Upgrade to Pro — share decks privately, control downloads, hide ads and more …

From the Crypt to the Code

From the Crypt to the Code

A cryptic videotape haunting its viewers, a shape-shifting entity haunting a research station, or an astronaut unknowingly carrying an alien onto a spaceship —do these scenarios sound familiar? These horror movie plots share similarities with scenarios in web security you have already encountered.

Join me on a chilling journey through web security as we explore the most common vulnerabilities through the lens of horror movies. From the sinister injection flaws reminiscent of "Alien" to the terrifying specter of broken authentication akin to "Unfriended". But don't worry, we'll also shed light on solutions in web development, turning these security nightmares into tales of triumph. If you dare, join us and learn how to conquer the darkness invited by your web applications.

Ramona Schwering

November 24, 2024
Tweet

More Decks by Ramona Schwering

Other Decks in Technology

Transcript

  1. Deny by default Rate limit API and controller access Invalidate

    stateful session identifiers Implement and reuse access control mechanisms
  2. Classify data processed, stored, or transmitted Don't store sensitive data

    unnecessarily Don‘t cache sensitive responses Encrypt all sensitive data
  3. Classify data processed, stored, or transmitted Don't store sensitive data

    unnecessarily secure, strong & up-to-date protocols Don‘t cache sensitive responses Encrypt all sensitive data
  4. Remove ununsed dependencies etc. Inventory of all version numbers Obtain

    from official sources & secure links Monitor if library get unmaintained
  5. Remove ununsed dependencies etc. Inventory of all version numbers Obtain

    from official sources & secure links Monitor if library get unmaintained
  6. Stay as a team Take care of your batteries Double-check

    if the killer was defeated Take your prof‘s OWASP‘s advice seriously