HTTP Fingerprinting and Advanced Assessment Techniques
|
|
|
- Amanda Martin
- 10 years ago
- Views:
Transcription
1 HTTP Fingerprinting and Advanced Assessment Techniques Saumil Shah Director, Net-Square Author: Web Hacking - Attacks and Defense BlackHat 2003, Washington DC
2 The Web Hacker s playground Web Client Web Server Web app Web app Web app Web app DB DB
3 The Evolution of Web Hacking Classic phf bug Automated web vulnerability checking Input validation attacks Buffer overflows Source code disclosure Session Hijacking Lame attacks (the client side XS? attacks)
4 The Evolution of Web Defense Tight web server configuration. Web server plug-in filters. Secure coding (yea rrright) Security by obscurity.
5 Security by obscurity Who is running IIS? Not me! Web server target acquisition: largely by banner grabbing $ nc HEAD / HTTP/1.0 HTTP/ OK Server: Microsoft-IIS/5.0 Content-Location: Date: Fri, 01 Jan :09:05 GMT Content-Type: text/html Accept-Ranges: bytes Last-Modified: Fri, 01 Jan :09:05 GMT ETag: W/"e0d362a4c335be1:ae0" Content-Length: 133
6 Security by obscurity Patch web server binaries to change server banner. e.g. Microsoft-IIS/5.0 rewritten to be Apache/ If source is available, recompile with different server banner. e.g. Apache/ rewritten to be WebSTAR Works well in defeating certain automated attacks / script kiddies.
7 Security by obscurity Web server configuration rules / plug-ins to disguise the server header. Re-order HTTP header fields, change cookie names, filter certain responses, etc. $ nc HEAD / HTTP/1.0 HTTP/ OK Date: Fri, 01 Jan :06:24 GMT Server: Apache/ (Unix) (Red-Hat/Linux) mod_ssl/2.8.1 OpenSSL/0.9.6 DAV/1.0.2 PHP/4.0.4pl1 mod_perl/1.24_01 Content-Location: Last-Modified: Fri, 01 Jan :06:24 GMT ETag: W/"e0d362a4c335be1:ae0" Accept-Ranges: bytes Content-Length: 133 Content-Type: text/html with ServerMask 2.0
8 HTTP Fingerprinting Objective: To accurately determine the underlying web server platform. Also attempt to uncover any plug-ins, app servers, etc. Based on implementation assumptions / peculiarities of the HTTP protocol spec.
9 HTTP Fingerprinting Fingerprinting logic Decision-tree based methods Statistical methods Neural Network based methods Fingerprinting engine Set of test cases, carefully chosen Response-tree Weight vectors
10 HTTP Fingerprinting Techniques Deviation from HTTP RFCs Behaviour not specified by the HTTP RFCs Default behaviour Header field order Implementation peculiarities Error analysis Cookie strings similar to OS fingerprinting
11 HTTP Fingerprinting - Accuracy Choice of test cases Decision-trees are hard to scale Choice of result weights Scoring system Training input set (for neural networks)
12 HTTP Fingerprinting - example 1 REPORTED: Apache-AdvancedExtranetServer/ (Linux- Mandrake/3mdk) mod_ssl/2.8.2 OpenSSL/0.9.6 PHP/4.0.4pl1 Best Match: Apache/1.3.x Microsoft-IIS/4.0: 23 Netscape-Enterprise/6.0: 24 Microsoft-IIS/5.0: 23 Netscape-FastTrack/4.1: 37 Microsoft-IIS/5.1: 22 Netscape-Enterprise/4.0: 10 Microsoft-IIS/6.0: 19 Netscape-Enterprise/4.1: 37 Microsoft-IIS/URLScan: 18 Netscape-Enterprise/3.6: 10 Apache/2.0.x: 70 Zeus/4.0: 29 Apache/1.3.27: 77 Zeus/4.1: 28 Apache/1.3.26: 76 Zeus/4_2: 23 Apache/1.3.x: 78 Lotus-Domino/5.0.x: 1 Apache/1.2.6: 73 AOLserver/ : 20 Stronghold/4.0-Apache/1.3.x: 68 Stronghold/2.4.2-Apache/1.3.x: 38 No obfuscation. Verification of testing.
13 HTTP Fingerprinting - example 2 REPORTED: WebSTAR Best Match: Apache/ Apache/ Microsoft-IIS/4.0: 29 Netscape-Enterprise/6.0: 26 Microsoft-IIS/5.0: 29 Netscape-FastTrack/4.1: 23 Microsoft-IIS/5.1: 29 Netscape-Enterprise/4.0: 14 Microsoft-IIS/6.0: 39 Netscape-Enterprise/4.1: 23 Microsoft-IIS/URLScan: 27 Netscape-Enterprise/3.6: 25 Apache/2.0.x: 56 Zeus/4.0: 10 Apache/1.3.27: 59 Zeus/4.1: 21 Apache/1.3.26: 59 Zeus/4_2: 27 Apache/1.3.x: 58 Lotus-Domino/5.0.x: 1 Apache/1.2.6: 43 AOLserver/ : 34 Stronghold/4.0-Apache/1.3.x: 51 Stronghold/2.4.2-Apache/1.3.x: 56 Recompiled Apache - banner patching. Easy to tell
14 HTTP Fingerprinting - example 3 REPORTED: Apache/ (Unix) Best Match: Microsoft-IIS/4.0 Microsoft-IIS/4.0: 63 Netscape-Enterprise/6.0: 25 Microsoft-IIS/5.0: 53 Netscape-FastTrack/4.1: 28 Microsoft-IIS/5.1: 54 Netscape-Enterprise/4.0: 11 Microsoft-IIS/6.0: 31 Netscape-Enterprise/4.1: 28 Microsoft-IIS/URLScan: 50 Netscape-Enterprise/3.6: 22 Apache/2.0.x: 40 Zeus/4.0: 15 Apache/1.3.27: 49 Zeus/4.1: 16 Apache/1.3.26: 48 Zeus/4_2: 23 Apache/1.3.x: 48 Lotus-Domino/5.0.x: 2 Apache/1.2.6: 48 AOLserver/ : 21 Stronghold/4.0-Apache/1.3.x: 35 Stronghold/2.4.2-Apache/1.3.x: 33 Servermask: Scores are close enough to one another. Bit harder to tell.
15 httprint HTTP fingerprinting tool httprint for advanced HTTP fingerprinting.
16 httprint Features Available in GUI and command-line Windows, Linux and Mac OS X FreeBSD port coming soon Download from: Can easily add server signatures
17 Slick HTML reports! httprint Reports
18 HTTP Response Codes Customised error pages. A non existent page should return an HTTP 404 code. Many servers return: 301/302 - redirect to some starting page 200 OK - to fool crawlers and other customised codes.
19 Page Signatures Objective: To accurately identify proper HTTP response codes. Minimize false positives. Greatly helps in automated testing. Can be extended beyond error detection e.g. group similar pages together
20 Page Signatures Each HTTP response has a page signature. Content independent. Ability to overlook random content. Constant length. Computation time: O(n) Comparision time: O(k) 200:A302E6F1DC10112A5AF8624E5EA11B367F93DD04
21 Normal error page $ nc GET /junk HTTP/1.0 HTTP/ Not Found Date: Tue, 04 Feb :22:00 GMT Server: Apache/ (Unix) mod_perl/1.26 mod_ssl/2.8.9 OpenSSL/0.9.6e Connection: close Content-Type: text/html; charset=iso <!DOCTYPE HTML PUBLIC "-//IETF//DTD HTML 2.0//EN"> <HTML><HEAD> <TITLE>404 Not Found</TITLE> </HEAD><BODY> <H1>Not Found</H1> The requested URL /junk was not found on this server.<p> <HR> <ADDRESS>Apache/ Server at Port 8222</ADDRESS> </BODY></HTML>
22 Customised error page $ nc GET /junk HTTP/1.0 HTTP/ OK Date: Tue, 04 Feb :41:06 GMT Server: Apache-AdvancedExtranetServer/ (Linux-Mandrake/3mdk) mod_ssl/2.8.2 OpenSSL/0.9.6 PHP/4.0.4pl1 Connection: close Content-Type: text/html; charset=iso <html><body><h1>sorry!</h1><p>random number: <p>The link you requested <b> was not found <p>please contact the site administrator at <a href="mailto:[email protected]"> [email protected]</a> if you feel this is in error. Alternately, try searching with Google <p>in 1 minute, you will be refreshed back to the main page <p><form method=get action= <IMG SRC= border=0 ALT=Google align=absmiddle> <INPUT TYPE=text name=q size=15 maxlength=255><input type=submit name=btng VALUE=Search> </FORM></body></html>
23 Dealing with random content Page signatures are independent of content 200:A24518F AD2B6A363342B876B6D27B8C 200:A24518F AD2B6A363342B876B6D27B8C 200:A24518F AD2B6A363342B876B6D27B8C All of the above are 404 pages. Though their content may change, their signature doesn t.
24 Reverse Proxy Servers Web proxy servers may work both ways! Typically meant to allow users from within a network to access external web sites. May end up proxying HTTP requests from the outside world to the internal network. e.g. Compaq Insight Manager Usually happens when the front end web server proxies requests to back end app servers.
25 Reverse Proxying Web Client DB GET HTTP/1.0
26 Port Scanning through Proxies Issue multiple GET requests to the proxy: GET HTTP/1.0 GET HTTP/1.0 GET HTTP/1.0 GET HTTP/1.0 Use Page signatures to identify accurately if a port is open on an internal host.
27 Better CONNECTivity HTTP CONNECT can be used to open up a bi-directional TCP connection. Originally intended for SSL traffic. Often overlooked. Ability to tunnel arbitrary TCP data over an HTTP proxy connection. Once CONNECTed, the proxy simply passes the TCP data back and forth.
28 Automated Web Security Assessment The need for overcoming HTTP s customisable aspects: Server banner strings Response codes Improving accuracy Using core concepts to extend assessment techniques
29 Closing Thoughts You cant patch (or hide) carelessness. Web Hacking: Attacks and Defense Saumil Shah, Shreeraj Shah, Stuart McClure Addison Wesley 2002.
30 Thank you!
Top Ten Web Attacks. Saumil Shah Net-Square. BlackHat Asia 2002, Singapore
Top Ten Web Attacks Saumil Shah Net-Square BlackHat Asia 2002, Singapore TodayÕs battleground Ð the Web Web sites and web applications rapidly growing. Complex business applications are now delivered over
Outline Definition of Webserver HTTP Static is no fun Software SSL. Webserver. in a nutshell. Sebastian Hollizeck. June, the 4 th 2013
Definition of in a nutshell June, the 4 th 2013 Definition of Definition of Just another definition So what is it now? Example CGI php comparison log-file Definition of a formal definition Aisaprogramthat,usingthe
Divide and Conquer Real World Distributed Port Scanning
Divide and Conquer Real World Distributed Port Scanning Ofer Maor CTO Hacktics 16 Feb 2006 Hackers & Threats I, 3:25PM (HT1-302) Introduction Divide and Conquer: Real World Distributed Port Scanning reviews
Hack Yourself First. Troy Hunt @troyhunt troyhunt.com [email protected]
Hack Yourself First Troy Hunt @troyhunt troyhunt.com [email protected] We re gonna turn you into lean, mean hacking machines! Because if we don t, these kids are going to hack you Jake Davies, 19 (and
Ethical Hacking as a Professional Penetration Testing Technique
Ethical Hacking as a Professional Penetration Testing Technique Rochester ISSA Chapter Rochester OWASP Chapter - Durkee Consulting, Inc. [email protected] 2 Background Founder of Durkee Consulting since 1996
CIT 380: Securing Computer Systems
CIT 380: Securing Computer Systems Scanning CIT 380: Securing Computer Systems Slide #1 Topics 1. Port Scanning 2. Stealth Scanning 3. Version Identification 4. OS Fingerprinting 5. Vulnerability Scanning
600-152 People Data and the Web Forms and CGI CGI. Facilitating interactive web applications
CGI Facilitating interactive web applications Outline In Informatics 1, worksheet 7 says You will learn more about CGI and forms if you enroll in Informatics 2. Now we make good on that promise. First
Project #2. CSE 123b Communications Software. HTTP Messages. HTTP Basics. HTTP Request. HTTP Request. Spring 2002. Four parts
CSE 123b Communications Software Spring 2002 Lecture 11: HTTP Stefan Savage Project #2 On the Web page in the next 2 hours Due in two weeks Project reliable transport protocol on top of routing protocol
GET /FB/index.html HTTP/1.1 Host: lmi32.cnam.fr
GET /FB/index.html HTTP/1.1 Host: lmi32.cnam.fr HTTP/1.1 200 OK Date: Thu, 20 Oct 2005 14:42:54 GMT Server: Apache/2.0.50 (Linux/SUSE) Last-Modified: Thu, 20 Oct 2005 14:41:56 GMT ETag: "2d7b4-14b-8efd9500"
Exercises: FreeBSD: Apache and SSL: pre SANOG VI Workshop
14/01/05 file:/data/hervey/docs/pre-sanog/web/ha/security/apache-ssl-exercises.html #1 Exercises Exercises: FreeBSD: Apache and SSL: pre SANOG VI Workshop 1. Install Apache with SSL support 2. Configure
Hypertext for Hyper Techs
Hypertext for Hyper Techs An Introduction to HTTP for SecPros Bio Josh Little, GSEC ~14 years in IT. Support, Server/Storage Admin, Webmaster, Web App Dev, Networking, VoIP, Projects, Security. Currently
Web. Services. Web Technologies. Today. Web. Technologies. Internet WWW. Protocols TCP/IP HTTP. Apache. Next Time. Lecture #3 2008 3 Apache.
JSP, and JSP, and JSP, and 1 2 Lecture #3 2008 3 JSP, and JSP, and Markup & presentation (HTML, XHTML, CSS etc) Data storage & access (JDBC, XML etc) Network & application protocols (, etc) Programming
Automated Vulnerability Scan Results
Automated Vulnerability Scan Results Table of Contents Introduction...2 Executive Summary...3 Possible Vulnerabilities... 7 Host Information... 17 What Next?...20 1 Introduction The 'www.example.com' scan
Product Documentation. Preliminary Evaluation of the OpenSSL Security Advisory (0.9.8 and 1.0.1)
Product Documentation Preliminary Evaluation of the OpenSSL Security Advisory (0.9.8 and 1.0.1) Contents Contents Copyright... 3 Preliminary Evaluation of the OpenSSL Security Advisory (0.9.8 and 1.0.1)...
1. When will an IP process drop a datagram? 2. When will an IP process fragment a datagram? 3. When will a TCP process drop a segment?
Questions 1. When will an IP process drop a datagram? 2. When will an IP process fragment a datagram? 3. When will a TCP process drop a segment? 4. When will a TCP process resend a segment? CP476 Internet
Playing with Web Application Firewalls
Playing with Web Application Firewalls DEFCON 16, August 8-10, 2008, Las Vegas, NV, USA Who is Wendel Guglielmetti Henrique? Penetration Test analyst at SecurityLabs - Intruders Tiger Team Security division
Web security. Live hacking demo. Rick van Tol Arthur Donkers Paul van Maaren Eilko Bos. http://www.reseau.nl/
Web security Live hacking demo Rick van Tol Arthur Donkers Paul van Maaren Eilko Bos 1 http://www.reseau.nl/ Overview Introduction Disclaimer (cover our...) Hackers (what are we up against?) Shift of emphasis
By Bardia, Patit, and Rozheh
HTTP By Bardia, Patit, and Rozheh HTTP - Introduction - Hyper Text Transfer Protocol -uses the TCP/IP technology -has had the most impact on the World Wide Web (WWW) - specs in RFC 2616 (RFC2616) HTTP
Module 45 (More Web Hacking)
(More Web Hacking) In this Module, you'll lear how to use netcat to perform cursory server reconnaissance. You'll lear what a web proxy is and how it functions. You'll know how to enable your browser to
No. Time Source Destination Protocol Info 1190 131.859385 128.238.245.34 128.119.245.12 HTTP GET /ethereal-labs/http-ethereal-file1.html HTTP/1.
Ethereal Lab: HTTP 1. The Basic HTTP GET/response interaction 1190 131.859385 128.238.245.34 128.119.245.12 HTTP GET /ethereal-labs/http-ethereal-file1.html HTTP/1.1 GET /ethereal-labs/http-ethereal-file1.html
CS640: Introduction to Computer Networks. Applications FTP: The File Transfer Protocol
CS640: Introduction to Computer Networks Aditya Akella Lecture 4 - Application Protocols, Performance Applications FTP: The File Transfer Protocol user at host FTP FTP user client interface local file
CloudOYE CDN USER MANUAL
CloudOYE CDN USER MANUAL Password - Based Access Logon to http://mycloud.cloudoye.com. Enter your Username & Password In case, you have forgotten your password, click Forgot your password to request a
Exercises: FreeBSD: Apache and SSL: SANOG VI IP Services Workshop
Exercises Exercises: FreeBSD: Apache and SSL: SANOG VI IP Services Workshop July 18, 2005 1. 2. 3. 4. 5. Install Apache with SSL support Configure Apache to start at boot Verify that http and https (Apache)
CTIS 256 Web Technologies II. Week # 1 Serkan GENÇ
CTIS 256 Web Technologies II Week # 1 Serkan GENÇ Introduction Aim: to be able to develop web-based applications using PHP (programming language) and mysql(dbms). Internet is a huge network structure connecting
The Hyper-Text Transfer Protocol (HTTP)
The Hyper-Text Transfer Protocol (HTTP) Antonio Carzaniga Faculty of Informatics University of Lugano October 4, 2011 2005 2007 Antonio Carzaniga 1 HTTP message formats Outline HTTP methods Status codes
Internet Technologies. World Wide Web (WWW) Proxy Server Network Address Translator (NAT)
Internet Technologies World Wide Web (WWW) Proxy Server Network Address Translator (NAT) What is WWW? System of interlinked Hypertext documents Text, Images, Videos, and other multimedia documents navigate
URLs and HTTP. ICW Lecture 10 Tom Chothia
URLs and HTTP ICW Lecture 10 Tom Chothia This Lecture The two basic building blocks of the web: URLs: Uniform Resource Locators HTTP: HyperText Transfer Protocol Uniform Resource Locators Many Internet
World Wide Web. Before WWW
World Wide Web [email protected] Before WWW Major search tools: Gopher and Archie Archie Search FTP archives indexes Filename based queries Gopher Friendly interface Menu driven queries João Neves 2
Modern Web Development From Angle Brackets to Web Sockets
Modern Web Development From Angle Brackets to Web Sockets Pete Snyder Outline (or, what am i going to be going on about ) 1.What is the Web? 2.Why the web matters 3.What s unique about
Application layer Web 2.0
Information Network I Application layer Web 2.0 Youki Kadobayashi NAIST They re revolving around the web, after all Name any Internet-related buzz: Cloud computing Smartphone Social media... You ll end
Web Server and Web Application Testing
Chapter 4 Web Server and Web Application Testing Solutions in this chapter: Introduction Approach Core Technologies Open Source Tools Case Studies: The Tools in Action 221 222 Chapter 4 Web Server and
WEB APPLICATION HACKING. Part 2: Tools of the Trade (and how to use them)
WEB APPLICATION HACKING Part 2: Tools of the Trade (and how to use them) Jonathan Eddy September 27, 2013 Last Updated September 27, 2013 MAPPING THE APPLICATION 4 2 ENUMERATING CONTENT AND FUNCTIONALITY
Web Application Threats and Vulnerabilities Web Server Hacking and Web Application Vulnerability
Web Application Threats and Vulnerabilities Web Server Hacking and Web Application Vulnerability WWW Based upon HTTP and HTML Runs in TCP s application layer Runs on top of the Internet Used to exchange
A Study on The Information Gathering Method for Penetration Testing
보안공학연구논문지 (Journal of Security Engineering), 제 5권 제 5호 2008년 10월 A Study on The Information Gathering Method for Penetration Testing Adrian Stoica 1) Abstract Information gathering is the initial stage
APACHE HTTP SERVER 2.2.8
LEVEL 3 APACHEHTTP APACHE HTTP SERVER 2.2.8 HTTP://HTTPD.APACHE.ORG SUMMARY Apache HTTP Server is an open source web server application regarded as one of the most efficient, scalable, and feature-rich
Hack Yourself First. Troy Hunt @troyhunt troyhunt.com [email protected]
Hack Yourself First Troy Hunt @troyhunt troyhunt.com [email protected] We re gonna turn you into lean, mean hacking machines! Because if we don t, these kids are going to hack you Jake Davies, 19 (and
Learn Ethical Hacking, Become a Pentester
Learn Ethical Hacking, Become a Pentester Course Syllabus & Certification Program DOCUMENT CLASSIFICATION: PUBLIC Copyrighted Material No part of this publication, in whole or in part, may be reproduced,
Bank Hacking Live! Ofer Maor CTO, Hacktics Ltd. ATC-4, 12 Jun 2006, 4:30PM
Bank Hacking Live! Ofer Maor CTO, Hacktics Ltd. ATC-4, 12 Jun 2006, 4:30PM Agenda Introduction to Application Hacking Demonstration of Attack Tool Common Web Application Attacks Live Bank Hacking Demonstration
Network Technologies
Network Technologies Glenn Strong Department of Computer Science School of Computer Science and Statistics Trinity College, Dublin January 28, 2014 What Happens When Browser Contacts Server I Top view:
Streaming Media System Requirements and Troubleshooting Assistance
Test Your System Streaming Media System Requirements and Troubleshooting Assistance Test your system to determine if you can receive streaming media. This may help identify why you are having problems,
CS 558 Internet Systems and Technologies
CS 558 Internet Systems and Technologies Dimitris Deyannis [email protected] 881 Heat seeking Honeypots: Design and Experience Abstract Compromised Web servers are used to perform many malicious activities.
The purpose of this report is to educate our prospective clients about capabilities of Hackers Locked.
This sample report is published with prior consent of our client in view of the fact that the current release of this web application is three major releases ahead in its life cycle. Issues pointed out
Penetration Testing with Kali Linux
Penetration Testing with Kali Linux PWK Copyright 2014 Offensive Security Ltd. All rights reserved. Page 1 of 11 All rights reserved to Offensive Security, 2014 No part of this publication, in whole or
reference: HTTP: The Definitive Guide by David Gourley and Brian Totty (O Reilly, 2002)
1 cse879-03 2010-03-29 17:23 Kyung-Goo Doh Chapter 3. Web Application Technologies reference: HTTP: The Definitive Guide by David Gourley and Brian Totty (O Reilly, 2002) 1. The HTTP Protocol. HTTP = HyperText
CIS 551 / TCOM 401 Computer and Network Security. Spring 2007 Lecture 20
CIS 551 / TCOM 401 Computer and Network Security Spring 2007 Lecture 20 Announcements Reminder: Project 3 is available on the web pages Due: April 3rd Midterm II has been graded Today: Web Security [Some
Wikto how does it work and how do I use it?
Wikto how does it work and how do I use it? Introduction This document describes how to use Wikto to quickly and easily perform web server assessments. Before we start we need to know what Wikto does and
(WAPT) Web Application Penetration Testing
(WAPT) Web Application Penetration Testing Module 0: Introduction 1. Introduction to the course. 2. How to get most out of the course 3. Resources you will need for the course 4. What is WAPT? Module 1:
Remote Network Analysis
Remote Network Analysis Torsten Hoefler [email protected] (DMZ), mostly between two packet filters and application gateways. The different possibilities to connect DMZ-hosts are also shown in Figure
Cache All The Things
Cache All The Things About Me Mike Bell Drupal Developer @mikebell_ http://drupal.org/user/189605 Exactly what things? erm... everything! No really... Frontend: - HTML - CSS - Images - Javascript Backend:
Protocolo HTTP. Web and HTTP. HTTP overview. HTTP overview
Web and HTTP Protocolo HTTP Web page consists of objects Object can be HTML file, JPEG image, Java applet, audio file, Web page consists of base HTML-file which includes several referenced objects Each
Passive Network Traffic Analysis: Understanding a Network Through Passive Monitoring Kevin Timm,
Passive Network Traffic Analysis: Understanding a Network Through Passive Monitoring Kevin Timm, Network IDS devices use passive network monitoring extensively to detect possible threats. Through passive
3. Broken Account and Session Management. 4. Cross-Site Scripting (XSS) Flaws. Web browsers execute code sent from websites. Account Management
What is an? s Ten Most Critical Web Application Security Vulnerabilities Anthony LAI, CISSP, CISA Chapter Leader (Hong Kong) [email protected] Open Web Application Security Project http://www.owasp.org
Out of the Fire - Adding Layers of Protection When Deploying Oracle EBS to the Internet
Out of the Fire - Adding Layers of Protection When Deploying Oracle EBS to the Internet March 8, 2012 Stephen Kost Chief Technology Officer Integrigy Corporation Phil Reimann Director of Business Development
Chapter 27 Hypertext Transfer Protocol
Chapter 27 Hypertext Transfer Protocol Columbus, OH 43210 [email protected] http://www.cis.ohio-state.edu/~jain/ 27-1 Overview Hypertext language and protocol HTTP messages Browser architecture CGI
TCP Packet Tracing Part 1
TCP Packet Tracing Part 1 Robert L Boretti Jr ([email protected]) Marvin Knight ([email protected]) Advisory Software Engineers 24 May 2011 Agenda Main Focus - TCP Packet Tracing What is TCP - general description
Cyber Security Scan Report
Scan Customer Information Scan Company Information Company: Example Name Company: SRC Security Research & Consulting GmbH Contact: Mr. Example Contact: Holger von Rhein : : Senior Consultant Telephone:
Web Application Vulnerability Testing with Nessus
The OWASP Foundation http://www.owasp.org Web Application Vulnerability Testing with Nessus Rïk A. Jones, CISSP [email protected] Rïk A. Jones Web developer since 1995 (16+ years) Involved with information
THE SMARTEST WAY TO PROTECT WEBSITES AND WEB APPS FROM ATTACKS
THE SMARTEST WAY TO PROTECT WEBSITES AND WEB APPS FROM ATTACKS INCONVENIENT STATISTICS 70% of ALL threats are at the Web application layer. Gartner 73% of organizations have been hacked in the past two
HTTP. Internet Engineering. Fall 2015. Bahador Bakhshi CE & IT Department, Amirkabir University of Technology
HTTP Internet Engineering Fall 2015 Bahador Bakhshi CE & IT Department, Amirkabir University of Technology Questions Q1) How do web server and client browser talk to each other? Q1.1) What is the common
Cyber Security Workshop Ethical Web Hacking
Cyber Security Workshop Ethical Web Hacking May 2015 Setting up WebGoat and Burp Suite Hacking Challenges in WebGoat Concepts in Web Technologies and Ethical Hacking 1 P a g e Downloading WebGoat and Burp
How to scan/exploit a ssl based webserver. by xxradar. http://www.radarhack.com mailto:[email protected]. Version 1.
How to scan/exploit a ssl based webserver. by xxradar. http://www.radarhack.com mailto:[email protected]. Version 1.0 21-09-2003 1. Introduction Sometimes late at night, playing with openssl and connecting
Vulnerability Scan 05 May 2015 at 08:58
Vulnerability Scan 05 May 2015 at 08:58 URL : http://scantest.sentex.ca Summary: 1 vulnerabilities found 0 1 0 20 Apache Partial HTTP Request Denial of Service Vulnerability Zero Day Server accepts unnecessarily
Load-balancing web servers presented at AAU by Peter Dolog, Fall 2009, lecture 5, Web Engineering
Load-balancing web servers presented at AAU by Peter Dolog, Fall 2009, lecture 5, Web Engineering Scalable Internet Services, Fall 2006 Thorsten von Eicken Department of Computer Science University of
ASV Scan Report Vulnerability Details PRESTO BIZ
ASV Scan Report Vulnerability Details PRESTO BIZ Scan Results Executive Summary PCI Compliance: Passing Scan Target: secure.prestomart.com Scan ID: 6060285 Start: 2015-03-14 05:00:01 Finish: 2015-03-14
TCP/IP Networking An Example
TCP/IP Networking An Example Introductory material. This module illustrates the interactions of the protocols of the TCP/IP protocol suite with the help of an example. The example intents to motivate the
The Web: some jargon. User agent for Web is called a browser: Web page: Most Web pages consist of: Server for Web is called Web server:
The Web: some jargon Web page: consists of objects addressed by a URL Most Web pages consist of: base HTML page, and several referenced objects. URL has two components: host name and path name: User agent
Web Application Firewall
Web Application Firewall Getting Started Guide August 3, 2015 Copyright 2014-2015 by Qualys, Inc. All Rights Reserved. Qualys and the Qualys logo are registered trademarks of Qualys, Inc. All other trademarks
Evaluation of Penetration Testing Software. Research
Evaluation of Penetration Testing Software Research Penetration testing is an evaluation of system security by simulating a malicious attack, which, at the most fundamental level, consists of an intellectual
Using Nessus In Web Application Vulnerability Assessments
Using Nessus In Web Application Vulnerability Assessments Paul Asadoorian Product Evangelist Tenable Network Security [email protected] About Tenable Nessus vulnerability scanner, ProfessionalFeed
Using Nessus to Detect Wireless Access Points. March 6, 2015 (Revision 4)
Using Nessus to Detect Wireless Access Points March 6, 2015 (Revision 4) Table of Contents Introduction... 3 Why Detect Wireless Access Points?... 3 Wireless Scanning for WAPs... 4 Detecting WAPs using
Data Communication I
Data Communication I Urban Bilstrup (E327) 090901 [email protected] www2.hh.se/staff/urban Internet - Sweden, Northern Europe SUNET NORDUnet 2 Internet - Internet Addresses Everyone should be able
INTRUSION DECEPTION CZYLI BAW SIĘ W CIUCIUBABKĘ Z NAMI
INTRUSION DECEPTION CZYLI BAW SIĘ W CIUCIUBABKĘ Z NAMI Na przykładzie Junos WebApp Secure Edmund Asare INCONVENIENT STATISTICS 70% of ALL threats are at the Web application layer. Gartner 73% of organizations
T14 SECURITY TESTING: ARE YOU A DEER IN THE HEADLIGHTS? Ryan English SPI Dynamics Inc BIO PRESENTATION. Thursday, May 18, 2006 1:30PM
BIO PRESENTATION T14 Thursday, May 18, 2006 1:30PM SECURITY TESTING: ARE YOU A DEER IN THE HEADLIGHTS? Ryan English SPI Dynamics Inc International Conference On Software Testing Analysis and Review May
CS 188/219. Scalable Internet Services Andrew Mutz October 8, 2015
CS 188/219 Scalable Internet Services Andrew Mutz October 8, 2015 For Today About PTEs Empty spots were given out If more spots open up, I will issue more PTEs You must have a group by today. More detail
Lecture 15 - Web Security
CSE497b Introduction to Computer and Network Security - Spring 2007 - Professor Jaeger Lecture 15 - Web Security CSE497b - Spring 2007 Introduction Computer and Network Security Professor Jaeger www.cse.psu.edu/~tjaeger/cse497b-s07/
Network Security Exercise #8
Computer and Communication Systems Lehrstuhl für Technische Informatik Network Security Exercise #8 Falko Dressler and Christoph Sommer Computer and Communication Systems Institute of Computer Science,
Security-Assessment.com White Paper Leveraging XSRF with Apache Web Server Compatibility with older browser feature and Java Applet
Security-Assessment.com White Paper Leveraging XSRF with Apache Web Server Compatibility with older browser feature and Java Applet Prepared by: Roberto Suggi Liverani Senior Security Consultant Security-Assessment.com
NETWORK SECURITY HACKS *
NETWORK SECURITY HACKS * Andrew %pckhart Ji O'REILLY* Beijing Cambridge Farnham Koln Paris Sebastopol Taipei Tokyo Contents Credits Preface ix xi Chapter 1. Unix Host Security 1 1. Secure Mount Points
JOOMLA REFLECTION DDOS-FOR-HIRE
1 TLP: GREEN GSI ID: 1085 JOOMLA REFLECTION DDOS-FOR-HIRE RISK FACTOR - HIGH 1.1 / OVERVIEW / Following a series of vulnerability disclosures throughout 2014, the popular content management framework Joomla
Penetration Testing for Web Applications (Part One) by Jody Melbourne and David Jorm last updated June 16, 2003
Seite 1 von 5 Penetration Testing for Web Applications (Part One) by Jody Melbourne and David Jorm last updated June 16, 2003 This is the first in a series of three articles on penetration testing for
Web Application Forensics:
Web Application Forensics: The Uncharted Territory By Ory Segal, Sanctum Security Group Introduction If criminals would always schedule their movements like railway trains, it would certainly be more convenient
Chapter 17. Transport-Level Security
Chapter 17 Transport-Level Security Web Security Considerations The World Wide Web is fundamentally a client/server application running over the Internet and TCP/IP intranets The following characteristics
Arrow ECS University 2015 Radware Hybrid Cloud WAF Service. 9 Ottobre 2015
Arrow ECS University 2015 Radware Hybrid Cloud WAF Service 9 Ottobre 2015 Get to Know Radware 2 Our Track Record Company Growth Over 10,000 Customers USD Millions 200.00 150.00 32% 144.1 16% 167.0 15%
SECURITY B-SIDES: ATLANTA STRATEGIC PENETRATION TESTING. Presented by: Dave Kennedy Eric Smith
SECURITY B-SIDES: ATLANTA STRATEGIC PENETRATION TESTING Presented by: Dave Kennedy Eric Smith AGENDA Penetration Testing by the masses Review of current state by most service providers Deficiencies in
Evading Infrastructure Security Mohamed Bedewi Penetration Testing Consultant
Evading Infrastructure Security Mohamed Bedewi Penetration Testing Consultant What infrastructure security really means? Infrastructure Security is Making sure that your system services are always running
NETWORK SECURITY HACKS
SECOND EDITION NETWORK SECURITY HACKS 2008 AGI-Information Management Consultants May be used for personal purporses only or by libraries associated to dandelon.com network. Andrew Lockhart O'REILLY Beijing
Presented By: Holes in the Fence. Agenda. IPCCTV Attack. DDos Attack. Why Network Security is Important
Presented By: Holes in the Fence Dave Engebretson, Contributing Technology writer, SDM Magazine Industry Instructor in Fiber and Networking Prevention of Security System breaches of networked Edge Devices
McAfee Certified Assessment Specialist Network
McAfee Certified Assessment Specialist Network Exam preparation guide Table of Contents Introduction 3 Becoming McAfee Certified 3 Exam Details 4 Recommended Exam Preparation 4 Exam Objectives 4 Sample
