SlideShare a Scribd company logo
Viktor Turskyi
Information Security Practice
2018
Viktor Turskyi
● CEO at WebbyLab
● 15 years in software development
Why I talk about security?
1. I switched to software development from IT security
2. I work with software engineers for many years and this topic is highly
undercovered
3. I work with different businesses for many years and risks are highly
underestimated
4. Governmental regulations (GDPR, PCI DSS etc)
5. It makes you a better software engineer
6. It is FUN!!
What I will talk about?
1. Not about OWASP (Open Web Application Security Project) Top 10 report
2. Not about security tools (metasploit, sqlmap etc)
3. Not about content security policy.
4. Only practical cases that we’ve met in real life.
5. JavaScript based demos
6. Real cases simulated in environment
a. React frontend
b. NodeJs backend
c. Set of exploits
Overview of the existing application
Case 1: Email password recovery
Case 1: Takeaways
Mongo ID predictable
UUID v1 predictable (unique, but not random)
UUID v4 predictable
Always think about predictability of URLs (keys, etc)
Case 2: Password recovery by SMS
Case 2: Takeaways
Think about bruteforce
Reset actions:
SMS codes
CAPTCHA Codes
Case 3: File paths
Use npm audit
JWT vulnerability example
Check your dependencies
Security is a question of trust
apt update
Case 3: Takeaways
Case 4: Photos upload
Case 4: Takeaways
Thinks about edge cases
Just know how system works
Case 5: Tweet creation
Case 5: Takeaways
Do not use regex for extracting script tags
Use sanitizer with tags and attrs white-listing
CORS will allow you do cross domain request
XSS worms issues
Case 6: HTML page parsing issue
Case 6: Takeaways
Know HTML page parsing
Think about data usage context
Case 7: Network risks
Case 7: Takeaways
Think about communication
Get the whole picture
Use HTTPS everywhere
Case 8..14:
Case 8: Clickjacking
Case 9: Tabnapping
Case 10: CSRF (cookie, basic auth)
Case 11: SQL Injection (pass through ORM)
Case 12: ORM Injection
Case 13: Unsafe HTTPS Redirect
Case 14: Target=_blank (without rel="noopener noreferrer")
What I like information security?
Information security is about understanding how things work
It makes you a better developer
You can create more complex projects
It is fun
Thank you!
Viktor Turskyi
viktor@webbylab.com
@koorchik @koorchik
https://webbylab.com

More Related Content

ODP
An Introduction to Hashing and Salting
PDF
6 ways to hack your JavaScript application by Viktor Turskyi
PDF
JS Fest 2019. Виктор Турский. 6 способов взломать твое JavaScript приложение
PDF
Smart Bombs: Mobile Vulnerability and Exploitation
PDF
Formative Task 3: Social Engineering Attacks
PDF
THE METHOD OF DETECTING ONLINE PASSWORD ATTACKS BASED ON HIGH-LEVEL PROTOCOL ...
PPTX
Abusing "Accepted Risk" With 3rd Party C2 - HackMiamiCon5
PDF
Defense in Depth: Lessons Learned Securing 200,000 Sites
An Introduction to Hashing and Salting
6 ways to hack your JavaScript application by Viktor Turskyi
JS Fest 2019. Виктор Турский. 6 способов взломать твое JavaScript приложение
Smart Bombs: Mobile Vulnerability and Exploitation
Formative Task 3: Social Engineering Attacks
THE METHOD OF DETECTING ONLINE PASSWORD ATTACKS BASED ON HIGH-LEVEL PROTOCOL ...
Abusing "Accepted Risk" With 3rd Party C2 - HackMiamiCon5
Defense in Depth: Lessons Learned Securing 200,000 Sites

Similar to KharkivJS 2018 Information Security Practice (20)

PPTX
Development lifecycle and principals of Security
PDF
Biggest info security mistakes security innovation inc.
PPTX
BsidesMCR_2016-what-can-infosec-learn-from-devops
PDF
Hacking - CEH Cheat Sheet Exercises.pdf
PPTX
Security engineering 101 when good design & security work together
PPTX
Cross-Site Scripting (XSS)
PDF
Source Code Security the Symantec Way
PDF
Web Security: What's wrong, and how the bad guys can break your website
PDF
PyConline AU 2021 - Things might go wrong in a data-intensive application
PPT
Web Application Testing for Today’s Biggest and Emerging Threats
PDF
TXT
New text document
TXT
New text document
PPTX
Java application security the hard way - a workshop for the serious developer
PDF
Elementary-Information-Security-Practices
PPTX
Threat Hunting with Splunk
PDF
Big Data Analytics to Enhance Security คุณอนพัทย์ พิพัฒน์กิติบดี Technical Ma...
PPTX
Threat Hunting with Splunk
PPTX
Threat Hunting with Splunk
DOCX
Why security is the kidney not the tail of the dog v3
Development lifecycle and principals of Security
Biggest info security mistakes security innovation inc.
BsidesMCR_2016-what-can-infosec-learn-from-devops
Hacking - CEH Cheat Sheet Exercises.pdf
Security engineering 101 when good design & security work together
Cross-Site Scripting (XSS)
Source Code Security the Symantec Way
Web Security: What's wrong, and how the bad guys can break your website
PyConline AU 2021 - Things might go wrong in a data-intensive application
Web Application Testing for Today’s Biggest and Emerging Threats
New text document
New text document
Java application security the hard way - a workshop for the serious developer
Elementary-Information-Security-Practices
Threat Hunting with Splunk
Big Data Analytics to Enhance Security คุณอนพัทย์ พิพัฒน์กิติบดี Technical Ma...
Threat Hunting with Splunk
Threat Hunting with Splunk
Why security is the kidney not the tail of the dog v3
Ad

More from Viktor Turskyi (19)

PDF
How to create a high performance excel engine in java script
PDF
Livr 2.0 in JS - Vinnytsia.JS 2019
PDF
The working architecture of node js applications open tech week javascript ...
PDF
Yet another json rpc library (mole rpc)
PDF
"Offline mode for a mobile application, redux on server and a little bit abou...
PDF
The working architecture of NodeJs applications
PDF
Language Independent Validation Rules 2.0, Viktor Turskyi, talk at OSDN 2017
PDF
How to extract information from text with Semgrex
PDF
How to translate your Single Page Application - Webcamp 2016 (en)
PDF
JS Lab 2016 - Frontend trends 2015 - 2016
PDF
It's Quiz - Cloud testing platform
PDF
Kharkiv JS 2015 - Creating isomorphic applications in React (en)
PDF
Kharkiv JS 2015: Боль и радость создания изоморфных приложений на ReactJS (RU)
PDF
Language Independent Validation Rules (LIVR)
PDF
Hadoop webcamp 2015
PDF
Mapreduce in JavaScript
PDF
Excel in Javascript
PDF
Testing orm based code
ODP
Maybe you do not know that ...
How to create a high performance excel engine in java script
Livr 2.0 in JS - Vinnytsia.JS 2019
The working architecture of node js applications open tech week javascript ...
Yet another json rpc library (mole rpc)
"Offline mode for a mobile application, redux on server and a little bit abou...
The working architecture of NodeJs applications
Language Independent Validation Rules 2.0, Viktor Turskyi, talk at OSDN 2017
How to extract information from text with Semgrex
How to translate your Single Page Application - Webcamp 2016 (en)
JS Lab 2016 - Frontend trends 2015 - 2016
It's Quiz - Cloud testing platform
Kharkiv JS 2015 - Creating isomorphic applications in React (en)
Kharkiv JS 2015: Боль и радость создания изоморфных приложений на ReactJS (RU)
Language Independent Validation Rules (LIVR)
Hadoop webcamp 2015
Mapreduce in JavaScript
Excel in Javascript
Testing orm based code
Maybe you do not know that ...
Ad

Recently uploaded (20)

PPTX
MCN 401 KTU-2019-PPE KITS-MODULE 2.pptx
PDF
Mitigating Risks through Effective Management for Enhancing Organizational Pe...
PPTX
Sustainable Sites - Green Building Construction
PDF
R24 SURVEYING LAB MANUAL for civil enggi
PPTX
Internet of Things (IOT) - A guide to understanding
PDF
Mohammad Mahdi Farshadian CV - Prospective PhD Student 2026
PDF
Evaluating the Democratization of the Turkish Armed Forces from a Normative P...
PPT
Mechanical Engineering MATERIALS Selection
PDF
PRIZ Academy - 9 Windows Thinking Where to Invest Today to Win Tomorrow.pdf
PDF
Digital Logic Computer Design lecture notes
PPTX
Welding lecture in detail for understanding
PPTX
Foundation to blockchain - A guide to Blockchain Tech
DOCX
ASol_English-Language-Literature-Set-1-27-02-2023-converted.docx
PPTX
FINAL REVIEW FOR COPD DIANOSIS FOR PULMONARY DISEASE.pptx
PDF
SM_6th-Sem__Cse_Internet-of-Things.pdf IOT
PPTX
UNIT 4 Total Quality Management .pptx
PPTX
UNIT-1 - COAL BASED THERMAL POWER PLANTS
PPTX
KTU 2019 -S7-MCN 401 MODULE 2-VINAY.pptx
PPTX
web development for engineering and engineering
PPTX
bas. eng. economics group 4 presentation 1.pptx
MCN 401 KTU-2019-PPE KITS-MODULE 2.pptx
Mitigating Risks through Effective Management for Enhancing Organizational Pe...
Sustainable Sites - Green Building Construction
R24 SURVEYING LAB MANUAL for civil enggi
Internet of Things (IOT) - A guide to understanding
Mohammad Mahdi Farshadian CV - Prospective PhD Student 2026
Evaluating the Democratization of the Turkish Armed Forces from a Normative P...
Mechanical Engineering MATERIALS Selection
PRIZ Academy - 9 Windows Thinking Where to Invest Today to Win Tomorrow.pdf
Digital Logic Computer Design lecture notes
Welding lecture in detail for understanding
Foundation to blockchain - A guide to Blockchain Tech
ASol_English-Language-Literature-Set-1-27-02-2023-converted.docx
FINAL REVIEW FOR COPD DIANOSIS FOR PULMONARY DISEASE.pptx
SM_6th-Sem__Cse_Internet-of-Things.pdf IOT
UNIT 4 Total Quality Management .pptx
UNIT-1 - COAL BASED THERMAL POWER PLANTS
KTU 2019 -S7-MCN 401 MODULE 2-VINAY.pptx
web development for engineering and engineering
bas. eng. economics group 4 presentation 1.pptx

KharkivJS 2018 Information Security Practice