Upgrade to Pro — share decks privately, control downloads, hide ads and more …

Ihor Blum - WebSockets

Ihor Blum - WebSockets

OWASP Kyiv

March 04, 2018
Tweet

More Decks by OWASP Kyiv

Other Decks in Technology

Transcript

  1. Authorization • An attacker can access the data/functions without authorization

    • An attacker can access the data/functions which require higher level of authorization • An attacker can access other same level user's restricted data/functions
  2. Traffic encryption • All sensitive data should be transferred using

    TLS (wss://) • TLS should be implemented correctly (no weak ciphers)
  3. Resource Exhaustion • Connection is being kept until client or

    server close it • An attacker can exhausts all available connections • Modern clients have limits (e.g. Chrome: 256 total WS connections, 30 per one host; Firefox: 200 total WS connections)
  4. Improper input validation • A1 - Injections (SQLi, Code injections,

    Template injections, etc.) • A4 - XXE • A7 - XSS • A8 - Insecure deserialisation