Embracing DevOps through database migrations with Flyway
Red Gate Software
 
PPTX
Database DevOps for Managed Service Providers
Red Gate Software
 
PDF
Mizuho Financial: Launching our Database DevOps journey
Red Gate Software
 
PDF
7 steps to effective SQL Server monitoring
Red Gate Software
 
PDF
Level up your deployments for SQL Source Control
Red Gate Software
 
PDF
Key findings from the 2020 state of database dev ops report
Red Gate Software
 
PPTX
Extend DevOps to Your SQL Server Databases
Red Gate Software
 
PDF
2019 year in review slides
Red Gate Software
 
PPTX
What we learned at PASS Summit in 2019
Red Gate Software
 
PPTX
Quality in Software Development: Anglia Ruskin University
Red Gate Software
 
PPTX
How SQL Change Automation helps you deliver value faster
Red Gate Software
 
PPTX
DevOps essentials from Abel Wang and Steve Jones
Red Gate Software
 
PPTX
Successfully migrating existing databases to Azure
Red Gate Software
 
PPTX
The Ultimate Guide to Choosing and Implementing the Right Monitoring Tool
Red Gate Software
 
PDF
Everything You Need to Know About the 2019 DORA Accelerate State of DevOps Re...
Red Gate Software
 
PDF
Using Redgate, AKS and Azure to bring DevOps to your database
Red Gate Software
 
PDF
Using Redgate, AKS and Azure to bring DevOps to your Database
Red Gate Software
 
PDF
How to Pitch a Software Development Initiative and Ignite Culture Change
Red Gate Software
 
PDF
Taming the Wild West
Red Gate Software
 
The future of DevOps: fully left-shifted deployments with version control and...
Red Gate Software
 
Embracing DevOps through database migrations with Flyway
Red Gate Software
 
Database DevOps for Managed Service Providers
Red Gate Software
 
Mizuho Financial: Launching our Database DevOps journey
Red Gate Software
 
7 steps to effective SQL Server monitoring
Red Gate Software
 
Level up your deployments for SQL Source Control
Red Gate Software
 
Key findings from the 2020 state of database dev ops report
Red Gate Software
 
Extend DevOps to Your SQL Server Databases
Red Gate Software
 
2019 year in review slides
Red Gate Software
 
What we learned at PASS Summit in 2019
Red Gate Software
 
Quality in Software Development: Anglia Ruskin University
Red Gate Software
 
How SQL Change Automation helps you deliver value faster
Red Gate Software
 
DevOps essentials from Abel Wang and Steve Jones
Red Gate Software
 
Successfully migrating existing databases to Azure
Red Gate Software
 
The Ultimate Guide to Choosing and Implementing the Right Monitoring Tool
Red Gate Software
 
Everything You Need to Know About the 2019 DORA Accelerate State of DevOps Re...
Red Gate Software
 
Using Redgate, AKS and Azure to bring DevOps to your database
Red Gate Software
 
Using Redgate, AKS and Azure to bring DevOps to your Database
Red Gate Software
 
How to Pitch a Software Development Initiative and Ignite Culture Change
Red Gate Software
 
Taming the Wild West
Red Gate Software
 

Recently uploaded (20)

PDF
Smart Air Quality Monitoring with Serrax AQM190 LITE
SERRAX TECHNOLOGIES LLP
 
PDF
DevBcn - Building 10x Organizations Using Modern Productivity Metrics
Justin Reock
 
PDF
How Startups Are Growing Faster with App Developers in Australia.pdf
India App Developer
 
PPTX
MSP360 Backup Scheduling and Retention Best Practices.pptx
MSP360
 
PDF
CIFDAQ Weekly Market Wrap for 11th July 2025
CIFDAQ
 
PDF
Exolore The Essential AI Tools in 2025.pdf
Srinivasan M
 
PPTX
Webinar: Introduction to LF Energy EVerest
DanBrown980551
 
PDF
LLMs.txt: Easily Control How AI Crawls Your Site
Keploy
 
PDF
Why Orbit Edge Tech is a Top Next JS Development Company in 2025
mahendraalaska08
 
PDF
Transcript: New from BookNet Canada for 2025: BNC BiblioShare - Tech Forum 2025
BookNet Canada
 
PDF
SFWelly Summer 25 Release Highlights July 2025
Anna Loughnan Colquhoun
 
PDF
Fl Studio 24.2.2 Build 4597 Crack for Windows Free Download 2025
faizk77g
 
PDF
Smart Trailers 2025 Update with History and Overview
Paul Menig
 
PDF
NewMind AI Journal - Weekly Chronicles - July'25 Week II
NewMind AI
 
PPTX
OpenID AuthZEN - Analyst Briefing July 2025
David Brossard
 
PDF
HubSpot Main Hub: A Unified Growth Platform
Jaswinder Singh
 
PDF
CIFDAQ Token Spotlight for 9th July 2025
CIFDAQ
 
PDF
TrustArc Webinar - Data Privacy Trends 2025: Mid-Year Insights & Program Stra...
TrustArc
 
PPTX
AUTOMATION AND ROBOTICS IN PHARMA INDUSTRY.pptx
sameeraaabegumm
 
PDF
Complete Network Protection with Real-Time Security
L4RGINDIA
 
Smart Air Quality Monitoring with Serrax AQM190 LITE
SERRAX TECHNOLOGIES LLP
 
DevBcn - Building 10x Organizations Using Modern Productivity Metrics
Justin Reock
 
How Startups Are Growing Faster with App Developers in Australia.pdf
India App Developer
 
MSP360 Backup Scheduling and Retention Best Practices.pptx
MSP360
 
CIFDAQ Weekly Market Wrap for 11th July 2025
CIFDAQ
 
Exolore The Essential AI Tools in 2025.pdf
Srinivasan M
 
Webinar: Introduction to LF Energy EVerest
DanBrown980551
 
LLMs.txt: Easily Control How AI Crawls Your Site
Keploy
 
Why Orbit Edge Tech is a Top Next JS Development Company in 2025
mahendraalaska08
 
Transcript: New from BookNet Canada for 2025: BNC BiblioShare - Tech Forum 2025
BookNet Canada
 
SFWelly Summer 25 Release Highlights July 2025
Anna Loughnan Colquhoun
 
Fl Studio 24.2.2 Build 4597 Crack for Windows Free Download 2025
faizk77g
 
Smart Trailers 2025 Update with History and Overview
Paul Menig
 
NewMind AI Journal - Weekly Chronicles - July'25 Week II
NewMind AI
 
OpenID AuthZEN - Analyst Briefing July 2025
David Brossard
 
HubSpot Main Hub: A Unified Growth Platform
Jaswinder Singh
 
CIFDAQ Token Spotlight for 9th July 2025
CIFDAQ
 
TrustArc Webinar - Data Privacy Trends 2025: Mid-Year Insights & Program Stra...
TrustArc
 
AUTOMATION AND ROBOTICS IN PHARMA INDUSTRY.pptx
sameeraaabegumm
 
Complete Network Protection with Real-Time Security
L4RGINDIA
 

Security 101

  • 3. A hypothetical world… • You’re working for a company that has: • a web browser used by 45% of internet users • a web server visited by 90% of internet users (Stats made up) http://www.w3schools.com/browsers/browsers_stats.asp http://www.guardian.co.uk/technology/2012/nov/06/google-bing-uk-search-share
  • 4. Your product manager says… • FASTER! • Our web browser and our web server must work awesomely fast together • Users have slow internet connections, especially their upload
  • 5. So… • I want you to embrace, extend and extinguish the HTTP/HTTPS standard • We’re going to add a proprietary extension so that our web browser & our web server compress HTTP headers (even over HTTPS)
  • 6. Your response? • Okay • Nope, that would introduce a security vulnerability • Interesting, I’d need to work out what our threat model is
  • 7. Threat model • “Attacker-centric threat modelling starts with an attacker, and evaluates their goals, and how they might achieve them” • Implicit in this is what their capabilities are http://en.wikipedia.org/wiki/Threat_model
  • 8. The attack… • The attacker’s goal is to obtain your login cookie so that they can impersonate you on the target site. • Whilst observing your network traffic (e.g. on a public Wi-Fi network), • and whilst you are logged in to the target site, • the attacker gets you to visit their evil site, • which has a whole bunch of Javascript that (slowly) adds images to the DOM. http://en.wikipedia.org/wiki/CRIME_(security_exploit)
  • 9. HTTP headers GET / HTTP/1.1 Host: deploymentmanager.red-gate.com Connection: keep-alive Cache-Control: max-age=0 User-Agent: Mozilla/5.0 (Windows NT 6.2; WOW64) AppleWebKit/537.11 (KHTML, like Gecko) Chrome/23.0.1271.95 Safari/537.11 Accept: text/html,application/xhtml+xml,application/xml;q=0.9,*/*;q=0.8 DNT: 1 Accept-Encoding: gzip,deflate,sdch Accept-Language: en-GB,en;q=0.8 Accept-Charset: ISO-8859-1,utf-8;q=0.7,*;q=0.3 Cookie: DeploymentManagerAuthenticationTicket=0166AE259D1D0CE54C73A0FB 69E6A550E153A196C381EF4F2C5F96D96FA2D768E65621... Fiddler
  • 10. Images of the form… GET /404.png?DeploymentManagerAuthenticationTicket=0 HTTP/1.1 ... Cookie: DeploymentManagerAuthenticationTicket=0166AE259D1D0CE54C73A0FB 69E6A550E153A196C381EF4F2C5F96D96FA2D768E65621... GET /404.png?DeploymentManagerAuthenticationTicket=1 HTTP/1.1 ... Cookie: DeploymentManagerAuthenticationTicket=0166AE259D1D0CE54C73A0FB 69E6A550E153A196C381EF4F2C5F96D96FA2D768E65621... GET /404.png?DeploymentManagerAuthenticationTicket=2 HTTP/1.1 ... Cookie: DeploymentManagerAuthenticationTicket=0166AE259D1D0CE54C73A0FB 69E6A550E153A196C381EF4F2C5F96D96FA2D768E65621... http://en.wikipedia.org/wiki/CRIME_(security_exploit)
  • 12. Takeaways… • Just don’t do it! • Writing software where security matters is hard • If you can, use an existing library to do all the functionality (in as few method calls as possible). If that library doesn’t have the feature you want, there’s probably a reason • If you can’t, then you’ve got a big problem