Upgrade to Pro — share decks privately, control downloads, hide ads and more …

WebSocket security

Sponsored · Ship Features Fearlessly Turn features on and off without deploys. Used by thousands of Ruby developers.

WebSocket security

Slides of my talk at OWASP Lviv 2017 conference, Nov 18, 2017.
http://owasp-lviv.blogspot.nl/2017/11/owasp-ukraine-2017-lviv-security.html

Avatar for Ihor Bliumental

Ihor Bliumental

November 18, 2017
Tweet

Other Decks in Technology

Transcript

  1. Authorization • An attacker can access the data/functions without authorization

    • An attacker can access the data/functions which require higher level of authorization • An attacker can access other same level user's restricted data/functions
  2. Traffic encryption • All sensitive data should be transferred using

    TLS (wss://) • TLS should be implemented correctly (no weak ciphers)
  3. Resource Exhaustion • Connection is being kept until client or

    server close it • An attacker can exhausts all available connections • Modern clients have limits (e.g. Chrome: 256 total WS connections, 30 per one host; Firefox: 200 total WS connections)
  4. Improper input validation • A1 - Injections (SQLi, Code injections,

    Template injections, etc.) • A4 - XXE • A7 - XSS • A8 - Insecure deserialisation