Application Security. Petr Křemen.
|
|
|
- Brice Heath
- 10 years ago
- Views:
Transcription
1 Application Security Petr Křemen
2 What is application security? Security is a set of measures that
3 So, what can happen? taken from [7] first half of 2013 Let's focus on application security risks Risk=vulnerab ility + impact
4 Selected Vocabulary Spear phishing Phishing targeted at specific individuals/organizations. DDoS Distributed Denial of Service (DoS), i.e. more computers trying to perform DoS Watering Hole infecting some group/community/regional/industrial site with malware
5 Application Security Risks Vulnerability Taken from OWASP web site, (C) OWASP
6 OWASP Open Web Application Security Project Risk analysis, guidelines, tutorials, software for handling security in web applications properly. ESAPI Since 2002
7 OWASP Top 10, 2010 [2] Injection Cross-Site Scripting (XSS) Broken Authentication and Session Management Insecure Direct Object References Cross-Site Request Forgery (CSRF) Security Misconfiguration Insecure Cryptographic Storage Failure to Restrict URL Access Insufficient Transport Layer Protection Unvalidated Redirects and Forwards On the next slides: A = attacker, V = victim.
8 OWASP Top 10, 2013 [2] Injection Cross-Site Scripting (XSS) Broken Authentication and Session Management Insecure Direct Object References Security Misconfiguration Sensitive Data Exposure Missing function level access control Cross-site request forgery Using known vulnerable components Unvalidated Redirects and Forwards On the next slides: A = attacker, V = victim.
9 Injection Vulnerability A sends a text in the syntax of the targeted interpreter to run an unintended (malicious) code. Server-side. Prevention in Java EE i. i. escaping manually, e.g. preventing injection into Java Runtime.exec(), scripting lang~s. ii.by means of a safe API, e.g. secure database access using : JDBC (SQL) PreparedStatement JPA (SQL,JPQL) bind parameters, criteria API Example (SQL) A sends: or '1'='1 The processing servlet executes the following DB query: String query = SELECT * FROM users WHERE uid= + ' + request.getparameter( id ) + ' ;
10 Broken Authentication and Session Management Vulnerability A uses flaws in in authentication or or session management (exposed accounts, plain-text passwords, session ids) Prevention in Java EE Use HTTPS for authentication and sensitive data exchange Use a security library (ESAPI, Spring Sec., container sec.) Force strong passwords Hash all passwords Bind session to more factors (IP) Example A sends a link to to V with jsessionid in in URL V logs in in (having jsessionid in in the request), then A can use the same session to to access the account of of V. Inproper setup of of a session timeout A can get to to the authenticated page on the computer where V forgot to to log out and just closed the browser instead. No/weak protection of of sensitive data if if password database is is compromised, A reads plain-text passwords of of users.
11 Vulnerability Cross-Site Scripting (XSS) The mechanism is similar to injection, only applied on the client side. A ensures a malicious script gets into the V's browser. The script can e.g steal the session, or perform redirect. Example Prevention Escape/validate both server-handled (Java) and client-handled (JavaScript) inputs Persistent a script code filled by A into a web form (e.g.discussion forum) gets into DB and V retrieves (and runs) it it to the browser through normal application operation. Non-persistent A prepares a malicious link action=' type=text name=login></br>password:<input type=text name=password><input type=submit value=login></form></br>'<hr/ and sends it it by to V. Clicking the link inserts the JavaScript into the V's page asking V to provide his credentials to the malicious site.
12 Insecure Direct Object References Vulnerability A is an authenticated user and changes a parameter to access an unauthorized object. Prevention in Java EE Check access by data-driven security Use per user/session indirect object references e.g. AccessReferenceMap of ESAPI Example A is an authenticated regular user being able to view/edit his/her user details being stored as a record with id=3 in the db table users. Instead (s)he retrieves another record (s)he is not authorized for: The request is processed as PreparedStatement s = c.preparestatement( SELECT * FROM users WHERE id=?,...); s.setstring(1,request.getparameter( id )); s.executequery();
13 Vulnerability Security Misconfiguration A accesses default accounts, unprotected files/directories, exception stack traces to get knowledge about the system. Examples Prevention in Java EE keep your SW stack (OS, DB, app server, libraries) up-to-date scans/audits/tests to check that no resource turned unprotected, stacktrace gets out on exception... Application uses older version of library (e.g. Spring) having a security issue. In newer version the issue is fixed, but the application is not updated to the newer version. Automatically installed admin console of application server and not removed providing access through default passwords Enabled directory listing allows A to download Java classes from the server, reverse-engineer them and find security flaws of your app. The application returns stack trace on exception, revealing its internals to A.
14 Vulnerability Sensitive Data Exposure A typically doesn't break the crypto. Instead, (s)he looks for plain-text keys, weakly encrypted keys, access open channels transmitting sensitive data, by means of of man-in-the-middle attacks, stealing keys, etc. Examples Prevention in Java EE Encryption of offsite backups, keeping encryption keys safe Discard unused sensitive data Hashing passwords with strong algorithms and salt, e.g. bcrypt, PBKDF2, or scrypt. A backup of encrypted health records is stored together with the encryption key. A can steal both. A site doesn't SSL for all authenticated resources. A monitors network traffic and observes V's session cookie. unsalted hashes how quickly can you crack this MD5 hash ee3a51c1fb3e6a7adcc7366d263899a3 (try e.g.
15 More on Crypto - Hashing Hashing One-way function to a fixed-length string Today e.g. SHA256, RipeMD, WHIRLPOOL, SHA3 (Unsalted) Hash (MD5, SHA) MD5( wpa2 ) = ee3a51c1fb3e6a7adcc7366d263899a3 Why not? Look at the previous slide generally brute forced in 4 weeks Salted hash (MD5, SHA) MD5( wpa2 + eb6d5c4b6a5d1b6cd1b62d1cb65cd9f5 ) = 4d4680be ed251057b839aba1c Useful when defending attacks on multiple passwords. Preventing from using rainbow tables. Generally brute forced in 3000 years. Why?
16 Missing Function Level Access Control Vulnerability A is is an authenticated user, but does should not have admin privileges. By simply changing the URL, A is is able to to access functions not allowed for him/her. Prevention in Java EE Proper role-based authorization Deny by default + Opt-In Allow Not enough to hide buttons, also the controllers/business layer must be protected. Examples Consider two pages under authentication: A is authorized for both pages but should be only for the first one as (s)he is not in the admin role.
17 Cross-Site Request Forgery Vulnerability A creates a forged HTTP request and tricks V into submitting it it (image tags, XSS) while authenticated. Prevention in Java EE Insert a unique token in a hidden field the attacker will not be able to guess it. Example A creates a forged request that transfers amount of money (amnt) to the account of A (dest) This request is embedded into an image tag on a page controled by A and visited by V who is tricked to click on it it <img src= amnt=1000&dest= />
18 Using Components with Known Vulnerabilities Vulnerability The software uses a framework library with known security issues (or one of of its dependencies). A scans the components used and attacks in in a known manner. Example Prevention in Java EE Use only components you wrote yourselves :-) Track versions of of all third-party libraries you are using (e.g. by Maven) and monitor their security issues on mailing lists, fora, etc. Use security wrappers around external components. Cit. from [3]: The following two vulnerable components were downloaded 22m times in 2011: Apache CXF Authentication Bypass By failing to provide an identity token, attackers could invoke any web service with full permission. (Apache CXF is a services framework, not to be confused with the Apache Application Server.) Spring Remote Code Execution Abuse of the Expression Language implementation in Spring allowed attackers to execute arbitrary code, effectively taking over the server.
19 Unvalidated Redirects and Forwards Vulnerability A tricks V to click a link performing unvalidated redirect/forward that might take V into a malicious site looking similar (phishing) Prevention in Java EE Avoid redirects/forwards if if not possible, don't involve user supplied parameters in calculating the redirect destination. if if not possible, check the supplied values before constructing URL. Example A makes V click on which passes url parameter to JSP page redirect.jsp that finally redirects to malicious.com.
20 Web Application Vulnerabilities Top 10 web application vulnerabilities for 2006 taken from [1] KBSS 2012
21 OWASP Mobile Top 10, 2014 Weak Server Side Controls Insecure Data Storage Insufficient Transport Layer Protection Unintended Data Leakage Poor authorization and authentication Broken Cryptography Client Side Injection Security Decisions Via Untrusted Inputs Improper Session Handling Lack of Binary Protections
22 Security for Java EE ESAPI JAAS Spring Security Apache Shiro
23 Spring Security formerly Acegi Security Secures Per architectural artifact: web requests and access at the URL method invocation (through AOP) Per authorization object type: operations data authentication and authorization
24 Spring Security Modules ACL domain object security by Access Control Lists CAS (Central Authentication Service) client Configuration Spring Security XML namespace Core Essential Spring Security Library LDAP Support for LDAP authentication OpenID Integration with OpenID (decentralized login) Tag Library JSP tags for view-level security Web Spring Security's filter-based web security support always For web applications
25 Securing Web Requests Prevent users access unauthorized URLs Force HTTPs for some URLs First step: declare a servlet filter in web.xml: Name of a Spring bean, that is automati cally created <filter> <filter name>springsecurityfilterchain</filter name> <filter class> org.springframework.web.filter.delegatingfilterproxy </filter class> </filter> DelegatingFilterProxy Servlet context delegates to Spring injected filter Spring context
26 Basic Security Setup Basic security setup in app security.xml: <http auto config="true"> <intercept url pattern="/**"access="role_regular"/> </http> These lines automatically setup a filter chain delegated from springsecurityfilterchain. a login page a HTTP basic authentication logout functionality session invalidation
27 Customizing Security Setup Defining custom login form: <http auto config="true"> Where is the login page <form login login processing url="/static/j_spring_security_check" login page="/login" authentication failure url="/login?login_error=t"/> <intercept url pattern="/**"access="role_regular"/> </http> Where to redirect on login failure Where the login page is submitted to authenticate users for a custom JSP login page: <spring:url var="authurl" value="/static/j_spring_security_check"/> <form method="post" action="${authurl}"> <input id="username_or_ " name= j_username type= text /> <input id="password" name="j_password" type="password" /> <input id="remember_me" name="_spring_security_remember_me" type="checkbox"/> <input name="commit" type="submit" value="signin"/> </form>
28 Intercepting Requests & HTTPS Intercept-url rules are evaluated top-bottom; it is possible to use various SpEL expressions in the access attribute (e.g. hasrole, hasanyrole, hasipaddress) <http auto config= true use expressions= true > <intercept url Allows SpEL pattern= /admin/** access= ROLE_ADM Forces HTTPS requires channel= https /> <intercept url pattern= /user/** access= ROLE_USR /> <intercept url pattern= /usermanagement/** access= hasanyrole('role_mgr','role_adm') /> <intercept url pattern= /** access= hasrole('role_adm') and hasipaddress(' ') /> </http>
29 Securing View-level elements JSP Spring Security ships with a small JSP tag library for access control: <%@ taglibprefix="security" uri=" JSF Integrated using Facelet tags, see html
30 Authentication In-memory JDBC LDAP OpenID CAS X.509 certificates JAAS
31 Securing Methods <global method security secured annotations= enabled jsr250 annotations= (compliant with EJB 3) ROLE_ADM, ROLE_MGR ) public void adduser(string id, String name) { }...
32 Ensuring Data Security <global method security pre post annotations= Authorizes method execution only for managers coming from given (hasrole('role_mgr') AND hasipaddress(' ') filterobject.owner.username == principal.username ) public List<Account> getaccountsforcurrentuser() { } Returns only those accounts in the return list that are owned by currently logged user
33 Resources [1] OWASP Top 10, cit [2] OWASP Top 10, cit [3] OWASP Top 10, cit [4] Pierre Hugues Charbonneau. Top 10 Causes of Java EE Enterprise Performance Problem, cit [5] Craig Walls. Spring in Action, Fourth edition. Manning 2014 [6] Robert Winch, Peter Mularien. Spring Security 3.1. Packt, 2012 [7] IBM X-Force, cit [8] IBM X-Force 2013 Mid-Year Trend and Risk Report,
Where every interaction matters.
Where every interaction matters. Peer 1 Vigilant Web Application Firewall Powered by Alert Logic The Open Web Application Security Project (OWASP) Top Ten Web Security Risks and Countermeasures White Paper
WEB SECURITY CONCERNS THAT WEB VULNERABILITY SCANNING CAN IDENTIFY
WEB SECURITY CONCERNS THAT WEB VULNERABILITY SCANNING CAN IDENTIFY www.alliancetechpartners.com WEB SECURITY CONCERNS THAT WEB VULNERABILITY SCANNING CAN IDENTIFY More than 70% of all websites have vulnerabilities
OWASP Top Ten Tools and Tactics
OWASP Top Ten Tools and Tactics Russ McRee Copyright 2012 HolisticInfoSec.org SANSFIRE 2012 10 JULY Welcome Manager, Security Analytics for Microsoft Online Services Security & Compliance Writer (toolsmith),
CSE598i - Web 2.0 Security OWASP Top 10: The Ten Most Critical Web Application Security Vulnerabilities
CSE598i - Web 2.0 Security OWASP Top 10: The Ten Most Critical Web Application Security Vulnerabilities Thomas Moyer Spring 2010 1 Web Applications What has changed with web applications? Traditional applications
Nuclear Regulatory Commission Computer Security Office Computer Security Standard
Nuclear Regulatory Commission Computer Security Office Computer Security Standard Office Instruction: Office Instruction Title: CSO-STD-1108 Web Application Standard Revision Number: 1.0 Effective Date:
Web applications. Web security: web basics. HTTP requests. URLs. GET request. Myrto Arapinis School of Informatics University of Edinburgh
Web applications Web security: web basics Myrto Arapinis School of Informatics University of Edinburgh HTTP March 19, 2015 Client Server Database (HTML, JavaScript) (PHP) (SQL) 1 / 24 2 / 24 URLs HTTP
Is Drupal secure? A high-level perspective on web vulnerabilities, Drupal s solutions, and how to maintain site security
Is Drupal secure? A high-level perspective on web vulnerabilities, Drupal s solutions, and how to maintain site security Presented 2009-05-29 by David Strauss Thinking Securely Security is a process, not
Sichere Software- Entwicklung für Java Entwickler
Sichere Software- Entwicklung für Java Entwickler Dominik Schadow Senior Consultant Trivadis GmbH 05/09/2012 BASEL BERN LAUSANNE ZÜRICH DÜSSELDORF FRANKFURT A.M. FREIBURG I.BR. HAMBURG MÜNCHEN STUTTGART
Top Ten Web Application Vulnerabilities in J2EE. Vincent Partington and Eelco Klaver Xebia
Top Ten Web Application Vulnerabilities in J2EE Vincent Partington and Eelco Klaver Xebia Introduction Open Web Application Security Project is an open project aimed at identifying and preventing causes
Web Application Security Assessment and Vulnerability Mitigation Tests
White paper BMC Remedy Action Request System 7.6.04 Web Application Security Assessment and Vulnerability Mitigation Tests January 2011 www.bmc.com Contacting BMC Software You can access the BMC Software
OWASP and OWASP Top 10 (2007 Update) OWASP. The OWASP Foundation. Dave Wichers. The OWASP Foundation. OWASP Conferences Chair dave.wichers@owasp.
and Top 10 (2007 Update) Dave Wichers The Foundation Conferences Chair [email protected] COO, Aspect Security [email protected] Copyright 2007 - The Foundation This work is available
ArcGIS Server Security Threats & Best Practices 2014. David Cordes Michael Young
ArcGIS Server Security Threats & Best Practices 2014 David Cordes Michael Young Agenda Introduction Threats Best practice - ArcGIS Server settings - Infrastructure settings - Processes Summary Introduction
How to break in. Tecniche avanzate di pen testing in ambito Web Application, Internal Network and Social Engineering
How to break in Tecniche avanzate di pen testing in ambito Web Application, Internal Network and Social Engineering Time Agenda Agenda Item 9:30 10:00 Introduction 10:00 10:45 Web Application Penetration
Magento Security and Vulnerabilities. Roman Stepanov
Magento Security and Vulnerabilities Roman Stepanov http://ice.eltrino.com/ Table of contents Introduction Open Web Application Security Project OWASP TOP 10 List Common issues in Magento A1 Injection
WHITE PAPER. FortiWeb and the OWASP Top 10 Mitigating the most dangerous application security threats
WHITE PAPER FortiWeb and the OWASP Top 10 PAGE 2 Introduction The Open Web Application Security project (OWASP) Top Ten provides a powerful awareness document for web application security. The OWASP Top
FINAL DoIT 11.03.2015 - v.4 PAYMENT CARD INDUSTRY DATA SECURITY STANDARDS APPLICATION DEVELOPMENT AND MAINTENANCE PROCEDURES
Purpose: The Department of Information Technology (DoIT) is committed to developing secure applications. DoIT s System Development Methodology (SDM) and Application Development requirements ensure that
Testing the OWASP Top 10 Security Issues
Testing the OWASP Top 10 Security Issues Andy Tinkham & Zach Bergman, Magenic Technologies Contact Us 1600 Utica Avenue South, Suite 800 St. Louis Park, MN 55416 1 (877)-277-1044 [email protected] Who Are
3. Broken Account and Session Management. 4. Cross-Site Scripting (XSS) Flaws. Web browsers execute code sent from websites. Account Management
What is an? s Ten Most Critical Web Application Security Vulnerabilities Anthony LAI, CISSP, CISA Chapter Leader (Hong Kong) [email protected] Open Web Application Security Project http://www.owasp.org
Web Application Penetration Testing
Web Application Penetration Testing 2010 2010 AT&T Intellectual Property. All rights reserved. AT&T and the AT&T logo are trademarks of AT&T Intellectual Property. Will Bechtel [email protected]
JVA-122. Secure Java Web Development
JVA-122. Secure Java Web Development Version 7.0 This comprehensive course shows experienced developers of Java EE applications how to secure those applications and to apply best practices with regard
Enterprise Application Security Workshop Series
Enterprise Application Security Workshop Series Phone 877-697-2434 fax 877-697-2434 www.thesagegrp.com Defending JAVA Applications (3 Days) In The Sage Group s Defending JAVA Applications workshop, participants
Members of the UK cyber security forum. Soteria Health Check. A Cyber Security Health Check for SAP systems
Soteria Health Check A Cyber Security Health Check for SAP systems Soteria Cyber Security are staffed by SAP certified consultants. We are CISSP qualified, and members of the UK Cyber Security Forum. Security
What is Web Security? Motivation
[email protected] http://www.brucker.ch/ Information Security ETH Zürich Zürich, Switzerland Information Security Fundamentals March 23, 2004 The End Users View The Server Providers View What is Web
Detecting Web Application Vulnerabilities Using Open Source Means. OWASP 3rd Free / Libre / Open Source Software (FLOSS) Conference 27/5/2008
Detecting Web Application Vulnerabilities Using Open Source Means OWASP 3rd Free / Libre / Open Source Software (FLOSS) Conference 27/5/2008 Kostas Papapanagiotou Committee Member OWASP Greek Chapter [email protected]
Spring Security 3. rpafktl Pen source. intruders with this easy to follow practical guide. Secure your web applications against malicious
Spring Security 3 Secure your web applications against malicious intruders with this easy to follow practical guide Peter Mularien rpafktl Pen source cfb II nv.iv I I community experience distilled
(WAPT) Web Application Penetration Testing
(WAPT) Web Application Penetration Testing Module 0: Introduction 1. Introduction to the course. 2. How to get most out of the course 3. Resources you will need for the course 4. What is WAPT? Module 1:
Sitefinity Security and Best Practices
Sitefinity Security and Best Practices Table of Contents Overview The Ten Most Critical Web Application Security Risks Injection Cross-Site-Scripting (XSS) Broken Authentication and Session Management
Secure development and the SDLC. Presented By Jerry Hoff @jerryhoff
Secure development and the SDLC Presented By Jerry Hoff @jerryhoff Agenda Part 1: The Big Picture Part 2: Web Attacks Part 3: Secure Development Part 4: Organizational Defense Part 1: The Big Picture Non
WHITE PAPER FORTIWEB WEB APPLICATION FIREWALL. Ensuring Compliance for PCI DSS 6.5 and 6.6
WHITE PAPER FORTIWEB WEB APPLICATION FIREWALL Ensuring Compliance for PCI DSS 6.5 and 6.6 CONTENTS 04 04 06 08 11 12 13 Overview Payment Card Industry Data Security Standard PCI Compliance for Web Applications
Out of the Fire - Adding Layers of Protection When Deploying Oracle EBS to the Internet
Out of the Fire - Adding Layers of Protection When Deploying Oracle EBS to the Internet March 8, 2012 Stephen Kost Chief Technology Officer Integrigy Corporation Phil Reimann Director of Business Development
Web application security
Web application security Sebastian Lopienski CERN Computer Security Team openlab and summer lectures 2010 (non-web question) Is this OK? int set_non_root_uid(int uid) { // making sure that uid is not 0
Web Application Guidelines
Web Application Guidelines Web applications have become one of the most important topics in the security field. This is for several reasons: It can be simple for anyone to create working code without security
Cloud Security:Threats & Mitgations
Cloud Security:Threats & Mitgations Vineet Mago Naresh Khalasi Vayana 1 What are we gonna talk about? What we need to know to get started Its your responsibility Threats and Remediations: Hacker v/s Developer
Criteria for web application security check. Version 2015.1
Criteria for web application security check Version 2015.1 i Content Introduction... iii ISC- P- 001 ISC- P- 001.1 ISC- P- 001.2 ISC- P- 001.3 ISC- P- 001.4 ISC- P- 001.5 ISC- P- 001.6 ISC- P- 001.7 ISC-
WHITE PAPER. FortiWeb Web Application Firewall Ensuring Compliance for PCI DSS 6.5 and 6.6
WHITE PAPER FortiWeb Web Application Firewall Ensuring Compliance for PCI DSS 6.5 and 6.6 Ensuring compliance for PCI DSS 6.5 and 6.6 Page 2 Overview Web applications and the elements surrounding them
Application Security Vulnerabilities, Mitigation, and Consequences
Application Security Vulnerabilities, Mitigation, and Consequences Sean Malone, CISSP, CCNA, CEH, CHFI [email protected] Institute of Internal Auditors April 10, 2012 Overview Getting Technical
FINAL DoIT 04.01.2013- v.8 APPLICATION SECURITY PROCEDURE
Purpose: This procedure identifies what is required to ensure the development of a secure application. Procedure: The five basic areas covered by this document include: Standards for Privacy and Security
Web Application Security
Web Application Security Security Mitigations Halito 26 juni 2014 Content Content... 2 Scope of this document... 3 OWASP Top 10... 4 A1 - Injection... 4... 4... 4 A2 - Broken Authentication and Session
The Top Web Application Attacks: Are you vulnerable?
QM07 The Top Web Application Attacks: Are you vulnerable? John Burroughs, CISSP Sr Security Architect, Watchfire Solutions [email protected] Agenda Current State of Web Application Security Understanding
Rational AppScan & Ounce Products
IBM Software Group Rational AppScan & Ounce Products Presenters Tony Sisson and Frank Sassano 2007 IBM Corporation IBM Software Group The Alarming Truth CheckFree warns 5 million customers after hack http://infosecurity.us/?p=5168
OWASP AND APPLICATION SECURITY
SECURING THE 3DEXPERIENCE PLATFORM OWASP AND APPLICATION SECURITY Milan Bruchter/Shutterstock.com WHITE PAPER EXECUTIVE SUMMARY As part of Dassault Systèmes efforts to counter threats of hacking, particularly
Introduction:... 1 Security in SDLC:... 2 Penetration Testing Methodology: Case Study... 3
Table of Contents Introduction:... 1 Security in SDLC:... 2 Penetration Testing Methodology: Case Study... 3 Information Gathering... 3 Vulnerability Testing... 7 OWASP TOP 10 Vulnerabilities:... 8 Injection
Essential IT Security Testing
Essential IT Security Testing Application Security Testing for System Testers By Andrew Muller Director of Ionize Who is this guy? IT Security consultant to the stars Member of OWASP Member of IT-012-04
Web Application Security
Web Application Security Prof. Sukumar Nandi Indian Institute of Technology Guwahati Agenda Web Application basics Web Network Security Web Host Security Web Application Security Best Practices Questions?
Overview of the Penetration Test Implementation and Service. Peter Kanters
Penetration Test Service @ ABN AMRO Overview of the Penetration Test Implementation and Service. Peter Kanters ABN AMRO / ISO April 2010 Contents 1. Introduction. 2. The history of Penetration Testing
Advanced Web Technology 10) XSS, CSRF and SQL Injection 2
Berner Fachhochschule, Technik und Informatik Advanced Web Technology 10) XSS, CSRF and SQL Injection Dr. E. Benoist Fall Semester 2010/2011 Table of Contents Cross Site Request Forgery - CSRF Presentation
Adobe Systems Incorporated
Adobe Connect 9.2 Page 1 of 8 Adobe Systems Incorporated Adobe Connect 9.2 Hosted Solution June 20 th 2014 Adobe Connect 9.2 Page 2 of 8 Table of Contents Engagement Overview... 3 About Connect 9.2...
Architectural Design Patterns. Design and Use Cases for OWASP. Wei Zhang & Marco Morana OWASP Cincinnati, U.S.A. http://www.owasp.
Architectural Design Patterns for SSO (Single Sign On) Design and Use Cases for Financial i Web Applications Wei Zhang & Marco Morana OWASP Cincinnati, U.S.A. OWASP Copyright The OWASP Foundation Permission
Web Application Security Guidelines for Hosting Dynamic Websites on NIC Servers
Web Application Security Guidelines for Hosting Dynamic Websites on NIC Servers The Website can be developed under Windows or Linux Platform. Windows Development should be use: ASP, ASP.NET 1.1/ 2.0, and
Six Essential Elements of Web Application Security. Cost Effective Strategies for Defending Your Business
6 Six Essential Elements of Web Application Security Cost Effective Strategies for Defending Your Business An Introduction to Defending Your Business Against Today s Most Common Cyber Attacks When web
Web Application Report
Web Application Report This report includes important security information about your Web Application. Security Report This report was created by IBM Rational AppScan 8.5.0.1 11/14/2012 8:52:13 AM 11/14/2012
Data Breaches and Web Servers: The Giant Sucking Sound
Data Breaches and Web Servers: The Giant Sucking Sound Guy Helmer CTO, Palisade Systems, Inc. Lecturer, Iowa State University @ghelmer Session ID: DAS-204 Session Classification: Intermediate The Giant
Web Application Vulnerability Testing with Nessus
The OWASP Foundation http://www.owasp.org Web Application Vulnerability Testing with Nessus Rïk A. Jones, CISSP [email protected] Rïk A. Jones Web developer since 1995 (16+ years) Involved with information
Still Aren't Doing. Frank Kim
Ten Things Web Developers Still Aren't Doing Frank Kim Think Security Consulting Background Frank Kim Consultant, Think Security Consulting Security in the SDLC SANS Author & Instructor DEV541 Secure Coding
A Server and Browser-Transparent CSRF Defense for Web 2.0 Applications. Slides by Connor Schnaith
A Server and Browser-Transparent CSRF Defense for Web 2.0 Applications Slides by Connor Schnaith Cross-Site Request Forgery One-click attack, session riding Recorded since 2001 Fourth out of top 25 most
Securing your Web application
Securing your Web application TI1506: Web and Database Technology Claudia Hauff! Lecture 8 [Web], 2014/15 1 Course overview [Web] 1. http: the language of Web communication 2. Web (app) design & HTML5
Project 2: Web Security Pitfalls
EECS 388 September 19, 2014 Intro to Computer Security Project 2: Web Security Pitfalls Project 2: Web Security Pitfalls This project is due on Thursday, October 9 at 6 p.m. and counts for 8% of your course
Vulnerability Scanner
A Project Report On Vulnerability Scanner Submitted By Mr. Shubham Jain Mr. Vipul Baid Ms. Neha Jain Mr. Mausam Jain Under Guidance of Prof. S.A.Paliwal Walchand Institute Of Technology, Solapur. Dept.
Thick Client Application Security
Thick Client Application Security Arindam Mandal ([email protected]) (http://www.paladion.net) January 2005 This paper discusses the critical vulnerabilities and corresponding risks in a two
Web Application Security. Vulnerabilities, Weakness and Countermeasures. Massimo Cotelli CISSP. Secure
Vulnerabilities, Weakness and Countermeasures Massimo Cotelli CISSP Secure : Goal of This Talk Security awareness purpose Know the Web Application vulnerabilities Understand the impacts and consequences
Java Web Security Antipatterns
Java Web Security Antipatterns JavaOne 2015 Dominik Schadow bridgingit Failed with nothing but the best intentions Architect Implement Maintain Architect Skipping threat modeling Software that is secure
Web Application Security
Web Application Security John Zaharopoulos ITS - Security 10/9/2012 1 Web App Security Trends Web 2.0 Dynamic Webpages Growth of Ajax / Client side Javascript Hardening of OSes Secure by default Auto-patching
Check list for web developers
Check list for web developers Requirement Yes No Remarks 1. Input Validation 1.1) Have you done input validation for all the user inputs using white listing and/or sanitization? 1.2) Does the input validation
Implementation of Web Application Security Solution using Open Source Gaurav Gupta 1, B. K. Murthy 2, P. N. Barwal 3
Implementation of Web Application Security Solution using Open Source Gaurav Gupta 1, B. K. Murthy 2, P. N. Barwal 3 ABSTRACT 1 Project Engineer, CDACC-56/1, Sector-62, Noida, 2 Executive Director, CDACC-56/1,
Spring Security 3. http://www.springsource.com/download/community?project=spring%20security
Spring Security 3 1. Introduction http://www.springsource.com/download/community?project=spring%20security 2. Security Namespace Configuration Web.xml configuration: springsecurityfilterchain
Security features of ZK Framework
1 Security features of ZK Framework This document provides a brief overview of security concerns related to JavaScript powered enterprise web application in general and how ZK built-in features secures
Ruby on Rails Secure Coding Recommendations
Introduction Altius IT s list of Ruby on Rails Secure Coding Recommendations is based upon security best practices. This list may not be complete and Altius IT recommends this list be augmented with additional
Hack Proof Your Webapps
Hack Proof Your Webapps About ERM About the speaker Web Application Security Expert Enterprise Risk Management, Inc. Background Web Development and System Administration Florida International University
Passing PCI Compliance How to Address the Application Security Mandates
Passing PCI Compliance How to Address the Application Security Mandates The Payment Card Industry Data Security Standards includes several requirements that mandate security at the application layer. These
An Introduction to Application Security in J2EE Environments
An Introduction to Application Security in J2EE Environments Dan Cornell Denim Group, Ltd. www.denimgroup.com Overview Background What is Application Security and Why is It Important? Specific Reference
National Information Security Group The Top Web Application Hack Attacks. Danny Allan Director, Security Research
National Information Security Group The Top Web Application Hack Attacks Danny Allan Director, Security Research 1 Agenda Web Application Security Background What are the Top 10 Web Application Attacks?
Creating Stronger, Safer, Web Facing Code. JPL IT Security Mary Rivera June 17, 2011
Creating Stronger, Safer, Web Facing Code JPL IT Security Mary Rivera June 17, 2011 Agenda Evolving Threats Operating System Application User Generated Content JPL s Application Security Program Securing
elearning for Secure Application Development
elearning for Secure Application Development Curriculum Application Security Awareness Series 1-2 Secure Software Development Series 2-8 Secure Architectures and Threat Modeling Series 9 Application Security
Kenna Platform Security. A technical overview of the comprehensive security measures Kenna uses to protect your data
Kenna Platform Security A technical overview of the comprehensive security measures Kenna uses to protect your data V2.0, JULY 2015 Multiple Layers of Protection Overview Password Salted-Hash Thank you
Web Application Firewall on SonicWALL SSL VPN
Web Application Firewall on SonicWALL SSL VPN Document Scope This document describes how to configure and use the Web Application Firewall feature in SonicWALL SSL VPN 5.0. This document contains the following
Cracking the Perimeter via Web Application Hacking. Zach Grace, CISSP, CEH [email protected] January 17, 2014 2014 Mega Conference
Cracking the Perimeter via Web Application Hacking Zach Grace, CISSP, CEH [email protected] January 17, 2014 2014 Mega Conference About 403 Labs 403 Labs is a full-service information security and compliance
A (re)introduction to Spring Security
A (re)introduction to Spring Security Agenda Before Spring Security: Acegi security Introducing Spring Security View layer security What s coming in Spring Security 3 Before Spring Security There was...
Integrating Security Testing into Quality Control
Integrating Security Testing into Quality Control Executive Summary At a time when 82% of all application vulnerabilities are found in web applications 1, CIOs are looking for traditional and non-traditional
Hardening Moodle. Concept and Realization of a Security Component in Moodle. a project by
Concept and Realization of a Security Component in Moodle a project by Andreas Gigli, Lars-Olof Krause, Björn Ludwig, Kai Neumann, Lars Schmidt and Melanie Schwenk 2 Agenda Plugin Installation in Moodle
External Vulnerability Assessment. -Technical Summary- ABC ORGANIZATION
External Vulnerability Assessment -Technical Summary- Prepared for: ABC ORGANIZATI On March 9, 2008 Prepared by: AOS Security Solutions 1 of 13 Table of Contents Executive Summary... 3 Discovered Security
Barracuda Web Site Firewall Ensures PCI DSS Compliance
Barracuda Web Site Firewall Ensures PCI DSS Compliance E-commerce sales are estimated to reach $259.1 billion in 2007, up from the $219.9 billion earned in 2006, according to The State of Retailing Online
Security Code Review- Identifying Web Vulnerabilities
Security Code Review- Identifying Web Vulnerabilities Kiran Maraju, CISSP, CEH, ITIL, SCJP Email: [email protected] 1 1.1.1 Abstract Security Code Review- Identifying Web Vulnerabilities This paper
SQuAD: Application Security Testing
SQuAD: Application Security Testing Terry Morreale Ben Whaley June 8, 2010 Why talk about security? There has been exponential growth of networked digital systems in the past 15 years The great things
Implementation of Web Application Firewall
Implementation of Web Application Firewall OuTian 1 Introduction Abstract Web 層 應 用 程 式 之 攻 擊 日 趨 嚴 重, 而 國 內 多 數 企 業 仍 不 知 該 如 何 以 資 安 設 備 阻 擋, 仍 在 採 購 傳 統 的 Firewall/IPS,
Bug Report. Date: March 19, 2011 Reporter: Chris Jarabek ([email protected])
Bug Report Date: March 19, 2011 Reporter: Chris Jarabek ([email protected]) Software: Kimai Version: 0.9.1.1205 Website: http://www.kimai.org Description: Kimai is a web based time-tracking application.
OWASP TOP 10 ILIA ALSHANETSKY @ILIAA HTTPS://JOIND.IN/15741
OWASP TOP 10 ILIA ALSHANETSKY @ILIAA HTTPS://JOIND.IN/15741 ME, MYSELF & I PHP Core Developer Author of Guide to PHP Security Security Aficionado THE CONUNDRUM USABILITY SECURITY YOU CAN HAVE ONE ;-) OPEN
Web Security - Hardening estudy
Web Security - Hardening estudy Matthias Hecker, Andreas Schmidt, Philipp Promeuschel, Ivo Senner, Andre Rein, Bartosz Boron, Christian Ketter, Christian Thomas Weber Fachhochschule Giessen-Friedberg September
ASP.NET MVC Secure Coding 4-Day hands on Course. Course Syllabus
ASP.NET MVC Secure Coding 4-Day hands on Course Course Syllabus Course description ASP.NET MVC Secure Coding 4-Day hands on Course Secure programming is the best defense against hackers. This multilayered
How To Fix A Web Application Security Vulnerability
Proposal of Improving Web Application Security in Context of Latest Hacking Trends RADEK VALA, ROMAN JASEK Department of Informatics and Artificial Intelligence Tomas Bata University in Zlin, Faculty of
Web-Application Security
Web-Application Security Kristian Beilke Arbeitsgruppe Sichere Identität Fachbereich Mathematik und Informatik Freie Universität Berlin 29. Juni 2011 Overview Web Applications SQL Injection XSS Bad Practice
A Survey on Security and Vulnerabilities of Web Application
A Survey on Security and Vulnerabilities of Web Application Gopal R. Chaudhari, Prof. Madhav V. Vaidya Department of Information Technology, SGGS IE & T, Nanded, Maharashtra, India-431606 Abstract Web
Web Application Security and the OWASP Top 10. Web Application Security and the OWASP Top 10
Web Application Security and the OWASP Top 10 1 Sapient Corporation 2011 Web Application Security and the OWASP Top 10 This paper describes the most common vulnerabilities of web applications, as outlined
Detecting and Defending Against Security Vulnerabilities for Web 2.0 Applications
Detecting and Defending Against Security Vulnerabilities for Web 2.0 Applications Ray Lai, Intuit TS-5358 Share experience how to detect and defend security vulnerabilities in Web 2.0 applications using
AppDefend Application Firewall Overview
AppDefend Application Firewall Overview May 2014 Stephen Kost Chief Technology Officer Integrigy Corporation Agenda Web Application Security AppDefend Overview Q&A 1 2 3 4 5 Oracle EBS Web Architecture
Secure Web Development Teaching Modules 1. Threat Assessment
Secure Web Development Teaching Modules 1 Threat Assessment Contents 1 Concepts... 1 1.1 Software Assurance Maturity Model... 1 1.2 Security practices for construction... 3 1.3 Web application security
Network Security Exercise #8
Computer and Communication Systems Lehrstuhl für Technische Informatik Network Security Exercise #8 Falko Dressler and Christoph Sommer Computer and Communication Systems Institute of Computer Science,
