Blind Elephant: Web Application Fingerprinting & Vulnerability Inferencing. Patrick Thomas Qualys 7/28/10
|
|
|
- Deborah Cobb
- 10 years ago
- Views:
Transcription
1 Blind Elephant: Web Application Fingerprinting & Vulnerability Inferencing Patrick Thomas Qualys 7/28/10
2 Outline Web Apps & Security Existing Fingerprinting Approaches Static File Approach Observations From A Net Survey Q & A 2
3 Well-Known Web Applications Every conceivable use Content Management/Blogging Forums E-Commerce DB Admin Backup and File Storage Admin Device/System/VM Admin Version Control UI Intranet/Collaboration 3
4 Well-Known Web Applications 4
5 Special Challenges Securing Web Apps Remotely accessible by nature Lots of attack surface exposed (direct and indirect) Easy to set up and admin Fly under IT radar 5
6 Special Challenges Securing Web Apps Fast release cycle (often open-source) Exploits are (often) simpler to create & comprehend wget wget header Cookie: tinybrowser_lang=../../../../../../../zomgsecrets\r\n ugins/tinybrowser/folders.php ( and of course everything the WAF vendors are saying) 6
7 WAS Is Overkill For Well-Known Apps Known app + known-vulnerability list = traditional vulnerability management Knowing the version is good enough to infer vulnerabilities It s not nearly as sexy, but it works Discovering the app and version Fingerprinting 7
8 Existing Fingerprinting Approaches Labor intensive to add/update signatures Manually locate version in files or build regexes for headers If selected strings go away, human effort to notice and update Decent hardening pretty much nukes them Built-in options to remove identifiers (eg, meta generator) Remove standard files Easy to lie to Fingerprinters like this: Sedusa (in nmap), Wappalyzer, BackendInfo, Plecost, etc, etc 8
9 More Advanced Tools Typically improve in one area Resistant to hardening Less labor intensive Have their own downsides Less specific results Some request massive amounts of data (> 20 megs!) Some are less generic (Plecost = Wordpress Only) Fingerprinters like this: Sucuri, WAFP, WhatWeb, BackEndInfo (sortof), 9
10 Goals for a (WebApp) Fingerprinter Very Generic Fast Low resource usage Accurate (Low FP/FN) Resistant to hardening/banner removal Super easy to support new versions/apps 10
11 The Blind Men and the Elephant 11
12 Collect and Eliminate Possibilities Tree or Elephant Spear or Elephant Fan or Elephant 12 Vine or Elephant
13 Intersect the Possibilities and 13
14 Preparing the Data Web App Versions (eg, Joomla-*.zip) Paths Table What versions will a path give me info on? Versions Table If I want to confirm or rule out a version/versions, what s a path that will do that?
15 HashesTable wordpress-0.71-gold/*/*.* wordpress-0.72-beta-1/*/*.* wordpress-0.72-rc1/*/*.* wordpress miles/*/*.* wordpress rc1/*/*.* wordpress-1.0.2/*/*.* wordpress blakey/*/*.* wordpress-1.0-platinum/*/*.* wordpress-1.0-rc1/*/*.* wordpress-1.2.1/*/*.* wordpress-1.2.2/*/*.* wordpress-1.2-beta/*/*.* wordpress-1.2-delta/*/*.* wordpress-1.2-mingus/*/*.* wordpress-1.2-rc1/*/*.* wordpress-1.2-rc2/*/*.* wordpress-2.9/*/*.* wordpress-2.9.1/*/*.* wordpress beta1/*/*.* wordpress beta1-iis/*/*.* wordpress iis/*/*.* wordpress rc1/*/*.* wordpress rc1-iis/*/*.* wordpress-2.9-beta-1/*/*.* wordpress-2.9-beta-1-iis/*/*.* wordpress-2.9-beta-2/*/*.* wordpress-2.9-beta-2-iis/*/*.* wordpress-2.9-iis/*/*.* wordpress-2.9-rc1/*/*.* wordpress-2.9-rc1-iis/*/*.* wordpress-1.5-strayhorn/*/*.* wordpress rc2/*/*.* wordpress-2.2.1/*/*.* wordpress-2.5.1/*/*.* PathsTable VersionsTable /templates/subsilver/admin/index_frameset.tpl 74057e1687fa4edfd1ba0207e073e100 File ['2.0'] fc f44fd b525 ['2.0.1'] 7ec0529fd736950a3dd0c7b66f7b5f2c Hash Version ['2.0.2', c35d7a66d32ddfa118b1bc359d ['2.0.18', Hash Version Hash Version /install/schemas/schema_data.sql b1fdcba066491e22d7b2b84ace8c94e0 ['3.0.6-RC3'] 10d66666d443fb0eb5970c4c5cadc844 ['3.0.6'] 1129aeae b500d11cc9b26acd File ['3.0.5-RC1'] 8db031ced0c0377ded71ebed82e14408 ['3.0.6-RC1'] ba7cbcaa48b58d17a28970be04 Hash Version ['3.0.2'] ad0ca453932b8cce946345a ['3.0.4'] 59065f5fed0d801ab04a1eef7ca4fad4 Hash Version ['3.0.4-RC1'] 89e85ef960aef6f461cbe Hash Version ['2.2b'] e060676be3191f2a7bd95df62711e28d ['3.0.6-RC2'] ce2b47359e50e2a83fea2f3bbec9a8b1 ['3.0.5'] efb06c117f2681bedcc704ea ['3.0.3'] e36af4fea75f3a95c415f49 ['3.0.6-RC4'] 3.0.3,3.0.4,3.0.4-RC1 ('/styles/prosilver/template/ucp_pm_viewmessage.html', Version, Version, Version '314fe5725db ('/styles/subsilver2/template/viewforum_body.html', 'f f99384bf4 File Hash ('/adm/style/acp_styles.html', '39e7ad0dbeda3f8d7731e844eba62622') ('/styles/subsilver2/template/mcp_warn_user.html', File Hash '6fce7b9564afb5aa6d.. ('/styles/prosilver/template/mcp_warn_user.html', 'c56f962be418102b8 ('/styles/subsilver2/template/index_body.html', File Hash '64c9a99b3b53f4 ('/styles/prosilver/theme/content.css', '5f264fed8971c7d00e7092f48f , Version ('/language/lang_english/ /user_activate_passwd.tpl', ' c68 ('/templates/subsilver/confirm_body.tpl', File 1ead54515b2b537 Hash ('/templates/subsilver/admin/board_config_body.tpl', File Hash 'f8519d018f9850d ('/language/lang_english/ /group_request.tpl', '6192f8bbb9e4596ad ('/install/schemas/mssql_schema.sql', '045c0fcfaa4f89d771b07b66a74. ('/contrib/readme.html', '61f46292c72f73935bcc2b74403d8b74 )
16 How Many Files? Wordpress phpbb MediaWiki Joomla MovableType Drupal and many more ~83k files in 166 versions ~17k files in 32 versions ~68k files in 68 versions ~109k files in 33 versions ~164k files in 95 versions ~33k files in 114 versions Wordpress Plugins Drupal Plugins ~103k files in 1200 versions ~76K files in 983 versions 16
17 Fingerprinting Fitness Heuristic Paths Table Best Candidates to Identify the Version '/htaccess.txt', 14 hashes/31 versions, fitness=15.0 '/language/en-gb/en-gb.ini', 14 hashes/20 versions, fitness=14.64 '/language/en-gb/en-gb.com_content.ini', 13 hashes/20 versions, fitness=13.64 '/configuration.php-dist', 10 hashes/28 versions, fitness=10.90 '/includes/js/joomla.javascript.js', 8 hashes/28 versions, fitness=8.90 '/media/system/js/validate.js', '/media/system/js/caption.js', '/language/en-gb/en-gb.mod_feed.ini', '/media/system/js/openid.js', '/language/en-gb/en-gb.com_contact.ini', '/language/en-gb/en-gb.mod_breadcrumbs.ini', '/media/system/js/combobox.js', '/language/en-gb/en-gb.mod_search.ini', '/templates/rhuk_milkyway/css/template.css', '/media/system/js/switcher.js', 8 hashes/20 versions, fitness= hashes/20 versions, fitness= hashes/20 versions, fitness= hashes/20 versions, fitness= hashes/20 versions, fitness= hashes/20 versions, fitness= hashes/20 versions, fitness= hashes/20 versions, fitness= hashes/20 versions, fitness= hashes/20 versions, fitness=
18 Candidate Files: Wordpress /readme.html /wp-includes/js/tinymce/tiny_mce.js /wp-includes/js/autosave.js /wp-includes/js/swfupload/handlers.js /wp-includes/js/tinymce/themes/advanced/about.htm /wp-includes/js/tinymce/themes/advanced/link.htm /wp-includes/js/tinymce/themes/advanced/source_editor.htm /wp-includes/js/tinymce/plugins/inlinepopups/editor_plugin.js /wp-includes/js/tinymce/themes/advanced/image.htm /wp-includes/js/tinymce/themes/advanced/color_picker.htm 18
19 Candidate Files: Mediawiki /RELEASE-NOTES /skins/common/wikibits.js /install-utils.inc /skins/monobook/main.css /docs/hooks.txt /HISTORY /UPGRADE /skins/monobook/rtl.css /math/texutil.ml /INSTALL Fully data-driven approach finds useful info in obscure and counterintuitive files 19
20 Fingerprinting Best Candidates '/htaccess.txt' '/language/en-gb/en-gb.ini' '/language/en-gb/en-gb.com_content.ini' '/configuration.php-dist', '/includes/js/joomla.javascript.js' '/media/system/js/validate.js' '/media/system/js/caption.js' '/language/en-gb/en-gb.mod_feed.ini' '/media/system/js/openid.js' '/language/en-gb/en-gb.com_contact.ini' '/language/en-gb/en- GB.mod_breadcrumbs.ini' '/media/system/js/combobox.js' '/language/en-gb/en-gb.mod_search.ini' '/templates/rhuk_milkyw/css/template.css' '/media/system/js/switcher.js' 200 OK 200 OK 2.0.1, RC4, OK 2.5.1, RC4, RC4, RC4, 3.0.4, RC4, 3.0.4, 3.5.1
21 Winnowing (confirm or rule out versions) 3.0.0, , 3.0.3, RC1, RC2??? Darn, Not Enough Data Versions Table or 3.0.3? or 3.0.1? 3.0.6? 3.0.2? 3.0.4? 21
22 App Discovery / App Guessing Indicator Files Versions Table {'path': /includes/js/dtree/img/frontpage.gif, 'versions': 29} {'path': '/images/banners/osmbanner2.png', 'versions': 33} {'path': '/media/system/js/mootools.js', 'versions': 18} {'path': /includes/js/wz_tooltip.js ', 'versions': 29} Want a small set of files with at least one present in every release 22
23 App Discovery / App Guessing Indicator Files {'path': /includes/js/dtree/img/frontpage.gif, 'versions': 29} {'path': '/images/banners/osmbanner2.png', 'versions': 33} {'path': '/media/system/js/mootools.js', 'versions': 18} {'path': /includes/js/wz_tooltip.js ', 'versions': 29} 200 OK 404 It s some version of Joomla 23
24 Supporting a New App Gather every version you can find, dump them in a directory [Optional] Supply a regex to exclude directories/files from fingerprinting (eg.php files, protected admin directory,.htaccess, etc) Use BlindElephant to build the datafiles Fingerprint! Profit? 24
25 Does it work? $./BlindElephant.py movabletype Loaded movabletype with 96 versions, 2229 differentiating paths, and 209 version groups. Starting BlindElephant fingerprint for version of movabletype at Hit Possible versions based on result: 4.2-en, 4.21-en, 4.21-en, 4.21-en-COM, 4.22-en, 4.22-en, en-com, 4.23-en, 4.23-en, 4.23-en-COM, 4.24-en, 4.24-en, 4.24-en-COM Hit Possible versions based on result: 4.2-en, 4.21-en, 4.21-en, 4.21-en-COM, 4.22-en, 4.22-en, en-com, 4.23-en, 4.23-en, 4.23-en-COM, 4.24-en, 4.24-en, 4.24-en-COM Hit Possible versions based on result: 4.2-en, 4.21-en, 4.21-en, 4.21-en-COM, 4.22-en, 4.22-en, en-com, 4.23-en, 4.23-en, 4.23-en-COM Hit File produced no match. Error: Error code: 404 (Not Found) 25
26 Does it work? Hit Possible versions based on result: 4.1-en, 4.1-en-CS, 4.2-en, 4.21-en, 4.21-en, 4.21-en-COM, 4.22-en, 4.22-en, 4.22-en-COM, 4.23-en, 4.23-en, 4.23-en-COM, 4.24-en, 4.24-en, 4.24-en- COM Hit Possible versions based on result: 4.1-en, 4.1-en-CS, 4.2-en, 4.21-en, 4.21-en, 4.21-en-COM, 4.22-en, 4.22-en, 4.22-en-COM, 4.23-en, 4.23-en, 4.23-en-COM, 4.24-en, 4.24-en, 4.24-en- COM Hit Possible versions based on result: 4.2-en, 4.21-en, 4.21-en, 4.21-en-COM, 4.22-en, 4.22-en, en-com, 4.23-en, 4.23-en, 4.23-en-COM, 4.24-en, 4.24-en, 4.24-en-COM Hit Possible versions based on result: 4.22-en, 4.22-en, 4.22-en-COM, 4.23-en, 4.23-en, 4.23-en- COM, 4.24-en, 4.24-en, 4.24-en-COM 26
27 Does it work? Hit Possible versions based on result: 4.1-en, 4.1-en-CS, 4.2-en, 4.21-en, 4.21-en, 4.21-en-COM, 4.22-en, 4.22-en, 4.22-en-COM, 4.23-en, 4.23-en, 4.23-en-COM, 4.24-en, 4.24-en, 4.24-en- COM Hit Possible versions based on result: 4.1-en, 4.1-en-CS, 4.2-en, 4.21-en, 4.21-en, 4.21-en-COM, 4.22-en, 4.22-en, 4.22-en-COM, 4.23-en, 4.23-en, 4.23-en-COM, 4.24-en, 4.24-en, 4.24-en- COM Hit Possible versions based on result: 4.1-en, 4.1-en-CS, 4.2-en, 4.21-en, 4.21-en, 4.21-en-COM, 4.22-en, 4.22-en, 4.22-en-COM, 4.23-en, 4.23-en, 4.23-en-COM, 4.24-en, 4.24-en, 4.24-en- COM Hit Possible versions based on result: 4.1-en, 4.1-en-CS, 4.2-en, 4.21-en, 4.21-en, 4.21-en-COM, 4.22-en, 4.22-en, 4.22-en-COM, 4.23-en, 4.23-en, 4.23-en-COM, 4.24-en, 4.24-en, 4.24-en- COM 27
28 Interlude 2.0.1, RC4, , RC4, This is what matters! RC4, 3.0.4, RC4, 3.0.4,
29 Does it work? Hit Possible versions based on result: 4.2-en, 4.21-en, 4.21-en, 4.21-en-COM, 4.22-en, 4.22-en, en-com, 4.23-en, 4.23-en, 4.23-en-COM Hit Possible versions based on result: 4.2-en, 4.22-en, 4.22-en, 4.22-en-COM, 4.23-en, 4.23-en, en-com, 4.23-en-OS, 4.24-en, 4.24-en, 4.24-en-COM Hit Possible versions based on result: 4.1-en, 4.1-en-CS, 4.2-en, 4.21-en, 4.21-en, 4.21-en-COM, 4.22-en, 4.22-en, 4.22-en-COM, 4.23-en, 4.23-en, 4.23-en-COM, 4.24-en, 4.24-en, 4.24-en- COM Fingerprinting resulted in: Best Guess: 4.23-en-COM 4.22-en, 4.22-en-COM, 4.23-en, 4.23-en-COM 29
30 Lets Pick on the Security Bloggers Network $./BlindElephant.py wordpress Loaded wordpress with 159 versions, 599 differentiating paths, and 226 version groups. Starting BlindElephant fingerprint for version of wordpress at Fingerprinting resulted in: 3.0-RC1 3.0-RC1-IIS Best Guess: 3.0-RC1 30
31 BTW: It Does Plugins Too $./BlindElephant.py -s -p guess drupal Possible plugins: ['admin_menu', 'cck', 'date', 'google_analytics', 'imce', 'imce_swfupload', 'pathauto', 'print', 'spamicide', 'tagadelic', 'token', 'views ] $./BlindElephant.py -s -p imce drupal <snip> Fingerprinting resulted in: 6.x
32 New Toy! Lets Play App ID & Fingerprinting on 1,084,152 hosts ~34k targeted scans for bug shakeout and calibration Shodan = Really, really useful (kinda expensive though) Is John here? I owe him a beer. Slightly biased sample (skews to default installs, s okay though) ~50k and ~1M host random sample of 87M.com domains Stats on accuracy and net-wide webapp population are from these 32
33 The Question That Started This All What % of (active) sites on the net are running a well-known webapp? Not counting Parked/ad-only, down, or blank/40x Only examined the root of the domain Sample set is from a list of 87M.coms 33
34 The Question That Started This All What % of active sites on the net are running a well-known webapp? 23% Parked + 5.8% Ads only + 7.9% No Content/40x % Down ~49.7% of the web is junk* *That s all? Hush you. 34
35 The Question That Started This All What % of active sites on the net are running a well-known webapp? 4.4% of domains had a supported app.503 percent of domains are active ~8.8% 35
36 It Only Goes Up 8.8% is definitely a lower bound Support for more apps Could test /blog, /wiki, /forum and subdomains Improvements in app guessing (was tuned for false negatives) What % of web applications are a well-known webapp? I don t know I d like to find out though 36
37 On To the Results Version Distribution: SomeApp v2.0 v1.5 v
38 Graphing Sets of Possibilities Host1 Possible Versions: v1.0, v1.5, v to three version columns Host2 Possible Versions: v1.5, v2.0.5 to two version columns Host3 Possible Versions: v to v1.5 38
39 Releases Graphing Sets of Possibilities Version Distribution: Some App (6/18/10) v2.0 v1.5 v1.0 Host1 Host2 Host Weighted # of Apps Running Each Release 39
40 7.0-alpha5 7.0-alpha1 Drupal x-dev Version Distribution: Drupal (June 18, 2010) Affected by A Critical Vulnerability: 70% # Hosts C O N F I D E N T I A L
41 Joomla Version Distribution: Joomla (June ) Affected by A High Vulnerability: 92% # Hosts C O N F I D E N T I A L
42 Liferay Version Distribution: Liferay (June 18, 2010) # Hosts C O N F I D E N T I A L
43 Mediawiki beta Version Distribution: Mediawiki (June 18, 2010) Affected by a Serious Vulnerability: 95% # Hosts C O N F I D E N T I A L
44 Moodle Version Distribution: Moodle (June 18, 2010) Affected by a Major Vulnerability: 74% # Hosts C O N F I D E N T I A L
45 Movabletype 5.01-en-OS en-OS en-CS en 4.33-en 4.32-en 4.31-en 4.26-en 4.25-en-COM 4.24-en-COM 4.23-en-OS 4.23-en 4.22-en-COM 4.21-en-OS 4.21-en 4.13-en-OS 4.12-en-OS 4.3-en-OS 4.2-en 4.1-en-CS 4.0-en 3.37-en 3.35-en Version Distribution: MovableType (June 18, 2010) Affected by a Critical Vulnerability: 91% # Hosts C O N F I D E N T I A L
46 3.0.6 phpbb Version Distribution: phpbb (June 18, 2010) Affected by a Severe Vulnerability: 100% # Hosts C O N F I D E N T I A L
47 phpnuke Version Distribution: PHPNuke (June 18, 2010) # Hosts C O N F I D E N T I A L
48 RC PL PL PL phpmyadmin Version Distribution: phpmyadmin (June 18, 2010) Affected by a Serious Vulnerability: 85% # Hosts C O N F I D E N T I A L
49 SPIP i 1.9.2h 1.9.2g 1.9.2f rev rev i b b Version Distribution: SPIP (June 18, 2010) Affected by a Critical Vulnerability: 65% # Hosts C O N F I D E N T I A L
50 Wordpress 3.0-RC2-IIS 3.0-RC1-IIS 3.0-beta2-IIS 3.0-beta1-IIS Version Distribution: Wordpress (June 18, 2010) Affected by a Medium Vulnerability: 21.5% Affected by a Critical Vulnerability: 4% # Hosts C O N F I D E N T I A L
51 Lost: a Clue 51
52 Lost: A Clue He s only 6 years and 60 releases behind 52
53 Sorry Guys 53
54 Sorry Guys 54
55 Sorry Guys 55
56 Sorry Guys Wha-whaaaaaa 56
57 Observations Webapps actually doing pretty well update-wise but not quite good enough Huge spike at version provided by package managers and hosting services If you re trusting either to keep you up to date, you re probably behind Improperly removed webapps abound Switch from CMS A to CMS B, but leave A lying around Net-visible test/qa sites 57
58 Precision Fingerprint Precision (# Versions Resulting from a Fingerprint (1 is best)
59 Precision Fingerprint Precision (# Versions Resulting from a Fingerprint (1 is best) Average Versions Produced: 3.06 versions
60 # Hosts Speed Fingerprinting Time (Quicker is better) Time To Fingerprint (seconds) 60
61 # Hosts Speed Fingerprinting Time (Quicker is better) Average Time to Fingerprint: 6.4 seconds Time To Fingerprint (seconds) 61
62 BlindElephant Scorecard Very Generic Same code for all apps & plugins Fast 1-10 sec, based on host (Avg 6.4) Low resources Avg Kb to fingerprint Accurate Avg 3.06 versions & ID 98.0% of sites Resistant to hardening/banner removal Yes Easy to support new versions/apps ~2 hours to support all available versions of a new app (1 if they re packed nicely) 62
63 Sources Of Error WebApp Incompletely Removed Partial/Manual Upgrades We tend to catch these though Changed App Root Static hosting on alternate domain (eg, Wikipedia) Forked Project (oscommerce, phpnuke) Fails completely if static files are trivially modified But guess what? People don t do it (yet) 63
64 Release the Kra Elephant 64
65 To Do Web App Developers Help us create fingerprint files to recognize your app! But also think about default deployments that resist fingerprinting Site Administrators Fingerprint yourself know what the attackers know Harden to resist fingerprinting Just stay up to date Everyone Else Try it out Report bugs, contribute signatures, implement a pet feature 65
66 Questions? @coffeetocode 66
67 67
68 Theory of Fingerprinting Find some characteristic(s) that is always the same for a particular individual (implementation/version/person) always different from other members of the population If there s one piece of info that fulfills both, great If not, take several that pin it down Tons of interesting reading in information theory and entropy OS & HTTP Server Fingerprinting: Lots of protocol-aware checks that rely on subtle differences in implementation 68
69 Beyond Hashing Nearest neighbor search Rolling hashes Version trajectory Error tolerant hashing 69 BLACK HAT 2010
Web Hosting Control Panel
Web Hosting Control Panel Our web hosting control panel has been created to provide you with all the tools you need to make the most of your website. This guide will provide you with an over view of the
Web Hosting Control Panel
Web Hosting Control Panel Our web hosting control panel has been created to provide you with all the tools you need to make the most of your website. This guide will provide you with an over view of the
JOOMLA SECURITY. ireland website design. by Oliver Hummel. ADDRESS Unit 12D, Six Cross Roads Business Park, Waterford City
JOOMLA SECURITY by Oliver Hummel ADDRESS Unit 12D, Six Cross Roads Business Park, Waterford City CONTACT Nicholas Butler 051-393524 089-4278112 [email protected] Contents Introduction 3 Installation
Conducting Web Application Pentests. From Scoping to Report For Education Purposes Only
Conducting Web Application Pentests From Scoping to Report For Education Purposes Only Web App Pen Tests According to OWASP: A Web Application Penetration Test focuses only on evaluating the security of
Web Hosting Control Panel
Web Hosting Control Panel Page 1 Our web hosting control panel has been created to provide you with all the tools you need to make the most of your website. Web Hosting Control Panel Home Page Once you
Using PHPIDS to Understand Attacks Trends. @grecs
Using PHPIDS to Understand Attacks Trends @grecs Infosec Career Start - WebAppSec Around 2002 Sooo Much Simpler No CSRF, Click-Jacking, SQLi No SOAP No AJAX No HTML5 Had Our Problems Browser
Joomla Security Report
Joomla Security Report HackerTarget.com HackerTarget.com is the world leader in online open source intelligence and security assessments. All scanning tools are on-line for easy and convenient access.
by Geoff Blake TenTonOnline.com
by Geoff Blake TenTonOnline.com TenTonOnline.com 1 Hey there! Thanks a lot for checking out this WordPress Guide I ve put together. I ve been using and teaching WordPress for a long, long time and use
3. Broken Account and Session Management. 4. Cross-Site Scripting (XSS) Flaws. Web browsers execute code sent from websites. Account Management
What is an? s Ten Most Critical Web Application Security Vulnerabilities Anthony LAI, CISSP, CISA Chapter Leader (Hong Kong) [email protected] Open Web Application Security Project http://www.owasp.org
6 reasons to choose us for your web hosting
Web Hosting We believe that web hosting is more than just providing web space and FTP access. Our aim is to provide individuals and businesses with everything they need to express themselves on the internet,
The ultimate integrated Magento helpdesk solution
Breincoach Wolfhezerweg 40 6874 AE Wolfheze The Netherlands Website:www.breincoach.eu email: [email protected] l phone: +31-6-925529 VAT: NL019512259B02 Bank: Paypal: [email protected] Bank: ING Account
SEO Training SYLLABUS by SEOOFINDIA.COM
1 Foundation Course SEO Training SYLLABUS by SEOOFINDIA.COM Search Engine Optimization Training Course Internet and Search Engine Basics Internet Marketing Importance of Internet Marketing Types of Internet
112 Linton House 164-180 Union Street London SE1 0LH T: 020 7960 5111 F: 020 7960 5100
112 Linton House 164-180 Union Street London SE1 0LH T: 020 7960 5111 F: 020 7960 5100 Our dedicated servers offer outstanding performance for even the most demanding of websites with the low monthly fee.
Rise of the Machines: An Internet-Wide Analysis of Web Bots in 2014
SESSION ID: SPO2-W04 Rise of the Machines: An Internet-Wide Analysis of Web Bots in 2014 John Summers VP, Security Products Akamai #RSAC The Akamai Intelligent Platform The Platform 167,000+ Servers 2,300+
Data Breaches and Web Servers: The Giant Sucking Sound
Data Breaches and Web Servers: The Giant Sucking Sound Guy Helmer CTO, Palisade Systems, Inc. Lecturer, Iowa State University @ghelmer Session ID: DAS-204 Session Classification: Intermediate The Giant
Penetration Testing. NTS330 Unit 1 Penetration V1.0. February 20, 2011. Juan Ortega. Juan Ortega, [email protected]. 1 Juan Ortega, juaorteg@uat.
1 Penetration Testing NTS330 Unit 1 Penetration V1.0 February 20, 2011 Juan Ortega Juan Ortega, [email protected] 1 Juan Ortega, [email protected] 2 Document Properties Title Version V1.0 Author Pen-testers
Make a folder named Lab3. We will be using Unix redirection commands to create several output files in that folder.
CMSC 355 Lab 3 : Penetration Testing Tools Due: September 31, 2010 In the previous lab, we used some basic system administration tools to figure out which programs where running on a system and which files
What is Web Security? Motivation
[email protected] http://www.brucker.ch/ Information Security ETH Zürich Zürich, Switzerland Information Security Fundamentals March 23, 2004 The End Users View The Server Providers View What is Web
Nessus. A short review of the Nessus computer network vulnerability analysing tool. Authors: Henrik Andersson Johannes Gumbel Martin Andersson
Nessus A short review of the Nessus computer network vulnerability analysing tool Authors: Henrik Andersson Johannes Gumbel Martin Andersson Introduction What is a security scanner? A security scanner
Detecting (and even preventing) SQL Injection Using the Percona Toolkit and Noinject!
Detecting (and even preventing) SQL Injection Using the Percona Toolkit and Noinject! Justin Swanhart Percona Live, April 2013 INTRODUCTION 2 Introduction 3 Who am I? What do I do? Why am I here? The tools
Building a Web Application Security Program. Rich Mogull Adrian Lane Securosis, L.L.C.
Building a Web Application Security Program Rich Mogull Adrian Lane Securosis, L.L.C. Old School, New School, Oh SH*& School What s Different About This Presentation We are focusing on the business processes
Virtually Pwned Pentesting VMware. Claudio Criscione @paradoxengine [email protected]
Virtually Pwned Pentesting VMware Claudio Criscione @paradoxengine [email protected] /me Claudio Criscione The need for security Breaking virtualization means hacking the underlying layer accessing
SEO Education 101. By Matt Bush. Visit http://immattbush.com for the latest internet marketing tips and tactics
1 SEO Education 101 By Matt Bush 2 CONTENTS SEO: Search Engine Optimization Introduction... 4 The Advantages of SEO... 5 Search Engine Basics... 5 The Importance Of The Domain Name... 6 The Importance
Linux versus Windows Hosting Plus complete list of features from CompuTech
Linux versus Windows Hosting Plus complete list of features from CompuTech Most hosting companies, including CompuTech Computing, will offer you hosting for your website on servers that are running either
QualysGuard WAS. Getting Started Guide Version 3.3. March 21, 2014
QualysGuard WAS Getting Started Guide Version 3.3 March 21, 2014 Copyright 2011-2014 by Qualys, Inc. All Rights Reserved. Qualys, the Qualys logo and QualysGuard are registered trademarks of Qualys, Inc.
Buyer s Guide to Managed WordPress Hosting
Buyer s Guide to Managed WordPress Hosting dfsdsdf A good managed hosting service makes it easy to manage your WordPress website. It takes the burden of configuration, performance tunning and security
Exploiting Foscam IP Cameras. [email protected]
Exploiting Foscam IP Cameras [email protected] Contents 1. Introduction... 2 2. Finding the Cameras... 3 2.1 Scanning the Address Space... 3 2.1.1 Results from Live Scan... 3 2.2 The Foscam
WordPress Security Scan Configuration
WordPress Security Scan Configuration To configure the - WordPress Security Scan - plugin in your WordPress driven Blog, login to WordPress as administrator, by simply entering the url_of_your_website/wp-admin
Maltego Tungsten as a collaborative attack platform BlackHat 2013
Maltego Tungsten as a collaborative attack platform BlackHat 2013 About us Schedule Why did we do this? Introduction to Maltego Tungsten Maltego with Teeth Design principles Infrastructure attacks Attacking
cpanel (yes, it stands for Control Panel) and WHM (the Web Host Manager) provide a web-based graphical
PozitivStudija, Fotolia.com The webmaster s control panel CPANEL For companies that provide hosting and email packages to clients to administer a myriad of tasks, whm and provide a web-based graphical
MetaXSSploit. Bringing XSS in Pentesting A journey in building a security tool. Claudio Criscione @paradoxengine
` MetaXSSploit Bringing XSS in Pentesting A journey in building a security tool Claudio Criscione @paradoxengine /me No Aff XSS And how a security tool is born! Relevant? Web Application Security Statistics
Web Development QUESTIONNAIRE. Version: 1.0 BIG!
Web Development QUESTIONNAIRE Version: 1.0 BIG! TABLE OF CONTENTS 1. Client Details... 3 2. Basic Site Info... 4 3. Site Layout and Design... 6 4. Public Features... 7 5. Admin Features...8 6. Ecommerce
Unified Security Management (USM) 5.2 Vulnerability Assessment Guide
AlienVault Unified Security Management (USM) 5.2 Vulnerability Assessment Guide USM 5.2 Vulnerability Assessment Guide, rev 1 Copyright 2015 AlienVault, Inc. All rights reserved. The AlienVault Logo, AlienVault,
Introduction to Penetration Testing Graham Weston
Introduction to Penetration Testing Graham Weston March 2014 Agenda Introduction and background Why do penetration testing? Aims and objectives Approaches Types of penetration test What can be penetration
WINDOWS AZURE EXECUTION MODELS
WINDOWS AZURE EXECUTION MODELS Windows Azure provides three different execution models for running applications: Virtual Machines, Web Sites, and Cloud Services. Each one provides a different set of services,
EC-Council CAST CENTER FOR ADVANCED SECURITY TRAINING. CAST 619 Advanced SQLi Attacks and Countermeasures. Make The Difference CAST.
CENTER FOR ADVANCED SECURITY TRAINING 619 Advanced SQLi Attacks and Countermeasures Make The Difference About Center of Advanced Security Training () The rapidly evolving information security landscape
Anatomy of an ethical penetration test
toolsmith Core Impact 6.2: Anatomy of an ethical penetration test By Russ McRee Prerequisites CORE IMPACT is lean and can run on minimal systems with limited resources and requires either Windows 2000
SECURITY B-SIDES: ATLANTA STRATEGIC PENETRATION TESTING. Presented by: Dave Kennedy Eric Smith
SECURITY B-SIDES: ATLANTA STRATEGIC PENETRATION TESTING Presented by: Dave Kennedy Eric Smith AGENDA Penetration Testing by the masses Review of current state by most service providers Deficiencies in
QualysGuard WAS. Getting Started Guide Version 4.1. April 24, 2015
QualysGuard WAS Getting Started Guide Version 4.1 April 24, 2015 Copyright 2011-2015 by Qualys, Inc. All Rights Reserved. Qualys, the Qualys logo and QualysGuard are registered trademarks of Qualys, Inc.
Nikolay Zaynelov Annual LUG-БГ Meeting 2015. nikolay.zaynelov.com [email protected]
Nikolay Zaynelov Annual LUG-БГ Meeting 2015 nikolay.zaynelov.com [email protected] Introduction What is WordPress WordPress is a free and open source content management system (CMS). It is the most
Attack Frameworks and Tools
Network Architectures and Services, Georg Carle Faculty of Informatics Technische Universität München, Germany Attack Frameworks and Tools Pranav Jagdish Betreuer: Nadine Herold Seminar Innovative Internet
Running head: USING NESSUS AND NMAP TOOLS 1
Running head: USING NESSUS AND NMAP TOOLS 1 Nessus and Nmap Overview - Scanning Networks Research Paper On Nessus and Nmap Mike Pergande Ethical Hacking North Iowa Area Community College Running head:
Document Freedom Workshop 2012. DFW 2012: CMS, Moodle and Web Publishing
Document Freedom Workshop 2012 CMS, Moodle and Web Publishing Indian Statistical Institute, Kolkata www.jitrc.com (also using CMS: Drupal) Table of contents What is CMS 1 What is CMS About Drupal About
Using Nessus In Web Application Vulnerability Assessments
Using Nessus In Web Application Vulnerability Assessments Paul Asadoorian Product Evangelist Tenable Network Security [email protected] About Tenable Nessus vulnerability scanner, ProfessionalFeed
Intro to Patching. Thomas Cameron, Chief Architect, Western US, Red Hat [email protected] twitter: thomasdcameron IRC: choirboy on Freenode
Intro to Patching Thomas Cameron, Chief Architect, Western US, Red Hat [email protected] twitter: thomasdcameron IRC: choirboy on Freenode RHCA, RHCSS, RHCDS, RHCVA, RHCX Agenda 2 Who am I? Who are you?
How to hack a website with Metasploit
How to hack a website with Metasploit By Sumedt Jitpukdebodin Normally, Penetration Tester or a Hacker use Metasploit to exploit vulnerability services in the target server or to create a payload to make
WordPress SEO 101 http://philacsinclair.com
WordPress SEO 101 http://philacsinclair.com Copyright All rights reserved worldwide. YOUR RIGHTS: This book is restricted to your personal use only. It does not come with any other rights. LEGAL DISCLAIMER:
Websense Support Webinar: Questions and Answers
Websense Support Webinar: Questions and Answers Configuring Websense Web Security v7 with Your Directory Service Can updating to Native Mode from Active Directory (AD) Mixed Mode affect transparent user
Using your Drupal Website Book 1 - Drupal Basics
Book 1 - Drupal Basics By Karl Binder, The Adhere Creative Ltd. 2010. This handbook was written by Karl Binder from The Adhere Creative Ltd as a beginners user guide to using a Drupal built website. It
ICCM Reseller Web site Plan Features
ICCM Reseller Web site Plan Features Reseller Plan Feature list RVSitebuilder Website Builder Addon Cgi Scripts Addon Domain Manager Advanced Guestbook Agora Shopping Cart Analog Stats Email Authentication
Web Application Attacks And WAF Evasion
Web Application Attacks And WAF Evasion Ahmed ALaa (EG-CERT) 19 March 2013 What Are We Going To Talk About? - introduction to web attacks - OWASP organization - OWASP frameworks - Crawling & info. gathering
CHAPTER 5 INTELLIGENT TECHNIQUES TO PREVENT SQL INJECTION ATTACKS
66 CHAPTER 5 INTELLIGENT TECHNIQUES TO PREVENT SQL INJECTION ATTACKS 5.1 INTRODUCTION In this research work, two new techniques have been proposed for addressing the problem of SQL injection attacks, one
SSL and Browsers: The Pillars of Broken Security
SSL and Browsers: The Pillars of Broken Security Ivan Ristic Wolfgang Kandek Qualys, Inc. Session ID: TECH-403 Session Classification: Intermediate SSL, TLS, And PKI SSL (or TLS, if you prefer) is the
Penetration Testing Report Client: Business Solutions June 15 th 2015
Penetration Testing Report Client: Business Solutions June 15 th 2015 Acumen Innovations 80 S.W 8 th St Suite 2000 Miami, FL 33130 United States of America Tel: 1-888-995-7803 Email: [email protected]
State of The Art: Automated Black Box Web Application Vulnerability Testing. Jason Bau, Elie Bursztein, Divij Gupta, John Mitchell
Stanford Computer Security Lab State of The Art: Automated Black Box Web Application Vulnerability Testing, Elie Bursztein, Divij Gupta, John Mitchell Background Web Application Vulnerability Protection
Managing Latency in IPS Networks
Application Note Revision B McAfee Network Security Platform Managing Latency in IPS Networks Managing Latency in IPS Networks McAfee Network Security Platform provides you with a set of pre-defined recommended
HAProxy. Free, Fast High Availability and Load Balancing. Adam Thornton 10 September 2014
HAProxy Free, Fast High Availability and Load Balancing Adam Thornton 10 September 2014 What? HAProxy is a proxy for Layer 4 (TCP) or Layer 7 (HTTP) traffic GPLv2 http://www.haproxy.org Disclaimer: I don't
RRLC uses Google Apps for Nonprofits for. Email Calendar Groups (listservs) Drive (file sharing) Google+ Analytics (web statistics) YouTube
RRLC uses Google Apps for Nonprofits for Email Calendar Groups (listservs) Drive (file sharing) Google+ Analytics (web statistics) YouTube Is Google for Nonprofits right for my organization? First, determine
How To Build An Intranet In Sensesnet.Com
Sense/Net 6 Evaluation Guide How to build a simple list-based Intranet? Contents 1 Basic principles... 4 1.1 Workspaces... 4 1.2 Lists... 4 1.3 Check-out/Check-in... 5 1.4 Version control... 5 1.5 Simple
Security Products Development. Leon Juranic [email protected]
Security Products Development Leon Juranic [email protected] Security Products Development Q: Why I picked this boring topic at all? A: Avoidance of any hackingrelated topics for fsec (khm.) :) Security
Application Intrusion Detection
Application Intrusion Detection Drew Miller Black Hat Consulting Application Intrusion Detection Introduction Mitigating Exposures Monitoring Exposures Response Times Proactive Risk Analysis Summary Introduction
EXTRA. Vulnerability scanners are indispensable both VULNERABILITY SCANNER
Vulnerability scanners are indispensable both for vulnerability assessments and penetration tests. One of the first things a tester does when faced with a network is fire up a network scanner or even several
Content Management System (Comparison between Top- Three CMS Platforms)
Content Management System (Comparison between Top- Three CMS Platforms) Documented By: Salar Abbas If creating a website for your business is on the horizon, you may be wondering which content management
How To Protect A Web Application From Attack From A Trusted Environment
Standard: Version: Date: Requirement: Author: PCI Data Security Standard (PCI DSS) 1.2 October 2008 6.6 PCI Security Standards Council Information Supplement: Application Reviews and Web Application Firewalls
ABC LTD EXTERNAL WEBSITE AND INFRASTRUCTURE IT HEALTH CHECK (ITHC) / PENETRATION TEST
ABC LTD EXTERNAL WEBSITE AND INFRASTRUCTURE IT HEALTH CHECK (ITHC) / PENETRATION TEST Performed Between Testing start date and end date By SSL247 Limited SSL247 Limited 63, Lisson Street Marylebone London
Forensic analysis of a Linux web server
Mathieu Deous Julien Reveret Forensic analysis of a Linux web server 1 Agenda Who are we? Performing forensic analysis on a compromised web server What to search, where, how? Logs but also dynamic analysis
Top HR Interview Question and Answers
1. Tell us something about yourself. Top HR Interview Question and Answers This is the first question, you can expect during any interview you face. This usually is a question to start the communication
HP Client Automation Standard Fast Track guide
HP Client Automation Standard Fast Track guide Background Client Automation Version This document is designed to be used as a fast track guide to installing and configuring Hewlett Packard Client Automation
Footprinting and Reconnaissance Tools
Footprinting and Reconnaissance Tools Topic 1: Common Port Scanning Techniques Do some research on computer ports that are most often scanned by hackers. Identify a port scanning exploit that is interesting
KEN VAN WYK. Fundamentals of Secure Coding and how to break Software MARCH 19-23, 2007 RESIDENZA DI RIPETTA - VIA DI RIPETTA, 231 ROME (ITALY)
TECHNOLOGY TRANSFER PRESENTS KEN VAN WYK Fundamentals of Secure Coding and how to break Software MARCH 19-23, 2007 RESIDENZA DI RIPETTA - VIA DI RIPETTA, 231 ROME (ITALY) [email protected] www.technologytransfer.it
Is the Scanning of Computer Networks Dangerous?
Baltic DB & IS 2008 Tallinn University of Technology Is the Scanning of Computer Networks Dangerous? 5.06.2008 The talk is about... The need of network scanning, its main principles and related problems
How I Learned to Stop Worrying and Love Compliance Ron Gula, CEO Tenable Network Security
How I Learned to Stop Worrying and Love Compliance Ron Gula, CEO Tenable Network Security PART 1 - COMPLIANCE STANDARDS PART 2 SECURITY IMPACT THEMES BUILD A MODEL THEMES MONITOR FOR FAILURE THEMES DEMONSTRATE
Secret Server Qualys Integration Guide
Secret Server Qualys Integration Guide Table of Contents Secret Server and Qualys Cloud Platform... 2 Authenticated vs. Unauthenticated Scanning... 2 What are the Advantages?... 2 Integrating Secret Server
Web Application Firewall Profiling and Evasion. Michael Ritter Cyber Risk Services Deloitte
Web Application Firewall Profiling and Evasion Michael Ritter Cyber Risk Services Deloitte Content 1. Introduction 2. WAF Basics 3. Identifying a WAF 4. WAF detection tools 5. WAF bypassing methods 6.
Information Supplement: Requirement 6.6 Code Reviews and Application Firewalls Clarified
Standard: Data Security Standard (DSS) Requirement: 6.6 Date: February 2008 Information Supplement: Requirement 6.6 Code Reviews and Application Firewalls Clarified Release date: 2008-04-15 General PCI
Malware Analysis Quiz 6
Malware Analysis Quiz 6 1. Are these files packed? If so, which packer? The file is not packed, as running the command strings shelll reveals a number of interesting character sequences, such as: irc.ircnet.net
Security of IPv6 and DNSSEC for penetration testers
Security of IPv6 and DNSSEC for penetration testers Vesselin Hadjitodorov Master education System and Network Engineering June 30, 2011 Agenda Introduction DNSSEC security IPv6 security Conclusion Questions
Penetration Testing Scope Factors
1 NZ PAPER LINUX AND WEB APPLICATION SECURITY Penetration Testing Scope Factors April 20, 2013 Zeeshan Khan NZPAPER.BLOGSPOT.COM 2 Abstract: This paper contains the key points of penetration testing. All
Assessing your SEO Situation By: Wyatt Jozwowski
Assessing your SEO Situation By: Wyatt Jozwowski So you have a website Doesn t matter if it s your own website or your client s Either way, you ll have to assess the situation. There are a few things that
YubiKey Authentication Module Design Guideline
YubiKey Authentication Module Design Guideline Yubico Application Note Version 1.0 May 7, 2012 Introduction Disclaimer Yubico is the leading provider of simple, open online identity protection. The company
Secure in 2010? Broken in 2011!
Secure in 2010? Broken in 2011! Matias Madou Principal Security Researcher Abstract In 2010, a security research firm stumbled on a couple of vulnerabilities in Apache OFBiz, a widely used open source
INTRODUCTION: PENETRATION TEST A BUSINESS PERSPECTIVE:
PENETRATION TESTING A SYSTEMATIC APPROACH INTRODUCTION: The basic idea behind writing this article was to put forward a systematic approach that needs to be followed to perform a successful penetration
