76

XML Amsterdam 2012 / Security Implications of XML Processing

Embed Size (px)

DESCRIPTION

Content: - Hiding malicious PDF inside XDP - DoS attacks: 10^9 LOL, xsl:number, hash collision - XML External Entites attacks - Abuse of XSLT legitimate features - Fuzzing of XSLT processors

Citation preview

Page 1: XML Amsterdam 2012 / Security Implications of XML Processing
Page 2: XML Amsterdam 2012 / Security Implications of XML Processing
Page 3: XML Amsterdam 2012 / Security Implications of XML Processing
Page 4: XML Amsterdam 2012 / Security Implications of XML Processing
Page 5: XML Amsterdam 2012 / Security Implications of XML Processing
Page 6: XML Amsterdam 2012 / Security Implications of XML Processing
Page 7: XML Amsterdam 2012 / Security Implications of XML Processing
Page 8: XML Amsterdam 2012 / Security Implications of XML Processing
Page 9: XML Amsterdam 2012 / Security Implications of XML Processing
Page 10: XML Amsterdam 2012 / Security Implications of XML Processing
Page 11: XML Amsterdam 2012 / Security Implications of XML Processing
Page 12: XML Amsterdam 2012 / Security Implications of XML Processing
Page 13: XML Amsterdam 2012 / Security Implications of XML Processing
Page 14: XML Amsterdam 2012 / Security Implications of XML Processing
Page 15: XML Amsterdam 2012 / Security Implications of XML Processing
Page 16: XML Amsterdam 2012 / Security Implications of XML Processing
Page 17: XML Amsterdam 2012 / Security Implications of XML Processing
Page 18: XML Amsterdam 2012 / Security Implications of XML Processing
Page 19: XML Amsterdam 2012 / Security Implications of XML Processing
Page 20: XML Amsterdam 2012 / Security Implications of XML Processing
Page 21: XML Amsterdam 2012 / Security Implications of XML Processing
Page 22: XML Amsterdam 2012 / Security Implications of XML Processing
Page 23: XML Amsterdam 2012 / Security Implications of XML Processing
Page 24: XML Amsterdam 2012 / Security Implications of XML Processing
Page 25: XML Amsterdam 2012 / Security Implications of XML Processing
Page 26: XML Amsterdam 2012 / Security Implications of XML Processing
Page 27: XML Amsterdam 2012 / Security Implications of XML Processing
Page 28: XML Amsterdam 2012 / Security Implications of XML Processing
Page 29: XML Amsterdam 2012 / Security Implications of XML Processing
Page 30: XML Amsterdam 2012 / Security Implications of XML Processing
Page 31: XML Amsterdam 2012 / Security Implications of XML Processing
Page 32: XML Amsterdam 2012 / Security Implications of XML Processing
Page 33: XML Amsterdam 2012 / Security Implications of XML Processing
Page 34: XML Amsterdam 2012 / Security Implications of XML Processing
Page 35: XML Amsterdam 2012 / Security Implications of XML Processing
Page 36: XML Amsterdam 2012 / Security Implications of XML Processing
Page 37: XML Amsterdam 2012 / Security Implications of XML Processing
Page 38: XML Amsterdam 2012 / Security Implications of XML Processing
Page 39: XML Amsterdam 2012 / Security Implications of XML Processing
Page 40: XML Amsterdam 2012 / Security Implications of XML Processing
Page 41: XML Amsterdam 2012 / Security Implications of XML Processing
Page 42: XML Amsterdam 2012 / Security Implications of XML Processing
Page 43: XML Amsterdam 2012 / Security Implications of XML Processing
Page 44: XML Amsterdam 2012 / Security Implications of XML Processing
Page 45: XML Amsterdam 2012 / Security Implications of XML Processing
Page 46: XML Amsterdam 2012 / Security Implications of XML Processing
Page 47: XML Amsterdam 2012 / Security Implications of XML Processing
Page 48: XML Amsterdam 2012 / Security Implications of XML Processing
Page 49: XML Amsterdam 2012 / Security Implications of XML Processing
Page 50: XML Amsterdam 2012 / Security Implications of XML Processing
Page 51: XML Amsterdam 2012 / Security Implications of XML Processing
Page 52: XML Amsterdam 2012 / Security Implications of XML Processing
Page 53: XML Amsterdam 2012 / Security Implications of XML Processing
Page 54: XML Amsterdam 2012 / Security Implications of XML Processing
Page 55: XML Amsterdam 2012 / Security Implications of XML Processing
Page 56: XML Amsterdam 2012 / Security Implications of XML Processing
Page 57: XML Amsterdam 2012 / Security Implications of XML Processing
Page 58: XML Amsterdam 2012 / Security Implications of XML Processing
Page 59: XML Amsterdam 2012 / Security Implications of XML Processing
Page 60: XML Amsterdam 2012 / Security Implications of XML Processing
Page 61: XML Amsterdam 2012 / Security Implications of XML Processing
Page 62: XML Amsterdam 2012 / Security Implications of XML Processing
Page 63: XML Amsterdam 2012 / Security Implications of XML Processing
Page 64: XML Amsterdam 2012 / Security Implications of XML Processing
Page 65: XML Amsterdam 2012 / Security Implications of XML Processing
Page 66: XML Amsterdam 2012 / Security Implications of XML Processing
Page 67: XML Amsterdam 2012 / Security Implications of XML Processing
Page 68: XML Amsterdam 2012 / Security Implications of XML Processing
Page 69: XML Amsterdam 2012 / Security Implications of XML Processing
Page 70: XML Amsterdam 2012 / Security Implications of XML Processing
Page 71: XML Amsterdam 2012 / Security Implications of XML Processing
Page 72: XML Amsterdam 2012 / Security Implications of XML Processing
Page 73: XML Amsterdam 2012 / Security Implications of XML Processing
Page 74: XML Amsterdam 2012 / Security Implications of XML Processing
Page 75: XML Amsterdam 2012 / Security Implications of XML Processing
Page 76: XML Amsterdam 2012 / Security Implications of XML Processing