SlideShare a Scribd company logo
Asynchronous
JavaScript
And
XML
Cyber Attacks are increasing !!! Why?!
Fortunately modern browsers
are getting better and
better by using AJAX
• AJAX, is a web development
technique for creating
interactive web applications.
Classic web app vs. Ajax web app
If you know JavaScript, HTML, CSS, and
XML, then you need to spend just one hour
to start with AJAX ?
AJAX cannot work independently. It is used
in combination with other technologies to
create interactive web pages.
AJAX Security
•AJAX-based Web applications use the same server-side
security schemes of regular Web applications.
•You specify authentication, authorization, and data
protection requirements in your web.xml file (declarative)
or in your program (programmatic).
•AJAX-based Web applications are subject to the same
security threats as regular Web applications.
AJAX Security
CSRF –> Cross – Site Request Forgery
ATTACKS
• See what he/she searched for
• Read emails
• Steal credit card details through PayPal
DEFENSE
• Use authentication tokens
AJAX Security
• Hacker can use JavaScript code for inferring server-side
weaknesses.
• JavaScript code is downloaded from the server and
executed at the client and can compromise the client by
mal-intended code.
AJAX Security
USEFUL TOOLS
Defense
•NoScript – Accept scripts only from sites you trust
•AltCookies – Accept cookies only from sites you trust
•Firebug – Dig deeply into HTML/JAVASCRIPT/CSS AND HTTP
Mr. Drazhev,
Thanks for your time.

More Related Content

PPT
Ajax Security
PDF
AJAX: How to Divert Threats
PDF
AJAX Security - LAC2016
PDF
Ajax Security Dangers
PPTX
Web Hacking Intro
PPTX
Cross site scripting XSS
PDF
Become a Security Ninja
PPTX
RSA Europe 2013 OWASP Training
Ajax Security
AJAX: How to Divert Threats
AJAX Security - LAC2016
Ajax Security Dangers
Web Hacking Intro
Cross site scripting XSS
Become a Security Ninja
RSA Europe 2013 OWASP Training

What's hot (20)

PPTX
Browser Security 101
PDF
2013 OWASP Top 10
PPTX
Security asp.net application
PPTX
Dom based xss
PPT
Top 10 Web Security Vulnerabilities (OWASP Top 10)
PPTX
Build A Killer Client For Your REST+JSON API
PPTX
Website hacking and prevention (All Tools,Topics & Technique )
PDF
Securing Web Applications with Token Authentication
PDF
Owasp top 10 2013
PPTX
Web application attacks
PPTX
Web application security: Threats & Countermeasures
PPTX
Web application attack Presentation
PPTX
Spring Security
PPTX
Token Authentication for Java Applications
PDF
Common Web Application Attacks
PDF
CSRF, ClickJacking & Open Redirect
PPTX
Access Control Pitfalls v2
PDF
BsidesDelhi 2018: DomGoat - the DOM Security Playground
PPTX
Its all about CSRF - null Mumbai Meet 10 January 2015 Null/OWASP Chapter
PDF
Html5 localstorage attack vectors
Browser Security 101
2013 OWASP Top 10
Security asp.net application
Dom based xss
Top 10 Web Security Vulnerabilities (OWASP Top 10)
Build A Killer Client For Your REST+JSON API
Website hacking and prevention (All Tools,Topics & Technique )
Securing Web Applications with Token Authentication
Owasp top 10 2013
Web application attacks
Web application security: Threats & Countermeasures
Web application attack Presentation
Spring Security
Token Authentication for Java Applications
Common Web Application Attacks
CSRF, ClickJacking & Open Redirect
Access Control Pitfalls v2
BsidesDelhi 2018: DomGoat - the DOM Security Playground
Its all about CSRF - null Mumbai Meet 10 January 2015 Null/OWASP Chapter
Html5 localstorage attack vectors
Ad

Viewers also liked (9)

PPT
(In)Secure Ajax-Y Websites With PHP
 
PPS
Con El Corazon
PDF
W Razie Problemow2!
 
PPT
Pecha Kucha Koen Vermeijs Han Solo College IC1Z2
PDF
Siguse 2009 Symposium Program
PDF
Budget and economic outlook 2014 to 2024
PDF
OurPDX preso for WordCampPortland
PDF
Eprimer ecom
DOCX
Aprende ecxel
(In)Secure Ajax-Y Websites With PHP
 
Con El Corazon
W Razie Problemow2!
 
Pecha Kucha Koen Vermeijs Han Solo College IC1Z2
Siguse 2009 Symposium Program
Budget and economic outlook 2014 to 2024
OurPDX preso for WordCampPortland
Eprimer ecom
Aprende ecxel
Ad

Similar to Dzhengis 93098 ajax - security (20)

PPTX
Warning Ahead: SecurityStorms are Brewing in Your JavaScript
PPT
Ajax Presentation
PDF
www.webre24h.com - Ajax security
PDF
AOEconf17: Application Security - Bastian Ike
PDF
AOEconf17: Application Security
PPTX
Ajax assignment help
PPTX
Cross Site Scripting (XSS)
PDF
CNIT 129S: 12: Attacking Users: Cross-Site Scripting (Part 1 of 2)
PDF
Appsec XSS Case Study
PDF
Shreeraj - Hacking Web 2 0 - ClubHack2007
PDF
React security vulnerabilities
PPT
Django (Web Applications that are Secure by Default)
PPTX
Hackers versus Developers and Secure Web Programming
PPTX
Web hacking refers to exploitation of applications via HTTP which can be done
PPTX
Case Study of Django: Web Frameworks that are Secure by Default
PPTX
Mr. Mohammed Aldoub - A case study of django web applications that are secur...
PDF
React commonest security flaws and remedial measures!
PPTX
Scott Isaacs Presentationajaxexperience (Final)
PPTX
Browser Hacking For Fun and Profit | Null Bangalore Meetup 2019 | Divyanshu S...
PPTX
Javascript & Jquery
Warning Ahead: SecurityStorms are Brewing in Your JavaScript
Ajax Presentation
www.webre24h.com - Ajax security
AOEconf17: Application Security - Bastian Ike
AOEconf17: Application Security
Ajax assignment help
Cross Site Scripting (XSS)
CNIT 129S: 12: Attacking Users: Cross-Site Scripting (Part 1 of 2)
Appsec XSS Case Study
Shreeraj - Hacking Web 2 0 - ClubHack2007
React security vulnerabilities
Django (Web Applications that are Secure by Default)
Hackers versus Developers and Secure Web Programming
Web hacking refers to exploitation of applications via HTTP which can be done
Case Study of Django: Web Frameworks that are Secure by Default
Mr. Mohammed Aldoub - A case study of django web applications that are secur...
React commonest security flaws and remedial measures!
Scott Isaacs Presentationajaxexperience (Final)
Browser Hacking For Fun and Profit | Null Bangalore Meetup 2019 | Divyanshu S...
Javascript & Jquery

Recently uploaded (20)

PPTX
A powerpoint presentation on the Revised K-10 Science Shaping Paper
PDF
LNK 2025 (2).pdf MWEHEHEHEHEHEHEHEHEHEHE
PDF
Paper A Mock Exam 9_ Attempt review.pdf.
PPTX
Chinmaya Tiranga Azadi Quiz (Class 7-8 )
PDF
Computing-Curriculum for Schools in Ghana
DOC
Soft-furnishing-By-Architect-A.F.M.Mohiuddin-Akhand.doc
PPTX
Onco Emergencies - Spinal cord compression Superior vena cava syndrome Febr...
PDF
احياء السادس العلمي - الفصل الثالث (التكاثر) منهج متميزين/كلية بغداد/موهوبين
PDF
Practical Manual AGRO-233 Principles and Practices of Natural Farming
PPTX
Final Presentation General Medicine 03-08-2024.pptx
PPTX
Orientation - ARALprogram of Deped to the Parents.pptx
PDF
1_English_Language_Set_2.pdf probationary
PPTX
CHAPTER IV. MAN AND BIOSPHERE AND ITS TOTALITY.pptx
PDF
RMMM.pdf make it easy to upload and study
PDF
Black Hat USA 2025 - Micro ICS Summit - ICS/OT Threat Landscape
PDF
What if we spent less time fighting change, and more time building what’s rig...
PPTX
Tissue processing ( HISTOPATHOLOGICAL TECHNIQUE
PPTX
Introduction-to-Literarature-and-Literary-Studies-week-Prelim-coverage.pptx
PDF
ChatGPT for Dummies - Pam Baker Ccesa007.pdf
PDF
Indian roads congress 037 - 2012 Flexible pavement
A powerpoint presentation on the Revised K-10 Science Shaping Paper
LNK 2025 (2).pdf MWEHEHEHEHEHEHEHEHEHEHE
Paper A Mock Exam 9_ Attempt review.pdf.
Chinmaya Tiranga Azadi Quiz (Class 7-8 )
Computing-Curriculum for Schools in Ghana
Soft-furnishing-By-Architect-A.F.M.Mohiuddin-Akhand.doc
Onco Emergencies - Spinal cord compression Superior vena cava syndrome Febr...
احياء السادس العلمي - الفصل الثالث (التكاثر) منهج متميزين/كلية بغداد/موهوبين
Practical Manual AGRO-233 Principles and Practices of Natural Farming
Final Presentation General Medicine 03-08-2024.pptx
Orientation - ARALprogram of Deped to the Parents.pptx
1_English_Language_Set_2.pdf probationary
CHAPTER IV. MAN AND BIOSPHERE AND ITS TOTALITY.pptx
RMMM.pdf make it easy to upload and study
Black Hat USA 2025 - Micro ICS Summit - ICS/OT Threat Landscape
What if we spent less time fighting change, and more time building what’s rig...
Tissue processing ( HISTOPATHOLOGICAL TECHNIQUE
Introduction-to-Literarature-and-Literary-Studies-week-Prelim-coverage.pptx
ChatGPT for Dummies - Pam Baker Ccesa007.pdf
Indian roads congress 037 - 2012 Flexible pavement

Dzhengis 93098 ajax - security

  • 2. Cyber Attacks are increasing !!! Why?! Fortunately modern browsers are getting better and better by using AJAX
  • 3. • AJAX, is a web development technique for creating interactive web applications.
  • 4. Classic web app vs. Ajax web app
  • 5. If you know JavaScript, HTML, CSS, and XML, then you need to spend just one hour to start with AJAX ?
  • 6. AJAX cannot work independently. It is used in combination with other technologies to create interactive web pages.
  • 7. AJAX Security •AJAX-based Web applications use the same server-side security schemes of regular Web applications. •You specify authentication, authorization, and data protection requirements in your web.xml file (declarative) or in your program (programmatic). •AJAX-based Web applications are subject to the same security threats as regular Web applications.
  • 8. AJAX Security CSRF –> Cross – Site Request Forgery ATTACKS • See what he/she searched for • Read emails • Steal credit card details through PayPal DEFENSE • Use authentication tokens
  • 9. AJAX Security • Hacker can use JavaScript code for inferring server-side weaknesses. • JavaScript code is downloaded from the server and executed at the client and can compromise the client by mal-intended code.
  • 10. AJAX Security USEFUL TOOLS Defense •NoScript – Accept scripts only from sites you trust •AltCookies – Accept cookies only from sites you trust •Firebug – Dig deeply into HTML/JAVASCRIPT/CSS AND HTTP