Documenti di Didattica
Documenti di Professioni
Documenti di Cultura
proferyk@gmail.com
Overview
Survey
Application breaches by initial attack type
Source: https://www.f5.com/content/dam/f5-labs-v2/article/pdfs/F5Labs_2018_Application_Protection_Report.pdf
Common Web Application Vulnerabilities (1/2)
Source: https://www.edgescan.com/wp-content/uploads/2019/02/edgescan-Vulnerability-Stats-Report-2019.pdf
Common Web Application Vulnerabilities (2/2)
Source: https://www.edgescan.com/wp-content/uploads/2019/02/edgescan-Vulnerability-Stats-Report-2019.pdf
Case Studies - Indonesia
Cyber Attack Map
Vulnerability Stack
User – Login Form
Internet
Firewall
Web Server
Web Application
DBMS
Source: https://www.f5.com/content/dam/f5-labs-v2/article/pdfs/F5Labs_2018_Application_Protection_Report.pdf
Sample Attack via Compromised Digital Certificate
Source: https://www.f5.com/content/dam/f5-labs-v2/article/pdfs/F5Labs_2018_Application_Protection_Report.pdf
Sample Attack via DNS
Source: https://www.f5.com/content/dam/f5-labs-v2/article/pdfs/F5Labs_2018_Application_Protection_Report.pdf
Web Hacking Tools
Source: https://www.statista.com/statistics/800916/worldwide-useful-software-hacking/
How to Prevent Web Application
Attack
Primary Application Protection Steps
Find Bug(s) Report Bug Bug Validation Bug Rating Bug Fixing Rewards
Source: https://bugbounty.linecorp.com/en/faq/
Bug Bounty Rewards - Sample
Live Demo
Thank You
proferyk@gmail.com