Why Should You Care About Security Issues? SySmox WEB security Top seven ColdFusion Security Issues
|
|
|
- Charles Maurice Allison
- 10 years ago
- Views:
Transcription
1 SySmox WEB security Top seven ColdFusion Security Issues This installment discusses the most prevalent security issues with server configurations and application implementations for ColdFusion. Future articles will discuss other security-related topics, both for other sysmox products specifically as well as for general security concepts that should be helpful for developers, server administrators, and others involved in web implementations. + Why Should You Care About Security Issues? 1 Coldfusion Directory traversal 2 FCKeditor bug 3 ColdFusion Administrator on Production Servers 4 Unvalidated Browser Input 5 Sample Applications and Documentation on Production Servers 6 CFFILE, CFFTP, and CFPOP 7 ColdFusion Studio and RDS with Production Servers Please keep in mind that keeping computer security issues at bay can be a full-time job. While these columns seek to provide general education and point out common security issues in implementations, they are not meant as a substitute for a full-time security specialist group or individual in your organization. Please also remember that when links are provided for reference, they may be advisories not applicable to your server or configuration. Be sure to carefully check whether the fixes and workarounds suggested apply to your configuration before implementing them. Also, be sure to test any patch in a testing environment prior to applying to a production environment. Why Should You Care About Security Issues? Security should be everyone's concern. Over time, the professional security community has learned that the best-implemented security is carried out in a thorough and prevalent manner. If a developer, architect, or designer is not thinking explicitly about security, it simply won't happen spontaneously. Additionally, the wild, wild web is literally saturated with motivated attackers just waiting for a juicy target to attack and subvert. To make matters worse, many would-be attackers can find simple, automated "scripts" (automated tools that search for and exploit known security issues) with which to attack and subvert your server(s). Page 1
2 If any standard, well-known security issue is a concern with your server's configuration, it is only a matter of time before an unknown attacker finds that she can, and does, successfully attack and potentially subvert your systems. 1 - Coldfusion directory traversal: Variation of a classic directory traversal vulnerability it can be used for arbitrary file retrieval ; special encoding the bug will let you grab any file ending in.xml, but by adding a %00 its sophisticated The exploit: locale=../../../../../../../../../../coldfusion8/lib/password.propert ies%00en If the login admin password was stored hash (Using SHA1 algorithm, similar to CF MX7), the attacker then attempts to crack it via an offline password cracking attack or rainbow table lookup. Note that the default setting in ColdFusion 8 is encrypted=true as per password.properties file. Otherwise. At this point, the attacker would be able to use the decrypted password to login as a CF admin and upload a COLDFUSION BACKDOOR (Trojan horse CFM script that provides an unauthorized remote user with access to a compromised COLDFUSION webserver SYSTEM privileges by default). Page 2
3 Uploading files to a CF server via the administrator console is a bit counter-intuitive. The attacker would basically add a scheduled task that would download backdoor.cfm to the server s webroot. Page 3
4 2- Fckeditor bug: Last year a vulnerability in some ColdFusion installations. It involves the richtext feature found in cftexarea ; Actually uses an open source app called FCKEditor. The FCKEditor has functionality to handle file uploads and file management but this feature should be disabled in the version embedded in CF server. The problem lies in that in some cases the connector that runs this feature is actually turn on. Checking config.cfm if conector is on this mean hackers can upload backdoors and files to your web server. 3 -ColdFusion Administrator on Production Servers: Coldfusion server configuration issues is on of the most important production environments is the default installation. Macromedia advises to use a strongly password that the Administrator login interface requires for login. Alternatively, if (and only if) you must use the Administrator for remote administration (i.e. for some reason you do not have physical access or file system access to the server itself), we recommend that you install at least one additional layer of security on top of the default provided by the ColdFusion Administrator. Some additional form of authentication is in order, like installing web server-level directory-based authentication or Virtual Private Network (VPN) access via an internal IP address. (A VPN uses encryption to virtually create a private network on otherwise possibly non-secure networks.) 4 - Unvalidated Browser Input : Unvalidated browser input is an issue that just keeps coming back, not only for users of Macromedia products, but also all over the Internet (see the end of this section for relevant links). For instance, a widely published issue called "Cross-Site Scripting" got a lot of news. This issue as a whole applies to a large portion of the security risks inherent in designing web applications, especially with CFML and Java, which are not generally vulnerable to "buffer overruns," a common security vulnerability. Page 4
5 For more discussion about some advanced kinds of browser input validation, see the section about CFFILE, CFFTP, and CFPOP later in this article. Unvalidated browser input is a risk wherever the application you develop hands off information gathered from the browser to any other resource. explains that some ODBC drivers potentially allowed users to execute Visual Basic for Applications (VBA) commands on the hosting server without permission. For the users, doing so was simply a matter of inserting a special character into the HTML form data, and knowing VBA syntax. The offending special character was a ' ' character, combined with single quotes. It rested on the shoulders of ColdFusion developers to make sure that any browser data that was going into such a query filtered out the ' ' character. Otherwise, there was a potential for hostile users to attack the server by manipulating the data they submitted to the server. For example, theoretically, if a hostile user changed a URL to look like: shell("cmd /c 1 > c:\temp\foo.txt") ' and the template, page.cfm, contained a query like: SELECT * FROM USERS WHERE lname = '#URL.x#' The URL would cause Microsoft Access to create a file at c:\temp\foo.txt on the server. In this case, the most appropriate approach to stopping this kind of attack would be to filter URL.x and remove the character ' ' before passing the URL.x data on to the query. In general, browser input validation is a subject you, as a web application architect, designer, or developer, will need to keep in mind as the industry grows and as you encounter more and more situations where it applies. Be on the lookout for any security advisory with the products you use that involves "malformed input". "Malformed", in the security field, loosely translates to something the programmer wasn't expecting, but formally applies only to data or commands that don't follow standard protocol. Also, be sure to keep in mind that any user could be malicious. There's no way to tell if an attacker may have subverted someone's password without your knowledge. Don't assume that any user has your best interests in mind. 5 -Sample Applications and Documentation on Production Servers : Page 5
6 One important security maxim is that a secured or "hardened" server should have available only the services and resources it needs to do its job and no more. The fewer services or resources a server has installed and available, the fewer details an administrator has to worry about being non-secure, and the fewer possible entrance points a potential attacker has. Keeping this and the assumption that any production server should also be a hardened server in mind, it becomes obvious that sample applications and documentation have no legitimate place on a production server. The sample applications and documentation have a place in a development environment. However, once your projects and applications reach the testing phase, the servers they reside on should not have either the sample applications or documentation installed. Another aspect of this issue that is also a risk for many production environments is the propensity for development or test servers to be rolled into production. Often, unless there is sufficient double-checking, the on-server sample applications and documentation will be rolled into production with the development server. If you know that your test or development servers will be rolled into production after testing is complete, think about what you're doing before you enable the option to install sample applications and documentation during ColdFusion Server installs. 6 -CFFILE, CFFTP, and CFPOP For programmers, it's a good idea to keep in mind that one common method of attack through web applications is finding ways to save unauthorized files to a web server's file system. This is useful in many two-step attacks: the first step is to get an unauthorized file saved to the server's file system, and the second step is to get it executed in some way. If an attacker could get, for example, her copy of "application.cfm" saved to your application's root directory, all sorts of heck could break loose. Even saving a file that was any regular CFML template could be very dangerous. If the file were saved to a web root directory or lower, the attacker would only need to figure out the URL to the template in order to have it executed. In addition, if the server under attack is running Windows NT and the Windows NT Registry is not properly secured, a template like this could read your entire Registry, which often contains passwords, license keys, and other restricted information, out to the attacker. The reason CFFILE, CFFTP, and CFPOP are important is that they all allow developers to determine whether files will be uploaded to your server. Developers should keep in mind the security issues relevant to having potentially unauthorized or unvalidated files saved to the server. CFFILE allows users to upload a file to the server. CFFTP allows the server to send files to or retrieve files from FTP servers on the Internet. CFPOP allows the server to act as a POP3 client and download mail from POP3 servers on the Internet and save them to your server. All three of these tags potentially allow unvalidated and unauthorized files onto the server and should be used and implemented with great care. Page 6
7 If you must use any of these tags in your application, a good way to deal with the risk is to manage it. The best way to manage this risk is to validate the data retrieved. First, save the file(s) to a safe directory. "Safe" means a directory from which the web server will not serve content. This helps prevent a possible attack from targeting a directory from which the web server might execute an uploaded template. In addition, a safe directory should be protected from execution by any other service running on the server. Second, be sure to validate the data either before it is saved to the safe directory, or immediately afterwards. This means that if you can find or create a utility, CFX tag, or other mechanism to do so, it's a very good idea to make sure that the data is what it says it is. For example, if your application allows uploading graphics to your server, the uploaded files should be checked to make sure they truly are graphics before they're incorporated into any other process. For example, some existing CFX tags are image loaders that will return errors if the file specified is not a valid graphics file. Finally, validate the file with a virus scanner. If you're going to use the file again, the file may be executed in some way by a word processor, mail client, web server, or some other process. If this is a possibility, some attacker may upload a virus-infected file to try to compromise the security and/or functionality of your server. Configuring a virus scanner to do regular scans of the particular directory where the files are stored is a great way to add an extra layer of security to the process. Also, server administrators have the option to lock out the use of some of these tags completely using Basic Security. If using Advanced Security and security sandboxing, administers can lock out the use of these tags by some developers and allow their use by others. They can also lock down the directories to which the retrieved files are saved with a secure sandbox. Particularly in a hosting environment where developers from different organizations might share the same server and where the server administrator may not be 100 percent sure of the motivation or intentions of the developers, it would be a good idea for the hosting company to investigate use of security sandboxing. 7 -ColdFusion Studio and RDS with Production Servers ColdFusion Studio and Remote Data Services (RDS) should only be used with secure Intranets or with internal development servers. Without additional measures of protection, RDS should not be relied upon for secure access to production servers or other missioncritical resources. If you must use RDS in a secure environment or with a protected resource, be sure to use a non-default password. You should also consider setting up another secure layer to protect the transaction(s), such as Virtual Private Networks (VPN) or some kind of file-drop secured relay from the staging server to the production server. With VPN implementations, it would be possible to give users a protected, encrypted, virtual secure network on which to use RDS without fear that the RDS session could be hijacked or otherwise compromised. Page 7
8 A file-drop secured relay is an older technology, which may mean that the solution would be less packaged. Still, file-drop relays are related to full-cycle implementations, which you should consider using to develop your web applications if you aren't already assuming you have the resources to do so. A full-cycle implementation includes project phases like requirements gathering, design, development (implementation), unit testing, regression testing, and rollout (moving the application into production). With a file-drop relay, a developer or tester could signal that her package was ready for the next stage and an automated, secure process (e.g., FTP over secured network pathways, a supervised manual process, etc.) would copy the templates and supporting files from the development or testing server to its next logical destination within the process. For instance, a developer, once finished with her own development and unit testing, could signal the file-drop process to copy the files from her development server to the testing server for more unit and regression testing. The Macromedia leaves final implementations to your network and systems groups. Ideally, RDS should not be involved in unprotected remote connections to production servers. At the same time, compromise may be required. Remember that compromise can often mean taking security risks. There's usually a clear tradeoff between convenience and security. Ammara reda SySmox operations manager [email protected] Page 8
SY0-201. system so that an unauthorized individual can take over an authorized session, or to disrupt service to authorized users.
system so that an unauthorized individual can take over an authorized session, or to disrupt service to authorized users. From a high-level standpoint, attacks on computer systems and networks can be grouped
Network and Host-based Vulnerability Assessment
Network and Host-based Vulnerability Assessment A guide for information systems and network security professionals 6600 Peachtree-Dunwoody Road 300 Embassy Row Atlanta, GA 30348 Tel: 678.443.6000 Toll-free:
Manipulating Microsoft SQL Server Using SQL Injection
Manipulating Microsoft SQL Server Using SQL Injection Author: Cesar Cerrudo ([email protected]) APPLICATION SECURITY, INC. WEB: E-MAIL: [email protected] TEL: 1-866-9APPSEC 1-212-947-8787 INTRODUCTION
External Vulnerability Assessment. -Technical Summary- ABC ORGANIZATION
External Vulnerability Assessment -Technical Summary- Prepared for: ABC ORGANIZATI On March 9, 2008 Prepared by: AOS Security Solutions 1 of 13 Table of Contents Executive Summary... 3 Discovered Security
Detecting Web Application Vulnerabilities Using Open Source Means. OWASP 3rd Free / Libre / Open Source Software (FLOSS) Conference 27/5/2008
Detecting Web Application Vulnerabilities Using Open Source Means OWASP 3rd Free / Libre / Open Source Software (FLOSS) Conference 27/5/2008 Kostas Papapanagiotou Committee Member OWASP Greek Chapter [email protected]
Testing Web Applications for SQL Injection Sam Shober [email protected]
Testing Web Applications for SQL Injection Sam Shober [email protected] Abstract: This paper discusses the SQL injection vulnerability, its impact on web applications, methods for pre-deployment and
6WRUP:DWFK. Policies for Dedicated IIS Web Servers Group. V2.1 policy module to restrict ALL network access
OKENA 71 Second Ave., 3 rd Floor Waltham, MA 02451 Phone 781 209 3200 Fax 781 209 3199 6WRUP:DWFK Policies for Dedicated IIS Web Servers Group The policies shipped with StormWatch address both application-specific
Web Application Threats and Vulnerabilities Web Server Hacking and Web Application Vulnerability
Web Application Threats and Vulnerabilities Web Server Hacking and Web Application Vulnerability WWW Based upon HTTP and HTML Runs in TCP s application layer Runs on top of the Internet Used to exchange
Windows Client/Server Local Area Network (LAN) System Security Lab 2 Time allocation 3 hours
Windows Client/Server Local Area Network (LAN) System Security Lab 2 Time allocation 3 hours Introduction The following lab allows the trainee to obtain a more in depth knowledge of network security and
Web Plus Security Features and Recommendations
Web Plus Security Features and Recommendations (Based on Web Plus Version 3.x) Centers for Disease Control and Prevention National Center for Chronic Disease Prevention and Health Promotion Division of
Recommended Practice Case Study: Cross-Site Scripting. February 2007
Recommended Practice Case Study: Cross-Site Scripting February 2007 iii ACKNOWLEDGEMENT This document was developed for the U.S. Department of Homeland Security to provide guidance for control system cyber
Thick Client Application Security
Thick Client Application Security Arindam Mandal ([email protected]) (http://www.paladion.net) January 2005 This paper discusses the critical vulnerabilities and corresponding risks in a two
A Roadmap for Securing IIS 5.0
This document was grafted together from various Web and other sources by Thomas Jerry Scott for use in his Web and other Security courses. Jerry hopes you find this information helpful in your quest to
Lotus Domino Security
An X-Force White Paper Lotus Domino Security December 2002 6303 Barfield Road Atlanta, GA 30328 Tel: 404.236.2600 Fax: 404.236.2626 Introduction Lotus Domino is an Application server that provides groupware
6WRUP:DWFK. Policies for Dedicated SQL Servers Group
OKENA 71 Second Ave., 3 rd Floor Waltham, MA 02451 Phone 781 209 3200 Fax 781 209 3199 6WRUP:DWFK Policies for Dedicated SQL Servers Group The sample policies shipped with StormWatch address both application-specific
3. Broken Account and Session Management. 4. Cross-Site Scripting (XSS) Flaws. Web browsers execute code sent from websites. Account Management
What is an? s Ten Most Critical Web Application Security Vulnerabilities Anthony LAI, CISSP, CISA Chapter Leader (Hong Kong) [email protected] Open Web Application Security Project http://www.owasp.org
Server Security. Contents. Is Rumpus Secure? 2. Use Care When Creating User Accounts 2. Managing Passwords 3. Watch Out For Aliases 4
Contents Is Rumpus Secure? 2 Use Care When Creating User Accounts 2 Managing Passwords 3 Watch Out For Aliases 4 Deploy A Firewall 5 Minimize Running Applications And Processes 5 Manage Physical Access
JOOMLA SECURITY. ireland website design. by Oliver Hummel. ADDRESS Unit 12D, Six Cross Roads Business Park, Waterford City
JOOMLA SECURITY by Oliver Hummel ADDRESS Unit 12D, Six Cross Roads Business Park, Waterford City CONTACT Nicholas Butler 051-393524 089-4278112 [email protected] Contents Introduction 3 Installation
What is Web Security? Motivation
[email protected] http://www.brucker.ch/ Information Security ETH Zürich Zürich, Switzerland Information Security Fundamentals March 23, 2004 The End Users View The Server Providers View What is Web
Web App Security Audit Services
locuz.com Professional Services Web App Security Audit Services The unsecured world today Today, over 80% of attacks against a company s network come at the Application Layer not the Network or System
Figure 9-1: General Application Security Issues. Application Security: Electronic Commerce and E-Mail. Chapter 9
Figure 9-1: General Application Application Security: Electronic Commerce and E-Mail Chapter 9 Panko, Corporate Computer and Network Security Copyright 2004 Prentice-Hall Executing Commands with the Privileges
Five Steps to Improve Internal Network Security. Chattanooga ISSA
Five Steps to Improve Internal Network Security Chattanooga ISSA 1 Find Me AverageSecurityGuy.info @averagesecguy [email protected] github.com/averagesecurityguy ChattSec.org 2 Why? The methodical
CS 356 Lecture 25 and 26 Operating System Security. Spring 2013
CS 356 Lecture 25 and 26 Operating System Security Spring 2013 Review Chapter 1: Basic Concepts and Terminology Chapter 2: Basic Cryptographic Tools Chapter 3 User Authentication Chapter 4 Access Control
Secure and Safe Computing Primer Examples of Desktop and Laptop standards and guidelines
Secure and Safe Computing Primer Examples of Desktop and Laptop standards and guidelines 1. Implement anti-virus software An anti-virus program is necessary to protect your computer from malicious programs,
Is Drupal secure? A high-level perspective on web vulnerabilities, Drupal s solutions, and how to maintain site security
Is Drupal secure? A high-level perspective on web vulnerabilities, Drupal s solutions, and how to maintain site security Presented 2009-05-29 by David Strauss Thinking Securely Security is a process, not
Getting a Secure Intranet
61-04-69 Getting a Secure Intranet Stewart S. Miller The Internet and World Wide Web are storehouses of information for many new and legitimate purposes. Unfortunately, they also appeal to people who like
IBM Security QRadar Vulnerability Manager Version 7.2.1. User Guide
IBM Security QRadar Vulnerability Manager Version 7.2.1 User Guide Note Before using this information and the product that it supports, read the information in Notices on page 61. Copyright IBM Corporation
What Do You Mean My Cloud Data Isn t Secure?
Kaseya White Paper What Do You Mean My Cloud Data Isn t Secure? Understanding Your Level of Data Protection www.kaseya.com As today s businesses transition more critical applications to the cloud, there
Contents Introduction xxvi Chapter 1: Understanding the Threats: E-mail Viruses, Trojans, Mail Bombers, Worms, and Illicit Servers
Contents Introduction xxvi Chapter 1: Understanding the Threats: E-mail Viruses, Trojans, Mail Bombers, Worms, and Illicit Servers 1 Introduction 2 Essential Concepts 3 Servers, Services, and Clients 3
FORBIDDEN - Ethical Hacking Workshop Duration
Workshop Course Module FORBIDDEN - Ethical Hacking Workshop Duration Lecture and Demonstration : 15 Hours Security Challenge : 01 Hours Introduction Security can't be guaranteed. As Clint Eastwood once
WS_FTP: The smarter way to transfer files
WS_FTP: The smarter way to transfer files DATA WEB PAGES IMAGES VIDEO GRAPHICS WS_FTP: A Complete and Secure Data Management Solution The files that you transfer every day over the Internet are vulnerable
To install Multifront you need to have familiarity with Internet Information Services (IIS), Microsoft.NET Framework and SQL Server 2008.
Znode Multifront - Installation Guide Version 6.2 1 System Requirements To install Multifront you need to have familiarity with Internet Information Services (IIS), Microsoft.NET Framework and SQL Server
SECURITY BEST PRACTICES FOR CISCO PERSONAL ASSISTANT (1.4X)
WHITE PAPER SECURITY BEST PRACTICES FOR CISCO PERSONAL ASSISTANT (1.4X) INTRODUCTION This document covers the recommended best practices for hardening a Cisco Personal Assistant 1.4(x) server. The term
Getting Started with the iscan Online Data Breach Risk Intelligence Platform
Getting Started with the iscan Online Data Breach Risk Intelligence Platform 2 Table of Contents Overview... 3 Data Breach Risk Intelligence... 3 Data Breach Prevention Lifecycle Defined... 3 Choosing
modules 1 & 2. Section: Information Security Effective: December 2005 Standard: Server Security Standard Revised: Policy Ref:
SERVER SECURITY STANDARD Security Standards are mandatory security rules applicable to the defined scope with respect to the subject. Overview Scope Purpose Instructions Improperly configured systems,
Web Security School Entrance Exam
Web Security School Entrance Exam By Michael Cobb 1) What is SSL used for? a. Encrypt data as it travels over a network b. Encrypt files located on a Web server c. Encrypt passwords for storage in a database
Advanced Endpoint Protection Overview
Advanced Endpoint Protection Overview Advanced Endpoint Protection is a solution that prevents Advanced Persistent Threats (APTs) and Zero-Day attacks and enables protection of your endpoints by blocking
1 hours, 30 minutes, 38 seconds Heavy scan. All scanned network resources. Copyright 2001, FTP access obtained
home Network Vulnerabilities Detail Report Grouped by Vulnerability Report Generated by: Symantec NetRecon 3.5 Licensed to: X Serial Number: 0182037567 Machine Scanned from: ZEUS (192.168.1.100) Scan Date:
BlackBerry Enterprise Service 10. Secure Work Space for ios and Android Version: 10.1.1. Security Note
BlackBerry Enterprise Service 10 Secure Work Space for ios and Android Version: 10.1.1 Security Note Published: 2013-06-21 SWD-20130621110651069 Contents 1 About this guide...4 2 What is BlackBerry Enterprise
How To Manage Web Content Management System (Wcm)
WEB CONTENT MANAGEMENT SYSTEM February 2008 The Government of the Hong Kong Special Administrative Region The contents of this document remain the property of, and may not be reproduced in whole or in
ABC LTD EXTERNAL WEBSITE AND INFRASTRUCTURE IT HEALTH CHECK (ITHC) / PENETRATION TEST
ABC LTD EXTERNAL WEBSITE AND INFRASTRUCTURE IT HEALTH CHECK (ITHC) / PENETRATION TEST Performed Between Testing start date and end date By SSL247 Limited SSL247 Limited 63, Lisson Street Marylebone London
The following multiple-choice post-course assessment will evaluate your knowledge of the skills and concepts taught in Internet Business Associate.
Course Assessment Answers-1 Course Assessment The following multiple-choice post-course assessment will evaluate your knowledge of the skills and concepts taught in Internet Business Associate. 1. A person
PDshop.NET Installation Guides (ASP.NET Edition)
PDshop.NET Installation Guides (ASP.NET Edition) PageDown Technology, LLC / Copyright 2003-2007 All Rights Reserved. Last Updated: 7/25/07 Written for Revision: 1.014 1 Table of Contents Table of Contents...2
Why Web Applications are making a hackers life easy. Presented by Jon Grew BT SBS
Why Web Applications are making a hackers life easy. Presented by Jon Grew BT SBS Acknowledgements Ed Barlow Technical Director EMEA Ed sends his apologies. The following presentation is based on the talk
My FreeScan Vulnerabilities Report
Page 1 of 6 My FreeScan Vulnerabilities Report Print Help For 66.40.6.179 on Feb 07, 008 Thank you for trying FreeScan. Below you'll find the complete results of your scan, including whether or not the
ITEC441- IS Security. Chapter 15 Performing a Penetration Test
1 ITEC441- IS Security Chapter 15 Performing a Penetration Test The PenTest A penetration test (pentest) simulates methods that intruders use to gain unauthorized access to an organization s network and
by Debasis Mohanty (Orissa, India) www.hackingspirits.com
by Debasis Mohanty (Orissa, India) www.hackingspirits.com Introduction I have been thinking of publishing this paper since long but due to lack of time I was not able to complete it. I use to add and keep
ArcGIS Server Security Threats & Best Practices 2014. David Cordes Michael Young
ArcGIS Server Security Threats & Best Practices 2014 David Cordes Michael Young Agenda Introduction Threats Best practice - ArcGIS Server settings - Infrastructure settings - Processes Summary Introduction
WEB SECURITY. Oriana Kondakciu 0054118 Software Engineering 4C03 Project
WEB SECURITY Oriana Kondakciu 0054118 Software Engineering 4C03 Project The Internet is a collection of networks, in which the web servers construct autonomous systems. The data routing infrastructure
Magento Security and Vulnerabilities. Roman Stepanov
Magento Security and Vulnerabilities Roman Stepanov http://ice.eltrino.com/ Table of contents Introduction Open Web Application Security Project OWASP TOP 10 List Common issues in Magento A1 Injection
Migrating helpdesk to a new server
Migrating helpdesk to a new server Table of Contents 1. Helpdesk Migration... 2 Configure Virtual Web on IIS 6 Windows 2003 Server:... 2 Role Services required on IIS 7 Windows 2008 / 2012 Server:... 2
Setting Up ALERE with Client/Server Data
Setting Up ALERE with Client/Server Data TIW Technology, Inc. November 2014 ALERE is a registered trademark of TIW Technology, Inc. The following are registered trademarks or trademarks: FoxPro, SQL Server,
APPLETS AND NETWORK SECURITY: A MANAGEMENT OVERVIEW
84-10-25 DATA SECURITY MANAGEMENT APPLETS AND NETWORK SECURITY: A MANAGEMENT OVERVIEW Al Berg INSIDE Applets and the Web, The Security Issue, Java: Secure Applets, Java: Holes and Bugs, Denial-of-Service
WhatsUp Gold v16.3 Installation and Configuration Guide
WhatsUp Gold v16.3 Installation and Configuration Guide Contents Installing and Configuring WhatsUp Gold using WhatsUp Setup Installation Overview... 1 Overview... 1 Security considerations... 2 Standard
Xtreeme Search Engine Studio Help. 2007 Xtreeme
Xtreeme Search Engine Studio Help 2007 Xtreeme I Search Engine Studio Help Table of Contents Part I Introduction 2 Part II Requirements 4 Part III Features 7 Part IV Quick Start Tutorials 9 1 Steps to
SCP - Strategic Infrastructure Security
SCP - Strategic Infrastructure Security Lesson 1 - Cryptogaphy and Data Security Cryptogaphy and Data Security History of Cryptography The number lock analogy Cryptography Terminology Caesar and Character
ibaan ERP 5.2a Configuration Guide for ibaan ERP Windows Client
ibaan ERP 5.2a Configuration Guide for ibaan ERP Windows Client A publication of: Baan Development B.V. P.O.Box 143 3770 AC Barneveld The Netherlands Printed in the Netherlands Baan Development B.V. 2002.
Web Application Penetration Testing
Web Application Penetration Testing 2010 2010 AT&T Intellectual Property. All rights reserved. AT&T and the AT&T logo are trademarks of AT&T Intellectual Property. Will Bechtel [email protected]
FINAL DoIT 11.03.2015 - v.4 PAYMENT CARD INDUSTRY DATA SECURITY STANDARDS APPLICATION DEVELOPMENT AND MAINTENANCE PROCEDURES
Purpose: The Department of Information Technology (DoIT) is committed to developing secure applications. DoIT s System Development Methodology (SDM) and Application Development requirements ensure that
Creating Stronger, Safer, Web Facing Code. JPL IT Security Mary Rivera June 17, 2011
Creating Stronger, Safer, Web Facing Code JPL IT Security Mary Rivera June 17, 2011 Agenda Evolving Threats Operating System Application User Generated Content JPL s Application Security Program Securing
Remote Administration
Windows Remote Desktop, page 1 pcanywhere, page 3 VNC, page 7 Windows Remote Desktop Remote Desktop permits users to remotely execute applications on Windows Server 2008 R2 from a range of devices over
Ruby on Rails Secure Coding Recommendations
Introduction Altius IT s list of Ruby on Rails Secure Coding Recommendations is based upon security best practices. This list may not be complete and Altius IT recommends this list be augmented with additional
RemotelyAnywhere Getting Started Guide
April 2007 About RemotelyAnywhere... 2 About RemotelyAnywhere... 2 About this Guide... 2 Installation of RemotelyAnywhere... 2 Software Activation...3 Accessing RemotelyAnywhere... 4 About Dynamic IP Addresses...
Payment Card Industry (PCI) Data Security Standard
Payment Card Industry (PCI) Data Security Standard Security Scanning Procedures Version 1.1 Release: September 2006 Table of Contents Purpose...1 Introduction...1 Scope of PCI Security Scanning...1 Scanning
Client logo placeholder XXX REPORT. Page 1 of 37
Client logo placeholder XXX REPORT Page 1 of 37 Report Details Title Xxx Penetration Testing Report Version V1.0 Author Tester(s) Approved by Client Classification Confidential Recipient Name Title Company
Hack Your SQL Server Database Before the Hackers Do
Note: This article was edited in Oct. 2013, from numerous Web Sources. TJS At the Install: The default install for SQL server makes it is as secure as it will ever be. DBAs and developers will eventually
Countermeasures against Bots
Countermeasures against Bots Are you sure your computer is not infected with Bot? Information-technology Promotion Agency IT Security Center http://www.ipa.go.jp/security/ 1. What is a Bot? Bot is a computer
Computer Networks & Computer Security
Computer Networks & Computer Security Software Engineering 4C03 Project Report Hackers: Detection and Prevention Prof.: Dr. Kartik Krishnan Due Date: March 29 th, 2004 Modified: April 7 th, 2004 Std Name:
BM482E Introduction to Computer Security
BM482E Introduction to Computer Security Lecture 7 Database and Operating System Security Mehmet Demirci 1 Summary of Lecture 6 User Authentication Passwords Password storage Password selection Token-based
Sync Security and Privacy Brief
Introduction Security and privacy are two of the leading issues for users when transferring important files. Keeping data on-premises makes business and IT leaders feel more secure, but comes with technical
Using a Firewall General Configuration Guide
Using a Firewall General Configuration Guide Page 1 1 Contents There are no satellite-specific configuration issues that need to be addressed when installing a firewall and so this document looks instead
Web Application Security
Chapter 1 Web Application Security In this chapter: OWASP Top 10..........................................................2 General Principles to Live By.............................................. 4
Desktop and Laptop Security Policy
Desktop and Laptop Security Policy Appendix A Examples of Desktop and Laptop standards and guidelines 1. Implement anti-virus software An anti-virus program is necessary to protect your computer from malicious
WebLogic Server 6.1: How to configure SSL for PeopleSoft Application
WebLogic Server 6.1: How to configure SSL for PeopleSoft Application 1) Start WebLogic Server... 1 2) Access Web Logic s Server Certificate Request Generator page.... 1 3) Fill out the certificate request
Executable Integrity Verification
Executable Integrity Verification Abstract Background Determining if a given executable has been trojaned is a tedious task. It is beyond the capabilities of the average end user and even many network
The Trivial Cisco IP Phones Compromise
Security analysis of the implications of deploying Cisco Systems SIP-based IP Phones model 7960 Ofir Arkin Founder The Sys-Security Group [email protected] http://www.sys-security.com September 2002
Overview of Network Security The need for network security Desirable security properties Common vulnerabilities Security policy designs
Overview of Network Security The need for network security Desirable security properties Common vulnerabilities Security policy designs Why Network Security? Keep the bad guys out. (1) Closed networks
Securing Database Servers. Database security for enterprise information systems and security professionals
Securing Database Servers Database security for enterprise information systems and security professionals Introduction: Database servers are the foundation of virtually every Electronic Business, Financial,
Web Security School Final Exam
Web Security School Final Exam By Michael Cobb 1.) Which of the following services is not required to run a Windows server solely configured to run IIS and publish a Web site on the Internet? a. IIS Admin
Hacking Database for Owning your Data
Hacking Database for Owning your Data 1 Introduction By Abdulaziz Alrasheed & Xiuwei Yi Stealing data is becoming a major threat. In 2012 alone, 500 fortune companies were compromised causing lots of money
WHITE PAPER. FortiWeb and the OWASP Top 10 Mitigating the most dangerous application security threats
WHITE PAPER FortiWeb and the OWASP Top 10 PAGE 2 Introduction The Open Web Application Security project (OWASP) Top Ten provides a powerful awareness document for web application security. The OWASP Top
The purpose of this report is to educate our prospective clients about capabilities of Hackers Locked.
This sample report is published with prior consent of our client in view of the fact that the current release of this web application is three major releases ahead in its life cycle. Issues pointed out
An Introduction To The Web File Manager
An Introduction To The Web File Manager When clients need to use a Web browser to access your FTP site, use the Web File Manager to provide a more reliable, consistent, and inviting interface. Popular
Loophole+ with Ethical Hacking and Penetration Testing
Loophole+ with Ethical Hacking and Penetration Testing Duration Lecture and Demonstration: 15 Hours Security Challenge: 01 Hours Introduction Security can't be guaranteed. As Clint Eastwood once said,
Where every interaction matters.
Where every interaction matters. Peer 1 Vigilant Web Application Firewall Powered by Alert Logic The Open Web Application Security Project (OWASP) Top Ten Web Security Risks and Countermeasures White Paper
A Decision Maker s Guide to Securing an IT Infrastructure
A Decision Maker s Guide to Securing an IT Infrastructure A Rackspace White Paper Spring 2010 Summary With so many malicious attacks taking place now, securing an IT infrastructure is vital. The purpose
How can I keep my account safe from hackers, scammers and spammers?
How can I keep my account safe from hackers, scammers and spammers? The question is a good one and especially important if you've purchased shared hosting (such as HostDime offers) since what effects your
Recon and Mapping Tools and Exploitation Tools in SamuraiWTF Report section Nick Robbins
Recon and Mapping Tools and Exploitation Tools in SamuraiWTF Report section Nick Robbins During initial stages of penetration testing it is essential to build a strong information foundation before you
Using Microsoft s Free Security Tools Help Secure your Windows Systems taken from Web and Other Sources by Thomas Jerry Scott November, 2003
Using Microsoft s Free Security Tools Help Secure your Windows Systems taken from Web and Other Sources by Thomas Jerry Scott November, 2003 The following chart shows the name and download locations for
The Top Web Application Attacks: Are you vulnerable?
QM07 The Top Web Application Attacks: Are you vulnerable? John Burroughs, CISSP Sr Security Architect, Watchfire Solutions [email protected] Agenda Current State of Web Application Security Understanding
Countermeasures against Spyware
(2) Countermeasures against Spyware Are you sure your computer is not infected with Spyware? Information-technology Promotion Agency IT Security Center http://www.ipa.go.jp/security/ 1. What is a Spyware?
FileMaker Server 9. Custom Web Publishing with PHP
FileMaker Server 9 Custom Web Publishing with PHP 2007 FileMaker, Inc. All Rights Reserved. FileMaker, Inc. 5201 Patrick Henry Drive Santa Clara, California 95054 FileMaker is a trademark of FileMaker,
The Real State of WiFi Security in the Connected Home August 25, 2015
The Real State of WiFi Security in the Connected Home August 25, 2015 1 Abstract Analyzing real-world data can teach us about the state of security in the connected home. RouterCheck, a tool for testing
Transferring Your Internet Services
Page 1 of 6 Transferring Your Internet Services Below you will find the instructions necessary to move your web hosting, email, and DNS services to NuVox. The Basics Transferring your domain name Preparing
White Paper Secure Reverse Proxy Server and Web Application Firewall
White Paper Secure Reverse Proxy Server and Web Application Firewall 2 Contents 3 3 4 4 8 Losing control Online accessibility means vulnerability Regain control with a central access point Strategic security
Kentico CMS security facts
Kentico CMS security facts ELSE 1 www.kentico.com Preface The document provides the reader an overview of how security is handled by Kentico CMS. It does not give a full list of all possibilities in the
Digital certificates and SSL
Digital certificates and SSL 20 out of 33 rated this helpful Applies to: Exchange Server 2013 Topic Last Modified: 2013-08-26 Secure Sockets Layer (SSL) is a method for securing communications between
Hardening Joomla 1. HARDENING PHP. 1.1 Installing Suhosin. 1.2 Disable Remote Includes. 1.3 Disable Unneeded Functions & Classes
1. HARDENING PHP Hardening Joomla 1.1 Installing Suhosin Suhosin is a PHP Hardening patch which aims to protect the PHP engine and runtime environment from common exploits, such as buffer overflows in
Web Application Vulnerability Testing with Nessus
The OWASP Foundation http://www.owasp.org Web Application Vulnerability Testing with Nessus Rïk A. Jones, CISSP [email protected] Rïk A. Jones Web developer since 1995 (16+ years) Involved with information
