Effectiveness of Web Application Security Scanners at Detecting Vulnerabilities behind AJAX/JSON
|
|
|
- Shawn Willis
- 9 years ago
- Views:
Transcription
1 Effectiveness of Web Application Security Scanners at Detecting Vulnerabilities behind AJAX/JSON Faustin Kagorora 1,3, Junyi Li 2,3, Damien Hanyurwimfura 1,3, Lancine Camara 1,3 P.G. Student, College of Computer Science and Electronic Engineering, Hunan University, Changsha, China 1 Associate Professor, College of Computer Science and Electronic Engineering, Hunan University, Changsha, China 2 Key Laboratory for Embedded and Network Computing of Hunan Province, Hunan University, Changsha, China 3 ABSTRACT: Web applications are used by almost all organizations in all sectors and are accessed by a large number of anonymous users, including malicious users. This wide visibility makes them susceptible to various attacks, such as SQL Injection (SQLI). Web application vulnerability scanners (WAVS) are automated black-box testing tools that examine web applications for security vulnerabilities. Evaluations of WAVSs have shown that executing client-side code is a major challenge to many scanners. However, despite the popularity of AJAX (Asynchronous JavaScript and XML) and JSON (JavaScript Object Notation) in modern web applications, no evaluation implemented test cases for the support for both AJAX and JSON technologies. This paper presents a test application and an assessment of the capability of 5 state-of-the-art black-box scanners to detect vulnerabilities hidden behind AJAX requests and JSON data. The test suite contains many vulnerability instances, with different levels of exploitation difficulty. Our experimental results show that executing AJAX code and analyzing JSON parameters are still challenges to many tools. We provide recommendations for assessing complete capability of WAVSs as evaluations did not cover all the main features. KEYWORDS: Black-box testing, vulnerability detection, web application security, Rich Internet Application, web application vulnerability scanner. I. INTRODUCTION Web applications are exposed to the general public and accessed by a large number of anonymous users, including malicious users. This wide visibility makes them susceptible to various attacks, such as SQL Injection attacks. Furthermore, web applications are used by almost all organizations in all sectors including banking, health care, education, and manufacturing, among others. Thus, the security of web applications becomes an issue of critical importance. Web application vulnerabilities account for the majority of the vulnerabilities reported in the Common Vulnerabilities and Exposures (CVE) database [1]. According to Open Web Application Security Project (OWASP) Top 10 [2], input validation weaknesses cause most web application vulnerabilities. The complexity of modern web applications, along with the many different technologies used in various abstraction layers, are also the main causes of vulnerabilities in web applications. Two main approaches to test software applications for the presence of bugs and vulnerabilities are white-box testing and black-box testing. In white-box testing, the source code of the application is analyzed to find defective or vulnerable lines of code. In black-box testing, the source code is not examined directly. Instead, special input test cases are generated and sent to the application. Then, the results returned by the application are analyzed for unexpected behavior that indicates errors or vulnerabilities. Copyright to IJIRSET DOI: /IJIRSET
2 Despite the use of many different testing techniques, we still find numerous exploitation reports in different publicly available databases, such as CVE [1] and Open Source Vulnerability Databases (OSVDB) [3]. As published in Symantec Internet Security Threat Report 2014 [4], eight of the breaches in 2013 exposed more than 10 million identities each. Web application vulnerability scanners (WAVS) are automated black-box testing tools that examine web applications for security vulnerabilities. They are more popular due to the ease of use, automation, and independence from the specific web application s technologies. However, WAVSs suffer from a number of limitations. They are not capable of detecting all the vulnerabilities and input vectors that exist. Several reports have shown that web application vulnerability scanners fail to detect a significant number of vulnerabilities in test applications [5]-[9]. Studies have also shown that executing client-side code and crawling multi-step processes are major challenges to many black-box scanners. The emergence of richer and more advanced technologies, such as AJAX (Asynchronous JavaScript and XML), has made web applications more responsive, interactive and user friendly. These applications, often called Rich Internet Applications (RIAs), improved traditional web applications in two ways: First, they add more processing capability, i.e. dynamic manipulation of client-side state, on the client-side. Second, RIAs can initiate asynchronous communication with the server. However, at the same time, such techniques introduced new challenges. One important challenge is the difficulty of automatically crawling these new applications [10]-[13]. AJAX is a group of interrelated web development techniques used on the client-side to create asynchronous web applications. It is the most viable Rich Internet Application (RIA) technology so far. Client-scripts can generate requests to the server without blocking the user interaction and the responses are processed when they arrive. This is accomplished by using XMLHttpRequest object and JavaScript to make asynchronous requests to the web server, parsing the responses and then updating the page DOM HTML and CSS. Despite the name, the use of XML is not required; JSON is often used instead. JSON (JavaScript Object Notation) is a lightweight data-interchange format. It is easy for humans to read and write and easy for machines to parse and generate. It is based on a subset of the JavaScript programming language, standard ECMA-262 3rd Edition. JSON is primarily used to transmit data between a server and web application, as an alternative to XML. JSON has also become another popular way to store data in a structured way after XML. With JSON, you use JavaScript's array and object literals syntax to define data inside a text file in a way that can be returned as a JavaScript object. There are several studies that evaluated WAVSs but none of them implemented vulnerabilities behind both AJAX and JSON. Since JSON is the response content of AJAX calls, a scanner must be capable of executing AJAX scripts before accessing JSON code. The application language is one of the factors when choosing a WAVS. For example, if the application uses extensive AJAX code, a scanner that cannot crawl AJAX will not be a good choice. To detect a vulnerability hidden behind AJAX/JSON code, a scanner needs to execute AJAX code and audit JSON parameters. There are many web scanners available on the market [9],[14], commercial and open source, and each scanner may be different in the way and number of vulnerabilities it can detect. However, a good scanner should find as many true vulnerabilities as possible. It should also be able to build a report that shows the time, action performed, effects, and the area of the application where it detected the vulnerability. Additionally, it should report a minimum number of false positives (spurious vulnerabilities) in the report. This paper presents a test application and an assessment of 5 state-of-the-art web application vulnerability scanners on their capabilities to detect vulnerabilities accessible after executing AJAX and JSON code. The test suite is implemented in a realistic application (online store) and contains many vulnerability instances, with different levels of exploitation difficulty. Implemented vulnerabilities include reflected and stored XSS (also known as persistent or second-order XSS), and first-order and stored SQL Injection. Experimental results show that executing AJAX code is still a challenge to many scanners. Among the 5 tested tools, only one executed AJAX requests and audited JSON parameters successfully. Unfortunately, no scanner detected stored vulnerabilities. Copyright to IJIRSET DOI: /IJIRSET
3 The remainder of this paper is organized as follows: Section II describes the principle of web application vulnerability scanners and their support for input delivery methods and web application technologies. Section III briefly discusses related work. Section IV describes the test application. Experimental results are presented and discussed in Section V. We conclude with recommendations to assess complete capability of web application vulnerability scanners and future work. II. WEB APPLICATION VULNERABILITY SCANNERS Web Application Vulnerability Scanners (WAVS), also known as web application security scanners, are automated black-box testing tools [15] that examine web applications for security vulnerabilities. They crawl through a web application s pages and search the application for vulnerabilities by simulating attacks on it. This involves generation of malicious inputs that are submitted to the application and subsequent evaluation of application s response. A large number of both commercial and open source tools are available and all these tools have their own strengths and weaknesses. Web application developers use them to verify the security of their products and to preserve the integrity, confidentiality, and availability of developed applications for their clients. 2.1 Mechanics of a scanner Most of the WAVSs use fuzz testing or fault injection. Oehlert [16] defines fuzzing as a highly automated testing technique that covers numerous boundary cases using invalid data (from files, network protocols, API calls, and other targets) as application input to better ensure the absence of exploitable vulnerabilities. The mechanics of a scanner is a three-step process: 1. Crawling: the scanner crawls the web application to find the web pages that are part of that application and associated input vectors (data entry points), such as forms, request parameters and cookies, and creates an indexed list of all visited pages. The task of finding pages can be fulfilled automatically (using web crawlers), manually (recorded by a proxy) or semi-automatically (crawler asks for operator s assistance). If the crawling engine of a web application scanner is poor and cannot reach the vulnerability, then the scanner will surely miss the vulnerability. WAVSs have problems indexing web pages that use JavaScript and AJAX. AJAX-based applications rely on Stateful Asynchronous client/server communication, and client-side runtime manipulation of the Document Object Model (DOM) tree. This makes them fundamentally different from traditional web applications and harder to test. 2. Simulation of attacks (fuzzing): the scanner sends potential attack patterns to the previously identified inputs. For each input and for each vulnerability type for which the web vulnerability scanner tests, the attacker module generates values that are likely to trigger a vulnerability. For example, the attacker module would try to inject JavaScript code when testing for XSS vulnerabilities. 3. Response analysis: In this phase the result of the fuzzing phase is analyzed to check if the web application is vulnerable and to provide feedback to the other modules. The result of every fuzz packet is monitored; it is vital to know what packet caused what result. How this monitoring takes place depends on the target and the type of vulnerability that is tested. For instance, monitoring for XSS vulnerabilities will consist of crawling the web application again and searching for pages that contain the input that was injected during the execution of the fuzzed data [17] Input Delivery Methods Supported by Web Application Vulnerability Scanners Modern web applications use various methods for delivering inputs from the browser to the server. These methods include standard input delivery methods, such as HTTP query string parameters (GET) and HTTP body parameters (POST), modern delivery methods, such as XML and JSON, and binary delivery methods for technology specific objects, such as Java serialized objects, AMF, and WCF. According to a recent research [9], which gathered and summarized scanners documentations, commonly supported input vectors are GET (supported by all the scanners), and POST. Cookies and Headers are supported by almost a half Copyright to IJIRSET DOI: /IJIRSET
4 of scanners tested. Some input vectors, such as JSON parameters, XML Elements Content, and HTTP Path, are supported by a small number of scanners. Delivery methods for technology specific objects, namely Java Serialized Objects,.NET PostBack Encoded Parameters,.NET Serialized Objects,.NET Binary WCF Objects, and HTML 5 Web Sockets are not supported by any scanner. Supporting the input delivery method of the tested application is a necessity as the vast majority of active scan plugins (plugins that attempt to find potential vulnerabilities by using known attacks against the selected targets) rely on input that is meant to be injected into client originating parameters. A tool cannot detect a vulnerability in a given parameter if it cannot mimic an application s method of delivering input. The more vectors of input delivery that the scanner supports, the more versatile it is in scanning different technologies and applications Supported Application Technologies WAVSs are not language dependent. A WAVS is able to scan JAVA/JSP, PHP or any other engine driven web application. However, a scanner may perform differently on applications written in different languages. Evaluations [6], [7], and [9] have shown that almost all scanners can automatically crawl HTML Links and Forms, but many of them cannot fill fields with default values while automatically crawling the application. These studies have also shown that the major challenge about crawling is the execution of client-side code. Doupé [7] and Ertaul [18] added that crawling multi-step processes is another major challenge. Application technologies overlooked by most web application scanners include JSON, REST, Java Applets, Flash, Silverlight, and anti-xsrf/csrf tokens. The application language is one of the factors when choosing a web scanner. For example, if the application uses extensive AJAX code, a scanner that cannot crawl AJAX will not be a good choice. Dynamic technologies, such AJAX, generally challenge WAVSs. WAVSs send requests to the application and analyze responses. Since AJAX is used on the client-side to create asynchronous web applications, a WAVS have to execute AJAX scripts before it can send a request. In classic web application, when a vulnerability is discovered, WAVSs would reference the page and parameter where the issue was found. This cannot be applied to AJAX application because everything is often presented as a single page with many possible user events. The vulnerability may rely on a certain combination of steps to occur before it exists, which makes automated scanning a challenge. To detect a vulnerability hidden behind AJAX/JSON code, a scanner needs to execute AJAX code and process and analyze JSON parameters. III. RELATED WORK Our work is related to two main research areas: the design of web applications for assessing web application vulnerability scanners and the evaluations of these tools. Testing WAVSs requires web applications with vulnerabilities. Unfortunately, no standard test suite is currently available. There are several existing vulnerable web applications, such as and Mutillidae [19], Damn Vulnerable Web Application (DVWA) [20], and WebGoat Project [21], with vulnerabilities of different types, but they are mainly designed for teaching web application security rather than realistic benchmark for web vulnerability scanners. OWASP SiteGenerator Project [22] is a tool to generate dynamic websites based on XML files and predefined vulnerabilities. Wackopicko [23] and Web Application Vulnerability Scanner Evaluation Project (WAVSEP) [24], test applications used in evaluations [7] and [9], respectively, are also publicly available. However, none of these test suites includes test cases for vulnerabilities hidden behind AJAX and JSON, despite the popularity of these technologies in rich internet applications. There are several studies that evaluated WAVSs. Some tested scanners for one particular vulnerability and others implemented many vulnerability types in their test applications. Bau et al. [6] performed a comparative study on 8 commercial scanners and tested them on well-known web applications and on a custom application. They found that most scanners tended to perform well on reflected XSS and first-order SQL injection vulnerabilities but very poorly on Copyright to IJIRSET DOI: /IJIRSET
5 stored vulnerabilities. Additionally, results show that scanners have poor understanding of active content, such as Silverlight and Flash, and scripting languages, such as Java Applets. The custom application included a vulnerability in which usernames are disclosed via AJAX requests and CSRF-like JSON hijacking vulnerabilities but authors did not discuss detection results for these particular vulnerabilities. Results were presented for information disclosure and CSRF vulnerabilities in general. Doupé et al. [7] evaluated eleven black-box web vulnerability scanners against a custom application containing different types of vulnerabilities and different crawling challenges. Executing client-side code challenged many scanners. The test application included a vulnerability behind JavaScript but no AJAX or JOSN test cases implemented. The authors used Web Input Vector Extractor Teaser (WIVET) [25] to test the scanners support for the client-side code. Ferreira et al. [8] built a vulnerable application and ran scanners against it. Results indicated that scanners performed decently well on reflected XSS and first-order SQL injection, and poorly on stored XSS and Cross-Site Request Forgery (CSRF). No scanner detected unrestricted URL access vulnerability. Chen [9] compared price and features of WAVSs. Detection results show that many scanners performed fairly well in detecting reflected XSS, and first-order SQL injections, and a number of scanners found Path Traversal/ Local File Inclusion. Scanners, as a group, performed very poorly in detecting old, backup and unreferenced files, and unvalidated redirect. Chen also summarized, based on documentations, scanners audit features, scan barrier and input vector support, and authentication features. Ertaul et al. [18] implemented OWASP Top 10 vulnerabilities in a test application and tested two WAVSs against the application. Detection results indicate that the biggest challenge for these two WAVSs is to exploit stored and multistep vulnerabilities. Khoury et al. [26] tested 3 black-box scanners for persistent SQL injection vulnerabilities by running them on testbeds used by Bau [6] and Doupé [7] and a custom application containing one vulnerability instance. Test results show that the scanners are very poor at detecting persistent SQL injections even when they taught how to exploit the vulnerabilities. Alassmi et al. [27] extended the analysis of Bau and Doupé on detection of stored XSS and confirmed the weaknesses and limitations they discussed, mainly in scanners analysis phase. IV. TEST APPLICATION Testing web application vulnerability scanners requires web applications with vulnerabilities. Unfortunately, no standard test suite is currently available. As discussed in section III, none of existing test suites includes vulnerabilities hidden behind AJAX and JSON, despite the popularity of these technologies in rich internet applications. Therefore, we decided to create our own test application. 4.1 Design The test application is a realistic and fully functional online shopping site. A user is able to browse product catalog, purchase products, write reviews on products, and leave a feedback on guest book. When logged in, a user can buy, check order history, return a product, save cart content and wishlist, and edit personal information. The system is managed via a special area for administrators only. Authentication: the test application has a user registration system. After logging in, the user can access restricted features. Search: The test application provides a search toolbar at the top of every client page to allow users to easily search for products. Purchase Products: The purchase is a multi-step process in which a shopping cart is filled with the items to be bought. After adding items to the cart, the total price is calculated, discount coupons may be and the order is placed. The checkout process uses extensive AJAX scripts. At the time of checking out, if the user is logged in, his address is fetched and presented to the user as his shipping address, with an option to enter a new address. If the user is not logged in, a login form, register option, and an option to checkout as a guest are provided. After specifying shipping address, Copyright to IJIRSET DOI: /IJIRSET
6 the application fetches and displays shipping methods (for simplicity, we used flat shipping rate: charging a fixed fee per item). Afterwards, the user chooses a payment method (e.g. cash on delivery) and a comment field is provided for any additional information. The entire checkout process takes place without leaving the checkout page; AJAX requests are used to fetch and send content depending on the user s choice. If a scanner cannot execute AJAX and JSON code, it cannot complete the checkout process. Review on products: on product information page, a user can write a review on that product. The review content is submitted in AJAX request, with JSON as response datatype. Guestbook: the guestbook page provides a way to receive feedback from visitors. The form used to submit feedback contains a name, , and message fields. Administrator s Area: The test application has a special area for administrators only. Their tasks include managing products and user accounts, performing order transactions, among others. The test application is a PHP-based application and is deployed on Apache server. It uses a database on MySQL server to store the data for the website. These technologies are chosen as the underlying architecture of our application because of their widespread and popularity. The test application also uses Hypertext Markup Language (HTML), Cascading Style Sheet (CSS), JavaScript, AJAX, and JSON technologies Vulnerabilities The test application contains different vulnerability instances of the same vulnerability types, from easily detectable to instances harder to detect. We implemented Cross-Site Scripting and SQL injection as they are the most popular vulnerabilities in the wild. First-order SQL Injection: In this category, we implemented 5 vulnerability instances: (1) there is SQL vulnerability on feedback page as the name of the author is inserted into the SQL query without validation. (2) To navigate to the next page of guestbook messages, the page number is sent in the GET request and used in SQL query without sanitization. (3) From product page, the review author name is inserted into the database without proper sanitization. The form data is submitted in AJAX request, and the response data is a JSON object. (4) Before checking out, a customer can view the details of his shopping cart. The coupon may be applied to see new prices. The coupon number is immediately used in SQL command without validation. The coupon value is sent into AJAX Request and the response data is a JSON object. (5) At the end of checkout process, before confirming order, the customer is given a comment field to add any additional information about his order. This comment is inserted into SQL query without validation. For a scanner to detect this vulnerability, it must execute all previous AJAX requests required to reach the end of the checkout process. Second-order SQL Injection: There are two second-order SQLI vulnerability instances. (1) On guestbook, the author s name, which is inserted without sanitization, is used to fetch all messages written by this person. (2) On the product page, the name of the reviewer, which is inserted without validation, is used to retrieve reviews posted by this customer. Since reviews are submitted using AJAX script and JSON data as the response, the scanner must execute AJAX and JSON, and revisit the page to detect this vulnerability. Reflected XSS: We implemented 2 instances of reflected XSS: (1) On Contact us page, the user is required to enter his name, , and the message body. When the form is submitted, the name is reflected back to the user (in a JSON object), without validation, telling them that their message was successfully sent. (2) When a user submits search keywords, the search keyword is displayed back to the user, along with search results, without proper escaping. Stored XSS: The test application contains 4 stored XSS. (1) On product page, the name of review author is not escaped, allowing an attacker to write a name containing malicious code. Whenever the product page loads, which is loaded along with the product reviews, the attack will be triggered and the code will be executed. The review form data are sent using AJAX request, without leaving the product page. (2) The review message is not properly escaped. For a scanner to detect the above two stored XSS it must have the ability to execute AJAX scripts and audit JSON response. Copyright to IJIRSET DOI: /IJIRSET
7 (3) On guestbook page, a customer can write a message. The name of the customer is not validated, and is later displayed on feedback page. (4) The feedback body is not properly sanitized. In total, the test application contains 13 vulnerabilities (2 reflected XSS, 4 persistent XSS, 5 first-order SQLI, and 2 second-order SQLI). V. EXPERIMENTAL EVALUATION We tested 5 web application vulnerability scanners by running them on our test application. We chose scanners that claim the ability to execute AJAX or both AJAX and JSON code. These are Acunetix [28], Arachni [29], IronWASP (Iron Web Application Advanced Security testing Platform) [30], Vega [31], and ZAP (Zed Attack Proxy) [32]. ZAP also offers scanning profile for persistent XSS vulnerabilities. All these scanners claim to have the ability to audit JavaScript and AJAX code. Arachni, Acunetix, and ZAP add that they are able to audit JSON data. Characteristics of the scanners we evaluated are summarized in Table I Setup Table I Characteristics of Scanners Evaluated Name Version License Acunetix 9.5 Build Commercial Arachni Apache License v2.0 IronWASP 2015 beta GPL3 Vega 1.0 EPL1 ZAP Apache License v2.0 The initial state, before every test run, included 14 products (in different product categories), 2 user reviews (on different products), 1 customer account, 1 order, and 1 customer feedback. In addition to scanning the whole application, vulnerable pages were individually scanned multiple times using various configurations, and using a scan policy that only included the relevant plugins. Each scanner was also put into a proxy mode and then the user browsed to each vulnerable page. A review was written, a feedback was posted, a coupon was applied, and a new order was placed. The scanner was then instructed to scan the test application. The test procedure consists of the following steps: Initialize the database Configure the test application, including deleting all cookies Configure and run a selected web vulnerability scanner Save scanner results or report Dump the database to a backup directory Check the scanner s report and detection results Analyze database records Count and classify vulnerabilities in the scanner output We repeated these steps for every scanner. After the test results are generated, they are reviewed and organized in groups, namely Detected, Missed (false negatives), and false positives. 5.2 Vulnerability Detection Results and Discussion Overall Results: Table II presents the number of vulnerabilities detected by each scanner. Our test results show that WAVSs perform decently well on reflected XSS and first-order SQL injection on pages that do not have client-side code, and poorly on executing AJAX scripts. Among 7 vulnerabilities accessible after executing AJAX and JSON (1 instance of reflected XSS, 2 persistent XSS, 3 first-order SQL injections, and 1 second-order SQL injection ), only 1 instance of first-order SQL injection was found and it was detected by one scanner which executed AJAX and JSON Copyright to IJIRSET DOI: /IJIRSET
8 successfully. This suggests that AJAX and JSON support have to be improved as these technologies are popular in modern web applications. Table II Vulnerability Detection Results Acunetix Arachni IronWASP Vega ZAP First-order Detected SQLI Missed Second-order Detected SQLI Missed Reflected XSS Detected Missed Persistent Detected XSS Missed First-order SQL Injection: All scanners detected two easily detectable SQL injection vulnerabilities. These two vulnerabilities are on forms that do not involve client-side code for processing and there is no form of validation applied on user input. In addition, SQL errors are reflected back to the client immediately after the attack. The tool only needs to send a request and analyze its response immediately, without any additional step. Acunetix is the only scanner that executed AJAX requests and audited JSON data in the response after writing a product review, hence detecting the SQLI vulnerability on product page. No scanner found SQL injection vulnerabilities present when applying a coupon on the shopping cart and on comment field at the end of checkout process. For a scanner to detect a vulnerability when using coupon, it has to maintain shopping cart session cookie and customer authentication session cookie, implemented using custom session cookies, which complicated all the scanners. The vulnerability on the comment field was not found by any scanner as no scanner reached the end of checkout process. The failure to reach this stage is due to the inability of tested scanners to understand our custom session cookies and execute AJAX/JSON code. Second-order SQL Injection: scanners did not detect any of the two persistent SQLI vulnerabilities. One vulnerability is on the feedback page, which does not contain any client-side code, and the other one is on product page (name of review author) which requires execution of AJAX and JSON code before it can be detected. All the scanners scanned the feedback page and succeeded to store attack codes in the database, but none of them reported a vulnerability. This indicates that the failure to detect persistent vulnerabilities is not due to the failure to execute client-side code but because of weaknesses in attack and analysis modules of the scanners. Most of the attack codes were meant to exploit reflected or blind SQL injection, where an immediate answer was expected. Unlike first-order SQLI, receiving an error while trying to store an attack code could mean that the first step has failed, and the code was not stored. Detecting a blind SQL injection could mean that the first step of stored SQLI has succeeded. The scanner should know if the attack code was successfully stored and keep its state. It also should remember which form was used to store that attack code, and what other data were submitted along with the code. Later, the scanner should crawl again to find related data and try to execute its own code. No scanner followed this logic. Having a Stateful scanner [33] would be more efficient for the scanner to relate the application s inputs and outputs, and thus understand the state-based transactions that take place. Reflected XSS: All the scanners found the XSS vulnerability on the search field but only one tool detected the vulnerability on contact us page as this vulnerability requires the execution of AJAX script and analyzing JSON parameters. To test for XSS vulnerabilities, a tool needs to identify input vectors and verify whether an application or web server responds to requests containing scripts with an HTTP response that could be executed by a browser. All scanners successfully injected attack scripts in the search field and linked the response to the attack as the injected scripted is immediately executed. Except Acunetix, executing AJAX script challenged the tools and consequently they did not find the vulnerability on contact us page. Copyright to IJIRSET DOI: /IJIRSET
9 Persistent XSS: All the scanners failed to detect stored XSS vulnerabilities despite using various configurations, including relevant scanning profiles. When scanning the feedback page, all the tools successfully saved attack codes in the database but failed to detect stored vulnerabilities. The failure may be due to the fact that the impact of stored XSS is not immediate, as all the scanners detected reflected XSS on search toolbar, and due to the weaknesses of analysis phase of web scanners cycle. To detect stored XSS vulnerabilities, the scanner must be able to mimic persistent XSS attacks in order to detect XSS vulnerabilities. A persistent attack requires two or more steps to complete the attack. The tool has to store the attack script in the database. Later, the attack code should be retrieved from the database and executed. Scanners have difficulties with following these steps, and consequently miss these vulnerabilities. We believe that scanners failed to confirm that an attack code was successfully stored and consequently did not revisit the injected page to verify if the injected code was rendered or not. The scanners may also have trouble linking the later observation with the earlier attack event. On product page, the scanner must execute AJAX and JSON, and revisit the page to find the vulnerabilities. Although Acunetix successfully inserted scripts, it failed to make required analysis. It did not realize that it was executing its own attack code. Failure to detect stored XSS vulnerabilities while the attack code is stored indicates that increasing observability needs further research. False positive: Some scanners reported genuine false positives. The number of false positives measures the accuracy of the scanner. If the false positives are high, the tool will be less useful to the user as he/she has to figure out which of the vulnerabilities reported are actual flaws and which are spurious results of the analysis. And this requires a securityconscious user to evaluate the reports. The total number of false positives for each scanner is shown in Table III. Table III False Positives Scanner False Positive Acunetix 0 Arachni 1 IronWASP 1 Vega 3 ZAP 4 ZAP reported four false XSS vulnerabilities and Vega reported three false SQL injection vulnerabilities. Arachni and IronWASP reported one SQL injection each. VI. CONCLUSION This paper presented a test application and assessed 5 web application vulnerability scanners on their effectiveness at detecting vulnerabilities hidden behind AJAX/JSON. Experimental results show that executing AJAX code is a challenge to many tools. Among five scanners we tested, only one tool detected a vulnerability behind AJAX/JSON. Since JSON is the response content of AJAX requests, a tool must be capable of executing AJAX scripts before accessing JSON code. As many tools send the same attack code into hundreds of requests or use the same attack codes to test for different vulnerability types, web scanner developers should improve on increasing coverage of attack vectors and different variations of attacks to be injected. In order to increase stored vulnerabilities detection ability, a scanner should crawl the application again after injecting attack codes and verify if its own code is rendered or not. As WAVSs evaluations did not cover all main features, they do not provide a complete assessment and comparison of WAVSs. A complete benchmark should implement multiple vulnerability instances, from easily exploitable and detectable to the unbreakable and virtually undetectable, for each vulnerability type. Features to be tested include entry point coverage, input vector coverage, audit features, and accuracy level of each plugin supported by the scanner. Copyright to IJIRSET DOI: /IJIRSET
10 Crawling modern web technologies, automated detection of complex vulnerabilities, such as stored XSS, stored SQL injection, and custom session management ability require further research. VII. ACKNOWLEDGEMENT This project is sponsored by the Scientific Research Foundation of the Overseas Chinese Scholars. REFERENCES [1] MITRE, Common Vulnerabilities and Exposures. [2] OWASP, Top Ten Project. [3] Open Source Vulnerability Database. [4] P. Wood, B. Nahorney, K. Chandrasekar, S. Wallace, and K. Haley, Internet Security Threat Report 2014, Semantec Corporation, Vol.19, [5] L. Suto, Analyzing the Accuracy and Time Costs of Web Application Security Scanners, Beyond Trust, [6] J. Bau,, E. Bursztein, D. Gupta, and J. Mitchell, State of the Art: Automated Black-Box Web Vulnerability Testing, in Proc IEEE Symposium on Security and Privacy, pp , [7] A. Doupé, M. Cova, and G. Vigna, Why Johnny Can t Pentest: An Analysis of Black- Web Vulnerability Scanners, in Proc. 7th Int. Conf. on Detection of Intrusions and Malware, and Vulnerability Assessment, pp , [8] A. M. Ferreira, and H. Kleppe, Effectiveness of Automated Application Penetration Testing Tools, Master dissertation., Master Education SNE/OS3, University of Amsterdam, Netherlands, [9] S. Chen, Price and Feature Comparison of Web Application Scanners, February [10] S. Choudhary, M. E. Dincturk, S. M. Mirtaheri et al. Crawling Rich Internet Applications: The State of the Art, Software Security Research Group, University of Ottawa [11] S. M. Mirtaheri, D. Zou, G. V. Bochmann G., G. V. Jourdan, and I. V. Onut, Dist-RIA Crawler: A Distributed Crawler for Rich Internet Applications, in Proc Int. Conf. on P2P, Grid, Cloud, and Internet Computing, pp , [12] K. Benjamin, G. V. Bochmann, G. V. Jourdan, and I. V. Onut, Some Modeling Challenges when Testing Internet Rich Applications for Security, Third International Conf. on Software Testing, Verification, and Validation Workshops, pp , [13] A. Mesbah, A. V. Deursen, and S. Lenselink, Crawling AJAX-Based Web Applications through Dynamic Analysis of User Interface State Changes, ACM Transactions on the Web, Vol. 6, No.1, article 3, [14] OWASP, Vulnerability Scanning Tools. [15] E. Fong, and V. Okun, Wed Application Scanners: Definitions and functions. in Proc. 40th Annual Hawaii Int. Conf. on System Sciences, 280b, [16] P. Oehlert, Violating Assumptions with Fuzzing, IEEE Computer Security and Privacy, vol. 3, No.2, pp , [17] S. McAllister, E. Kirda, and C. Kruegel, Leveraging User Interactions for In-Depth Testing of Web Applications, in Proc. 11th international symposium on Recent Advances in Intrusion Detection, pp , [18] L. Ertaul, and Y. Martirosyan, Implementation of a Web Application for Evaluation of Web Application Security Scanners, in Proc Int. Conf. on Security and Management, pp , [19] J. Druin, Mutillidae 2 Project, Open Web Application Security Project. [20] Damn Vulnerable Web Application (DVWA), RandomStorm, [21] B. Mayhew, OWASP WebGoat Project. [22] OWASP SiteGenerator Project. OWASP_SiteGenerator [23] A. Doupé, GitHub Inc.. [24] S. Chen, Web Application Vulnerability Evaluation Project (WAVSEP). [25] B. Urgun, Web Input Vector Extractor Teaser. [26] N. Khoury, P. Zavarsky, D. Lindskog, and R. Ruhl, Testing and Assessing Web Vulnerability Scanners for Persistent SQL Injection Attacks, in Proc. 1st Int. Workshop on Security and Privacy Preserving in e-societies, pp , [27] S. Alassmi, P. Zavarsky, D. Lindskog, R. Ruhl, A. Alasiri, and M. Alzaidi, An analysis of the Effectiveness of Black-box Web Application Scanners in Detection of Stored XSSI Vulnerabilities, International Journal of Information Technology and Computer Science, vol. 4, No. 1, [28] Acunetix Web Vulnerability Scanner. [29] T. Laskos, Arachni Scanner. [30] L. Kuppan, IronWASP. [31] Vega Vulnerability Scanner, Subgraph. [32] S. Bennetts, OWASP Zed Attack Proxy (ZAP). [33] A. Doupé, L. Cavedon, C. Kruegel, and G. Vigna, Enemy of the State: A State-Aware Black-Box Web Vulnerability Scanner, in Proc. 21st USENIX Security Symposium, pp , Copyright to IJIRSET DOI: /IJIRSET
An Analysis of the Effectiveness of Black-Box Web Application Scanners in Detection of Stored XSSI Vulnerabilities
An Analysis of the Effectiveness of Black-Box Web Application Scanners in Detection of Stored XSSI Vulnerabilities Shafi Alassmi,Pavol Zavarsky, Dale Lindskog, Ron Ruhl, Ahmed Alasiri, Muteb Alzaidi Master
WEB SECURITY CONCERNS THAT WEB VULNERABILITY SCANNING CAN IDENTIFY
WEB SECURITY CONCERNS THAT WEB VULNERABILITY SCANNING CAN IDENTIFY www.alliancetechpartners.com WEB SECURITY CONCERNS THAT WEB VULNERABILITY SCANNING CAN IDENTIFY More than 70% of all websites have vulnerabilities
METHODS TO TEST WEB APPLICATION SCANNERS
METHODS TO TEST WEB APPLICATION SCANNERS Fernando Román Muñoz, Luis Javier García Villalba Group of Analysis, Security and Systems (GASS) Department of Software Engineering and Artificial Intelligence
Adobe Systems Incorporated
Adobe Connect 9.2 Page 1 of 8 Adobe Systems Incorporated Adobe Connect 9.2 Hosted Solution June 20 th 2014 Adobe Connect 9.2 Page 2 of 8 Table of Contents Engagement Overview... 3 About Connect 9.2...
(WAPT) Web Application Penetration Testing
(WAPT) Web Application Penetration Testing Module 0: Introduction 1. Introduction to the course. 2. How to get most out of the course 3. Resources you will need for the course 4. What is WAPT? Module 1:
1. Introduction. 2. Web Application. 3. Components. 4. Common Vulnerabilities. 5. Improving security in Web applications
1. Introduction 2. Web Application 3. Components 4. Common Vulnerabilities 5. Improving security in Web applications 2 What does World Wide Web security mean? Webmasters=> confidence that their site won
State of The Art: Automated Black Box Web Application Vulnerability Testing. Jason Bau, Elie Bursztein, Divij Gupta, John Mitchell
Stanford Computer Security Lab State of The Art: Automated Black Box Web Application Vulnerability Testing, Elie Bursztein, Divij Gupta, John Mitchell Background Web Application Vulnerability Protection
Why Johnny Can t Pentest: An Analysis of Black-box Web Vulnerability Scanners
Why Johnny Can t Pentest: An Analysis of Black-box Web Vulnerability Scanners Adam Doupé, Marco Cova, and Giovanni Vigna University of California, Santa Barbara {adoupe,marco,vigna}@cs.ucsb.edu Abstract.
Web Vulnerability Scanner by Using HTTP Method
Available Online at www.ijcsmc.com International Journal of Computer Science and Mobile Computing A Monthly Journal of Computer Science and Information Technology IJCSMC, Vol. 4, Issue. 9, September 2015,
Web Application Security
E-SPIN PROFESSIONAL BOOK Vulnerability Management Web Application Security ALL THE PRACTICAL KNOW HOW AND HOW TO RELATED TO THE SUBJECT MATTERS. COMBATING THE WEB VULNERABILITY THREAT Editor s Summary
Magento Security and Vulnerabilities. Roman Stepanov
Magento Security and Vulnerabilities Roman Stepanov http://ice.eltrino.com/ Table of contents Introduction Open Web Application Security Project OWASP TOP 10 List Common issues in Magento A1 Injection
Model-Based Vulnerability Testing for Web Applications
Model-Based Vulnerability Testing for Web Applications F. Lebeau, B. Legeard, F. Peureux, A. VERNOTTE FEMTO-ST Institute / University of Franche-Comté UMR CNRS 6174, 25030 Besancon, France. Smartesting
Is Drupal secure? A high-level perspective on web vulnerabilities, Drupal s solutions, and how to maintain site security
Is Drupal secure? A high-level perspective on web vulnerabilities, Drupal s solutions, and how to maintain site security Presented 2009-05-29 by David Strauss Thinking Securely Security is a process, not
Chapter 1 Web Application (In)security 1
Introduction xxiii Chapter 1 Web Application (In)security 1 The Evolution of Web Applications 2 Common Web Application Functions 4 Benefits of Web Applications 5 Web Application Security 6 "This Site Is
What is Web Security? Motivation
[email protected] http://www.brucker.ch/ Information Security ETH Zürich Zürich, Switzerland Information Security Fundamentals March 23, 2004 The End Users View The Server Providers View What is Web
Conducting Web Application Pentests. From Scoping to Report For Education Purposes Only
Conducting Web Application Pentests From Scoping to Report For Education Purposes Only Web App Pen Tests According to OWASP: A Web Application Penetration Test focuses only on evaluating the security of
Web Application Penetration Testing
Web Application Penetration Testing 2010 2010 AT&T Intellectual Property. All rights reserved. AT&T and the AT&T logo are trademarks of AT&T Intellectual Property. Will Bechtel [email protected]
Web Application Hacking (Penetration Testing) 5-day Hands-On Course
Web Application Hacking (Penetration Testing) 5-day Hands-On Course Web Application Hacking (Penetration Testing) 5-day Hands-On Course Course Description Our web sites are under attack on a daily basis
elearning for Secure Application Development
elearning for Secure Application Development Curriculum Application Security Awareness Series 1-2 Secure Software Development Series 2-8 Secure Architectures and Threat Modeling Series 9 Application Security
The Top Web Application Attacks: Are you vulnerable?
QM07 The Top Web Application Attacks: Are you vulnerable? John Burroughs, CISSP Sr Security Architect, Watchfire Solutions [email protected] Agenda Current State of Web Application Security Understanding
How To Protect A Web Application From Attack From A Trusted Environment
Standard: Version: Date: Requirement: Author: PCI Data Security Standard (PCI DSS) 1.2 October 2008 6.6 PCI Security Standards Council Information Supplement: Application Reviews and Web Application Firewalls
OWASP Top Ten Tools and Tactics
OWASP Top Ten Tools and Tactics Russ McRee Copyright 2012 HolisticInfoSec.org SANSFIRE 2012 10 JULY Welcome Manager, Security Analytics for Microsoft Online Services Security & Compliance Writer (toolsmith),
WHITE PAPER. FortiWeb and the OWASP Top 10 Mitigating the most dangerous application security threats
WHITE PAPER FortiWeb and the OWASP Top 10 PAGE 2 Introduction The Open Web Application Security project (OWASP) Top Ten provides a powerful awareness document for web application security. The OWASP Top
Information Supplement: Requirement 6.6 Code Reviews and Application Firewalls Clarified
Standard: Data Security Standard (DSS) Requirement: 6.6 Date: February 2008 Information Supplement: Requirement 6.6 Code Reviews and Application Firewalls Clarified Release date: 2008-04-15 General PCI
Detecting Web Application Vulnerabilities Using Open Source Means. OWASP 3rd Free / Libre / Open Source Software (FLOSS) Conference 27/5/2008
Detecting Web Application Vulnerabilities Using Open Source Means OWASP 3rd Free / Libre / Open Source Software (FLOSS) Conference 27/5/2008 Kostas Papapanagiotou Committee Member OWASP Greek Chapter [email protected]
Secure Web Development Teaching Modules 1. Security Testing. 1.1 Security Practices for Software Verification
Secure Web Development Teaching Modules 1 Security Testing Contents 1 Concepts... 1 1.1 Security Practices for Software Verification... 1 1.2 Software Security Testing... 2 2 Labs Objectives... 2 3 Lab
Essential IT Security Testing
Essential IT Security Testing Application Security Testing for System Testers By Andrew Muller Director of Ionize Who is this guy? IT Security consultant to the stars Member of OWASP Member of IT-012-04
FINAL DoIT 11.03.2015 - v.4 PAYMENT CARD INDUSTRY DATA SECURITY STANDARDS APPLICATION DEVELOPMENT AND MAINTENANCE PROCEDURES
Purpose: The Department of Information Technology (DoIT) is committed to developing secure applications. DoIT s System Development Methodology (SDM) and Application Development requirements ensure that
HP WebInspect Tutorial
HP WebInspect Tutorial Introduction: With the exponential increase in internet usage, companies around the world are now obsessed about having a web application of their own which would provide all the
Check list for web developers
Check list for web developers Requirement Yes No Remarks 1. Input Validation 1.1) Have you done input validation for all the user inputs using white listing and/or sanitization? 1.2) Does the input validation
Hack Proof Your Webapps
Hack Proof Your Webapps About ERM About the speaker Web Application Security Expert Enterprise Risk Management, Inc. Background Web Development and System Administration Florida International University
Using Nessus In Web Application Vulnerability Assessments
Using Nessus In Web Application Vulnerability Assessments Paul Asadoorian Product Evangelist Tenable Network Security [email protected] About Tenable Nessus vulnerability scanner, ProfessionalFeed
A Multi agent Scanner to Detect Stored XSS Vulnerabilities
A Multi agent Scanner to Detect Stored XSS Vulnerabilities E. Galán, A. Alcaide, A. Orfila, J. Blasco University Carlos III of Madrid, UC3M Leganés, Spain {edgalan,aalcaide,adiaz,jbalis}@inf.uc3m.es Abstract
Effectiveness of Automated Application Penetration Testing Tools
Effectiveness of Automated Application Penetration Testing Tools Alexandre Miguel Ferreira [email protected] Harald Kleppe [email protected] February 6, 2011 Contents 1 Introduction 1
List of Scanner Features (3 of 3)
List of Features (3 of 3) Advanced Features Acunetix WVS ) JS/ analysis & crawling, URI Coverage for XSS & SQLi, Web Services Scanning Features, GHDB, Network Scanning Features, Subdomain, Authentication
The purpose of this report is to educate our prospective clients about capabilities of Hackers Locked.
This sample report is published with prior consent of our client in view of the fact that the current release of this web application is three major releases ahead in its life cycle. Issues pointed out
Institutionen för datavetenskap
Institutionen för datavetenskap Department of Computer and Information Science Final thesis Generating web applications containing XSS and CSRF vulnerabilities by Gustav Ahlberg LIU-IDA/LITH-EX-A--14/054--SE
Evaluation of Web Security Mechanisms Using Inline Scenario & Online Scenario
Evaluation of Web Security Mechanisms Using Inline Scenario & Online Scenario M. Durai Ganesh (Research Scholars) Information Technology, St. Peter s University, Chennai- 54, Tamil Nadu, India Dr. G.Gunasekaran,
Adobe ColdFusion. Secure Profile Web Application Penetration Test. July 31, 2014. Neohapsis 217 North Jefferson Street, Suite 200 Chicago, IL 60661
Adobe ColdFusion Secure Profile Web Application Penetration Test July 31, 2014 Neohapsis 217 North Jefferson Street, Suite 200 Chicago, IL 60661 Chicago Dallas This document contains and constitutes the
Web applications. Web security: web basics. HTTP requests. URLs. GET request. Myrto Arapinis School of Informatics University of Edinburgh
Web applications Web security: web basics Myrto Arapinis School of Informatics University of Edinburgh HTTP March 19, 2015 Client Server Database (HTML, JavaScript) (PHP) (SQL) 1 / 24 2 / 24 URLs HTTP
How to break in. Tecniche avanzate di pen testing in ambito Web Application, Internal Network and Social Engineering
How to break in Tecniche avanzate di pen testing in ambito Web Application, Internal Network and Social Engineering Time Agenda Agenda Item 9:30 10:00 Introduction 10:00 10:45 Web Application Penetration
Criteria for web application security check. Version 2015.1
Criteria for web application security check Version 2015.1 i Content Introduction... iii ISC- P- 001 ISC- P- 001.1 ISC- P- 001.2 ISC- P- 001.3 ISC- P- 001.4 ISC- P- 001.5 ISC- P- 001.6 ISC- P- 001.7 ISC-
HTTPParameter Pollution. ChrysostomosDaniel
HTTPParameter Pollution ChrysostomosDaniel Introduction Nowadays, many components from web applications are commonly run on the user s computer (such as Javascript), and not just on the application s provider
Improving Web Application Security by Eliminating CWEs Weijie Chen, China INFSY 6891 Software Assurance Professor Dr. Maurice Dawson 15 December 2015
Improving Web Application Security by Eliminating CWEs Weijie Chen, China INFSY 6891 Software Assurance Professor Dr. Maurice Dawson 15 December 2015 1 P a g e ABSTRACT This study examined improving web
Where every interaction matters.
Where every interaction matters. Peer 1 Vigilant Web Application Firewall Powered by Alert Logic The Open Web Application Security Project (OWASP) Top Ten Web Security Risks and Countermeasures White Paper
Executive Summary On IronWASP
Executive Summary On IronWASP CYBER SECURITY & PRIVACY FOUNDATION 1 Software Product: IronWASP Description of the Product: IronWASP (Iron Web application Advanced Security testing Platform) is an open
Using Free Tools To Test Web Application Security
Using Free Tools To Test Web Application Security Speaker Biography Matt Neely, CISSP, CTGA, GCIH, and GCWN Manager of the Profiling Team at SecureState Areas of expertise: wireless, penetration testing,
Are AJAX Applications Vulnerable to Hack Attacks?
Are AJAX Applications Vulnerable to Hack Attacks? The importance of Securing AJAX Web Applications This paper reviews AJAX technologies with specific reference to JavaScript and briefly documents the kinds
Web Application Vulnerability Testing with Nessus
The OWASP Foundation http://www.owasp.org Web Application Vulnerability Testing with Nessus Rïk A. Jones, CISSP [email protected] Rïk A. Jones Web developer since 1995 (16+ years) Involved with information
Acunetix Website Audit. 5 November, 2014. Developer Report. Generated by Acunetix WVS Reporter (v8.0 Build 20120808)
Acunetix Website Audit 5 November, 2014 Developer Report Generated by Acunetix WVS Reporter (v8.0 Build 20120808) Scan of http://filesbi.go.id:80/ Scan details Scan information Starttime 05/11/2014 14:44:06
Practical Identification of SQL Injection Vulnerabilities
Practical Identification of SQL Injection Vulnerabilities Chad Dougherty Background and Motivation The class of vulnerabilities known as SQL injection continues to present an extremely high risk in the
Advanced Web Technology 10) XSS, CSRF and SQL Injection 2
Berner Fachhochschule, Technik und Informatik Advanced Web Technology 10) XSS, CSRF and SQL Injection Dr. E. Benoist Fall Semester 2010/2011 Table of Contents Cross Site Request Forgery - CSRF Presentation
Guidelines for Web applications protection with dedicated Web Application Firewall
Guidelines for Web applications protection with dedicated Web Application Firewall Prepared by: dr inŝ. Mariusz Stawowski, CISSP Bartosz Kryński, Imperva Certified Security Engineer INTRODUCTION Security
Columbia University Web Security Standards and Practices. Objective and Scope
Columbia University Web Security Standards and Practices Objective and Scope Effective Date: January 2011 This Web Security Standards and Practices document establishes a baseline of security related requirements
SANDCAT THE WEB APPLICATION SECURITY ASSESSMENT SUITE WHAT IS SANDCAT? MAIN COMPONENTS. Web Application Security
SANDCAT WHAT IS SANDCAT? THE WEB APPLICATION SECURITY ASSESSMENT SUITE Sandcat is a hybrid multilanguage web application security assessment suite - a software suite that simulates web-based attacks. Sandcat
Application Code Development Standards
Application Code Development Standards Overview This document is intended to provide guidance to campus system owners and software developers regarding secure software engineering practices. These standards
SERENA SOFTWARE Serena Service Manager Security
SERENA SOFTWARE Serena Service Manager Security 2014-09-08 Table of Contents Who Should Read This Paper?... 3 Overview... 3 Security Aspects... 3 Reference... 6 2 Serena Software Operational Security (On-Demand
DIPLOMA IN WEBDEVELOPMENT
DIPLOMA IN WEBDEVELOPMENT Prerequisite skills Basic programming knowledge on C Language or Core Java is must. # Module 1 Basics and introduction to HTML Basic HTML training. Different HTML elements, tags
Software Assurance Tools: Web Application Security Scanner Functional Specification Version 1.0
Special Publication 500-269 Software Assurance Tools: Web Application Security Scanner Functional Specification Version 1.0 Paul E. Black Elizabeth Fong Vadim Okun Romain Gaucher Software Diagnostics and
Web Services Vulnerability Testing Using Open source Security Scanners : An experimental Study
Web Services Vulnerability Testing Using Open source Security Scanners : An experimental Study Manju Khari, Neha Singh Computer Science Department, Guru Gobind Singh Indraprashta University, Dwarka, Delhi,
Web Application Firewalls Evaluation and Analysis. University of Amsterdam System & Network Engineering MSc
Web Application Firewalls Evaluation and Analysis Andreas Karakannas [email protected] George Thessalonikefs [email protected] University of Amsterdam System & Network Engineering MSc
Bug Report. Date: March 19, 2011 Reporter: Chris Jarabek ([email protected])
Bug Report Date: March 19, 2011 Reporter: Chris Jarabek ([email protected]) Software: Kimai Version: 0.9.1.1205 Website: http://www.kimai.org Description: Kimai is a web based time-tracking application.
Web Application Guidelines
Web Application Guidelines Web applications have become one of the most important topics in the security field. This is for several reasons: It can be simple for anyone to create working code without security
SECURE APPLICATION DEVELOPMENT CODING POLICY OCIO-6013-09 TABLE OF CONTENTS
OFFICE OF THE CHIEF INFORMATION OFFICER OCIO-6013-09 Date of Issuance: May 22, 2009 Effective Date: May 22, 2009 Review Date: TABLE OF CONTENTS Section I. PURPOSE II. AUTHORITY III. SCOPE IV. DEFINITIONS
ArcGIS Server Security Threats & Best Practices 2014. David Cordes Michael Young
ArcGIS Server Security Threats & Best Practices 2014 David Cordes Michael Young Agenda Introduction Threats Best practice - ArcGIS Server settings - Infrastructure settings - Processes Summary Introduction
Cracking the Perimeter via Web Application Hacking. Zach Grace, CISSP, CEH [email protected] January 17, 2014 2014 Mega Conference
Cracking the Perimeter via Web Application Hacking Zach Grace, CISSP, CEH [email protected] January 17, 2014 2014 Mega Conference About 403 Labs 403 Labs is a full-service information security and compliance
EVALUATING COMMERCIAL WEB APPLICATION SECURITY. By Aaron Parke
EVALUATING COMMERCIAL WEB APPLICATION SECURITY By Aaron Parke Outline Project background What and why? Targeted sites Testing process Burp s findings Technical talk My findings and thoughts Questions Project
Client vs. Server Implementations of Mitigating XSS Security Threats on Web Applications
Journal of Basic and Applied Engineering Research pp. 50-54 Krishi Sanskriti Publications http://www.krishisanskriti.org/jbaer.html Client vs. Server Implementations of Mitigating XSS Security Threats
Application security testing: Protecting your application and data
E-Book Application security testing: Protecting your application and data Application security testing is critical in ensuring your data and application is safe from security attack. This ebook offers
Introduction:... 1 Security in SDLC:... 2 Penetration Testing Methodology: Case Study... 3
Table of Contents Introduction:... 1 Security in SDLC:... 2 Penetration Testing Methodology: Case Study... 3 Information Gathering... 3 Vulnerability Testing... 7 OWASP TOP 10 Vulnerabilities:... 8 Injection
Last update: February 23, 2004
Last update: February 23, 2004 Web Security Glossary The Web Security Glossary is an alphabetical index of terms and terminology relating to web application security. The purpose of the Glossary is to
DFW INTERNATIONAL AIRPORT STANDARD OPERATING PROCEDURE (SOP)
Title: Functional Category: Information Technology Services Issuing Department: Information Technology Services Code Number: xx.xxx.xx Effective Date: xx/xx/2014 1.0 PURPOSE 1.1 To appropriately manage
Security features of ZK Framework
1 Security features of ZK Framework This document provides a brief overview of security concerns related to JavaScript powered enterprise web application in general and how ZK built-in features secures
Acunetix Web Vulnerability Scanner. Getting Started. By Acunetix Ltd.
Acunetix Web Vulnerability Scanner Getting Started V8 By Acunetix Ltd. 1 Starting a Scan The Scan Wizard allows you to quickly set-up an automated scan of your website. An automated scan provides a comprehensive
ASSESSMENT OF OPEN SOURCE WEB APPLICATION SECURITY SCANNERS
ASSESSMENT OF OPEN SOURCE WEB APPLICATION SECURITY SCANNERS 1 FAKHRELDEEN ABBAS SAEED, 2 ELTYEB E. ABED ELGABAR 1,2 Asstt Prof., Department of Information Technology, College of Computer Science and Information
External Vulnerability Assessment. -Technical Summary- ABC ORGANIZATION
External Vulnerability Assessment -Technical Summary- Prepared for: ABC ORGANIZATI On March 9, 2008 Prepared by: AOS Security Solutions 1 of 13 Table of Contents Executive Summary... 3 Discovered Security
Security Evaluation of Web Application. Using Custom Web Application
Security Evaluation of Web Application Vulnerability Scanners Strengths and Limitations Using Custom Web Application By Yuliana Martirosyan A thesis submitted in fulfillment of the requirements for the
Advanced Web Security, Lab
Advanced Web Security, Lab Web Server Security: Attacking and Defending November 13, 2013 Read this earlier than one day before the lab! Note that you will not have any internet access during the lab,
HackMiami Web Application Scanner 2013 PwnOff
HackMiami Web Application Scanner 2013 PwnOff An Analysis of Automated Web Application Scanning Suites James Ball, Alexander Heid, Rod Soto http://www.hackmiami.org Overview Web application scanning suites
A Novel Frame Work to Detect Malicious Attacks in Web Applications
Technology, Volume-2, Issue-1, January-March, 2014, pp. 23-28, IASTER 2014, www.iaster.com, Online:2347-5099, Print:2348-0009 A Novel Frame Work to Detect Malicious Attacks in Web Applications N. Jayakanthan
PCI-DSS and Application Security Achieving PCI DSS Compliance with Seeker
PCI-DSS and Application Security Achieving PCI DSS Compliance with Seeker www.quotium.com 1/14 Summary Abstract 3 PCI DSS Statistics 4 PCI DSS Application Security 5 How Seeker Helps You Achieve PCI DSS
Application Security Testing. Erez Metula (CISSP), Founder Application Security Expert [email protected]
Application Security Testing Erez Metula (CISSP), Founder Application Security Expert [email protected] Agenda The most common security vulnerabilities you should test for Understanding the problems
DISCOVERY OF WEB-APPLICATION VULNERABILITIES USING FUZZING TECHNIQUES
DISCOVERY OF WEB-APPLICATION VULNERABILITIES USING FUZZING TECHNIQUES By Michael Crouse Dr. Errin W. Fulp, Ph.D., Advisor Abstract The increasingly high volume of users on the web and their use of web
ETHICAL HACKING 010101010101APPLICATIO 00100101010WIRELESS110 00NETWORK1100011000 101001010101011APPLICATION0 1100011010MOBILE0001010 10101MOBILE0001
001011 1100010110 0010110001 010110001 0110001011000 011000101100 010101010101APPLICATIO 0 010WIRELESS110001 10100MOBILE00010100111010 0010NETW110001100001 10101APPLICATION00010 00100101010WIRELESS110
Web application security: Testing for vulnerabilities
Web application security: Testing for vulnerabilities Using open source tools to test your site Jeff Orloff Technology Coordinator/Consultant Sequoia Media Services Inc. Skill Level: Intermediate Date:
Detecting and Exploiting XSS with Xenotix XSS Exploit Framework
Detecting and Exploiting XSS with Xenotix XSS Exploit Framework [email protected] keralacyberforce.in Introduction Cross Site Scripting or XSS vulnerabilities have been reported and exploited since 1990s.
OWASP TOP 10 ILIA ALSHANETSKY @ILIAA HTTPS://JOIND.IN/15741
OWASP TOP 10 ILIA ALSHANETSKY @ILIAA HTTPS://JOIND.IN/15741 ME, MYSELF & I PHP Core Developer Author of Guide to PHP Security Security Aficionado THE CONUNDRUM USABILITY SECURITY YOU CAN HAVE ONE ;-) OPEN
Web Application Security
Web Application Security A Beginner's Guide Bryan Sullivan Vincent Liu Mc r New York Chicago San Francisco Lisbon London Madrid Mexico City Milan New Delhi San Juan Seoul Singapore Sydney Toronto Contents
Java Program Vulnerabilities
Java Program Vulnerabilities Sheetal Thakare, Dr.B.B.Meshram Abstract The Java programming language provides a lot of security features, build directly into the language and also supplied by security relevant
Ruby on Rails Secure Coding Recommendations
Introduction Altius IT s list of Ruby on Rails Secure Coding Recommendations is based upon security best practices. This list may not be complete and Altius IT recommends this list be augmented with additional
Gateway Apps - Security Summary SECURITY SUMMARY
Gateway Apps - Security Summary SECURITY SUMMARY 27/02/2015 Document Status Title Harmony Security summary Author(s) Yabing Li Version V1.0 Status draft Change Record Date Author Version Change reference
Enterprise Application Security Workshop Series
Enterprise Application Security Workshop Series Phone 877-697-2434 fax 877-697-2434 www.thesagegrp.com Defending JAVA Applications (3 Days) In The Sage Group s Defending JAVA Applications workshop, participants
Integrating Web Application Security into the IT Curriculum
Integrating Web Application Security into the IT Curriculum James Walden Northern Kentucky University Topics 1. 2. 3. 4. Why should we teach web application security? What material do we need to cover?
