This site is the archived OWASP Foundation Wiki and is no longer accepting Account Requests.
To view the new OWASP Foundation website, please visit https://owasp.org

Difference between revisions of "File:20140820-Flash Security by Arcus Security.pdf"

From OWASP
Jump to: navigation, search
((Client-Side) Flash Security by Stefan Horlacher Flash has always been infamous for its security issues. Most of the time we hear about memory corruption vulnerabilities like buffer overflows and how clients are attacked. As such attacks are widely kno...)
 
m
 
Line 1: Line 1:
 
(Client-Side) Flash Security by Stefan Horlacher
 
(Client-Side) Flash Security by Stefan Horlacher
 +
<br>
 
Flash has always been infamous for its security issues. Most of the time we hear about memory corruption vulnerabilities like buffer overflows and how clients are attacked. As such attacks are widely known, this presentation will focus on the less known vulnerabilities that might arise through the use of Flash. This presentation is going to show concepts such as client settings, cross-domain policies and how Flash files may be embedded in your web site in a secure way. Furthermore, common vulnerabilities found in Flash applications will be presented (e.g.: Cross-Site Flashing, redirection attacks and others). Some of these vulnerabilities will be demonstrated in a live demo.
 
Flash has always been infamous for its security issues. Most of the time we hear about memory corruption vulnerabilities like buffer overflows and how clients are attacked. As such attacks are widely known, this presentation will focus on the less known vulnerabilities that might arise through the use of Flash. This presentation is going to show concepts such as client settings, cross-domain policies and how Flash files may be embedded in your web site in a secure way. Furthermore, common vulnerabilities found in Flash applications will be presented (e.g.: Cross-Site Flashing, redirection attacks and others). Some of these vulnerabilities will be demonstrated in a live demo.

Latest revision as of 14:22, 2 September 2014

(Client-Side) Flash Security by Stefan Horlacher
Flash has always been infamous for its security issues. Most of the time we hear about memory corruption vulnerabilities like buffer overflows and how clients are attacked. As such attacks are widely known, this presentation will focus on the less known vulnerabilities that might arise through the use of Flash. This presentation is going to show concepts such as client settings, cross-domain policies and how Flash files may be embedded in your web site in a secure way. Furthermore, common vulnerabilities found in Flash applications will be presented (e.g.: Cross-Site Flashing, redirection attacks and others). Some of these vulnerabilities will be demonstrated in a live demo.

File history

Click on a date/time to view the file as it appeared at that time.

Date/TimeDimensionsUserComment
current14:22, 2 September 2014 (888 KB)Schattenbaum (talk | contribs)(Client-Side) Flash Security by Stefan Horlacher Flash has always been infamous for its security issues. Most of the time we hear about memory corruption vulnerabilities like buffer overflows and how clients are attacked. As such attacks are widely kno...
  • You cannot overwrite this file.

There are no pages that link to this file.