Web Cache Deception Attack

  Переглядів 20,271

Black Hat

Black Hat

День тому

Web Cache Deception attack is a new web attack vector that puts various technologies and frameworks at risk. By manipulating behaviors of web servers and caching mechanisms, anonymous attackers can expose sensitive information of authenticated application users, and in certain cases to even take control over their accounts.
By Omer Gil
Read More and Download Presentation Materials: www.blackhat.com/us-17/briefi...

КОМЕНТАРІ: 19
@ysantamorena5150
@ysantamorena5150 6 років тому
Nice talk The moral is the same as Spectre: too much push on performance without caring about security
@MherZaqaryann
@MherZaqaryann 4 місяці тому
Very clear explanation, respect to this guy!
@HackingwiththeMiddle
@HackingwiththeMiddle 6 років тому
awesome!
@SuperMarkusparkus
@SuperMarkusparkus 5 років тому
Sometimes adding a semicolon with some junk thereafter will not change the way the web server interprets the URL. This is common in Tomcat. webserver/path/to/page and webserver/path;junk/to;.junk/page;.css will be treated the same. I guess this could be used as a way to change the extension of the URL and hence make some things cachable.
@thesenuts4472
@thesenuts4472 5 років тому
Applaud this man.
@MrM4X0N3
@MrM4X0N3 5 років тому
Good talk!
@hackersguild8445
@hackersguild8445 5 років тому
Awesome talk.:)
@derek5863
@derek5863 6 років тому
Some penetration tools used to perform automated assessments of vulnerable sites must be adding a lot of data to these caches. Particularly authenticated fuzzing or file/directory brute-force. Let's hope tool developers don't use known file names and locations, and customers always sanitise their test DB's. 8-(
@TheDarkHorseUprising
@TheDarkHorseUprising 6 років тому
love this talk so badass
@PitchBlackHat
@PitchBlackHat 6 років тому
not as badass as your avatar! ;)...
@BR-lx7py
@BR-lx7py 6 років тому
IMO you are not mentioning the only real solution: serve your cacheable and personalized/non-cacheable content on different domains. Use a very simple CDN configuration for the latter that does not cache anything, or no CDN at all if your origin can handle that. Otherwise you are only one mistake away from some major egg on your face. It is way too easy to make a configuration error in the CDN, or have the origin send the wrong headers by mistake.
@mleczkoxdTakTenmleczko
@mleczkoxdTakTenmleczko 3 роки тому
Using name Java wasn't good idea cause it's a litte bit confuse
@director1111
@director1111 6 років тому
Why are you guys putting it online 6 month later?
@SuperMarkusparkus
@SuperMarkusparkus 6 років тому
What do you mean?
@jasonlind3065
@jasonlind3065 5 років тому
Haha I did this to cheat on my ochem online homework when I forgot to do it and it was about to be due. Still got a B tho
@shubham_srt
@shubham_srt 2 місяці тому
ayoooo
@shubham_srt
@shubham_srt 2 місяці тому
i am late af
@amandamate9117
@amandamate9117 6 років тому
Ernst and fucken Young
@ToniLahdekorpi
@ToniLahdekorpi 6 років тому
Wait, this is a new thing?
Practical Web Cache Poisoning: Redefining 'Unexploitable'
43:55
Black Hat
Переглядів 55 тис.
Has Generative AI Already Peaked? - Computerphile
12:48
Computerphile
Переглядів 140 тис.
McDonald’s MCNUGGET PURSE?! #shorts
00:11
Lauren Godwin
Переглядів 32 млн
когда одна дома // EVA mash
00:51
EVA mash
Переглядів 9 млн
Cracking the Lens: Targeting HTTP's Hidden Attack-Surface
44:06
Black Hat
Переглядів 93 тис.
Windows User FAQs about Linux
Switched to Linux
Переглядів 62
48 Dirty Little Secrets Cryptographers Don’t Want You To Know
50:58
Server-Side Template Injection: RCE For The Modern Web App
44:41
Black Hat
Переглядів 33 тис.
i cant stop thinking about this exploit
8:40
Low Level Learning
Переглядів 142 тис.
Off The Record - Weaponizing DHCP DNS Dynamic Updates
39:50
Black Hat
Переглядів 1,5 тис.
DNS Cache Poisoning - Computerphile
11:04
Computerphile
Переглядів 295 тис.