Web Application Security: ISACA Bangalore Chapter Aug 2007 Runa Dwibedi
Web Application Security: ISACA Bangalore Chapter Aug 2007 Runa Dwibedi
Web Application Security: ISACA Bangalore Chapter Aug 2007 Runa Dwibedi
An adversary could:
Client-side validation
Breach business rules
SQL Injection
XPATH Injection
Input Validation - Audit Checklist
Image
Display a distorted text image
Knowledge
Pose a question “ What is the color of the sky?”
Arithmetic
Pose a question “ What is 34 +15?”
How to implement a CAPTCHA
• PWntcha, http://sam.zoy.org/pwntcha/
• LanAp BotDetect,
http://www.lanapsoft.com/products.html
Audit Logs
Audit logs
Threat
Modeling
Evaluate against
Threat model
Phase1:Threat Profile