Главная
Study mode:
on
1
Hi my name is Rich
2
Background
3
What is the same origin policy?
4
Same Origin Policy CSRF Quirks
5
Which Same Origin Policy?
6
Cookie Scope
7
Useful Cookie Facts
8
Recap: Writing Cookies
9
Double Submit Cookies
10
Framework Weaknesses
11
Cookies Apply to other CSRF Things!
12
NET MVC CSRF Protection
13
Other Frameworks
14
Single Sign On
15
How do we mitigate?
16
Tying Accounts Together
17
Attack Ideas
18
OAuth2 Facebook Attack
19
OAuth2 Attack
20
Logging into an Attacker Account
21
Attack Rating
22
A lot of custom Logic too
23
How do we fix this?
24
Practical CSRF Tips
25
"In-your-face" CSRF
26
Crashing Browsers
27
Logging out of Attacker Account
28
CSRF Protected POST XSS
29
"Non-Exploitable" XSS example
30
Generic Takeaways
31
Whitepaper Content
Description:
Explore the complexities and pitfalls of the same origin policy in this Black Hat EU 2013 conference talk. Delve into practical examples of attacks occurring between browser tabs, examining scenarios where common content-isolation mechanisms fail to protect against CSRF, clickjacking, and NTLM attacks. Learn about the challenges in completely mitigating these vulnerabilities, including cookie scope issues, framework weaknesses, and single sign-on complications. Discover practical CSRF tips, unconventional attack ideas, and strategies for improving web application security. Gain insights into OAuth2 vulnerabilities, browser manipulation techniques, and the importance of thorough security implementation in web frameworks.

The Deputies Are Still Confused

Black Hat
Add to list