CS 161 Computer Security
|
|
|
- Debra Bennett
- 10 years ago
- Views:
Transcription
1 Paxson Spring 2013 CS 161 Computer Security Homework 2 Due: Wednesday, March 6, at 10PM Version 1.1 (02Mar13) Instructions. This assignment must be done on your own, and in accordance with the course policies as framed on the class web page. Submission is electronic. To submit, put a single solution file hw2.pdf in a directory and run submit hw2 from that directory. Put your name, your class account name (e.g., cs161-xy), your TA s name, and HW2 prominently on the first page. Version 1.1: we adjusted problem 4(e) to remove the previous requirement For full credit, your solution should not require the server to maintain extra server-side state. This will not be required for full credit. Problem 1 Work Factor (25 points) We use the term work factor to refer to how much effort an attacker must expend to achieve a particular attack. Some defensive techniques, such as introducing randomization, aim to significantly increase the attacker s work factor, hopefully enough to render a given attack infeasible given the resources available to the attacker. One such example presented in lecture is the randomization of TCP Initial Sequence Numbers in order to make blind spoofing of valid (non-syn) TCP packets hard. This problem examines a couple of approaches to increasing an attacker s work factor how effective they are, and whether their use might come with some drawbacks. Recently, many sites have seen large increases in the frequency of password-guessing attempts conducted against their SSH servers. Attackers sometimes try a large number of different passwords for well-known or likely-to-exist account names such as admin. An attacker who can exhaustively try all possible passwords will indeed ultimately discover the correct one, granting them illicit access to the account. (a) Suppose a site s passwords were originally 6 characters long, and each character is either an uppercase letter, a lowercase letter, or a digit. In addition, suppose that an attacker can try 1,000 possible passwords every second. Approximately how many days will it take an attacker to discover a given account s password by brute force? (b) One technique attackers use for guessing passwords is to compile large dictionaries of common password choices. Suppose the site knows that attackers are currently using a dictionary with 2,000,000 entries, and that the site s users indeed pick passwords present in that dictionary. When trying to brute-force access to a given account, attackers will methodically try every password in the dictionary. Page 1 of 6
2 To combat this, the site requires its users to append two additional randomly selected characters to their passwords (each again either an uppercase or lowercase letter, or a digit). Assume the attacker knows that the site has made this change and modifies their brute-force search to try all possible combinations of two appended characters to each password in their dictionary. Approximately how many days will it take an attacker to discover a given account s password by brute force? (c) Another technique the site considers is to run its publicly accessible SSH server not on the standard SSH port (which is TCP port 22) but on a different TCP port. Assume the attacker has no way of knowing the new port other than repeatedly attempting connections to the server, but the attacker can tell when they have found the correct port (since now they get an answer from it). Given that the site also uses the technique in the previous question (two additional randomly selected password characters), by what factor does this change increase the amount of time the attacker must spend to guarantee finding a given account s password? For example, if this technique means that instead of taking 4 days, it will take 10 days, then that would be a factor of 10/4 = 2.5. (d) Suppose instead of using either of the approaches in (b) or (c) above, the site instead uses a different solution called port knocking to ward off the attackers. This works as follows: even if a service is listening on a particular port, it looks closed to the outside world. Anyone who wants to communicate to the service has to knock in order to open it. A knock is done by sending a set of UDP packets to a magic sequence of three ports. The server tracks UDP packets seen from each remote IP address R. Every time it sees a series of 3 such packets, the server checks to see whether they were sent to the magic sequence of ports (in the correct order). For example, suppose the magic sequence was UDP ports 442, 16101, and Then if R sends UDP packets to ports 101, 442, 16101, 7777, 8989, 32123, the server will ignore R s attempt, since neither set of three ports it saw ( 101, 442, or 7777, 8989, ) matches the magic sequence, even though the magic sequence was in fact embedded within the stream. However, if a group of three UDP packets sent by R goes to exactly the magic sequence in order, then the server will now respond to the next incoming connection request that R makes to the SSH server on TCP port 22. Assume that every second the attacker can try 10,000 port-knocking sequences (each of which consists of sending three UDP packets plus a TCP connection attempt to see whether the knock worked). For the situation as at the start of (b) above (6 character passwords that are present in the attacker s 2,000,000 entry dictionary), by approximately what factor does the port-knocking approach increase the amount of time the attacker must spend to guarantee finding a given account s password? (e) Suppose that in addition to using the port-knocking approach, the site will block a Homework 2 Page 2 of 6 CS 161 SP 13
3 remote IP address R if the server observes ten unsuccessful port-knocking sequences from R. Any subsequent traffic from R will be discarded, even if it later reflects a correct port-knocking sequence. How feasible is it for an attacker to muster enough bots (each with its own IP address) to overcome this blocking? What new vulnerability does using this blocking approach raise for the site? Problem 2 Firewalls (25 points) Outside FW DMZ /24 Internal Network /8 The diagram above shows the network used by a company. Like many enterprises, the main internal network is isolated from external networks using a demilitarized zone, or DMZ. (You can read about DMZs at You have been tasked with securing this network by ensuring that all of its network activity conforms to the following policy for TCP traffic: Unless otherwise specified, all traffic should be denied. All inbound mail from the Internet must be delivered to TCP port 25 of in turn delivers mail via TCP to the inside mail server, SSH logins from the Internet are permitted to TCP port 22 of The web server sits in the DMZ, on TCP ports 80 and 8080 of ; both insiders and outsiders should be able to access it. All outbound connections are allowed, except to sites on /16 or if the connection is coming from /16. Hosts on /16 are only allowed to connect to hosts on /24. For this problem, we consider three separate sets of firewall rules. As indicated in the diagram, there are three interfaces on the firewall: inside ( Internal Network ), outside, and DMZ. Rules always apply to packets arriving at an interface. The inside Homework 2 Page 3 of 6 CS 161 SP 13
4 net is /8; the DMZ net is /24; everything else is on the outside. For example, rules associated with the DMZ interface apply to packets sent from the /24 network. In your solution, list a separate ruleset for each interface. Use a format similar to that in lecture, but annotated with the interface. So, for example: inside allow tcp :* -> /16:53 if ACK set specifies that on the firewall s inside interface, TCP packets arriving from the internal network with a source address of and any source port, destined for port 53 of any address in the /16 block , should be allowed providing they have the ACK bit set. You should aim to keep the rules as simple (minimal) as possible. Keep in mind the order in which rules are processed. A reminder: you only need to consider TCP traffic. You can leave tcp out of your rules if you wish. Problem 3 SQL Injection (25 points) Congratulations! You ve just been hired as a security consultant for BearBucks, a bank catering to Cal students. They happen to be a Java shop (and we don t mean coffee!), and you ve been tasked with reviewing the codebase for potential vulnerabilities. You re soon dismayed to discover the following code in the client login section of the online banking site: /** * Check whether a username and password combination is valid. */ ResultSet checkpassword(connection conn, String username, String password) throws SQLException { String query = "SELECT user_id FROM Customers WHERE username = " + username + " AND password = SHA1( " + password + " );"; Statement s = conn.createstatement(); return s.executequery(query); } Here SHA1 is a special type of hash function (which we ll learn more about later in the course). For the purposes of this problem, you can treat it as doing a deterministic scrambling of password into the format in which passwords are stored inside the database. The particulars of this behavior are not important for the problem. (a) What usernames could an attacker enter in order to do the following? Delete the Customers table. Issue a request as user Admin, without having to know the password. (b) When you point this out to the development team, a junior developer suggests simply escaping all the single quotes with a backslash. For example, the following Homework 2 Page 4 of 6 CS 161 SP 13
5 line could be added to the top of the function: username = username.replaceall(" ","\\\\ "); Modify either of the injection attack inputs you listed in your answer above to still work in this scenario. (c) Rewrite the checkpassword function using prepared statements. Explain why your code is safe from SQL injection attacks. See for a discussion of Java prepared statements. (d) The developers are now busy refactoring their code to use prepared statements. One of them approaches you with a dilemma: she is having difficulty adapting the function below. /** * Filter transactions based on a dollar amount specified by the user and * sort based on user-supplied values. * conn Database connection amt Filter based on this amount and the comparison operator. cmp Comparison operator by which to filter (>,>=,=,<=,<). orderbycol Name of column by which to sort results * ("amount", "date" or "type"). orderbydir Sorting direction ("ASC" or "DESC"). */ ResultSet searchtransactions(connection conn, BigDecimal amt, String cmp, String orderbycol, String orderbydir) throws Exception { String q = "SELECT * FROM Transactions WHERE "; q += " amount " + cmp + " " + amt; q += " ORDER BY " + orderbycol + " " + orderbydir + ";" return conn.createstatement().executequery(q); } For example, this would allow queries like the following to be run: SELECT * FROM Transactions WHERE amount > ORDER BY date DESC; SELECT * FROM Transactions WHERE amount <= ORDER BY amount ASC; Why is the developer having trouble? What limitation in the prepared statement API is causing this issue? Why does the API impose this limitation? (e) Rewrite the searchtransactions function using prepared statements. It s okay to make modifications to the code as long as queries like the examples above can still be run. Homework 2 Page 5 of 6 CS 161 SP 13
6 Problem 4 Web Vulnerabilities (25 points) After having helped BearBucks straighten out their web server security, you get a consulting gig examining the code of Farcebook, the latest up-and-coming ironic social network. You learn that the developers there have heard troubling rumors that their code contains XSS vulnerabilities. Farcebook users can use HTML on their profile pages and in private messages. The developers are already doing some sanitization: servers strip the literal strings <script> and </script> from any user input. (a) You immediately realize that this is not enough to keep potentially malicious Javascript from being executed on the page. To demonstrate, you craft a message that, upon being read by the recipient, grabs the recipient s cookies (including the session cookie used to keep the user logged in to the site) and passes them as a query string parameter to a special logging script that you have set up at the following address: Show an example of such a message. (b) Is this a case of a reflected or persistent XSS vulnerability? Briefly justify your answer and explain the difference between the two. (c) Read about HttpOnly cookies here: How would using this feature prevent the attack above? Sketch an XSS attack to which users would still be vulnerable. (d) You soon spot another problem. As in most social networks, when you are logged in to Farcebook you can send a friend request to another user. To do so, you visit a Farcebook page that has a form on it. When you enter the user s name into the form and click on Submit, your browser transmits a URL that looks like: where USER is the username of the user you want to friend. Assuming that the XSS vulnerabilities have been fixed, how might Louisa (a lonely Farcebook user) still use this to artificially increase her friend count, such that any time someone visits Louisa s profile, the visitor automatically sends Louisa a friend request? (e) What can Farcebook do to address this loophole, so that a server will only honor friend requests that users indeed submitted by deciding to visit the site s standard form page? Homework 2 Page 6 of 6 CS 161 SP 13
STABLE & SECURE BANK lab writeup. Page 1 of 21
STABLE & SECURE BANK lab writeup 1 of 21 Penetrating an imaginary bank through real present-date security vulnerabilities PENTESTIT, a Russian Information Security company has launched its new, eighth
Check list for web developers
Check list for web developers Requirement Yes No Remarks 1. Input Validation 1.1) Have you done input validation for all the user inputs using white listing and/or sanitization? 1.2) Does the input validation
Project 2: Firewall Design (Phase I)
Project 2: Firewall Design (Phase I) CS 161 - Joseph/Tygar November 12, 2006 1 Edits If we need to make clarifications or corrections to this document after distributing it, we will post a new version
Solution of Exercise Sheet 5
Foundations of Cybersecurity (Winter 15/16) Prof. Dr. Michael Backes CISPA / Saarland University saarland university computer science Protocols = {????} Client Server IP Address =???? IP Address =????
Security perimeter white paper. Configuring a security perimeter around JEP(S) with IIS SMTP
Security perimeter white paper Configuring a security perimeter around JEP(S) with IIS SMTP Document control Document name: JEP(S) Security perimeter Author: Proxmea, Proxmea Last update: March 23, 2008
M2M Series Routers. Port Forwarding / DMZ Setup
Introduction Port forwarding enables programs or devices running on your LAN to communicate with the internet as if they were directly connected. Many internet services and applications use designated
Project 2: Web Security Pitfalls
EECS 388 September 19, 2014 Intro to Computer Security Project 2: Web Security Pitfalls Project 2: Web Security Pitfalls This project is due on Thursday, October 9 at 6 p.m. and counts for 8% of your course
CS 558 Internet Systems and Technologies
CS 558 Internet Systems and Technologies Dimitris Deyannis [email protected] 881 Heat seeking Honeypots: Design and Experience Abstract Compromised Web servers are used to perform many malicious activities.
Web Application Security
Web Application Security John Zaharopoulos ITS - Security 10/9/2012 1 Web App Security Trends Web 2.0 Dynamic Webpages Growth of Ajax / Client side Javascript Hardening of OSes Secure by default Auto-patching
Web Application Guidelines
Web Application Guidelines Web applications have become one of the most important topics in the security field. This is for several reasons: It can be simple for anyone to create working code without security
Firewalls. Test your Firewall knowledge. Test your Firewall knowledge (cont) (March 4, 2015)
s (March 4, 2015) Abdou Illia Spring 2015 Test your knowledge Which of the following is true about firewalls? a) A firewall is a hardware device b) A firewall is a software program c) s could be hardware
Project 2: Penetration Testing (Phase II)
Project 2: Penetration Testing (Phase II) CS 161 - Joseph/Tygar November 17, 2006 1 Edits If we need to make clarifications or corrections to this document after distributing it, we will post a new version
Web Application Security Considerations
Web Application Security Considerations Eric Peele, Kevin Gainey International Field Directors & Technology Conference 2006 May 21 24, 2006 RTI International is a trade name of Research Triangle Institute
Application security testing: Protecting your application and data
E-Book Application security testing: Protecting your application and data Application security testing is critical in ensuring your data and application is safe from security attack. This ebook offers
CS5008: Internet Computing
CS5008: Internet Computing Lecture 22: Internet Security A. O Riordan, 2009, latest revision 2015 Internet Security When a computer connects to the Internet and begins communicating with others, it is
Lab 7 - Exploitation 1. NCS 430 Penetration Testing Lab 7 Sunday, March 29, 2015 John Salamy
Lab 7 - Exploitation 1 NCS 430 Penetration Testing Lab 7 Sunday, March 29, 2015 John Salamy Lab 7 - Exploitation 2 Item I. (What were you asked to do?) Metasploit Server Side Exploits Perform the exercises
Firewalls. Firewalls. Idea: separate local network from the Internet 2/24/15. Intranet DMZ. Trusted hosts and networks. Firewall.
Firewalls 1 Firewalls Idea: separate local network from the Internet Trusted hosts and networks Firewall Intranet Router DMZ Demilitarized Zone: publicly accessible servers and networks 2 1 Castle and
Overview. Firewall Security. Perimeter Security Devices. Routers
Overview Firewall Security Chapter 8 Perimeter Security Devices H/W vs. S/W Packet Filtering vs. Stateful Inspection Firewall Topologies Firewall Rulebases Lecturer: Pei-yih Ting 1 2 Perimeter Security
RemotelyAnywhere. Security Considerations
RemotelyAnywhere Security Considerations Table of Contents Introduction... 3 Microsoft Windows... 3 Default Configuration... 3 Unused Services... 3 Incoming Connections... 4 Default Port Numbers... 4 IP
A Server and Browser-Transparent CSRF Defense for Web 2.0 Applications. Slides by Connor Schnaith
A Server and Browser-Transparent CSRF Defense for Web 2.0 Applications Slides by Connor Schnaith Cross-Site Request Forgery One-click attack, session riding Recorded since 2001 Fourth out of top 25 most
Computer Networks. Secure Systems
Computer Networks Secure Systems Summary Common Secure Protocols SSH HTTPS (SSL/TSL) IPSec Wireless Security WPA2 PSK vs EAP Firewalls Discussion Secure Shell (SSH) A protocol to allow secure login to
User-ID Features. PAN-OS New Features Guide Version 6.0. Copyright 2007-2015 Palo Alto Networks
User-ID Features PAN-OS New Features Guide Version 6.0 Contact Information Corporate Headquarters: Palo Alto Networks 4401 Great America Parkway Santa Clara, CA 95054 http://www.paloaltonetworks.com/contact/contact/
Application Design and Development
C H A P T E R9 Application Design and Development Practice Exercises 9.1 What is the main reason why servlets give better performance than programs that use the common gateway interface (CGI), even though
Question Name C 1.1 Do all users and administrators have a unique ID and password? Yes
Category Question Name Question Text C 1.1 Do all users and administrators have a unique ID and password? C 1.1.1 Passwords are required to have ( # of ) characters: 5 or less 6-7 8-9 Answer 10 or more
Thick Client Application Security
Thick Client Application Security Arindam Mandal ([email protected]) (http://www.paladion.net) January 2005 This paper discusses the critical vulnerabilities and corresponding risks in a two
Webapps Vulnerability Report
Tuesday, May 1, 2012 Webapps Vulnerability Report Introduction This report provides detailed information of every vulnerability that was found and successfully exploited by CORE Impact Professional during
VIDEO intypedia007en LESSON 7: WEB APPLICATION SECURITY - INTRODUCTION TO SQL INJECTION TECHNIQUES. AUTHOR: Chema Alonso
VIDEO intypedia007en LESSON 7: WEB APPLICATION SECURITY - INTRODUCTION TO SQL INJECTION TECHNIQUES AUTHOR: Chema Alonso Informática 64. Microsoft MVP Enterprise Security Hello and welcome to Intypedia.
Network Security Exercise #8
Computer and Communication Systems Lehrstuhl für Technische Informatik Network Security Exercise #8 Falko Dressler and Christoph Sommer Computer and Communication Systems Institute of Computer Science,
SQL Injection. By Artem Kazanstev, ITSO and Alex Beutel, Student
SQL Injection By Artem Kazanstev, ITSO and Alex Beutel, Student SANS Priority No 2 As of September 2009, Web application vulnerabilities such as SQL injection and Cross-Site Scripting flaws in open-source
SQL Injection Attack Lab
Laboratory for Computer Security Education 1 SQL Injection Attack Lab Copyright c 2006-2010 Wenliang Du, Syracuse University. The development of this document is funded by the National Science Foundation
How To Protect Your Network From Attack From Outside From Inside And Outside
IT 4823 Information Security Administration Firewalls and Intrusion Prevention October 7 Notice: This session is being recorded. Lecture slides prepared by Dr Lawrie Brown for Computer Security: Principles
Release Notes for Websense Email Security v7.2
Release Notes for Websense Email Security v7.2 Websense Email Security version 7.2 is a feature release that includes support for Windows Server 2008 as well as support for Microsoft SQL Server 2008. Version
COMP 112 Assignment 1: HTTP Servers
COMP 112 Assignment 1: HTTP Servers Lead TA: Jim Mao Based on an assignment from Alva Couch Tufts University Due 11:59 PM September 24, 2015 Introduction In this assignment, you will write a web server
IP Filtering for Patton RAS Products
RAS Filtering: Applications and Functionality Security PLUS Service Differentiation Did you know you can use IP filtering to boost your revenues? Patton s Remote Access Server (RAS) provides IP Filtering
Server Security. Contents. Is Rumpus Secure? 2. Use Care When Creating User Accounts 2. Managing Passwords 3. Watch Out For Aliases 4
Contents Is Rumpus Secure? 2 Use Care When Creating User Accounts 2 Managing Passwords 3 Watch Out For Aliases 4 Deploy A Firewall 5 Minimize Running Applications And Processes 5 Manage Physical Access
F-SECURE MESSAGING SECURITY GATEWAY
F-SECURE MESSAGING SECURITY GATEWAY DEFAULT SETUP GUIDE This guide describes how to set up and configure the F-Secure Messaging Security Gateway appliance in a basic e-mail server environment. AN EXAMPLE
Lesson 7 - Website Administration
Lesson 7 - Website Administration If you are hired as a web designer, your client will most likely expect you do more than just create their website. They will expect you to also know how to get their
Automating Server Firewalls
Automating Server Firewalls With CloudPassage Halo Contents: About Halo Server Firewalls Implementing Firewall Policies Create and Assign a Firewall Policy Specify Firewall-Related Components Managing
Grandstream Networks, Inc. UCM6100 Security Manual
Grandstream Networks, Inc. UCM6100 Security Manual Index Table of Contents OVERVIEW... 3 WEB UI ACCESS... 4 UCM6100 HTTP SERVER ACCESS... 4 PROTOCOL TYPE... 4 USER LOGIN... 4 LOGIN TIMEOUT... 5 TWO-LEVEL
IP Monitoring and Filtering
IP Monitoring and Filtering By Gnanambal Chithambaram Sandeep Dubey Smrithi Barrenkula Subraja Krishnamurthy Sucheta P Kodali Abstract In our project IP Monitoring and filtering we developed a Java application
EVALUATING COMMERCIAL WEB APPLICATION SECURITY. By Aaron Parke
EVALUATING COMMERCIAL WEB APPLICATION SECURITY By Aaron Parke Outline Project background What and why? Targeted sites Testing process Burp s findings Technical talk My findings and thoughts Questions Project
Advanced Web Security, Lab
Advanced Web Security, Lab Web Server Security: Attacking and Defending November 13, 2013 Read this earlier than one day before the lab! Note that you will not have any internet access during the lab,
Firewalls. CEN 448 Security and Internet Protocols Chapter 20 Firewalls
CEN 448 Security and Internet Protocols Chapter 20 Firewalls Dr. Mostafa Hassan Dahshan Computer Engineering Department College of Computer and Information Sciences King Saud University [email protected]
Salesforce Integration
Salesforce Integration 2015 Bomgar Corporation. All rights reserved worldwide. BOMGAR and the BOMGAR logo are trademarks of Bomgar Corporation; other trademarks shown are the property of their respective
Bug Report. Date: March 19, 2011 Reporter: Chris Jarabek ([email protected])
Bug Report Date: March 19, 2011 Reporter: Chris Jarabek ([email protected]) Software: Kimai Version: 0.9.1.1205 Website: http://www.kimai.org Description: Kimai is a web based time-tracking application.
University of Wisconsin Platteville SE411. Senior Seminar. Web System Attacks. Maxwell Friederichs. April 18, 2013
University of Wisconsin Platteville SE411 Senior Seminar Web System Attacks Maxwell Friederichs April 18, 2013 Abstract 1 Data driven web applications are at the cutting edge of technology, and changing
Building Your Firewall Rulebase Lance Spitzner Last Modified: January 26, 2000
Building Your Firewall Rulebase Lance Spitzner Last Modified: January 26, 2000 Building a solid rulebase is a critical, if not the most critical, step in implementing a successful and secure firewall.
VoipSwitch Security Audit
VoipSwitch Security Audit Security audit was made at 1 st January 2013 (3.00 PM 10.00 PM UTC +1) by John Doe who is Security Advisor at VoipSwitch Company. Server's IP address : 11.11.11.11 Server has
Web Application Security Assessment and Vulnerability Mitigation Tests
White paper BMC Remedy Action Request System 7.6.04 Web Application Security Assessment and Vulnerability Mitigation Tests January 2011 www.bmc.com Contacting BMC Software You can access the BMC Software
allow all such packets? While outgoing communications request information from a
FIREWALL RULES Firewalls operate by examining a data packet and performing a comparison with some predetermined logical rules. The logic is based on a set of guidelines programmed in by a firewall administrator,
External Network & Web Application Assessment. For The XXX Group LLC October 2012
External Network & Web Application Assessment For The XXX Group LLC October 2012 This report is solely for the use of client personal. No part of it may be circulated, quoted, or reproduced for distribution
Is Drupal secure? A high-level perspective on web vulnerabilities, Drupal s solutions, and how to maintain site security
Is Drupal secure? A high-level perspective on web vulnerabilities, Drupal s solutions, and how to maintain site security Presented 2009-05-29 by David Strauss Thinking Securely Security is a process, not
Criteria for web application security check. Version 2015.1
Criteria for web application security check Version 2015.1 i Content Introduction... iii ISC- P- 001 ISC- P- 001.1 ISC- P- 001.2 ISC- P- 001.3 ISC- P- 001.4 ISC- P- 001.5 ISC- P- 001.6 ISC- P- 001.7 ISC-
Running the SANS Top 5 Essential Log Reports with Activeworx Security Center
Running the SANS Top 5 Essential Log Reports with Activeworx Security Center Creating valuable information from millions of system events can be an extremely difficult and time consuming task. Particularly
Semantic based Web Application Firewall (SWAF V 1.6) Operations and User Manual. Document Version 1.0
Semantic based Web Application Firewall (SWAF V 1.6) Operations and User Manual Document Version 1.0 Table of Contents 1 SWAF... 4 1.1 SWAF Features... 4 2 Operations and User Manual... 7 2.1 SWAF Administrator
Creating Stronger, Safer, Web Facing Code. JPL IT Security Mary Rivera June 17, 2011
Creating Stronger, Safer, Web Facing Code JPL IT Security Mary Rivera June 17, 2011 Agenda Evolving Threats Operating System Application User Generated Content JPL s Application Security Program Securing
Firewalls. Ola Flygt Växjö University, Sweden http://w3.msi.vxu.se/users/ofl/ [email protected] +46 470 70 86 49. Firewall Design Principles
Firewalls Ola Flygt Växjö University, Sweden http://w3.msi.vxu.se/users/ofl/ [email protected] +46 470 70 86 49 1 Firewall Design Principles Firewall Characteristics Types of Firewalls Firewall Configurations
Web application security: Testing for vulnerabilities
Web application security: Testing for vulnerabilities Using open source tools to test your site Jeff Orloff Technology Coordinator/Consultant Sequoia Media Services Inc. Skill Level: Intermediate Date:
WHY ATTACKER TOOLSETS DO WHAT THEY DO
WHY ATTACKER TOOLSETS DO WHAT THEY DO (or.. Reasons they just keep working ) Matt McCormack OVER THE LAST YEAR 50+ engagements Good chunk of different verticals, industries, etc. Varying qualities and
Firewalls, Tunnels, and Network Intrusion Detection
Firewalls, Tunnels, and Network Intrusion Detection 1 Part 1: Firewall as a Technique to create a virtual security wall separating your organization from the wild west of the public internet 2 1 Firewalls
Hack Your SQL Server Database Before the Hackers Do
Note: This article was edited in Oct. 2013, from numerous Web Sources. TJS At the Install: The default install for SQL server makes it is as secure as it will ever be. DBAs and developers will eventually
Railo Installation on CentOS Linux 6 Best Practices
Railo Installation on CentOS Linux 6 Best Practices Purpose: This document is intended for system administrators who want to deploy their Mura CMS, Railo, Tomcat, and JRE stack in a secure but easy to
CSE331: Introduction to Networks and Security. Lecture 12 Fall 2006
CSE331: Introduction to Networks and Security Lecture 12 Fall 2006 Announcements Midterm I will be held Friday, Oct. 6th. True/False Multiple Choice Calculation Short answer Short essay Project 2 is on
Borderware MXtreme. Secure Email Gateway QuickStart Guide. Copyright 2005 CRYPTOCard Corporation All Rights Reserved
Borderware MXtreme Secure Email Gateway QuickStart Guide Copyright 2005 CRYPTOCard Corporation All Rights Reserved http://www.cryptocard.com Overview MXtreme is a hardened appliance with a highly robust
CS 361S - Network Security and Privacy Fall 2015. Project #1
CS 361S - Network Security and Privacy Fall 2015 Project #1 Due: 12:30pm CST, October 8, 2015 Submission instructions Follow the instructions in the project description. If you are submitting late, please
Advanced Web Technology 10) XSS, CSRF and SQL Injection 2
Berner Fachhochschule, Technik und Informatik Advanced Web Technology 10) XSS, CSRF and SQL Injection Dr. E. Benoist Fall Semester 2010/2011 Table of Contents Cross Site Request Forgery - CSRF Presentation
Broadband Phone Gateway BPG510 Technical Users Guide
Broadband Phone Gateway BPG510 Technical Users Guide (Firmware version 0.14.1 and later) Revision 1.0 2006, 8x8 Inc. Table of Contents About your Broadband Phone Gateway (BPG510)... 4 Opening the BPG510's
Windows Remote Access
Windows Remote Access A newsletter for IT Professionals Education Sector Updates Issue 1 I. Background of Remote Desktop for Windows Remote Desktop Protocol (RDP) is a proprietary protocol developed by
SQL Injection Attack Lab Using Collabtive
Laboratory for Computer Security Education 1 SQL Injection Attack Lab Using Collabtive (Web Application: Collabtive) Copyright c 2006-2011 Wenliang Du, Syracuse University. The development of this document
Web Application Security
E-SPIN PROFESSIONAL BOOK Vulnerability Management Web Application Security ALL THE PRACTICAL KNOW HOW AND HOW TO RELATED TO THE SUBJECT MATTERS. COMBATING THE WEB VULNERABILITY THREAT Editor s Summary
Security+ Guide to Network Security Fundamentals, Fourth Edition. Chapter 6 Network Security
Security+ Guide to Network Security Fundamentals, Fourth Edition Chapter 6 Network Security Objectives List the different types of network security devices and explain how they can be used Define network
Security Awareness. Wireless Network Security
Security Awareness Wireless Network Security Attacks on Wireless Networks Three-step process Discovering the wireless network Connecting to the network Launching assaults Security Awareness, 3 rd Edition
EECS 398 Project 2: Classic Web Vulnerabilities
EECS 398 Project 2: Classic Web Vulnerabilities Revision History 3.0 (October 27, 2009) Revise CSRF attacks 1 and 2 to make them possible to complete within the constraints of the project. Clarify that
WEBROOT EMAIL ARCHIVING SERVICE. Getting Started Guide North America. The best security in an unsecured world. TM
WEBROOT EMAIL ARCHIVING SERVICE Getting Started Guide North America Webroot Software, Inc. World Headquarters 2560 55th Street Boulder CO 80301 USA www.webroot.com 800.870.8102 Table of Contents Create
Firewalls. Chapter 3
Firewalls Chapter 3 1 Border Firewall Passed Packet (Ingress) Passed Packet (Egress) Attack Packet Hardened Client PC Internet (Not Trusted) Hardened Server Dropped Packet (Ingress) Log File Internet Border
Data Collection and Analysis: Get End-to-End Security with Cisco Connected Analytics for Network Deployment
White Paper Data Collection and Analysis: Get End-to-End Security with Cisco Connected Analytics for Network Deployment Cisco Connected Analytics for Network Deployment (CAND) is Cisco hosted, subscription-based
FIREWALL AND NAT Lecture 7a
FIREWALL AND NAT Lecture 7a COMPSCI 726 Network Defence and Countermeasures Muhammad Rizwan Asghar August 3, 2015 Source of most of slides: University of Twente FIREWALL An integrated collection of security
Hushmail Express Password Encryption in Hushmail. Brian Smith Hush Communications
Hushmail Express Password Encryption in Hushmail Brian Smith Hush Communications Introduction...2 Goals...2 Summary...2 Detailed Description...4 Message Composition...4 Message Delivery...4 Message Retrieval...5
Web Plus Security Features and Recommendations
Web Plus Security Features and Recommendations (Based on Web Plus Version 3.x) Centers for Disease Control and Prevention National Center for Chronic Disease Prevention and Health Promotion Division of
Still Aren't Doing. Frank Kim
Ten Things Web Developers Still Aren't Doing Frank Kim Think Security Consulting Background Frank Kim Consultant, Think Security Consulting Security in the SDLC SANS Author & Instructor DEV541 Secure Coding
WebCruiser Web Vulnerability Scanner User Guide
WebCruiser Web Vulnerability Scanner User Guide Content 1. Software Introduction...2 2. Key Features...3 2.1. POST Data Resend...3 2.2. Vulnerability Scanner...6 2.3. SQL Injection...8 2.3.1. POST SQL
IMPLEMENTATION OF INTELLIGENT FIREWALL TO CHECK INTERNET HACKERS THREAT
IMPLEMENTATION OF INTELLIGENT FIREWALL TO CHECK INTERNET HACKERS THREAT Roopa K. Panduranga Rao MV Dept of CS and Engg., Dept of IS and Engg., J.N.N College of Engineering, J.N.N College of Engineering,
1. Introduction. 2. Web Application. 3. Components. 4. Common Vulnerabilities. 5. Improving security in Web applications
1. Introduction 2. Web Application 3. Components 4. Common Vulnerabilities 5. Improving security in Web applications 2 What does World Wide Web security mean? Webmasters=> confidence that their site won
SECURITY DOCUMENT. BetterTranslationTechnology
SECURITY DOCUMENT BetterTranslationTechnology XTM Security Document Documentation for XTM Version 6.2 Published by XTM International Ltd. Copyright XTM International Ltd. All rights reserved. No part of
Threat Modeling. Categorizing the nature and severity of system vulnerabilities. John B. Dickson, CISSP
Threat Modeling Categorizing the nature and severity of system vulnerabilities John B. Dickson, CISSP What is Threat Modeling? Structured approach to identifying, quantifying, and addressing threats. Threat
Cross Site Scripting in Joomla Acajoom Component
Whitepaper Cross Site Scripting in Joomla Acajoom Component Vandan Joshi December 2011 TABLE OF CONTENTS Abstract... 3 Introduction... 3 A Likely Scenario... 5 The Exploit... 9 The Impact... 12 Recommended
FIREWALL CHECKLIST. Pre Audit Checklist. 2. Obtain the Internet Policy, Standards, and Procedures relevant to the firewall review.
1. Obtain previous workpapers/audit reports. FIREWALL CHECKLIST Pre Audit Checklist 2. Obtain the Internet Policy, Standards, and Procedures relevant to the firewall review. 3. Obtain current network diagrams
Client Server Registration Protocol
Client Server Registration Protocol The Client-Server protocol involves these following steps: 1. Login 2. Discovery phase User (Alice or Bob) has K s Server (S) has hash[pw A ].The passwords hashes are
Ruby on Rails Secure Coding Recommendations
Introduction Altius IT s list of Ruby on Rails Secure Coding Recommendations is based upon security best practices. This list may not be complete and Altius IT recommends this list be augmented with additional
UIP1868P User Interface Guide
UIP1868P User Interface Guide (Firmware version 0.13.4 and later) V1.1 Monday, July 8, 2005 Table of Contents Opening the UIP1868P's Configuration Utility... 3 Connecting to Your Broadband Modem... 4 Setting
Cisco Secure PIX Firewall with Two Routers Configuration Example
Cisco Secure PIX Firewall with Two Routers Configuration Example Document ID: 15244 Interactive: This document offers customized analysis of your Cisco device. Contents Introduction Prerequisites Requirements
Application Security Testing. Generic Test Strategy
Application Security Testing Generic Test Strategy Page 2 of 8 Contents 1 Introduction 3 1.1 Purpose: 3 1.2 Application Security Testing: 3 2 Audience 3 3 Test Strategy guidelines 3 3.1 Authentication
Web Application Security. Vulnerabilities, Weakness and Countermeasures. Massimo Cotelli CISSP. Secure
Vulnerabilities, Weakness and Countermeasures Massimo Cotelli CISSP Secure : Goal of This Talk Security awareness purpose Know the Web Application vulnerabilities Understand the impacts and consequences
A Decision Maker s Guide to Securing an IT Infrastructure
A Decision Maker s Guide to Securing an IT Infrastructure A Rackspace White Paper Spring 2010 Summary With so many malicious attacks taking place now, securing an IT infrastructure is vital. The purpose
Web-Application Security
Web-Application Security Kristian Beilke Arbeitsgruppe Sichere Identität Fachbereich Mathematik und Informatik Freie Universität Berlin 29. Juni 2011 Overview Web Applications SQL Injection XSS Bad Practice
1. Firewall Configuration
1. Firewall Configuration A firewall is a method of implementing common as well as user defined security policies in an effort to keep intruders out. Firewalls work by analyzing and filtering out IP packets
Secure Web Appliance. Reverse Proxy
Secure Web Appliance Reverse Proxy Table of Contents 1. Introduction... 1 1.1. About CYAN Secure Web Appliance... 1 1.2. About Reverse Proxy... 1 1.3. About this Manual... 1 1.3.1. Document Conventions...
ΕΠΛ 674: Εργαστήριο 5 Firewalls
ΕΠΛ 674: Εργαστήριο 5 Firewalls Παύλος Αντωνίου Εαρινό Εξάμηνο 2011 Department of Computer Science Firewalls A firewall is hardware, software, or a combination of both that is used to prevent unauthorized
