SlideShare a Scribd company logo
Security 101: Just
don’t do it
Recently…
Yammer
A hypothetical world…
• You’re working for a company that has:
• a web browser used by 45% of internet
users
• a web server visited by 90% of internet
users
(Stats made up)
http://www.w3schools.com/browsers/browsers_stats.asp
http://www.guardian.co.uk/technology/2012/nov/06/google-bing-uk-search-share
Your product manager says…
• FASTER!
• Our web browser and our web server
must work awesomely fast together
• Users have slow internet connections,
especially their upload
So…
• I want you to embrace, extend and
extinguish the HTTP/HTTPS standard
• We’re going to add a proprietary
extension so that our web browser &
our web server compress HTTP
headers (even over HTTPS)
Your response?
• Okay
• Nope, that would introduce a security
vulnerability
• Interesting, I’d need to work out what
our threat model is
Threat model
• “Attacker-centric threat modelling
starts with an attacker, and evaluates
their goals, and how they might
achieve them”
• Implicit in this is what their capabilities
are
http://en.wikipedia.org/wiki/Threat_model
The attack…
• The attacker’s goal is to obtain your login
cookie so that they can impersonate you on
the target site.
• Whilst observing your network traffic (e.g. on a
public Wi-Fi network),
• and whilst you are logged in to the target site,
• the attacker gets you to visit their evil site,
• which has a whole bunch of Javascript that
(slowly) adds images to the DOM.
http://en.wikipedia.org/wiki/CRIME_(security_exploit)
HTTP headers
GET / HTTP/1.1
Host: deploymentmanager.red-gate.com
Connection: keep-alive
Cache-Control: max-age=0
User-Agent: Mozilla/5.0 (Windows NT 6.2; WOW64) AppleWebKit/537.11
(KHTML, like Gecko) Chrome/23.0.1271.95 Safari/537.11
Accept:
text/html,application/xhtml+xml,application/xml;q=0.9,*/*;q=0.8
DNT: 1
Accept-Encoding: gzip,deflate,sdch
Accept-Language: en-GB,en;q=0.8
Accept-Charset: ISO-8859-1,utf-8;q=0.7,*;q=0.3
Cookie: DeploymentManagerAuthenticationTicket=0166AE259D1D0CE54C73A0FB
69E6A550E153A196C381EF4F2C5F96D96FA2D768E65621...
Fiddler
Images of the form…
GET /404.png?DeploymentManagerAuthenticationTicket=0 HTTP/1.1
...
Cookie: DeploymentManagerAuthenticationTicket=0166AE259D1D0CE54C73A0FB
69E6A550E153A196C381EF4F2C5F96D96FA2D768E65621...
GET /404.png?DeploymentManagerAuthenticationTicket=1 HTTP/1.1
...
Cookie: DeploymentManagerAuthenticationTicket=0166AE259D1D0CE54C73A0FB
69E6A550E153A196C381EF4F2C5F96D96FA2D768E65621...
GET /404.png?DeploymentManagerAuthenticationTicket=2 HTTP/1.1
...
Cookie: DeploymentManagerAuthenticationTicket=0166AE259D1D0CE54C73A0FB
69E6A550E153A196C381EF4F2C5F96D96FA2D768E65621...
http://en.wikipedia.org/wiki/CRIME_(security_exploit)
Takeaway…
Takeaways…
• Just don’t do it!
• Writing software where security matters is
hard
• If you can, use an existing library to do all
the functionality (in as few method calls as
possible). If that library doesn’t have the
feature you want, there’s probably a reason
• If you can’t, then you’ve got a big problem

More Related Content

PPTX
Word campktm speed-security
PPT
WebHosting Performance / WordPress - Pubcon Vegas - Hendison
PDF
WordPress security & performance a beginners guide
PDF
8 Ways to Hack a WordPress website
PPTX
Wordpress optimization
PDF
RUNNING A SECURITY CHECK FOR YOUR WORDPRESS SITE
PPTX
Building Secure WordPress Sites
PPTX
5 Ways to Optimize Your WordPress Site
Word campktm speed-security
WebHosting Performance / WordPress - Pubcon Vegas - Hendison
WordPress security & performance a beginners guide
8 Ways to Hack a WordPress website
Wordpress optimization
RUNNING A SECURITY CHECK FOR YOUR WORDPRESS SITE
Building Secure WordPress Sites
5 Ways to Optimize Your WordPress Site

What's hot (20)

PDF
WordPress Security Basics - Melbourne WordPress User Meetup
PDF
Javascript issues and tools in production for developers
PDF
8 Simple Ways to Hack Your Joomla
ODP
Drupal Security for Coders and Themers - XSS and CSRF
PPTX
WordPress.org & Optimizing Security for your WordPress sites
PDF
Word press security checklist
PPTX
Word press security 101 2018
PPTX
Word camp pune 2013 security
PPTX
How to Secure your WordPress Website - WordCamp UK 2014
PPTX
Wordcampcolumbus 2009
PPTX
Creating Secure Web Apps: What Every Developer Needs to Know About HTTPS Today
PPTX
Sucuri Webinar: Beginner's Guide to CDNs
PDF
Word press beirut 9th meetup march
PPTX
Word press security basics
PPT
High Performance WordPress
PPT
High Performance Wordpress: “Faster, Cheaper, Easier : Pick Three”
PPTX
How it's made - MyGet.org - AzureConf
PPTX
WordPress Zurich Meetup #5: mobilesport.ch insights
PDF
High Performance WordPress
PPT
Why wordpress is not completely safe
WordPress Security Basics - Melbourne WordPress User Meetup
Javascript issues and tools in production for developers
8 Simple Ways to Hack Your Joomla
Drupal Security for Coders and Themers - XSS and CSRF
WordPress.org & Optimizing Security for your WordPress sites
Word press security checklist
Word press security 101 2018
Word camp pune 2013 security
How to Secure your WordPress Website - WordCamp UK 2014
Wordcampcolumbus 2009
Creating Secure Web Apps: What Every Developer Needs to Know About HTTPS Today
Sucuri Webinar: Beginner's Guide to CDNs
Word press beirut 9th meetup march
Word press security basics
High Performance WordPress
High Performance Wordpress: “Faster, Cheaper, Easier : Pick Three”
How it's made - MyGet.org - AzureConf
WordPress Zurich Meetup #5: mobilesport.ch insights
High Performance WordPress
Why wordpress is not completely safe
Ad

Viewers also liked (18)

PPTX
Security - 101 - ISSA
PPT
Information Technology Security A Brief Overview 2001
PDF
Computer security 101
PPT
Computer Security
PDF
Information Security Management 101
PPTX
Basic concepts in computer security
PPTX
Cyber Security 101: Training, awareness, strategies for small to medium sized...
PPTX
Computer security threats & prevention
PDF
Computer Security and Safety, Ethics & Privacy
PPTX
Computer Security 101
PDF
Computer Security and Risks
PPT
Introduction to Information Security
PPT
Introduction To Information Security
PDF
Computer Security
PPT
Introduction to Cyber Security
PDF
Top Cyber Security Trends for 2016
PPTX
INFORMATION SECURITY
PPTX
Cyber crime and security ppt
Security - 101 - ISSA
Information Technology Security A Brief Overview 2001
Computer security 101
Computer Security
Information Security Management 101
Basic concepts in computer security
Cyber Security 101: Training, awareness, strategies for small to medium sized...
Computer security threats & prevention
Computer Security and Safety, Ethics & Privacy
Computer Security 101
Computer Security and Risks
Introduction to Information Security
Introduction To Information Security
Computer Security
Introduction to Cyber Security
Top Cyber Security Trends for 2016
INFORMATION SECURITY
Cyber crime and security ppt
Ad

Similar to Security 101 (20)

PDF
Insecurity-In-Security version.1 (2010)
PPT
Introduction to Web Server Security
PPT
01-intro-thompson.ppt
PPT
Computer and Network Security
PPT
01-intro-thompson.ppt
PPT
01-intro-thompson.ppt
PPT
Phishing with Super Bait
PPT
Ethical Hacking and Network Security
PPT
C:\Fakepath\Ethical Hacking
PPTX
Cyber Security By Preetish Panda
PDF
Web Security - Introduction v.1.3
PDF
Web Security - Introduction
PDF
Hacking Vulnerable Websites to Bypass Firewalls
PPTX
Cyber Security-Ethical Hacking
PDF
Invited Talk - Cyber Security and Open Source
PDF
Ajax Security
PPT
Internet Security
PDF
Hacking HTML5 offensive course (Zeronights edition)
PDF
HTTP cookie hijacking in the wild: security and privacy implications
PPTX
Hacking by Pratyush Gupta
Insecurity-In-Security version.1 (2010)
Introduction to Web Server Security
01-intro-thompson.ppt
Computer and Network Security
01-intro-thompson.ppt
01-intro-thompson.ppt
Phishing with Super Bait
Ethical Hacking and Network Security
C:\Fakepath\Ethical Hacking
Cyber Security By Preetish Panda
Web Security - Introduction v.1.3
Web Security - Introduction
Hacking Vulnerable Websites to Bypass Firewalls
Cyber Security-Ethical Hacking
Invited Talk - Cyber Security and Open Source
Ajax Security
Internet Security
Hacking HTML5 offensive course (Zeronights edition)
HTTP cookie hijacking in the wild: security and privacy implications
Hacking by Pratyush Gupta

More from Red Gate Software (20)

PDF
The future of DevOps: fully left-shifted deployments with version control and...
PDF
Embracing DevOps through database migrations with Flyway
PPTX
Database DevOps for Managed Service Providers
PDF
Mizuho Financial: Launching our Database DevOps journey
PDF
7 steps to effective SQL Server monitoring
PDF
Level up your deployments for SQL Source Control
PDF
Key findings from the 2020 state of database dev ops report
PPTX
Extend DevOps to Your SQL Server Databases
PDF
2019 year in review slides
PPTX
What we learned at PASS Summit in 2019
PPTX
Quality in Software Development: Anglia Ruskin University
PPTX
How SQL Change Automation helps you deliver value faster
PPTX
DevOps essentials from Abel Wang and Steve Jones
PPTX
Successfully migrating existing databases to Azure
PPTX
The Ultimate Guide to Choosing and Implementing the Right Monitoring Tool
PDF
Everything You Need to Know About the 2019 DORA Accelerate State of DevOps Re...
PDF
Using Redgate, AKS and Azure to bring DevOps to your database
PDF
Using Redgate, AKS and Azure to bring DevOps to your Database
PDF
How to Pitch a Software Development Initiative and Ignite Culture Change
PDF
Taming the Wild West
The future of DevOps: fully left-shifted deployments with version control and...
Embracing DevOps through database migrations with Flyway
Database DevOps for Managed Service Providers
Mizuho Financial: Launching our Database DevOps journey
7 steps to effective SQL Server monitoring
Level up your deployments for SQL Source Control
Key findings from the 2020 state of database dev ops report
Extend DevOps to Your SQL Server Databases
2019 year in review slides
What we learned at PASS Summit in 2019
Quality in Software Development: Anglia Ruskin University
How SQL Change Automation helps you deliver value faster
DevOps essentials from Abel Wang and Steve Jones
Successfully migrating existing databases to Azure
The Ultimate Guide to Choosing and Implementing the Right Monitoring Tool
Everything You Need to Know About the 2019 DORA Accelerate State of DevOps Re...
Using Redgate, AKS and Azure to bring DevOps to your database
Using Redgate, AKS and Azure to bring DevOps to your Database
How to Pitch a Software Development Initiative and Ignite Culture Change
Taming the Wild West

Recently uploaded (20)

PPTX
Detection-First SIEM: Rule Types, Dashboards, and Threat-Informed Strategy
PDF
Review of recent advances in non-invasive hemoglobin estimation
PDF
Advanced methodologies resolving dimensionality complications for autism neur...
PDF
Electronic commerce courselecture one. Pdf
PPTX
MYSQL Presentation for SQL database connectivity
PPTX
20250228 LYD VKU AI Blended-Learning.pptx
PPTX
Digital-Transformation-Roadmap-for-Companies.pptx
PDF
KodekX | Application Modernization Development
PDF
Machine learning based COVID-19 study performance prediction
PPT
“AI and Expert System Decision Support & Business Intelligence Systems”
PDF
Approach and Philosophy of On baking technology
PDF
Unlocking AI with Model Context Protocol (MCP)
PDF
Network Security Unit 5.pdf for BCA BBA.
PPTX
Cloud computing and distributed systems.
PDF
7 ChatGPT Prompts to Help You Define Your Ideal Customer Profile.pdf
PDF
Spectral efficient network and resource selection model in 5G networks
PDF
MIND Revenue Release Quarter 2 2025 Press Release
PPTX
KOM of Painting work and Equipment Insulation REV00 update 25-dec.pptx
PDF
Peak of Data & AI Encore- AI for Metadata and Smarter Workflows
PPTX
Understanding_Digital_Forensics_Presentation.pptx
Detection-First SIEM: Rule Types, Dashboards, and Threat-Informed Strategy
Review of recent advances in non-invasive hemoglobin estimation
Advanced methodologies resolving dimensionality complications for autism neur...
Electronic commerce courselecture one. Pdf
MYSQL Presentation for SQL database connectivity
20250228 LYD VKU AI Blended-Learning.pptx
Digital-Transformation-Roadmap-for-Companies.pptx
KodekX | Application Modernization Development
Machine learning based COVID-19 study performance prediction
“AI and Expert System Decision Support & Business Intelligence Systems”
Approach and Philosophy of On baking technology
Unlocking AI with Model Context Protocol (MCP)
Network Security Unit 5.pdf for BCA BBA.
Cloud computing and distributed systems.
7 ChatGPT Prompts to Help You Define Your Ideal Customer Profile.pdf
Spectral efficient network and resource selection model in 5G networks
MIND Revenue Release Quarter 2 2025 Press Release
KOM of Painting work and Equipment Insulation REV00 update 25-dec.pptx
Peak of Data & AI Encore- AI for Metadata and Smarter Workflows
Understanding_Digital_Forensics_Presentation.pptx

Security 101

  • 3. A hypothetical world… • You’re working for a company that has: • a web browser used by 45% of internet users • a web server visited by 90% of internet users (Stats made up) http://www.w3schools.com/browsers/browsers_stats.asp http://www.guardian.co.uk/technology/2012/nov/06/google-bing-uk-search-share
  • 4. Your product manager says… • FASTER! • Our web browser and our web server must work awesomely fast together • Users have slow internet connections, especially their upload
  • 5. So… • I want you to embrace, extend and extinguish the HTTP/HTTPS standard • We’re going to add a proprietary extension so that our web browser & our web server compress HTTP headers (even over HTTPS)
  • 6. Your response? • Okay • Nope, that would introduce a security vulnerability • Interesting, I’d need to work out what our threat model is
  • 7. Threat model • “Attacker-centric threat modelling starts with an attacker, and evaluates their goals, and how they might achieve them” • Implicit in this is what their capabilities are http://en.wikipedia.org/wiki/Threat_model
  • 8. The attack… • The attacker’s goal is to obtain your login cookie so that they can impersonate you on the target site. • Whilst observing your network traffic (e.g. on a public Wi-Fi network), • and whilst you are logged in to the target site, • the attacker gets you to visit their evil site, • which has a whole bunch of Javascript that (slowly) adds images to the DOM. http://en.wikipedia.org/wiki/CRIME_(security_exploit)
  • 9. HTTP headers GET / HTTP/1.1 Host: deploymentmanager.red-gate.com Connection: keep-alive Cache-Control: max-age=0 User-Agent: Mozilla/5.0 (Windows NT 6.2; WOW64) AppleWebKit/537.11 (KHTML, like Gecko) Chrome/23.0.1271.95 Safari/537.11 Accept: text/html,application/xhtml+xml,application/xml;q=0.9,*/*;q=0.8 DNT: 1 Accept-Encoding: gzip,deflate,sdch Accept-Language: en-GB,en;q=0.8 Accept-Charset: ISO-8859-1,utf-8;q=0.7,*;q=0.3 Cookie: DeploymentManagerAuthenticationTicket=0166AE259D1D0CE54C73A0FB 69E6A550E153A196C381EF4F2C5F96D96FA2D768E65621... Fiddler
  • 10. Images of the form… GET /404.png?DeploymentManagerAuthenticationTicket=0 HTTP/1.1 ... Cookie: DeploymentManagerAuthenticationTicket=0166AE259D1D0CE54C73A0FB 69E6A550E153A196C381EF4F2C5F96D96FA2D768E65621... GET /404.png?DeploymentManagerAuthenticationTicket=1 HTTP/1.1 ... Cookie: DeploymentManagerAuthenticationTicket=0166AE259D1D0CE54C73A0FB 69E6A550E153A196C381EF4F2C5F96D96FA2D768E65621... GET /404.png?DeploymentManagerAuthenticationTicket=2 HTTP/1.1 ... Cookie: DeploymentManagerAuthenticationTicket=0166AE259D1D0CE54C73A0FB 69E6A550E153A196C381EF4F2C5F96D96FA2D768E65621... http://en.wikipedia.org/wiki/CRIME_(security_exploit)
  • 12. Takeaways… • Just don’t do it! • Writing software where security matters is hard • If you can, use an existing library to do all the functionality (in as few method calls as possible). If that library doesn’t have the feature you want, there’s probably a reason • If you can’t, then you’ve got a big problem