Input Validation For Free Text Fields

Size: px
Start display at page:

Download "Input Validation For Free Text Fields"

Transcription

1 Input Validation For Free Text Fields User Manual Project Members: Hagar Offer & Ran Mor Academic Advisor: Dr Gera Weiss Technical Advisors: Raffi Lipkin & Nadav Attias 1

2 Table of Contents 1 Introduction Main Window Overview Main Functionalities New Field Using Regular Expression New Field Using State - Machine The upper menu Learning Using Positive/ Non Positive Engine Learning Using Positive Engine Validate Categories Functionality Export Database To Other Project Functionality Import The Validation System To External Project Additional General Functionalities Deleting Category From The System Edit Regular Expression Category Upper Menu

3 1 Introduction The main goal of our project is to prevent script injection through free text fields. It deals mainly with XSS - Cross-site scripting which is a type of computer security vulnerability typically found in web applications that enables malicious attackers to inject client-side script into web pages viewed by other users. Companies in the market uses web applications to serve their clients. Many of these applications accept free-text fields. Our project goal is to stop such an application from accepting malicious script in this type of field. Malicious script that has not been blocked can lead to several major problems: Usually it will be stored in the database of the company. Then probably it will be pulled out and an application will run this script. It can either harm other systems inside the company or a browser of a client will run this script and harm the client's computer/systems. An attacker can gain elevated access privileges to sensitive page content, session cookies, and a variety of other information maintained by the browser. There is another solution called Escaping (aka Output Encoding). Escaping is a technique used to ensure that characters are treated as data, not as characters that are relevant to the interpreter's parser. In this way the browser will know not to run the malicious code. However, companies do not want to have malicious scripts in their database, as not all web applications using this database are controlled by the company and therefore they cannot be assured that the client browser supports this feature. For big companies that serve clients it is very important to block malicious scripts from getting inside the system since once the client got hurt, he does not care what the reason is. From the client's point of view, the full responsibility imposed upon the company. The system has two main aspects: 1. Managing the system: through the GUI window. Allowing the user to manage the database, adding new regular expressions, using the state machine functionalities and learning engines. 2. Using the database in external systems to protect web applications. Through built-in functions inside our systems. 3

4 The verification process can be done in three different ways: 1. Verification using regular expressions. 2. Verification using state machine functionalities. 3. Verification using learning engines. (Positive and negative inputs engine as well as just positive inputs engine). 4

5 2 Main Window Overview Zone 1 Zone 2 Zone 3 The main window provides easy and fast way to manage the system. Including, database operations, training operations (regular expression, state machines, learning engines etc.), export function and quick overview of the current database. Zone 1: this area contains all the main functionalities of the system. It has a button for every functionality. When a user clicks on one of the buttons, the functionality process and windows will open in zone 3 which is the main panel. Zone 2: this area contains all the categories that currently in the system's database. It is divided into three main top categories, each describes the verification tool that has been used for this category. Zone 3: this area is the main panel of the system. 5

6 3 Main Functionalities 3.1 New Field Using Regular Expression The functionality enables the user to insert new categories into the database, along with the matching regular expressions. First, the user has to type the name of the new category he wants to create. Second, he has to type the corresponding regular expression. Then, the user has to decide if the regular expression that was typed is an accepted language, meaning - the system will accept text that matches the regular expression, or a denied language, meaning - the system will deny text that doesn t match the regular expression. In order to finish this operation the user chooses the OK button. If the process completed successfully, the new category will be added to the database, and an additional message will be displayed. 6

7 3.2 New Field Using State - Machine This functionality also enables the user to insert new categories into the database, along with the matching regular expressions. However, this way provides a more intuitive and convenient way to create the regular expression, by drafting of an automaton, and then inverting it into a regular expression. First, the user has to draw an automaton, using the toolbar in the top-left side of the screen. Attribute Editor State Creator Trasition Creator Deleter Undoer After the user finished drawing the automaton, he has to choose in the top toolbar the option of Convert -> Convert FA to RE. Now, the system will offer repairs to the automaton. In order to perform them automatically the user has to choose the Do It button. Then the automaton s matching regular expression will appear. 7

8 In this point, in order to add this regular expression into the system s database, the user has to choose the New Field button. The screen of adding new regular expression will appear, along with the regular expression in the corresponding field. The user now has to follow the previous section steps in order to finish the operation The upper menu File ->Save / Save as: If the user doesn t want to add the regular expression into the system s database, but he wants to save his automaton, he can do it with these buttons. File -> Open: By choosing this option, the user will be able to re-open his saved automaton. File -> Save Image As: Choosing this option will save the automaton as image (JPG, PNG, GIF, BMP). File -> Print: Choosing this option will print the automaton. 8

9 3.3 Learning Using Positive/ Non Positive Engine This functionality trains the learning engine which uses positive and non-positive inputs in order to perform the learning process. In step 1, the user needs to choose whether he wants to add new category to the system, or training existing category. If the user enters string to the "Add New Category" text field, then new category will be created in the system and the learning database and operations will be associated to this specific category. If the user selects existing category from the "Select Existing Category" scroll menu, then the learning database and operations will be associated to existing category in the system. Important note: in this functionality, if the user decides to train category that already exists in the system, the new learning database will be added to the existing learning database of the category. 9

10 In step 2, the user needs to choose using the file browser text file with the positive words database. The words within the text file should be separated with spaces. In step 3, similar to step 2, the user needs to choose using the file browser text file with the non positive words database. The words within the text file should be separated with spaces. After step 3 finished, the engine learned the positive and non-positive databases from the text files and all the data and the associated training files is now stored in the database. 10

11 If the training process completed successfully, additional message will be displayed. Otherwise, an error message indicating the problem will be displayed. 3.4 Learning Using Positive Engine This functionality trains the learning engine which uses positive inputs only in order to perform the learning process. In step 1, the user needs to choose whether he wants to add new category to the system, or training existing category. 11

12 If the user enters string to the "Add New Category" text field, then new category will be created in the system and the learning database and operations will be associated to this specific category. If the user selects existing category from the "Select Existing Category" scroll menu, then the learning database and operations will be associated to existing category in the system. Important note: in this functionality, if the user decides to train category that already exists in the system, the new learning database will delete the existing learning database and create new learning database for the category. In step 2, the user needs to choose using the file browser text file with the positive words database. The words within the text file should be separated with spaces. After step 2 finished, the engine learned the positive database from the text file and all the data and the associated training files is now stored in the database. If the training process completed successfully, additional message will be displayed. Otherwise, an error message indicating the problem will be displayed. 12

13 3.5 Validate Categories Functionality The functionality enables the user to check the efficiency of one or more categories that already exists in the system. First, the user has to choose the desired category to be checked. Second, the user typing or pasting text to the text area. This text will be verified according to the method that had been used to train the specific category (regular expression, state machine, learning engines). After the users choose category and typed in text to validate, the "Validate" button will trigger the process of verification. The system will automatically recognize the right verification method for the category and validate the typed in text. An answer is displayed indicating whether the text is safe or not safe for use. 13

14 3.6 Export Database To Other Project Functionality The functionality enables the user to export the current database to a selected path in the hard drive. This action performed in order to update an external program that uses the validating system with up to date database. This is part of using the validating system in an external system. (For more details see section 4). The user needs to choose destination directory for the export. After the process finished. The database (XML files) created in the destination folder of the external system. Now the external system using the validation tools are up to date with the latest categories that were added to the system. 14

15 4 Import The Validation System To External Project The main goal of the system is to validate free text fields in already existing (or external) projects. In order to perform these tasks, three main operations need to be performed: 1. The system must contain categories that have been added to the system using the main GUI window. Each category uses different method for the validation process according to its type (regular expression, state machine, learning using positive nonpositive inputs and learning using positive inputs). 2. The validation system is a JAR file. The JAR file must be included in the destination project as an external JAR in the project build path. (Then all the public functions from the validating system can be used). 3. The database of the validating system must be exported into the library of the external project. (as explained in section 3.6) After the aforementioned steps have been made, the public functions of the validating system can be used. The validating system contains class named "Protect". Using the function validate from this class the validation can be performed in any external project. In details, in order to use the "Protect" class in an external project, the following steps must be taken: 1. In the destination class (that within it the validate function will be used), the package "protection" needs to be included using the command "import protection;" 2. New object of type "Protect" needs to be initialized using the command "Protect nameofobject = new Protect();" 3. Using the validate function with the command nameofobject.validate(categoryname, texttovalidate); where categoryname is the name of the desired category (the text will be verified according to the category training method). texttovalidate is the free text that was typed in to the free text filed and needs to be validated. The validate function returns Boolean (true, false) answer indicating whether the text is safe or not. Note: the aforementioned commands refer to Java program language. The above steps allowing the user to use the validation database in any other project that free text filed validation is required. 15

16 5 Additional General Functionalities 5.1 Deleting Category From The System In Zone 2 the user can view all the categories in the system. (See section 2 for details) By right click on one of the categories, new menu opens. The user can select the "delete" button and the selected category will be deleted from the system. 5.2 Edit Regular Expression Category In Zone 2 the user can view all the categories in the system. (See section 2 for details) By right click on one of the categories, new menu opens. The user can select the "edit" button and then edit the regular expression associated with the selected category. 16

17 In the following window, the user inserts new regular expression describing the category and the system update the database. 17

18 5.3 Upper Menu *The upper menu contains the "File" and "Help" sub menus. The File Menu: using this menu the user can close the system (by clicking the "Exit" button) and the system will save all the data and then close. The Help Button: the help button contains two links: o The first link is for the user manual document. o The second link is for the video tutorial. *The Save Work Button: this button allows the user to save and update the database without closing the entire system. 18

CSCE 813 Internet Security Case Study II: XSS

CSCE 813 Internet Security Case Study II: XSS CSCE 813 Internet Security Case Study II: XSS Professor Lisa Luo Fall 2017 Outline Cross-site Scripting (XSS) Attacks Prevention 2 What is XSS? Cross-site scripting (XSS) is a code injection attack that

More information

10.) Click on the Security tab in Internet Options. 11.) Then click on Trusted Sites. 12.) Click on the Custom level button.

10.) Click on the Security tab in Internet Options. 11.) Then click on Trusted Sites. 12.) Click on the Custom level button. Kannapolis Archibus as a trusted website If you have problems logging into Kannapolis Archibus to create a Work Request, you may need to make sure that Kannapolis Archibus is a trusted site on your web

More information

The security of Mozilla Firefox s Extensions. Kristjan Krips

The security of Mozilla Firefox s Extensions. Kristjan Krips The security of Mozilla Firefox s Extensions Kristjan Krips Topics Introduction The extension model How could extensions be used for attacks - website defacement - phishing attacks - cross site scripting

More information

Web Application Security

Web Application Security Web Application Security Rajendra Kachhwaha rajendra1983@gmail.com October 16, 2015 Lecture 16: 1/ 14 Outline Browser Security Principles: 1 Cross Site Scripting (XSS) 2 Types of XSS 3 Lecture 16: 2/ 14

More information

Overview Cross-Site Scripting (XSS) Christopher Lam Introduction Description Programming Languages used Types of Attacks Reasons for XSS Utilization Attack Scenarios Steps to an XSS Attack Compromises

More information

CIS 4360 Secure Computer Systems XSS

CIS 4360 Secure Computer Systems XSS CIS 4360 Secure Computer Systems XSS Professor Qiang Zeng Spring 2017 Some slides are adapted from the web pages by Kallin and Valbuena Previous Class Two important criteria to evaluate an Intrusion Detection

More information

Application vulnerabilities and defences

Application vulnerabilities and defences Application vulnerabilities and defences In this lecture We examine the following : SQL injection XSS CSRF SQL injection SQL injection is a basic attack used to either gain unauthorized access to a database

More information

MTAT Research Seminar in Cryptography The Security of Mozilla Firefox s Extensions

MTAT Research Seminar in Cryptography The Security of Mozilla Firefox s Extensions MTAT.07.019 Research Seminar in Cryptography The Security of Mozilla Firefox s Extensions Kristjan Krips 1 Introduction Mozilla Firefox has 24.05% of the recorded usage share of web browsers as of October

More information

Andrew Muller, Canberra Managing Director, Ionize, Canberra The challenges of Security Testing. Security Testing. Taming the Wild West

Andrew Muller, Canberra Managing Director, Ionize, Canberra The challenges of Security Testing. Security Testing. Taming the Wild West Andrew Muller, Canberra Managing Director, Ionize, Canberra The challenges of Security Testing Advancing Expertise in Security Testing Taming the Wild West Canberra, Australia 1 Who is this guy? Andrew

More information

Sherlock Tutorial Getting Started

Sherlock Tutorial Getting Started Sherlock Tutorial Getting Started Background Sherlock is a Java-based application that allows users to analyze the reliability of circuit card assemblies based on their design files. Sherlock has been

More information

C1: Define Security Requirements

C1: Define Security Requirements OWASP Top 10 Proactive Controls IEEE Top 10 Software Security Design Flaws OWASP Top 10 Vulnerabilities Mitigated OWASP Mobile Top 10 Vulnerabilities Mitigated C1: Define Security Requirements A security

More information

Index. How to look for images... 3 How to add the images to your cart... 4 How to download and edit your images Amadeus Image Bank.

Index. How to look for images... 3 How to add the images to your cart... 4 How to download and edit your images Amadeus Image Bank. Index How to look for images... 3 How to add the images to your cart... 4 How to download and edit your images... 5 How to look for images To start looking for your images please go to the search box in

More information

Computer Security 3e. Dieter Gollmann. Chapter 18: 1

Computer Security 3e. Dieter Gollmann.  Chapter 18: 1 Computer Security 3e Dieter Gollmann www.wiley.com/college/gollmann Chapter 18: 1 Chapter 18: Web Security Chapter 18: 2 Web 1.0 browser HTTP request HTML + CSS data web server backend systems Chapter

More information

Attacks Against Websites. Tom Chothia Computer Security, Lecture 11

Attacks Against Websites. Tom Chothia Computer Security, Lecture 11 Attacks Against Websites Tom Chothia Computer Security, Lecture 11 A typical web set up TLS Server HTTP GET cookie Client HTML HTTP file HTML PHP process Display PHP SQL Typical Web Setup HTTP website:

More information

Georgia Department of Education

Georgia Department of Education Browser Setting Specifications for Statewide Longitudinal Data System (SLDS) Version 5.0 Table of Contents 1. Introduction 4 1.1 Purpose 4 2. Silverlight 4 2.1 Installing Silverlight 4 2.2 Silverlight

More information

Applying AI in Application Security

Applying AI in Application Security FEATURE Applying AI in Application Security Do you have something to say about this article? Visit the Journal pages of the ISACA website (www.isaca. org/journal), find the article and click on the Comments

More information

Anaglym: A Graphics Engine Providing Secure Execution of Applications

Anaglym: A Graphics Engine Providing Secure Execution of Applications Grand Valley State University ScholarWorks@GVSU Masters Projects Graduate Research and Creative Practice 12-2009 Anaglym: A Graphics Engine Providing Secure Execution of Applications Josh Holtrop Grand

More information

LECT 8 WEB SECURITY BROWSER SECURITY. Repetition Lect 7. WEB Security

LECT 8 WEB SECURITY BROWSER SECURITY. Repetition Lect 7. WEB Security Repetition Lect 7 LECT 8 WEB SECURITY Access control Runtime protection Trusted computing Java as basic model for signed code Trusted Computing Group TPM ARM TrustZone Mobile Network security GSM security

More information

WebSTAR Cache Information

WebSTAR Cache Information Internet Explorer WebSTAR Cache Information Internet Explorer is the supported browser for logging in, navigating, entering and accessing data, and other tasks in PeopleSoft. There may occur a time when

More information

WHITE PAPER WEB CACHE DECEPTION ATTACK. Omer Gil. July

WHITE PAPER WEB CACHE DECEPTION ATTACK. Omer Gil. July WHITE PAPER WEB CACHE DECEPTION ATTACK Omer Gil July 2017 https://omergil.blogspot.com @omer_gil Table of Contents ABSTRACT... 1 INTRODUCTION... 1 About caching... 1 Servers' reactions... 2 WEB CACHE DECEPTION

More information

Web Gate Keeper: Detecting Encroachment in Multi-tier Web Application

Web Gate Keeper: Detecting Encroachment in Multi-tier Web Application Web Gate Keeper: Detecting Encroachment in Multi-tier Web Application Sanaz Jafari Prof.Dr.Suhas H. Patil (GUIDE) ABSTRACT The Internet services and different applications become vital part of every person

More information

ValuePRO Tutorial Internet Explorer 8 Configuration

ValuePRO Tutorial Internet Explorer 8 Configuration ValuePRO Tutorial Internet Explorer 8 Configuration Table of Contents Contents 1. Adding ValuePRO to Trusted Sites... 1 1. Overview... 1 2. Changes Required... 1 2. Enabling Cross Site Scripting... 3 1.

More information

Aguascalientes Local Chapter. Kickoff

Aguascalientes Local Chapter. Kickoff Aguascalientes Local Chapter Kickoff juan.gama@owasp.org About Us Chapter Leader Juan Gama Application Security Engineer @ Aspect Security 9+ years in Appsec, Testing, Development Maintainer of OWASP Benchmark

More information

Application Design and Development: October 30

Application Design and Development: October 30 M149: Database Systems Winter 2018 Lecturer: Panagiotis Liakos Application Design and Development: October 30 1 Applications Programs and User Interfaces very few people use a query language to interact

More information

CSCE 548 Building Secure Software SQL Injection Attack

CSCE 548 Building Secure Software SQL Injection Attack CSCE 548 Building Secure Software SQL Injection Attack Professor Lisa Luo Spring 2018 Previous class DirtyCOW is a special type of race condition problem It is related to memory mapping We learned how

More information

Uploading a File in the Desire2Learn Content Area

Uploading a File in the Desire2Learn Content Area Uploading a File in the Desire2Learn Content Area Login to D2L and open one of your courses. Click the Content button in the course toolbar to access the Content area. Locate the Table of Contents on the

More information

Guide to KI-ELN, downloaded/remote desktop client

Guide to KI-ELN, downloaded/remote desktop client Guide to KI-ELN, downloaded/remote desktop client Conventions used in this tutorial Bold a button Underline selection from a menu Italics Right mouse-click menu item You can access the system in three

More information

Web basics: HTTP cookies

Web basics: HTTP cookies Web basics: HTTP cookies Myrto Arapinis School of Informatics University of Edinburgh February 11, 2016 1 / 27 How is state managed in HTTP sessions HTTP is stateless: when a client sends a request, the

More information

Auto Start Analyzer after AppPool Recycle by IIS

Auto Start Analyzer after AppPool Recycle by IIS Auto Start Analyzer after AppPool Recycle by IIS Background It is often sites running on the Internet Information Service (IIS) will get recycled by IIS service at a set interval (nightly for example).

More information

XMLInput Application Guide

XMLInput Application Guide XMLInput Application Guide Version 1.6 August 23, 2002 (573) 308-3525 Mid-Continent Mapping Center 1400 Independence Drive Rolla, MO 65401 Richard E. Brown (reb@usgs.gov) Table of Contents OVERVIEW...

More information

How is state managed in HTTP sessions. Web basics: HTTP cookies. Hidden fields (2) The principle. Disadvantage of this approach

How is state managed in HTTP sessions. Web basics: HTTP cookies. Hidden fields (2) The principle. Disadvantage of this approach Web basics: HTTP cookies Myrto Arapinis School of Informatics University of Edinburgh March 30, 2015 How is state managed in HTTP sessions HTTP is stateless: when a client sends a request, the server sends

More information

Adobe Reader (AR) and Internet Explorer (IE) Browser Settings. Adobe Reader and Internet Explorer Browser settings

Adobe Reader (AR) and Internet Explorer (IE) Browser Settings. Adobe Reader and Internet Explorer Browser settings Adobe Reader and Internet Explorer Browser settings Table of Contents 1. INTERNET EXPLORER (IE) BROWSER SETTINGS... 2 1.1 Locating the menu bar... 2 1.2 Clearing cache... 2 1.3 Allow pop-ups from *.cap.org...

More information

This program assumes you have basic knowledge or htaccess redirection.

This program assumes you have basic knowledge or htaccess redirection. Instructions Intro 404bypass is designed to help you avoid 404 errors by generating a redirect file for your website. This is especially helpful when a redesign leads to pages being assigned a new URL.

More information

SECURE CODING PART 1 MAGDA LILIA CHELLY ENTREPRENEUR CISO ADVISOR CYBERFEMINIST PEERLYST BRAND AMBASSADOR TOP 50 CYBER CYBER

SECURE CODING PART 1 MAGDA LILIA CHELLY ENTREPRENEUR CISO ADVISOR CYBERFEMINIST PEERLYST BRAND AMBASSADOR TOP 50 CYBER CYBER SECURE CODING PART 1 MAGDA LILIA CHELLY ENTREPRENEUR CISO ADVISOR CYBERFEMINIST PEERLYST BRAND AMBASSADOR TOP 50 CYBER INFLUENCER @RESPONSIBLE CYBER 1 AGENDA 1. Introduction: What is security? How much

More information

CHAPTER 8 CONCLUSION AND FUTURE ENHANCEMENTS

CHAPTER 8 CONCLUSION AND FUTURE ENHANCEMENTS 180 CHAPTER 8 CONCLUSION AND FUTURE ENHANCEMENTS 8.1 SUMMARY This research has focused on developing a Web Applications Secure System from Code Injection Vulnerabilities through Web Services (WAPS-CIVS),

More information

Exercise 7a: Result Presentation and HyperView Player

Exercise 7a: Result Presentation and HyperView Player Exercise 7a: Result Presentation and HyperView Player This exercise uses the session file, Exercise_7a.mvw. Step 1: Load the file Exercise_7a.mvw and export images and videos of the graphics area. 1. Open

More information

Javadocing in Netbeans (rev )

Javadocing in Netbeans (rev ) Javadocing in Netbeans (rev. 2011-05-20) This note describes how to embed HTML-style graphics within your Javadocs, if you are using Netbeans. Additionally, I provide a few hints for package level and

More information

Browser Set-Up Instructions

Browser Set-Up Instructions Browser Set-Up Instructions Before visiting the Assessment LinkBC site for the first time, you must configure your Internet Explorer browser: o to recognize the Assessment LinkBC site as a trusted site,

More information

Configuration. English. Video Management System. SeMSy III Modul Map. Rev /

Configuration. English. Video Management System. SeMSy III Modul Map. Rev / Configuration English Video Management System SeMSy III Modul Map Rev. 1.0.1 / 2014-08-31 Information about Copyright, Trademarks, Design Patents 2014 Dallmeier electronic The reproduction, distribution

More information

RBS NetGain Enterprise Manager Multiple Vulnerabilities of 11

RBS NetGain Enterprise Manager Multiple Vulnerabilities of 11 RBS-2018-004 NetGain Enterprise Manager Multiple Vulnerabilities 2018-03-22 1 of 11 Table of Contents Vendor / Product Information 3 Vulnerable Program Details 3 Credits 3 Impact 3 Vulnerability Details

More information

Web Security II. Slides from M. Hicks, University of Maryland

Web Security II. Slides from M. Hicks, University of Maryland Web Security II Slides from M. Hicks, University of Maryland Recall: Putting State to HTTP Web application maintains ephemeral state Server processing often produces intermediate results; not long-lived

More information

To start, open or build a simple solid model. The bracket from a previous exercise will be used for demonstration purposes.

To start, open or build a simple solid model. The bracket from a previous exercise will be used for demonstration purposes. Render, Lights, and Shadows The Render programs are techniques using surface shading, surface tones, and surface materials that are then presented in a scene with options for lights and shadows. Modifications

More information

Cyclone PCB Factory Gui Tutorial. by Kobus du Toit

Cyclone PCB Factory Gui Tutorial. by Kobus du Toit Cyclone PCB Factory Gui Tutorial by Kobus du Toit Contents Cyclone PCB Factory Gui Tutorial... 1 Installation... 3 Install Python with NumPy... 3 Install PySerial... 3 Install PyPy... 5 Install Java...

More information

Lesson 3 Creating and Using Graphics

Lesson 3 Creating and Using Graphics Lesson What you will learn: how to delete a sprite and import a new sprite how to draw using the pen feature of Scratch how to use the pen up and pen down feature how to change the colour of the pen how

More information

Chrome Extension Security Architecture

Chrome Extension Security Architecture Chrome Extension Security Architecture Presenter: Jienan Liu Network, Intelligence & security Lab outline Chrome extension introduction Threats towards extension Chrome extension s security architecture

More information

v GMS 10.1 Tutorial UTEXAS Embankment on Soft Clay Introduction to the UTEXAS interface in GMS for a simple embankment analysis

v GMS 10.1 Tutorial UTEXAS Embankment on Soft Clay Introduction to the UTEXAS interface in GMS for a simple embankment analysis v. 10.1 GMS 10.1 Tutorial Introduction to the UTEXAS interface in GMS for a simple embankment analysis Objectives Learn how to build a simple UTEXAS model in GMS. Prerequisite Tutorials Feature Objects

More information

CNIT 129S: Securing Web Applications. Ch 10: Attacking Back-End Components

CNIT 129S: Securing Web Applications. Ch 10: Attacking Back-End Components CNIT 129S: Securing Web Applications Ch 10: Attacking Back-End Components Injecting OS Commands Web server platforms often have APIs To access the filesystem, interface with other processes, and for network

More information

Printing Specification Document for Explorer 8 browsers. Version

Printing Specification Document for Explorer 8 browsers. Version Printing Specification Document for Explorer 8 browsers Version 01.00.02 Document Change History Issue/Revision Date Author Description V 01.00.00 2009-04-23 Documentation department Creation V 01.00.01

More information

IMPLEMENTING SCL PROGRAMS. Using Codeblocks

IMPLEMENTING SCL PROGRAMS. Using Codeblocks IMPLEMENTING SCL PROGRAMS Using Codeblocks With the GSL on Linux Dr. José M. Garrido Department of Computer Science Updated September 2014 College of Science and Mathematics Kennesaw State University c

More information

Web basics: HTTP cookies

Web basics: HTTP cookies Web basics: HTTP cookies Myrto Arapinis School of Informatics University of Edinburgh November 20, 2017 1 / 32 How is state managed in HTTP sessions HTTP is stateless: when a client sends a request, the

More information

Provide you with a quick introduction to web application security Increase you awareness and knowledge of security in general Show you that any

Provide you with a quick introduction to web application security Increase you awareness and knowledge of security in general Show you that any OWASP Top 10 Provide you with a quick introduction to web application security Increase you awareness and knowledge of security in general Show you that any tester can (and should) do security testing

More information

Generating String Attack Inputs Using Constrained Symbolic Execution. presented by Kinga Dobolyi

Generating String Attack Inputs Using Constrained Symbolic Execution. presented by Kinga Dobolyi Generating String Attack Inputs Using Constrained Symbolic Execution presented by Kinga Dobolyi What is a String Attack? Web applications are 3 tiered Vulnerabilities in the application layer Buffer overruns,

More information

501/421/361 User s Guide Advanced Function Operations (i-option)

501/421/361 User s Guide Advanced Function Operations (i-option) 501/421/361 User s Guide Advanced Function Operations (i-option) . Contents 1 Introduction Terms and Conditions... 1-3 1.1 About this manual... 1-4 1.1.1 Configuration of this manual... 1-4 1.1.2 Explanation

More information

( )

( ) testidea 9.12.x This document describes what s new and noteworthy in testidea. Headings indicate version and release date. 9.12.269 (2016-01-08) Grouping of test cases Grouping of test cases enables better

More information

IronWASP (Iron Web application Advanced Security testing Platform)

IronWASP (Iron Web application Advanced Security testing Platform) IronWASP (Iron Web application Advanced Security testing Platform) 1. Introduction: IronWASP (Iron Web application Advanced Security testing Platform) is an open source system for web application vulnerability

More information

MISIS Tutorial. I. Introduction...2 II. Tool presentation...2 III. Load files...3 a) Create a project by loading BAM files...3

MISIS Tutorial. I. Introduction...2 II. Tool presentation...2 III. Load files...3 a) Create a project by loading BAM files...3 MISIS Tutorial Table of Contents I. Introduction...2 II. Tool presentation...2 III. Load files...3 a) Create a project by loading BAM files...3 b) Load the Project...5 c) Remove the project...5 d) Load

More information

java -jar Xmx2048mb /Applications/burpsuite_pro_v1.5.jar

java -jar Xmx2048mb /Applications/burpsuite_pro_v1.5.jar Training: An Introduction to Burp Suite Part One By Mike Sheward Burp suite provides a solid platform for launching a web application security assessment. In this guide we re going to introduce the features

More information

Intermediate/Advanced. Faculty Development Workshop FSE Faculty retreat April 18, 2012

Intermediate/Advanced. Faculty Development Workshop FSE Faculty retreat April 18, 2012 Intermediate/Advanced Faculty Development Workshop FSE Faculty retreat April 18, 2012 Remote Desktop Sharing Quick Reference Guide for Moderators The Moderator or a Participant may request control of another

More information

OWASP Top 10 The Ten Most Critical Web Application Security Risks

OWASP Top 10 The Ten Most Critical Web Application Security Risks OWASP Top 10 The Ten Most Critical Web Application Security Risks The Open Web Application Security Project (OWASP) is an open community dedicated to enabling organizations to develop, purchase, and maintain

More information

Embedding Graphics in JavaDocs (netbeans IDE)

Embedding Graphics in JavaDocs (netbeans IDE) Embedding Graphics in JavaDocs (netbeans IDE) This note describes how to embed HTML-style graphics within your JavaDocs, if you are using Netbeans. Additionally, I provide a few hints for package level

More information

Configuring User Defined Patterns

Configuring User Defined Patterns The allows you to create customized data patterns which can be detected and handled according to the configured security settings. The uses regular expressions (regex) to define data type patterns. Custom

More information

OWASP Top 10 Risks. Many thanks to Dave Wichers & OWASP

OWASP Top 10 Risks. Many thanks to Dave Wichers & OWASP OWASP Top 10 Risks Dean.Bushmiller@ExpandingSecurity.com Many thanks to Dave Wichers & OWASP My Mom I got on the email and did a google on my boy My boy works in this Internet thing He makes cyber cafes

More information

Non conventional attacks Some things your security scanner won t find OWASP 23/05/2011. The OWASP Foundation.

Non conventional attacks Some things your security scanner won t find OWASP 23/05/2011. The OWASP Foundation. Non conventional attacks Some things your security scanner won t find 23/05/2011 Tom Van der Mussele Security Analyst Verizon Business Security Solutions tom.vandermussele@verizonbusiness.com +352691191974

More information

ACADEMIC TECHNOLOGY SUPPORT

ACADEMIC TECHNOLOGY SUPPORT ACADEMIC TECHNOLOGY SUPPORT D2L : Introduction A Guide for Instructors ats@etsu.edu 439-8611 www.etsu.edu/ats Table of Contents Introduction...1 Objectives... 1 Logging In to D2L...1 My Home... 2 The Minibar...

More information

Advanced Web Technology 10) XSS, CSRF and SQL Injection

Advanced Web Technology 10) XSS, CSRF and SQL Injection Berner Fachhochschule, Technik und Informatik Advanced Web Technology 10) XSS, CSRF and SQL Injection Dr. E. Benoist Fall Semester 2010/2011 1 Table of Contents Cross Site Request Forgery - CSRF Presentation

More information

IBM iaccess (Java) Setup Guide for Foxtrot RPA

IBM iaccess (Java) Setup Guide for Foxtrot RPA IBM iaccess (Java) Setup Guide for Foxtrot RPA Revised 03/31/17 Setup Steps - IBM iaccess is a Java application which requires these specific setup steps before it can be automated using Foxtrot RPA: 1.

More information

Application Layer Attacks. Application Layer Attacks. Application Layer. Application Layer. Internet Protocols. Application Layer.

Application Layer Attacks. Application Layer Attacks. Application Layer. Application Layer. Internet Protocols. Application Layer. Application Layer Attacks Application Layer Attacks Week 2 Part 2 Attacks Against Programs Application Layer Application Layer Attacks come in many forms and can target each of the 5 network protocol layers

More information

Spread Map Tab - Soil Zones

Spread Map Tab - Soil Zones Spread Map Tab - Soil Zones The Spread Map page provides functions for creating spread maps. To activate the options, select the Spread Map tab. 1. The Rx Export tab will display immediately. Select the

More information

Marketing Automation:

Marketing Automation: Email Marketing Automation: Integration with Google Analytics 1 To integrate FreshMail with Google Analytics, you will need: 1. An active FreshMail account. If you don t have one yet, you can open it here.

More information

Overtaking Google Desktop Leveraging XSS to Raise Havoc. 6 th OWASP AppSec Conference. The OWASP Foundation

Overtaking Google Desktop Leveraging XSS to Raise Havoc. 6 th OWASP AppSec Conference. The OWASP Foundation Overtaking Google Desktop Leveraging XSS to Raise Havoc 6 th OWASP AppSec Conference Milan - May 2007 Yair Amit Senior Security Researcher, Watchfire yaira@watchfire.com +972-9-9586077 ext 4039 Copyright

More information

Instructions for Configuring Your Browser Settings and Online Security FAQ s

Instructions for Configuring Your Browser Settings and Online Security FAQ s Instructions for Configuring Your Browser Settings and Online Security FAQ s General Settings The following browser settings and plug-ins are required to properly access Digital Insight s webbased solutions.

More information

Grandstream Networks, Inc. GSurf User Manual

Grandstream Networks, Inc. GSurf User Manual Grandstream Networks, Inc. GSurf User Manual GSurf Contents Contents Introduction 3 Installation 4 Minimum Recommended Requirements 4 Login 4 Main Window 5 Menu Items 5 Toolbar Items 6 Play Bar Items 7

More information

Exploiting and Defending: Common Web Application Vulnerabilities

Exploiting and Defending: Common Web Application Vulnerabilities Exploiting and Defending: Common Web Application Vulnerabilities Introduction: Steve Kosten Principal Security Consultant SANS Instructor Denver OWASP Chapter Lead Certifications CISSP, GWAPT, GSSP-Java,

More information

Common Websites Security Issues. Ziv Perry

Common Websites Security Issues. Ziv Perry Common Websites Security Issues Ziv Perry About me Mitnick attack TCP splicing Sql injection Transitive trust XSS Denial of Service DNS Spoofing CSRF Source routing SYN flooding ICMP

More information

CAA Alumni Chapters Websites - Admin Instructions

CAA Alumni Chapters Websites - Admin Instructions CAA Alumni Chapters Websites - Admin Instructions Welcome to your new chapter website! You may locate your new website on the landing page for our Alumni Chapters Program which lives at alumni.berkeley.edu/community/alumni-chapters/join.

More information

SARS ANYWHERE ADMINISTRATION MANUAL APPENDICES

SARS ANYWHERE ADMINISTRATION MANUAL APPENDICES SARS ANYWHERE ADMINISTRATION MANUAL APPENDICES APPENDIX A HELP FILE The Help feature is a convenient and quick way to obtain more information about SARS Anywhere topics. There are four ways to use the

More information

Creating and Viewing My Favorites

Creating and Viewing My Favorites Creating and Managing My Favorites This tutorial will guide you through the steps required to create and share My Favorites files. My Favorites allows users to select and save items while viewing collections.

More information

Detecting XSS Based Web Application Vulnerabilities

Detecting XSS Based Web Application Vulnerabilities Detecting XSS Based Web Application Vulnerabilities M.S.Jasmine M.Tech (ISCF).Student, Department of Information Technology SRM University, TamilNadu,India jasmine.srakj@gmail.com Kirthiga Devi Assistant

More information

QuestionPoint chat The Guide to IE browser setup Last updated: 2009 June 23

QuestionPoint chat The Guide to IE browser setup Last updated: 2009 June 23 QuestionPoint chat The Guide to IE browser setup Last updated: 2009 June 23 This guide provides a procedure for initially configuring your Internet Explorer (IE) browser to use Flash Chat. Note: If you

More information

dotdefender v5.18 User Guide

dotdefender v5.18 User Guide dotdefender v5.18 User Guide Applicure Web Application Firewall Table of Contents 1. Introduction... 5 1.1 Overview... 5 1.2 Components... 6 1.3 Benefits... 7 1.4 Organization of this Guide... 8 2. Getting

More information

( )

( ) testidea 9.12.x This document describes what s new and noteworthy in testidea. Headings indicate version and release date. 9.12.269 (2016-01-08) Grouping of test cases Grouping of test cases enables better

More information

CONTENTS IN DETAIL INTRODUCTION 1 THE FAQS OF LIFE THE SCRIPTS EVERY PHP PROGRAMMER WANTS (OR NEEDS) TO KNOW 1 2 CONFIGURING PHP 19

CONTENTS IN DETAIL INTRODUCTION 1 THE FAQS OF LIFE THE SCRIPTS EVERY PHP PROGRAMMER WANTS (OR NEEDS) TO KNOW 1 2 CONFIGURING PHP 19 CONTENTS IN DETAIL INTRODUCTION xiii 1 THE FAQS OF LIFE THE SCRIPTS EVERY PHP PROGRAMMER WANTS (OR NEEDS) TO KNOW 1 #1: Including Another File as a Part of Your Script... 2 What Can Go Wrong?... 3 #2:

More information

Application Security at DevOps Speed and Portfolio Scale. Jeff Contrast Security

Application Security at DevOps Speed and Portfolio Scale. Jeff Contrast Security Application Security at DevOps Speed and Portfolio Scale Jeff Williams @planetlevel Contrast Security OWASP XSS Prevention Cheat Sheet 1,000,000 Page Views! https://www.owasp.org/index.php/xss_(cross_site_scripting)_prevention_cheat_sheet

More information

DEVELOPING OOSIML SIMULATION MODELS. Using Codeblocks

DEVELOPING OOSIML SIMULATION MODELS. Using Codeblocks DEVELOPING OOSIML SIMULATION MODELS Using Codeblocks Dr. José M. Garrido Department of Computer Science Updated November 2016 College of Computing and Software Engineering Kennesaw State University c 2015,

More information

Web 2.0 and AJAX Security. OWASP Montgomery. August 21 st, 2007

Web 2.0 and AJAX Security. OWASP Montgomery. August 21 st, 2007 Web 2.0 and AJAX Security OWASP Montgomery August 21 st, 2007 Overview Introduction Definition of Web 2.0 Basics of AJAX Attack Vectors for AJAX Applications AJAX and Application Security Conclusions 1

More information

HP Records Manager. Kofax Capture Template. Software Version: 8.1. Document Release Date: August 2014

HP Records Manager. Kofax Capture Template. Software Version: 8.1. Document Release Date: August 2014 HP Records Manager Software Version: 8.1 Kofax Capture Template Document Release Date: August 2014 Software Release Date: August 2014 Legal Notices Warranty The only warranties for HP products and services

More information

User Manual Portable Laptop Console Crash Cart Adapter

User Manual Portable Laptop Console Crash Cart Adapter User Manual Portable Laptop Console Crash Cart Adapter GUC211V PART NO. M1458 www.iogear.com 2017 IOGEAR. All Rights Reserved. Part No. M1458. IOGEAR, the IOGEAR logo is trademarks of IOGEAR. Microsoft

More information

CS 161 Computer Security

CS 161 Computer Security Raluca Ada Popa Spring 2018 CS 161 Computer Security Discussion 9 Week of March 19, 2018 Question 1 Warmup: SOP (15 min) The Same Origin Policy (SOP) helps browsers maintain a sandboxed model by preventing

More information

IERG 4210 Tutorial 07. Securing web page (I): login page and admin user authentication Shizhan Zhu

IERG 4210 Tutorial 07. Securing web page (I): login page and admin user authentication Shizhan Zhu IERG 4210 Tutorial 07 Securing web page (I): login page and admin user authentication Shizhan Zhu Content for today Phase 4 preview From now please pay attention to the security issue of your website This

More information

CS 161 Computer Security

CS 161 Computer Security Nick Weaver Fall 2018 CS 161 Computer Security Homework 3 Due: Friday, 19 October 2018, at 11:59pm Instructions. This homework is due Friday, 19 October 2018, at 11:59pm. No late homeworks will be accepted

More information

Create Geomark in Google Earth Tutorial

Create Geomark in Google Earth Tutorial Create Geomark in Google Earth Tutorial General business example a potential applicant / user wants to create an area of interest that can be shared electronically to another party eg: another agency,

More information

BIG-IP Access Policy Manager : Secure Web Gateway. Version 13.0

BIG-IP Access Policy Manager : Secure Web Gateway. Version 13.0 BIG-IP Access Policy Manager : Secure Web Gateway Version 13.0 Table of Contents Table of Contents BIG-IP APM Secure Web Gateway Overview...9 About APM Secure Web Gateway... 9 About APM benefits for web

More information

Interactive Maps Purpose: Login to the System: Interactive Maps ONTINUE AGREE

Interactive Maps Purpose: Login to the System: Interactive Maps ONTINUE AGREE Interactive Maps Purpose: The purpose of this application is to provide the facility to the citizen to navigate to a Property through an On-line Free Web Application in real time. The application uses

More information

CSE 127 Computer Security

CSE 127 Computer Security CSE 127 Computer Security Fall 2015 Web Security I: SQL injection Stefan Savage The Web creates new problems Web sites are programs Partially implemented in browser» Javascript, Java, Flash Partially implemented

More information

Trustee Attributes. White Paper. February 2012

Trustee Attributes. White Paper. February 2012 Trustee Attributes White Paper February 2012 Table of Contents What is a Trustee Attribute?... 3 Users and Trustee Attributes... 3 How Trustee Attributes Work... 3 Administering Trustee Attributes... 6

More information

Symlink attacks. Do not assume that symlinks are trustworthy: Example 1

Symlink attacks. Do not assume that symlinks are trustworthy: Example 1 Symlink attacks Do not assume that symlinks are trustworthy: Example 1 Application A creates a file for writing in /tmp. It assumes that since the file name is unusual, or because it encodes A's name or

More information

Client Website Overview Guide

Client Website Overview Guide This training guide will provide an overview of the Client Website. The Client Website is a Personal Financial Website that will provide you with a consolidated view of your financial information. There

More information

BIG-IP Application Security Manager : Attack and Bot Signatures. Version 13.0

BIG-IP Application Security Manager : Attack and Bot Signatures. Version 13.0 BIG-IP Application Security Manager : Attack and Bot Signatures Version 13.0 Table of Contents Table of Contents Assigning Attack Signatures to Security Policies...5 About attack signatures...5 About

More information

Finding Vulnerabilities in Web Applications

Finding Vulnerabilities in Web Applications Finding Vulnerabilities in Web Applications Christopher Kruegel, Technical University Vienna Evolving Networks, Evolving Threats The past few years have witnessed a significant increase in the number of

More information

GEL Scripts Advanced. Your Guides: Ben Rimmasch, Yogesh Renapure

GEL Scripts Advanced. Your Guides: Ben Rimmasch, Yogesh Renapure GEL Scripts Advanced Your Guides: Ben Rimmasch, Yogesh Renapure Introductions 2 Take 5 Minutes Turn to a Person Near You Introduce Yourself Agenda 3 Accessing JAVA Classes and Methods SOAP Web Services

More information