This site is the archived OWASP Foundation Wiki and is no longer accepting Account Requests.
To view the new OWASP Foundation website, please visit https://owasp.org

File:20140820-Flash Security by Arcus Security.pdf

From OWASP
Revision as of 14:22, 2 September 2014 by Schattenbaum (talk | contribs)

(diff) ← Older revision | Latest revision (diff) | Newer revision → (diff)
Jump to: navigation, search
20140820-Flash_Security_by_Arcus_Security.pdf(file size: 888 KB, MIME type: application/pdf)

(Client-Side) Flash Security by Stefan Horlacher
Flash has always been infamous for its security issues. Most of the time we hear about memory corruption vulnerabilities like buffer overflows and how clients are attacked. As such attacks are widely known, this presentation will focus on the less known vulnerabilities that might arise through the use of Flash. This presentation is going to show concepts such as client settings, cross-domain policies and how Flash files may be embedded in your web site in a secure way. Furthermore, common vulnerabilities found in Flash applications will be presented (e.g.: Cross-Site Flashing, redirection attacks and others). Some of these vulnerabilities will be demonstrated in a live demo.

File history

Click on a date/time to view the file as it appeared at that time.

Date/TimeDimensionsUserComment
current14:22, 2 September 2014 (888 KB)Schattenbaum (talk | contribs)(Client-Side) Flash Security by Stefan Horlacher Flash has always been infamous for its security issues. Most of the time we hear about memory corruption vulnerabilities like buffer overflows and how clients are attacked. As such attacks are widely kno...
  • You cannot overwrite this file.

There are no pages that link to this file.