Using Proxies to Secure Applications and More
I’ve been really surprised that for as long as I’ve been active with OWASP, I’ve never seen a proxy presentation. After all, they are hugely beneficial in doing web application penetration testing and they’re really not that difficult to use. Take TamperData for example. It’s just a firefox plugin, but it does header, cookie, get, and post manipulation just as well as WebScarab. Or Google Ratproxy, which works in the background while you browse around QA’ing your web site and gives you a nice actionable report when you’re done. I decided it was time to educate my peers on the awesomeness of proxies.
This past Tuesday I presented to a crowd of about 35 people at the Austin OWASP Meeting. The title of my presentation was “Using Proxies to Secure Applications and More”. Since so many people came up to me afterward telling me what a great presentation it was and how they learned something they can take back to the office, I decided (with a little insistance from Ernest) that it was worth putting up on SlideShare and posting to the Web Admin Blog.
The presentation starts off with a brief description of what a proxy is. Then, I talked about the different types of proxies. Then, the bulk of the presentation was just me giving examples and demonstrating the various proxies. I included anonymizing proxies, reverse proxies, and intercepting proxies. While my slides can’t substitue for the actual demo, I did try to include in them what tool I used for the demo. If you have any specific questions, please let me know. All that said, here’s the presentation.
November 3rd, 2008 at 12:14 am
Thanks for the interesting talk, Josh. It was good to see the demo of the various tools like WebScarab and Ratproxy that I haven’t had a chance to play with yet. I’m looking forward to the next OWASP meeting.