XML Based Attacks - OWASP
[Pages:25]XML Based Attacks
Daniel Tomescu
1
About me
Work and education:
Pentester @ KPMG Romania Moderator @ Romanian Security Team Student @ Master of Information Management and Security, UPB
Hint: We're hiring!
My interests:
Web/mobile application penetration tests Internal network penetration tests Curious about mobile and embedded devices Bug bounty hunter
2
Pentest 101
Input: Our Payload admin'+or+`1'=`1'--+
Process: What we are testing Login page
Output: (Un)expected result Authentication bypass
3
Roadmap
1 ? XML in a few words 2 ? Common vulnerabilities 3 ? DTD Attacks 4 ? XML Schema Attacks 5 ? Xpath Injection 6 ? Demo + Q & A
4
? Web apps - XML-RPC; - SOAP; - RSS;
? Documents - PDFs; - Office suite; - eBooks;
? Mobile apps
? Content management
XML Usage
5
XML Family
? Lots of components ? Complex structure ? Many parsing stages ? Parsing errors ? Security vulnerabilities?
6
Common vulnerabilities (1)
SQL Injection
Classic example:
'+or+'1'=`1
Equivalent XML Payload:
admin a' or '1'=`1
7
Common vulnerabilities (2)
Cross-Site Scripting
Classic example:
>alert(,123)
Equivalent XML Payload:
a%3E%3Cscript%3Ealert(,123)%3C/script%3E
8
................
................
In order to avoid copyright disputes, this page is only a partial summary.
To fulfill the demand for quickly locating and searching documents.
It is intelligent file search solution for home and business.
Related searches
- heart attacks in dogs
- deadly snake attacks on humans
- snake attacks caught on tape
- sign of heart attacks in men
- small heart attacks name
- autoimmune disease that attacks eyes
- heart attacks men vs women
- autoimmune that attacks muscles
- disease that attacks joints
- autoimmune disease that attacks brain
- dangerous animal attacks caught tape
- animal attacks caught on video