SlideShare a Scribd company logo
Insecure Trends in Web 2.0 Applications
It’s all about Web 2.0 It’s in everywhere This is the new way Second dot com craziness, and it’s not going to burst this time ...
Web 2.0  Trends Usability  Simplicity Sociability Integration Outsourcing
Usability & Simplicity Instead of  KISS  - Keep It Simple & Stupid it should be  KISSS - Keep It Simple, Stupid & Secure
Just  “Stupid” Changing password without requiring the current one Guilty : Twitter Impact: Permanent account hijacking
Just  “Stupid” –  Password pls . “ Give me your hotmail password so I can send spam to your contact list ” Guilty : Bebo, Facebook, Diigo ve tüm diğer sosyal hoppalık içeren Web 2.0 uygulamaları What’s next? Websites will request password of our online bank?  ( Wait !  It’s already done ! – mint.com )
Just  “Stupid” –  remember me “ Remember Me” functionality Guilty : Everyone ! Impact: Increasing the success possibility of Cross-site Scripting and similar session hijacking attacks .
Just  “Stupid” –  send it away Resetting passwords without requiring an extra information other than an e-mail Guilty : Everyone ! Impact: If victim’s e-mail compromised than all of his or her identity will be gone within minutes .
Just  “Stupid” – password1 Limiting password length, not allowing user to choose secure passwords. Guilty: A Lot !  Impact: Forcing user to be insecure !  Really poor interpretation of  KISS .
Sociability Kevin Mitnick  gotta love  Web 2.0  !
Social Attractions  –  Where were you last night? Too much personal information online. Guilty : Linkedin, youtube, twitter, facebook, blog s ,  the crazy guy who shot your photo and posted to flickr , “ transparent ”  company blogs etc . Impact: Easier social engineering attacks ...
Integration  –  Get this API and hack me Overpowered  API s , Facebook  widgets , RSS  madness ! Guilty : Facebook, Feedburner. Impact: Using API functionality to hack the website who provides the API .
Outsourcing Too much external component usage Guilty : Blogosphere, video embedding, flash embedding, widgets, stats,  external javascripts ...  All new websites . Impact: Increased attack surface ,  To able to make one website secure you have to secure 10 websites .
SSL ? What happened to SSL? Guilty : Gmail ( after 4 years they fixed ), and lots, lots of other Web 2.0 applications . Impact: Isn’t it obvious?
Did you say  “Best Practice”? Agile  Programming , Shorter  Dead-line s , Fast development means more money , Lack of defined best practices about new technologies
Security doesn’t sell MS Vista  proved it! Unfortunately, Web 2.0  is not an exception
Web 2.0  Followers Every single day new Web 2.0 startups are launching all over the world and they do follow all these bad practices, because big guys are doing them.
Security ... First make it  secure ,  then make it  Web 2.0
Questions and Discussion @fmavituna finished his talk, and waiting some question from the audience.  (*) *not so obscure twitter joke
Thanks ...

More Related Content

KEY
Privacy security
PDF
Passwords and Botnets and Zombies (oh my!)
PPTX
Border crossing mobile social media life-saving security tips
PPT
Joe CFO for CiscoLive Berlin 2016 Email and Web Security Presentation
PPTX
What The Fuck Is Web Squared - Web²
PPTX
Digital safety
PPTX
Lkw Security Part 1_MVPs Azra & Sanjay
PPT
Internet for everyone
Privacy security
Passwords and Botnets and Zombies (oh my!)
Border crossing mobile social media life-saving security tips
Joe CFO for CiscoLive Berlin 2016 Email and Web Security Presentation
What The Fuck Is Web Squared - Web²
Digital safety
Lkw Security Part 1_MVPs Azra & Sanjay
Internet for everyone

What's hot (20)

PPT
When web 2.0 sneezes, everyone gets sick
PPT
Computer And Internet Security
PPT
Security for javascript
PPTX
Web security
PDF
Hacker halted2
PPT
Douglas Crockford - Ajax Security
DOCX
Punto 16
DOCX
Punto 16
PDF
Session hijacking by rahul tyagi
PPTX
Where To Start When Your Environment is Fucked
PPT
2011 Social Media Malware Trends
PDF
Extreme Hacking: Encrypted Networks SWAT style - Wayne Burke
PPTX
Navigating Online Threats - Website Security for Everyday Website Owners
PPTX
Year 7 - Week 5 esafety
PPTX
The Enemy On The Web
PDF
Passwords, Attacks, and Security oh my!
PPTX
Content Management System Security
PPTX
Mastering windows 10 (English version)
PDF
BugBounty Roadmap with Mohammed Adam
PPT
Sept 2014 cloud security presentation
When web 2.0 sneezes, everyone gets sick
Computer And Internet Security
Security for javascript
Web security
Hacker halted2
Douglas Crockford - Ajax Security
Punto 16
Punto 16
Session hijacking by rahul tyagi
Where To Start When Your Environment is Fucked
2011 Social Media Malware Trends
Extreme Hacking: Encrypted Networks SWAT style - Wayne Burke
Navigating Online Threats - Website Security for Everyday Website Owners
Year 7 - Week 5 esafety
The Enemy On The Web
Passwords, Attacks, and Security oh my!
Content Management System Security
Mastering windows 10 (English version)
BugBounty Roadmap with Mohammed Adam
Sept 2014 cloud security presentation
Ad

Viewers also liked (9)

PDF
One Click Ownage
PPT
Web 2.0 Guvenlik Trendleri
PDF
One Click Ownage
PPT
Guvenli Flash Uygulamalari
PPTX
5 Dakkada Beşiktaş
PPS
Flash Security
PPTX
Beşiktaş çarşi grubu
PDF
One Click Ownage Ferruh Mavituna (3)
PPTX
Beşi̇ktaş sunumu
One Click Ownage
Web 2.0 Guvenlik Trendleri
One Click Ownage
Guvenli Flash Uygulamalari
5 Dakkada Beşiktaş
Flash Security
Beşiktaş çarşi grubu
One Click Ownage Ferruh Mavituna (3)
Beşi̇ktaş sunumu
Ad

Similar to Insecure Trends in Web 2.0 (20)

PPTX
Social networks security risks
PDF
Protecting Against Web Threats
PPTX
Web 2.0 security woes
PPTX
Corp Web Risks and Concerns
PDF
Mitigating Web 2.0 Threats
PDF
Managing and Securing Web 2.0
PPTX
You are the weakest link
PPTX
Web 2.0 Presentation
PDF
IBWAS 2010: Web Security From an Auditor's Standpoint
PDF
Luis Grangeia IBWAS
PDF
The Thing That Should Not Be
PDF
Addressing Security Challenges of Mobility and Web 2.0 2009
PDF
OWASP Top Ten in Practice
PDF
Web security 2012
PDF
Web 20 Security Defending Ajax Ria And Soa Shreeraj Shah
PDF
What every product manager needs to know about security
PPTX
SecTor '09 - When Web 2.0 Attacks!
PDF
IDC Report : Web Security
PDF
Things that go bump on the web - Web Application Security
PDF
What every product manager needs to know about security
Social networks security risks
Protecting Against Web Threats
Web 2.0 security woes
Corp Web Risks and Concerns
Mitigating Web 2.0 Threats
Managing and Securing Web 2.0
You are the weakest link
Web 2.0 Presentation
IBWAS 2010: Web Security From an Auditor's Standpoint
Luis Grangeia IBWAS
The Thing That Should Not Be
Addressing Security Challenges of Mobility and Web 2.0 2009
OWASP Top Ten in Practice
Web security 2012
Web 20 Security Defending Ajax Ria And Soa Shreeraj Shah
What every product manager needs to know about security
SecTor '09 - When Web 2.0 Attacks!
IDC Report : Web Security
Things that go bump on the web - Web Application Security
What every product manager needs to know about security

Recently uploaded (20)

PDF
Per capita expenditure prediction using model stacking based on satellite ima...
PDF
Build a system with the filesystem maintained by OSTree @ COSCUP 2025
PDF
Getting Started with Data Integration: FME Form 101
PDF
Building Integrated photovoltaic BIPV_UPV.pdf
PPTX
Tartificialntelligence_presentation.pptx
PDF
Profit Center Accounting in SAP S/4HANA, S4F28 Col11
PDF
Approach and Philosophy of On baking technology
PPT
Teaching material agriculture food technology
PDF
Encapsulation_ Review paper, used for researhc scholars
PPTX
Programs and apps: productivity, graphics, security and other tools
PPT
“AI and Expert System Decision Support & Business Intelligence Systems”
PDF
Machine learning based COVID-19 study performance prediction
PDF
Accuracy of neural networks in brain wave diagnosis of schizophrenia
PPTX
Big Data Technologies - Introduction.pptx
PDF
Blue Purple Modern Animated Computer Science Presentation.pdf.pdf
PPTX
Machine Learning_overview_presentation.pptx
PDF
Assigned Numbers - 2025 - Bluetooth® Document
PDF
Agricultural_Statistics_at_a_Glance_2022_0.pdf
PPTX
20250228 LYD VKU AI Blended-Learning.pptx
PDF
TokAI - TikTok AI Agent : The First AI Application That Analyzes 10,000+ Vira...
Per capita expenditure prediction using model stacking based on satellite ima...
Build a system with the filesystem maintained by OSTree @ COSCUP 2025
Getting Started with Data Integration: FME Form 101
Building Integrated photovoltaic BIPV_UPV.pdf
Tartificialntelligence_presentation.pptx
Profit Center Accounting in SAP S/4HANA, S4F28 Col11
Approach and Philosophy of On baking technology
Teaching material agriculture food technology
Encapsulation_ Review paper, used for researhc scholars
Programs and apps: productivity, graphics, security and other tools
“AI and Expert System Decision Support & Business Intelligence Systems”
Machine learning based COVID-19 study performance prediction
Accuracy of neural networks in brain wave diagnosis of schizophrenia
Big Data Technologies - Introduction.pptx
Blue Purple Modern Animated Computer Science Presentation.pdf.pdf
Machine Learning_overview_presentation.pptx
Assigned Numbers - 2025 - Bluetooth® Document
Agricultural_Statistics_at_a_Glance_2022_0.pdf
20250228 LYD VKU AI Blended-Learning.pptx
TokAI - TikTok AI Agent : The First AI Application That Analyzes 10,000+ Vira...

Insecure Trends in Web 2.0

  • 1. Insecure Trends in Web 2.0 Applications
  • 2. It’s all about Web 2.0 It’s in everywhere This is the new way Second dot com craziness, and it’s not going to burst this time ...
  • 3. Web 2.0 Trends Usability Simplicity Sociability Integration Outsourcing
  • 4. Usability & Simplicity Instead of KISS - Keep It Simple & Stupid it should be KISSS - Keep It Simple, Stupid & Secure
  • 5. Just “Stupid” Changing password without requiring the current one Guilty : Twitter Impact: Permanent account hijacking
  • 6. Just “Stupid” – Password pls . “ Give me your hotmail password so I can send spam to your contact list ” Guilty : Bebo, Facebook, Diigo ve tüm diğer sosyal hoppalık içeren Web 2.0 uygulamaları What’s next? Websites will request password of our online bank? ( Wait ! It’s already done ! – mint.com )
  • 7. Just “Stupid” – remember me “ Remember Me” functionality Guilty : Everyone ! Impact: Increasing the success possibility of Cross-site Scripting and similar session hijacking attacks .
  • 8. Just “Stupid” – send it away Resetting passwords without requiring an extra information other than an e-mail Guilty : Everyone ! Impact: If victim’s e-mail compromised than all of his or her identity will be gone within minutes .
  • 9. Just “Stupid” – password1 Limiting password length, not allowing user to choose secure passwords. Guilty: A Lot ! Impact: Forcing user to be insecure ! Really poor interpretation of KISS .
  • 10. Sociability Kevin Mitnick gotta love Web 2.0 !
  • 11. Social Attractions – Where were you last night? Too much personal information online. Guilty : Linkedin, youtube, twitter, facebook, blog s , the crazy guy who shot your photo and posted to flickr , “ transparent ” company blogs etc . Impact: Easier social engineering attacks ...
  • 12. Integration – Get this API and hack me Overpowered API s , Facebook widgets , RSS madness ! Guilty : Facebook, Feedburner. Impact: Using API functionality to hack the website who provides the API .
  • 13. Outsourcing Too much external component usage Guilty : Blogosphere, video embedding, flash embedding, widgets, stats, external javascripts ... All new websites . Impact: Increased attack surface , To able to make one website secure you have to secure 10 websites .
  • 14. SSL ? What happened to SSL? Guilty : Gmail ( after 4 years they fixed ), and lots, lots of other Web 2.0 applications . Impact: Isn’t it obvious?
  • 15. Did you say “Best Practice”? Agile Programming , Shorter Dead-line s , Fast development means more money , Lack of defined best practices about new technologies
  • 16. Security doesn’t sell MS Vista proved it! Unfortunately, Web 2.0 is not an exception
  • 17. Web 2.0 Followers Every single day new Web 2.0 startups are launching all over the world and they do follow all these bad practices, because big guys are doing them.
  • 18. Security ... First make it secure , then make it Web 2.0
  • 19. Questions and Discussion @fmavituna finished his talk, and waiting some question from the audience. (*) *not so obscure twitter joke