SlideShare a Scribd company logo
Varun Sharma Application Consulting and Engineering (ACE) Team, Microsoft India
Flaw – 1  Custom Authentication Flaw – 2  Lack of Rule based Authorization Flaw – 3  Black list input validation Flaw – 4  Improper use of Crypto Flaw – 5  App layer DOS attack
Site implements custom forms authentication Buggy code Demo
Principles:- Use well known and time tested, system provided methods for authentication.  Avoid writing custom authentication code.
Authorization implemented by disabling UI Rule based authorization not considered Demo
Principles:- Do not rely on UI for authorization Disabled buttons is not authorization Consider rule based authorization in your design
Only set of bad characters are checked for Becomes vulnerable in special situations Demo
Principles:- Validate for valid allowed values (white list) If white list validation is not possible,  Encode to prevent XSS Parameterize to prevent SQL Injection…
Not knowing what services are provided by what mechanisms For example, what services do Digital Signatures provide? Demo
Product 1 ‘s Site Product 2 ‘s Site Product 3 ‘s Site Central Payment Site Signed XML POST
Principles:- Know what service each mechanism provides Do not implement crypto mechanisms yourself Use system provided methods
Book movie ticket Screen 1 for User 1
Book movie ticket  Screen 2 for User 1 You have 7 minutes left Enter Payment details:- Name:- Credit Card Number:- Address:- … . Click to Book
Book movie ticket  Screen 1 for User 2
Book movie ticket  Screen 1 for User 2 after  7 minutes
Principles:- Use CAPTCHA to avoid automated attacks Design with security in mind
 

More Related Content

PPT
Computer viruses
PDF
Computer hardware software and firmware
PDF
Foca_sbatc
PPT
01_Day_1_Oxburgh
PPT
arma05-era
PDF
Golfphotos
PPT
Media and Public Health Law
PPT
05_Day_1_Lackner
Computer viruses
Computer hardware software and firmware
Foca_sbatc
01_Day_1_Oxburgh
arma05-era
Golfphotos
Media and Public Health Law
05_Day_1_Lackner

Similar to Varun-Subtle_Security_flaws (20)

PDF
"Inter- application vulnerabilities. hunting for bugs in secure applications"...
PDF
Psdot 19 four factor password authentication
PPTX
[OPD 2019] Inter-application vulnerabilities
PPTX
Security testing
PDF
The Immune System of Internet
PPT
Security Testing for Mobile and Web Apps
PDF
The 5 Layers of Security Testing by Alan Koch
PDF
The 5 Layers of Security Testing by Alan Koch
PPTX
Ways to protect From Keyloggers!
PPT
Security Testing
PPTX
Security of LLM APIs by Ankita Gupta, Akto.io
PPTX
Combat Passwords on Post-Its with Multi-Factor Authentication for IBM i
PPT
Andrews whitakrer lecture18-security.ppt
PPT
Two way authentication
PPT
Two way authentication
PDF
a famework for analyzing template security and privacy in biometric authenti...
PPT
Ethical_Hacking_ppt
PPTX
Automation Attacks At Scale
PPTX
ransomware keylogger rootkit.pptx
"Inter- application vulnerabilities. hunting for bugs in secure applications"...
Psdot 19 four factor password authentication
[OPD 2019] Inter-application vulnerabilities
Security testing
The Immune System of Internet
Security Testing for Mobile and Web Apps
The 5 Layers of Security Testing by Alan Koch
The 5 Layers of Security Testing by Alan Koch
Ways to protect From Keyloggers!
Security Testing
Security of LLM APIs by Ankita Gupta, Akto.io
Combat Passwords on Post-Its with Multi-Factor Authentication for IBM i
Andrews whitakrer lecture18-security.ppt
Two way authentication
Two way authentication
a famework for analyzing template security and privacy in biometric authenti...
Ethical_Hacking_ppt
Automation Attacks At Scale
ransomware keylogger rootkit.pptx
Ad

More from guest66dc5f (20)

PPT
Os Timed Original
PPT
Control your entire house with your iPhone
PPT
Awesome car collection
PPT
Freaky car number plates
PDF
David-FPGA
PPT
Sunil-Hacking_firefox
PDF
Rahul-Analysis_of_Adversarial_Code
PPT
Chetan-Mining_Digital_Evidence_in_Microsoft_Windows
PDF
WHITEPAPER-7_years_of_Indian_Cyber_Law
PPT
Rohas-7_years_of_indian_cyber_laws
PDF
David-FPGA
PDF
Shreeraj-Hacking_Web_2
PPT
Dror-Crazy_toaster
PDF
Ajit-Legiment_Techniques
PPT
CostofWarinIraq
PDF
NR-golf-sept07
PDF
NR-golf-sept07
PDF
PDF
longisland_golf_07
PDF
GolfLakeCity_002
Os Timed Original
Control your entire house with your iPhone
Awesome car collection
Freaky car number plates
David-FPGA
Sunil-Hacking_firefox
Rahul-Analysis_of_Adversarial_Code
Chetan-Mining_Digital_Evidence_in_Microsoft_Windows
WHITEPAPER-7_years_of_Indian_Cyber_Law
Rohas-7_years_of_indian_cyber_laws
David-FPGA
Shreeraj-Hacking_Web_2
Dror-Crazy_toaster
Ajit-Legiment_Techniques
CostofWarinIraq
NR-golf-sept07
NR-golf-sept07
longisland_golf_07
GolfLakeCity_002
Ad

Recently uploaded (20)

PDF
A comparative study of natural language inference in Swahili using monolingua...
PDF
Video forgery: An extensive analysis of inter-and intra-frame manipulation al...
PDF
A novel scalable deep ensemble learning framework for big data classification...
PPTX
Programs and apps: productivity, graphics, security and other tools
PDF
Developing a website for English-speaking practice to English as a foreign la...
PPTX
Modernising the Digital Integration Hub
PDF
TrustArc Webinar - Click, Consent, Trust: Winning the Privacy Game
PDF
Transform Your ITIL® 4 & ITSM Strategy with AI in 2025.pdf
PDF
Web App vs Mobile App What Should You Build First.pdf
PDF
From MVP to Full-Scale Product A Startup’s Software Journey.pdf
PDF
Univ-Connecticut-ChatGPT-Presentaion.pdf
PPTX
1. Introduction to Computer Programming.pptx
PDF
Profit Center Accounting in SAP S/4HANA, S4F28 Col11
PPT
What is a Computer? Input Devices /output devices
PPTX
MicrosoftCybserSecurityReferenceArchitecture-April-2025.pptx
PPTX
TLE Review Electricity (Electricity).pptx
PDF
Hybrid model detection and classification of lung cancer
PPTX
observCloud-Native Containerability and monitoring.pptx
PDF
2021 HotChips TSMC Packaging Technologies for Chiplets and 3D_0819 publish_pu...
PDF
ENT215_Completing-a-large-scale-migration-and-modernization-with-AWS.pdf
A comparative study of natural language inference in Swahili using monolingua...
Video forgery: An extensive analysis of inter-and intra-frame manipulation al...
A novel scalable deep ensemble learning framework for big data classification...
Programs and apps: productivity, graphics, security and other tools
Developing a website for English-speaking practice to English as a foreign la...
Modernising the Digital Integration Hub
TrustArc Webinar - Click, Consent, Trust: Winning the Privacy Game
Transform Your ITIL® 4 & ITSM Strategy with AI in 2025.pdf
Web App vs Mobile App What Should You Build First.pdf
From MVP to Full-Scale Product A Startup’s Software Journey.pdf
Univ-Connecticut-ChatGPT-Presentaion.pdf
1. Introduction to Computer Programming.pptx
Profit Center Accounting in SAP S/4HANA, S4F28 Col11
What is a Computer? Input Devices /output devices
MicrosoftCybserSecurityReferenceArchitecture-April-2025.pptx
TLE Review Electricity (Electricity).pptx
Hybrid model detection and classification of lung cancer
observCloud-Native Containerability and monitoring.pptx
2021 HotChips TSMC Packaging Technologies for Chiplets and 3D_0819 publish_pu...
ENT215_Completing-a-large-scale-migration-and-modernization-with-AWS.pdf

Varun-Subtle_Security_flaws

  • 1. Varun Sharma Application Consulting and Engineering (ACE) Team, Microsoft India
  • 2. Flaw – 1 Custom Authentication Flaw – 2 Lack of Rule based Authorization Flaw – 3 Black list input validation Flaw – 4 Improper use of Crypto Flaw – 5 App layer DOS attack
  • 3. Site implements custom forms authentication Buggy code Demo
  • 4. Principles:- Use well known and time tested, system provided methods for authentication. Avoid writing custom authentication code.
  • 5. Authorization implemented by disabling UI Rule based authorization not considered Demo
  • 6. Principles:- Do not rely on UI for authorization Disabled buttons is not authorization Consider rule based authorization in your design
  • 7. Only set of bad characters are checked for Becomes vulnerable in special situations Demo
  • 8. Principles:- Validate for valid allowed values (white list) If white list validation is not possible, Encode to prevent XSS Parameterize to prevent SQL Injection…
  • 9. Not knowing what services are provided by what mechanisms For example, what services do Digital Signatures provide? Demo
  • 10. Product 1 ‘s Site Product 2 ‘s Site Product 3 ‘s Site Central Payment Site Signed XML POST
  • 11. Principles:- Know what service each mechanism provides Do not implement crypto mechanisms yourself Use system provided methods
  • 12. Book movie ticket Screen 1 for User 1
  • 13. Book movie ticket Screen 2 for User 1 You have 7 minutes left Enter Payment details:- Name:- Credit Card Number:- Address:- … . Click to Book
  • 14. Book movie ticket Screen 1 for User 2
  • 15. Book movie ticket Screen 1 for User 2 after 7 minutes
  • 16. Principles:- Use CAPTCHA to avoid automated attacks Design with security in mind
  • 17.  

Editor's Notes

  • #2: I will be presenting five subtle and interesting flaws in applications.