SlideShare una empresa de Scribd logo
1 de 41
HOW TO Tell if your
   designing an
 insecure website

Akash Mahajan at Meta Refresh 2013
Hasgeek Doesn’t
 Allow How-tos As           Does this
Talks But I Got In !!      bother you?
         :P




 HOW TO Tell if         your
                    designing
     an insecure website
Joke
DISCLAIMER
  Insecure
  Websites
   Design and
   UI/UX
 This is not a how to, this is
more like a series of thoughts
Effective
   Design, UI
     or UX

Talking About Effective Design
Can we say effective
      design is

Something that compels
 a user to do what the
   designer wanted?
Gmail ; A Great Example of Effective Design
Close Look at our example




 Phishing Attack or Effective Design
Even closer look at our example
             1. Favicon FTW




       2. Bookmark link
Phishing with a ph!
Salient features of effective design

Assumptions – maybe based on
data like heat maps etc.

Call to action – green button = go

Visual cues and
logos to inspire
trust
Salient features of phishing
Most people don’t

Notice what is in the

address bar




People love to fill login
forms
Address bar/URL can look like


   scheme://[login[:password]@]
   (host_name|host_address)[:po
   rt][/hierarchical/path/to/re
   source[?search_string][#frag
   ment_id]]

From Browser Security Handbook http://code.google.com/p/browsersec/wiki/Part1
Design Thinking?
Maybe Don’t Think == Impulsive

im·pul·sive /imˈp lsiv/
                ə
Adjective


Acting or done without forethought:
"young impulsive teenagers shoppers".
phish·ing
made up word

is the act of attempting to acquire
information such as usernames,
passwords, and credit card details by
masquerading as a trustworthy entity
in an electronic communication.
Effective Design/UI/UX is about generating




TRUST
People trust big shiny locks
Best piece of advice from a
    show about aliens
Two examples where this trust
 collides with effective design and
 makes the UI/UX bad for the user

1. Password Reset/Change feature
2. An SSL enabled website
How password reset should work

   akashmahajan@gmail.com
      Enter email to reset password




  YourSuperSecretPassword
What went down behind the scenes
• Code loaded in the browser sent that email to
  server.
What went down behind the scenes
• Server did bunch of things like check if email
  was in database, generated password etc.
The difficult part & UI nightmare


 How does the server know
 that it is you who filled the
email and you are the owner
   of this email address?
So how is it supposed to work?
• Using out of band communication.
• Code loaded in the browser sent that email to
  server.
And…..?
• Web server will email you a unique link.
  Hoping that the email address is in your hands

• You click on the link and go back to the server.

• Server confirms the link is proper it allows you
  to reset the password
Just FYI, that the email
 address you sent to the
server and the password
  you got back were in
       CLEARTEXT
People/stuff between you & the
                server
• Wireless Network
• Helpful IT admin monitoring for “bad traffic”
• ISP gateway with helpful IT admin
  “monitoring”
• Country level gateway with helpful govt. IT
  admin “monitoring” – Think Tunisia, Egypt, Iran
• Helpful Server admin “monitoring”
• And who knows what else is out there.
Just to recap!
•   Effective Design/UI/UX inspires trust.
•   People trust based on strong visual cues
•   These cues can be faked.
•   So ideally trust no one
•   If we use common sense approach to
    generating a new password we will need
    to trust multiple intermediaries.
So how do we create secure websites?




Finally a problem worthy of philosoraptor
HTTP + SSL/TLS = HTTPS
SSL/TLS

Encrypted Communication – Nobody
can see your message hence can’t
change it

Secure Identification of a Network –
Are you talking to the right server?
http://www.trailofbits.com/resources/creating_a_rogue_ca_cert_slides.pdf
Bad Things can Happen

Comodo an affiliate of a root CA was hacked.

DigiNotar another affiliate was hacked.

Hundreds of certificates for google, yahoo,
mozilla, MS windows update were released.
Rougue SSL Certificate
Secure By Design



Will cover this
 next year!
I don’t have any answers for
                you
• I am not a designer. I understand security in
  systems.

• I understand that people want to use systems
  to do things, not get stopped due to security
  or insecurity.

• The idea was to get your attention and see if
  these problems can be solved using design.
@makash
     Akash Mahajan
That Web Application Security Guy

Más contenido relacionado

Destacado

Venom vulnerability Overview and a basic demo
Venom vulnerability Overview and a basic demoVenom vulnerability Overview and a basic demo
Venom vulnerability Overview and a basic demoAkash Mahajan
 
I haz your mouse clicks and key strokes
I haz your mouse clicks and key strokesI haz your mouse clicks and key strokes
I haz your mouse clicks and key strokesAkash Mahajan
 
Top 10 web application security risks akash mahajan
Top 10 web application security risks   akash mahajanTop 10 web application security risks   akash mahajan
Top 10 web application security risks akash mahajanAkash Mahajan
 
Secure passwords-theory-and-practice
Secure passwords-theory-and-practiceSecure passwords-theory-and-practice
Secure passwords-theory-and-practiceAkash Mahajan
 
App sec in the time of docker containers
App sec in the time of docker containersApp sec in the time of docker containers
App sec in the time of docker containersAkash Mahajan
 
Windofarming Raspberry - Ignite Talk zur Ignite am 18.10.204 im FabLab Nürnberg
Windofarming Raspberry - Ignite Talk zur Ignite am 18.10.204 im FabLab NürnbergWindofarming Raspberry - Ignite Talk zur Ignite am 18.10.204 im FabLab Nürnberg
Windofarming Raspberry - Ignite Talk zur Ignite am 18.10.204 im FabLab NürnbergUser Centered Strategy (UCS)
 
Python crash-kurs
Python crash-kursPython crash-kurs
Python crash-kursklausbremer
 
Einfache Heimautomatisierung auf dem Raspberry Pi mit Python
Einfache Heimautomatisierung auf dem Raspberry Pi mit PythonEinfache Heimautomatisierung auf dem Raspberry Pi mit Python
Einfache Heimautomatisierung auf dem Raspberry Pi mit PythonThomas Koch
 
Raspberry Pi und Python
Raspberry Pi und PythonRaspberry Pi und Python
Raspberry Pi und PythonThomas Koch
 
Raspberry Pi - Einführung und Beispielprojekte
Raspberry Pi - Einführung und BeispielprojekteRaspberry Pi - Einführung und Beispielprojekte
Raspberry Pi - Einführung und BeispielprojektePeter Eulberg
 
Raspberry Pi im Embedded Testing - „tool“ oder „toy“?
Raspberry Pi im Embedded Testing - „tool“ oder „toy“?Raspberry Pi im Embedded Testing - „tool“ oder „toy“?
Raspberry Pi im Embedded Testing - „tool“ oder „toy“?Michel Lawaty
 
Security in the cloud Workshop HSTC 2014
Security in the cloud Workshop HSTC 2014Security in the cloud Workshop HSTC 2014
Security in the cloud Workshop HSTC 2014Akash Mahajan
 
2015 cloud trend and cloud DR
2015 cloud trend and cloud DR2015 cloud trend and cloud DR
2015 cloud trend and cloud DRbizmerce
 
Open Source Hardware. Why we do it, why it matters?
Open Source Hardware. Why we do it, why it matters?Open Source Hardware. Why we do it, why it matters?
Open Source Hardware. Why we do it, why it matters?Olimex Bulgaria
 

Destacado (18)

Venom vulnerability Overview and a basic demo
Venom vulnerability Overview and a basic demoVenom vulnerability Overview and a basic demo
Venom vulnerability Overview and a basic demo
 
I haz your mouse clicks and key strokes
I haz your mouse clicks and key strokesI haz your mouse clicks and key strokes
I haz your mouse clicks and key strokes
 
Top 10 web application security risks akash mahajan
Top 10 web application security risks   akash mahajanTop 10 web application security risks   akash mahajan
Top 10 web application security risks akash mahajan
 
Big Python
Big PythonBig Python
Big Python
 
Secure passwords-theory-and-practice
Secure passwords-theory-and-practiceSecure passwords-theory-and-practice
Secure passwords-theory-and-practice
 
App sec in the time of docker containers
App sec in the time of docker containersApp sec in the time of docker containers
App sec in the time of docker containers
 
Php security
Php securityPhp security
Php security
 
Windofarming Raspberry - Ignite Talk zur Ignite am 18.10.204 im FabLab Nürnberg
Windofarming Raspberry - Ignite Talk zur Ignite am 18.10.204 im FabLab NürnbergWindofarming Raspberry - Ignite Talk zur Ignite am 18.10.204 im FabLab Nürnberg
Windofarming Raspberry - Ignite Talk zur Ignite am 18.10.204 im FabLab Nürnberg
 
Python crash-kurs
Python crash-kursPython crash-kurs
Python crash-kurs
 
Einfache Heimautomatisierung auf dem Raspberry Pi mit Python
Einfache Heimautomatisierung auf dem Raspberry Pi mit PythonEinfache Heimautomatisierung auf dem Raspberry Pi mit Python
Einfache Heimautomatisierung auf dem Raspberry Pi mit Python
 
Raspberry Pi
Raspberry PiRaspberry Pi
Raspberry Pi
 
Raspberry Pi und Python
Raspberry Pi und PythonRaspberry Pi und Python
Raspberry Pi und Python
 
Raspberry Pi - Einführung und Beispielprojekte
Raspberry Pi - Einführung und BeispielprojekteRaspberry Pi - Einführung und Beispielprojekte
Raspberry Pi - Einführung und Beispielprojekte
 
Raspberry Pi im Embedded Testing - „tool“ oder „toy“?
Raspberry Pi im Embedded Testing - „tool“ oder „toy“?Raspberry Pi im Embedded Testing - „tool“ oder „toy“?
Raspberry Pi im Embedded Testing - „tool“ oder „toy“?
 
Security in the cloud Workshop HSTC 2014
Security in the cloud Workshop HSTC 2014Security in the cloud Workshop HSTC 2014
Security in the cloud Workshop HSTC 2014
 
2015 cloud trend and cloud DR
2015 cloud trend and cloud DR2015 cloud trend and cloud DR
2015 cloud trend and cloud DR
 
ESET - Cyber Security
ESET - Cyber SecurityESET - Cyber Security
ESET - Cyber Security
 
Open Source Hardware. Why we do it, why it matters?
Open Source Hardware. Why we do it, why it matters?Open Source Hardware. Why we do it, why it matters?
Open Source Hardware. Why we do it, why it matters?
 

Último

Presentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreterPresentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreternaman860154
 
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...Miguel Araújo
 
Exploring the Future Potential of AI-Enabled Smartphone Processors
Exploring the Future Potential of AI-Enabled Smartphone ProcessorsExploring the Future Potential of AI-Enabled Smartphone Processors
Exploring the Future Potential of AI-Enabled Smartphone Processorsdebabhi2
 
Boost PC performance: How more available memory can improve productivity
Boost PC performance: How more available memory can improve productivityBoost PC performance: How more available memory can improve productivity
Boost PC performance: How more available memory can improve productivityPrincipled Technologies
 
Tata AIG General Insurance Company - Insurer Innovation Award 2024
Tata AIG General Insurance Company - Insurer Innovation Award 2024Tata AIG General Insurance Company - Insurer Innovation Award 2024
Tata AIG General Insurance Company - Insurer Innovation Award 2024The Digital Insurer
 
2024: Domino Containers - The Next Step. News from the Domino Container commu...
2024: Domino Containers - The Next Step. News from the Domino Container commu...2024: Domino Containers - The Next Step. News from the Domino Container commu...
2024: Domino Containers - The Next Step. News from the Domino Container commu...Martijn de Jong
 
How to convert PDF to text with Nanonets
How to convert PDF to text with NanonetsHow to convert PDF to text with Nanonets
How to convert PDF to text with Nanonetsnaman860154
 
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptx
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptxEIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptx
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptxEarley Information Science
 
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdfThe Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdfEnterprise Knowledge
 
08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking Men08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking MenDelhi Call girls
 
From Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time AutomationFrom Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time AutomationSafe Software
 
Salesforce Community Group Quito, Salesforce 101
Salesforce Community Group Quito, Salesforce 101Salesforce Community Group Quito, Salesforce 101
Salesforce Community Group Quito, Salesforce 101Paola De la Torre
 
GenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day PresentationGenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day PresentationMichael W. Hawkins
 
Kalyanpur ) Call Girls in Lucknow Finest Escorts Service 🍸 8923113531 🎰 Avail...
Kalyanpur ) Call Girls in Lucknow Finest Escorts Service 🍸 8923113531 🎰 Avail...Kalyanpur ) Call Girls in Lucknow Finest Escorts Service 🍸 8923113531 🎰 Avail...
Kalyanpur ) Call Girls in Lucknow Finest Escorts Service 🍸 8923113531 🎰 Avail...gurkirankumar98700
 
08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking Men08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking MenDelhi Call girls
 
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...Igalia
 
Histor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slideHistor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slidevu2urc
 
Factors to Consider When Choosing Accounts Payable Services Providers.pptx
Factors to Consider When Choosing Accounts Payable Services Providers.pptxFactors to Consider When Choosing Accounts Payable Services Providers.pptx
Factors to Consider When Choosing Accounts Payable Services Providers.pptxKatpro Technologies
 
Breaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path MountBreaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path MountPuma Security, LLC
 
Axa Assurance Maroc - Insurer Innovation Award 2024
Axa Assurance Maroc - Insurer Innovation Award 2024Axa Assurance Maroc - Insurer Innovation Award 2024
Axa Assurance Maroc - Insurer Innovation Award 2024The Digital Insurer
 

Último (20)

Presentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreterPresentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreter
 
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
 
Exploring the Future Potential of AI-Enabled Smartphone Processors
Exploring the Future Potential of AI-Enabled Smartphone ProcessorsExploring the Future Potential of AI-Enabled Smartphone Processors
Exploring the Future Potential of AI-Enabled Smartphone Processors
 
Boost PC performance: How more available memory can improve productivity
Boost PC performance: How more available memory can improve productivityBoost PC performance: How more available memory can improve productivity
Boost PC performance: How more available memory can improve productivity
 
Tata AIG General Insurance Company - Insurer Innovation Award 2024
Tata AIG General Insurance Company - Insurer Innovation Award 2024Tata AIG General Insurance Company - Insurer Innovation Award 2024
Tata AIG General Insurance Company - Insurer Innovation Award 2024
 
2024: Domino Containers - The Next Step. News from the Domino Container commu...
2024: Domino Containers - The Next Step. News from the Domino Container commu...2024: Domino Containers - The Next Step. News from the Domino Container commu...
2024: Domino Containers - The Next Step. News from the Domino Container commu...
 
How to convert PDF to text with Nanonets
How to convert PDF to text with NanonetsHow to convert PDF to text with Nanonets
How to convert PDF to text with Nanonets
 
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptx
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptxEIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptx
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptx
 
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdfThe Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
 
08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking Men08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking Men
 
From Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time AutomationFrom Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time Automation
 
Salesforce Community Group Quito, Salesforce 101
Salesforce Community Group Quito, Salesforce 101Salesforce Community Group Quito, Salesforce 101
Salesforce Community Group Quito, Salesforce 101
 
GenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day PresentationGenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day Presentation
 
Kalyanpur ) Call Girls in Lucknow Finest Escorts Service 🍸 8923113531 🎰 Avail...
Kalyanpur ) Call Girls in Lucknow Finest Escorts Service 🍸 8923113531 🎰 Avail...Kalyanpur ) Call Girls in Lucknow Finest Escorts Service 🍸 8923113531 🎰 Avail...
Kalyanpur ) Call Girls in Lucknow Finest Escorts Service 🍸 8923113531 🎰 Avail...
 
08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking Men08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking Men
 
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...
 
Histor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slideHistor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slide
 
Factors to Consider When Choosing Accounts Payable Services Providers.pptx
Factors to Consider When Choosing Accounts Payable Services Providers.pptxFactors to Consider When Choosing Accounts Payable Services Providers.pptx
Factors to Consider When Choosing Accounts Payable Services Providers.pptx
 
Breaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path MountBreaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path Mount
 
Axa Assurance Maroc - Insurer Innovation Award 2024
Axa Assurance Maroc - Insurer Innovation Award 2024Axa Assurance Maroc - Insurer Innovation Award 2024
Axa Assurance Maroc - Insurer Innovation Award 2024
 

How to tell if your designing an insecure website

  • 1. HOW TO Tell if your designing an insecure website Akash Mahajan at Meta Refresh 2013
  • 2. Hasgeek Doesn’t Allow How-tos As Does this Talks But I Got In !! bother you? :P HOW TO Tell if your designing an insecure website
  • 4. DISCLAIMER Insecure Websites Design and UI/UX This is not a how to, this is more like a series of thoughts
  • 5. Effective Design, UI or UX Talking About Effective Design
  • 6. Can we say effective design is Something that compels a user to do what the designer wanted?
  • 7. Gmail ; A Great Example of Effective Design
  • 8. Close Look at our example Phishing Attack or Effective Design
  • 9. Even closer look at our example 1. Favicon FTW 2. Bookmark link
  • 11. Salient features of effective design Assumptions – maybe based on data like heat maps etc. Call to action – green button = go Visual cues and logos to inspire trust
  • 12. Salient features of phishing Most people don’t Notice what is in the address bar People love to fill login forms
  • 13. Address bar/URL can look like scheme://[login[:password]@] (host_name|host_address)[:po rt][/hierarchical/path/to/re source[?search_string][#frag ment_id]] From Browser Security Handbook http://code.google.com/p/browsersec/wiki/Part1
  • 15. Maybe Don’t Think == Impulsive im·pul·sive /imˈp lsiv/ ə Adjective Acting or done without forethought: "young impulsive teenagers shoppers".
  • 16. phish·ing made up word is the act of attempting to acquire information such as usernames, passwords, and credit card details by masquerading as a trustworthy entity in an electronic communication.
  • 17. Effective Design/UI/UX is about generating TRUST
  • 18. People trust big shiny locks
  • 19. Best piece of advice from a show about aliens
  • 20. Two examples where this trust collides with effective design and makes the UI/UX bad for the user 1. Password Reset/Change feature 2. An SSL enabled website
  • 21. How password reset should work akashmahajan@gmail.com Enter email to reset password YourSuperSecretPassword
  • 22. What went down behind the scenes • Code loaded in the browser sent that email to server.
  • 23. What went down behind the scenes • Server did bunch of things like check if email was in database, generated password etc.
  • 24. The difficult part & UI nightmare How does the server know that it is you who filled the email and you are the owner of this email address?
  • 25. So how is it supposed to work? • Using out of band communication. • Code loaded in the browser sent that email to server.
  • 26. And…..? • Web server will email you a unique link. Hoping that the email address is in your hands • You click on the link and go back to the server. • Server confirms the link is proper it allows you to reset the password
  • 27. Just FYI, that the email address you sent to the server and the password you got back were in CLEARTEXT
  • 28. People/stuff between you & the server • Wireless Network • Helpful IT admin monitoring for “bad traffic” • ISP gateway with helpful IT admin “monitoring” • Country level gateway with helpful govt. IT admin “monitoring” – Think Tunisia, Egypt, Iran • Helpful Server admin “monitoring” • And who knows what else is out there.
  • 29. Just to recap! • Effective Design/UI/UX inspires trust. • People trust based on strong visual cues • These cues can be faked. • So ideally trust no one • If we use common sense approach to generating a new password we will need to trust multiple intermediaries.
  • 30. So how do we create secure websites? Finally a problem worthy of philosoraptor
  • 31.
  • 32. HTTP + SSL/TLS = HTTPS
  • 33. SSL/TLS Encrypted Communication – Nobody can see your message hence can’t change it Secure Identification of a Network – Are you talking to the right server?
  • 35. Bad Things can Happen Comodo an affiliate of a root CA was hacked. DigiNotar another affiliate was hacked. Hundreds of certificates for google, yahoo, mozilla, MS windows update were released.
  • 37.
  • 38.
  • 39. Secure By Design Will cover this next year!
  • 40. I don’t have any answers for you • I am not a designer. I understand security in systems. • I understand that people want to use systems to do things, not get stopped due to security or insecurity. • The idea was to get your attention and see if these problems can be solved using design.
  • 41. @makash Akash Mahajan That Web Application Security Guy

Notas del editor

  1. Talk about KSRTC person using the computer to go to googleTyped google in the address barClicked on Google.co.in when the results were displayed.Typed KSRTC in the google.co.in search boxClicked on KSRTC link, which was the 1st search result.
  2. Google for TabNabber
  3. http://www.trailofbits.com/resources/creating_a_rogue_ca_cert_paper.pdf