SlideShare a Scribd company logo
WEBSITE VULNERABILITIES
Ngan Seok Chern
MCP | CEH | MVP – ASP / ASP.NET
seokchern85@hotmail.com
http://blog.scnetstudio.com
Agenda
 Web application setup
 Why attack
 Type of attack & countermeasure
Web Application Setup
Why Attack ?
 DefacingWebsite
 Sealing credit card information
 exploting server-side scripting
 exploiting buffer overflow
 and etc
Step
1. Scanning
2. Gather
Information
3.Testing
4. Plan
5. Launch
Type of Attack
 Cross-site Scripting / XSS Flaws
 SQL Injection
 Buffer Overflow
 DirectoryTraversal
 Error message interception attack
 Web.config
 and etc
Cross-site Scripting / XSS Flaws
 Typically found in web applications which allow
code injection by malicious users into the web
pages viewed by other users.
 JavaScript is commonly used.
 During an attack "everything looks fine" to the
end-user.
 <script> </script>
 Countermeasure :
 Validate all your sources.
 Filtering script output.
SQL Injection
 SQL to manipulate database’s data
 Execute from address bar, queries /
searches.
 SELECT fieldlist FROM table
WHERE field = '$EMAIL';
 SELECT fieldlist FROM table
WHERE field = 'anything' OR
'x'='x';
 Countermeasure:
 Check user input.
 Validate and sanitize user input that
passed to database.
Buffer Overflow
 Where a process stores data in a buffer
outside the memory the programmer set
aside for it.
 Countermeasure:
 Validate input length.
 Check and pay extra care on loop function which
carry data.
Directory Traversal
 Attacker able to browse directories
and files.
 Expose the directory structure of
application and often the underlying
web server and operating system.
 Eg. “../Images/logo.gif”
 Countermeasure:
 Define access right to the protected area
 Apply checks/hot fixes
 Update web server with patches in timely
manner
Error Message Attack
 Based on error message that show.
 Example:
 Your password is incorrect.
 Connecting to the database on ……. With …..is not
unsuccessful.
 Countermeasure:
 Modify and display common error message.
Web.config
 Connection String Information
 Example:
 Data Source=190.190.200.100,1433;Network
Library=DBMSSOCN;Initial
Catalog=myDataBase;User
ID=myUsername;Password=myPassword;
 Countermeasure:
 Encrypt your web.config.
 aspnet_regiis.exe -pef "connectionStrings
Name" "C:InetpubwwwrootMySite" –prov
"DataProtectionConfigurationProvider”
Web.config (Original)
Web.config (Encrypted)
Summary
 Programmer played important roles.
 Patches your server.
Thank you
Q&A

More Related Content

PPTX
Web application attacks
PPTX
ASP.NET View State - Security Issues
PPTX
Secure Code Warrior - Cross site scripting
PPTX
Top 10 Web Application Security Risks - Murat Lostar @ ISACA EUROCACS 2013
PDF
Common Web Application Attacks
PPT
Web Application Security
PDF
Broken access controls
PPTX
Secure Code Warrior - Authentication
Web application attacks
ASP.NET View State - Security Issues
Secure Code Warrior - Cross site scripting
Top 10 Web Application Security Risks - Murat Lostar @ ISACA EUROCACS 2013
Common Web Application Attacks
Web Application Security
Broken access controls
Secure Code Warrior - Authentication

What's hot (20)

PPTX
Secure Code Warrior - Remote file inclusion
PDF
AJAX: How to Divert Threats
PPTX
2 . web app s canners
PDF
Ajax Security Dangers
PDF
AJAX Security - LAC2016
PPT
Hacking web applications
PPT
Using Proxies To Secure Applications And More
PPTX
Error codes & custom 404s
PPTX
A5: Security Misconfiguration
PPT
Top 10 Web Security Vulnerabilities (OWASP Top 10)
PPTX
Dzhengis 93098 ajax - security
PDF
Web Application Security 101 - 04 Testing Methodology
PPT
Ajax Security
PPT
IEEE KUET SPAC presentation
PPTX
Rapid Android Application Security Testing
PPTX
Owasp first5 presentation
PDF
Web App Footprints Discovery
PPTX
Presentation on Web Attacks
PDF
Web Application Security
PPTX
Web application vulnerability assessment
Secure Code Warrior - Remote file inclusion
AJAX: How to Divert Threats
2 . web app s canners
Ajax Security Dangers
AJAX Security - LAC2016
Hacking web applications
Using Proxies To Secure Applications And More
Error codes & custom 404s
A5: Security Misconfiguration
Top 10 Web Security Vulnerabilities (OWASP Top 10)
Dzhengis 93098 ajax - security
Web Application Security 101 - 04 Testing Methodology
Ajax Security
IEEE KUET SPAC presentation
Rapid Android Application Security Testing
Owasp first5 presentation
Web App Footprints Discovery
Presentation on Web Attacks
Web Application Security
Web application vulnerability assessment
Ad

Viewers also liked (8)

PDF
STUDY: Website Vulnerability Assessment
PPSX
06 asp.net session08
PPTX
Cyber Security Predictions 2016
PPTX
15 Years of Web Security: The Rebellious Teenage Years
PDF
JavaScript Security
PDF
Statistics - Top Website Vulnerabilities
PDF
Secure development automatic identification and mitigation of application v...
PPTX
Slideshare.Com Powerpoint
STUDY: Website Vulnerability Assessment
06 asp.net session08
Cyber Security Predictions 2016
15 Years of Web Security: The Rebellious Teenage Years
JavaScript Security
Statistics - Top Website Vulnerabilities
Secure development automatic identification and mitigation of application v...
Slideshare.Com Powerpoint
Ad

Similar to Web Vulnerabilities_NGAN Seok Chern (20)

PPTX
Altitude SF 2017: Security at the edge
PPTX
webapplicationattacks-101005070110-phpapp02.pptx
PPT
Owasp Top 10 - Owasp Pune Chapter - January 2008
ODP
Web Security
PDF
Attques web
PPT
Intro to Web Application Security
PPS
Manindra kishore _incident_handling_n_log_analysis - ClubHack2009
PDF
Romulus OWASP
PPTX
Owasp web security
PPTX
Cyber ppt
PPT
Jan 2008 Allup
PDF
Security Awareness
DOC
Attackers Vs Programmers
PPTX
MS Innovation Day: A Lap Around Web Application Vulnerabilities by MVP Walter...
PPT
performing security testing of web applications.web-and- -hacking.ppt
PDF
Web application sec_3
PPT
Hacking web applications
PPT
PDF
Cross Site Attacks
Altitude SF 2017: Security at the edge
webapplicationattacks-101005070110-phpapp02.pptx
Owasp Top 10 - Owasp Pune Chapter - January 2008
Web Security
Attques web
Intro to Web Application Security
Manindra kishore _incident_handling_n_log_analysis - ClubHack2009
Romulus OWASP
Owasp web security
Cyber ppt
Jan 2008 Allup
Security Awareness
Attackers Vs Programmers
MS Innovation Day: A Lap Around Web Application Vulnerabilities by MVP Walter...
performing security testing of web applications.web-and- -hacking.ppt
Web application sec_3
Hacking web applications
Cross Site Attacks

More from Quek Lilian (20)

PDF
Sgug print copy pdf ll
PDF
Singapore MVP gazette
PPTX
Expression studio overview_MVP Kok Chiann
PPTX
Installation and Adminstration of AD_MVP Padman
PPTX
Exchange server 2010 overview_MVP Padman
PPTX
Installing managing windows server 2008 r2_MVP Shaminda
PPTX
SharePoint 2010 launch_MVP Sampath Perera
PPT
NUS exam 70-432_MVP Choirul Amri
PDF
Windows server 2008 r2 and web platform_MVP Fajar
PPTX
Express web development with visual studio 2010 express_MVP Ronald Rajagukguk
PPTX
Windows 7 For Students_MVP Jabez Gan
PPTX
Lkw Security Part 1_MVPs Azra & Sanjay
PDF
Sql2008 R2 Dw (Phua Chiu Kiang)
PPTX
Commercial Launch Win7 Dev Chalermvong
PPTX
Commercial Launch Win7 Dev Chalermvong
PPTX
Unveiling Share Point 2010_MVP Joy Pradeep
PPTX
Unveiling Share Point 2010_MVP Joy Pradeep
PPTX
Introduction To Virtualization_MVP Jabez Gan
PPTX
Vs2010 Aspnet MSP Bootcamp_MVP Ngan Seok Chern
PPTX
Windows 2008 Active Directory Branch office Management_MVP Sampath Perera
Sgug print copy pdf ll
Singapore MVP gazette
Expression studio overview_MVP Kok Chiann
Installation and Adminstration of AD_MVP Padman
Exchange server 2010 overview_MVP Padman
Installing managing windows server 2008 r2_MVP Shaminda
SharePoint 2010 launch_MVP Sampath Perera
NUS exam 70-432_MVP Choirul Amri
Windows server 2008 r2 and web platform_MVP Fajar
Express web development with visual studio 2010 express_MVP Ronald Rajagukguk
Windows 7 For Students_MVP Jabez Gan
Lkw Security Part 1_MVPs Azra & Sanjay
Sql2008 R2 Dw (Phua Chiu Kiang)
Commercial Launch Win7 Dev Chalermvong
Commercial Launch Win7 Dev Chalermvong
Unveiling Share Point 2010_MVP Joy Pradeep
Unveiling Share Point 2010_MVP Joy Pradeep
Introduction To Virtualization_MVP Jabez Gan
Vs2010 Aspnet MSP Bootcamp_MVP Ngan Seok Chern
Windows 2008 Active Directory Branch office Management_MVP Sampath Perera

Recently uploaded (20)

PDF
Diabetes mellitus diagnosis method based random forest with bat algorithm
PDF
Mushroom cultivation and it's methods.pdf
PPTX
TechTalks-8-2019-Service-Management-ITIL-Refresh-ITIL-4-Framework-Supports-Ou...
PDF
gpt5_lecture_notes_comprehensive_20250812015547.pdf
PDF
Profit Center Accounting in SAP S/4HANA, S4F28 Col11
PDF
A comparative analysis of optical character recognition models for extracting...
PDF
Blue Purple Modern Animated Computer Science Presentation.pdf.pdf
PPTX
Machine Learning_overview_presentation.pptx
PPTX
Programs and apps: productivity, graphics, security and other tools
PPTX
SOPHOS-XG Firewall Administrator PPT.pptx
PPTX
cloud_computing_Infrastucture_as_cloud_p
PDF
Spectral efficient network and resource selection model in 5G networks
PPTX
Group 1 Presentation -Planning and Decision Making .pptx
PDF
Build a system with the filesystem maintained by OSTree @ COSCUP 2025
PPTX
KOM of Painting work and Equipment Insulation REV00 update 25-dec.pptx
PDF
Assigned Numbers - 2025 - Bluetooth® Document
PDF
Getting Started with Data Integration: FME Form 101
PDF
Empathic Computing: Creating Shared Understanding
PDF
A comparative study of natural language inference in Swahili using monolingua...
PDF
Reach Out and Touch Someone: Haptics and Empathic Computing
Diabetes mellitus diagnosis method based random forest with bat algorithm
Mushroom cultivation and it's methods.pdf
TechTalks-8-2019-Service-Management-ITIL-Refresh-ITIL-4-Framework-Supports-Ou...
gpt5_lecture_notes_comprehensive_20250812015547.pdf
Profit Center Accounting in SAP S/4HANA, S4F28 Col11
A comparative analysis of optical character recognition models for extracting...
Blue Purple Modern Animated Computer Science Presentation.pdf.pdf
Machine Learning_overview_presentation.pptx
Programs and apps: productivity, graphics, security and other tools
SOPHOS-XG Firewall Administrator PPT.pptx
cloud_computing_Infrastucture_as_cloud_p
Spectral efficient network and resource selection model in 5G networks
Group 1 Presentation -Planning and Decision Making .pptx
Build a system with the filesystem maintained by OSTree @ COSCUP 2025
KOM of Painting work and Equipment Insulation REV00 update 25-dec.pptx
Assigned Numbers - 2025 - Bluetooth® Document
Getting Started with Data Integration: FME Form 101
Empathic Computing: Creating Shared Understanding
A comparative study of natural language inference in Swahili using monolingua...
Reach Out and Touch Someone: Haptics and Empathic Computing

Web Vulnerabilities_NGAN Seok Chern

  • 1. WEBSITE VULNERABILITIES Ngan Seok Chern MCP | CEH | MVP – ASP / ASP.NET seokchern85@hotmail.com http://blog.scnetstudio.com
  • 2. Agenda  Web application setup  Why attack  Type of attack & countermeasure
  • 4. Why Attack ?  DefacingWebsite  Sealing credit card information  exploting server-side scripting  exploiting buffer overflow  and etc
  • 6. Type of Attack  Cross-site Scripting / XSS Flaws  SQL Injection  Buffer Overflow  DirectoryTraversal  Error message interception attack  Web.config  and etc
  • 7. Cross-site Scripting / XSS Flaws  Typically found in web applications which allow code injection by malicious users into the web pages viewed by other users.  JavaScript is commonly used.  During an attack "everything looks fine" to the end-user.  <script> </script>  Countermeasure :  Validate all your sources.  Filtering script output.
  • 8. SQL Injection  SQL to manipulate database’s data  Execute from address bar, queries / searches.  SELECT fieldlist FROM table WHERE field = '$EMAIL';  SELECT fieldlist FROM table WHERE field = 'anything' OR 'x'='x';  Countermeasure:  Check user input.  Validate and sanitize user input that passed to database.
  • 9. Buffer Overflow  Where a process stores data in a buffer outside the memory the programmer set aside for it.  Countermeasure:  Validate input length.  Check and pay extra care on loop function which carry data.
  • 10. Directory Traversal  Attacker able to browse directories and files.  Expose the directory structure of application and often the underlying web server and operating system.  Eg. “../Images/logo.gif”  Countermeasure:  Define access right to the protected area  Apply checks/hot fixes  Update web server with patches in timely manner
  • 11. Error Message Attack  Based on error message that show.  Example:  Your password is incorrect.  Connecting to the database on ……. With …..is not unsuccessful.  Countermeasure:  Modify and display common error message.
  • 12. Web.config  Connection String Information  Example:  Data Source=190.190.200.100,1433;Network Library=DBMSSOCN;Initial Catalog=myDataBase;User ID=myUsername;Password=myPassword;  Countermeasure:  Encrypt your web.config.  aspnet_regiis.exe -pef "connectionStrings Name" "C:InetpubwwwrootMySite" –prov "DataProtectionConfigurationProvider”
  • 15. Summary  Programmer played important roles.  Patches your server.