SlideShare a Scribd company logo
Practice of AppSec .NET
Mikhail Shcherbakov
SPB .NET Meetup #2
Product Manager at Cezurity
About me
 Product Manager at Cezurity
 One of the core developers of the source code analyzer
PT Application Inspector
 Former Team Lead at Acronis, Luxoft, Boeing
Security Development
Habrahabr Example #1
Habrahabr Example #1
Improper Input / Output Handling
Implementation
Improper Input / Output Handling
 SQL Injection
 OS Commanding
 Cross-Site Scripting (XSS)
 XML Injection
 XPath Injection
 XQuery Injection
 LDAP Injection
 Mail Command Injection
 Null Injection
 Unrestricted File Upload
 Unrestricted File Download
 Path Traversal
 HTTP Response Splitting
 Content Spoofing
 Buffer Overflow
Cross-Site Scripting (XSS)
 Reflected
 Stored
 DOM-based
Reflected XSS
Reflected XSS
Reflected XSS
POST http://localhost/Example
__VIEWSTATE=1WhGrdaz6wBJ67aoKvJd1oc1Nw…&
__VIEWSTATEGENERATOR=E5E1B94B&
__EVENTVALIDATION=uixzE1cGQE%2BFAGQTbTA…&
TextBox1=<&
TextBox2=img src=# onerror=alert('XSS')//&
Button1=Save
Reflected XSS
Reflected XSS
No Vulnerability
Reflected XSS
Reflected XSS
Reflected XSS
GET
http://localhost/Example?count=1&base64_item0=PGltZyBzcm
M9IyBvbmVycm9yPWFsZXJ0KCdYU1MnKS8v
Reflected XSS
Reflected XSS
Reflected XSS
Reflected XSS
GET http://localhost/Example?first=--%3E%3C&
second=img%20src=%27n%27%20onerror=alert%28%27XSS%27%2
9//
Reflected XSS
Reflected XSS
Reflected XSS
GET
http://localhost/Example?page=%22%20onerror=alert%28%27XSS%
27%29;//
IIS Request Validation
Stored XSS
Stored XSS
Show me the code!
DOM-based XSS
Show me the code!
Insufficient Control Flow
Management
Design / Implementation
Insufficient Control Flow Management
 Cross-Site Request Forgery (CSRF)
 Mass Assignment
 Business Logic Errors
 Abuse of Functionality
Cross-Site Request Forgery (CSRF)
CSRF
Show me the code!
CSRF
CSRF Defense
 ASP.NET MVC
 <%= Html.AntiForgeryToken() %>
 <input name="__RequestVerificationToken" type="hidden“ …
 ASP.NET Web Forms
 __VIEWSTATE
 __EVENTVALIDATION
CSRF Defense
 Same Origin Policy
 An origin is defined by the scheme, host and port
 Documents retrieved from distinct origins are isolated
Habrahabr Example #2
Habrahabr Example #2
Habrahabr Example #2
SQL Injection
GET http://localhost/Example?email=‘--
Habrahabr Example #2
Habrahabr Example #2
Habrahabr Example #2
Business Logic Error
GET http://localhost/Example?field=password&min=a&max=b
GET http://localhost/Example?field=password&min=aD&max=aE
Business Logic Error
Business Logic Error
Business Logic Error
Business Logic Error
Show me the code!
Broken Authentication and
Session Management
Design / Implementation / Deployment
Session Fixation
Show me the code!
Session Fixation Defense
 Set invalid ASP .NET session cookie when the user log in, so the
user receives a new cookie
Session Fixation Defense
 Set invalid ASP .NET session cookie when the user log in, so the
user receives a new cookie
 Issue: the order to send cookies from the browser
 Store the username in the session
 Generate Session ID on the logged user
 NWebsec.SessionSecurity
Summary
 OWASP Top Ten Project (2010/2013) http://bit.ly/1OffewO
 Vladimir Kochetkov Blog and Workshop http://bit.ly/1DecXWI
 Troy Hunt Blog www.troyhunt.com
 OWASP Developer Guide http://bit.ly/1JcQLoh
 CWE/SANS Top 25 Most Dangerous Software Errors (2011)
http://bit.ly/1bjDTOH
 OWASP Classification http://bit.ly/1GlKmGz http://bit.ly/1DE3852
 WASC Classification http://bit.ly/1d3EXYd
Thank you for your attention!
Mikhail Shcherbakov
ms@cezurity.com
linkedin.com/in/mikhailshcherbakov
github.com/yuske
@yu5k3
Product Manager at Cezurity

More Related Content

PPT
Implementing application security using the .net framework
PPTX
Security Model in .NET Framework
PDF
Browser Exploit Framework
PPTX
.NET Security Topics
PPTX
[OWASP Poland Day] Application security - daily questions & answers
PPTX
Web Hacking Intro
PPTX
MS Innovation Day: A Lap Around Web Application Vulnerabilities by MVP Walter...
PPTX
Sandboxing in .NET CLR
Implementing application security using the .net framework
Security Model in .NET Framework
Browser Exploit Framework
.NET Security Topics
[OWASP Poland Day] Application security - daily questions & answers
Web Hacking Intro
MS Innovation Day: A Lap Around Web Application Vulnerabilities by MVP Walter...
Sandboxing in .NET CLR

What's hot (20)

PPTX
[OWASP Poland Day] Saving private token
PDF
[Wroclaw #6] Introduction to desktop browser add-ons
PDF
[OWASP Poland Day] Web App Security Architectures
PDF
Spring Security 5.5 From Taxi to Takeoff
PDF
Injecting Security into Web apps at Runtime Whitepaper
PPTX
ASP.NET security vulnerabilities
PDF
[OWASP Poland Day] Security knowledge framework
PDF
Injecting Security into vulnerable web apps at Runtime
PPTX
Hacking Samsung's Tizen: The OS of Everything - Hack In the Box 2015
PDF
Abusing, Exploiting and Pwning with Firefox Add-ons
PDF
A Scalable Client Authentication & Authorization Service for Container-Based ...
PDF
[OWASP Poland Day] A study of Electron security
PPTX
[OWASP Poland Day] Application frameworks' vulnerabilities
PDF
Spring Security
PPTX
Abusing Exploiting and Pwning with Firefox Addons
PDF
Javacro 2014 Spring Security 3 Speech
PPT
Spring Security Introduction
PPTX
Top Security Threats for .NET Developers
[OWASP Poland Day] Saving private token
[Wroclaw #6] Introduction to desktop browser add-ons
[OWASP Poland Day] Web App Security Architectures
Spring Security 5.5 From Taxi to Takeoff
Injecting Security into Web apps at Runtime Whitepaper
ASP.NET security vulnerabilities
[OWASP Poland Day] Security knowledge framework
Injecting Security into vulnerable web apps at Runtime
Hacking Samsung's Tizen: The OS of Everything - Hack In the Box 2015
Abusing, Exploiting and Pwning with Firefox Add-ons
A Scalable Client Authentication & Authorization Service for Container-Based ...
[OWASP Poland Day] A study of Electron security
[OWASP Poland Day] Application frameworks' vulnerabilities
Spring Security
Abusing Exploiting and Pwning with Firefox Addons
Javacro 2014 Spring Security 3 Speech
Spring Security Introduction
Top Security Threats for .NET Developers
Ad

Similar to Practice of AppSec .NET (20)

PPTX
OWASP_Top_Ten_Proactive_Controls_v2.pptx
PPTX
Top Ten Java Defense for Web Applications v2
PPT
Top Ten Web Application Defenses v12
PDF
Whatever it takes - Fixing SQLIA and XSS in the process
PPTX
OWASP San Diego Training Presentation
PDF
Evolution Of Web Security
PPTX
OWASP CSRF Protector_Minhaz
PPTX
OWASP CSRF Protector
PPTX
SSRF For Bug Bounties
PDF
Web backdoors attacks, evasion, detection
PPTX
Hacking Oracle From Web Apps 1 9
PDF
wapt lab 6 - converted (2).pdfwaptLab09 tis lab is used for college lab exam
ODP
PHP from the point of view of a webhoster
PDF
ruxc0n 2012
PDF
Web security for developers
PDF
Cross Site Attacks
PPTX
Web Exploitation Security
PDF
Php vulnerability presentation
PDF
Frontend Security: Applying Contextual Escaping Automatically, or How to Stop...
OWASP_Top_Ten_Proactive_Controls_v2.pptx
Top Ten Java Defense for Web Applications v2
Top Ten Web Application Defenses v12
Whatever it takes - Fixing SQLIA and XSS in the process
OWASP San Diego Training Presentation
Evolution Of Web Security
OWASP CSRF Protector_Minhaz
OWASP CSRF Protector
SSRF For Bug Bounties
Web backdoors attacks, evasion, detection
Hacking Oracle From Web Apps 1 9
wapt lab 6 - converted (2).pdfwaptLab09 tis lab is used for college lab exam
PHP from the point of view of a webhoster
ruxc0n 2012
Web security for developers
Cross Site Attacks
Web Exploitation Security
Php vulnerability presentation
Frontend Security: Applying Contextual Escaping Automatically, or How to Stop...
Ad

More from Mikhail Shcherbakov (20)

PPTX
Delegates and events in C#
PPTX
Mythbusters - Web Application Security
PPTX
Михаил Щербаков "WinDbg сотоварищи"
PPTX
Apache Ignite.NET в действии
PPTX
Архитектура Apache Ignite .NET
PPTX
Знакомство с In-Memory Data Grid
PDF
сценарии использования статического анализатора
PPTX
WCF. Легко или проблемно
PDF
Поиск ошибок в программах на языке C#
PPTX
Когда в C# не хватает C++ . Часть 3.
PDF
Project Rider
PPTX
WinDbg в руках .NET разработчика
PPTX
Structured logging
PPTX
RESTful API: Best practices, versioning, design documentation
PPTX
Простой и кросс-платформенный WEB-сервер на .NET
PPTX
Использование Visual Studio Tools for Apache Cordova в реальных проектах
PPTX
Sandboxing in .NET CLR
PPTX
Когда в C# не хватает C++ . Часть 2.
PDF
Распространённые ошибки оценки производительности .NET-приложений
PPTX
Когда в C# не хватает C++
Delegates and events in C#
Mythbusters - Web Application Security
Михаил Щербаков "WinDbg сотоварищи"
Apache Ignite.NET в действии
Архитектура Apache Ignite .NET
Знакомство с In-Memory Data Grid
сценарии использования статического анализатора
WCF. Легко или проблемно
Поиск ошибок в программах на языке C#
Когда в C# не хватает C++ . Часть 3.
Project Rider
WinDbg в руках .NET разработчика
Structured logging
RESTful API: Best practices, versioning, design documentation
Простой и кросс-платформенный WEB-сервер на .NET
Использование Visual Studio Tools for Apache Cordova в реальных проектах
Sandboxing in .NET CLR
Когда в C# не хватает C++ . Часть 2.
Распространённые ошибки оценки производительности .NET-приложений
Когда в C# не хватает C++

Recently uploaded (20)

PDF
wealthsignaloriginal-com-DS-text-... (1).pdf
PPTX
VVF-Customer-Presentation2025-Ver1.9.pptx
PDF
How to Choose the Right IT Partner for Your Business in Malaysia
PDF
Wondershare Filmora 15 Crack With Activation Key [2025
PDF
T3DD25 TYPO3 Content Blocks - Deep Dive by André Kraus
PPTX
Agentic AI : A Practical Guide. Undersating, Implementing and Scaling Autono...
PDF
Design an Analysis of Algorithms I-SECS-1021-03
PDF
Digital Systems & Binary Numbers (comprehensive )
PDF
Upgrade and Innovation Strategies for SAP ERP Customers
PPTX
L1 - Introduction to python Backend.pptx
PPTX
Computer Software and OS of computer science of grade 11.pptx
PDF
medical staffing services at VALiNTRY
PPT
Introduction Database Management System for Course Database
PDF
Digital Strategies for Manufacturing Companies
PDF
PTS Company Brochure 2025 (1).pdf.......
PPTX
Oracle E-Business Suite: A Comprehensive Guide for Modern Enterprises
PDF
Why TechBuilder is the Future of Pickup and Delivery App Development (1).pdf
PDF
Design an Analysis of Algorithms II-SECS-1021-03
PPTX
Introduction to Artificial Intelligence
PDF
Odoo Companies in India – Driving Business Transformation.pdf
wealthsignaloriginal-com-DS-text-... (1).pdf
VVF-Customer-Presentation2025-Ver1.9.pptx
How to Choose the Right IT Partner for Your Business in Malaysia
Wondershare Filmora 15 Crack With Activation Key [2025
T3DD25 TYPO3 Content Blocks - Deep Dive by André Kraus
Agentic AI : A Practical Guide. Undersating, Implementing and Scaling Autono...
Design an Analysis of Algorithms I-SECS-1021-03
Digital Systems & Binary Numbers (comprehensive )
Upgrade and Innovation Strategies for SAP ERP Customers
L1 - Introduction to python Backend.pptx
Computer Software and OS of computer science of grade 11.pptx
medical staffing services at VALiNTRY
Introduction Database Management System for Course Database
Digital Strategies for Manufacturing Companies
PTS Company Brochure 2025 (1).pdf.......
Oracle E-Business Suite: A Comprehensive Guide for Modern Enterprises
Why TechBuilder is the Future of Pickup and Delivery App Development (1).pdf
Design an Analysis of Algorithms II-SECS-1021-03
Introduction to Artificial Intelligence
Odoo Companies in India – Driving Business Transformation.pdf

Practice of AppSec .NET