Web Cache Deception Attack

  Рет қаралды 20,527

Black Hat

Black Hat

Күн бұрын

Web Cache Deception attack is a new web attack vector that puts various technologies and frameworks at risk. By manipulating behaviors of web servers and caching mechanisms, anonymous attackers can expose sensitive information of authenticated application users, and in certain cases to even take control over their accounts.
By Omer Gil
Read More and Download Presentation Materials: www.blackhat.com/us-17/briefi...

Пікірлер: 19
@ysantamorena5150
@ysantamorena5150 6 жыл бұрын
Nice talk The moral is the same as Spectre: too much push on performance without caring about security
@MherZaqaryann
@MherZaqaryann 6 ай бұрын
Very clear explanation, respect to this guy!
@HackingwiththeMiddle
@HackingwiththeMiddle 6 жыл бұрын
awesome!
@SuperMarkusparkus
@SuperMarkusparkus 5 жыл бұрын
Sometimes adding a semicolon with some junk thereafter will not change the way the web server interprets the URL. This is common in Tomcat. webserver/path/to/page and webserver/path;junk/to;.junk/page;.css will be treated the same. I guess this could be used as a way to change the extension of the URL and hence make some things cachable.
@MrM4X0N3
@MrM4X0N3 6 жыл бұрын
Good talk!
@hackersguild8445
@hackersguild8445 5 жыл бұрын
Awesome talk.:)
@thesenuts4472
@thesenuts4472 5 жыл бұрын
Applaud this man.
@derek5863
@derek5863 6 жыл бұрын
Some penetration tools used to perform automated assessments of vulnerable sites must be adding a lot of data to these caches. Particularly authenticated fuzzing or file/directory brute-force. Let's hope tool developers don't use known file names and locations, and customers always sanitise their test DB's. 8-(
@TheDarkHorseUprising
@TheDarkHorseUprising 6 жыл бұрын
love this talk so badass
@PitchBlackHat
@PitchBlackHat 6 жыл бұрын
not as badass as your avatar! ;)...
@mleczkoxdTakTenmleczko
@mleczkoxdTakTenmleczko 3 жыл бұрын
Using name Java wasn't good idea cause it's a litte bit confuse
@BR-lx7py
@BR-lx7py 6 жыл бұрын
IMO you are not mentioning the only real solution: serve your cacheable and personalized/non-cacheable content on different domains. Use a very simple CDN configuration for the latter that does not cache anything, or no CDN at all if your origin can handle that. Otherwise you are only one mistake away from some major egg on your face. It is way too easy to make a configuration error in the CDN, or have the origin send the wrong headers by mistake.
@director1111
@director1111 6 жыл бұрын
Why are you guys putting it online 6 month later?
@SuperMarkusparkus
@SuperMarkusparkus 6 жыл бұрын
What do you mean?
@jasonlind3065
@jasonlind3065 5 жыл бұрын
Haha I did this to cheat on my ochem online homework when I forgot to do it and it was about to be due. Still got a B tho
@shubham_srt
@shubham_srt 4 ай бұрын
ayoooo
@shubham_srt
@shubham_srt 4 ай бұрын
i am late af
@amandamate9117
@amandamate9117 6 жыл бұрын
Ernst and fucken Young
6 жыл бұрын
Wait, this is a new thing?
Game of Chromes: Owning the Web with Zombie Chrome Extensions
45:39
Exploiting Network Printers
45:09
Black Hat
Рет қаралды 45 М.
WHO LAUGHS LAST LAUGHS BEST 😎 #comedy
00:18
HaHaWhat
Рет қаралды 20 МЛН
마시멜로우로 체감되는 요즘 물가
00:20
진영민yeongmin
Рет қаралды 28 МЛН
LOVE LETTER - POPPY PLAYTIME CHAPTER 3 | GH'S ANIMATION
00:15
Cracking the Lens: Targeting HTTP's Hidden Attack-Surface
44:06
Breaking the x86 Instruction Set
44:29
Black Hat
Рет қаралды 358 М.
DEF CON 30 - Sam Bent - Tor - Darknet Opsec By a Veteran Darknet Vendor
48:29
Exploiting Web Cache Poisoning
16:17
CyberSecurityTV
Рет қаралды 14 М.
CRLF + XSS + cache poisoning = Access to Github private pages for $35k bounty
11:22
Bug Bounty Reports Explained
Рет қаралды 11 М.
Is Skynet watching you already?
1:04:00
David Bombal
Рет қаралды 1 МЛН
WHO LAUGHS LAST LAUGHS BEST 😎 #comedy
00:18
HaHaWhat
Рет қаралды 20 МЛН