security hole #18 - security matters

24
dddd

Upload: igor-beliaiev

Post on 16-Apr-2017

56 views

Category:

Technology


0 download

TRANSCRIPT

Page 1: Security Hole #18 - Security Matters

dddd

Page 2: Security Hole #18 - Security Matters
Page 3: Security Hole #18 - Security Matters

We are small company

We don’t have anything important

We don’t have payments

Nobody would hack us

Page 4: Security Hole #18 - Security Matters

All about money

The question is not IF hackedThe Question is WHEN

Page 5: Security Hole #18 - Security Matters

Consequences of Security FAILURE

TrustMoney

Datastolen

Timeto recover

Penaltiesfor

incident

Customers

Reputation

Page 6: Security Hole #18 - Security Matters
Page 7: Security Hole #18 - Security Matters

Let’s go deeper

Page 8: Security Hole #18 - Security Matters

Non-critical application

Page 9: Security Hole #18 - Security Matters

Scanners win!

Page 10: Security Hole #18 - Security Matters

Or no?

Page 11: Security Hole #18 - Security Matters

Restrictions

Page 12: Security Hole #18 - Security Matters

But…let’s come back to registration page

Page 13: Security Hole #18 - Security Matters

But…let’s come back to registration page

Page 14: Security Hole #18 - Security Matters

Clientside restrictions bypass

Page 15: Security Hole #18 - Security Matters

Clientside restrictions bypass

Page 16: Security Hole #18 - Security Matters

alert(‘win’)

Page 17: Security Hole #18 - Security Matters

XSS can do more

Page 18: Security Hole #18 - Security Matters

XSS can do more

Page 19: Security Hole #18 - Security Matters

and even more

Page 20: Security Hole #18 - Security Matters

And the most interesting part

Page 21: Security Hole #18 - Security Matters

Database access

Page 22: Security Hole #18 - Security Matters

Changing admin password

Page 23: Security Hole #18 - Security Matters

Skype: ghost-bel

Page 24: Security Hole #18 - Security Matters

OWASP Lviv Team