SlideShare a Scribd company logo
<!doctype html>              SECURITY
                 beyond the attack vectors


          Ville Säävuori ·    · OWASP Helsinki · 15.6.2011
I AM NOT A
SECURITY EXPERT
(But a Web Developer :)
<!doctype html>
html
•   API Metering                                         •   Distributed Log storage, analysis
•   Backups & Snapshots                                  •   Graphing
•   Counters                                             •   HTTP Caching
•   Cloud/Cluster Management Tools                       •   Input/Output Filtering
     •   Instrumentation/Monitoring                      •   Memory Caching
     •   Failover                                        •   Non-relational Key Stores
     •   Node addition/removal and hashing               •   Rate Limiting
     •   Auto-scaling for cloud resources                •   Relational Storage
•   CSRF/XSS Protection                                  •   Queues
•   Data Retention/Archival                              •   Rate Limiting
•   Deployment Tools                                     •   Real-time messaging (XMPP)
     •   Multiple Devs, Staging, Prod                    •   Search
     •   Data model upgrades                                  •   Ranging
     •   Rolling deployments                                  •   Geo
     •   Multiple versions (selective beta)              •   Sharding
     •   Bucket Testing                                  •   Smart Caching
     •   Rollbacks                                            •   Dirty-table management
     •   CDN Management
•   Distributed File Storage            http://randomfoo.net/2009/01/28/infrastructure-for-modern-web-sites
HTML5 Security
HTML5 Security
complex



http://www.flickr.com/photos/stuckincustoms/5069047950/
HTML5 Security
what
 is
it?
Markup like
    Guido
intended it.
Markup like
  Guido Tim
intended it.
Not Just
 Markup
anymore.
security
<header>
      <audio>
   <video>
         <canvas>
 <footer>
<audio>
<audio
 src='foo.mp4'
preload='auto'>
<input type='email' required
  pattern='.*@syneus.fi'>
HTTP/1.1 200 OK
Date: Wed, 15 Jun 2011 17:45:00 GMT
Server: Nginx/1.0.4
Access-Control-Allow-Origin: http://syneus.fi
local storage
localStorage.setItem('name', 'Hello World!');
Web Forms 2.0
SVG
CSS3
div > p:last-of-type { ... }
GeoLocation
navigator.geolocation.getCurrentPosition(show_map);
<iframe sandbox="allow-scripts">
in the wild



   http://www.flickr.com/photos/sharkbait/2992242065/
common issues


        http://www.flickr.com/photos/rainbirder/5068808204/
XSS
http://www.flickr.com/photos/rainbirder/5068808204/
XSRF
http://www.flickr.com/photos/rainbirder/5068808204/
SQL Injection
     http://www.flickr.com/photos/rainbirder/5068808204/
Clickjacking
    http://www.flickr.com/photos/rainbirder/5068808204/
ways to protect



        http://www.flickr.com/photos/soldiersmediacenter/5285447846/
understand
 threats


        http://www.flickr.com/photos/soldiersmediacenter/5285447846/
understand
 threats

    no, really.
        http://www.flickr.com/photos/soldiersmediacenter/5285447846/
sanitation



        http://www.flickr.com/photos/soldiersmediacenter/5285447846/
test your code



        http://www.flickr.com/photos/soldiersmediacenter/5285447846/
test your code
regularly.

        http://www.flickr.com/photos/soldiersmediacenter/5285447846/
test your code
often.

         http://www.flickr.com/photos/soldiersmediacenter/5285447846/
stay updated



        http://www.flickr.com/photos/soldiersmediacenter/5285447846/
The answers to your Security Questions
 are case sensitive and cannot contain
special characters like an apostrophe,
    or the words “insert,” “delete,”
“drop,” “update,” “null,” or “select.”
                          — Sacramento Credit Union
?



http://www.flickr.com/photos/remydwd/48898192/
Best
practices


            http://www.flickr.com/photos/amagill/51806161/
trust
     no one


http://www.flickr.com/photos/furryscalyman/673915993/
use good tools
  Let frameworks help you.
but don’t trust
 them blindly
 Again. Understand what you’re doing.
use secure
protocols
  HTTPS over HTTP
outsource
         or


 hire someone
     but at least


use a checklist
understand
  your users
Mere mortals don’t behave like nerds.
educate them
  Why is it important to
  have a good password?
MORE

              html5sec.org
       lyh.fi/web_security
 www.syneus.fi/aiheet/html5
Kiitos!
Ville Säävuori
   @uninen
MORE

              html5sec.org
       lyh.fi/web_security
 www.syneus.fi/aiheet/html5

More Related Content

PPTX
BSides London 2018 - Solving Threat Detection
PPTX
Ten Commandments of Secure Coding
PDF
Pankov Artem.Improving drupal performance www.hr portal.ru.DrupalCamp Kyiv 2011
PPTX
Security Testing - Zap It
PDF
Wi-Fi Hotspot Attacks
PDF
Florian Koch - Monitoring CoreOS with Zabbix
PDF
Java EE 6 Security in practice with GlassFish
PDF
Using Zabbix API from Drupal
BSides London 2018 - Solving Threat Detection
Ten Commandments of Secure Coding
Pankov Artem.Improving drupal performance www.hr portal.ru.DrupalCamp Kyiv 2011
Security Testing - Zap It
Wi-Fi Hotspot Attacks
Florian Koch - Monitoring CoreOS with Zabbix
Java EE 6 Security in practice with GlassFish
Using Zabbix API from Drupal

What's hot (15)

PPTX
Learn to pen-test with OWASP ZAP
KEY
Drupal Security Intro
PPTX
Nouveautés de Zabbix 3.0 - Paris Monitoring meetup #2
PPTX
Software Development in the Age of Breaches
PDF
Secure your site
PPTX
QA Lab in the Cloud
ODP
2014 ZAP Workshop 2: Contexts and Fuzzing
PPTX
The OWASP Zed Attack Proxy
ODP
OWASP 2012 AppSec Dublin ZAP Intro
PPTX
Security Code Review 101
PDF
What's up with Drupal 7?
PDF
Virtual Security Lab Setup - OWASP Broken Web Apps, Webgoat, & ZAP
PPTX
Caching 101 - WordCamp OC
PDF
Defcon 22-wesley-mc grew-instrumenting-point-of-sale-malware
ODP
OWASP Zed Attack Proxy Demonstration - OWASP Bangalore Nov 22 2014
Learn to pen-test with OWASP ZAP
Drupal Security Intro
Nouveautés de Zabbix 3.0 - Paris Monitoring meetup #2
Software Development in the Age of Breaches
Secure your site
QA Lab in the Cloud
2014 ZAP Workshop 2: Contexts and Fuzzing
The OWASP Zed Attack Proxy
OWASP 2012 AppSec Dublin ZAP Intro
Security Code Review 101
What's up with Drupal 7?
Virtual Security Lab Setup - OWASP Broken Web Apps, Webgoat, & ZAP
Caching 101 - WordCamp OC
Defcon 22-wesley-mc grew-instrumenting-point-of-sale-malware
OWASP Zed Attack Proxy Demonstration - OWASP Bangalore Nov 22 2014
Ad

Similar to HTML5 Security (20)

PDF
The Mobile Web - HTML5 on mobile devices
KEY
Django In The Real World
PPT
Top Ten Proactive Web Security Controls v5
PPTX
Slides for the #JavaOne Session ID: CON11881
PPTX
Spa Secure Coding Guide
PDF
Security in practice with Java EE 6 and GlassFish
PPTX
Automate or die! Rootedcon 2017
PPTX
Toni de la Fuente - Automate or die! How to survive to an attack in the Cloud...
PPTX
Cm2 secure code_training_1day_data_protection
PDF
DEF CON 27 - ORANGE TSAI and MEH CHANG - infiltrating corporate intranet like...
PDF
Metasploitation part-1 (murtuja)
PPTX
Keith Norbie Flash Storage decision methodology - mnvmug
PDF
Next Generation Memory Forensics
PPTX
Bsidesnova- Pentesting Methodology - Making bits less complicated
PDF
Microservices
PDF
Shiny, Let’s Be Bad Guys: Exploiting and Mitigating the Top 10 Web App Vulner...
PDF
DDD17 - Web Applications Automated Security Testing in a Continuous Delivery...
PPTX
Ten Commandments of Secure Coding - OWASP Top Ten Proactive Controls
PPTX
BSIDES-PR Keynote Hunting for Bad Guys
PDF
Security Testing - Where Automation Fails
The Mobile Web - HTML5 on mobile devices
Django In The Real World
Top Ten Proactive Web Security Controls v5
Slides for the #JavaOne Session ID: CON11881
Spa Secure Coding Guide
Security in practice with Java EE 6 and GlassFish
Automate or die! Rootedcon 2017
Toni de la Fuente - Automate or die! How to survive to an attack in the Cloud...
Cm2 secure code_training_1day_data_protection
DEF CON 27 - ORANGE TSAI and MEH CHANG - infiltrating corporate intranet like...
Metasploitation part-1 (murtuja)
Keith Norbie Flash Storage decision methodology - mnvmug
Next Generation Memory Forensics
Bsidesnova- Pentesting Methodology - Making bits less complicated
Microservices
Shiny, Let’s Be Bad Guys: Exploiting and Mitigating the Top 10 Web App Vulner...
DDD17 - Web Applications Automated Security Testing in a Continuous Delivery...
Ten Commandments of Secure Coding - OWASP Top Ten Proactive Controls
BSIDES-PR Keynote Hunting for Bad Guys
Security Testing - Where Automation Fails
Ad

Recently uploaded (20)

PDF
Agricultural_Statistics_at_a_Glance_2022_0.pdf
PPTX
Big Data Technologies - Introduction.pptx
PDF
Reach Out and Touch Someone: Haptics and Empathic Computing
PPTX
KOM of Painting work and Equipment Insulation REV00 update 25-dec.pptx
PPTX
ACSFv1EN-58255 AWS Academy Cloud Security Foundations.pptx
DOCX
The AUB Centre for AI in Media Proposal.docx
PDF
Machine learning based COVID-19 study performance prediction
PDF
The Rise and Fall of 3GPP – Time for a Sabbatical?
PDF
cuic standard and advanced reporting.pdf
PDF
Advanced methodologies resolving dimensionality complications for autism neur...
PDF
Chapter 3 Spatial Domain Image Processing.pdf
PPTX
20250228 LYD VKU AI Blended-Learning.pptx
PDF
Per capita expenditure prediction using model stacking based on satellite ima...
PDF
Network Security Unit 5.pdf for BCA BBA.
PDF
7 ChatGPT Prompts to Help You Define Your Ideal Customer Profile.pdf
PDF
Approach and Philosophy of On baking technology
PDF
Encapsulation theory and applications.pdf
PPTX
VMware vSphere Foundation How to Sell Presentation-Ver1.4-2-14-2024.pptx
PPTX
sap open course for s4hana steps from ECC to s4
PDF
Blue Purple Modern Animated Computer Science Presentation.pdf.pdf
Agricultural_Statistics_at_a_Glance_2022_0.pdf
Big Data Technologies - Introduction.pptx
Reach Out and Touch Someone: Haptics and Empathic Computing
KOM of Painting work and Equipment Insulation REV00 update 25-dec.pptx
ACSFv1EN-58255 AWS Academy Cloud Security Foundations.pptx
The AUB Centre for AI in Media Proposal.docx
Machine learning based COVID-19 study performance prediction
The Rise and Fall of 3GPP – Time for a Sabbatical?
cuic standard and advanced reporting.pdf
Advanced methodologies resolving dimensionality complications for autism neur...
Chapter 3 Spatial Domain Image Processing.pdf
20250228 LYD VKU AI Blended-Learning.pptx
Per capita expenditure prediction using model stacking based on satellite ima...
Network Security Unit 5.pdf for BCA BBA.
7 ChatGPT Prompts to Help You Define Your Ideal Customer Profile.pdf
Approach and Philosophy of On baking technology
Encapsulation theory and applications.pdf
VMware vSphere Foundation How to Sell Presentation-Ver1.4-2-14-2024.pptx
sap open course for s4hana steps from ECC to s4
Blue Purple Modern Animated Computer Science Presentation.pdf.pdf

HTML5 Security