JSFoo Coimbatore 2019

On building faster, performant and secure web applications

Tickets

Leveraging Web Application Vulnerabilities for Resourceful Intelligence Gathering

Submitted by Karan Saini (@karansaini) on Saturday, 4 May 2019

Section: Full talk (40 mins) Technical level: Beginner Session type: Demo Session type: Lecture Technical level: Intermediate

View proposal in schedule

Abstract

This talk aims to introduce the audience how web application vulnerabilities can be leveraged for self-sufficient information and intelligence gathering.

Outline

The talk seeks to provide the audience with a starting point for where and how resourceful information and intelligence can be found and collected, particularly, through discovery and exploitation of security flaws in web applications. The talk will provide real life examples of security flaws through which sensitive information could have been disclosed, and how at times - owing largely to the interconnected nature of such information - it could be pieced together with other data to glean useful intelligence about a particular individual or group. Lastly, the talk will touch upon how developers can avoid baking these issues into their services and applications, while also discussing protective operational security measures that end-users can adopt as a best practice.

Talk overview:

  • Introduction:

    • Intelligence and Investigations
    • Case Studies
    • Web Application Vulnerabilities and Intelligence Gathering
  • Scoping and Execution:

    • Targeting Techniques
    • Types of Prevalent Flaws
    • Attacking Techniques
    • Slides with Examples
  • Defense:

    • Best Practices for Developers
    • Operational Security for Users

Requirements

A basic understanding of open source intelligence, web application vulnerabilities, and the use of digital information in aiding investgative processes.

Speaker bio

Karan Saini is a security researcher and program officer at the Centre for Internet and Society. Karan has been a practitioner of responsible vulnerability disclosure for four years, and has an avid interest in uncovering different ways through which new technologies and protocols can impact user privacy.

Links

Comments

Login with Twitter or Google to leave a comment