| (B) 0900 - 1230 |
Introduction and adaptation of new technologies like Ajax, Rich Internet Applications and
Web Services has changed the dimension of Application Hacking. We are witnessing new ways
of hacking web based applications and it needs better understanding of technologies to
secure applications. The only constant in this space is change.
In this dynamically changing scenario in the era of Web 2.0 it is important to understand
new threats that emerge in order to build constructive strategies to protect corporate
application assets. Application layers are evolving and lot of client side attack vectors
are on the rise like Ajax based XSS, CSRF, Widget injections, RSS exploits, Mashup manipulations
and client side logic exploitations. At the same time various new attack vectors are evolving
around SOA by attacking SOAP, XML-RPC and REST. It is time to understand these advanced attack
vectors and defense strategies.
The course is designed by the author of "Web Hacking: Attacks and Defense", "Hacking Web
Services" and "Web 2.0 Security – Defending Ajax, RIA and SOA" bringing his experience in
application security and research as part of curriculum to address new challenges.
Application Hacking is hands-on class. The class features real life cases, hands one
exercises, new scanning tools and defense mechanisms. Participants would be methodically
exposed to various different attack vectors and exploits. In the class instructor will
explain new tools like wsScanner, scanweb2.0, AppMap, AppCodeScan etc. for better pen-testing
and application audits.
We are going to address following topics in detail:
- Application security fundamentals: Application evolution, Web 2.0 framework, Layered threats, Threat models, Attack vectors and Hacker’s perspective.
- Application infrastructure overview: Protocols (HTTP/SSL), SOAP, XML-RPC, REST, Tools for analysis, Server layers and Browsers with plugins.
- Application Architecture: Overview to .NET and J2EE application frameworks, Web 2.0 application architecture, Widgets framework,
Application layers and components, Resources and interactions,other languages.
- Application attack vectors and detail understanding: SQL injection, Cross Site Scripting (XSS), Cross Site Request Forgery
(CSRF), Path traversal, Session hijacking, LDAP/XPATH/Command injection, Buffer overflow, Input validation bypassing, Database hacks and Blind SQL injections.
- Application methodologies: Blackbox /Whitebox approaches, tools, techniques and little tricks
- Fingerprinting: Web and Application server, Ajax framework, Flash based application and technology fingerprinting.
- Web Fuzzing: Fuzzing XML, JSON, RPCs etc. for vulnerability detection.
- Scanning for vulnerabilities through Source: Function and Method signature mapping, entry point identification, data access layer calls, tracing variables and functions.
- Applying validations: Input validations, Output validations, Data access filtering, and Authentication validates.
Web Application Firewall: Advanced content filtering by tools and techniques.
|
Shreeraj Shah
CEO, Blueinfy
|
| (A) 1330 - 1700 |
Workshop description:
Wireless security has been questioned a lot in the past few months, with multiple,
somehow contradictory claims that WPA was broken. As a consequence, it is less and
less clear if Wi-Fi can be secured or not, and if yes, how.
This workshop will give you a very clear picture of wireless security actual state,
comprehensively describing Wi-Fi security mechanisms, as well as limitations, known
attacks impacts and mitigation, challenging some claims that have been made. At the
end, you will have a clear picture on the efficiency of the available Wi-Fi security
feature and the best way to deploy them within your environment.
Keywords:
Wi-Fi security, WEP, WPA, WPA2, 802.11i, PSK, 802.1x, EAP, TKIP, CCMP, WEP cracking, PSK brute-forcing, TKIP flaw
Outline:
- Security means and limitations
- WEP
- WPA/WPA2
- Misc. : MAC filter, SSID cloaking, etc.
- Attacks
- DoS
- WEP cracking in 2009
- PSK brute-forcing
- TKIP attack
- Wi-Fi secure deployment best practises
|
Cedric Blancher
EADS
|