HSC
Network Security Consulting Agency Since 1989 - Specialized in Unix, Windows, TCP/IP and Internet
Text mode: access to the page content
Hervé Schauer Consultants
You are here: Home > Resources > Lectures > Evolution of Cross-Site Request Forgery Attacks
Go to: HSC Trainings
Search:  
Version française
   Services   
o Skills & Expertise
o Consulting
o ISO 27001 services
o Vulnerabilities monitoring
o Audit & Assessment
o Penetration tests
o Vunerability assessment (TSAR)
o Forensics
o ARJEL
o Training courses
o E-learning
   Conferences   
o Agenda
o Past events
o Tutorials
   Resources   
o Thematic index
o Tips
o Lectures
o Courses
o Articles
o Tools (download)
o Vulnerability watch
   Company   
o Hervé Schauer
o Team
o Job opportunities
o Credentials
o History
o Partnerships
o Associations
   Press and
 communication
 
 
o HSC Newsletter
o Press review
o Press releases
o Publications
   Contacts   
o How to reach us
o Specific inquiries
o Directions to our office
o Hotels near our office
|>|Evolution of Cross-Site Request Forgery Attacks  
> Access to the content HTML Beginning of the presentation
PDF PDF version [2048 KB]
AdobeFlash Adobe Flash version  
> Description  
> Context & Dates Talk presented during the SSTIC 2007, on 1 June 2007.
 
> Author Louis Nyffenegger, Renaud Feil 
> Type [ French - HTML ]  
> Abstract &
Table of content
Flyleaf
Sommaire
Présentation des attaques de type Cross-Site Request Forgery
Le navigateur comme client léger universel
Une vulnérabilité enfin reconnue
Cinématique d'une attaque CSRF (1/4)
Cinématique d'une attaque CSRF (2/4)
Cinématique d'une attaque CSRF (3/4)
Cinématique d'une attaque CSRF (4/4)
Possibilités des attaques de type CSRF
Le "Session Riding"
Exemples d'applications Web vulnérables
Webmin
Webmin (l'attaque)
Site www.sstic.org
Site www.sstic.org : modification de l'entrée Email
Site www.sstic.org : récupération des informations de connexions
OWA, Horde, Blogspot, SMC...
Limites des attaques de type CSRF « traditionnelles » et évolution de la menace
Limites des CSRF "traditionnels"
Assurer la persistance du code hostile
Rendre l'attaque interactive
Consulter la réponse
CSRF avec XMLHttpRequest() (1/4)
CSRF avec XMLHttpRequest() (2/4)
CSRF avec XMLHttpRequest() (3/4)
CSRF avec XMLHttpRequest() (4/4)
Les protections contre les attaques de type CSRF
Protections
Conclusion
Questions  
> Related documents
themeWeb
[Course]  Web Servers and applications Security
[Tool]  Webef tool [Bruteforcer of web server files and directories - English]
[Presentation]  Webshells, or how to open your network's doors ? [21 October 2010 - French]
[Presentation]  JBoss AS: exploitation and reassure [11 June 2010 - French]
[Presentation]  Webshells, or how to open your network's doors ? [16 March 2010 - French]
[Presentation]  Webshells, real threat for information systems ? [1 December 2009 - French]
[Presentation]  Security issue seen in enterprises web applications [27 November 2008 - French]
[Presentation]  Application security [23 October 2008 - French]
[Presentation]  Feedback from PHP applications assessment [21 November 2007 - French]
[Presentation]  Encrypting hostile Web content over HTTP [31 May 2007 - French]
[Presentation]  Web 2.0 : more ergonomic... and less secure ? [22 May 2007 - French]
[Tip]  Configuring and using modsecurity2 [24 April 2007 - French]
[Tip]  Presentation of Apache ModSecurity module [14 June 2006 - French]
[Presentation]  Database and ERP security [15 June 2005 - French]
[Presentation]  SSL VPN connection multiplexing techniques [7 April 2005 - English]
[Presentation]  PHP and security [27 November 2003 - French]
[Presentation]  Web Services and Security [10 September 2003 - French]
[Tip]  HTTP/HTTPS authentication methods [10 March 2003 - French]
[Presentation]  The cross-site scripting [27 February 2003 - French]
[Presentation]  DBMS and security [1 April 2002 - French]
[Presentation]  Apache and web servers security [1 February 2002 - French]
[Tip]  Implementing filtering on a reverse HTTP proxy using mod_eaccess [3 September 2001 - French]
[Tool]  Subweb tool [HTTP reverse proxy - English]
[Tool]  Babelweb tool [Automatic information retrieving from of a web server - English]
[Tip]  Universal CGI wrapper [5 August 2001 - French]
[Tip]  Why HTTPS is not web security [7 May 2001 - English]
[Tip]  Filtering URLs in a reverse proxy [5 May 2001 - French]
[Presentation]  Hacking web servers [14 March 2001 - French]
[Tip]  Why a reverse proxy [13 February 2001 - French]
[Tip]  Apache as a reverse proxy [11 November 2000 - French]
[Presentation]  Secure internet services (email, DNS, web) under Linux [26 September 2000 - English]
[Presentation]  Secure internet services (email, DNS, web) under Linux [26 April 2000 - French/English]
[Presentation]  Secure Internet services (email, DNS, web) under Linux [1 February 2000 - French]
[Techno-watch]  Netscape [16 January 1996 - French]
themeSecure Programming
[Course]  Secure Programming
[Presentation]  Application security [23 October 2008 - French]
[Presentation]  Feedback from PHP applications assessment [21 November 2007 - French]
[Presentation]  Web 2.0 : more ergonomic... and less secure ? [22 May 2007 - French]
[Presentation]  Security in software developments [11 May 2007 - French]
[Presentation]  PHP and security [27 November 2003 - French]
[Presentation]  How to design secure network applications based on privilege separation [11 July 2002 - French/English]
[Presentation]  Secure programming and software traps [18 March 2002 - French]
themeE-Business
[Presentation]  Web 2.0 : more ergonomic... and less secure ? [22 May 2007 - French]
[Presentation]  Web Services and Security [10 September 2003 - French]
[Presentation]  Risks and solutions of an e-business project [28 September 2001 - French]
[Presentation]  Controling the risks associated with e-business [21 June 2000 - French]
[Techno-watch]  Electronic Commerce on the Internet [9 May 1996 - English]
[Techno-watch]  Télémarket sur Multicâble [26 February 1996 - French]
[Techno-watch]  Globe-On-Line [12 July 1995 - French]
[Techno-watch]  EverGreen [16 May 1995 - English]
[Techno-watch]  Le réseau ARTUUS [15 May 1995 - French]
themeInternet
[Course]  Internet/intranet Security
[Presentation]  Forcasting in French cyberdefence doctrines [24 November 2010 - French]
[Presentation]  Webshells, or how to open your network's doors ? [21 October 2010 - French]
[Presentation]  Webshells, or how to open your network's doors ? [16 March 2010 - French]
[Presentation]  Webshells, real threat for information systems ? [1 December 2009 - French]
[Presentation]  Deperimetrization or not ? [22 November 2007 - French]
[Presentation]  DOS on Internet infrastructure [4 November 2003 - French]
[Tip]  HTTP/HTTPS authentication methods [10 March 2003 - French]
[Techno-watch]  Internet Familial by SmartValley [29 June 2000 - French]
[Techno-watch]  SIAM et l'Internet [25 April 1996 - French]
[Techno-watch]  KBT [5 February 1996 - English]
[Techno-watch]  La stratégie de France Télécom [10 January 1996 - French]
[Techno-watch]  Telekom On Line [4 January 1996 - French]
[Techno-watch]  Droit et l'Internet [4 December 1995 - French]
[Techno-watch]  Les décisions françaises concernant les projets sur les Autoroutes de l'Information [23 October 1995 - French]
[Article]  How to build a secure Internet access architecture? [October 1995 - French]
[Techno-watch]  Wanadoo [6 July 1995 - French]
[Techno-watch]  L'Homme Symbiotique [18 April 1995 - French]
themeIntranet
[Course]  Internet/intranet Security
[Article]  About Intranets' Lack of Security [August 1999 - French]
[Techno-watch]  Intranet by Microsoft [14 October 1996 - French]
> Copyright © 2007, Hervé Schauer Consultants, all rights reserved.

 

Last modified on 6 June 2007 at 15:09:41 CET - webmaster@hsc.fr
Information on this server - © 1989-2010 Hervé Schauer Consultants