labs Attacking JAVA Serialized Communication By: Manish S. Saindane
|
|
|
- Basil Dorsey
- 10 years ago
- Views:
Transcription
1 ATTACK & DEFENSE labs Attacking JAVA Serialized Communication By: Manish S. Saindane Black Hat Europe 2010
2 2 Introduction Many applications written in JAVA make use of Object Serialization to transfer full blown objects across the network via byte streams or to store them on the file system. How Object Serialization works is beyond the scope of this whitepaper. To understand the Serialization of objects and details of the Serialization protocol check the Java Serialization Protocol Specification provided by Sun (Sun Microsystems). This whitepaper introduces a new technique to intercept such Serialized communication and modify it to perform penetration testing with almost the same ease as testing regular web applications. This technique is more efficient than the currently used methods. It will give the penetration tester the same control and power that an application developer has without most of the drawbacks that are present in the current methods used for testing applications communicating via Serialized Objects. Usually this kind of communication is used by Thick/Smart Clients (JAVA Applets, Swing/SWT clients, etc.) to transfer data to the Application server. The communication could be over HTTP or any other protocol. Let s assume HTTP communication for simplicity. Unlike typical web applications, these clients do not pass data in plain text as part of POST requests. The POST data usually consists of Serialized Objects, either passed as an octet-stream or in a g-zipped format. The Current Scenario and Challenges Faced While testing applications communicating via Serialized Objects, current tools/application interception proxies allow very limited functionality to intercept and modify the requests and responses like in typical web applications. There has been some good work done so far to try and tackle such applications. Some of the methods available till date include: Modifying raw HEX data in the POST request using a HEX editor and pass it to the server. Decompiling client-side code and possibly modifying and rebuilding it. Injecting a BeanShell within the client to inspect and modify objects dynamically, introduced by Stephen de Vries from Corsaire Ltd. (Vries, 2006). And finally a very interesting technique called Runtime Protocol Analysis, introduced by Shay Chen from Hacktics Ltd. at an OWASP meet (Chen, 2008). Let us first quickly go through each of the above mentioned techniques. This is very important in order to highlight the work done by some absolutely fine researchers and it will also give us a fair idea of what each technique allows us to do and some possible obstacles that we could face while using them in the real world. While modifying the HEX data is the most simplest of them all, it is very limited. We cannot inspect or modify the current objects or its variables; especially if the variables are not of the simplest form. For example when the variables themselves are some custom objects. It is only possible to tamper with simple variables like integers and strings. But there is a catch. By directly modifying the HEX
3 3 data, we might corrupt the Serialized Byte Stream which may result in the application server throwing an error. NOTE: Most of the strings within the serialized data are encoded in modified UTF-8 format in which every string is preceded by 2-byte length information (for strings having a length less than bytes) of the string. Hence if you modify any string in HEX, you also need to modify the 2-byte length that precedes the string to reflect the new length. Also existing interception proxies usually incorporate very basic HEX editors and working with such data becomes difficult in these cases. Decompiling the classes within the client-side jars allows us to carefully study the application logic and identify threats that lie within the client-side code. Things like hardcoded values, sensitive functions, cryptographic algorithms and other client-side validation controls can be identified and used to plan out attacks. Though, decompiling code may not always be that easy for applications making use of obfuscation techniques. There are some really neat decompilers available which might allow us to decompile code which uses simpler obfuscation techniques. Some of the popular decompilers available include JAD, Jode, JD and DJ Java Decompiler. It might be easy to decompile and possibly modify this client side code, rebuild and package it for smaller applications. But the same might not be the case while working with huge enterprise applications. Also if the signature for each client side jars is validated on the server side, then this technique may be futile. This check could possibly be bypassed by intercepting the traffic and modifying the signature value being passed with that of the original jar. The technique described by Stephen is quite interesting in which he has explained the use of BeanShell scripting language which he uses to plug in to a client side JAVA application. Though the technique is interesting, it is much broader than the current topic we are discussing i.e. to analyze and tamper Serialized Communication. This technique could be handy in identifying client-side security controls. I recommend the readers to go through his white paper for more details. The only pre-requisites I see for this technique, is that the penetration tester must be comfortable handling the JAVA language and basic compiling techniques. Though the demonstration in the paper looks simple enough, I have yet to try this out myself on an enterprise level application and check its feasibility and simplicity. The final technique out of the above mentioned techniques that I m going to discuss here is somewhere closer to our objective. It is called RPA (Runtime Protocol Analysis) which was introduced by Shay Chen at an OWASP Israel meet. In this technique he discussed the idea of creating a custom runtime protocol analyzer to read data from the serialized objects, analyze them, modify and then send the request to the destination server. For this technique to work, the client communication is first sniffed over the network using sniffers like Wireshark, etc. and then broken down into individual request packets. These individual requests are then modified and sent to the custom protocol analyzer. To understand the complete process in detail, please refer to his presentation. The only drawback (as I see) with this method is that the whole process is not seamless. There are too many steps involved viz. sniffing communication, spitting into individual packets, casting
4 4 exceptions to analyze the protocol structure, etc. This becomes very tedious when conducting a penetration test on a huge enterprise application. It would be much easier for a pen-tester to have some kind of a tool which uses the above mentioned technique but with the same ease as that available while testing normal web applications. Also since the packets are split as individual requests, it might not work for scenarios where multiple requests/responses are to be analyzed. There is one more important point I would like to mention before we move ahead. Many a times while conducting a penetration test, I have found applications which do not contain any configuration settings to specify the upstream proxy for communication. In such a scenario, a simple sniffer could be written to capture the traffic being sent to the destination application server which can be used to forward a copy of the requests to our local interception proxy. For example a utility specifically developed for this purpose called Sniff-n-Spit can be downloaded from here. For most purpose I prefer using Burp Proxy as my interception proxy as it provides some really good utilities to play around with. It also has an option to forward the intercepted request to any host. Thus the copy of the requests passed by our sniffer to the interception proxy may be successfully forwarded to the destination server. Suggested Solution In this article I would be building up on the already available techniques that we discussed above and try to optimize and simplify the whole process. The technique that I m proposing involves utilizing the existing application interception proxies and adding functionalities (by means of writing custom plug-ins) specific to those that would be necessary for penetration testing of JAVA Serialized Communication. The setup for this solution would look like this: Thick Client Application Interception Proxy Application Server JRuby Shell
5 5 In this technique we will try to overcome the drawbacks of the currently available methods by utilizing alternative technologies to achieve similar results. Also the core objective of this technique is to be as seamless as possible and give enough power to the penetration tester to experiment and achieve the desired results. In RPA, we had to explicitly cast the value of the object derived using the readobject method and induce an error to find the actual class of the object. This step was necessary because JAVA is a statically typed language and knowing the type of an object beforehand is necessary. To remove this hindrance we can make use of JRuby which is a dynamically typed language (i.e. the type of a variable depends upon what was last assigned to it). We will build the analyzer in JRuby instead. Other advantages of using JRuby are: It has an easier syntax. Ruby programmers (as well as people with non-programming background) would be fairly at ease with this language. We can make use of almost all existing JAVA libraries and it runs on the JVM. It provides a nice Interactive shell which allows the execution of Ruby as well as JAVA code with immediate response and in real-time. We can use it as a plug-in system for existing JAVA applications. For this demonstration purpose I will be making use of Burp Proxy as it exposes some APIs to interact with the suite and write your own plug-ins in JAVA using the IBurpExtender interface. This interface has been ported to JRuby by Eric Monti (Thanks for modifying the code on request for handling binary data) from Matasano Security and it is called Buby (Monti). For more information on this please check the references below. Free-edition of BurpSuite version was used while writing this paper. I have written a custom plug-in for Burp specifically for this purpose which induces an interactive JRuby shell on every request/response (containing serialized data) that is captured by the interception proxy (NOTE: The Interception can be stopped or started for individual requests using the custom button provided by the plug-in). Also the object is read from the Serialized Byte Stream and made available as a variable in this shell for the penetration tester to work with. The plug-in also includes some helper methods that simplifies and reduces the penetration tester s work. The methods made available by this plug-in allows the penetration tester to print the structure of the object read from the Serialized Byte Stream, and gain important information like the constructors available, the variables defined and also the methods defined within the current object. The plug-in internally makes use of JAVA De-serialization and Reflection APIs for accessing the entire object and allows access to its private and protected variables. Using the methods provided by the plug-in along with the methods exposed by the current object, the penetration tester can easily view/modify the values of these variables and craft custom objects all together. For a detailed demonstration of the whole process with example, please check this video. In this video we demonstrate a sample application which makes use of Serialized Objects for transferring data from the client to server and vice-versa. While the video is self explanatory, the interesting points to note are the way we are able to inject an interactive JRuby shell within the interception proxy to work on individual requests/responses. Also it may be the case that there are no setter
6 6 (setxxx) methods available in the client classes to change the values of the variables within the class. In that case, the helper methods from the plug-in can be used to access the private variables and modify their values. Once we are satisfied with the results, we can re-serialize this new object and write it to the ObjectOutputStream and send it to the destination server. Thus using the currently available tools in our arsenal; customizing and utilizing alternative technologies, we are able to test JAVA Serialized Communication. This way we can get an almost seamless method to test JAVA Serialized Communication without having to worry about sniffing the traffic, splitting it into individual packets, modifying HEX bytes and setting up Tomcat servers, etc. All we have to know is some basics in JRuby and the rest (i.e. JAVA Object Serialization & Reflection) is taken care of by this technique and the plug-in. The technique described here not only tries to simplify most of the penetration tester s work but also gives him/her complete freedom to write JRuby code at runtime using the injected shell to analyze and modify the JAVA Objects, thus making this a very powerful combination of simplicity and customization. This is just a small example of what can be done. It can very well be extended for other non-http protocols by implementing a custom proxy written in JRuby (or JAVA plus extended with JRuby). Check out the OWASP proxy project for an API to build your own proxy. References Chen, S. (2008). Achilles heel Hacking Through Java Protocols. OWASP Israel. Herzliya. Monti, E. (n.d.). Buby. Retrieved from Sun Microsystems. (n.d.). Java Object Serialization Specification. Retrieved from sun.com: Vries, S. d. (2006, June 15). Assessing JAVA Clients with the BeanShell. Retrieved from Corsaire:
JavaSnoop: How to hack anything in Java
JavaSnoop: How to hack anything in Java Arshan Dabirsiaghi Director of Research, Aspect Security [email protected] Blackhat USA, Las Vegas, NV 2010 Abstract. Many applications in the
Mobile Application Hacking for ios. 3-Day Hands-On Course. Syllabus
Mobile Application Hacking for ios 3-Day Hands-On Course Syllabus Course description ios Mobile Application Hacking 3-Day Hands-On Course This course will focus on the techniques and tools for testing
Thick Client Application Security
Thick Client Application Security Arindam Mandal ([email protected]) (http://www.paladion.net) January 2005 This paper discusses the critical vulnerabilities and corresponding risks in a two
Information Security. Training
Information Security Training Importance of Information Security Training There is only one way to keep your product plans safe and that is by having a trained, aware and a conscientious workforce. - Kevin
Sandy. The Malicious Exploit Analysis. http://exploit-analysis.com/ Static Analysis and Dynamic exploit analysis. Garage4Hackers
Sandy The Malicious Exploit Analysis. http://exploit-analysis.com/ Static Analysis and Dynamic exploit analysis About Me! I work as a Researcher for a Global Threat Research firm.! Spoke at the few security
Security Assessment of Waratek AppSecurity for Java. Executive Summary
Security Assessment of Waratek AppSecurity for Java Executive Summary ExecutiveSummary Security Assessment of Waratek AppSecurity for Java! Introduction! Between September and November 2014 BCC Risk Advisory
Mobile Application Hacking for Android and iphone. 4-Day Hands-On Course. Syllabus
Mobile Application Hacking for Android and iphone 4-Day Hands-On Course Syllabus Android and iphone Mobile Application Hacking 4-Day Hands-On Course Course description This course will focus on the techniques
AppUse - Android Pentest Platform Unified
AppUse - Android Pentest Platform Unified Standalone Environment AppUse is designed to be a weaponized environment for Android application penetration testing. It is a unique, free, and rich platform aimed
Secure Web Application Coding Team Introductory Meeting December 1, 2005 1:00 2:00PM Bits & Pieces Room, Sansom West Room 306 Agenda
Secure Web Application Coding Team Introductory Meeting December 1, 2005 1:00 2:00PM Bits & Pieces Room, Sansom West Room 306 Agenda 1. Introductions for new members (5 minutes) 2. Name of group 3. Current
Application Security Testing
Tstsec - Version: 1 09 July 2016 Application Security Testing Application Security Testing Tstsec - Version: 1 4 days Course Description: We are living in a world of data and communication, in which the
Lecture 7: Class design for security
Lecture topics Class design for security Visibility of classes, fields, and methods Implications of using inner classes Mutability Design for sending objects across JVMs (serialization) Visibility modifiers
Developing Web Services with Eclipse and Open Source. Claire Rogers Developer Resources and Partner Enablement, HP February, 2004
Developing Web Services with Eclipse and Open Source Claire Rogers Developer Resources and Partner Enablement, HP February, 2004 Introduction! Many companies investigating the use of web services! Cost
Secure in 2010? Broken in 2011!
Secure in 2010? Broken in 2011! Matias Madou Principal Security Researcher Abstract In 2010, a security research firm stumbled on a couple of vulnerabilities in Apache OFBiz, a widely used open source
JAVA WEB START OVERVIEW
JAVA WEB START OVERVIEW White Paper May 2005 Sun Microsystems, Inc. Table of Contents Table of Contents 1 Introduction................................................................. 1 2 A Java Web Start
WIRIS quizzes web services Getting started with PHP and Java
WIRIS quizzes web services Getting started with PHP and Java Document Release: 1.3 2011 march, Maths for More www.wiris.com Summary This document provides client examples for PHP and Java. Contents WIRIS
Web application testing
CL-WTS Web application testing Classroom 2 days Testing plays a very important role in ensuring security and robustness of web applications. Various approaches from high level auditing through penetration
Recon and Mapping Tools and Exploitation Tools in SamuraiWTF Report section Nick Robbins
Recon and Mapping Tools and Exploitation Tools in SamuraiWTF Report section Nick Robbins During initial stages of penetration testing it is essential to build a strong information foundation before you
Figure 1. Wireshark Menu Bar
Packet Capture In this article, we shall cover the basic working of a sniffer, to capture packets for analyzing the traffic. If an analyst does not have working skills of a packet sniffer to a certain
Computer Networking LAB 2 HTTP
Computer Networking LAB 2 HTTP 1 OBJECTIVES The basic GET/response interaction HTTP message formats Retrieving large HTML files Retrieving HTML files with embedded objects HTTP authentication and security
Cyber Security Challenge Australia 2014
Cyber Security Challenge Australia 2014 www.cyberchallenge.com.au CySCA2014 Web Penetration Testing Writeup Background: Pentest the web server that is hosted in the environment at www.fortcerts.cysca Web
Chapter 14 Analyzing Network Traffic. Ed Crowley
Chapter 14 Analyzing Network Traffic Ed Crowley 10 Topics Finding Network Based Evidence Network Analysis Tools Ethereal Reassembling Sessions Using Wireshark Network Monitoring Intro Once full content
SYLLABUS MOBILE APPLICATION SECURITY AND PENETRATION TESTING. MASPT at a glance: v1.0 (28/01/2014) 10 highly practical modules
Must have skills in any penetration tester's arsenal. MASPT at a glance: 10 highly practical modules 4 hours of video material 1200+ interactive slides 20 Applications to practice with Leads to emapt certification
ABSTRACT' INTRODUCTION' COMMON'SECURITY'MISTAKES'' Reverse Engineering ios Applications
Reverse Engineering ios Applications Drew Branch, Independent Security Evaluators, Associate Security Analyst ABSTRACT' Mobile applications are a part of nearly everyone s life, and most use multiple mobile
The purpose of this report is to educate our prospective clients about capabilities of Hackers Locked.
This sample report is published with prior consent of our client in view of the fact that the current release of this web application is three major releases ahead in its life cycle. Issues pointed out
Pentesting Android Apps. Sneha Rajguru (@Sneharajguru)
Pentesting Android Apps Sneha Rajguru (@Sneharajguru) About Me Penetration Tester Web, Mobile and Infrastructure applications, Secure coding ( part time do secure code analysis), CTF challenge writer (at
Secure Web Development Teaching Modules 1. Security Testing. 1.1 Security Practices for Software Verification
Secure Web Development Teaching Modules 1 Security Testing Contents 1 Concepts... 1 1.1 Security Practices for Software Verification... 1 1.2 Software Security Testing... 2 2 Labs Objectives... 2 3 Lab
Hacking for Fun and Profit
Hacking for Fun and Profit W3Lc0me to Th3 Fu1ur How to break stuff How to trade How to hide Help! Page 1 Knowing the enemy Page 2 E1 - Who am I ^ Ivan Bütler, Uznach, 31.12.1970 ^ Speaker at Blackhat 2008
Java Application Developer Certificate Program Competencies
Java Application Developer Certificate Program Competencies After completing the following units, you will be able to: Basic Programming Logic Explain the steps involved in the program development cycle
Creating a Java application using Perfect Developer and the Java Develo...
1 of 10 15/02/2010 17:41 Creating a Java application using Perfect Developer and the Java Development Kit Introduction Perfect Developer has the facility to execute pre- and post-build steps whenever the
Detecting Web Application Vulnerabilities Using Open Source Means. OWASP 3rd Free / Libre / Open Source Software (FLOSS) Conference 27/5/2008
Detecting Web Application Vulnerabilities Using Open Source Means OWASP 3rd Free / Libre / Open Source Software (FLOSS) Conference 27/5/2008 Kostas Papapanagiotou Committee Member OWASP Greek Chapter [email protected]
Penetration Testing with Kali Linux
Penetration Testing with Kali Linux PWK Copyright 2014 Offensive Security Ltd. All rights reserved. Page 1 of 11 All rights reserved to Offensive Security, 2014 No part of this publication, in whole or
OWASP NZ Day 2011 Testing Mobile Applications
OWASP NZ Day 2011 Testing Mobile Applications Presenter: Nick von Dadelszen Date: 7 th July 2011 Company: Lateral Security (IT) Services Limited Company overview Company Lateral Security (IT) Services
ASL IT SECURITY BEGINNERS WEB HACKING AND EXPLOITATION
ASL IT SECURITY BEGINNERS WEB HACKING AND EXPLOITATION V 2.0 A S L I T S e c u r i t y P v t L t d. Page 1 Overview: Learn the various attacks like sql injections, cross site scripting, command execution
Chapter 2 TOPOLOGY SELECTION. SYS-ED/ Computer Education Techniques, Inc.
Chapter 2 TOPOLOGY SELECTION SYS-ED/ Computer Education Techniques, Inc. Objectives You will learn: Topology selection criteria. Perform a comparison of topology selection criteria. WebSphere component
<Insert Picture Here> What's New in NetBeans IDE 7.2
Slide 1 What's New in NetBeans IDE 7.2 The following is intended to outline our general product direction. It is intended for information purposes only, and may not be incorporated
Proof of Concept. A New Data Validation Technique for Microsoft ASP.NET Web Applications. Foundstone Professional Services
Proof of Concept A New Data Validation Technique for Microsoft ASP.NET Web Applications Foundstone Professional Services February 2005 Introduction Despite significant awareness of security issues like
Vulnerability Assessment and Penetration Testing
Vulnerability Assessment and Penetration Testing Module 1: Vulnerability Assessment & Penetration Testing: Introduction 1.1 Brief Introduction of Linux 1.2 About Vulnerability Assessment and Penetration
JAVA 2 Network Security
JAVA 2 Network Security M A R C O PISTOIA DUANE F. RELLER DEEPAK GUPTA MILIND NAGNUR ASHOK K. RAMANI PTR, UPPER http://www.phptr.com PRENTICE HALL SADDLE RIVER, NEW JERSEY 07458 Contents Foreword Preface
Getting started with OWASP WebGoat 4.0 and SOAPUI.
Getting started with OWASP WebGoat 4.0 and SOAPUI. Hacking web services, an introduction. Version 1.0 by Philippe Bogaerts [email protected] www.radarhack.com Reviewed by Erwin Geirnaert
Make a folder named Lab3. We will be using Unix redirection commands to create several output files in that folder.
CMSC 355 Lab 3 : Penetration Testing Tools Due: September 31, 2010 In the previous lab, we used some basic system administration tools to figure out which programs where running on a system and which files
Introducing the Microsoft IIS deployment guide
Deployment Guide Deploying Microsoft Internet Information Services with the BIG-IP System Introducing the Microsoft IIS deployment guide F5 s BIG-IP system can increase the existing benefits of deploying
A Tool for Evaluation and Optimization of Web Application Performance
A Tool for Evaluation and Optimization of Web Application Performance Tomáš Černý 1 [email protected] Michael J. Donahoo 2 [email protected] Abstract: One of the main goals of web application
BDD FOR AUTOMATING WEB APPLICATION TESTING. Stephen de Vries
BDD FOR AUTOMATING WEB APPLICATION TESTING Stephen de Vries www.continuumsecurity.net INTRODUCTION Security Testing of web applications, both in the form of automated scanning and manual security assessment
Project Software Security: Securing SendMail with JAAS and Polymer
Project Software Security: Securing SendMail with JAAS and Polymer Frank van Vliet [email protected] Diego Ortiz Yepes [email protected] Jornt van der Wiel [email protected] Guido Kok
Safe network analysis
Safe network analysis Generating network traffic captures within a virtual network. Presented by Andrew Martin 1 Introduction What is a sniffer How does sniffing work Usages Scenarios Building safe repositories
VmSat (VoIP monitoring & Security assessment tool)
VmSat (VoIP monitoring & Security assessment tool) College: Pune Institute of Computer Technology, Pune Team Members: Krishna S. Ghodke Saurabh A. Gawande Roshan R. Ghumare Sumant D. Kukkar Sponsored By
Bypassing CAPTCHAs by Impersonating CAPTCHA Providers
Bypassing CAPTCHAs by Impersonating CAPTCHA Providers Author: Gursev Singh Kalra Principal Consultant Foundstone Professional Services Table of Contents Bypassing CAPTCHAs by Impersonating CAPTCHA Providers...
Ethical Hacking as a Professional Penetration Testing Technique
Ethical Hacking as a Professional Penetration Testing Technique Rochester ISSA Chapter Rochester OWASP Chapter - Durkee Consulting, Inc. [email protected] 2 Background Founder of Durkee Consulting since 1996
Detecting and Defending Against Security Vulnerabilities for Web 2.0 Applications
Detecting and Defending Against Security Vulnerabilities for Web 2.0 Applications Ray Lai, Intuit TS-5358 Share experience how to detect and defend security vulnerabilities in Web 2.0 applications using
How To Burp David Brown
How To Burp David Brown Senior Security Engineer Security Innovation In case you want to follow along https://portswigger.net/burp/download.html What is Burp? An HTTP Proxy and other things Built by lazy
How To Manage Web Content Management System (Wcm)
WEB CONTENT MANAGEMENT SYSTEM February 2008 The Government of the Hong Kong Special Administrative Region The contents of this document remain the property of, and may not be reproduced in whole or in
PTSv2 in pills: The Best First for Beginners who want to become Penetration Testers. Self-paced, online, flexible access
The Best First for Beginners who want to become Penetration Testers PTSv2 in pills: Self-paced, online, flexible access 900+ interactive slides and 3 hours of video material Interactive and guided learning
Detecting and Exploiting XSS with Xenotix XSS Exploit Framework
Detecting and Exploiting XSS with Xenotix XSS Exploit Framework [email protected] keralacyberforce.in Introduction Cross Site Scripting or XSS vulnerabilities have been reported and exploited since 1990s.
Real World Web Service Testing For Web Hackers
Real World Web Service Testing For Web Hackers TOM ESTON» Senior Security Consultant SecureState» Web Application / Network Penetration Tester» Founder of SocialMediaSecurity.com» Previous Security Research
Bypassing SSL Pinning on Android via Reverse Engineering
Bypassing SSL Pinning on Android via Reverse Engineering Denis Andzakovic Security-Assessment.com 15 May 2014 Table of Contents Bypassing SSL Pinning on Android via Reverse Engineering... 1 Introduction...
Introducing the BIG-IP and SharePoint Portal Server 2003 configuration
Deployment Guide Deploying Microsoft SharePoint Portal Server 2003 and the F5 BIG-IP System Introducing the BIG-IP and SharePoint Portal Server 2003 configuration F5 and Microsoft have collaborated on
Developing a Web Server Platform with SAPI Support for AJAX RPC using JSON
Revista Informatica Economică, nr. 4 (44)/2007 45 Developing a Web Server Platform with SAPI Support for AJAX RPC using JSON Iulian ILIE-NEMEDI, Bucharest, Romania, [email protected] Writing a custom web
Detecting Threats in Network Security by Analyzing Network Packets using Wireshark
1 st International Conference of Recent Trends in Information and Communication Technologies Detecting Threats in Network Security by Analyzing Network Packets using Wireshark Abdulalem Ali *, Arafat Al-Dhaqm,
STABLE & SECURE BANK lab writeup. Page 1 of 21
STABLE & SECURE BANK lab writeup 1 of 21 Penetrating an imaginary bank through real present-date security vulnerabilities PENTESTIT, a Russian Information Security company has launched its new, eighth
Application security testing: Protecting your application and data
E-Book Application security testing: Protecting your application and data Application security testing is critical in ensuring your data and application is safe from security attack. This ebook offers
Bank Hacking Live! Ofer Maor CTO, Hacktics Ltd. ATC-4, 12 Jun 2006, 4:30PM
Bank Hacking Live! Ofer Maor CTO, Hacktics Ltd. ATC-4, 12 Jun 2006, 4:30PM Agenda Introduction to Application Hacking Demonstration of Attack Tool Common Web Application Attacks Live Bank Hacking Demonstration
Lecture 11 Web Application Security (part 1)
Lecture 11 Web Application Security (part 1) Computer and Network Security 4th of January 2016 Computer Science and Engineering Department CSE Dep, ACS, UPB Lecture 11, Web Application Security (part 1)
How To Protect A Web Application From Attack From A Trusted Environment
Standard: Version: Date: Requirement: Author: PCI Data Security Standard (PCI DSS) 1.2 October 2008 6.6 PCI Security Standards Council Information Supplement: Application Reviews and Web Application Firewalls
JavaScript static security analysis made easy with JSPrime
JavaScript static security analysis made easy with JSPrime Nishant Das Patnaik & Sarathi Sabyasachi Sahoo [email protected] & [email protected] JavaScript is the lingua-franca of Web 2.0 and, recently,
WEB SECURITY. Oriana Kondakciu 0054118 Software Engineering 4C03 Project
WEB SECURITY Oriana Kondakciu 0054118 Software Engineering 4C03 Project The Internet is a collection of networks, in which the web servers construct autonomous systems. The data routing infrastructure
https://elearn.zdresearch.com https://training.zdresearch.com/course/pentesting
https://elearn.zdresearch.com https://training.zdresearch.com/course/pentesting Chapter 1 1. Introducing Penetration Testing 1.1 What is penetration testing 1.2 Different types of test 1.2.1 External Tests
ASL IT Security Advanced Web Exploitation Kung Fu V2.0
ASL IT Security Advanced Web Exploitation Kung Fu V2.0 A S L I T S e c u r i t y P v t L t d. Page 1 Overview: There is a lot more in modern day web exploitation than the good old alert( xss ) and union
Tutorial: Load Testing with CLIF
Tutorial: Load Testing with CLIF Bruno Dillenseger, Orange Labs Learning the basic concepts and manipulation of the CLIF load testing platform. Focus on the Eclipse-based GUI. Menu Introduction about Load
Secured Communications using Linphone & Flexisip
Secured Communications using Linphone & Flexisip Solution description Office: Le Trident Bat D 34, avenue de l Europe 38100 Grenoble France Tel. : +33 (0)9 52 63 65 05 Headquarters: 12, allée des Genêts
Securing ios Applications. Dr. Bruce Sams, OPTIMAbit GmbH
Securing ios Applications Dr. Bruce Sams, OPTIMAbit GmbH About Me President of OPTIMAbit GmbH Responsible for > 200 Pentests per Year Ca 50 ios Pentests and code reviews in the last two years. Overview
Implementing Reverse Proxy Using Squid. Prepared By Visolve Squid Team
Implementing Reverse Proxy Using Squid Prepared By Visolve Squid Team Introduction What is Reverse Proxy Cache About Squid How Reverse Proxy Cache work Configuring Squid as Reverse Proxy Configuring Squid
The Benefits of Utilizing a Repository Manager
Sonatype Nexus TM Professional Whitepaper The Benefits of Utilizing a Repository Manager An Introduction to Sonatype Nexus TM Professional SONATYPE www.sonatype.com [email protected] +1 301-684-8080 12501
Load Balancing BEA WebLogic Servers with F5 Networks BIG-IP v9
Load Balancing BEA WebLogic Servers with F5 Networks BIG-IP v9 Introducing BIG-IP load balancing for BEA WebLogic Server Configuring the BIG-IP for load balancing WebLogic Servers Introducing BIG-IP load
Security Testing. Vulnerability Assessment vs Penetration Testing. Gabriel Mihai Tanase, Director KPMG Romania. 29 October 2014
Security Testing Vulnerability Assessment vs Penetration Testing Gabriel Mihai Tanase, Director KPMG Romania 29 October 2014 Agenda What is? Vulnerability Assessment Penetration Testing Acting as Conclusion
Penetration Testing. Types Black Box. Methods Automated Manual Hybrid. oless productive, more difficult White Box
Penetration Testing Penetration Testing Types Black Box oless productive, more difficult White Box oopen, team supported, typically internal osource available Gray Box (Grey Box) omixture of the two Methods
IBM Rational AppScan: Application security and risk management
IBM Software Security November 2011 IBM Rational AppScan: Application security and risk management Identify, prioritize, track and remediate critical security vulnerabilities and compliance demands 2 IBM
SE 4C03 Winter 2005 Firewall Design Principles. By: Kirk Crane
SE 4C03 Winter 2005 Firewall Design Principles By: Kirk Crane Firewall Design Principles By: Kirk Crane 9810533 Introduction Every network has a security policy that will specify what traffic is allowed
CYBER ATTACKS EXPLAINED: PACKET CRAFTING
CYBER ATTACKS EXPLAINED: PACKET CRAFTING Protect your FOSS-based IT infrastructure from packet crafting by learning more about it. In the previous articles in this series, we explored common infrastructure
What is Web Security? Motivation
[email protected] http://www.brucker.ch/ Information Security ETH Zürich Zürich, Switzerland Information Security Fundamentals March 23, 2004 The End Users View The Server Providers View What is Web
Information Supplement: Requirement 6.6 Code Reviews and Application Firewalls Clarified
Standard: Data Security Standard (DSS) Requirement: 6.6 Date: February 2008 Information Supplement: Requirement 6.6 Code Reviews and Application Firewalls Clarified Release date: 2008-04-15 General PCI
TUNNA. A tool designed to bypass firewall restrictions on remote webservers. By: Rodrigo Marcos Nikos Vassakis
TUNNA A tool designed to bypass firewall restrictions on remote webservers By: Rodrigo Marcos Nikos Vassakis Web Applications What a User sees Web Applications What a Penetration Tester sees 80/443 Firewall
Introduction to Computer Security
Introduction to Computer Security Web Application Security Pavel Laskov Wilhelm Schickard Institute for Computer Science Modern threat landscape The majority of modern vulnerabilities are found in web
EC-Council CAST CENTER FOR ADVANCED SECURITY TRAINING. CAST 619 Advanced SQLi Attacks and Countermeasures. Make The Difference CAST.
CENTER FOR ADVANCED SECURITY TRAINING 619 Advanced SQLi Attacks and Countermeasures Make The Difference About Center of Advanced Security Training () The rapidly evolving information security landscape
Wireshark Tutorial. Figure 1: Packet sniffer structure
Wireshark Tutorial INTRODUCTION The purpose of this document is to introduce the packet sniffer Wireshark. Wireshark would be used for the lab experiments. This document introduces the basic operation
Penetration Testing for iphone Applications Part 1
Penetration Testing for iphone Applications Part 1 This article focuses specifically on the techniques and tools that will help security professionals understand penetration testing methods for iphone
Newsletter - September 2014. T o o l s W a t c h T e a m NJ OUCHN & MJ SOLER
Newsletter - September 2014 T o o l s W a t c h T e a m NJ OUCHN & MJ SOLER Tools! Lots of Tools Released! During September 2014, we published 7 Posts with 2 News Tools. Organized by Date OWASP Xenotix
Web Application Security
E-SPIN PROFESSIONAL BOOK Vulnerability Management Web Application Security ALL THE PRACTICAL KNOW HOW AND HOW TO RELATED TO THE SUBJECT MATTERS. COMBATING THE WEB VULNERABILITY THREAT Editor s Summary
Android (in)security. Having fun with Android. Sarantis Makoudis
Android (in)security Having fun with Android Sarantis Makoudis About Me BSc in Digital Systems, University of Piraeus, 2010 MSc in Information Security, Royal Holloway, University of London,2012 Penetration
How to Rob an Online Bank (and get away with it)
How to Rob an Online Bank (and get away with it) Mitja Kolsek ACROS Security Session ID: HT-108 Session Classification: Intermediate 2 3 Evolution Of E-banking Attacks PAST-PRESENT FUTURE Back-End Server
Implementation of Web Application Firewall
Implementation of Web Application Firewall OuTian 1 Introduction Abstract Web 層 應 用 程 式 之 攻 擊 日 趨 嚴 重, 而 國 內 多 數 企 業 仍 不 知 該 如 何 以 資 安 設 備 阻 擋, 仍 在 採 購 傳 統 的 Firewall/IPS,
Deploying the BIG-IP LTM system and Microsoft Windows Server 2003 Terminal Services
Deployment Guide Deploying the BIG-IP System with Microsoft Windows Server 2003 Terminal Services Deploying the BIG-IP LTM system and Microsoft Windows Server 2003 Terminal Services Welcome to the BIG-IP
Cyber Security Workshop Ethical Web Hacking
Cyber Security Workshop Ethical Web Hacking May 2015 Setting up WebGoat and Burp Suite Hacking Challenges in WebGoat Concepts in Web Technologies and Ethical Hacking 1 P a g e Downloading WebGoat and Burp
(WAPT) Web Application Penetration Testing
(WAPT) Web Application Penetration Testing Module 0: Introduction 1. Introduction to the course. 2. How to get most out of the course 3. Resources you will need for the course 4. What is WAPT? Module 1:
