Upgrade to Pro
— share decks privately, control downloads, hide ads and more …
Speaker Deck
Features
Speaker Deck
PRO
Sign in
Sign up for free
Search
Search
Web Vulnerabilities: A Field Guide
Search
Sponsored
·
SiteGround - Reliable hosting with speed, security, and support you can count on.
→
Ruan Brandão
February 08, 2019
Technology
160
0
Share
Web Vulnerabilities: A Field Guide
Slides for the talk presented at RubyFuza & Friends 2019.
Ruan Brandão
February 08, 2019
More Decks by Ruan Brandão
See All by Ruan Brandão
Top 10 OWASP: As maiores ameaças para sua aplicação web
ruanbrandao
0
33
Desenvolvimento de jogos com Elixir
ruanbrandao
0
45
Algoritmos Racistas
ruanbrandao
0
110
Software Ethics
ruanbrandao
2
380
Narrativas no Desenvolvimento de Software
ruanbrandao
0
300
Ética no Desenvolvimento de Software
ruanbrandao
4
930
Aplicando o Método Científico no Desenvolvimento de Software
ruanbrandao
2
290
Internet Personalizada
ruanbrandao
0
74
Other Decks in Technology
See All in Technology
全社統制を維持しながら現場負担をどう減らすか〜プラットフォームチームとセキュリティチームで進めたSecurity Hub活用によるAWS統制の見直し〜/secjaws-security-hub-custom-insights
mhrtech
1
600
AI全盛の今だからこそ、あえてもう一度振り返るAPIの基礎
smt7174
3
130
エンタープライズの厳格な制約を開発者に意識させない:クラウドネイティブ開発基盤設計/cloudnative-kaigi-golden-path
mhrtech
0
460
TypeScript の型で副作用の実行順序を制御する
yanaemon
0
100
Terragrunt x Snowflake + dbt で作るマルチテナントなデータ基盤構築プラットフォーム
gak_t12
0
490
20260515 ログイン機能だけではないアカウント管理を全体で考える~サービス設計者向け~
oidfj
1
830
Loadbalancing exporter internals
ymotongpoo
1
110
JTCでRedmine利用者2700人を実現した手法 第二部
nobuonakamura
0
140
AI対話分析の夢と、汚いデータの現実 Looker / Dataplex / Dataform で実現する品質ファーストな基盤設計
waiwai2111
0
660
Gaussian Splattingの表現力を拡張する — 高周波再構成とインタラクションへのアプローチ —
gpuunite_official
0
190
実践 TanStack Start ― 新規プロダクトを開発して確立した、サーバーとクライアント境界の設計パターン / Practical TanStack Start Server-Client Boundary Patterns
kaminashi
1
110
"スキルファースト"で作る、AIの自走環境
subroh0508
0
610
Featured
See All Featured
A designer walks into a library…
pauljervisheath
211
24k
ピンチをチャンスに:未来をつくるプロダクトロードマップ #pmconf2020
aki_iinuma
128
55k
AI: The stuff that nobody shows you
jnunemaker
PRO
7
640
Designing Dashboards & Data Visualisations in Web Apps
destraynor
231
54k
Crafting Experiences
bethany
1
150
The Director’s Chair: Orchestrating AI for Truly Effective Learning
tmiket
1
170
Navigating the Design Leadership Dip - Product Design Week Design Leaders+ Conference 2024
apolaine
1
310
Are puppies a ranking factor?
jonoalderson
1
3.4k
The Myth of the Modular Monolith - Day 2 Keynote - Rails World 2024
eileencodes
28
3.5k
[RailsConf 2023] Rails as a piece of cake
palkan
59
6.6k
Jess Joyce - The Pitfalls of Following Frameworks
techseoconnect
PRO
1
150
B2B Lead Gen: Tactics, Traps & Triumph
marketingsoph
0
120
Transcript
GOOD MORNING RUBYFUZA ☕
RUAN BRANDÃO SOFTWARE ENGINEER AT MAGNETIS (WE ARE HIRING) TWITTER
TIMELINE CURATOR @RUANBRANDAO /RUAN-BRANDAO
Photo by Rafaela Biazi on Unsplash
São Paulo
Paulínia - São Paulo
Pipa - Rio Grande do Norte
Made in "
CYBER ATTACKS
WEB VULNERABILITIES A FIELD GUIDE FOR
THE WEB HTTP HTTPS TLS SSL Databases Servers Credentials TCP/IP
DNS Clusters Cache Browsers
USING COMPONENTS WITH KNOWN VULNERABILITIES
None
UPDATE YOUR APPLICATION DEPENDENCIES Security tip #1
INJECTION ‣ SQL ‣ NOSQL ‣ CODE ‣ COMMANDS
INJECTION VULNERABILITIES ALLOW ATTACKERS TO RUN CODE ON YOUR APPLICATION
SERVERS
SQL INJECTION
XKCD, available at https://xkcd.com/327/
None
BE CAREFUL WITH THE ORDER METHOD
CODE INJECTION & COMMAND INJECTION
BE EXTRA CAREFUL WITH EVAL AND BACKTICKS
BE CAREFUL WITH CONSTANTIZE
CROSS SITE SCRIPTING (XSS)
CROSS SITE SCRIPTING ALLOWS ATTACKERS TO RUN CODE ON YOUR
APPLICATION USERS BROWSERS
None
None
None
RAILS DOES THE HARD WORK
BE CAREFUL WITH THE RAW AND HTML_SAFE
NEVER TRUST USER INPUT Security tip #2
BROKEN ACCESS CONTROL
None
None
None
None
BE CAREFUL WITH ACCESS TO SENSIBLE DATA Security tip #3
BROKEN AUTHENTICATION
DO NOT REINVENT THE WHEEL. UNLESS YOU REALLY, REALLY, KNOW
WHAT YOU ARE DOING. Security tip #4
AND MUCH MORE… ‣ CROSS-SITE REQUEST FORGERY (CSRF) ‣ REMOTE
CODE EXECUTION (RCE) ‣ SENSITIVE DATA EXPOSURE ‣ SECURITY MISCONFIGURATION
None
Photo by Patrick Tomasso on Unsplash
https://owasp.org
None
Photo by Barn Images on Unsplash
STATIC CODE ANALYSIS
None
TOOLS STATIC CODE ANALYSIS TOOLS
TOOLS STATIC CODE ANALYSIS TOOLS
TOOLS STATIC CODE ANALYSIS TOOLS GitHub - Available at https://github.blog/2017-10-11-a-more-connected-universe/
SECURITY SCANNERS
TOOLS SECURITY SCANNER TOOLS http://www.arachni-scanner.com/
PENETRATION TESTS (PENTESTS)
SECURITY IS NOT A PRODUCT. SECURITY IS AN ONGOING PROCESS.
Security tip #0
THANK YOU! ❤ @RUANBRANDAO /RUAN-BRANDAO