OWASP
Top Ten
2017
Michael Furman
Security Architect
What will we cover today?
• What is OWASP?
• OWASP Top Ten Project
• OWASP Top Ten from 2013 to 2017
• Top Ten overview
About Me
• 20+ years in software engineering
• 10+ years in application security
• 4+ years Lead Security Architect at Tufin
• www.linkedin.com/in/furmanmichael/
• ultimatesecpro@gmail.com
• Read my blog https://ultimatesecurity.pro/
• Follow me on twitter @ultimatesecpro
• I like to travel, read books and listen to music.
About Tufin
• Market Leader in Security Policy Orchestration for
firewalls and cloud
– New Tufin products integrate security into DevOps pipeline
• Established in 2005
• Used in over 2,000 enterprises, including 40 Fortune
100 companies
• We are constantly growing!
www.tufin.com/careers/
What is OWASP?
• OWASP - Open Web Application Security Project
• Worldwide not-for-profit organization
• Founded in 2001
• Mission is to make the software security visible.
OWASP Projects
• OWASP Top Ten
https://www.owasp.org/index.php/Top_10-2017_Top_10
• Opensamm - Software Assurance Maturity Model
http://www.opensamm.org/
OWASP Top Ten
• Most successful OWASP Project
• Ten most critical web application security flaws
• First released in 2004
• Released every 3 years
• 2007, 2010, 2013, 2017 (current)
Adopters of OWASP Top Ten
• Microsoft
• Part of the PCI DSS
• Vulnerability scanners
• …
OWASP Top Ten 2017
• A1 Injection
• A2 Broken Authentication
• A3 Sensitive Data Exposure
• A4 XML External Entities
• A5 Broken Access Control
• A6 Security Misconfiguration
• A7 Cross-Site Scripting (XSS)
• A8 Insecure Deserialization
• A9 Using Components with Known Vulnerabilities
• A10 Insufficient Logging & Monitoring
OWASP Top Ten 2013
• A1 Injection
• A2 Broken Authentication and Session Management
• A3 Cross-Site Scripting (XSS)
• A4 Insecure Direct Object References
• A5 Security Misconfiguration
• A6 Sensitive Data Exposure
• A7 Missing Function Level Access Control
• A8 Cross-Site Request Forgery (CSRF)
• A9 Using Components with Known Vulnerabilities
• A10 Unvalidated Redirects and Forwards
2013 to 2017 - New issues
• A4 XML External Entities
• A8 Insecure Deserialization
• A10 Insufficient Logging & Monitoring
2013 to 2017 - Retired or Merged Issues
• A4 - Insecure Direct Object References and A7 -
Missing Function Level Access Control merged into
A5 - Broken Access Control
• A8 Cross-Site Request Forgery (CSRF) – dropped
• A10 Unvalidated Redirects and Forwards – dropped
2013 to 2017
• A1 Injection - not changed
• A2 Broken Authentication and Session Management renamed to
A2 Broken Authentication
• A3 Cross-Site Scripting (XSS) moved to A7 Cross-Site Scripting (XSS)
• A4 - Insecure Direct Object References and A7 merged into A5 - Broken
Access Control
• A5 Security Misconfiguration moved to A6 Security Misconfiguration
• A6 Sensitive Data Exposure moved to A3 Sensitive Data Exposure
• A7 - Missing Function Level Access Control and A4 merged into A5 -
Broken Access Control
• A8 Cross-Site Request Forgery (CSRF) – dropped
• A9 Using Components with Known Vulnerabilities - not changed
• A10 Unvalidated Redirects and Forwards – dropped
Why it changed?
• Over the last few years, the fundamental technology
and architecture of applications has changed
significantly:
• Microservices
• Single page applications
What can I do?
A1 Injection
• A user input is concatenated with executable code
• SQL injection
• OS Command Injection
• HQL injection
A1 Injection
• Example:
String query = "SELECT * FROM accounts
WHERE custID=‘” + request.getParameter("id") + "'";
A1 - How to Prevent it
• Do not pass user input directly to executable
statements
• Prepared Statements
• Parameterized Queries
• Hibernate
A2 Broken Authentication
• Session IDs aren’t rotated after successful login
• Allow brute force or other automated attacks
• Use default, weak, or well-known passwords
A2 - How to Prevent it
• Rotate Session IDs after successful login
• Implement brute force protection
• Implement password complexity
A3 Sensitive Data Exposure
• Sensitive data is transmitted or stored in clear text
• Old or weak cryptographic algorithms are used
A3 - How to Prevent it
• Encrypt all sensitive data both at rest and in transit
• Use up-to-date and strong standard algorithms,
protocols, and keys
A4 XML External Entities
• Attackers can exploit vulnerable XML processors if
they can upload XML or include hostile content in an
XML document
<?xml version="1.0" encoding="ISO-8859-1"?>
<!DOCTYPE foo [
<!ELEMENT foo ANY >
<!ENTITY xxe SYSTEM "file:///etc/passwd" >]>
<foo>&xxe;</foo>
A4 - How to Prevent it
• Disable XML external entity and DTD processing in all
XML parsers in the application, as per the OWASP
Cheat Sheet 'XXE Prevention’.
https://www.owasp.org/index.php/XML_External_Entity_(XXE)_Preventio
n_Cheat_Sheet
• For additional details see my XXE presentation:
https://ultimatesecurity.pro/post/xxe-presentation/
A5 Broken Access Control
• AKA Privilege Escalation or Elevation of privilege
• A regular user accesses a resource with an admin
permission
A5 - How to Prevent it
• Implement access control mechanisms
A6 Security Misconfiguration
• Unnecessary features are enabled or installed
• Unnecessary ports
• Services
• Default accounts
• Default passwords
A6 - How to Prevent it
• Close unnecessary ports
• Disable unnecessary services
• Remove default accounts
• Change default passwords
A7 Cross-Site Scripting (XSS)
• Attackers can execute scripts in a victim’s browser
A7 - How to Prevent it
• Input validation for all user input
• White list patterns. E.g. pattern for IPv6 or IPv4.
• Encode output
A8 Insecure Deserialization
• Serialization is the process of translating data
structures or object state into a format that can be
stored or transmitted and reconstructed later
(deserialization)
• Insecure Deserialization - an attacker changes the
object between serialization and deserialization
A8 Insecure Deserialization
• Example:
• A PHP forum uses PHP object serialization to save a
"super" cookie, containing the user's user ID, role,
password hash, and other state information:
• An attacker changes the serialized object to gain admin
privileges:
a:4:{i:0;i:132;i:1;s:7:"Mallory";i:2;s:4:"user"; i:3;s:32:
"b6a8b3bea87fe0e05022f8f3c88bc960";}
a:4:{i:0;i:1;i:1;s:5:"Alice";i:2;s:5:"admin";
i:3;s:32:"b6a8b3bea87fe0e05022f8f3c88bc960";}
A8 Insecure Deserialization
• Mark Reinhold, Oracle
Chief Architect of Java platform group
– Removing serialization is a long-term goal and is part of
project Amber
– Serialization was a “horrible mistake” made in 1997
– At least a third—maybe even half—of Java vulnerabilities
have involved serialization
A8 - How to Prevent it
• Don't accept serialized objects from untrusted
sources
A9 Using Components with
Known Vulnerabilities
• Software is vulnerable, unsupported, or out of date.
• Is any of your software out of date?
• OS
• Web/App Server
• Database
A9 - How to Prevent it
• Update software
A10 Insufficient Logging & Monitoring
• Insufficient logging
• Logins
• Failed logins
• High-value transactions
A10 - How to Prevent it
• Log important events with sufficient user context
– Username
– Client IP
– Time
Take aways
• You understand what OWASP does
• You understand the OWASP Top Ten
Thank you!
• Contact me
– www.linkedin.com/in/furmanmichael/
– ultimatesecpro@gmail.com
– https://ultimatesecurity.pro/
– @ultimatesecpro

More Related Content

PPTX
OWASP Top 10 2021 Presentation (Jul 2022)
PDF
OWASP Top 10 Web Application Vulnerabilities
PPTX
Owasp top 10 vulnerabilities
PPT
OWASP Top Ten
ODP
OWASP Secure Coding
PPTX
security misconfigurations
PPTX
Vulnerabilities in modern web applications
PPTX
Secure coding practices
OWASP Top 10 2021 Presentation (Jul 2022)
OWASP Top 10 Web Application Vulnerabilities
Owasp top 10 vulnerabilities
OWASP Top Ten
OWASP Secure Coding
security misconfigurations
Vulnerabilities in modern web applications
Secure coding practices

What's hot (20)

PPTX
malware analysis
PDF
Sql Injection - Vulnerability and Security
PPT
Top 10 Web Security Vulnerabilities (OWASP Top 10)
PPTX
OWASP Top 10 2021 What's New
PPTX
Security misconfiguration
PDF
OWASP Top 10 - 2017
PPTX
What is security testing and why it is so important?
PDF
Secure coding presentation Oct 3 2020
PDF
Broken access controls
PPT
Secure code practices
PPT
Owasp Top 10 And Security Flaw Root Causes
PPTX
A5: Security Misconfiguration
PDF
The Log4Shell Vulnerability – explained: how to stay secure
PPT
Introduction to Web Application Penetration Testing
PDF
Hacking and Defending APIs - Red and Blue make Purple.pdf
PDF
CVE-2021-44228 Log4j (and Log4Shell) Executive Explainer by cje@bugcrowd
PPTX
How to Test for The OWASP Top Ten
PPT
Introduction To OWASP
PDF
Penetration testing web application web application (in) security
PPTX
Security testing
malware analysis
Sql Injection - Vulnerability and Security
Top 10 Web Security Vulnerabilities (OWASP Top 10)
OWASP Top 10 2021 What's New
Security misconfiguration
OWASP Top 10 - 2017
What is security testing and why it is so important?
Secure coding presentation Oct 3 2020
Broken access controls
Secure code practices
Owasp Top 10 And Security Flaw Root Causes
A5: Security Misconfiguration
The Log4Shell Vulnerability – explained: how to stay secure
Introduction to Web Application Penetration Testing
Hacking and Defending APIs - Red and Blue make Purple.pdf
CVE-2021-44228 Log4j (and Log4Shell) Executive Explainer by cje@bugcrowd
How to Test for The OWASP Top Ten
Introduction To OWASP
Penetration testing web application web application (in) security
Security testing
Ad

Similar to OWASP Top Ten 2017 (20)

PPTX
OWASP Top 10 - 2017 Top 10 web application security risks
PDF
PPTX
Owasp top 10 web application security risks 2017
PPTX
Owasp 2017 oveview
PPTX
OWASP top 10-2013
PDF
Security Awareness
DOCX
supraja technologies material for secure coding
PPTX
The path of secure software by Katy Anton
PDF
Owasp Top 10
PDF
OWASP Top 10 - The Ten Most Critical Web Application Security Risks
PDF
A talk on OWASP Top 10 by Mukunda Tamly
PPTX
Owasp top 10 2017
PDF
Truetesters presents OWASP Top 10 Web Vulnerability
PDF
How to avoid top 10 security risks in Java EE applications and how to avoid them
PPTX
Application Security Vulnerabilities: OWASP Top 10 -2007
PDF
OWASP Top 10
PDF
2013 OWASP Top 10
PPTX
ODP
The OWASP Top 10 Most Critical Web App Security Risks - TdT@Cluj #20
PDF
Web Application Security 101
OWASP Top 10 - 2017 Top 10 web application security risks
Owasp top 10 web application security risks 2017
Owasp 2017 oveview
OWASP top 10-2013
Security Awareness
supraja technologies material for secure coding
The path of secure software by Katy Anton
Owasp Top 10
OWASP Top 10 - The Ten Most Critical Web Application Security Risks
A talk on OWASP Top 10 by Mukunda Tamly
Owasp top 10 2017
Truetesters presents OWASP Top 10 Web Vulnerability
How to avoid top 10 security risks in Java EE applications and how to avoid them
Application Security Vulnerabilities: OWASP Top 10 -2007
OWASP Top 10
2013 OWASP Top 10
The OWASP Top 10 Most Critical Web App Security Risks - TdT@Cluj #20
Web Application Security 101
Ad

More from Michael Furman (7)

PPTX
Kubernetes Security Act Now Before It’s Too Late
PPTX
How can you deliver a secure product
PPTX
Istio Security Overview
PPTX
Top 3 tips for security documentation
PPTX
OWASP A4 XML External Entities (XXE)
PPTX
Passwords are passé. WebAuthn is simpler, stronger and ready to go
PPTX
OpenId Connect Protocol
Kubernetes Security Act Now Before It’s Too Late
How can you deliver a secure product
Istio Security Overview
Top 3 tips for security documentation
OWASP A4 XML External Entities (XXE)
Passwords are passé. WebAuthn is simpler, stronger and ready to go
OpenId Connect Protocol

Recently uploaded (20)

PPTX
Build Your First AI Agent with UiPath.pptx
PDF
A contest of sentiment analysis: k-nearest neighbor versus neural network
PPT
What is a Computer? Input Devices /output devices
PPTX
TEXTILE technology diploma scope and career opportunities
PPTX
Microsoft Excel 365/2024 Beginner's training
PDF
Credit Without Borders: AI and Financial Inclusion in Bangladesh
PDF
UiPath Agentic Automation session 1: RPA to Agents
PPTX
Training Program for knowledge in solar cell and solar industry
PPTX
Final SEM Unit 1 for mit wpu at pune .pptx
PPT
Geologic Time for studying geology for geologist
PDF
Convolutional neural network based encoder-decoder for efficient real-time ob...
PDF
The influence of sentiment analysis in enhancing early warning system model f...
PDF
OpenACC and Open Hackathons Monthly Highlights July 2025
PPTX
GROUP4NURSINGINFORMATICSREPORT-2 PRESENTATION
PDF
Accessing-Finance-in-Jordan-MENA 2024 2025.pdf
PPTX
Configure Apache Mutual Authentication
PPT
Galois Field Theory of Risk: A Perspective, Protocol, and Mathematical Backgr...
PDF
sustainability-14-14877-v2.pddhzftheheeeee
PDF
A proposed approach for plagiarism detection in Myanmar Unicode text
PDF
Comparative analysis of machine learning models for fake news detection in so...
Build Your First AI Agent with UiPath.pptx
A contest of sentiment analysis: k-nearest neighbor versus neural network
What is a Computer? Input Devices /output devices
TEXTILE technology diploma scope and career opportunities
Microsoft Excel 365/2024 Beginner's training
Credit Without Borders: AI and Financial Inclusion in Bangladesh
UiPath Agentic Automation session 1: RPA to Agents
Training Program for knowledge in solar cell and solar industry
Final SEM Unit 1 for mit wpu at pune .pptx
Geologic Time for studying geology for geologist
Convolutional neural network based encoder-decoder for efficient real-time ob...
The influence of sentiment analysis in enhancing early warning system model f...
OpenACC and Open Hackathons Monthly Highlights July 2025
GROUP4NURSINGINFORMATICSREPORT-2 PRESENTATION
Accessing-Finance-in-Jordan-MENA 2024 2025.pdf
Configure Apache Mutual Authentication
Galois Field Theory of Risk: A Perspective, Protocol, and Mathematical Backgr...
sustainability-14-14877-v2.pddhzftheheeeee
A proposed approach for plagiarism detection in Myanmar Unicode text
Comparative analysis of machine learning models for fake news detection in so...

OWASP Top Ten 2017

  • 2. What will we cover today? • What is OWASP? • OWASP Top Ten Project • OWASP Top Ten from 2013 to 2017 • Top Ten overview
  • 3. About Me • 20+ years in software engineering • 10+ years in application security • 4+ years Lead Security Architect at Tufin • www.linkedin.com/in/furmanmichael/ • [email protected] • Read my blog https://ultimatesecurity.pro/ • Follow me on twitter @ultimatesecpro • I like to travel, read books and listen to music.
  • 4. About Tufin • Market Leader in Security Policy Orchestration for firewalls and cloud – New Tufin products integrate security into DevOps pipeline • Established in 2005 • Used in over 2,000 enterprises, including 40 Fortune 100 companies • We are constantly growing! www.tufin.com/careers/
  • 5. What is OWASP? • OWASP - Open Web Application Security Project • Worldwide not-for-profit organization • Founded in 2001 • Mission is to make the software security visible.
  • 6. OWASP Projects • OWASP Top Ten https://www.owasp.org/index.php/Top_10-2017_Top_10 • Opensamm - Software Assurance Maturity Model http://www.opensamm.org/
  • 7. OWASP Top Ten • Most successful OWASP Project • Ten most critical web application security flaws • First released in 2004 • Released every 3 years • 2007, 2010, 2013, 2017 (current)
  • 8. Adopters of OWASP Top Ten • Microsoft • Part of the PCI DSS • Vulnerability scanners • …
  • 9. OWASP Top Ten 2017 • A1 Injection • A2 Broken Authentication • A3 Sensitive Data Exposure • A4 XML External Entities • A5 Broken Access Control • A6 Security Misconfiguration • A7 Cross-Site Scripting (XSS) • A8 Insecure Deserialization • A9 Using Components with Known Vulnerabilities • A10 Insufficient Logging & Monitoring
  • 10. OWASP Top Ten 2013 • A1 Injection • A2 Broken Authentication and Session Management • A3 Cross-Site Scripting (XSS) • A4 Insecure Direct Object References • A5 Security Misconfiguration • A6 Sensitive Data Exposure • A7 Missing Function Level Access Control • A8 Cross-Site Request Forgery (CSRF) • A9 Using Components with Known Vulnerabilities • A10 Unvalidated Redirects and Forwards
  • 11. 2013 to 2017 - New issues • A4 XML External Entities • A8 Insecure Deserialization • A10 Insufficient Logging & Monitoring
  • 12. 2013 to 2017 - Retired or Merged Issues • A4 - Insecure Direct Object References and A7 - Missing Function Level Access Control merged into A5 - Broken Access Control • A8 Cross-Site Request Forgery (CSRF) – dropped • A10 Unvalidated Redirects and Forwards – dropped
  • 13. 2013 to 2017 • A1 Injection - not changed • A2 Broken Authentication and Session Management renamed to A2 Broken Authentication • A3 Cross-Site Scripting (XSS) moved to A7 Cross-Site Scripting (XSS) • A4 - Insecure Direct Object References and A7 merged into A5 - Broken Access Control • A5 Security Misconfiguration moved to A6 Security Misconfiguration • A6 Sensitive Data Exposure moved to A3 Sensitive Data Exposure • A7 - Missing Function Level Access Control and A4 merged into A5 - Broken Access Control • A8 Cross-Site Request Forgery (CSRF) – dropped • A9 Using Components with Known Vulnerabilities - not changed • A10 Unvalidated Redirects and Forwards – dropped
  • 14. Why it changed? • Over the last few years, the fundamental technology and architecture of applications has changed significantly: • Microservices • Single page applications
  • 15. What can I do?
  • 16. A1 Injection • A user input is concatenated with executable code • SQL injection • OS Command Injection • HQL injection
  • 17. A1 Injection • Example: String query = "SELECT * FROM accounts WHERE custID=‘” + request.getParameter("id") + "'";
  • 18. A1 - How to Prevent it • Do not pass user input directly to executable statements • Prepared Statements • Parameterized Queries • Hibernate
  • 19. A2 Broken Authentication • Session IDs aren’t rotated after successful login • Allow brute force or other automated attacks • Use default, weak, or well-known passwords
  • 20. A2 - How to Prevent it • Rotate Session IDs after successful login • Implement brute force protection • Implement password complexity
  • 21. A3 Sensitive Data Exposure • Sensitive data is transmitted or stored in clear text • Old or weak cryptographic algorithms are used
  • 22. A3 - How to Prevent it • Encrypt all sensitive data both at rest and in transit • Use up-to-date and strong standard algorithms, protocols, and keys
  • 23. A4 XML External Entities • Attackers can exploit vulnerable XML processors if they can upload XML or include hostile content in an XML document <?xml version="1.0" encoding="ISO-8859-1"?> <!DOCTYPE foo [ <!ELEMENT foo ANY > <!ENTITY xxe SYSTEM "file:///etc/passwd" >]> <foo>&xxe;</foo>
  • 24. A4 - How to Prevent it • Disable XML external entity and DTD processing in all XML parsers in the application, as per the OWASP Cheat Sheet 'XXE Prevention’. https://www.owasp.org/index.php/XML_External_Entity_(XXE)_Preventio n_Cheat_Sheet • For additional details see my XXE presentation: https://ultimatesecurity.pro/post/xxe-presentation/
  • 25. A5 Broken Access Control • AKA Privilege Escalation or Elevation of privilege • A regular user accesses a resource with an admin permission
  • 26. A5 - How to Prevent it • Implement access control mechanisms
  • 27. A6 Security Misconfiguration • Unnecessary features are enabled or installed • Unnecessary ports • Services • Default accounts • Default passwords
  • 28. A6 - How to Prevent it • Close unnecessary ports • Disable unnecessary services • Remove default accounts • Change default passwords
  • 29. A7 Cross-Site Scripting (XSS) • Attackers can execute scripts in a victim’s browser
  • 30. A7 - How to Prevent it • Input validation for all user input • White list patterns. E.g. pattern for IPv6 or IPv4. • Encode output
  • 31. A8 Insecure Deserialization • Serialization is the process of translating data structures or object state into a format that can be stored or transmitted and reconstructed later (deserialization) • Insecure Deserialization - an attacker changes the object between serialization and deserialization
  • 32. A8 Insecure Deserialization • Example: • A PHP forum uses PHP object serialization to save a "super" cookie, containing the user's user ID, role, password hash, and other state information: • An attacker changes the serialized object to gain admin privileges: a:4:{i:0;i:132;i:1;s:7:"Mallory";i:2;s:4:"user"; i:3;s:32: "b6a8b3bea87fe0e05022f8f3c88bc960";} a:4:{i:0;i:1;i:1;s:5:"Alice";i:2;s:5:"admin"; i:3;s:32:"b6a8b3bea87fe0e05022f8f3c88bc960";}
  • 33. A8 Insecure Deserialization • Mark Reinhold, Oracle Chief Architect of Java platform group – Removing serialization is a long-term goal and is part of project Amber – Serialization was a “horrible mistake” made in 1997 – At least a third—maybe even half—of Java vulnerabilities have involved serialization
  • 34. A8 - How to Prevent it • Don't accept serialized objects from untrusted sources
  • 35. A9 Using Components with Known Vulnerabilities • Software is vulnerable, unsupported, or out of date. • Is any of your software out of date? • OS • Web/App Server • Database
  • 36. A9 - How to Prevent it • Update software
  • 37. A10 Insufficient Logging & Monitoring • Insufficient logging • Logins • Failed logins • High-value transactions
  • 38. A10 - How to Prevent it • Log important events with sufficient user context – Username – Client IP – Time
  • 39. Take aways • You understand what OWASP does • You understand the OWASP Top Ten
  • 40. Thank you! • Contact me – www.linkedin.com/in/furmanmichael/ – [email protected] – https://ultimatesecurity.pro/ – @ultimatesecpro

Editor's Notes

  • #3: Hi everyone, Thank you for joining the last lecture for today. What will we see today? I will start by giving you an overview of OpenID Connect. I will describe the OpenID Connect protocol, and will show you how it compares to other protocols. Then, we will review some of OpenID Connect Implementations. Finally, I will show you one of the best OpenID Connect implementations: Keycloak.
  • #4: Before we begin, a couple of words about me and the company I work for - Tufin. I have many years of experience in software development. Like most of you here today, I particularly like application security. I started to work in this area more than 10 years ago, and enjoy each day I work on it. For the last few years, I am responsible for the application security of all Tufin products. Recently I have started to write a blog – you are more then welcomed to read it. Something personal: I like traveling, reading books and listening to music. I particularly enjoy listen to jazz.
  • #5: And now, a couple of words about Tufin. Tufin is a great company. It is already over 13 years old. We have a lot of customers. Our customers are all around the world: in Israel, USA, Europe, Asia. Some are huge companies, others are much smaller. We have customers in many industries. For example: AT&T, BMW and Visa. Recently we have started to develop products that integrate security into DevOps pipeline. You are more then welcomed to visit our booth. Tufin is always growing. When I joined the company about 5 years ago, it took up only one and half floors. Now it takes up almost 4 floors and that is only in Israel. We have also expanded abroad. We recently opened up a new main office in Boston. We are always looking for good people. We are looking for Java, C++, DevOps people. We are looking for Docker and Kubernetes gurus. You can visit our site to see our open positions in RnD, Sales, Marketing and additional areas.
  • #9: Microsoft Azure validates services using third party penetration testing based upon the OWASP Top Ten … Tufin customers ask if we use OWASP Top Ten recommendations.
  • #17: https://www.owasp.org/index.php/Top_10-2017_A1-Injection
  • #20: https://www.owasp.org/index.php/Top_10-2017_A2-Broken_Authentication - Session IDs are vulnerable to session fixation attacks
  • #22: https://www.owasp.org/index.php/Top_10-2017_A3-Sensitive_Data_Exposure
  • #24: https://www.owasp.org/index.php/Top_10-2017_A4-XML_External_Entities_(XXE) Example attempt to extract data from a server:
  • #25: my XXE presentation include examples and the libraries that can be used to prevent XXE.
  • #26: https://www.owasp.org/index.php/Top_10-2017_A5-Broken_Access_Control Bypassing access control checks by modifying the URL, internal application state, or the HTML page, or simply using a custom API attack tool.
  • #28: https://www.owasp.org/index.php/Top_10-2017_A6-Security_Misconfiguration Missing security hardening
  • #29: Do you use Tomcat? Have you disabled its shutdown port?
  • #30: https://www.owasp.org/index.php/Top_10-2017_A7-Cross-Site_Scripting_(XSS)
  • #32: https://www.owasp.org/index.php/Top_10-2017_A8-Insecure_Deserialization
  • #33: https://www.owasp.org/index.php/Top_10-2017_A8-Insecure_Deserialization
  • #36: https://www.owasp.org/index.php/Top_10-2017_A9-Using_Components_with_Known_Vulnerabilities Who use Java? How many times in a year you updates Java in production?
  • #38: https://www.owasp.org/index.php/Top_10-2017_A10-Insufficient_Logging%26Monitoring Attackers rely on the lack of monitoring and timely response to achieve their goals without being detected.
  • #41: Thank you for participating in my lecture! Please contact me if you need any additional information, or if you want to send me your resume.