SlideShare a Scribd company logo
Web Architecture - Mechanism and Threats 
© Copyright 2013 i-secure Co., Ltd. The information contained herein is subject to change without notice. 
Sumedt Jitpukdebodin 
Senior Security Researcher 
CompTIA Security+, LPIC-1 , NCLA, C|EHv6, eCPPT, eWPT, IWSS, CPTE
~# whoami 
 Name: Sumedt Jitpukdebodin(สุเมธ จิตภักดีบดินทร์) 
 My blog: http://www.r00tsec.com, http://twitter.com/materaj, https://www.facebook.com/hackandsecbook 
 Jobs 
– I-SECURE Co., Ltd. 
– Research And Develop Engineer, Senior Web Application Security Specialist, Senior Security Researcher 
– Writer 
– English article@ http://packetstormsecurity.com/files/author/9011/ and please google my name. 
– Many Thai article, please google my Thai name. 
– หนังสือ “Hacking & Security Book "Network Security หนังสือฉบับก้าวสู่นักทดสอบและป้องกันการเจาะระบบ” 
 Hobby: Penetration Testing, Hacking, Reading Info Security, Play Games, Traveling around the world, Write 
Article, Teaching and more... 
© Copyright 2013 i-secure Co., Ltd. The information contained herein is subject to change without notice.
Agenda 
© Copyright 2013 i-secure Co., Ltd. The information contained herein is subject to change without notice.
Agenda 
 Web Architecture 
 Web Architecture Attack 
 Security Controls & Mechanism 
© Copyright 2013 i-secure Co., Ltd. The information contained herein is subject to change without notice.
Web Architecture 
© Copyright 2013 i-secure Co., Ltd. The information contained herein is subject to change without notice.
Basic Web Architecture 
 Two Tier Architecture 
– Web browser display content that return from Web Server 
– Web server provide resource for client 
© Copyright 2013 i-secure Co., Ltd. The information contained herein is subject to change without notice.
HTML 
 HTML(Hyper Text Markup Language) 
– Document Layout Language 
– Viewed by using Web Browser. 
© Copyright 2013 i-secure Co., Ltd. The information contained herein is subject to change without notice.
URI 
 URI(Universal Resource Identifier) 
© Copyright 2013 i-secure Co., Ltd. The information contained herein is subject to change without notice.
URI(2) 
 URL(Universal Resource Locator) 
 URN(Universal Resource Name) 
© Copyright 2013 i-secure Co., Ltd. The information contained herein is subject to change without notice.
HTTP 
 HTTP(Hyper Text Transfer Protocol) 
 HTTP is an application layer. 
 HTTP has 2 way communication: HTTP Request and HTTP Response. 
© Copyright 2013 i-secure Co., Ltd. The information contained herein is subject to change without notice.
HTTP(2) 
 Request Message 
– Request Line 
– Request Header 
– An empty line 
– An optional Message Body 
© Copyright 2013 i-secure Co., Ltd. The information contained herein is subject to change without notice.
HTTP(3) 
© Copyright 2013 i-secure Co., Ltd. The information contained herein is subject to change without notice.
Request Method 
– HEAD 
– GET 
– POST 
– PUT 
– DELETE 
– TRACE 
– OPTIONS 
– CONNECT 
© Copyright 2013 i-secure Co., Ltd. The information contained herein is subject to change without notice.
Safe Method 
– HEAD 
– GET 
– OPTIONS 
– TRACE 
– POST 
– PUT 
– DELETE 
– CONNECT 
© Copyright 2013 i-secure Co., Ltd. The information contained herein is subject to change without notice.
Status Code 
 Success: 2xx 
 Redirection: 3xx 
 Client-Side Error: 4xx 
 Server-Side Error: 5xx 
© Copyright 2013 i-secure Co., Ltd. The information contained herein is subject to change without notice.
HTTP Session State 
 HTTP is stateless Protocol 
 Solutions 
– Cookies 
– Sessions 
– Hidden variable 
– URL encode parameter( /index.php?session_id=$session_code) 
© Copyright 2013 i-secure Co., Ltd. The information contained herein is subject to change without notice.
Web Architecture Extension 
 Two tier architecture is not enough 
 Common Gateway Interface(CGI) 
 Standard protocol for interfacing with external application software with 
a web server 
 CGI program are executable programs that run on the web server. 
© Copyright 2013 i-secure Co., Ltd. The information contained herein is subject to change without notice.
Javascript 
 Scripting language designed for dynamic, interactive web application 
 Run on client side. 
 Preprocessing data on the client before submission to a server. 
 Changing content type and styles 
© Copyright 2013 i-secure Co., Ltd. The information contained herein is subject to change without notice.
Three tier web architecture 
© Copyright 2013 i-secure Co., Ltd. The information contained herein is subject to change without notice.
Make HTTP to stateful(2) 
 Cookie 
 A text stored on a client’s computer by a web browser. 
 Sent as an HTTP Header 
 Can used for authenticating, session tracking 
© Copyright 2013 i-secure Co., Ltd. The information contained herein is subject to change without notice.
Server and Client Processing 
 Server-Side Processing 
 PHP 
 ASP 
 ASP.NET 
 Perl 
 J2EE 
 Python, Django 
 Ruby On Rail 
 Client-Side Processing 
 CSS 
 HTML 
 Javascript 
 Adobe Flash 
 Microsoft Silverlight 
© Copyright 2013 i-secure Co., Ltd. The information contained herein is subject to change without notice.
AJAX 
 Asynchronous Javascript and XML(AJAX) 
 Create by Jesse James Garrett, Febuary 18, 2005 
 Ajax Incorporates 
 XHTML, CSS, Document Object Model(DOM), XML and XSLT, 
XMLHttpRequest, Javascript 
© Copyright 2013 i-secure Co., Ltd. The information contained herein is subject to change without notice.
AJAX(2) 
© Copyright 2013 i-secure Co., Ltd. The information contained herein is subject to change without notice.
AJAX(3) 
© Copyright 2013 i-secure Co., Ltd. The information contained herein is subject to change without notice.
JSON 
 Javascript Object Notation(JSON) 
 JSON is lightweight computer data interchange format. 
 JSON is based on a subset of Javascript programming language. 
 Using of XML format. 
© Copyright 2013 i-secure Co., Ltd. The information contained herein is subject to change without notice.
JSON Request && Response 
© Copyright 2013 i-secure Co., Ltd. The information contained herein is subject to change without notice.
JSON(2) 
© Copyright 2013 i-secure Co., Ltd. The information contained herein is subject to change without notice.
XML 
 eXtensible Markup Language 
 Using for information exchange. 
 Two primary building blocks of XML are elements and attributes. 
 Elements are tags and have values. 
 Elements are structured as a tree. 
 Alternatively, elements may have both attributes as well as data. 
 Attributes help you to give more meaning and describe your 
element more efficiently and clearly. 
© Copyright 2013 i-secure Co., Ltd. The information contained herein is subject to change without notice.
XML(2) 
 Tag 
 Element 
 Content 
© Copyright 2013 i-secure Co., Ltd. The information contained herein is subject to change without notice.
XML(3) 
© Copyright 2013 i-secure Co., Ltd. The information contained herein is subject to change without notice.
XML(4) 
© Copyright 2013 i-secure Co., Ltd. The information contained herein is subject to change without notice.
XML vs JSON 
© Copyright 2013 i-secure Co., Ltd. The information contained herein is subject to change without notice.
Web Services 
 Web service is a software system designed to support machine-to-machine 
intraction over a network. 
 Web service are frequently just used to Internet Application 
Programming Interfaces(API). 
 Web service use HTTP for transmitting messages(RPC,SOAP,REST) 
© Copyright 2013 i-secure Co., Ltd. The information contained herein is subject to change without notice.
SOAP vs REST 
 SOAP(Simple Object Access Protocol) 
– Web service based on XML 
 REST(Representational State Transfer) 
– Web service represent in format of application 
© Copyright 2013 i-secure Co., Ltd. The information contained herein is subject to change without notice.
SOAP vs REST 
© Copyright 2013 i-secure Co., Ltd. The information contained herein is subject to change without notice.
SOAP Example 
Reference:: http://www.soapui.org/The-World-Of-API-Testing/soap-vs-rest-challenges. 
html 
© Copyright 2013 i-secure Co., Ltd. The information contained herein is subject to change without notice.
REST Example 
Reference:: http://www.soapui.org/The-World-Of-API-Testing/soap-vs-rest-challenges. 
html 
© Copyright 2013 i-secure Co., Ltd. The information contained herein is subject to change without notice.
Web Architecture Attack 
© Copyright 2013 i-secure Co., Ltd. The information contained herein is subject to change without notice.
Web Architecture 
Reference :: Web Application Hacking/Security 
101(https://docs.google.com/presentation/d/1fw7fO7kmVTcfXuupGTezSM76cdQH3IbYos5xu95L 
yMs/edit#slide=id.p) 
© Copyright 2013 i-secure Co., Ltd. The information contained herein is subject to change without notice.
Web Architecture Attack 
Reference :: Web Application Hacking/Security 
101(https://docs.google.com/presentation/d/1fw7fO7kmVTcfXuupGTezSM76cdQH3IbYos5xu95L 
yMs/edit#slide=id.p) 
© Copyright 2013 i-secure Co., Ltd. The information contained herein is subject to change without notice.
OWASP 2013 
 Injection 
 Broken Authentication and Session Management 
 Cross-Site Scripting(XSS) 
 Insecure Direct Object Rerefence 
 Security Misconfiguration 
 Sensitive Data Exposure 
 Missing Function Level Access Control 
 Cross-Site Request Forgery(CSRF) 
 Using Components with Known Vulnerability 
 Unvalidated Redirects and Forwards 
© Copyright 2013 i-secure Co., Ltd. The information contained herein is subject to change without notice.
Security Controls & Mechanism 
© Copyright 2013 i-secure Co., Ltd. The information contained herein is subject to change without notice.
Security Control 
 Application Layer 
 Network Layer 
© Copyright 2013 i-secure Co., Ltd. The information contained herein is subject to change without notice.
Application Layer 
 Input Validation 
 Sessions Management 
 Authentication Method 
 Strong Policy(Such as password policy) 
 Same-Origin Policy 
© Copyright 2013 i-secure Co., Ltd. The information contained herein is subject to change without notice.
Network Layer 
 Firewall 
 Intrusion Detection System/Intrusion Prevention System(IDS/IPS) 
 Web Application Firewall(WAF) 
 Centralize Log Server 
© Copyright 2013 i-secure Co., Ltd. The information contained herein is subject to change without notice.
Network Layer Diagram 
Reference :: http://www.umv.co.kr/main_eng/sm_enterprise.php 
© Copyright 2013 i-secure Co., Ltd. The information contained herein is subject to change without notice.
Questions 
www.i-secure.co.th 
© Copyright 2013 ACIS i-secure Co., Ltd. The information contained herein is subject to change without notice.

More Related Content

PDF
Fundamentals of Web for Non-Developers
PPT
Busy Architects Guide to Modern Web Architecture in 2014
PPT
Web Fundamentals
PPTX
Architecture Best Practices
PPT
SOA and web services
PDF
Basic web architecture
ODP
RESTful Web Services
PDF
Introduction to Web Technology
Fundamentals of Web for Non-Developers
Busy Architects Guide to Modern Web Architecture in 2014
Web Fundamentals
Architecture Best Practices
SOA and web services
Basic web architecture
RESTful Web Services
Introduction to Web Technology

What's hot (20)

PPTX
Rest & RESTful WebServices
PDF
High performance website
PPT
Introduction To REST
PPT
introduction to web technology
PPT
External Data Access with jQuery
PPTX
Seo and analytics basics
PPTX
PPTX
REST-API introduction for developers
PDF
იოსებ ძმანაშვილი - The Web APIs
PPT
Introduction to the Web API
PDF
The never-ending REST API design debate -- Devoxx France 2016
PPTX
Representational State Transfer
PDF
Restful web services by Sreeni Inturi
PPTX
REST API Design for JAX-RS And Jersey
PPTX
Elegant Rest Design Webinar
PPTX
Web Technology Fundamentals
PPTX
REST and ASP.NET Web API (Milan)
PPT
The RESTful Soa Datagrid with Oracle
PDF
5. HTML5
PDF
Vskills angular js sample material
Rest & RESTful WebServices
High performance website
Introduction To REST
introduction to web technology
External Data Access with jQuery
Seo and analytics basics
REST-API introduction for developers
იოსებ ძმანაშვილი - The Web APIs
Introduction to the Web API
The never-ending REST API design debate -- Devoxx France 2016
Representational State Transfer
Restful web services by Sreeni Inturi
REST API Design for JAX-RS And Jersey
Elegant Rest Design Webinar
Web Technology Fundamentals
REST and ASP.NET Web API (Milan)
The RESTful Soa Datagrid with Oracle
5. HTML5
Vskills angular js sample material
Ad

Similar to Web Architecture - Mechanism and Threats (20)

PDF
Web architecture mechanism and threats
PDF
Java API for WebSocket 1.0: Java EE 7 and GlassFish
PDF
Open APIs - Risks and Rewards (Øredev 2013)
PPTX
Conf2013 bchristensen thebig_t
PPT
Unit 1 b
PPTX
API Roles In Cloud and Mobile Security - Greg Olsen, IT Manager, Integration ...
PDF
Institutionalizing Open Source - Puneet Sachdev - Nasscom Tech Series - June ...
PDF
HTTP_Header_Security.pdf
PDF
E-Business And Technology Essay
PPT
Asynchronous architecture (Node.js & Vert.x)
PDF
Accelerating breakthrough business technologies in atlanta, tag featured spea...
PPT
Top Ten Web Hacking Techniques – 2008
PDF
A little bit about code injection in WebApplication Frameworks (CVE-2018-1466...
PPTX
Oracle REST Data Services
PPTX
Best Practices You Must Apply to Secure Your APIs - Scott Morrison, SVP & Dis...
PDF
Java Web Application Security - Denver JUG 2013
PPT
Defcon9 Presentation2001
PPT
Web Application Security - "In theory and practice"
PPTX
Top Ten Web Hacking Techniques of 2012
PPTX
Ed presents JSF 2.2 at a 2013 Gameduell Tech talk
Web architecture mechanism and threats
Java API for WebSocket 1.0: Java EE 7 and GlassFish
Open APIs - Risks and Rewards (Øredev 2013)
Conf2013 bchristensen thebig_t
Unit 1 b
API Roles In Cloud and Mobile Security - Greg Olsen, IT Manager, Integration ...
Institutionalizing Open Source - Puneet Sachdev - Nasscom Tech Series - June ...
HTTP_Header_Security.pdf
E-Business And Technology Essay
Asynchronous architecture (Node.js & Vert.x)
Accelerating breakthrough business technologies in atlanta, tag featured spea...
Top Ten Web Hacking Techniques – 2008
A little bit about code injection in WebApplication Frameworks (CVE-2018-1466...
Oracle REST Data Services
Best Practices You Must Apply to Secure Your APIs - Scott Morrison, SVP & Dis...
Java Web Application Security - Denver JUG 2013
Defcon9 Presentation2001
Web Application Security - "In theory and practice"
Top Ten Web Hacking Techniques of 2012
Ed presents JSF 2.2 at a 2013 Gameduell Tech talk
Ad

More from Sumedt Jitpukdebodin (13)

PDF
How to create your own hack environment
PDF
Which side are you
PDF
Endpoint is not enough
PDF
Antivirus is hopeless
PPTX
Purple team is awesome
PDF
PDF
Fundamental of malware analysis
PDF
Security awareness training
PDF
Hacking with paper
PDF
DDoS handlering
PDF
Incident response before:after breach
PDF
What should I do when my website got hack?
How to create your own hack environment
Which side are you
Endpoint is not enough
Antivirus is hopeless
Purple team is awesome
Fundamental of malware analysis
Security awareness training
Hacking with paper
DDoS handlering
Incident response before:after breach
What should I do when my website got hack?

Recently uploaded (20)

PDF
Business Ethics Teaching Materials for college
PDF
Saundersa Comprehensive Review for the NCLEX-RN Examination.pdf
PPTX
Week 4 Term 3 Study Techniques revisited.pptx
PDF
2.FourierTransform-ShortQuestionswithAnswers.pdf
PPTX
IMMUNITY IMMUNITY refers to protection against infection, and the immune syst...
PDF
01-Introduction-to-Information-Management.pdf
PPTX
The Healthy Child – Unit II | Child Health Nursing I | B.Sc Nursing 5th Semester
PPTX
Final Presentation General Medicine 03-08-2024.pptx
PDF
Chapter 2 Heredity, Prenatal Development, and Birth.pdf
PPTX
Institutional Correction lecture only . . .
PDF
Pre independence Education in Inndia.pdf
PDF
grade 11-chemistry_fetena_net_5883.pdf teacher guide for all student
PDF
Complications of Minimal Access Surgery at WLH
PPTX
Pharmacology of Heart Failure /Pharmacotherapy of CHF
PDF
FourierSeries-QuestionsWithAnswers(Part-A).pdf
PDF
The Lost Whites of Pakistan by Jahanzaib Mughal.pdf
PPTX
Renaissance Architecture: A Journey from Faith to Humanism
PPTX
PPT- ENG7_QUARTER1_LESSON1_WEEK1. IMAGERY -DESCRIPTIONS pptx.pptx
PDF
Abdominal Access Techniques with Prof. Dr. R K Mishra
PDF
O5-L3 Freight Transport Ops (International) V1.pdf
Business Ethics Teaching Materials for college
Saundersa Comprehensive Review for the NCLEX-RN Examination.pdf
Week 4 Term 3 Study Techniques revisited.pptx
2.FourierTransform-ShortQuestionswithAnswers.pdf
IMMUNITY IMMUNITY refers to protection against infection, and the immune syst...
01-Introduction-to-Information-Management.pdf
The Healthy Child – Unit II | Child Health Nursing I | B.Sc Nursing 5th Semester
Final Presentation General Medicine 03-08-2024.pptx
Chapter 2 Heredity, Prenatal Development, and Birth.pdf
Institutional Correction lecture only . . .
Pre independence Education in Inndia.pdf
grade 11-chemistry_fetena_net_5883.pdf teacher guide for all student
Complications of Minimal Access Surgery at WLH
Pharmacology of Heart Failure /Pharmacotherapy of CHF
FourierSeries-QuestionsWithAnswers(Part-A).pdf
The Lost Whites of Pakistan by Jahanzaib Mughal.pdf
Renaissance Architecture: A Journey from Faith to Humanism
PPT- ENG7_QUARTER1_LESSON1_WEEK1. IMAGERY -DESCRIPTIONS pptx.pptx
Abdominal Access Techniques with Prof. Dr. R K Mishra
O5-L3 Freight Transport Ops (International) V1.pdf

Web Architecture - Mechanism and Threats

  • 1. Web Architecture - Mechanism and Threats © Copyright 2013 i-secure Co., Ltd. The information contained herein is subject to change without notice. Sumedt Jitpukdebodin Senior Security Researcher CompTIA Security+, LPIC-1 , NCLA, C|EHv6, eCPPT, eWPT, IWSS, CPTE
  • 2. ~# whoami  Name: Sumedt Jitpukdebodin(สุเมธ จิตภักดีบดินทร์)  My blog: http://www.r00tsec.com, http://twitter.com/materaj, https://www.facebook.com/hackandsecbook  Jobs – I-SECURE Co., Ltd. – Research And Develop Engineer, Senior Web Application Security Specialist, Senior Security Researcher – Writer – English article@ http://packetstormsecurity.com/files/author/9011/ and please google my name. – Many Thai article, please google my Thai name. – หนังสือ “Hacking & Security Book "Network Security หนังสือฉบับก้าวสู่นักทดสอบและป้องกันการเจาะระบบ”  Hobby: Penetration Testing, Hacking, Reading Info Security, Play Games, Traveling around the world, Write Article, Teaching and more... © Copyright 2013 i-secure Co., Ltd. The information contained herein is subject to change without notice.
  • 3. Agenda © Copyright 2013 i-secure Co., Ltd. The information contained herein is subject to change without notice.
  • 4. Agenda  Web Architecture  Web Architecture Attack  Security Controls & Mechanism © Copyright 2013 i-secure Co., Ltd. The information contained herein is subject to change without notice.
  • 5. Web Architecture © Copyright 2013 i-secure Co., Ltd. The information contained herein is subject to change without notice.
  • 6. Basic Web Architecture  Two Tier Architecture – Web browser display content that return from Web Server – Web server provide resource for client © Copyright 2013 i-secure Co., Ltd. The information contained herein is subject to change without notice.
  • 7. HTML  HTML(Hyper Text Markup Language) – Document Layout Language – Viewed by using Web Browser. © Copyright 2013 i-secure Co., Ltd. The information contained herein is subject to change without notice.
  • 8. URI  URI(Universal Resource Identifier) © Copyright 2013 i-secure Co., Ltd. The information contained herein is subject to change without notice.
  • 9. URI(2)  URL(Universal Resource Locator)  URN(Universal Resource Name) © Copyright 2013 i-secure Co., Ltd. The information contained herein is subject to change without notice.
  • 10. HTTP  HTTP(Hyper Text Transfer Protocol)  HTTP is an application layer.  HTTP has 2 way communication: HTTP Request and HTTP Response. © Copyright 2013 i-secure Co., Ltd. The information contained herein is subject to change without notice.
  • 11. HTTP(2)  Request Message – Request Line – Request Header – An empty line – An optional Message Body © Copyright 2013 i-secure Co., Ltd. The information contained herein is subject to change without notice.
  • 12. HTTP(3) © Copyright 2013 i-secure Co., Ltd. The information contained herein is subject to change without notice.
  • 13. Request Method – HEAD – GET – POST – PUT – DELETE – TRACE – OPTIONS – CONNECT © Copyright 2013 i-secure Co., Ltd. The information contained herein is subject to change without notice.
  • 14. Safe Method – HEAD – GET – OPTIONS – TRACE – POST – PUT – DELETE – CONNECT © Copyright 2013 i-secure Co., Ltd. The information contained herein is subject to change without notice.
  • 15. Status Code  Success: 2xx  Redirection: 3xx  Client-Side Error: 4xx  Server-Side Error: 5xx © Copyright 2013 i-secure Co., Ltd. The information contained herein is subject to change without notice.
  • 16. HTTP Session State  HTTP is stateless Protocol  Solutions – Cookies – Sessions – Hidden variable – URL encode parameter( /index.php?session_id=$session_code) © Copyright 2013 i-secure Co., Ltd. The information contained herein is subject to change without notice.
  • 17. Web Architecture Extension  Two tier architecture is not enough  Common Gateway Interface(CGI)  Standard protocol for interfacing with external application software with a web server  CGI program are executable programs that run on the web server. © Copyright 2013 i-secure Co., Ltd. The information contained herein is subject to change without notice.
  • 18. Javascript  Scripting language designed for dynamic, interactive web application  Run on client side.  Preprocessing data on the client before submission to a server.  Changing content type and styles © Copyright 2013 i-secure Co., Ltd. The information contained herein is subject to change without notice.
  • 19. Three tier web architecture © Copyright 2013 i-secure Co., Ltd. The information contained herein is subject to change without notice.
  • 20. Make HTTP to stateful(2)  Cookie  A text stored on a client’s computer by a web browser.  Sent as an HTTP Header  Can used for authenticating, session tracking © Copyright 2013 i-secure Co., Ltd. The information contained herein is subject to change without notice.
  • 21. Server and Client Processing  Server-Side Processing  PHP  ASP  ASP.NET  Perl  J2EE  Python, Django  Ruby On Rail  Client-Side Processing  CSS  HTML  Javascript  Adobe Flash  Microsoft Silverlight © Copyright 2013 i-secure Co., Ltd. The information contained herein is subject to change without notice.
  • 22. AJAX  Asynchronous Javascript and XML(AJAX)  Create by Jesse James Garrett, Febuary 18, 2005  Ajax Incorporates  XHTML, CSS, Document Object Model(DOM), XML and XSLT, XMLHttpRequest, Javascript © Copyright 2013 i-secure Co., Ltd. The information contained herein is subject to change without notice.
  • 23. AJAX(2) © Copyright 2013 i-secure Co., Ltd. The information contained herein is subject to change without notice.
  • 24. AJAX(3) © Copyright 2013 i-secure Co., Ltd. The information contained herein is subject to change without notice.
  • 25. JSON  Javascript Object Notation(JSON)  JSON is lightweight computer data interchange format.  JSON is based on a subset of Javascript programming language.  Using of XML format. © Copyright 2013 i-secure Co., Ltd. The information contained herein is subject to change without notice.
  • 26. JSON Request && Response © Copyright 2013 i-secure Co., Ltd. The information contained herein is subject to change without notice.
  • 27. JSON(2) © Copyright 2013 i-secure Co., Ltd. The information contained herein is subject to change without notice.
  • 28. XML  eXtensible Markup Language  Using for information exchange.  Two primary building blocks of XML are elements and attributes.  Elements are tags and have values.  Elements are structured as a tree.  Alternatively, elements may have both attributes as well as data.  Attributes help you to give more meaning and describe your element more efficiently and clearly. © Copyright 2013 i-secure Co., Ltd. The information contained herein is subject to change without notice.
  • 29. XML(2)  Tag  Element  Content © Copyright 2013 i-secure Co., Ltd. The information contained herein is subject to change without notice.
  • 30. XML(3) © Copyright 2013 i-secure Co., Ltd. The information contained herein is subject to change without notice.
  • 31. XML(4) © Copyright 2013 i-secure Co., Ltd. The information contained herein is subject to change without notice.
  • 32. XML vs JSON © Copyright 2013 i-secure Co., Ltd. The information contained herein is subject to change without notice.
  • 33. Web Services  Web service is a software system designed to support machine-to-machine intraction over a network.  Web service are frequently just used to Internet Application Programming Interfaces(API).  Web service use HTTP for transmitting messages(RPC,SOAP,REST) © Copyright 2013 i-secure Co., Ltd. The information contained herein is subject to change without notice.
  • 34. SOAP vs REST  SOAP(Simple Object Access Protocol) – Web service based on XML  REST(Representational State Transfer) – Web service represent in format of application © Copyright 2013 i-secure Co., Ltd. The information contained herein is subject to change without notice.
  • 35. SOAP vs REST © Copyright 2013 i-secure Co., Ltd. The information contained herein is subject to change without notice.
  • 36. SOAP Example Reference:: http://www.soapui.org/The-World-Of-API-Testing/soap-vs-rest-challenges. html © Copyright 2013 i-secure Co., Ltd. The information contained herein is subject to change without notice.
  • 37. REST Example Reference:: http://www.soapui.org/The-World-Of-API-Testing/soap-vs-rest-challenges. html © Copyright 2013 i-secure Co., Ltd. The information contained herein is subject to change without notice.
  • 38. Web Architecture Attack © Copyright 2013 i-secure Co., Ltd. The information contained herein is subject to change without notice.
  • 39. Web Architecture Reference :: Web Application Hacking/Security 101(https://docs.google.com/presentation/d/1fw7fO7kmVTcfXuupGTezSM76cdQH3IbYos5xu95L yMs/edit#slide=id.p) © Copyright 2013 i-secure Co., Ltd. The information contained herein is subject to change without notice.
  • 40. Web Architecture Attack Reference :: Web Application Hacking/Security 101(https://docs.google.com/presentation/d/1fw7fO7kmVTcfXuupGTezSM76cdQH3IbYos5xu95L yMs/edit#slide=id.p) © Copyright 2013 i-secure Co., Ltd. The information contained herein is subject to change without notice.
  • 41. OWASP 2013  Injection  Broken Authentication and Session Management  Cross-Site Scripting(XSS)  Insecure Direct Object Rerefence  Security Misconfiguration  Sensitive Data Exposure  Missing Function Level Access Control  Cross-Site Request Forgery(CSRF)  Using Components with Known Vulnerability  Unvalidated Redirects and Forwards © Copyright 2013 i-secure Co., Ltd. The information contained herein is subject to change without notice.
  • 42. Security Controls & Mechanism © Copyright 2013 i-secure Co., Ltd. The information contained herein is subject to change without notice.
  • 43. Security Control  Application Layer  Network Layer © Copyright 2013 i-secure Co., Ltd. The information contained herein is subject to change without notice.
  • 44. Application Layer  Input Validation  Sessions Management  Authentication Method  Strong Policy(Such as password policy)  Same-Origin Policy © Copyright 2013 i-secure Co., Ltd. The information contained herein is subject to change without notice.
  • 45. Network Layer  Firewall  Intrusion Detection System/Intrusion Prevention System(IDS/IPS)  Web Application Firewall(WAF)  Centralize Log Server © Copyright 2013 i-secure Co., Ltd. The information contained herein is subject to change without notice.
  • 46. Network Layer Diagram Reference :: http://www.umv.co.kr/main_eng/sm_enterprise.php © Copyright 2013 i-secure Co., Ltd. The information contained herein is subject to change without notice.
  • 47. Questions www.i-secure.co.th © Copyright 2013 ACIS i-secure Co., Ltd. The information contained herein is subject to change without notice.