Hybrid Analysis Mapping: Making Security and Development Tools Play Nice Together. Dan Cornell. CTO, Denim
|
|
|
- Norah Dawson
- 10 years ago
- Views:
Transcription
1 Hybrid Analysis Mapping: Making Security and Development Tools Play Nice Together Dan Cornell CTO, Denim This presentation contains information about DHS-funded research: Topic Number: H-SB Hybrid Analysis Mapping (HAM) Proposal Number: HSHQDC-13-R H-SB I
2 Dan Cornell Dan Cornell, founder and CTO of Denim Group Software developer by background (Java,.NET, etc) OWASP San Antonio 15 years experience in software architecture, development and security Heads Denim Group s application security team
3 Denim Group Overview Headquarters in San Antonio, TX Inc. Magazine 5000 Fastest Growing Company (5 consecutive years) Builds secure software Helps organizations assess and mitigate risk of existing software Provides e-learning and classroom training so clients can build secure software Customer base spans Fortune 500 and DoD Founded in 2001, 90 employees, profitable since inception Secure software services and products company Remote offices: San Francisco, Seattle, New York City, Dallas and Austin Market Focus: Financial Services, Banking, Insurance, Healthcare, and U.S. Air Force Software-centric view of application security Application security experts are practicing developers delivering a rare combination of expertise in today s industry Development pedigree translates to rapport with development managers Business impact: shorter time-to-fix application vulnerabilities
4 Agenda Security versus Development Teams Tools Hybrid Analysis Mapping (HAM) ThreadFix Overview DHS SBIR Phase 1 Work Demonstrations Next Steps Questions
5 Development and Security Have different goals Use different tools MUST WORK TOGETHER
6 Development Features, functions timelines Get it done! Manage workload: Defect tracking systems Write code: Integrated Development Environment (IDE)
7 Security Policies, standards, risks Keep the world safe! Network and infrastructure tools/paradigms adapted for applications Network scanners -> Application scanners Network firewalls -> Web application firewalls
8 Problems with Security Tools (if you are in Security) Code analysis (static) tools can be challenging Often require coding experience to use effectively Provide LOTS of results (often including false positives) Application scanning (dynamic) tools have their own challenges Have to be properly configured to get good coverage Have to learn about the application
9 Problems with Security Tools (if you are a Developer) Developers Don t Speak PDF Developers also don t speak Excel Taking action based on dynamic scan results can be challenging What code needs to be changed and how?
10 How Do We Make Things Better? Developers need to learn more about security Security teams need to learn more about development To better understand what impact their actions have on their organization s security posture What tools do they use? How do they manage their workload These interactions need to become more natural
11 So What? Genesis of this presentation was some DHS-funded research Looking into Hybrid Analysis Mapping (HAM) via their SBIR program Looking into better integration between dynamic and static scanners Found interesting applications above and beyond our original goals
12 Hybrid Analysis Mapping Phase 1 Goal Determine the feasibility of developing a system that can reliably and efficiently correlate and merge the results of automated static and dynamic security scans of web applications. HP Fortify SCA IBM AppScan Standard
13 Dynamic Application Security Testing Spider to enumerate attack surface Fuzz to identify vulnerabilities based on analysis of request/response patterns
14 Static Application Security Testing Use source or binary to create a model of the application Kind of like a compiler or VM Perform analysis to identify vulnerabilities and weaknesses Data flow, control flow, semantic, etc
15 Hybrid Analysis Mapping Phase 1 Sub-Goals Standardize vulnerability types Match dynamic and static locations Improve static parameter parsing
16 Hybrid Analysis Mapping Phase 1 - Technical Objectives Technical Objective 1: Create common data structure standards for both automated static and dynamic security scanning results. Task 1: Create a Data Structure for Automated Dynamic Security Scanning Results Task 2: Create a Data Structure for Automated Static Security Scanning Results Technical Objective 2: Research and prototype methods of mapping the results of automated static and dynamic security scanning. Task 1: Create a Structured Model for Hybrid Analysis Mapping Task 2: Investigate Approaches for Vulnerability Type Mapping Task 3: Investigate Approaches for Mapping Source Code Files to URLs Task 4: Investigate Approaches for Determining Injection Points
17 Open source vulnerability management and aggregation platform: Allows software security teams to reduce the time to remediate software vulnerabilities Enables managers to speak intelligently about the status / trends of software security within their organization. Features/Benefits: Imports dynamic, static and manual testing results into a centralized platform Removes duplicate findings across testing platforms to provide a prioritized list of security faults Eases communication across development, security and QA teams Exports prioritized list into defect tracker of choice to streamline software remediation efforts Auto generates web application firewall rules to protect data during vulnerability remediation Empowers managers with vulnerability trending reports to pinpoint issues and illustrate application security progress Benchmark security practice improvement against industry standards Freely available under the Mozilla Public License (MPL) 2.0 Download available at:
18 ThreadFix is a software vulnerability aggregation and management system that helps organizations ThreadFix Accelerate Software Remediation aggregate vulnerability data, generate virtual patches, and interact with software defect tracking systems.
19 List of Supported Tools / Technologies: Dynamic Scanners SaaS Testing Platforms Acunetix WhiteHat Arachni Veracode Burp Suite QualysGuard WAS HP WebInspect IBM Security AppScan Standard IDS/IPS and WAF IBM Security AppScan Enterprise DenyAll Mavituna Security Netsparker F5 NTO Spider Imperva OWASP Zed Attack Proxy Mod_Security Tenable Nessus Snort Skipfish w3af Defect Trackers Atlassian JIRA Static Scanners FindBugs Microsoft Team Foundation Server Mozilla Bugzilla IBM Security AppScan Source HP Fortify SCA Microsoft CAT.NET Brakeman Known Vulnerable Component Scanner Dependency Check
20 Large Range of Tool Compatibility
21 What is a Unique Vulnerability? (CWE, Relative URL) Directory listing misconfiguration (CWE, Relative URL, Injection Point) Predictable resource location SQL injection Cross-site Scripting (XSS) Injection points Parameters GET/POST Cookies Other headers
22 Why Common Weakness Enumeration (CWE)? Every tool has their own spin on naming vulnerabilities OWASP Top 10 / WASC 24 are helpful but not comprehensive CWE is exhaustive (though a bit sprawling at times) Reasonably well-adopted standard Many tools have mappings to CWE for their results Main site:
23 Information Used Source Code (Git URL) Framework Type (JSP, Spring) Extra information from Fortify (if available)
24 Vulnerability Types Successful CWE standardization Investigation into trees and Software Fault Patterns Meant to correct for human errors Hard to do in an automated fashion
25 Unified Endpoint Database (Static and Dynamic) EndpointQuery dynamicpath staticpath Parameter httpmethod codepoints [List<CodePoint>] informationsourcetype EndpointDatabase findbestmatch(endpointquery query): Endpoint findallmatches(endpointquery query): Set<Endpoint> getframeworktype(): FrameworkType
26 Parsing Attack Surface Locations JSP: Start with root JSP folder Spring: classes
27 Parsing Parameters JSP: Look for request.getparameter() calls Coupled with lightweight dataflow analysis @Entity annotations
28 HAM Bridge Static EndpointDatabase enables more than merging Scanner integration allows smarter scanning IDE plugin shows all vulnerabilities inline Dynamic
29 System Structure ZAP Scanner ThreadFix Server Target Application Application Source Code Eclipse IDE
30 Demonstrations Show me my application s attack surface Merge static and dynamic scanner results De-duplicate dynamic RESTful scanner results Pre-load my scanner with attack surface data Map my dynamically-identified vulnerabilities to their source code location
31 Application Attack Surface (CLI)
32 Merging Static and Dynamic Scanner Results
33 Merging Static and Dynamic Scanner Results
34 De-Duplicate Dynamic RESTful Scanner Results
35 De-Duplicate Dynamic RESTful Scanner Results
36 Seed Scanner with Attack Surface
37 Map Dynamic Scan Results to LoC in IDE
38 Framework Support Level of effort to support current frameworks: JSP: Language files blank comment code Java SUM: Spring: Language files blank comment code Java SUM:
39 What s Next? Started SBIR Phase 2 contract More frameworks: ASP.NET MVC ASP.NET Python/Django Java/Struts Java/JSF Ruby on Rails More IDEs: Visual Studio
40 What s Next? Expand the application model: Authentication Authorization Injection points: Cookies and HTTP headers
41 Call To Action Download the endpoint calculator and run on your code Others in the works Pre-seed some scans Store scan data in ThreadFix Download the ThreadFix Eclipse plugin Currently support: Java/JSP and Java/Spring Download the ThreadFix ZAP plugin What works? What doesn t work? Pull dynamic scan results into your IDE What tools and frameworks do YOU want to see supported?
42 Resources ThreadFix downloads (please don t download the GitHub ZIPs) Endpoint generator ZAP plugin Eclipse plugin
43 Questions? Dan Cornell (210) github.com/denimgroup/threadfix
Managing Your Application Security Program with the ThreadFix Ecosystem!! Dan Cornell! @danielcornell
Managing Your Application Security Program with the ThreadFix Ecosystem!! Dan Cornell! @danielcornell This presentation contains information about DHS-funded research: Topic Number: H-SB013.1-002 - Hybrid
Streamlining Application Vulnerability Management: Communication Between Development and Security Teams
Streamlining Application Vulnerability Management: Communication Between Development and Security Teams October 13, 2012 OWASP Boston Application Security Conference Agenda Introduction / Background Vulnerabilities
Black Box versus White Box: Different App Testing Strategies John B. Dickson, CISSP
Black Box versus White Box: Different App Testing Strategies John B. Dickson, CISSP Learning objectives for today s session Understand different types of application assessments and how they differ Be
Application Code Development Standards
Application Code Development Standards Overview This document is intended to provide guidance to campus system owners and software developers regarding secure software engineering practices. These standards
Braindumps.C2150-810.50 questions
Braindumps.C2150-810.50 questions Number: C2150-810 Passing Score: 800 Time Limit: 120 min File Version: 5.3 http://www.gratisexam.com/ -810 IBM Security AppScan Source Edition Implementation This is the
Learning objectives for today s session
Black Box versus White Box: Different App Testing Strategies John B. Dickson, CISSP Learning objectives for today s session Understand what a black box and white box assessment is and how they differ Identify
Mean Time to Fix (MTTF) IT Risk s Dirty Little Secret Joe Krull, CPP, CISSP, IAM, CISA, A.Inst.ISP, CRISC, CIPP
Mean Time to Fix (MTTF) IT Risk s Dirty Little Secret Joe Krull, CPP, CISSP, IAM, CISA, A.Inst.ISP, CRISC, CIPP Presentation Overview Basic Application Security (AppSec) Fundamentals Risks Associated With
Integrating Security into the Application Development Process. Jerod Brennen, CISSP CTO & Principal Security Consultant, Jacadis
Integrating Security into the Application Development Process Jerod Brennen, CISSP CTO & Principal Security Consultant, Jacadis Agenda Seek First to Understand Source Code Security AppSec and SQA Analyzing
How To Protect Your Data From Attack
Integrating Vulnerability Scanning into the SDLC Eric Johnson JavaOne Conference 10/26/2015 1 Eric Johnson (@emjohn20) Senior Security Consultant Certified SANS Instructor Certifications CISSP, GWAPT,
Product Roadmap. Sushant Rao Principal Product Manager Fortify Software, a HP company
Product Roadmap Sushant Rao Principal Product Manager Fortify Software, a HP company Agenda Next Generation of Security Analysis Future Directions 2 Currently under investigation and not guaranteed to
Introduction to Web Application Security. Microsoft CSO Roundtable Houston, TX. September 13 th, 2006
Introduction to Web Application Security Microsoft CSO Roundtable Houston, TX September 13 th, 2006 Overview Background What is Application Security and Why Is It Important? Examples Where Do We Go From
WHITEPAPER. Nessus Exploit Integration
Nessus Exploit Integration v2 Tenable Network Security has committed to providing context around vulnerabilities, and correlating them to other sources, such as available exploits. We currently pull information
HackMiami Web Application Scanner 2013 PwnOff
HackMiami Web Application Scanner 2013 PwnOff An Analysis of Automated Web Application Scanning Suites James Ball, Alexander Heid, Rod Soto http://www.hackmiami.org Overview Web application scanning suites
Adobe Systems Incorporated
Adobe Connect 9.2 Page 1 of 8 Adobe Systems Incorporated Adobe Connect 9.2 Hosted Solution June 20 th 2014 Adobe Connect 9.2 Page 2 of 8 Table of Contents Engagement Overview... 3 About Connect 9.2...
Using Sprajax to Test AJAX. OWASP AppSec Seattle Oct 2006. The OWASP Foundation http://www.owasp.org/
Using Sprajax to Test AJAX Security OWASP AppSec Seattle Oct 2006 Dan Cornell, OWASP San Antonio Leader Principal, Denim Group, Ltd. [email protected] (210) 572-4400 Copyright 2006 - The OWASP Foundation
Using Free Tools To Test Web Application Security
Using Free Tools To Test Web Application Security Speaker Biography Matt Neely, CISSP, CTGA, GCIH, and GCWN Manager of the Profiling Team at SecureState Areas of expertise: wireless, penetration testing,
IBM Rational AppScan: Application security and risk management
IBM Software Security November 2011 IBM Rational AppScan: Application security and risk management Identify, prioritize, track and remediate critical security vulnerabilities and compliance demands 2 IBM
SAST, DAST and Vulnerability Assessments, 1+1+1 = 4
SAST, DAST and Vulnerability Assessments, 1+1+1 = 4 Gordon MacKay Digital Defense, Inc. Chris Wysopal Veracode Session ID: Session Classification: ASEC-W25 Intermediate AGENDA Risk Management Challenges
From the Bottom to the Top: The Evolution of Application Monitoring
From the Bottom to the Top: The Evolution of Application Monitoring Narayan Makaram, CISSP Director, Security Solutions HP/Enterprise Security Business Unit Session ID: SP01-202 Session 2012 Classification:
Turning the Battleship: How to Build Secure Software in Large Organizations. Dan Cornell May 11 th, 2006
Turning the Battleship: How to Build Secure Software in Large Organizations Dan Cornell May 11 th, 2006 Overview Background and key questions Quick review of web application security The web application
Vulnerability Management in an Application Security World. AppSec DC November 12 th, 2009. The OWASP Foundation http://www.owasp.
Vulnerability Management in an Application Security World AppSec DC November 12 th, 2009 Dan Cornell Global Membership Committee Denim Group [email protected] (210) 572-4400 Twitter: @danielcornell The
(WAPT) Web Application Penetration Testing
(WAPT) Web Application Penetration Testing Module 0: Introduction 1. Introduction to the course. 2. How to get most out of the course 3. Resources you will need for the course 4. What is WAPT? Module 1:
List of Scanner Features (3 of 3)
List of Features (3 of 3) Advanced Features Acunetix WVS ) JS/ analysis & crawling, URI Coverage for XSS & SQLi, Web Services Scanning Features, GHDB, Network Scanning Features, Subdomain, Authentication
Mingyu Web Application Firewall (DAS- WAF) - - - All transparent deployment for Web application gateway
Mingyu Web Application Firewall (DAS- WAF) - - - All transparent deployment for Web application gateway All transparent deployment Full HTTPS site defense Prevention of OWASP top 10 Website Acceleration
Interactive Application Security Testing (IAST)
WHITEPAPER Interactive Application Security Testing (IAST) The World s Fastest Application Security Software Software affects virtually every aspect of an individual s finances, safety, government, communication,
Bust a cap in a web app with OWASP ZAP
The OWASP Foundation http://www.owasp.org Bust a cap in a web app with OWASP ZAP Adrien de Beaupré GSEC, GCIH, GPEN, GWAPT, GCIA, GXPN ZAP Evangelist Intru-Shun.ca Inc. SANS Instructor, Penetration Tester,
Web Application Penetration Testing
Web Application Penetration Testing 2010 2010 AT&T Intellectual Property. All rights reserved. AT&T and the AT&T logo are trademarks of AT&T Intellectual Property. Will Bechtel [email protected]
Remediation Statistics: What Does Fixing Application Vulnerabilities Cost?
Remediation Statistics: What Does Fixing Application Vulnerabilities Cost? Dan Cornell Denim Group, Ltd. Session ID: ASEC-302 Session Classification: Intermediate Agenda An Innocent Question Finding a
Security Tools - Hands On
Security Tools - Hands On SecAppDev 2014 Ken van Wyk, @KRvW! Leuven, Belgium 10-14 February 2014 Caveats and Warnings This is not a sales pitch for any product(s) If you want to talk to a sales person,
Adobe ColdFusion. Secure Profile Web Application Penetration Test. July 31, 2014. Neohapsis 217 North Jefferson Street, Suite 200 Chicago, IL 60661
Adobe ColdFusion Secure Profile Web Application Penetration Test July 31, 2014 Neohapsis 217 North Jefferson Street, Suite 200 Chicago, IL 60661 Chicago Dallas This document contains and constitutes the
Security Testing for Developers using OWASP ZAP
JavaOne San Fransisco 2014 The OWASP Foundation http://www.owasp.org Security Testing for Developers using OWASP ZAP Simon Bennetts OWASP ZAP Project Lead Mozilla Security Team [email protected] Copyright
A Network Administrator s Guide to Web App Security
A Network Administrator s Guide to Web App Security Speaker: Orion Cassetto, Product Marketing Manager, Incapsula Moderator: Rich Nass, OpenSystems Media Agenda Housekeeping Presentation Questions and
Web Application Security Assessment and Vulnerability Mitigation Tests
White paper BMC Remedy Action Request System 7.6.04 Web Application Security Assessment and Vulnerability Mitigation Tests January 2011 www.bmc.com Contacting BMC Software You can access the BMC Software
Using Nessus In Web Application Vulnerability Assessments
Using Nessus In Web Application Vulnerability Assessments Paul Asadoorian Product Evangelist Tenable Network Security [email protected] About Tenable Nessus vulnerability scanner, ProfessionalFeed
HP Application Security Center
HP Application Security Center Web application security across the application lifecycle Solution brief HP Application Security Center helps security professionals, quality assurance (QA) specialists and
NSFOCUS Web Vulnerability Scanning System
NSFOCUS Web Vulnerability Scanning System Overview Most Web application systems are tailor-made and delivered in source codes by Customer Benefits Accurate Analysis on Website Vulnerabilities Fast scan
Out of the Fire - Adding Layers of Protection When Deploying Oracle EBS to the Internet
Out of the Fire - Adding Layers of Protection When Deploying Oracle EBS to the Internet March 8, 2012 Stephen Kost Chief Technology Officer Integrigy Corporation Phil Reimann Director of Business Development
Integrating Web Application Security into the IT Curriculum
Integrating Web Application Security into the IT Curriculum James Walden Northern Kentucky University Topics 1. 2. 3. 4. Why should we teach web application security? What material do we need to cover?
Application Security Testing. Erez Metula (CISSP), Founder Application Security Expert [email protected]
Application Security Testing Erez Metula (CISSP), Founder Application Security Expert [email protected] Agenda The most common security vulnerabilities you should test for Understanding the problems
The Top Web Application Attacks: Are you vulnerable?
QM07 The Top Web Application Attacks: Are you vulnerable? John Burroughs, CISSP Sr Security Architect, Watchfire Solutions [email protected] Agenda Current State of Web Application Security Understanding
METHODS TO TEST WEB APPLICATION SCANNERS
METHODS TO TEST WEB APPLICATION SCANNERS Fernando Román Muñoz, Luis Javier García Villalba Group of Analysis, Security and Systems (GASS) Department of Software Engineering and Artificial Intelligence
Comparing Application Security Tools
Comparing Application Security Tools Defcon 15-8/3/2007 Eddie Lee Fortify Software Agenda Intro to experiment Methodology to reproduce experiment on your own Results from my experiment Conclusions Introduction
CSUSB Web Application Security Standard CSUSB, Information Security & Emerging Technologies Office
CSUSB, Information Security & Emerging Technologies Office Last Revised: 03/17/2015 Draft REVISION CONTROL Document Title: Author: File Reference: CSUSB Web Application Security Standard Javier Torner
We protect you applications! No, you don t. Digicomp Hacking Day 2013 May 16 th 2013
We protect you applications! No, you don t Digicomp Hacking Day 2013 May 16 th 2013 Sven Vetsch Partner & CTO at Redguard AG www.redguard.ch Specialized in Application Security (Web, Web-Services, Mobile,
Web Application Vulnerability Testing with Nessus
The OWASP Foundation http://www.owasp.org Web Application Vulnerability Testing with Nessus Rïk A. Jones, CISSP [email protected] Rïk A. Jones Web developer since 1995 (16+ years) Involved with information
10 Things Every Web Application Firewall Should Provide Share this ebook
The Future of Web Security 10 Things Every Web Application Firewall Should Provide Contents THE FUTURE OF WEB SECURITY EBOOK SECTION 1: The Future of Web Security SECTION 2: Why Traditional Network Security
ANNEXURE-1 TO THE TENDER ENQUIRY NO.: DPS/AMPU/MIC/1896. Network Security Software Nessus- Technical Details
Sub: Supply, Installation, setup and testing of Tenable Network Security Nessus vulnerability scanner professional version 6 or latest for scanning the LAN, VLAN, VPN and IPs with 3 years License/Subscription
STATE OF WASHINGTON DEPARTMENT OF SOCIAL AND HEALTH SERVICES P.O. Box 45810, Olympia, Washington 98504 5810. October 21, 2013
STATE OF WASHINGTON DEPARTMENT OF SOCIAL AND HEALTH SERVICES P.O. Box 45810, Olympia, Washington 98504 5810 October 21, 2013 To: RE: All Vendors Request for Information (RFI) The State of Washington, Department
Technical Proposal. In collaboration with Main Contractor. 24 th April 2012 (VER. 1.0) E-SPIN SDN BHD
Technical Proposal 24 th April 2012 (VER. 1.0) In collaboration with Main Contractor E-SPIN SDN BHD Since 2005 E-SPIN SDN BHD. All Right Reserved. www.e-spincorp.com Product Overview & Features Nessus
Contemporary Web Application Attacks. Ivan Pang Senior Consultant Edvance Limited
Contemporary Web Application Attacks Ivan Pang Senior Consultant Edvance Limited Agenda How Web Application Attack impact to your business? What are the common attacks? What is Web Application Firewall
Fortify Training Services. Securing Your Entire Software Portfolio FRAMEWORK*SSA
Fortify Training Services Securing Your Entire Software Portfolio FRAMEWORK*SSA Fortify s holistic approach to application security truly safeguards our enterprise against today s ever-changing security
Ciklum Solutions Quality Assurance Solutions Unit Security QA Services reference
Ciklum Solutions Quality Assurance Solutions Unit Security QA Services reference 2002-2015 Ciklum. All rights reserved Kyiv, 2015 Client: Platform: Technology: Tools: DanDomain Delivery: Website: Security
Security Testing Tools
- A Gallop Insight The Average security breach can cost a company between $90 and $305 per lost record, according to a new study from forrester research. Introduction The new age enterprises face a relentless
Automatic vs. Manual Code Analysis
Automatic vs. Manual Code Analysis 2009-11-17 Ari Kesäniemi Senior Security Architect Nixu Oy [email protected] Copyright The Foundation Permission is granted to copy, distribute and/or modify this
Vulnerability Management
Vulnerability Management Buyer s Guide Buyer s Guide 01 Introduction 02 Key Components 03 Other Considerations About Rapid7 01 INTRODUCTION Exploiting weaknesses in browsers, operating systems and other
Comparing the Effectiveness of Penetration Testing and Static Code Analysis
Comparing the Effectiveness of Penetration Testing and Static Code Analysis Detection of SQL Injection Vulnerabilities in Web Services PRDC 2009 Nuno Antunes, [email protected], [email protected] University
OWASP Top Ten Tools and Tactics
OWASP Top Ten Tools and Tactics Russ McRee Copyright 2012 HolisticInfoSec.org SANSFIRE 2012 10 JULY Welcome Manager, Security Analytics for Microsoft Online Services Security & Compliance Writer (toolsmith),
Continuous???? Copyright 2015 Hewlett-Packard Development Company, L.P. The information contained herein is subject to change without notice.
???? 1 Copyright 2015 Hewlett-Packard Development Company, L.P. The information contained herein is subject to change without notice. Application Delivery is Accelerating Surge in # of releases per app
QualysGuard WAS. Getting Started Guide Version 4.1. April 24, 2015
QualysGuard WAS Getting Started Guide Version 4.1 April 24, 2015 Copyright 2011-2015 by Qualys, Inc. All Rights Reserved. Qualys, the Qualys logo and QualysGuard are registered trademarks of Qualys, Inc.
Web application testing
CL-WTS Web application testing Classroom 2 days Testing plays a very important role in ensuring security and robustness of web applications. Various approaches from high level auditing through penetration
Web Application Security. Radovan Gibala Senior Field Systems Engineer F5 Networks [email protected]
Web Application Security Radovan Gibala Senior Field Systems Engineer F5 Networks [email protected] Security s Gaping Hole 64% of the 10 million security incidents tracked targeted port 80. Information Week
QualysGuard WAS. Getting Started Guide Version 3.3. March 21, 2014
QualysGuard WAS Getting Started Guide Version 3.3 March 21, 2014 Copyright 2011-2014 by Qualys, Inc. All Rights Reserved. Qualys, the Qualys logo and QualysGuard are registered trademarks of Qualys, Inc.
SANDCAT THE WEB APPLICATION SECURITY ASSESSMENT SUITE WHAT IS SANDCAT? MAIN COMPONENTS. Web Application Security
SANDCAT WHAT IS SANDCAT? THE WEB APPLICATION SECURITY ASSESSMENT SUITE Sandcat is a hybrid multilanguage web application security assessment suite - a software suite that simulates web-based attacks. Sandcat
Introduction:... 1 Security in SDLC:... 2 Penetration Testing Methodology: Case Study... 3
Table of Contents Introduction:... 1 Security in SDLC:... 2 Penetration Testing Methodology: Case Study... 3 Information Gathering... 3 Vulnerability Testing... 7 OWASP TOP 10 Vulnerabilities:... 8 Injection
IBM Rational AppScan Source Edition
IBM Software November 2011 IBM Rational AppScan Source Edition Secure applications and build secure software with static application security testing Highlights Identify vulnerabilities in your source
Conducting Web Application Pentests. From Scoping to Report For Education Purposes Only
Conducting Web Application Pentests From Scoping to Report For Education Purposes Only Web App Pen Tests According to OWASP: A Web Application Penetration Test focuses only on evaluating the security of
Spigit, Inc. Web Application Vulnerability Assessment/Penetration Test. Prepared By: Accuvant LABS
Web Application Vulnerability Assessment/enetration Test repared By: Accuvant LABS November 20, 2012 Web Application Vulnerability Assessment/enetration Test Introduction Defending the enterprise against
ABC LTD EXTERNAL WEBSITE AND INFRASTRUCTURE IT HEALTH CHECK (ITHC) / PENETRATION TEST
ABC LTD EXTERNAL WEBSITE AND INFRASTRUCTURE IT HEALTH CHECK (ITHC) / PENETRATION TEST Performed Between Testing start date and end date By SSL247 Limited SSL247 Limited 63, Lisson Street Marylebone London
Attack Vector Detail Report Atlassian
Attack Vector Detail Report Atlassian Report As Of Tuesday, March 24, 2015 Prepared By Report Description Notes [email protected] The Attack Vector Details report provides details of vulnerability
Security Testing of Java web applications Using Static Bytecode Analysis of Deployed Applications
Security Testing of Java web applications Using Static Bytecode Analysis of Deployed Applications Streamline your web application Security testing with IBM Security AppScan Source 9.0.1 Leyla Aravopoulos
Application security testing: Protecting your application and data
E-Book Application security testing: Protecting your application and data Application security testing is critical in ensuring your data and application is safe from security attack. This ebook offers
Web Application Report
Web Application Report This report includes important security information about your Web Application. OWASP Top Ten 2010 The Ten Most Critical Web Application Report This report was created by IBM Rational
2,000 Websites Later Which Web Programming Languages are Most Secure?
2,000 Websites Later Which Web Programming Languages are Most Secure? Jeremiah Grossman Founder & Chief Technology Officer 2010 WhiteHat Security, Inc. WhiteHat Security Founder & Chief Technology Officer
Creating Stronger, Safer, Web Facing Code. JPL IT Security Mary Rivera June 17, 2011
Creating Stronger, Safer, Web Facing Code JPL IT Security Mary Rivera June 17, 2011 Agenda Evolving Threats Operating System Application User Generated Content JPL s Application Security Program Securing
