Overview
Syllabus
Intro
What is Threat Modelling?
What is a Design Flaw?
Who Sent the Message?
In Theory: Good Security Controls
In Practice: Design Flaws in Integration
Mind the Gap: Stepping Over the Step-Up
Step-up Authentication
Attacking Step-up
Secure Password Storage with Insecure Side Effects
Developers Come to the Rescue
Production Web Farm Using Session DB
One-Time Passwords in Parallel Universes
Multi-factor Authentication for Remote Access
Side-effect of Load Balancing Servers
Secure Connection or Open Door?
Attacking the System
Attack the Datacentre
What is an Asset?
Gaming: Is Userld an Asset?
How Can Bob Climb the Leaderboard?
Summary
Taught by
OWASP Foundation