Главная
Study mode:
on
1
Intro
2
Summary
3
Recap: How do CSP Nonces Work?
4
Recap: What is 'strict-dynamic'?
5
CSP Support in Core Frameworks
6
One Policy to Rule Them All!
7
Closure Templates with auto-noncing
8
SHIP IT !!1
9
New 'report-sample' keyword
10
Report Noise
11
CSP Mitigator
12
CSP Evaluator
13
CSP Frontend
14
Detailed CSP Violation Reports View
15
Measuring Coverage
16
Injection of
17
Steal and Reuse Nonces
18
Mitigating Bypasses
19
JS Framework/Library CSP Bypasses
20
jQuery 2.x Script Evaluation Logic
21
Wrapping Up
Description:
Explore the flaws in Content Security Policy's whitelist-based approach and discover an alternative using 'strict-dynamic' with nonces or hashes in this 35-minute conference talk from AppSec EU 2017. Learn about the implementation of effective policies in major Google products like Gmail and Photos. Gain insights into best practices, common pitfalls, and strategies for addressing recent bypasses of nonce-based policies. Delve into topics such as CSP support in core frameworks, auto-noncing with Closure Templates, and tools like CSP Mitigator and Evaluator. Understand the challenges of nonce exfiltration, reuse techniques, and dangling markup attacks while exploring detailed CSP violation reports and measuring coverage.

Content Security Policy Evolution: From Whitelists to Strict-Dynamic - AppSec EU 2017

OWASP Foundation
Add to list