Unbreakable ABAP? Vulnerabilities in custom ABAP Code Markus Schumacher, Co-Founder Virtual Forge GmbH
|
|
|
- Naomi Brown
- 10 years ago
- Views:
Transcription
1 Unbreakable ABAP? Vulnerabilities in custom ABAP Code Markus Schumacher, Co-Founder Virtual Forge GmbH März 2010 Print Media Academy, Heidelberg
2 Page 2 Virtual Forge GmbH - GmbH since , headquarters in Heidelberg Long-lasting consulting experience Application security, focus SAP from day 1 Code Profiler, SAP audits and code reviews Book: Sichere ABAP-Programmierung, Trainings
3 Page 3 Agenda ABAP development - risks in Web applications (example) ABAP/BSP vs. OWASP Top 10 Examples of vulnerabilities in custom coding Business Server Pages Inline ABAP in HTML HTMLB-Tag-Library Open SQL Dynamic Open SQL SQL-Injection Conclusion
4 Page 4 ABAP in a Nutshell Exists since ~30 years COBOL-like syntax grown language several programming paradigms at the same time very context sensitive, no reserved keywords DB-independent SQL-dialect built in Code is stored in DB Development environment developed in ABAP Code stored on server Access via transaction SE80 Transport management
5 Page 5 ABAP and Open Source (but not free!) Sourcecode is completely available in a SAP installation SAP standard code plus custom coding Customers can change code Copy, rename, and modify code Change SAP standard code ( modification ) ABAP allows several development frameworks Customers write their own code in order to adapt the standard to their needs ( customizing ) Custom development for non-standard business processes 3rd party add-ons
6 Page 6 Frontend-Technologies Dynpro Written in ABAP Requires proprietary UI (SAP GUI) Similar to X11 paradigm Internet Transaction Server (ITS) 1st Web-Technologie of SAP Development almost stopped, but widely used
7 Page 7 Frontend-Technologies Business Server Pages (BSP) HTML with embedded ABAP (similar to JSP) Several programming paradigms incl. MVC Widely used, customers still build new applications Web Dynpro (ABAP Java) UI-independent framework, point & click programming for UI design Developer can t embed his own HTML/JavaScript Developer can t cause a vulnerability. But he also can t avoid them
8 Page 8 Frontend-Technologies Web GUI HTML-version of regular Dynpros (SAP GUI) Earlier version on top of Internet Transaction Server Today as plugin of SAP Web Application Server external systems (via JCo or RFC), Adobe Flash, Microsoft Silverlight, PHP, Phython, etc.
9 Page 9 Further Technologies File access Database access (OpenSQL, Native SQL) Remote access HTTP, FTP, , Messaging (PI/XI) Web Services (SOAP) RFC - Remote Function Call Whatever you need SAP has it, but be aware of the little differences
10 Page 10 SAP Web Technology SAP NetWeaver Web Application Server (Web AS): Supports Single Sign On (SSO) SSO-ticket stored in cookie (MYSAPSSO2) By default issued for path / and domain.tld By default neither httponly, nor secure Development of your own HTTP-Handler possible BSP, Web Dynpro, WebGUI are HTTP-Handler Configuration via profile parameter (report RZ11) and transaction SICF Blacklist implementation filters <script, %00 and other patterns
11 Page 11 Business Server Pages (BSP) Finding BSP applications:
12 Page 12 Business Server Pages (BSP) mentor.com erco.org sap-ag.de beiersdorfgroup.com mybayerjob.de heraeus.com wacker.com heidelberg.com knorr-bremse.com ottopersonalsysteme.de skyguide.ch eads.com bsr.de kuka.de kpmg.de daad.de euhreka.com umdasch.com celesio.com pflegedienstnavigator.de oebb.at salzburg-ag.at whirlpool.com volkswagen.de pharma.com wa.gov brucepower.com jetblue.com suzukiautoco.com singaporepower.com kaufland.de clavis-bonn.de albatha.ae vodafone.com iom.int wlw.de erecruiting-randstad.de lieferantensuchmaschine.com audi.de blanco.de festo.com vhv.de otto.de abb.de ruv.de holcim.com mannheim.de softsurvey.de
13 Page 13 Business Server Pages (BSP) OWASP Top 10 A1 Cross-Site Scripting (XSS) A2 - Injection Flaws A3 - Malicious File Execution A4 - Insecure Direct Object Reference A5 - Cross Site Request Forgery (CSRF) A6 - Information Leakage and Improper Error Handling A7 - Broken Authentication and Session Management A8 - Insecure Cryptographic Storage A9 - Insecure Communications A10 - Failure to Restrict URL Access Potentially vulnerable? Yes Yes Yes Yes Yes n/a n/a n/a n/a n/a
14 Page 14 Agenda ABAP development - risks in Web applications (example) ABAP/BSP vs. OWASP Top 10 Examples of vulnerabilities in custom coding Business Server Pages Inline ABAP in HTML HTMLB-Tag-Library Open SQL Dynamic Open SQL SQL-Injection Conclusion
15 Page 15 Business Server Pages Preventing Cross-Site Scripting by Encoding/Escaping in Plain-HTML-Pages ABAP-Encoding-Functions (CL_HTTP_UTILITY) BSP-Page Attribute (forceencode) in Pages with HTMLB-Taglib Tag-Attribute (forceencode)
16 Page 16 Business Server Pages Plain HTML 1 <%@page language="abap" %> 2 <% DATA: name TYPE string. 3 name = request->get_form_field( 'name' ). 4 %> 5 <html> 6 <head><title>html mit eingebettetem ABAP</title></head> 7 <p>hello <%= name %> </p> 8 <body> 9 </body></html>
17 Page 17 Business Server Pages Plain HTML 1 <html> 2 <head><title>html mit eingebettetem ABAP</title> </head> 3 <body> 4 <p>hello Guest</p> 5 </body> 6 </html>
18 Page 18 Business Server Pages Plain HTML Cross-Site Scripting Vulnerability: src="abc" onerror=" alert(document.cookie);"> 1 <html> 2 <head><title>html mit eingebettetem ABAP</title></head> 3 <p>hello <img src= onerror="alert(document.cookie);"> </p> 4 <body> 5 </body></html>
19 Page 19 Business Server Pages Plain HTML 1 <%@page language="abap" %> 2 <% DATA: name TYPE string. 3 name = request->get_form_field( 'name' ). 4 name = CL_HTTP_UTILITY=>escape_html( name ). 4 %> 5 <html> 6 <head><title>html mit eingebettetem ABAP</title></head> 7 <p>hello <%= name %> </p> 8 <body> 9 </body></html>
20 Page 20 Business Server Pages Plain HTML Prevented Cross-Site Scripting Schwachstelle: src="abc" onerror=" alert(document.cookie);"> 1 <html> 2 <head><title>html mit eingebettetem ABAP</title></head> 3 <p>hello <img src="abc" onerror="alert(document.cookie); "> </p> 4 <body> 5 </body></html>
21 Page 21 Business Server Pages Plain HTML Encoding of data by o CL_HTTP_UTILITY=>escape_html( ) o CL_HTTP_UTILITY=>escape_javascript( ) o CL_HTTP_UTILITY=>escape_url( ) o Pro: <%HTML=$VAR %>, <%URL= %>, <% Prevents XSS-Vulnerabilities Contra: Every single output must be encoded according to the HTMLcontext High effort, error prone
22 Page 22 Business Server Pages Plain HTML 1 <%@page language="abap" forceencode="html" 2 DATA: name TYPE string. 3 name = request->get_form_field( 'name' ). 4 %> 5 <html> 6 <head><title></title></head> 7 <p>hello <%= name %> </p> 8 <body> 9 </body></html>
23 Page 23 Business Server Pages Plain HTML Preventing Cross-Site Scripting by <%page forceencode= {html url javascript} > Global encoding via page attribute All output is encoded in the same way, no distinction between HTML-context (JavaScript, URL,...) Counterexample: <a href="<%= request->get_form_field( 'user' ). %>"> Link</a>
24 Page 24 Business Server Pages HTMLB 1 <%@page language="abap" %> 2 <%@extension name="htmlb" prefix="htmlb" %> 3 <% DATA: name TYPE string. 4 name = request->get_form_field( 'name' ). %> 5 <htmlb:content design="design2003"> 6 <htmlb:page title = "HTMLB ohne forceencode"> 7 <htmlb:form> 8 <htmlb:textview text = "Hello <%= name %>" 9 design = "EMPHASIZED" /> 10 </htmlb:form> 11 </htmlb:page> 12 </htmlb:content>
25 Page 25 Business Server Pages HTMLB name=<img src="abc" onerror="alert(document.cookie);">
26 Page 26 Business Server Pages HTMLB 1 <%@page language="abap" %> 2 <%@extension name="htmlb" prefix="htmlb" %> 3 <% DATA: name TYPE string. 4 name = request->get_form_field( 'name' ). %> 5 <htmlb:content design="design2003" forceencode="enabled"> 6 <htmlb:page title = "HTMLB mit forceencode"> 7 <htmlb:form> 8 <htmlb:textview text = "Hello <%= name %>" 9 design = "EMPHASIZED" /> 10 </htmlb:form> 11 </htmlb:page> 12 </htmlb:content>
27 Page 27 Business Server Pages HTMLB name= <img src="abc" onerror="alert(document.cookie);">
28 Page 28 Business Server Pages Preventing Cross-Site Scripting in Plain-HTML Encoding with methods (CL_HTTP_UTILITY) High effort, error prone Encoding via page attribute (forceencode) Not speficic for HTML-context, no complete coverage of attacks Preventing Cross-Site Scripting in HTMLB Tag-attribute forceencode per default deactivated, must be set explicitly
29 Page 29 Agenda ABAP development - risks in Web applications (example) ABAP/BSP vs. OWASP Top 10 Examples of vulnerabilities in custom coding Business Server Pages Inline ABAP in HTML HTMLB-Tag-Library Open SQL Dynamic Open SQL SQL-Injection Conclusion
30 Page 30 Open SQL Open SQL built in ABAP Internally converted to prepared statements SQL-statement and user data separated, no SQL-Injection possible 1 SELECT * FROM ZCCINFO 2 INTO l_zccinfo 3 WHERE uname = l_uname 4 AND ta_date = l_date.
31 Page 31 Dynamic Open SQL - Example
32 Page 32 Open SQL
33 Page 33 Dynamic Open SQL Interprets String literal as SQL-Statement No encoding functions User data can t be separated from SQL-commands SQL-Injection very likely, when user data is part of dynamic SQL-Statement 1 SELECT (l_felder) FROM (l_table) 2 INTO l_zccinfo 3 WHERE (l_where).
34 Page 34 Dynamic Open SQL - Example
35 Page 35 Dynamic Open SQL - Example
36 Page 36 Dynamisches Open SQL
37 Page 37 Summary Open SQL Dynamic Open SQL can easily lead to SQL-Injection- Vulnerabilities No encoding functions Prepared-Statement-Injection Avoid dynamic Open SQL in ABAP whenever possible
38 Page 38 Conclusion: Covered Topics OWASP Top 10 A1 - Cross Site Scripting (XSS) A2 - Injection Flaws A3 - Malicious File Execution A4 - Insecure Direct Object Reference A5 - Cross Site Request Forgery (CSRF) TODO X X X A6 - Information Leakage and Improper Error Handling - A7 - Broken Authentication and Session Management - A8 - Insecure Cryptographic Storage - A9 - Insecure Communications - A10 - Failure to Restrict URL Access -
39 Page 39 Conclusion: Take Aways SAP-Web-Frontends as example Widely used, processing of business-critical data SAP-Web-Frontend-Technologies covered in this talk: X X X Business Server Pages (BSP) Web Dynpro Internet Transaction Server Own HTTP-Handlers... High efforts for writing secure ABAP code! Step 1: Understand how known vulnerabilities relate to SAP Step 2: Understand what to do
40 Page 40 Questions???
41 Page 41 Literature Sichere ABAP-Programmierung - SAP Press, 2009 Wiegenstein, Schumacher, Schinzel, Weidemann SAP Documentation - Secure Programming ABAP - SAP AG, da1-d18bb60ec2bf&overridelayout=true Security Scanner for ABAP - vmovie: Security Knowledge on Stage
Hardening of SAP HTTP- and Webservices
Hardening of SAP HTTP- and Webservices Sebastian Schinzel (Slides shamelessly stolen from by colleague Frederik Weidemann) Virtual Forge GmbH University of Mannheim Hardening of SAP HTTP- and Webservices
Hardening of SAP HTTP- and Webservices
Hardening of SAP HTTP- and Webservices Frederik Weidemann Nürnberg 20.10.2010 Virtual Forge GmbH frederik.weidemann (at) virtualforge.de Copyright The Foundation Permission is granted to copy, distribute
CSE598i - Web 2.0 Security OWASP Top 10: The Ten Most Critical Web Application Security Vulnerabilities
CSE598i - Web 2.0 Security OWASP Top 10: The Ten Most Critical Web Application Security Vulnerabilities Thomas Moyer Spring 2010 1 Web Applications What has changed with web applications? Traditional applications
Andreas Wiegenstein Dr. Markus Schumacher
Andreas Wiegenstein Dr. Markus Schumacher PPT SAP Masterfolie GUI Hacking (V1.0) zur Troopers Erstellung Conference von 2011, Heidelberg Präsentationen Who am I Andreas PPT Masterfolie Wiegenstein CTO
Intrusion detection for web applications
Intrusion detection for web applications Intrusion detection for web applications Łukasz Pilorz Application Security Team, Allegro.pl Reasons for using IDS solutions known weaknesses and vulnerabilities
Web Application Vulnerability Testing with Nessus
The OWASP Foundation http://www.owasp.org Web Application Vulnerability Testing with Nessus Rïk A. Jones, CISSP [email protected] Rïk A. Jones Web developer since 1995 (16+ years) Involved with information
Adobe Systems Incorporated
Adobe Connect 9.2 Page 1 of 8 Adobe Systems Incorporated Adobe Connect 9.2 Hosted Solution June 20 th 2014 Adobe Connect 9.2 Page 2 of 8 Table of Contents Engagement Overview... 3 About Connect 9.2...
Check list for web developers
Check list for web developers Requirement Yes No Remarks 1. Input Validation 1.1) Have you done input validation for all the user inputs using white listing and/or sanitization? 1.2) Does the input validation
Web Application Security. Vulnerabilities, Weakness and Countermeasures. Massimo Cotelli CISSP. Secure
Vulnerabilities, Weakness and Countermeasures Massimo Cotelli CISSP Secure : Goal of This Talk Security awareness purpose Know the Web Application vulnerabilities Understand the impacts and consequences
Secure development and the SDLC. Presented By Jerry Hoff @jerryhoff
Secure development and the SDLC Presented By Jerry Hoff @jerryhoff Agenda Part 1: The Big Picture Part 2: Web Attacks Part 3: Secure Development Part 4: Organizational Defense Part 1: The Big Picture Non
Magento Security and Vulnerabilities. Roman Stepanov
Magento Security and Vulnerabilities Roman Stepanov http://ice.eltrino.com/ Table of contents Introduction Open Web Application Security Project OWASP TOP 10 List Common issues in Magento A1 Injection
WEB SECURITY CONCERNS THAT WEB VULNERABILITY SCANNING CAN IDENTIFY
WEB SECURITY CONCERNS THAT WEB VULNERABILITY SCANNING CAN IDENTIFY www.alliancetechpartners.com WEB SECURITY CONCERNS THAT WEB VULNERABILITY SCANNING CAN IDENTIFY More than 70% of all websites have vulnerabilities
Security Research Advisory IBM inotes 9 Active Content Filtering Bypass
Security Research Advisory IBM inotes 9 Active Content Filtering Bypass Table of Contents SUMMARY 3 VULNERABILITY DETAILS 3 TECHNICAL DETAILS 4 LEGAL NOTICES 7 Active Content Filtering Bypass Advisory
ATTACKS TO SAP WEB APPLICATIONS
ATTACKS TO SAP WEB APPLICATIONS by Mariano Nuñez Di Croce [email protected] BlackHat DC 2011 Briefings Abstract "SAP platforms are only accessible internally". While that was true in many organizations
(WAPT) Web Application Penetration Testing
(WAPT) Web Application Penetration Testing Module 0: Introduction 1. Introduction to the course. 2. How to get most out of the course 3. Resources you will need for the course 4. What is WAPT? Module 1:
Gateway Apps - Security Summary SECURITY SUMMARY
Gateway Apps - Security Summary SECURITY SUMMARY 27/02/2015 Document Status Title Harmony Security summary Author(s) Yabing Li Version V1.0 Status draft Change Record Date Author Version Change reference
Early Vulnerability Detection for Supporting Secure Programming
Early Vulnerability Detection for Supporting Secure Programming Luciano Sampaio - [email protected] rio.br Alessandro Garcia - [email protected] rio.br OPUS Research Group LES DI PUC- Rio - Brazil OPUS
Out of the Fire - Adding Layers of Protection When Deploying Oracle EBS to the Internet
Out of the Fire - Adding Layers of Protection When Deploying Oracle EBS to the Internet March 8, 2012 Stephen Kost Chief Technology Officer Integrigy Corporation Phil Reimann Director of Business Development
Detecting Web Application Vulnerabilities Using Open Source Means. OWASP 3rd Free / Libre / Open Source Software (FLOSS) Conference 27/5/2008
Detecting Web Application Vulnerabilities Using Open Source Means OWASP 3rd Free / Libre / Open Source Software (FLOSS) Conference 27/5/2008 Kostas Papapanagiotou Committee Member OWASP Greek Chapter [email protected]
Web-Application Security
Web-Application Security Kristian Beilke Arbeitsgruppe Sichere Identität Fachbereich Mathematik und Informatik Freie Universität Berlin 29. Juni 2011 Overview Web Applications SQL Injection XSS Bad Practice
Web application security
Web application security Sebastian Lopienski CERN Computer Security Team openlab and summer lectures 2010 (non-web question) Is this OK? int set_non_root_uid(int uid) { // making sure that uid is not 0
Bypassing Web Application Firewalls (WAFs) Ing. Pavol Lupták, CISSP, CEH Lead Security Consultant
Bypassing Web Application Firewalls (WAFs) Ing. Pavol Lupták, CISSP, CEH Lead Security Consultant Nethemba All About Security Highly experienced certified IT security experts (CISSP, C EH, SCSecA) Core
The Risks of Client-Side Data Storage From cookie to database
The Risks of Client-Side Data Storage From cookie to database GOVCERT.NL Symposium - 15 November 2010 Agenda Client-Side Data Storage (CSDS): What it is Why it s used How it s implemented Demo SecurSearch
ASP.NET MVC Secure Coding 4-Day hands on Course. Course Syllabus
ASP.NET MVC Secure Coding 4-Day hands on Course Course Syllabus Course description ASP.NET MVC Secure Coding 4-Day hands on Course Secure programming is the best defense against hackers. This multilayered
Web Application Guidelines
Web Application Guidelines Web applications have become one of the most important topics in the security field. This is for several reasons: It can be simple for anyone to create working code without security
1. Introduction. 2. Web Application. 3. Components. 4. Common Vulnerabilities. 5. Improving security in Web applications
1. Introduction 2. Web Application 3. Components 4. Common Vulnerabilities 5. Improving security in Web applications 2 What does World Wide Web security mean? Webmasters=> confidence that their site won
Detecting and Defending Against Security Vulnerabilities for Web 2.0 Applications
Detecting and Defending Against Security Vulnerabilities for Web 2.0 Applications Ray Lai, Intuit TS-5358 Share experience how to detect and defend security vulnerabilities in Web 2.0 applications using
Creating Stronger, Safer, Web Facing Code. JPL IT Security Mary Rivera June 17, 2011
Creating Stronger, Safer, Web Facing Code JPL IT Security Mary Rivera June 17, 2011 Agenda Evolving Threats Operating System Application User Generated Content JPL s Application Security Program Securing
Top Ten Web Application Vulnerabilities in J2EE. Vincent Partington and Eelco Klaver Xebia
Top Ten Web Application Vulnerabilities in J2EE Vincent Partington and Eelco Klaver Xebia Introduction Open Web Application Security Project is an open project aimed at identifying and preventing causes
OWASP and OWASP Top 10 (2007 Update) OWASP. The OWASP Foundation. Dave Wichers. The OWASP Foundation. OWASP Conferences Chair dave.wichers@owasp.
and Top 10 (2007 Update) Dave Wichers The Foundation Conferences Chair [email protected] COO, Aspect Security [email protected] Copyright 2007 - The Foundation This work is available
The Top Web Application Attacks: Are you vulnerable?
QM07 The Top Web Application Attacks: Are you vulnerable? John Burroughs, CISSP Sr Security Architect, Watchfire Solutions [email protected] Agenda Current State of Web Application Security Understanding
Web Application Report
Web Application Report This report includes important security information about your Web Application. Security Report This report was created by IBM Rational AppScan 8.5.0.1 11/14/2012 8:52:13 AM 11/14/2012
Thomas Röthlisberger IT Security Analyst [email protected]
Thomas Röthlisberger IT Security Analyst [email protected] Compass Security AG Werkstrasse 20 Postfach 2038 CH-8645 Jona Tel +41 55 214 41 60 Fax +41 55 214 41 61 [email protected] www.csnc.ch What
SECURE APPLICATION DEVELOPMENT CODING POLICY OCIO-6013-09 TABLE OF CONTENTS
OFFICE OF THE CHIEF INFORMATION OFFICER OCIO-6013-09 Date of Issuance: May 22, 2009 Effective Date: May 22, 2009 Review Date: TABLE OF CONTENTS Section I. PURPOSE II. AUTHORITY III. SCOPE IV. DEFINITIONS
FINAL DoIT 11.03.2015 - v.4 PAYMENT CARD INDUSTRY DATA SECURITY STANDARDS APPLICATION DEVELOPMENT AND MAINTENANCE PROCEDURES
Purpose: The Department of Information Technology (DoIT) is committed to developing secure applications. DoIT s System Development Methodology (SDM) and Application Development requirements ensure that
Acunetix Website Audit. 5 November, 2014. Developer Report. Generated by Acunetix WVS Reporter (v8.0 Build 20120808)
Acunetix Website Audit 5 November, 2014 Developer Report Generated by Acunetix WVS Reporter (v8.0 Build 20120808) Scan of http://filesbi.go.id:80/ Scan details Scan information Starttime 05/11/2014 14:44:06
Members of the UK cyber security forum. Soteria Health Check. A Cyber Security Health Check for SAP systems
Soteria Health Check A Cyber Security Health Check for SAP systems Soteria Cyber Security are staffed by SAP certified consultants. We are CISSP qualified, and members of the UK Cyber Security Forum. Security
WHITE PAPER. FortiWeb and the OWASP Top 10 Mitigating the most dangerous application security threats
WHITE PAPER FortiWeb and the OWASP Top 10 PAGE 2 Introduction The Open Web Application Security project (OWASP) Top Ten provides a powerful awareness document for web application security. The OWASP Top
Hardening Moodle. Concept and Realization of a Security Component in Moodle. a project by
Concept and Realization of a Security Component in Moodle a project by Andreas Gigli, Lars-Olof Krause, Björn Ludwig, Kai Neumann, Lars Schmidt and Melanie Schwenk 2 Agenda Plugin Installation in Moodle
OWASP TOP 10 ILIA ALSHANETSKY @ILIAA HTTPS://JOIND.IN/15741
OWASP TOP 10 ILIA ALSHANETSKY @ILIAA HTTPS://JOIND.IN/15741 ME, MYSELF & I PHP Core Developer Author of Guide to PHP Security Security Aficionado THE CONUNDRUM USABILITY SECURITY YOU CAN HAVE ONE ;-) OPEN
Sichere Webanwendungen mit Java
Sichere Webanwendungen mit Java Karlsruher IT- Sicherheitsinitiative 16.07.2015 Dominik Schadow bridgingit Patch fast Unsafe platform unsafe web application Now lets have a look at the developers OWASP
Finding and Preventing Cross- Site Request Forgery. Tom Gallagher Security Test Lead, Microsoft
Finding and Preventing Cross- Site Request Forgery Tom Gallagher Security Test Lead, Microsoft Agenda Quick reminder of how HTML forms work How cross-site request forgery (CSRF) attack works Obstacles
05.0 Application Development
Number 5.0 Policy Owner Information Security and Technology Policy Application Development Effective 01/01/2014 Last Revision 12/30/2013 Department of Innovation and Technology 5. Application Development
What is Web Security? Motivation
[email protected] http://www.brucker.ch/ Information Security ETH Zürich Zürich, Switzerland Information Security Fundamentals March 23, 2004 The End Users View The Server Providers View What is Web
Where every interaction matters.
Where every interaction matters. Peer 1 Vigilant Web Application Firewall Powered by Alert Logic The Open Web Application Security Project (OWASP) Top Ten Web Security Risks and Countermeasures White Paper
How to break in. Tecniche avanzate di pen testing in ambito Web Application, Internal Network and Social Engineering
How to break in Tecniche avanzate di pen testing in ambito Web Application, Internal Network and Social Engineering Time Agenda Agenda Item 9:30 10:00 Introduction 10:00 10:45 Web Application Penetration
SQL INJECTION IN MYSQL
SQL INJECTION IN MYSQL WHAT IS SQL? SQL (pronounced "ess-que-el") stands for Structured Query Language. SQL is used to communicate with a database. extracted from http://www.sqlcourse.com/intro.html SELECT
Cross Site Scripting (XSS) and PHP Security. Anthony Ferrara NYPHP and OWASP Security Series June 30, 2011
Cross Site Scripting (XSS) and PHP Security Anthony Ferrara NYPHP and OWASP Security Series June 30, 2011 What Is Cross Site Scripting? Injecting Scripts Into Otherwise Benign and Trusted Browser Rendered
Detecting Data Leaks in SAP -
Andreas Wiegenstein TITEL bearbeiten Dr. Markus Schumacher IT Defense, January 30th February 1st, Berlin Detecting Data Leaks in SAP - The Click Next to Level edit Master of Static text Code styles Analysis
State of The Art: Automated Black Box Web Application Vulnerability Testing. Jason Bau, Elie Bursztein, Divij Gupta, John Mitchell
Stanford Computer Security Lab State of The Art: Automated Black Box Web Application Vulnerability Testing, Elie Bursztein, Divij Gupta, John Mitchell Background Web Application Vulnerability Protection
How To Fix A Web Application Security Vulnerability
Proposal of Improving Web Application Security in Context of Latest Hacking Trends RADEK VALA, ROMAN JASEK Department of Informatics and Artificial Intelligence Tomas Bata University in Zlin, Faculty of
Web Application Security
Web Application Security A Beginner's Guide Bryan Sullivan Vincent Liu Mc r New York Chicago San Francisco Lisbon London Madrid Mexico City Milan New Delhi San Juan Seoul Singapore Sydney Toronto Contents
Web applications. Web security: web basics. HTTP requests. URLs. GET request. Myrto Arapinis School of Informatics University of Edinburgh
Web applications Web security: web basics Myrto Arapinis School of Informatics University of Edinburgh HTTP March 19, 2015 Client Server Database (HTML, JavaScript) (PHP) (SQL) 1 / 24 2 / 24 URLs HTTP
Columbia University Web Security Standards and Practices. Objective and Scope
Columbia University Web Security Standards and Practices Objective and Scope Effective Date: January 2011 This Web Security Standards and Practices document establishes a baseline of security related requirements
How To Write A Web Application Vulnerability Scanner And Security Auditor
ARGENTINA CHILE COLOMBIA MEXICO PANAMA PERU SPAIN USA VENEZUELA WAPITI Web application vulnerability scanner and Security auditor March 2010 www.gesfor.es www.grupogesfor.com1 Agenda Why is security necessary?
How To Understand And Understand The Security Of A Web Browser (For Web Users)
Security vulnerabilities: should they be early detected? - [email protected] Alessandro Garcia [email protected] OPUS Research Group Agenda 1. Background; 2.Motivation; 3.Research Questions;
Implementation of Web Application Firewall
Implementation of Web Application Firewall OuTian 1 Introduction Abstract Web 層 應 用 程 式 之 攻 擊 日 趨 嚴 重, 而 國 內 多 數 企 業 仍 不 知 該 如 何 以 資 安 設 備 阻 擋, 仍 在 採 購 傳 統 的 Firewall/IPS,
Attack Vector Detail Report Atlassian
Attack Vector Detail Report Atlassian Report As Of Tuesday, March 24, 2015 Prepared By Report Description Notes [email protected] The Attack Vector Details report provides details of vulnerability
Is Drupal secure? A high-level perspective on web vulnerabilities, Drupal s solutions, and how to maintain site security
Is Drupal secure? A high-level perspective on web vulnerabilities, Drupal s solutions, and how to maintain site security Presented 2009-05-29 by David Strauss Thinking Securely Security is a process, not
Data Breaches and Web Servers: The Giant Sucking Sound
Data Breaches and Web Servers: The Giant Sucking Sound Guy Helmer CTO, Palisade Systems, Inc. Lecturer, Iowa State University @ghelmer Session ID: DAS-204 Session Classification: Intermediate The Giant
Hack Proof Your Webapps
Hack Proof Your Webapps About ERM About the speaker Web Application Security Expert Enterprise Risk Management, Inc. Background Web Development and System Administration Florida International University
Web Application Attacks And WAF Evasion
Web Application Attacks And WAF Evasion Ahmed ALaa (EG-CERT) 19 March 2013 What Are We Going To Talk About? - introduction to web attacks - OWASP organization - OWASP frameworks - Crawling & info. gathering
Essential IT Security Testing
Essential IT Security Testing Application Security Testing for System Testers By Andrew Muller Director of Ionize Who is this guy? IT Security consultant to the stars Member of OWASP Member of IT-012-04
IJMIE Volume 2, Issue 9 ISSN: 2249-0558
Survey on Web Application Vulnerabilities Prevention Tools Student, Nilesh Khochare* Student,Satish Chalurkar* Professor, Dr.B.B.Meshram* Abstract There are many commercial software security assurance
Secure Application Development with the Zend Framework
Secure Application Development with the Zend Framework By Stefan Esser Who? Stefan Esser from Cologne / Germany in IT security since 1998 PHP core developer since 2001 Month of PHP Bugs/Security and Suhosin
Reducing Application Vulnerabilities by Security Engineering
Reducing Application Vulnerabilities by Security Engineering - Subash Newton Manager Projects (Non Functional Testing, PT CoE Group) 2008, Cognizant Technology Solutions. All Rights Reserved. The information
Finding Your Way in Testing Jungle. A Learning Approach to Web Security Testing.
Finding Your Way in Testing Jungle A Learning Approach to Web Security Testing. Research Questions Why is it important to improve website security? What techniques are already in place to test security?
ArcGIS Server Security Threats & Best Practices 2014. David Cordes Michael Young
ArcGIS Server Security Threats & Best Practices 2014 David Cordes Michael Young Agenda Introduction Threats Best practice - ArcGIS Server settings - Infrastructure settings - Processes Summary Introduction
FINAL DoIT 04.01.2013- v.8 APPLICATION SECURITY PROCEDURE
Purpose: This procedure identifies what is required to ensure the development of a secure application. Procedure: The five basic areas covered by this document include: Standards for Privacy and Security
OWASP Top Ten Tools and Tactics
OWASP Top Ten Tools and Tactics Russ McRee Copyright 2012 HolisticInfoSec.org SANSFIRE 2012 10 JULY Welcome Manager, Security Analytics for Microsoft Online Services Security & Compliance Writer (toolsmith),
We protect you applications! No, you don t. Digicomp Hacking Day 2013 May 16 th 2013
We protect you applications! No, you don t Digicomp Hacking Day 2013 May 16 th 2013 Sven Vetsch Partner & CTO at Redguard AG www.redguard.ch Specialized in Application Security (Web, Web-Services, Mobile,
Detecting and Exploiting XSS with Xenotix XSS Exploit Framework
Detecting and Exploiting XSS with Xenotix XSS Exploit Framework [email protected] keralacyberforce.in Introduction Cross Site Scripting or XSS vulnerabilities have been reported and exploited since 1990s.
Programming Flaws and How to Fix Them
19 ö Programming Flaws and How to Fix Them MICHAEL HOWARD DAVID LEBLANC JOHN VIEGA McGraw-Hill /Osborne New York Chicago San Francisco Lisbon London Madrid Mexico City- Milan New Delhi San Juan Seoul Singapore
Web Application Security Assessment and Vulnerability Mitigation Tests
White paper BMC Remedy Action Request System 7.6.04 Web Application Security Assessment and Vulnerability Mitigation Tests January 2011 www.bmc.com Contacting BMC Software You can access the BMC Software
Promoting Application Security within Federal Government. AppSec DC November 13, 2009. The OWASP Foundation http://www.owasp.org
Promoting Application Security within Federal Government AppSec DC November 13, 2009 Dr. Sarbari Gupta, CISSP, CISA Founder/President Electrosoft [email protected] 703-437-9451 ext 12 The Foundation
JVA-122. Secure Java Web Development
JVA-122. Secure Java Web Development Version 7.0 This comprehensive course shows experienced developers of Java EE applications how to secure those applications and to apply best practices with regard
Cracking the Perimeter via Web Application Hacking. Zach Grace, CISSP, CEH [email protected] January 17, 2014 2014 Mega Conference
Cracking the Perimeter via Web Application Hacking Zach Grace, CISSP, CEH [email protected] January 17, 2014 2014 Mega Conference About 403 Labs 403 Labs is a full-service information security and compliance
Advanced Web Technology 10) XSS, CSRF and SQL Injection 2
Berner Fachhochschule, Technik und Informatik Advanced Web Technology 10) XSS, CSRF and SQL Injection Dr. E. Benoist Fall Semester 2010/2011 Table of Contents Cross Site Request Forgery - CSRF Presentation
Conducting Web Application Pentests. From Scoping to Report For Education Purposes Only
Conducting Web Application Pentests From Scoping to Report For Education Purposes Only Web App Pen Tests According to OWASP: A Web Application Penetration Test focuses only on evaluating the security of
elearning for Secure Application Development
elearning for Secure Application Development Curriculum Application Security Awareness Series 1-2 Secure Software Development Series 2-8 Secure Architectures and Threat Modeling Series 9 Application Security
Enterprise Application Security Workshop Series
Enterprise Application Security Workshop Series Phone 877-697-2434 fax 877-697-2434 www.thesagegrp.com Defending JAVA Applications (3 Days) In The Sage Group s Defending JAVA Applications workshop, participants
Web Application Security
Web Application Security John Zaharopoulos ITS - Security 10/9/2012 1 Web App Security Trends Web 2.0 Dynamic Webpages Growth of Ajax / Client side Javascript Hardening of OSes Secure by default Auto-patching
Chapter 1 Web Application (In)security 1
Introduction xxiii Chapter 1 Web Application (In)security 1 The Evolution of Web Applications 2 Common Web Application Functions 4 Benefits of Web Applications 5 Web Application Security 6 "This Site Is
1000 Projects later. Security Code Scans at SAP
1000 Projects later Security Code Scans at SAP About Us Ruediger Bachmann is a Development Architect at SAP AG working, as member of the central code analyses team, in the areas application security and
Criteria for web application security check. Version 2015.1
Criteria for web application security check Version 2015.1 i Content Introduction... iii ISC- P- 001 ISC- P- 001.1 ISC- P- 001.2 ISC- P- 001.3 ISC- P- 001.4 ISC- P- 001.5 ISC- P- 001.6 ISC- P- 001.7 ISC-
Executive Summary On IronWASP
Executive Summary On IronWASP CYBER SECURITY & PRIVACY FOUNDATION 1 Software Product: IronWASP Description of the Product: IronWASP (Iron Web application Advanced Security testing Platform) is an open
Web Application Penetration Testing
Web Application Penetration Testing 2010 2010 AT&T Intellectual Property. All rights reserved. AT&T and the AT&T logo are trademarks of AT&T Intellectual Property. Will Bechtel [email protected]
Full URLs, specified in RFC 3986 have up to eight parts. scheme://login:password@address:port/path/to/resource?query_string#fragment
Outline Recap Secure Programming Lecture 11: Web Application Security II David Aspinall 3rd March 2014 Overview Basics: URLs Output Filtering and XSS Object references Programming web applications securely
Client vs. Server Implementations of Mitigating XSS Security Threats on Web Applications
Journal of Basic and Applied Engineering Research pp. 50-54 Krishi Sanskriti Publications http://www.krishisanskriti.org/jbaer.html Client vs. Server Implementations of Mitigating XSS Security Threats
Promoting Application Security within Federal Government. AppSec DC November 13, 2009. The OWASP Foundation http://www.owasp.org
Promoting Application Security within Federal Government AppSec DC November 13, 2009 Dr. Sarbari Gupta, CISSP, CISA Founder/President Electrosoft [email protected] 703-437-9451 ext 12 The Foundation
JOOMLA SECURITY. ireland website design. by Oliver Hummel. ADDRESS Unit 12D, Six Cross Roads Business Park, Waterford City
JOOMLA SECURITY by Oliver Hummel ADDRESS Unit 12D, Six Cross Roads Business Park, Waterford City CONTACT Nicholas Butler 051-393524 089-4278112 [email protected] Contents Introduction 3 Installation
Securing Your Web Application against security vulnerabilities. Ong Khai Wei, IT Specialist, Development Tools (Rational) IBM Software Group
Securing Your Web Application against security vulnerabilities Ong Khai Wei, IT Specialist, Development Tools (Rational) IBM Software Group Agenda Security Landscape Vulnerability Analysis Automated Vulnerability
Web Application Security
Web Application Security Ng Wee Kai Senior Security Consultant PulseSecure Pte Ltd About PulseSecure IT Security Consulting Company Part of Consortium in IDA (T) 606 Term Tender Cover most of the IT Security
Still Aren't Doing. Frank Kim
Ten Things Web Developers Still Aren't Doing Frank Kim Think Security Consulting Background Frank Kim Consultant, Think Security Consulting Security in the SDLC SANS Author & Instructor DEV541 Secure Coding
Application Security Testing. Erez Metula (CISSP), Founder Application Security Expert [email protected]
Application Security Testing Erez Metula (CISSP), Founder Application Security Expert [email protected] Agenda The most common security vulnerabilities you should test for Understanding the problems
Bank Hacking Live! Ofer Maor CTO, Hacktics Ltd. ATC-4, 12 Jun 2006, 4:30PM
Bank Hacking Live! Ofer Maor CTO, Hacktics Ltd. ATC-4, 12 Jun 2006, 4:30PM Agenda Introduction to Application Hacking Demonstration of Attack Tool Common Web Application Attacks Live Bank Hacking Demonstration
