Lecture_CSF_9
Lecture_CSF_9
Lecture 9
Client and Application Security
There are available several key frameworks that provide information about client-side
vulnerabilities.
Cybersecurity
Regulatory
OWASP Framework
requirements
from NIST
Preventing client-side attacks
Considering the dynamic nature of the web and JavaScript itself, there are several security
aspects that must be taken into consideration to address client-side vulnerabilities.
Other client-side
Real-time Get visibility into
attack prevention
monitoring third-party scripts
strategies
Cross-Site Scripting (XSS)
The most common application-level web security attack is called cross-site scripting or
just XSS. A cross-site attack involves a technique known as injection – where the attacker
finds a way to get scripts running on a target website. The ultimate goal is for that targeted
web application to send the attacker’s code to some unknowing user’s browser. The XSS
attack works best when a website accepts, processes, and uses input without much
checking.
What is the danger of an XSS vulnerability?
How do client-side attacks happen?
Web application security
How to secure web applications
An attacker in
Malicious app the Server-side
Physical access Remote attacks
on the device communication attacks
channel
First and foremost, be careful not to leave your phone and tablet unattended in public
places. Be sure to set a password to unlock your device or enable biometric protection if
possible. Do not elevate privileges to administrative (jailbreak or root), disable displaying
notifications on the locked screen.
Attacks by malicious applications
There are several sources of such applications:
• Official app stores - Google Play and App Store. Rarely, but even in the official
marketplaces, you can find a malicious app that can harm you and your data. Often such
apps try to get more installations with clickbait titles like "Super Battery", "Turbo
Browser" or "Virus Cleaner 2019".
• Unofficial websites and app stores (third-party appstore). For Android devices, just allow
installation from untrusted sources and then download the app's apk file from the site.
For iOS devices, it is enough to follow the link in Safari browser, confirm the installation
of the certificate on the device, and then any application in this unofficial store will be
available for installation directly from the browser.
• The user can install an application downloaded from the Internet using a USB
connection.
• For Android devices, it is possible to download a part of the application by clicking on a
link - Google Play Instant mechanism.
Attacks in the communication channel
If an attacker manages to gain control of the traffic between the client application and the server,
this will give them a number of opportunities:
As a result, it will learn the victim's logins and passwords from various accounts and will be able to
use them to steal data, steal money.
Remote attacks
The more familiar http:// and https:// links can be handled in a similar way on mobile
devices - they can be passed to the application instead of the browser, in some cases
without user confirmation.
For Android devices, clicking on a link can trigger an Instant App download, making it
possible to remotely exploit vulnerabilities related to the installation of a malicious app.