Главная
Study mode:
on
1
Intro
2
ANGULAR APPLICATIONS RUN WITHIN THE BROWSER
3
CROSS-SITE SCRIPTING (XSS)
4
XSS REFRESHER
5
SERVER-SIDE DEFENSES AGAINST XSS
6
RESPECT THE AUTHORITY OF THE SANITIZER
7
SESSION MANAGEMENT IN THREE PROPERTIES
8
COOKIE FLAGS PATCH COOKIE BEHAVIOR
9
COOKIE PREFIXES TAKE IT A STEP FURTHER
10
THE UNDERESTIMATED THREAT OF CSRF
11
THE ESSENCE OF CSRF
12
TAKING CONTROL OF YOUR HOME NETWORK WITH CSRF
13
DEFENDING AGAINST CSRF ATTACKS
14
TRANSPARENT TOKENS AGAINST CSRF ATTACKS
15
ANGULARJS SUPPORTS TRANSPARENT TOKENS BY DEFAULT
16
THE SAMESITE COOKIE ATTRIBUTE
17
THE RESURRECTION OF THE AUTHORIZATION HEADER
18
ADOING THE AUTHORIZATION HEADER IN ANGULARUS
19
STORING SESSION DATA IN THE BROWSER
20
THE AUTHORIZATION HEADER VS COOKIES
21
JWTS ARE YOUNG, AND SUFFER FROM GROWING PAINS
Description:
Explore the security aspects of Angular applications in this comprehensive conference talk from AppSec EU 2017. Learn about the paradigm shift from server-side to client-side applications and its impact on security. Discover script-based threats against Angular applications and the concrete defenses Angular offers to prevent or minimize these attacks. Dive into various session management problems in combination with Angular, investigating topics such as Cross-Site Request Forgery (CSRF), cookie flags, Authorization headers, and JWT tokens. Gain a solid understanding of security threats against Angular applications and acquire concrete knowledge on how to use the latest security technologies to effectively secure your Angular applications against these threats.

Boosting the Security of Angular Applications

OWASP Foundation
Add to list
0:00 / 0:00