Overview
Syllabus
APPSEC EUROPE
Agenda
Common attack patterns
Clipboard (or memory) manipulation
Server vulnerability exploitation
How banks mitigate these risks?
Vuin examples (functional)
Vuln examples (non functional)
Transaction authorization best practices
make it trusted
overwrite data
business logic error
Trusted recipients Recommendations
Limit examples
Transaction limits - requirements
Notifications - requirements
USER AUTHENTICATION
Payment Services Directive (revised)
Strong Customer Authentication (SCA)
Payment Initiation Service
Account Information Service
Implementation errors - vulnerabilities
Precise requirements
OWASP to the rescue!
Internet banking - proposal
Taught by
OWASP Foundation