XML Based Attacks - OWASP
XML Based Attacks
Daniel Tomescu
1
About me
Work and education:
Pentester @ KPMG Romania Moderator @ Romanian Security Team Student @ Master of Information Management and Security, UPB
Hint: We're hiring!
My interests:
Web/mobile application penetration tests Internal network penetration tests Curious about mobile and embedded devices Bug bounty hunter
2
Pentest 101
Input: Our Payload admin'+or+`1'=`1'--+
Process: What we are testing Login page
Output: (Un)expected result Authentication bypass
3
Roadmap
1 ? XML in a few words 2 ? Common vulnerabilities 3 ? DTD Attacks 4 ? XML Schema Attacks 5 ? Xpath Injection 6 ? Demo + Q & A
4
? Web apps - XML-RPC; - SOAP; - RSS;
? Documents - PDFs; - Office suite; - eBooks;
? Mobile apps
? Content management
XML Usage
5
................
................
In order to avoid copyright disputes, this page is only a partial summary.
To fulfill the demand for quickly locating and searching documents.
It is intelligent file search solution for home and business.
Related download
- xml based attacks owasp
- 1 1 method 1502 reporting
- understanding json schema
- json or javascript object notation is a lightweight text
- microsoft sql server notes for professionals
- planet imagery product specifications
- schema theory and college english reading teaching
- transforming json using xslt
- redfish reference guide supermicro
Related searches
- heart attacks in dogs
- deadly snake attacks on humans
- snake attacks caught on tape
- sign of heart attacks in men
- small heart attacks name
- autoimmune disease that attacks eyes
- heart attacks men vs women
- autoimmune that attacks muscles
- disease that attacks joints
- autoimmune disease that attacks brain
- dangerous animal attacks caught tape
- animal attacks caught on video