Главная
Study mode:
on
1
Intro
2
Not like Syntax Errors
3
Windows XP
4
Session State
5
Session Tokens
6
What are the threats
7
Key spaces
8
Passwords
9
Session Attacks
10
Token Creation
11
Dynamic Token
12
User Number
13
Token
14
Lucky Monkey
15
Lucky Monkey Values
16
PEPSI
17
HTTP Request
18
Confidentiality
19
Encoding
20
Session Management
21
Summary
22
Phase Space Analysis
23
Key Management
24
Web Servers
25
PHP
26
Java
27
Session Tokens and Cookies
28
Session Expiration
29
Model User Behavior
30
Data Security
31
Quick Summary
Description:
Explore web application security in this Black Hat USA 2004 conference talk focusing on session strength. Delve into various aspects of session management, including session states, tokens, and potential threats. Examine key spaces, password security, and session attacks. Learn about token creation, dynamic tokens, and user number tokens. Investigate the "Lucky Monkey" concept and its values. Analyze HTTP requests, confidentiality, and encoding techniques. Gain insights into session management best practices, phase space analysis, and key management. Discover how different web servers and programming languages like PHP and Java handle session tokens and cookies. Understand the importance of session expiration and modeling user behavior. Conclude with a comprehensive overview of data security in web applications.

Web Application Session Strength

Black Hat
Add to list
0:00 / 0:00