Java & Web Security Training

This week I attended a 3 days training on Java and web security with Ernő Jeges from SEARCH-LAB.
It was nice to refresh my memory on the theoretical part, and I also got the chance to study and test many vulnerabilities.

Below some notes I took:
intro:
- running away of competition not of the hackers (bear story)
- SPIT = spam over voice over ip
- $1000 - sharing bootnets for spam delivery or 1 mil email addresses
- www.eegs.com
- Common Criteria - security standard

java:
- applets can only talk with the origin server
- jca/jce - core of java security
- jca: for data integrity
- jce: for confidentiality/encryption
- jaas: authentication & authorization

- use RSA for encrypting a secret key to be used for symmetric encryption because RSA is CPU expensive
- blind signature
- checkout SecureRandom

vulnerabilities:
- google: mysql injection cheat sheet
- sql injection
- xss
- upload a php/jsp page instead of a image
- hasing passwords is not enough, always use hash(password, salt) or hash(password, rand) and store the rand number also.
- SecureData example: make the class final, or disable avoid clonnable
- JVM does not support inner classes, so the compiler will create separate classes, and will generate getter/setters for the inner class
- OWASP - checkit out
- http://tomcat.apache.org/security-6.html
- rsa timer attack
- fast exponentiation

Comments

Popular posts from this blog

What an architect should first think about

Notes from Release It! Book