RACK911 Labs. Year in Review. May 6, 2014
|
|
|
- Samantha Sims
- 10 years ago
- Views:
Transcription
1 RACK911 Labs Year in Review May 6, 014
2 The security of the hosting industry has always been a concern of RACK911 and in May of 013 we decided to take a more proactive role by creating a new brand called RACK911 Labs that specializes in finding security vulnerabilities before the bad guys do. It's been exactly a year since the inception of RACK911 Labs and never in our wildest dreams did we expect to find out just how inherently dangerous the entire hosting industry is due to the use of insecure software, lazy software developers and pure incompetence. When people think of the hosting industry in general, they tend to only focus on the amount of hosting providers out there which would easily be measured in the thousands. What often gets overlooked is how many people are indirectly affected when a website gets compromised or when an entire server is compromised. There are over 950 million active websites in the world and it s safe to assume that a large percentage of them are hosted on shared, reseller and VPS hosting environments. It would also be safe to assume that the majority of the websites in a hosting environment are using a nonproprietary control panel that we are all familiar with. That's a significant amount of people who are part of the hosting eco system and that s why we decided that something had to be done. Until 013, we privately worked with companies to report security vulnerabilities and they would often take advantage of us by taking an unreasonably long time to issue patches and sometimes they wouldn t even bother. There would be no pressure for them to do anything and even worse, no accountability for their incompetence. We drew the line and said enough is enough! Too many of our friends, our colleagues and the general population are being needlessly put at risk by software developers who clearly don t care about their security and more importantly, the livelihoods of their customers. With all of the news in recent years about security breaches, customer s data being exposed and sold on the black market it is truly unacceptable for any software developer to not make security their top priority. Now that you understand how RACK911 Labs came about and why we are so passionate about security, we re going to go over some of our findings from the last twelve months. Statistics Over the last twelve months we have released 143 public security advisories with another 35 pending release any day now. We also have over 100 other advisories that were fixed privately through special arrangements with the software developer or were simply not released for various reasons. In total, we have been responsible for well over 50 security vulnerabilities most of which have been in commonly used hosting applications. When we release a security advisory we give each a severity rating based on the threat potential for the vulnerability. For example, if interactive root or admin access can be obtained then we will give it a high to critical rating. Whereas if the vulnerability is more of a nuisance and no data can be compromised, we will give it a low rating. Sometimes our ratings are in disagreement with the software developer, but for the most part we rate them accordingly based on our assessment of what can be done in reality and what can be done under theoretical situations. Page 1
3 Severity Ratings Critical High Medium Low Low Medium High Critical Total Out of the 143 public security advisories that we have already released, 7 of them were rated critical to indicate that a grave threat exists. There were 93 vulnerabilities that we classified as high meaning the potential for root or admin level attacks exist and then 0 were classified as medium to indicate that some level of data can be compromised. Only 3 vulnerabilities did we classify as low, all of which were nothing more than a nuisance attack with no threat to other users. When it came time to reporting the security vulnerabilities to the software developers, for the most part they responded in a timely manner to acknowledge the report. The average was 4 days from our first point of contact to them getting back to us. (We would prefer acknowledgement within 4 hours as that should really be the longest that it takes a software developer to respond to a report of a security vulnerability.) Average Days Acknowledgement Security Patch Released Security Patch Released Acknowledgement Days 18 4 Page
4 As for when it came to the software developer releasing a patch, the average was 18 days from our first point of contact. A lot can happen in 18 days and we find that number to be extremely concerning. To be fair, that number is higher than it should be based on a few companies who follow monthly release cycles which is a practice that we are viciously against when it comes to security patches. We are a strong believer that security patches need to be pushed out regardless of any release cycle and they need to be done so with the highest priority. If a software developer is made aware of an exploit that could cause serious harm to their customers, they need to work as fast as possible to get a patch released and if it s going to take a considerable amount of time, provide a temporary workaround if possible. Given that the hosting industry is 4/7, there is no excuse for software developers who don t have a security contact that is monitored around the clock. Unfortunately, we have encountered several companies who only maintain a security contact during normal business hours and we shudder to imagine what damage could be done if a zero day exploit were to be released on a weekend. The last statistic that we feel is important to talk about are the four most popular control panels in the hosting industry. When it came to who acknowledged our security vulnerabilities the fastest, almost all of them did so within 48 hours. It s worth noting that cpanel technically acknowledges all security vulnerabilities using an auto responder, but we measured when they manually got back to us to confirm our vulnerability not when they received it. Control Panels Plesk InterWorx DirectAdmin cpanel cpanel DirectAdmin InterWorx Plesk Days (Acknowledged) Days (Patch Released) Page 3
5 As you ll see with the chart above, the numbers are a bit all over the place but InterWorx was the fastest when it came to releasing security patches based on our reported vulnerabilities. On average, it took them 7 days from first point of contact to releasing a security patch which is very respectable. Along with their 4 hour average to acknowledge our security reports, we feel that InterWorx were the most effective of all the control panels when it came to handling security. Parallels Plesk was a bit slower, however, it s worth noting that we have a special arrangement with them and there were a few vulnerabilities that took considerably longer that we were not able to get an exact time frame on. Realistically, the 9 days from point of contact to releasing a security patch would have been higher had we been given the exact dates from them. cpanel came in third with a 36 day average to address security vulnerabilities. That number is high due to their monthly release schedule which we absolutely do not agree with. As mentioned earlier in this review, we don t feel that security patches should ever be done on a specific release schedule. We are hoping that in the future cpanel will forgo the monthly release schedule and consider something more efficient. DirectAdmin came in dead last with a 64 day average when it came to addressing our security vulnerabilities from first point of contact. There were a batch of security vulnerabilities present in their backup system that took a lengthy period of time to resolve as it required an extensive rewrite of the software. (The vulnerabilities were pretty serious and no doubt did require a long period of time to resolve, but we do believe that it could have been done a bit faster.) Vulnerabilities During our first year we have encountered 1 different types of security vulnerabilities within various hosting applications. Technically, that number should be higher but we are only counting our public security advisories and not anything found during the course of paid audits and other private arrangements that now make up the bulk of our security research work. The most common vulnerability that we managed to exploit was privilege escalations where we were able to obtain root or admin level access. We consider privilege escalations to be the most serious of security vulnerabilities simply due to the amount of access that an attacker can gain. In most cases, our privilege escalations gave us interactive access as if it were legitimately obtained making it difficult for an average systems administrator to detect. The second most common vulnerability that we encountered was arbitrary file accesses that allowed us to view sensitive files that our level of access should not permit. For example, in some cases we were able to send a carefully crafted request to an application and it would return the contents of /etc/shadow or a config file showing various database credentials. Other common vulnerabilities would be arbitrary command executions and hardlink / symlink race condition type attacks. Arbitrary command executions tend to be very dangerous as often times it s being done as a root level process, thus allowing the attacker to effectively take control of the server. Most of the hardlink / symlink race conditions we encountered also allowed us to gain root or admin level access. Page 4
6 XSS 7 Symlink Attack 5 SQL Injection 3 Privilege Escalation 31 Log Forging 3 Local File Inclusion Insecure File Permissions Input Validation Failure 8 8 Hardlink Attack 11 Directory Traversal Denial of Service CSRF Content Manipulation 4 Content Disclosure Authentication Bypass Arbitrary File Upload 1 1 Arbitrary File Overwrite 9 Arbitrary File Creation Arbitrary File Access 18 Arbitrary Command Execution 14 ACL Bypass A significant amount of vulnerabilities that we discover have one thing in common and that is the software developer has failed to sanitize the input and made the huge mistake of trusting the data being offered by the user. The most important advice that we give software developers is to always assume that the user and even other trusted employees has malicious intent. Every GET and POST request needs to Page 5
7 be sanitized and checked against ACL s to ensure that permissions are being followed so that the request cannot exceed their authority. As for when it comes to applications that perform file operations on a server, we always tell the software developer to drop permissions to the user when possible. Any time a root or admin level process writes to a user accessible directory, the risk for race conditions and other types of vulnerabilities is extremely high. So many of our vulnerabilities would have been prevented had the software developer stripped special characters from every field where they are not needed, properly escaped SQL queries or used prepared statements, and dropped permissions to the user when performing file operations under their home directories. Acceptance For the most part, when we report a security vulnerability to a software developer they are appreciative of our efforts and understand what we are trying to accomplish. There is usually a mutual understanding that the information we have presented to them is important for the security of their product and needs to be handled as such. We lay out clear guidelines to software developers who have never worked with us. There needs to be an understanding of the level of communication required, as in the company needs to acknowledge our report immediately and keep us updated on the status of a patch. There are also guidelines about what is acceptable in terms of responsible disclosure and if a software developer doesn t want to be upfront about the security patch with their customers, then we will do it for them in a very public way. Unfortunately, not everyone has been receptive to our work In a high profile incident that occurred in 013, a company that offers Alpha Master Reseller software thought it would be a good idea to suppress our work by threatening to sue us. That plan backfired after it ended up on Reddit and the thread on Web Hosting Talk currently shows over 130,000 views. (It's worth noting that the software in question is still vulnerable to several root exploits despite the developer saying otherwise.) While we haven t been threatened since, we still encounter some resistance from time to time in the form of companies failing to communicate with us or refusing to take any action in a timely manner. In situations like that, we are usually forced to take public action on Web Hosting Talk in hopes of bringing attention to the situation and making the software developer re-think their plan. Another issue that we occasionally come across are software developers who blatantly lie to their customers by telling them the security vulnerability isn t that bad. Then there are the times where the software developer will do everything right and get a patch out there as fast as possible, but call it a routine update as to not have to admit that their product had a security vulnerability. If you are a software developer and someone informs you about a security vulnerability in your product, you need to communicate with them and you need to communicate with your customers. Page 6
8 Pride has to take a back seat because the reality is; almost all software is going to have security vulnerabilities at some point. Your customers will appreciate your responsiveness and you can make a huge deal out of telling them how you proudly resolved a security vulnerability in a short amount of time. Turn a negative into a positive! Closing Thoughts Our goal for the next twelve months is to continue working with software developers in the hosting industry to ensure that their software remains secure. Every single day, even on weekends, we are doing extensive security research work to help achieve that. In addition to RACK911 Labs, we also run which is a mailing list to alert people of ongoing zero day threats and security advisories that affects the hosting industry. In the last eight months alone HostingSecList has grown to almost,000 unique subscribers with a lot of them being representatives of established hosting providers. You may never have heard of us, but it s safe to assume that you have been directly affected by our security research work. No one really thinks about security until something bad has happened and as self-serving as it is, we know that RACK911 Labs has made a significant impact within the hosting industry for the better. To everyone who supports our effort to help make the hosting industry secure, we thank you for your continued support and kind words. ~ Steven & Patrick ~ Page 7
3. Broken Account and Session Management. 4. Cross-Site Scripting (XSS) Flaws. Web browsers execute code sent from websites. Account Management
What is an? s Ten Most Critical Web Application Security Vulnerabilities Anthony LAI, CISSP, CISA Chapter Leader (Hong Kong) [email protected] Open Web Application Security Project http://www.owasp.org
Integrated Network Vulnerability Scanning & Penetration Testing SAINTcorporation.com
SAINT Integrated Network Vulnerability Scanning and Penetration Testing www.saintcorporation.com Introduction While network vulnerability scanning is an important tool in proactive network security, penetration
Securing shared hosting using CageFS
Securing shared hosting using CageFS Igor Seletskiy CEO, CloudLinux Linux OS based on RHEL source RPMs Binary compatible with RHEL 5.x/6.x and CentOS 5.x/6.x Made for Shared Hosting Companies Focus on
Check list for web developers
Check list for web developers Requirement Yes No Remarks 1. Input Validation 1.1) Have you done input validation for all the user inputs using white listing and/or sanitization? 1.2) Does the input validation
ETHICAL HACKING 010101010101APPLICATIO 00100101010WIRELESS110 00NETWORK1100011000 101001010101011APPLICATION0 1100011010MOBILE0001010 10101MOBILE0001
001011 1100010110 0010110001 010110001 0110001011000 011000101100 010101010101APPLICATIO 0 010WIRELESS110001 10100MOBILE00010100111010 0010NETW110001100001 10101APPLICATION00010 00100101010WIRELESS110
FINAL DoIT 11.03.2015 - v.4 PAYMENT CARD INDUSTRY DATA SECURITY STANDARDS APPLICATION DEVELOPMENT AND MAINTENANCE PROCEDURES
Purpose: The Department of Information Technology (DoIT) is committed to developing secure applications. DoIT s System Development Methodology (SDM) and Application Development requirements ensure that
DFW INTERNATIONAL AIRPORT STANDARD OPERATING PROCEDURE (SOP)
Title: Functional Category: Information Technology Services Issuing Department: Information Technology Services Code Number: xx.xxx.xx Effective Date: xx/xx/2014 1.0 PURPOSE 1.1 To appropriately manage
Columbia University Web Security Standards and Practices. Objective and Scope
Columbia University Web Security Standards and Practices Objective and Scope Effective Date: January 2011 This Web Security Standards and Practices document establishes a baseline of security related requirements
Application Security Testing. Generic Test Strategy
Application Security Testing Generic Test Strategy Page 2 of 8 Contents 1 Introduction 3 1.1 Purpose: 3 1.2 Application Security Testing: 3 2 Audience 3 3 Test Strategy guidelines 3 3.1 Authentication
External Vulnerability Assessment. -Technical Summary- ABC ORGANIZATION
External Vulnerability Assessment -Technical Summary- Prepared for: ABC ORGANIZATI On March 9, 2008 Prepared by: AOS Security Solutions 1 of 13 Table of Contents Executive Summary... 3 Discovered Security
Making Database Security an IT Security Priority
Sponsored by Oracle Making Database Security an IT Security Priority A SANS Whitepaper November 2009 Written by Tanya Baccam Security Strategy Overview Why a Database Security Strategy? Making Databases
WEB SECURITY CONCERNS THAT WEB VULNERABILITY SCANNING CAN IDENTIFY
WEB SECURITY CONCERNS THAT WEB VULNERABILITY SCANNING CAN IDENTIFY www.alliancetechpartners.com WEB SECURITY CONCERNS THAT WEB VULNERABILITY SCANNING CAN IDENTIFY More than 70% of all websites have vulnerabilities
Web Vulnerability Assessment Report
Web Vulnerability Assessment Report Target Scanned: www.daflavan.com Report Generated: Mon May 5 14:43:24 2014 Identified Vulnerabilities: 39 Threat Level: High Screenshot of www.daflavan.com HomePage
ASL IT SECURITY BEGINNERS WEB HACKING AND EXPLOITATION
ASL IT SECURITY BEGINNERS WEB HACKING AND EXPLOITATION V 2.0 A S L I T S e c u r i t y P v t L t d. Page 1 Overview: Learn the various attacks like sql injections, cross site scripting, command execution
Corporate Incident Response. Why You Can t Afford to Ignore It
Corporate Incident Response Why You Can t Afford to Ignore It Whether your company needs to comply with new legislation, defend against financial loss, protect its corporate reputation or a combination
Is Drupal secure? A high-level perspective on web vulnerabilities, Drupal s solutions, and how to maintain site security
Is Drupal secure? A high-level perspective on web vulnerabilities, Drupal s solutions, and how to maintain site security Presented 2009-05-29 by David Strauss Thinking Securely Security is a process, not
by Debasis Mohanty (Orissa, India) www.hackingspirits.com
by Debasis Mohanty (Orissa, India) www.hackingspirits.com Introduction I have been thinking of publishing this paper since long but due to lack of time I was not able to complete it. I use to add and keep
11. Exercise: Incident Handling in Live Role Playing 11.1 GENERAL DESCRIPTION. 112 CERT Exercises Toolset Document for students
112 CERT Exercises Toolset 11. Exercise: Incident Handling in Live Role Playing Main Objective Targeted Audience Total Duration Time Schedule Frequency The exercise simulates a real-life incident, involving
Interactive Application Security Testing (IAST)
WHITEPAPER Interactive Application Security Testing (IAST) The World s Fastest Application Security Software Software affects virtually every aspect of an individual s finances, safety, government, communication,
Passing PCI Compliance How to Address the Application Security Mandates
Passing PCI Compliance How to Address the Application Security Mandates The Payment Card Industry Data Security Standards includes several requirements that mandate security at the application layer. These
Managing Vulnerabilities for PCI Compliance White Paper. Christopher S. Harper Managing Director, Agio Security Services
Managing Vulnerabilities for PCI Compliance White Paper Christopher S. Harper Managing Director, Agio Security Services PCI STRATEGY Settling on a PCI vulnerability management strategy is sometimes a difficult
How to Achieve Operational Assurance in Your Private Cloud
How to Achieve Operational Assurance in Your Private Cloud As enterprises implement private cloud and next-generation data centers to achieve cost efficiencies and support business agility, operational
Auditing a Web Application. Brad Ruppert. SANS Technology Institute GWAS Presentation 1
Auditing a Web Application Brad Ruppert SANS Technology Institute GWAS Presentation 1 Objectives Define why application vulnerabilities exist Address Auditing Approach Discuss Information Interfaces Walk
UMHLABUYALINGANA MUNICIPALITY PATCH MANAGEMENT POLICY/PROCEDURE
UMHLABUYALINGANA MUNICIPALITY PATCH MANAGEMENT POLICY/PROCEDURE Originator Patch Management Policy Approval and Version Control Approval Process: Position or Meeting Number: Date: Recommended by Director
CHAPTER 3 : INCIDENT RESPONSE FIVE KEY RECOMMENDATIONS GLOBAL THREAT INTELLIGENCE REPORT 2015 :: COPYRIGHT 2015 NTT INNOVATION INSTITUTE 1 LLC
: INCIDENT RESPONSE FIVE KEY RECOMMENDATIONS 1 FIVE KEY RECOMMENDATIONS During 2014, NTT Group supported response efforts for a variety of incidents. Review of these engagements revealed some observations
Table of Contents. Application Vulnerability Trends Report 2013. Introduction. 99% of Tested Applications Have Vulnerabilities
Application Vulnerability Trends Report : 2013 Table of Contents 3 4 5 6 7 8 8 9 10 10 Introduction 99% of Tested Applications Have Vulnerabilities Cross Site Scripting Tops a Long List of Vulnerabilities
Why Should You Care About Security Issues? SySmox WEB security [email protected]. Top seven ColdFusion Security Issues
SySmox WEB security [email protected] Top seven ColdFusion Security Issues This installment discusses the most prevalent security issues with server configurations and application implementations for ColdFusion.
From Rivals to BFF: WAF & VA Unite OWASP 07.23.2009. The OWASP Foundation http://www.owasp.org
From Rivals to BFF: WAF & VA Unite 07.23.2009 Brian Contos, Chief Security Strategist Imperva Inc. [email protected] +1 (650) 832.6054 Copyright The Foundation Permission is granted to copy, distribute
Magento Security and Vulnerabilities. Roman Stepanov
Magento Security and Vulnerabilities Roman Stepanov http://ice.eltrino.com/ Table of contents Introduction Open Web Application Security Project OWASP TOP 10 List Common issues in Magento A1 Injection
Security Vulnerabilities and Patches Explained IT Security Bulletin for the Government of Canada
Security Vulnerabilities and Patches Explained IT Security Bulletin for the Government of Canada ITSB-96 Last Updated: March 2015 1 Introduction Patching operating systems and applications is one of the
Threat Modeling/ Security Testing. Tarun Banga, Adobe 1. Agenda
Threat Modeling/ Security Testing Presented by: Tarun Banga Sr. Manager Quality Engineering, Adobe Quality Leader (India) Adobe Systems India Pvt. Ltd. Agenda Security Principles Why Security Testing Security
Web application security
Web application security Sebastian Lopienski CERN Computer Security Team openlab and summer lectures 2010 (non-web question) Is this OK? int set_non_root_uid(int uid) { // making sure that uid is not 0
What you can do prevent virus infections on your computer
What you can do prevent virus infections on your computer A computer virus is program code which 'hides' in other files and can cause irreparable damage to your computer. Computer viruses spread easily
Penetration Test Report
Penetration Test Report Acme Test Company ACMEIT System 26 th November 2010 Executive Summary Info-Assure Ltd was engaged by Acme Test Company to perform an IT Health Check (ITHC) on the ACMEIT System
Entire contents 2011 Praetorian. All rights reserved. Information Security Provider and Research Center www.praetorian.com
Entire contents 2011 Praetorian. All rights reserved. Information Security Provider and Research Center www.praetorian.com Threat Modeling "Threat modeling at the design phase is really the only way to
OWASP and OWASP Top 10 (2007 Update) OWASP. The OWASP Foundation. Dave Wichers. The OWASP Foundation. OWASP Conferences Chair dave.wichers@owasp.
and Top 10 (2007 Update) Dave Wichers The Foundation Conferences Chair [email protected] COO, Aspect Security [email protected] Copyright 2007 - The Foundation This work is available
Where every interaction matters.
Where every interaction matters. Peer 1 Vigilant Web Application Firewall Powered by Alert Logic The Open Web Application Security Project (OWASP) Top Ten Web Security Risks and Countermeasures White Paper
privileged identities management best practices
privileged identities management best practices abstract The threat landscape today requires continuous monitoring of risks be it industrial espionage, cybercrime, cyber-attacks, Advanced Persistent Threat
ArcGIS Server Security Threats & Best Practices 2014. David Cordes Michael Young
ArcGIS Server Security Threats & Best Practices 2014 David Cordes Michael Young Agenda Introduction Threats Best practice - ArcGIS Server settings - Infrastructure settings - Processes Summary Introduction
Analytics in Days White Paper and Business Case
Analytics in Days White Paper and Business Case Analytics Navigating the Maze Analytics is hot. It seems virtually everyone needs or wants it, but many still aren t sure what the business case is or how
Web Security. Discovering, Analyzing and Mitigating Web Security Threats
Web Security Discovering, Analyzing and Mitigating Web Security Threats Expectations and Outcomes Mitigation strategies from an infrastructure, architecture, and coding perspective Real-world implementations
Offensive Security. Advanced Web Attacks and Exploitation. Mati Aharoni Devon Kearns. v. 1.0
Offensive Security Advanced Web Attacks and Exploitation v. 1.0 Mati Aharoni Devon Kearns Course Overview The days of porous network perimeters are fading fast as services become more resilient and harder
Web Application Hacking (Penetration Testing) 5-day Hands-On Course
Web Application Hacking (Penetration Testing) 5-day Hands-On Course Web Application Hacking (Penetration Testing) 5-day Hands-On Course Course Description Our web sites are under attack on a daily basis
A6- Sensitive Data Exposure
OWASP Vulnerabilities and Attacks Simplifie d: Business Manager Series Part 2 Have you heard of the times when Fantastic Frank from Randomland was furious? Money and critical data was being stolen from
FINAL DoIT 04.01.2013- v.8 APPLICATION SECURITY PROCEDURE
Purpose: This procedure identifies what is required to ensure the development of a secure application. Procedure: The five basic areas covered by this document include: Standards for Privacy and Security
WHITE PAPER. FortiWeb and the OWASP Top 10 Mitigating the most dangerous application security threats
WHITE PAPER FortiWeb and the OWASP Top 10 PAGE 2 Introduction The Open Web Application Security project (OWASP) Top Ten provides a powerful awareness document for web application security. The OWASP Top
Application security testing: Protecting your application and data
E-Book Application security testing: Protecting your application and data Application security testing is critical in ensuring your data and application is safe from security attack. This ebook offers
ICTN 4040. Enterprise Database Security Issues and Solutions
Huff 1 ICTN 4040 Section 001 Enterprise Information Security Enterprise Database Security Issues and Solutions Roger Brenton Huff East Carolina University Huff 2 Abstract This paper will review some of
White Paper. Benefits and Challenges for Today s Online B- to- B Research Methodology. By Pete Cape, Director, Global Knowledge Management.
White Paper Benefits and Challenges for Today s Online B- to- B Research Methodology By Pete Cape, Director, Global Knowledge Management March 2015 Survey Sampling International, 2015 ABOUT THE AUTHOR
Six Essential Elements of Web Application Security. Cost Effective Strategies for Defending Your Business
6 Six Essential Elements of Web Application Security Cost Effective Strategies for Defending Your Business An Introduction to Defending Your Business Against Today s Most Common Cyber Attacks When web
Essential IT Security Testing
Essential IT Security Testing Application Security Testing for System Testers By Andrew Muller Director of Ionize Who is this guy? IT Security consultant to the stars Member of OWASP Member of IT-012-04
OWASP AND APPLICATION SECURITY
SECURING THE 3DEXPERIENCE PLATFORM OWASP AND APPLICATION SECURITY Milan Bruchter/Shutterstock.com WHITE PAPER EXECUTIVE SUMMARY As part of Dassault Systèmes efforts to counter threats of hacking, particularly
IDENTITY & ACCESS. Privileged Identity Management. controlling access without compromising convenience
IDENTITY & ACCESS Privileged Identity Management controlling access without compromising convenience Introduction According to a recent Ponemon Institute study, mistakes made by people Privilege abuse
Malicious Email Mitigation Strategy Guide
CYBER SECURITY OPERATIONS CENTRE Malicious Email Mitigation Strategy Guide Introduction (UPDATED) SEPTEMBER 2012 1. Socially engineered emails containing malicious attachments and embedded links are commonly
Penetration Testing Report Client: Business Solutions June 15 th 2015
Penetration Testing Report Client: Business Solutions June 15 th 2015 Acumen Innovations 80 S.W 8 th St Suite 2000 Miami, FL 33130 United States of America Tel: 1-888-995-7803 Email: [email protected]
WHY BUSINESS CONTINUITY PLANS FAIL
WHY BUSINESS CONTINUITY PLANS FAIL 12 COMMON CAUSES AND HOW TO PREVENT THEM By Keith Erwood The ProtectEr, CEO and Principal Consultant The Continuity Co., LLC All material in this report is the property
Spigit, Inc. Web Application Vulnerability Assessment/Penetration Test. Prepared By: Accuvant LABS
Web Application Vulnerability Assessment/enetration Test repared By: Accuvant LABS November 20, 2012 Web Application Vulnerability Assessment/enetration Test Introduction Defending the enterprise against
WHAT ARE THE BENEFITS OF OUTSOURCING NETWORK SECURITY?
WHAT ARE THE BENEFITS OF OUTSOURCING NETWORK SECURITY? Contents Introduction.... 3 What Types of Network Security Services are Available?... 4 Penetration Testing and Vulnerability Assessment... 4 Cyber
Threat Modeling. Categorizing the nature and severity of system vulnerabilities. John B. Dickson, CISSP
Threat Modeling Categorizing the nature and severity of system vulnerabilities John B. Dickson, CISSP What is Threat Modeling? Structured approach to identifying, quantifying, and addressing threats. Threat
Adobe Systems Incorporated
Adobe Connect 9.2 Page 1 of 8 Adobe Systems Incorporated Adobe Connect 9.2 Hosted Solution June 20 th 2014 Adobe Connect 9.2 Page 2 of 8 Table of Contents Engagement Overview... 3 About Connect 9.2...
EVALUATING COMMERCIAL WEB APPLICATION SECURITY. By Aaron Parke
EVALUATING COMMERCIAL WEB APPLICATION SECURITY By Aaron Parke Outline Project background What and why? Targeted sites Testing process Burp s findings Technical talk My findings and thoughts Questions Project
How Your Current IT Security System Might Be Leaving You Exposed TAKEAWAYS CHALLENGES WHITE PAPER
WHITE PAPER CHALLENGES Protecting company systems and data from costly hacker intrusions Finding tools and training to affordably and effectively enhance IT security Building More Secure Companies (and
How To Protect Your Active Directory (Ad) From A Security Breach
Securing Active Directory: An Ounce of Prevention or a Pound of Cure? Abstract This technical brief reviews three tasks that should be a part of your proactive Active Directory (AD) security routine: Establishing
Securing SharePoint 101. Rob Rachwald Imperva
Securing SharePoint 101 Rob Rachwald Imperva Major SharePoint Deployment Types Internal Portal Uses include SharePoint as a file repository Only accessible by internal users Company Intranet External Portal
Application Security Testing. Erez Metula (CISSP), Founder Application Security Expert [email protected]
Application Security Testing Erez Metula (CISSP), Founder Application Security Expert [email protected] Agenda The most common security vulnerabilities you should test for Understanding the problems
Security within a development lifecycle. Enhancing product security through development process improvement
Security within a development lifecycle Enhancing product security through development process improvement Who I am Working within a QA environment, with a focus on security for 10 years Primarily web
WEB APPLICATION VULNERABILITY STATISTICS (2013)
WEB APPLICATION VULNERABILITY STATISTICS (2013) Page 1 CONTENTS Contents 2 1. Introduction 3 2. Research Methodology 4 3. Summary 5 4. Participant Portrait 6 5. Vulnerability Statistics 7 5.1. The most
Secure Web Application Coding Team Introductory Meeting December 1, 2005 1:00 2:00PM Bits & Pieces Room, Sansom West Room 306 Agenda
Secure Web Application Coding Team Introductory Meeting December 1, 2005 1:00 2:00PM Bits & Pieces Room, Sansom West Room 306 Agenda 1. Introductions for new members (5 minutes) 2. Name of group 3. Current
THREE KEYS TO COST-EFFECTIVE SECURITY FOR YOUR SMALL BUSINESS
THREE KEYS TO COST-EFFECTIVE SECURITY FOR YOUR SMALL BUSINESS Learn more about Symantec security here OVERVIEW Data and communication protection isn t a problem limited to large enterprises. Small and
WHITEPAPER. Nessus Exploit Integration
Nessus Exploit Integration v2 Tenable Network Security has committed to providing context around vulnerabilities, and correlating them to other sources, such as available exploits. We currently pull information
KASPERSKY SECURITY INTELLIGENCE SERVICES. EXPERT SERVICES. www.kaspersky.com
KASPERSKY SECURITY INTELLIGENCE SERVICES. EXPERT SERVICES www.kaspersky.com EXPERT SERVICES Expert Services from Kaspersky Lab are exactly that the services of our in-house experts, many of them global
Cloud Security:Threats & Mitgations
Cloud Security:Threats & Mitgations Vineet Mago Naresh Khalasi Vayana 1 What are we gonna talk about? What we need to know to get started Its your responsibility Threats and Remediations: Hacker v/s Developer
A Case for Managed Security
A Case for Managed Security By Christopher Harper Managing Director, Security Superior Managed IT & Security Services 1. INTRODUCTION Most firms believe security breaches happen because of one key malfunction
IOActive Security Advisory
IOActive Security Advisory Title Severity Discovered by CVE Lenovo s System Update Uses a Predictable Security Token High Michael Milvich [email protected] Sofiane Talmat [email protected]
Secure in 2010? Broken in 2011!
Secure in 2010? Broken in 2011! Matias Madou Principal Security Researcher Abstract In 2010, a security research firm stumbled on a couple of vulnerabilities in Apache OFBiz, a widely used open source
Seven Things To Consider When Evaluating Privileged Account Security Solutions
Seven Things To Consider When Evaluating Privileged Account Security Solutions Contents Introduction 1 Seven questions to ask every privileged account security provider 4 1. Is the solution really secure?
05.0 Application Development
Number 5.0 Policy Owner Information Security and Technology Policy Application Development Effective 01/01/2014 Last Revision 12/30/2013 Department of Innovation and Technology 5. Application Development
Why Your Job Search Isn t Working
Why Your Job Search Isn t Working 6 mistakes you re probably making and how to fix them I t s easy to think that your lack of success in finding a new job has nothing to do with you. After all, this is
Web Application Guidelines
Web Application Guidelines Web applications have become one of the most important topics in the security field. This is for several reasons: It can be simple for anyone to create working code without security
Data Management Policies. Sage ERP Online
Sage ERP Online Sage ERP Online Table of Contents 1.0 Server Backup and Restore Policy... 3 1.1 Objectives... 3 1.2 Scope... 3 1.3 Responsibilities... 3 1.4 Policy... 4 1.5 Policy Violation... 5 1.6 Communication...
Perl In Secure Web Development
Perl In Secure Web Development Jonathan Worthington ([email protected]) August 31, 2005 Perl is used extensively today to build server side web applications. Using the vast array of modules on CPAN, one
Information Security Services
Information Security Services Information Security In 2013, Symantec reported a 62% increase in data breaches over 2012. These data breaches had tremendous impacts on many companies, resulting in intellectual
Guide to Penetration Testing
What to consider when testing your network HALKYN CONSULTING 06 May 11 T Wake CEH CISSP CISM CEH CISSP CISM Introduction Security breaches are frequently in the news. Rarely does a week go by without a
ASL IT Security Advanced Web Exploitation Kung Fu V2.0
ASL IT Security Advanced Web Exploitation Kung Fu V2.0 A S L I T S e c u r i t y P v t L t d. Page 1 Overview: There is a lot more in modern day web exploitation than the good old alert( xss ) and union
THE TOP 4 CONTROLS. www.tripwire.com/20criticalcontrols
THE TOP 4 CONTROLS www.tripwire.com/20criticalcontrols THE TOP 20 CRITICAL SECURITY CONTROLS ARE RATED IN SEVERITY BY THE NSA FROM VERY HIGH DOWN TO LOW. IN THIS MINI-GUIDE, WE RE GOING TO LOOK AT THE
