SlideShare una empresa de Scribd logo
1 de 9
Security in Hacking Silverlight
Avoid being hacked
Miguel Madero
•   Job: Senior Consultant - Readify
•   Blog: www.miguelmadero.com
•   Twitter: @mamadero
•   Mail: me@miguelmadero.com
Survey
Typical Application (Demo version)
Roles
New Requirements
New Requirements
Security - Conclusion
• You can’t trust
  ▫   The client
  ▫   The network
  ▫   The server
  ▫   Your users
  ▫   The compiler
Miguel Madero
•   Job: Senior Developer en Readify
•   Blog: www.miguelmadero.com
•   Twitter: @mamadero
•   Mail: me@miguelmadero.com

Más contenido relacionado

Destacado

还原Oracle中真实的cache recovery
还原Oracle中真实的cache recovery还原Oracle中真实的cache recovery
还原Oracle中真实的cache recoverymaclean liu
 
Ioug 2010 oracle critical patch updates unwrapped presentation
Ioug 2010 oracle critical patch updates unwrapped presentationIoug 2010 oracle critical patch updates unwrapped presentation
Ioug 2010 oracle critical patch updates unwrapped presentationmaclean liu
 
Upgrade 11.2.0.1 rac db to 11.2.0.2 in linux
Upgrade 11.2.0.1 rac db to 11.2.0.2 in linuxUpgrade 11.2.0.1 rac db to 11.2.0.2 in linux
Upgrade 11.2.0.1 rac db to 11.2.0.2 in linuxmaclean liu
 
PR Moment event 26 March 2015: What do journalists want from PRs?
PR Moment event 26 March 2015: What do journalists want from PRs? PR Moment event 26 March 2015: What do journalists want from PRs?
PR Moment event 26 March 2015: What do journalists want from PRs? Vuelio
 
11g新特性streams同步捕获
11g新特性streams同步捕获11g新特性streams同步捕获
11g新特性streams同步捕获maclean liu
 
Facebook for PR Pros
Facebook for PR ProsFacebook for PR Pros
Facebook for PR ProsVuelio
 
Oracle数据库升级前必要的准备工作
Oracle数据库升级前必要的准备工作Oracle数据库升级前必要的准备工作
Oracle数据库升级前必要的准备工作maclean liu
 
Presentation for Workshop on RTTC Curriculum Revision workshop
Presentation for Workshop on RTTC Curriculum Revision workshopPresentation for Workshop on RTTC Curriculum Revision workshop
Presentation for Workshop on RTTC Curriculum Revision workshopStefaan Vande Walle
 
Varamobaden Vision 2025
Varamobaden Vision 2025 Varamobaden Vision 2025
Varamobaden Vision 2025 Bjorn Orrenius
 
Implementasi TLS dan SRTP pada VoIP Server
Implementasi TLS dan SRTP pada VoIP ServerImplementasi TLS dan SRTP pada VoIP Server
Implementasi TLS dan SRTP pada VoIP ServerFendi Kurniawan
 
Oracle中比对2张表之间数据是否一致的几种方法
Oracle中比对2张表之间数据是否一致的几种方法Oracle中比对2张表之间数据是否一致的几种方法
Oracle中比对2张表之间数据是否一致的几种方法maclean liu
 
Pitch Perfect: Giving Journalists What they Want
Pitch Perfect: Giving Journalists What they WantPitch Perfect: Giving Journalists What they Want
Pitch Perfect: Giving Journalists What they WantVuelio
 
Angular js 의존관계 주입과 서비스
Angular js 의존관계 주입과 서비스Angular js 의존관계 주입과 서비스
Angular js 의존관계 주입과 서비스Tae Ho Kang
 
Evaluating my trailer
Evaluating my trailerEvaluating my trailer
Evaluating my trailerabcdsmile
 
castironknickers
castironknickerscastironknickers
castironknickersannrhi
 
Protecting polish borders against illicit trafficking od radioactive sources ...
Protecting polish borders against illicit trafficking od radioactive sources ...Protecting polish borders against illicit trafficking od radioactive sources ...
Protecting polish borders against illicit trafficking od radioactive sources ...Leishman Associates
 

Destacado (19)

Gandhi Ultimate Marketing Guru1234 X5555
Gandhi  Ultimate Marketing Guru1234 X5555Gandhi  Ultimate Marketing Guru1234 X5555
Gandhi Ultimate Marketing Guru1234 X5555
 
还原Oracle中真实的cache recovery
还原Oracle中真实的cache recovery还原Oracle中真实的cache recovery
还原Oracle中真实的cache recovery
 
Ioug 2010 oracle critical patch updates unwrapped presentation
Ioug 2010 oracle critical patch updates unwrapped presentationIoug 2010 oracle critical patch updates unwrapped presentation
Ioug 2010 oracle critical patch updates unwrapped presentation
 
Upgrade 11.2.0.1 rac db to 11.2.0.2 in linux
Upgrade 11.2.0.1 rac db to 11.2.0.2 in linuxUpgrade 11.2.0.1 rac db to 11.2.0.2 in linux
Upgrade 11.2.0.1 rac db to 11.2.0.2 in linux
 
PR Moment event 26 March 2015: What do journalists want from PRs?
PR Moment event 26 March 2015: What do journalists want from PRs? PR Moment event 26 March 2015: What do journalists want from PRs?
PR Moment event 26 March 2015: What do journalists want from PRs?
 
11g新特性streams同步捕获
11g新特性streams同步捕获11g新特性streams同步捕获
11g新特性streams同步捕获
 
Facebook for PR Pros
Facebook for PR ProsFacebook for PR Pros
Facebook for PR Pros
 
Oracle数据库升级前必要的准备工作
Oracle数据库升级前必要的准备工作Oracle数据库升级前必要的准备工作
Oracle数据库升级前必要的准备工作
 
Presentation for Workshop on RTTC Curriculum Revision workshop
Presentation for Workshop on RTTC Curriculum Revision workshopPresentation for Workshop on RTTC Curriculum Revision workshop
Presentation for Workshop on RTTC Curriculum Revision workshop
 
Varamobaden Vision 2025
Varamobaden Vision 2025 Varamobaden Vision 2025
Varamobaden Vision 2025
 
Implementasi TLS dan SRTP pada VoIP Server
Implementasi TLS dan SRTP pada VoIP ServerImplementasi TLS dan SRTP pada VoIP Server
Implementasi TLS dan SRTP pada VoIP Server
 
Oracle中比对2张表之间数据是否一致的几种方法
Oracle中比对2张表之间数据是否一致的几种方法Oracle中比对2张表之间数据是否一致的几种方法
Oracle中比对2张表之间数据是否一致的几种方法
 
Pitch Perfect: Giving Journalists What they Want
Pitch Perfect: Giving Journalists What they WantPitch Perfect: Giving Journalists What they Want
Pitch Perfect: Giving Journalists What they Want
 
Hallgrímur.P.
Hallgrímur.P.Hallgrímur.P.
Hallgrímur.P.
 
Angular js 의존관계 주입과 서비스
Angular js 의존관계 주입과 서비스Angular js 의존관계 주입과 서비스
Angular js 의존관계 주입과 서비스
 
Evaluating my trailer
Evaluating my trailerEvaluating my trailer
Evaluating my trailer
 
HTML5
HTML5HTML5
HTML5
 
castironknickers
castironknickerscastironknickers
castironknickers
 
Protecting polish borders against illicit trafficking od radioactive sources ...
Protecting polish borders against illicit trafficking od radioactive sources ...Protecting polish borders against illicit trafficking od radioactive sources ...
Protecting polish borders against illicit trafficking od radioactive sources ...
 

Último

A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)Gabriella Davis
 
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...Miguel Araújo
 
08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking Men08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking MenDelhi Call girls
 
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
04-2024-HHUG-Sales-and-Marketing-Alignment.pptxHampshireHUG
 
Data Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt RobisonData Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt RobisonAnna Loughnan Colquhoun
 
Workshop - Best of Both Worlds_ Combine KG and Vector search for enhanced R...
Workshop - Best of Both Worlds_ Combine  KG and Vector search for  enhanced R...Workshop - Best of Both Worlds_ Combine  KG and Vector search for  enhanced R...
Workshop - Best of Both Worlds_ Combine KG and Vector search for enhanced R...Neo4j
 
Axa Assurance Maroc - Insurer Innovation Award 2024
Axa Assurance Maroc - Insurer Innovation Award 2024Axa Assurance Maroc - Insurer Innovation Award 2024
Axa Assurance Maroc - Insurer Innovation Award 2024The Digital Insurer
 
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...Igalia
 
[2024]Digital Global Overview Report 2024 Meltwater.pdf
[2024]Digital Global Overview Report 2024 Meltwater.pdf[2024]Digital Global Overview Report 2024 Meltwater.pdf
[2024]Digital Global Overview Report 2024 Meltwater.pdfhans926745
 
Handwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed textsHandwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed textsMaria Levchenko
 
Advantages of Hiring UIUX Design Service Providers for Your Business
Advantages of Hiring UIUX Design Service Providers for Your BusinessAdvantages of Hiring UIUX Design Service Providers for Your Business
Advantages of Hiring UIUX Design Service Providers for Your BusinessPixlogix Infotech
 
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking MenDelhi Call girls
 
Automating Google Workspace (GWS) & more with Apps Script
Automating Google Workspace (GWS) & more with Apps ScriptAutomating Google Workspace (GWS) & more with Apps Script
Automating Google Workspace (GWS) & more with Apps Scriptwesley chun
 
IAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI SolutionsIAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI SolutionsEnterprise Knowledge
 
Understanding Discord NSFW Servers A Guide for Responsible Users.pdf
Understanding Discord NSFW Servers A Guide for Responsible Users.pdfUnderstanding Discord NSFW Servers A Guide for Responsible Users.pdf
Understanding Discord NSFW Servers A Guide for Responsible Users.pdfUK Journal
 
Boost PC performance: How more available memory can improve productivity
Boost PC performance: How more available memory can improve productivityBoost PC performance: How more available memory can improve productivity
Boost PC performance: How more available memory can improve productivityPrincipled Technologies
 
CNv6 Instructor Chapter 6 Quality of Service
CNv6 Instructor Chapter 6 Quality of ServiceCNv6 Instructor Chapter 6 Quality of Service
CNv6 Instructor Chapter 6 Quality of Servicegiselly40
 
Breaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path MountBreaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path MountPuma Security, LLC
 
GenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day PresentationGenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day PresentationMichael W. Hawkins
 
🐬 The future of MySQL is Postgres 🐘
🐬  The future of MySQL is Postgres   🐘🐬  The future of MySQL is Postgres   🐘
🐬 The future of MySQL is Postgres 🐘RTylerCroy
 

Último (20)

A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)
 
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
 
08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking Men08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking Men
 
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
 
Data Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt RobisonData Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt Robison
 
Workshop - Best of Both Worlds_ Combine KG and Vector search for enhanced R...
Workshop - Best of Both Worlds_ Combine  KG and Vector search for  enhanced R...Workshop - Best of Both Worlds_ Combine  KG and Vector search for  enhanced R...
Workshop - Best of Both Worlds_ Combine KG and Vector search for enhanced R...
 
Axa Assurance Maroc - Insurer Innovation Award 2024
Axa Assurance Maroc - Insurer Innovation Award 2024Axa Assurance Maroc - Insurer Innovation Award 2024
Axa Assurance Maroc - Insurer Innovation Award 2024
 
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...
 
[2024]Digital Global Overview Report 2024 Meltwater.pdf
[2024]Digital Global Overview Report 2024 Meltwater.pdf[2024]Digital Global Overview Report 2024 Meltwater.pdf
[2024]Digital Global Overview Report 2024 Meltwater.pdf
 
Handwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed textsHandwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed texts
 
Advantages of Hiring UIUX Design Service Providers for Your Business
Advantages of Hiring UIUX Design Service Providers for Your BusinessAdvantages of Hiring UIUX Design Service Providers for Your Business
Advantages of Hiring UIUX Design Service Providers for Your Business
 
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
 
Automating Google Workspace (GWS) & more with Apps Script
Automating Google Workspace (GWS) & more with Apps ScriptAutomating Google Workspace (GWS) & more with Apps Script
Automating Google Workspace (GWS) & more with Apps Script
 
IAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI SolutionsIAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI Solutions
 
Understanding Discord NSFW Servers A Guide for Responsible Users.pdf
Understanding Discord NSFW Servers A Guide for Responsible Users.pdfUnderstanding Discord NSFW Servers A Guide for Responsible Users.pdf
Understanding Discord NSFW Servers A Guide for Responsible Users.pdf
 
Boost PC performance: How more available memory can improve productivity
Boost PC performance: How more available memory can improve productivityBoost PC performance: How more available memory can improve productivity
Boost PC performance: How more available memory can improve productivity
 
CNv6 Instructor Chapter 6 Quality of Service
CNv6 Instructor Chapter 6 Quality of ServiceCNv6 Instructor Chapter 6 Quality of Service
CNv6 Instructor Chapter 6 Quality of Service
 
Breaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path MountBreaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path Mount
 
GenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day PresentationGenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day Presentation
 
🐬 The future of MySQL is Postgres 🐘
🐬  The future of MySQL is Postgres   🐘🐬  The future of MySQL is Postgres   🐘
🐬 The future of MySQL is Postgres 🐘
 

Security in Silverlight/Hacking Silverlight Applications

Notas del editor

  1. Welcome... BlablablablaWe’ll wait until more ppl gets in with their beers and are ready to start. And you can ask questions during the talk. Just if I lost the track you’ll have to remind me where I was.
  2. Before starting, I’ll introduce myself.
  3. Who writes secure apps? Who hacks secure apps? For fun? Or work?
  4. We all write this type of apps. Get some data. Made some changes Send some data backWe also sometimes need to Authenticate users Authorize users Limit the data accessed by each userBut sometimes we need to go beyond that. Silverlight poses especial risks that we need to take into account as well as other RIA platforms AJAX and Flex apps for example. Some AJAX app just generate HTML on the Server and update it on the client, although they provide a nice experience, they’re not Rich in the sense that they don’t have business logic running in the client, we’ll see later why this make the Security concerns specially different. Also other smart apps, like WinForms or WPF, present similar issues, specially when they’re using Services. Those risks are commonly over looked because ‘everything behind the firewall is safe’
  5. First of all we need a way to authenticate the users and securely exchange tokens. -ASP.NET Membership, Custom User Mechanism http://miguelmadero.blogspot.com/2008/08/using-aspnet-providers-from-silverlight.htmlWe can have security at different levels:-Server, Data and Network Security are as important as with ASP.NET and WinForms. Can’t say more. NA-Solution. At the UI we can hide, disabled certain controls based on claims. Security ADPs. Explain how cool is to use AttachedProperties. -Hack with sniffers Sniffer (http://miguelmadero.blogspot.com/2008/07/sniffers-and-silverlight.html)-Solution HTTPS? Message Level Security? -Hack. Attach Debugger and See Data. -Solution. Send only what we need. Similar to AJAX and Services in general, we should only send what we need. We can trust our app (?) but not the guys in the middle our app and server-Hack. Identity Theft-Solution. The Service should have similar validations. i.e. Can’t call a certain method. Use Attributes and AOP. Security Attributes (AOP) and PostSharp-Explain. Sensitive strings?
  6. We can’t trues anyone. We saw that UI Level Security, hidden/showing fields to protect functions and data is not enoughWe can spy the network, just as everyone in between can do it. The server. You might be sending the information to someone else (phishing). Your users are authenticated, but that’s not enough. You need to authorize them based on claims, roles or whatever. We saw that SL apps can easily be reversed engineered. Our assemblies on the server might be a bit safer (that doesn’t justify storing critical data there), it just means SL is more vulnerable.
  7. Before starting, I’ll introduce myself.