Hardening Joomla 1. HARDENING PHP. 1.1 Installing Suhosin. 1.2 Disable Remote Includes. 1.3 Disable Unneeded Functions & Classes
|
|
|
- Kenneth Stone
- 10 years ago
- Views:
Transcription
1 1. HARDENING PHP Hardening Joomla 1.1 Installing Suhosin Suhosin is a PHP Hardening patch which aims to protect the PHP engine and runtime environment from common exploits, such as buffer overflows in PHP Core, or remote code execution within scripts, and allowing configuration of ingress filters, logging and alerts. To install Suhosin, follow the tutorial from the projects homepage here. Suhosin currently does not work with the latest branch (5.4) of PHP, due to certain functionality being removed from PHP 5.4 that Suhosin expects. Therefore, to use Suhosin, an earlier version of PHP must be used. 1.2 Disable Remote Includes allow_url_include (disabled by default) and allow_url_fopen (enabled by default) both allow the inclusion of remote PHP files based on a URL scheme or data stream. Disabling allow_url_include will stop any URLs being passed to the require or include functions, while still allowing fopen wrappers to open remote files. If opening remote files such as media is not required programmatically within the source code, then allow_url_fopen should also be disabled. 1.3 Disable Unneeded Functions & Classes Unneeded functions and classes, such as eval() or system(), which are not required within the Joomla website should be disabled from the php.ini file. Some high-risk functions include show_source, system, shell_exec, passthru, exec, phpinfo, proc_open, popen, eval, and highlight_file. 1.4Configure open_basedir Restriction of the open_basedir setting restricts PHP to opening files within a certain directory tree. Any attempt to open a file outside of this tree is denied by PHP. 1.5 display_errors PHP errors can disclose sensitive information such as file paths which could help a malicious user in attacking a website. display_errors, which is configured to true by default, should be set to false or, as of PHP 5.2.4, may instead be set to send error messages to the Standard Error output stream (stderr). 1.6 file_uploads Allowing the upload of arbitrary files through PHP could allow a malicious user to upload executable code, or files that can be used to further exploit an otherwise minor security hole such as local file inclusion. If possible the file_uploads configuration setting should be disabled, however this will stop website administrators, editors and other users from uploading images through the Joomla administration and new article panels. Any uploads must happen externally to the PHP runtime environment, for example, over FTP. 1.7 PHP Auditor The PHP Auditor, available here, will scan a PHP install for compliance with recommended security settings. These security settings are configurable via an XML file so that the recommended settings can be tweaked to a specific environment. This report should be checked periodically to ensure configuration options have not been accidentally reverted.
2 2. SET UP PERMISSIONS Proper configuration of file system permissions on Joomla files is essential to mitigate the risk of security flaws in the Joomla core or additional extensions used by the website being secured. Generally, files should be set to `chmod 644` while directories should be set to `chmod 755`. Additional folders that Joomla may require write access to should be configured individually. To configure permissions on all files and folders with the above permissions, run the following two commands from the shell, and from your root Joomla installation folder. 3. LIMIT ADMINISTRATION PANEL ACCESS Access to the Joomla administrator panel should be configured using an.htaccess file to limit access to a single IP or small subnet. This means that even in the event of an administrators session being stolen by a malicious user, for example through a cross-site scripting attack, the malicious user would not be able to perform any administration-level tasks on the Joomla website, such as posting new stories or modifying the source code via the theme editor. In the event that an administrator s IP does change, or they need to make an emergency change to the website from a different location, the.htaccess file may be modified manually by logging into the server using ssh or ftp. 4. DISABLE DIRECTORY BROWSING Each directory should have its file listing disabled, or a blank index page left in order to stop people viewing all files in a directory. This will protect any out of date files, configuration files or file backups that may have been forgotten to be removed from the server. These sensitive files could reveal internal configuration information, or perhaps even stored passwords. 5. CHANGE THE JOOMLA TABLE PREFIX find. type d exec chmod 755 {} \; find. type f exec chmod 644 {} \; The themes folder especially should be protected against write access by Joomla, as using the in-built Themes editor would allow a malicious user who has managed to gain control of the administrators session to insert a backdoor onto the website, allowing them to gain system access through commands such as exec(). Changing the Joomla table prefix protects the server from mass SQL Injection, or other database attack threats. This will help protect the website from automated exploitation in case of a new Joomla exploit being discovered, and will also reduce the speed at which a manual attacker can exploit the website. 6. INSTALL SECURITY-RELATED EXTENSIONS Many security-related Joomla extensions exist, from Intrusion Detection Systems to version trackers. All of these extensions are available via the Joomla Extension Directory. PHPIDS is a native PHP Web Application Firewall which runs independently of Joomla, designed for identifying potential exploit strings as they re sent inbound from the malicious attacker to your web server. PHPIDS can be configured to respond to different threats based on a score, ranging from logging a message for the website administrator to ending the malicious user s session.
3 6. INSTALL SECURITY-RELATED EXTENSIONS PHPIDS is designed to be lightweight and only runs its filters on suspicious requests, allowing through any request comprised of a-z, 0-9, or or _ characters, without passing these request parameters through the filters. To incorporate PHPIDS into a Joomla website, please see Appendix C. Joomla! Anti-Hacker Security Suite is a non-free Web Application Firewall with protection against attacks in a similar manner to PHPIDS. It also contains an Antivirus to scan files of a Joomla installation for any malware or viruses that malicious users may place on the server, either via legitimate file upload functionality available on the website, or by compromising the web server. Admin Tools Core helps lock down permissions on a Joomla installation by adding configurable Access Control Lists, rewriting of URLs from HTTP to HTTPS and changing Joomla PHP file permissions on the server. 7. KEEP ALL SOFTWARES AND EXTENSIONS UP-TO-DATE Joomla can automatically update itself if configured to do so. Running out of date software can lead to a major security breach as, as soon as a patch for an exploit is released, the exploit can be deduced from the patch in due to Joomla s open source nature. 8. INSTALL AN SSL CERTIFICATE Use of an unencrypted HTTP session could enable a malicious attacker, located on the same network as an administrator user, to hijack the administrators logged in session and fraudulently represent themselves as the websites administrator. They may also modify system files through the theme editor, affording them full access to the server that the blog is hosted on. 9. REMOVE THE JOOMLA VERSION NUMBER Automated scanners or malicious users manually attacking a Joomla installation may use the version number displayed by Joomla to determine if the installation is vulnerable to exploits. Removing the version number from display on the webpage will stop some basic scanners from determining which version of Joomla is running. 10. USE A.htaccess FILE OR SERVER CONFIGURATION FILE A.htaccess file is a file read by a HTTP server, such as apache, containing server configuration and access control rules on a per-directory basis. Proper configuration of a.htaccess file can block malicious users from downloading sensitive files, ban offending IP addresses from loading the website, and redirect HTTP requests to updated URLs. Refer here for htaccess or configuration file options. It is preferable to configure the server via a centralised configuration file, such as httpd.conf, as using.htaccess files can cause performance overheads. Any configuration options available via a.htaccess file are also available by modifying the global server configuration file.
4 11. CONTINUED MAINTENANCE All Joomla extensions should be checked regularly for issues or updates. Any extensions with unresolved security or stability issues should be revaluated for inclusion, and any available updates applied. Also, any extensions which are no longer in use should be disabled or, if possible, removed entirely. Regular requirement auditing should take place to identify these extensions. Core Joomla updates should be applied as soon as possible after their release and evaluation for compatibility with the existing websites. The server hosting the Joomla installation, and other infrastructure, should be patched and kept up-to-date in line with existing policies. 12. APPENDIX A - DISABLING PHP OPTIONS PHP configuration options, such as allow_url_fopen, may be enabled or disabled from within the php. ini configuration file. To modify these configuration settings, open php.ini, find the string in question (i.e., allow_url_fopen) and change the number on the line to 1 (enabled) or 0 (disabled). Other configuration options, such as disable_functions or open_basedir, are strings stored within php.ini. The PHP Manual details their syntax and available options. 13. APPENDIX B - CHECKLIST Title Yes No 1.1 Install Suhosin SERVER 1.2 Disable Remote Includes SERVER 1.3 Disable Unneeded Functions & Classes SERVER 1.4 Configure open_basedir SERVER 1.5 Suppress display_errors SERVER 1.6 Disable file_uploads SERVER 1.7 Execute PHP Auditor SITE 2 Configure Permissions SERVER 3 Limit Administrator Panel Access BOTH 4 Disable Directory Browsing SERVER 5 Change The Joomla Database Table Prefix SITE 6 Install Security Related Extensions SITE 7 Keep All Software and Extensions Up-To-Date SITE 8 Install An SSL Certificate SERVER 9 Remove The Joomla Version Number SITE 10 Use A.htaccess File Or Server Configuration File BOTH
5 13. APPENDIX C - LIST OF POTENTIALLY EXPLOITABLE PHP FUNCTIONS Based on the list of exploitable or abusable PHP functions made available here. Please see the PHP manual for more information on each below function in order to determine which should be disabled on your server. Command Execution Exec passthru system shell_exec / ` ` popen proc_open pcntl_exec PHP Code Evaluation eval assert preg_replace create_function dl include[_once] require[_once] Information Disclosure phpinfo posix_mkfifo posix_getlogin posix_ttyname getenv get_current_user proc_get_status get_cfg_var disk_free_space disk_total_space diskfreespace getcwd getlastmod getmygid getmyinode getmypid getmyuid extension_loaded Returns last line of command output Returns command output to browser Returns command output to browser Returns command output to browser Opens read/write pipe to a process Opens read/write pipe to a process Executes a command evaluates PHP code see eval() Requires the e modifier to be present Creates function with user supplied code Loads an extension library May include local or remote files May include local or remote files Displays sensitive configuration settings Returns environment variables Returns the owner of the PHP script Get information about a process Displays sensitive configuration settings Displays the current path of a PHP script Displays the last modification time Displays if an extension is loaded
6 14. APPENDIX D - INCORPORATING PHPIDS WITH JOOMLA PHPIDS should be included within the index.php file for execution before any other PHP code. To do this, add an include or require to a customised configuration file as detailed within the docs/example.php file within the PHPIDS source code zip file. Add one of the following lines to the beginning of index.php: include example.php ; or require example.php ;
Joomla Security - Introduction
Joomla Security - Introduction Joomla Security At The Webhost Modern web servers come in all shapes, sizes and hues, hence web server based security issues just cannot be resolved with simple, one-size-fits-all
Online Vulnerability Scanner Quick Start Guide
Online Vulnerability Scanner Quick Start Guide Information in this document is subject to change without notice. Companies, names, and data used in examples herein are fictitious unless otherwise noted.
JOOMLA SECURITY. ireland website design. by Oliver Hummel. ADDRESS Unit 12D, Six Cross Roads Business Park, Waterford City
JOOMLA SECURITY by Oliver Hummel ADDRESS Unit 12D, Six Cross Roads Business Park, Waterford City CONTACT Nicholas Butler 051-393524 089-4278112 [email protected] Contents Introduction 3 Installation
WordPress Security Scan Configuration
WordPress Security Scan Configuration To configure the - WordPress Security Scan - plugin in your WordPress driven Blog, login to WordPress as administrator, by simply entering the url_of_your_website/wp-admin
Integrated Network Vulnerability Scanning & Penetration Testing SAINTcorporation.com
SAINT Integrated Network Vulnerability Scanning and Penetration Testing www.saintcorporation.com Introduction While network vulnerability scanning is an important tool in proactive network security, penetration
modules 1 & 2. Section: Information Security Effective: December 2005 Standard: Server Security Standard Revised: Policy Ref:
SERVER SECURITY STANDARD Security Standards are mandatory security rules applicable to the defined scope with respect to the subject. Overview Scope Purpose Instructions Improperly configured systems,
External Vulnerability Assessment. -Technical Summary- ABC ORGANIZATION
External Vulnerability Assessment -Technical Summary- Prepared for: ABC ORGANIZATI On March 9, 2008 Prepared by: AOS Security Solutions 1 of 13 Table of Contents Executive Summary... 3 Discovered Security
A Decision Maker s Guide to Securing an IT Infrastructure
A Decision Maker s Guide to Securing an IT Infrastructure A Rackspace White Paper Spring 2010 Summary With so many malicious attacks taking place now, securing an IT infrastructure is vital. The purpose
Web Application Security
Web Application Security Security Mitigations Halito 26 juni 2014 Content Content... 2 Scope of this document... 3 OWASP Top 10... 4 A1 - Injection... 4... 4... 4 A2 - Broken Authentication and Session
ArcGIS Server Security Threats & Best Practices 2014. David Cordes Michael Young
ArcGIS Server Security Threats & Best Practices 2014 David Cordes Michael Young Agenda Introduction Threats Best practice - ArcGIS Server settings - Infrastructure settings - Processes Summary Introduction
Content Management System
Content Management System XT-CMS INSTALL GUIDE Requirements The cms runs on PHP so the host/server it is intended to be run on should ideally be linux based with PHP 4.3 or above. A fresh install requires
Ruby on Rails Secure Coding Recommendations
Introduction Altius IT s list of Ruby on Rails Secure Coding Recommendations is based upon security best practices. This list may not be complete and Altius IT recommends this list be augmented with additional
Threat Modelling for Web Application Deployment. Ivan Ristic [email protected] (Thinking Stone)
Threat Modelling for Web Application Deployment Ivan Ristic [email protected] (Thinking Stone) Talk Overview 1. Introducing Threat Modelling 2. Real-world Example 3. Questions Who Am I? Developer /
CS 356 Lecture 25 and 26 Operating System Security. Spring 2013
CS 356 Lecture 25 and 26 Operating System Security Spring 2013 Review Chapter 1: Basic Concepts and Terminology Chapter 2: Basic Cryptographic Tools Chapter 3 User Authentication Chapter 4 Access Control
Web application security
Web application security Sebastian Lopienski CERN Computer Security Team openlab and summer lectures 2010 (non-web question) Is this OK? int set_non_root_uid(int uid) { // making sure that uid is not 0
What is Web Security? Motivation
[email protected] http://www.brucker.ch/ Information Security ETH Zürich Zürich, Switzerland Information Security Fundamentals March 23, 2004 The End Users View The Server Providers View What is Web
ABC LTD EXTERNAL WEBSITE AND INFRASTRUCTURE IT HEALTH CHECK (ITHC) / PENETRATION TEST
ABC LTD EXTERNAL WEBSITE AND INFRASTRUCTURE IT HEALTH CHECK (ITHC) / PENETRATION TEST Performed Between Testing start date and end date By SSL247 Limited SSL247 Limited 63, Lisson Street Marylebone London
3. Broken Account and Session Management. 4. Cross-Site Scripting (XSS) Flaws. Web browsers execute code sent from websites. Account Management
What is an? s Ten Most Critical Web Application Security Vulnerabilities Anthony LAI, CISSP, CISA Chapter Leader (Hong Kong) [email protected] Open Web Application Security Project http://www.owasp.org
Hacking the WordpressEcosystem
Hacking the WordpressEcosystem About Me Dan Catalin VASILE Information Security Consultant Researcher / Writer / Presenter OWASP Romania Board Member Online presence http://www.pentest.ro [email protected]/
Web Plus Security Features and Recommendations
Web Plus Security Features and Recommendations (Based on Web Plus Version 3.x) Centers for Disease Control and Prevention National Center for Chronic Disease Prevention and Health Promotion Division of
Penetration Testing Report Client: Business Solutions June 15 th 2015
Penetration Testing Report Client: Business Solutions June 15 th 2015 Acumen Innovations 80 S.W 8 th St Suite 2000 Miami, FL 33130 United States of America Tel: 1-888-995-7803 Email: [email protected]
GFI White Paper PCI-DSS compliance and GFI Software products
White Paper PCI-DSS compliance and Software products The Payment Card Industry Data Standard () compliance is a set of specific security standards developed by the payment brands* to help promote the adoption
Manipulating Microsoft SQL Server Using SQL Injection
Manipulating Microsoft SQL Server Using SQL Injection Author: Cesar Cerrudo ([email protected]) APPLICATION SECURITY, INC. WEB: E-MAIL: [email protected] TEL: 1-866-9APPSEC 1-212-947-8787 INTRODUCTION
ClickCartPro Software Installation README
ClickCartPro Software Installation README This document outlines installation instructions for ClickCartPro Software. SOFTWARE REQUIREMENTS The following requirements must be met by the webserver on which
Using Nessus In Web Application Vulnerability Assessments
Using Nessus In Web Application Vulnerability Assessments Paul Asadoorian Product Evangelist Tenable Network Security [email protected] About Tenable Nessus vulnerability scanner, ProfessionalFeed
ASL IT SECURITY BEGINNERS WEB HACKING AND EXPLOITATION
ASL IT SECURITY BEGINNERS WEB HACKING AND EXPLOITATION V 2.0 A S L I T S e c u r i t y P v t L t d. Page 1 Overview: Learn the various attacks like sql injections, cross site scripting, command execution
FRIENDS OF SEARCH HARDENING WORDPRESS VARIOUS TWEAKS FOR BETTER WP SECURITY
FRIENDS OF SEARCH HARDENING WORDPRESS VARIOUS TWEAKS FOR BETTER WP SECURITY WHO HAD (TO FIX) A HACKED WORDPRESS? bg.vu/fos14 WHAT REALLY MATTERS: TOP 3! IF YOU HAVE 5 MINS TO SPARE, JUST DO THESE 92% (of
Creating Stronger, Safer, Web Facing Code. JPL IT Security Mary Rivera June 17, 2011
Creating Stronger, Safer, Web Facing Code JPL IT Security Mary Rivera June 17, 2011 Agenda Evolving Threats Operating System Application User Generated Content JPL s Application Security Program Securing
Web Vulnerability Assessment Report
Web Vulnerability Assessment Report Target Scanned: www.daflavan.com Report Generated: Mon May 5 14:43:24 2014 Identified Vulnerabilities: 39 Threat Level: High Screenshot of www.daflavan.com HomePage
Web Application Report
Web Application Report This report includes important security information about your Web Application. Security Report This report was created by IBM Rational AppScan 8.5.0.1 11/14/2012 8:52:13 AM 11/14/2012
Server Security. Contents. Is Rumpus Secure? 2. Use Care When Creating User Accounts 2. Managing Passwords 3. Watch Out For Aliases 4
Contents Is Rumpus Secure? 2 Use Care When Creating User Accounts 2 Managing Passwords 3 Watch Out For Aliases 4 Deploy A Firewall 5 Minimize Running Applications And Processes 5 Manage Physical Access
The purpose of this report is to educate our prospective clients about capabilities of Hackers Locked.
This sample report is published with prior consent of our client in view of the fact that the current release of this web application is three major releases ahead in its life cycle. Issues pointed out
74% 96 Action Items. Compliance
Compliance Report PCI DSS 2.0 Generated by Check Point Compliance Blade, on July 02, 2013 11:12 AM 1 74% Compliance 96 Action Items Upcoming 0 items About PCI DSS 2.0 PCI-DSS is a legal obligation mandated
Host/Platform Security. Module 11
Host/Platform Security Module 11 Why is Host/Platform Security Necessary? Firewalls are not enough All access paths to host may not be firewall protected Permitted traffic may be malicious Outbound traffic
Black Box Penetration Testing For GPEN.KM V1.0 Month dd "#$!%&'(#)*)&'+!,!-./0!.-12!1.03!0045!.567!5895!.467!:;83!-/;0!383;!
Sample Penetration Testing Report Black Box Penetration Testing For GPEN.KM V1.0 Month dd "#$%&'#)*)&'+,-./0.-121.030045.5675895.467:;83-/;0383; th, yyyy A&0#0+4*M:+:#&*#0%+C:,#0+4N:
Nixu SNS Security White Paper May 2007 Version 1.2
1 Nixu SNS Security White Paper May 2007 Version 1.2 Nixu Software Limited Nixu Group 2 Contents 1 Security Design Principles... 3 1.1 Defense in Depth... 4 1.2 Principle of Least Privilege... 4 1.3 Principle
Breaking Web Applications in Shared Hosting Environments. Nick Nikiforakis Katholieke Universiteit Leuven
Breaking Web Applications in Shared Hosting Environments Nick Nikiforakis Katholieke Universiteit Leuven Who am I? Nick Nikiforakis PhD student at KULeuven Security Low-level Web applications http://www.securitee.org
Check list for web developers
Check list for web developers Requirement Yes No Remarks 1. Input Validation 1.1) Have you done input validation for all the user inputs using white listing and/or sanitization? 1.2) Does the input validation
1. Introduction. 2. Web Application. 3. Components. 4. Common Vulnerabilities. 5. Improving security in Web applications
1. Introduction 2. Web Application 3. Components 4. Common Vulnerabilities 5. Improving security in Web applications 2 What does World Wide Web security mean? Webmasters=> confidence that their site won
SECURITY TRENDS & VULNERABILITIES REVIEW 2015
SECURITY TRENDS & VULNERABILITIES REVIEW 2015 Contents 1. Introduction...3 2. Executive summary...4 3. Inputs...6 4. Statistics as of 2014. Comparative study of results obtained in 2013...7 4.1. Overall
Chapter 4 Application, Data and Host Security
Chapter 4 Application, Data and Host Security 4.1 Application Security Chapter 4 Application Security Concepts Concepts include fuzzing, secure coding, cross-site scripting prevention, crosssite request
The Web Pro Miami, Inc. 615 Santander Ave, Unit C Coral Gables, FL 33134 6505. T: 786.273.7774 [email protected] www.thewebpro.
615 Santander Ave, Unit C Coral Gables, FL 33134 6505 T: 786.273.7774 [email protected] www.thewebpro.com for v.1.06 and above Web Pro Manager is an open source website management platform that is easy
Nikolay Zaynelov Annual LUG-БГ Meeting 2015. nikolay.zaynelov.com [email protected]
Nikolay Zaynelov Annual LUG-БГ Meeting 2015 nikolay.zaynelov.com [email protected] Introduction What is WordPress WordPress is a free and open source content management system (CMS). It is the most
XCloner Official User Manual
XCloner Official User Manual Copyright 2010 XCloner.com www.xcloner.com All rights reserved. xcloner.com is not affiliated with or endorsed by Open Source Matters or the Joomla! Project. What is XCloner?
WHITE PAPER. FortiWeb and the OWASP Top 10 Mitigating the most dangerous application security threats
WHITE PAPER FortiWeb and the OWASP Top 10 PAGE 2 Introduction The Open Web Application Security project (OWASP) Top Ten provides a powerful awareness document for web application security. The OWASP Top
ANNEXURE-1 TO THE TENDER ENQUIRY NO.: DPS/AMPU/MIC/1896. Network Security Software Nessus- Technical Details
Sub: Supply, Installation, setup and testing of Tenable Network Security Nessus vulnerability scanner professional version 6 or latest for scanning the LAN, VLAN, VPN and IPs with 3 years License/Subscription
Web Application Vulnerability Testing with Nessus
The OWASP Foundation http://www.owasp.org Web Application Vulnerability Testing with Nessus Rïk A. Jones, CISSP [email protected] Rïk A. Jones Web developer since 1995 (16+ years) Involved with information
Locking down a Hitachi ID Suite server
Locking down a Hitachi ID Suite server 2016 Hitachi ID Systems, Inc. All rights reserved. Organizations deploying Hitachi ID Identity and Access Management Suite need to understand how to secure its runtime
Online Vulnerability Scanner User Manual
Online Vulnerability Scanner User Manual Information in this document is subject to change without notice. Companies, names, and data used in examples herein are fictitious unless otherwise noted. No part
System Security Guide for Snare Server v7.0
System Security Guide for Snare Server v7.0 Intersect Alliance International Pty Ltd. All rights reserved worldwide. Intersect Alliance Pty Ltd shall not be liable for errors contained herein or for direct,
Web Application Security
E-SPIN PROFESSIONAL BOOK Vulnerability Management Web Application Security ALL THE PRACTICAL KNOW HOW AND HOW TO RELATED TO THE SUBJECT MATTERS. COMBATING THE WEB VULNERABILITY THREAT Editor s Summary
Recommended Practice Case Study: Cross-Site Scripting. February 2007
Recommended Practice Case Study: Cross-Site Scripting February 2007 iii ACKNOWLEDGEMENT This document was developed for the U.S. Department of Homeland Security to provide guidance for control system cyber
Magento Security Best practices 2015
http://goo.gl/mfpbws Grow your business safely Magento Security Best practices 2015 Q4 2015 11 e-commerce: the 60% rules >60% of web traffic is non-human >60% of attempts to steal databases target e-commerce
Columbia University Web Security Standards and Practices. Objective and Scope
Columbia University Web Security Standards and Practices Objective and Scope Effective Date: January 2011 This Web Security Standards and Practices document establishes a baseline of security related requirements
Exploiting Local File Inclusion in A Co-Hosting Environment
Whitepaper Exploiting Local File Inclusion in A Co-Hosting Environment A Proof-of-Concept Utkarsh Bhatt Anant Kochhar TABLE OF CONTENTS Abstract... 4 Introduction... 4 Upload Modules... 4 Local File Inclusion...
Information Technology Policy
Information Technology Policy Enterprise Web Application Firewall ITP Number ITP-SEC004 Category Recommended Policy Contact [email protected] Effective Date January 15, 2010 Supersedes Scheduled Review
Cyber Essentials Scheme
Cyber Essentials Scheme Requirements for basic technical protection from cyber attacks June 2014 December 2013 Contents Contents... 2 Introduction... 3 Who should use this document?... 3 What can these
Web Application Threats and Vulnerabilities Web Server Hacking and Web Application Vulnerability
Web Application Threats and Vulnerabilities Web Server Hacking and Web Application Vulnerability WWW Based upon HTTP and HTML Runs in TCP s application layer Runs on top of the Internet Used to exchange
How To Manage Web Content Management System (Wcm)
WEB CONTENT MANAGEMENT SYSTEM February 2008 The Government of the Hong Kong Special Administrative Region The contents of this document remain the property of, and may not be reproduced in whole or in
Security Maintenance Practices. IT 4823 Information Security Administration. Patches, Fixes, and Revisions. Hardening Operating Systems
IT 4823 Information Security Administration Securing Operating Systems June 18 Security Maintenance Practices Basic proactive security can prevent many problems Maintenance involves creating a strategy
THE SMARTEST WAY TO PROTECT WEBSITES AND WEB APPS FROM ATTACKS
THE SMARTEST WAY TO PROTECT WEBSITES AND WEB APPS FROM ATTACKS INCONVENIENT STATISTICS 70% of ALL threats are at the Web application layer. Gartner 73% of organizations have been hacked in the past two
SANDCAT THE WEB APPLICATION SECURITY ASSESSMENT SUITE WHAT IS SANDCAT? MAIN COMPONENTS. Web Application Security
SANDCAT WHAT IS SANDCAT? THE WEB APPLICATION SECURITY ASSESSMENT SUITE Sandcat is a hybrid multilanguage web application security assessment suite - a software suite that simulates web-based attacks. Sandcat
Web Vulnerability Scanner by Using HTTP Method
Available Online at www.ijcsmc.com International Journal of Computer Science and Mobile Computing A Monthly Journal of Computer Science and Information Technology IJCSMC, Vol. 4, Issue. 9, September 2015,
CS 558 Internet Systems and Technologies
CS 558 Internet Systems and Technologies Dimitris Deyannis [email protected] 881 Heat seeking Honeypots: Design and Experience Abstract Compromised Web servers are used to perform many malicious activities.
Cloud Security:Threats & Mitgations
Cloud Security:Threats & Mitgations Vineet Mago Naresh Khalasi Vayana 1 What are we gonna talk about? What we need to know to get started Its your responsibility Threats and Remediations: Hacker v/s Developer
Adobe Systems Incorporated
Adobe Connect 9.2 Page 1 of 8 Adobe Systems Incorporated Adobe Connect 9.2 Hosted Solution June 20 th 2014 Adobe Connect 9.2 Page 2 of 8 Table of Contents Engagement Overview... 3 About Connect 9.2...
REDCap Technical Overview
REDCap Technical Overview Introduction REDCap is a web application for building and managing online surveys and databases. This document delineates many of the broader technical aspects of REDCap, such
INDUSTRIAL CONTROL SYSTEMS CYBER SECURITY DEMONSTRATION
INDUSTRIAL CONTROL SYSTEMS CYBER SECURITY DEMONSTRATION Prepared for the NRC Fuel Cycle Cyber Security Threat Conference Presented by: Jon Chugg, Ken Rohde Organization(s): INL Date: May 30, 2013 Disclaimer
IBM Security QRadar SIEM Version 7.1.0 MR1. Vulnerability Assessment Configuration Guide
IBM Security QRadar SIEM Version 7.1.0 MR1 Vulnerability Assessment Configuration Guide Note: Before using this information and the product that it supports, read the information in Notices and Trademarks
Top 10 Web Application Security Vulnerabilities - with focus on PHP
Top 10 Web Application Security Vulnerabilities - with focus on PHP Louise Berthilson Alberto Escudero Pascual 1 Resources The Top 10 Project by OWASP www.owasp.org/index.php/owasp_top_ten_project
Today s Topics. Protect - Detect - Respond A Security-First Strategy. HCCA Compliance Institute April 27, 2009. Concepts.
Protect - Detect - Respond A Security-First Strategy HCCA Compliance Institute April 27, 2009 1 Today s Topics Concepts Case Study Sound Security Strategy 2 1 Security = Culture!! Security is a BUSINESS
Network Detective. HIPAA Compliance Module. 2015 RapidFire Tools, Inc. All rights reserved V20150201
Network Detective 2015 RapidFire Tools, Inc. All rights reserved V20150201 Contents Purpose of this Guide... 3 About Network Detective... 3 Overview... 4 Creating a Site... 5 Starting a HIPAA Assessment...
Penetration Test Report
Penetration Test Report Acme Test Company ACMEIT System 26 th November 2010 Executive Summary Info-Assure Ltd was engaged by Acme Test Company to perform an IT Health Check (ITHC) on the ACMEIT System
CMP3002 Advanced Web Technology
CMP3002 Advanced Web Technology Assignment 1: Web Security Audit A web security audit on a proposed eshop website By Adam Wright Table of Contents Table of Contents... 2 Table of Tables... 2 Introduction...
About This Document 3. Integration Overview 4. Prerequisites and Requirements 6
Contents About This Document 3 Integration Overview 4 Prerequisites and Requirements 6 Meeting the Requirements of the cpanel Plugin... 6 Meeting the Requirements of Presence Builder Standalone... 6 Installation
dotdefender for IIS User Guide dotdefender for IIS - Manual Version 1.0
dotdefender for IIS User Guide dotdefender for IIS - Manual Version 1.0 Table of Contents Chapter 1 Introduction... 5 1.1 Overview... 5 1.2 Components... 5 1.3 Benefits... 6 1.4 Organization of this Guide...
2012 North Dakota Information Technology Security Audit Vulnerability Assessment and Penetration Testing Summary Report
2012 North Dakota Information Technology Security Audit Vulnerability Assessment and Penetration Testing Summary Report 28 September 2012 Submitted to: Donald Lafleur IS Audit Manager ND State Auditor
Implementation of Web Application Firewall
Implementation of Web Application Firewall OuTian 1 Introduction Abstract Web 層 應 用 程 式 之 攻 擊 日 趨 嚴 重, 而 國 內 多 數 企 業 仍 不 知 該 如 何 以 資 安 設 備 阻 擋, 仍 在 採 購 傳 統 的 Firewall/IPS,
Web Application Security
Web Application Security Prof. Sukumar Nandi Indian Institute of Technology Guwahati Agenda Web Application basics Web Network Security Web Host Security Web Application Security Best Practices Questions?
Introduction: 1. Daily 360 Website Scanning for Malware
Introduction: SiteLock scans your website to find and fix any existing malware and vulnerabilities followed by using the protective TrueShield firewall to keep the harmful traffic away for good. Moreover
System Management. What are my options for deploying System Management on remote computers?
Getting Started, page 1 Managing Assets, page 2 Distributing Software, page 3 Distributing Patches, page 4 Backing Up Assets, page 5 Using Virus Protection, page 6 Security, page 7 Getting Started What
APPENDIX G ASP/SaaS SECURITY ASSESSMENT CHECKLIST
APPENDIX G ASP/SaaS SECURITY ASSESSMENT CHECKLIST Application Name: Vendor Name: Briefly describe the purpose of the application. Include an overview of the application architecture, and identify the data
Release Notes for Websense Email Security v7.2
Release Notes for Websense Email Security v7.2 Websense Email Security version 7.2 is a feature release that includes support for Windows Server 2008 as well as support for Microsoft SQL Server 2008. Version
White Paper Secure Reverse Proxy Server and Web Application Firewall
White Paper Secure Reverse Proxy Server and Web Application Firewall 2 Contents 3 3 4 4 8 Losing control Online accessibility means vulnerability Regain control with a central access point Strategic security
by New Media Solutions 37 Walnut Street Wellesley, MA 02481 p 781-235-0128 f 781-235-9408 www.avitage.com Avitage IT Infrastructure Security Document
Avitage IT Infrastructure Security Document The purpose of this document is to detail the IT infrastructure security policies that are in place for the software and services that are hosted by Avitage.
CONTENTS. PCI DSS Compliance Guide
CONTENTS PCI DSS COMPLIANCE FOR YOUR WEBSITE BUILD AND MAINTAIN A SECURE NETWORK AND SYSTEMS Requirement 1: Install and maintain a firewall configuration to protect cardholder data Requirement 2: Do not
Integrating Barracuda Web Application Firewall
Integrating Barracuda Web Application Firewall EventTracker v7.x Publication Date: July 28, 2014 EventTracker 8815 Centre Park Drive Columbia MD 21045 www.eventtracker.com Abstract This guide provides
Installing Moodle on a Windows x64 Environment
Installing Moodle on a Windows x64 Environment Installing Moodle 1.9 on a Windows Server 2008 x64 with Microsoft SQL Server 2008 and IIS7. Written by: Alex Pearce Email: [email protected] Blog: www.learninggateway.net/blogs/ajp
Web Application Security Payloads. Andrés Riancho Director of Web Security OWASP AppSec USA 2011 - Minneapolis
Web Application Security Payloads Andrés Riancho Director of Web Security OWASP AppSec USA 2011 - Minneapolis Topics Short w3af introduction Automating Web application exploitation The problem and how
Application Security Best Practices. Wally LEE <[email protected]> Principal Consultant
Application Security Best Practices Wally LEE Principal Consultant 17/18 March 2009 Speaker Profile Wally LEE CISSP BS7799 Lead Auditor Certified Ultimate Hacking Instructor Certified
Codes of Connection for Devices Connected to Newcastle University ICT Network
Code of Connection (CoCo) for Devices Connected to the University s Author Information Security Officer (Technical) Version V1.1 Date 23 April 2015 Introduction This Code of Connection (CoCo) establishes
owncloud Architecture Overview
owncloud Architecture Overview Time to get control back Employees are using cloud-based services to share sensitive company data with vendors, customers, partners and each other. They are syncing data
How to break in. Tecniche avanzate di pen testing in ambito Web Application, Internal Network and Social Engineering
How to break in Tecniche avanzate di pen testing in ambito Web Application, Internal Network and Social Engineering Time Agenda Agenda Item 9:30 10:00 Introduction 10:00 10:45 Web Application Penetration
Medical Device Security Health Imaging Digital Capture. Security Assessment Report for the Kodak Capture Link Server V1.00
Medical Device Security Health Imaging Digital Capture Security Assessment Report for the Kodak Capture Link Server V1.00 Version 1.0 Eastman Kodak Company, Health Imaging Group Page 1 Table of Contents
Protect Your IT Infrastructure from Zero-Day Attacks and New Vulnerabilities
Protect Your IT Infrastructure from Zero-Day Attacks and New Vulnerabilities Protecting a business s IT infrastructure is complex. Take, for example, a retailer operating a standard multi-tier infrastructure
Cyber Essentials. Test Specification
Cyber Essentials Test Specification Contents Scope of the Audit...2 Assumptions...3 Success Criteria...3 External systems...4 Required tests...4 Test Details...4 Internal systems...7 Tester pre-requisites...8
Basic & Advanced Administration for Citrix NetScaler 9.2
Basic & Advanced Administration for Citrix NetScaler 9.2 Day One Introducing and deploying Citrix NetScaler Key - Brief Introduction to the NetScaler system Planning a NetScaler deployment Deployment scenarios
