CMP3002 Advanced Web Technology
|
|
|
- Bethanie Fleming
- 9 years ago
- Views:
Transcription
1 CMP3002 Advanced Web Technology Assignment 1: Web Security Audit A web security audit on a proposed eshop website By Adam Wright
2 Table of Contents Table of Contents... 2 Table of Tables... 2 Introduction... 3 Findings... 4 Findings Summary... 4 The Investigation... 5 Key Findings... 6 Conclusion and Recommendations... 9 References Bibliography Appendix A: Web Security Audit Log Table of Tables Table 1.1 Microsoft s SQL Form Validation Guidelines /12/09 Page 2 of 32
3 Introduction Website security is a crucial step that needs to be enforced in today s society. With the increase in web technology within the business environment, security has become more important over the years. Some businesses in the market rely on the World Wide Web as their only front with custom (i.e. Amazon and Play.com). An online article at PC Tools (2008) states that online security is no longer a secondary issue which has been the case for many years prior. Out of the three main areas of security PC Tools (2008) indicated, one of the important ones is data encryption. The majority of web 2.0 websites store lots of information and this needs protecting. This is especially important when user data is stored. Other areas of security include server security and data backup routines. It is very important to look at who uses the website in question, setting access permissions, what is classed as reasonable use (policies) and ways to monitor activity (W3C, 2003). Over the years steps have been made to tighten web security. This is mainly important for web eshops. 30 June 2005 saw a step up in eshop security when major credit card firms came together to produce a set of guidelines that need to be enforced (BBC, 2005). One of these basic guides included password character lengths. Simple steps can make a big impact on web security. This technical report will illustrate the key findings of the security audit taken place on the Web Tools eshop (found at in November The report will cover a findings summary, a summarised investigation description, key findings and conclusions with recommendations. Appendix A includes a copy of the security audit test log which contains detailed test information with appropriate screenshots. 02/12/09 Page 3 of 32
4 Findings Findings Summary After a website security audit was carried out on the Web Tools eshop, a few security vulnerabilities were detected. The eshop currently contains no form of Secure Socket Layer (SSL) security. Without SSL, confidential data such as passwords and card details are transmitted between the client s browser and website server(s) in plain text. This can be easily intercepted by a hacker. It is recommended that an SSL application is made to once the site has its final server location and domain name. The websites form inputs allow SQL characters to be sent to the server. Although no immediate SQL error has been generated from this, it is recommended that client and server-side validation is applied to form inputs. SQL characters within the state/region field of user registration causes a later error when a customer is ordering an item. Customers viewing a submitted order are able to modify the order ID parameter within the address URL. By doing this, a customer can access other users order information including address and card details. An alternative method to view orders is suggested (other than the GET method) or a checking algorithm should be implemented to make sure the user who submitted an order is the one currently logged in. The chapters which follow this findings summary look at the investigation, findings and recommendations in more detail. Appendix A contains the security audit logs with detailed explanations and screenshots. 02/12/09 Page 4 of 32
5 The Investigation The web security audit on the Web Tools eshop took place over three days within November 2009; 9 November, 11 November and 19 November. The tests carried out were categorised into three types of test: Visual Practical Hack Visual tests involved looking for weaknesses without any direct input as one would expect with practical and hack tests. One of these visual tests was to see if Secure Socket Layer (SSL) was implemented on the site. Practical tests involved usual actions which standard users would perform e.g. clicking on links and testing out functionalities such as login. Hack-classified tests involved code injection and manipulating the site into performing actions it wasn t intended for. The first session on 9 November 2009 included seven tests that looked at vulnerabilities within each of the three areas mentioned earlier. The visual tests carried out looked at SSL protection and source code. SSL is a major security algorithm that should be present in all websites that carry out transactions such as eshops. Analysing the website source code can explain a lot about the way the site is implemented and how serious the organisation takes web security. Coding comments can give away weak aspects and include over sensitive information. The practical tests carried out looked at the logon functionality of the website. Some websites may allow logon with null (blank) or common user credentials. This poses a high security risk without the hacker trying to hard. The hack-classified tests carried out looked at URL manipulation and code injection within input forms. These sets of tests are important in determining the security vulnerabilities of a website and include harsher actions which can potentially stop a website from operating. The second session of testing on 11 November 2009 included tests within the practical and hack-classified categories with emphasis on the hacking side of the audit. 02/12/09 Page 5 of 32
6 The practical test involved the analysis of the forgot password mechanism to ensure it operated in the appropriate manner. Nearly all websites with a user base have a forgot password mechanism and is an area of great importance. The hack-classified tests looked at further code injection and webpage manipulation by saving the registration page and running it externally. These sets of tests are highly recommended and provide detailed information about the sites configuration. The third and final session of testing on 19 November 2009 looked at a particular code injection test that became apparent after the previous tests had been fulfilled. A JavaScript alert command was injected into the registration input to determine potential code execution weaknesses. With the above methodology put into practise, the security audit on the Web Tools eshop has covered key areas including basic weaknesses in terms of passwords and SSL and complex weaknesses in terms of SQL and URL modification. The succeeding chapter looks at the results of the tests carried out and explains what they could mean for the eshops future. Key Findings Test session 1 on 9 November 2009 investigated potential problems in all areas of the security framework. Test ID 01 carried out a visual investigation to see if Secure Socket Layer (SSL) technology was implemented on the eshop. The results of this test confirmed that the site does not have SSL and therefore poses as a large security hole. This point-to-point protocol can encrypt personal data between two points (Dacontal, 2003) and is extremely important for eshops that use user passwords and bank card information. As stated in the website brief, the site is not yet released to the public domain and could therefore have SSL implemented at a later stage. However, the briefing also states that adequate security provision has been made. SSL is a cryptographic technology which uses public and private keys in order to achieve maximum security (Webopedia, 2008) and would be advised. Test ID 02 involved a brief analysis of the websites source code within the registration and order cart sections. This test looked for any vulnerabilities in the code with concentration on commenting. The site in question had no apparent risks within the commenting of the code. Commenting is usually used to indicate what a piece of code does and how it does it. Too much commenting information (as with error messages) provides security risks. 02/12/09 Page 6 of 32
7 Test ID 03 and 04 looked at the login functionality of the eshop. Test 03 attempted to login with null (blank) user credentials. Some websites allow this in error which allows users to access login areas without registering. Without posing any direct threat, it is not something that should happen on your website for long term security purposes. This test was successfully passed as logon with null credentials was refused. Test 04 used commonly used and default credentials in order to attempt forced logon access. The credentials used involved combinations of admin, administrator, user, test, root and password. After testing these combinations, access was not granted. Test ID 05 involved the injection of SQL code into the website inputs. SQL is a powerful database manipulation language that can severely damage a website and cease it from operating. Specialised SQL characters and ; were used to test for SQL vulnerabilities. User registration and site search inputs were used to test this input. No SQL error was generated and information was accepted successfully. With SQL errors not being generated it shows that SQL is not being triggered by injection. One aspect that was noticed was the add slash function when the form refreshes after failed form criteria. This is a very useful function. After injecting SQL characters and lines into the registration fields, it became apparent that a vulnerability was present when pursuing an order. An SQL character entered into the state/region field of a personal area affects the order processing for tax. With the right syntax, SQL could be run through this hole in the system. Test 05 failed because of this result but it was noted that a character maxlength was enforced to limit the amount of code a hacker could enter. Test ID 06 investigated URL modification where GET parameters are used. It was discovered that parameters were visible in the address URL when viewing an order. With order ID displayed in this way, a user can alter it to view other orders. This was successfully performed during the test and revealed order ID 8 rather than the original order ID of 9. This weakness allows users to see other people s addresses, orders and bank card details. Test 06 failed with high severity because of the outcome of the test. Test ID 07 took the URL parameter weakness even further by adding functions onto the URL. By accessing a URL from an image, the function productadd was added in an attempt to modify the eshops listings. The function was recognised but denied access to this administration feature. This denial of function access shows that sufficient user validation is in place within this area. Test session 2 on 11 November 2009 investigated a practical task and numerous hack-classified tests. Test ID 08 looked at the practical task which involved the investigation of the forgot password mechanism. The forgot password mechanism 02/12/09 Page 7 of 32
8 on the Web Tools eshop worked appropriately and produced an error if you entered another username with your own address. Test ID 09 involved further SQL character injection into the registration input fields for re-test purposes as the website was potentially being altered slightly. The test results show the same results as the earlier test from session 1 (test ID 05). SQL characters ( and ;) were inputted without error but the state/region field still contained the SQL vulnerability when pursuing an order. Test ID 10 attempted to enter non-latin characters into the sites registration inputs to investigate how the website handled it. This extreme testing method attempted to break the website and reveal unexpected errors. A Hebrew word was entered into the username field which generated a username contains a space error. The test shows that non-latin characters are not accepted and the system claims to detect a space. As good as this may be for security, it holds user constraints. Web security is very important but should not get in the way of HCI and user issues. Test ID 11 saw an extension to the SQL vulnerability in the users state/region address field. By saving the customer registration page and altering the maxlength of the field, longer words could now be entered. This test originally aimed to see if longer SQL commands could be entered but passed due to the forms input maxlength being enforced higher up (presumably at the database level). Commands entered were cut back to the original maxlength after successful submission. Test session 3 on 19 November 2009 investigated a final hack-classified test that came apparent after the previous tests. JavaScript is a powerful coding language that provides interactivity and page manipulation on basic websites. A JavaScript alert command was injected into the continued address input for test ID 12. When a page such as order processing was displayed with user details, the JavaScript command was run. A popup was displayed saying JavaScript possible. This test failed as this opens up the possibility for hackers to modify form values and other parameters through JavaScript technology (Testing Security, 2006). See appendix A to view the original security audit logs which contain detailed test explanations with screenshot evidence. 02/12/09 Page 8 of 32
9 Conclusion and Recommendations After carrying out the 12 tests outlined in the previous section, it is apparent that the website is not suitable for public release in its current condition. Without SSL, all confidential data such as banking details will be transmitted as plain text for easy interception. The eshop contains small but problematic vulnerabilities with SQL and JavaScript injection which can be used to manipulate the website into performing tasks and making alterations that would not usually be possible. The order ID can be altered via the sites URL when viewing orders to access other people s information including bank card details. Before the website is launched into the public domain, various changes are recommended. Code injection into the website should be prevented at all costs and can be done so using client-side and server-side validation. Microsoft (2008) recommends that web developers block the following characters on input forms: Input Description ; Used as an SQL query delimiter Used as an SQL data string delimiter -- Used as an SQL comment delimiter /* */ Used as an SQL comment delimiter without server evaluation Table 1.1 Microsoft s SQL Form Validation Guidelines Source: Input validation is at its best when performed on the server-side of communication. JavaScript validation on the client-side is easy to execute and manipulate as witnessed in the tests and can be bypassed very easily (Testing Security, 2006). Server-side validation can be carried out via PHP and would be highly recommended. Secure Socket Layer (SSL) protection is a highly recommended algorithm for any eshop in the world market. It retains the security of information as it is sent between the client and website server(s). Without SSL, data is transmitted as plain text which anybody can intercept. VeriSign is the leading SSL authority and currently protects over one million web servers (VeriSign, 2009). By visiting VeriSign UK at you can apply for certificates. This will involve server analysis to ensure it is appropriate for SSL and other checks on the website itself. The Web Tools eshop should be moved to the server it will remain hosted on and should be using its permanent domain name before an SSL application is made. 02/12/09 Page 9 of 32
10 URLs with important parameters such as order ID s need to be carefully looked at in order to prevent people accessing sensitive information. One way to prevent parameters in the URL would be to avoid using the GET request. However, this is not always a practical solution. A practical solution would be to implement an order session token or alternative user checking method (CGI Security, 2009). By identifying the user, access to order information can be granted or denied depending on the match. It is recommended that these changes are implemented before launch and that this documentation is read along with appendix A (Security Audit Logs) before any decision to make the eshop active is made. Some of the references within this report provide a good in-sight into specific security vulnerabilities and how to make sure a website is safe and secure. By making the suggested alterations and keeping track of current security vulnerabilities, the Web Tools eshop should have sufficient security provision. 02/12/09 Page 10 of 32
11 References BBC (2005). Web Shops Face Tighter Security [online]. Available from [accessed: 21 November 2009]. CGI Security (2009). Parameter Manipulation [online]. Available from [accessed: 28 November 2009]. Daconta, Michael C. (2003). Semantic Web, The: A Guide to the Future of XML, Web Services, and Knowledge Management, Wiley, Available from: [accessed: 1 December 2009]. Microsoft (2008). SQL Injection and Prevention [online]. Available from [accessed: 15 November 2009]. PC Tools (2008). Website Security is Important Business Advised [online]. Available from [accessed: 21 November 2009]. Testing Security (2006). JavaScript Injection [online]. Available from Injection [accessed: 19 November 2009]. VeriSign (2009). SSL Certificates, Encryption and Extended Validation [online]. Available from [accessed: 28 November 2009]. W3C (2003). The WWW Security FAQ [online]. Available from [accessed: 21 November 2009]. Webopedia (2009). What is SSL? [online]. Available from [accessed: 28 November 2009]. 02/12/09 Page 11 of 32
12 Bibliography BBC (2005). Web Shops Face Tighter Security [online]. Available from [accessed: 21 November 2009]. CGI Security (2009). Parameter Manipulation [online]. Available from [accessed: 28 November 2009]. Daconta, Michael C. (2003). Semantic Web, The: A Guide to the Future of XML, Web Services, and Knowledge Management, Wiley, Available from: [accessed: 1 December 2009]. Microsoft (2008). SQL Injection and Prevention [online]. Available from [accessed: 15 November 2009]. PC Tools (2008). Website Security is Important Business Advised [online]. Available from [accessed: 21 November 2009]. Testing Security (2006). JavaScript Injection [online]. Available from Injection [accessed: 19 November 2009]. VeriSign (2009). SSL Certificates, Encryption and Extended Validation [online]. Available from [accessed: 28 November 2009]. W3C (2003). The WWW Security FAQ [online]. Available from [accessed: 21 November 2009]. Webopedia (2009). What is SSL? [online]. Available from [accessed: 28 November 2009]. 02/12/09 Page 12 of 32
13 Appendix A: Web Security Audit Log
14 CMP3002 Advanced Web Technology Assignment 1: Web Security Audit Security Audit Checklist Website: By: Adam Wright 02/12/09 Page 14 of 32
15 Test Session: 01 Date: 09/11/2009 Tester: ADAM WRIGHT Site: ID Description Type Outcome Pass/Fail Severity Notes 01 Check for SSL encryption based on https, padlock symbol and certificate validity. Visual The website lacks SSL support and therefore sends data unencrypted/ Fail High No SSL layer. SSL should be put into practise for eshop launch. 02 Check website source code for any weaknesses in structure and comments. Visual The source code has no apparent failings. Pass Low Source code appropriate. Pass grade does not suggest that the code has in-depth weaknesses. 03 Attempt to log into the user area with null credentials. Practical No access available. No error messages associated with values. Pass Medium Cannot login with null credentials. 04 Attempt to log into the user area with default and common credentials; admin, user, test Practical No access available. Pass High Could not login with common and default passwords. 02/12/09 Page 15 of 32
16 05 Inject SQL into visible input fields to access or alter information; symbol Hack Fields accept SQL syntax characters without error. Vulnerability with state/region during order processing. Fail Medium SQL error generated during order payment if state/region field contains SQL syntax. Maxlength limits commands. 06 Modifying order ID parameters to display unauthorised information. Hack Access other users order details including card details. Fail High Other users orders accessible. 07 Adding URL GET parameters (productadd) to modify, display and access areas of the site. Hack Administration action access denied. Pass High Access to the admin panel is restricted despite injecting GET parameters in the URL. 02/12/09 Page 16 of 32
17 Test Session: 02 Date: 11/11/2009 Tester: ADAM WRIGHT Site: ID Description Type Outcome Pass/Fail Severity Notes 08 Test the forgot password mechanism to various addresses. Practical Password reset received to users corresponding . Pass Medium sent to associated address. 09 Injecting further SQL characters ( and ;) into input fields for re-test. Hack SQL inputs accepted without error. Pass Medium SQL characters accepted into surname without error. Form refresh shows add /. 10 Inputting non-latin characters (Hebrew) into input fields Hack Would not accept. Claimed there was a space. Pass Low Space in input credentials detected. 11 Cross-site registration page saving to modify Maxlength on state/region SQL weakness. Hack Maxlength altered but injected SQL code remained cut down after submission. Pass High Code entered was cut down. Possible Maxlength on database field. 02/12/09 Page 17 of 32
18 Test Session: 03 Date: 19/11/2009 Tester: ADAM WRIGHT Site: ID Description Type Outcome Pass/Fail Severity Notes 12 Inject JavaScript (alert command) into registration input Hack JavaScript ran and displayed alert popup. Fail Medium Script ran without error. 02/12/09 Page 18 of 32
19 Screenshots Test ID 03 9 November pm 02/12/09 Page 19 of 32
20 Test ID 04 9 November pm 02/12/09 Page 20 of 32
21 Test ID 05 9 November pm 02/12/09 Page 21 of 32
22 9 November pm 02/12/09 Page 22 of 32
23 9 November pm 02/12/09 Page 23 of 32
24 Test ID 06 9 November pm 02/12/09 Page 24 of 32
25 Test ID 07 9 November pm 02/12/09 Page 25 of 32
26 Test ID November pm 02/12/09 Page 26 of 32
27 Test ID November pm 02/12/09 Page 27 of 32
28 11 November pm 02/12/09 Page 28 of 32
29 Test ID November pm 02/12/09 Page 29 of 32
30 Test ID November pm 02/12/09 Page 30 of 32
31 Test ID November pm 02/12/09 Page 31 of 32
32 19 November pm 02/12/09 Page 32 of 32
Penetration Test Report
Penetration Test Report Acme Test Company ACMEIT System 26 th November 2010 Executive Summary Info-Assure Ltd was engaged by Acme Test Company to perform an IT Health Check (ITHC) on the ACMEIT System
Check list for web developers
Check list for web developers Requirement Yes No Remarks 1. Input Validation 1.1) Have you done input validation for all the user inputs using white listing and/or sanitization? 1.2) Does the input validation
FINAL DoIT 04.01.2013- v.8 APPLICATION SECURITY PROCEDURE
Purpose: This procedure identifies what is required to ensure the development of a secure application. Procedure: The five basic areas covered by this document include: Standards for Privacy and Security
WordPress Security Scan Configuration
WordPress Security Scan Configuration To configure the - WordPress Security Scan - plugin in your WordPress driven Blog, login to WordPress as administrator, by simply entering the url_of_your_website/wp-admin
Sage 200 Web Time & Expenses Guide
Sage 200 Web Time & Expenses Guide Sage (UK) Limited Copyright Statement Sage (UK) Limited, 2006. All rights reserved If this documentation includes advice or information relating to any matter other than
Certified Secure Web Application Secure Development Checklist
www.certifiedsecure.com [email protected] Tel.: +31 (0)70 310 13 40 Loire 128-A 2491 AJ The Hague The Netherlands About Certified Secure Checklist Certified Secure exists to encourage and fulfill
Using Foundstone CookieDigger to Analyze Web Session Management
Using Foundstone CookieDigger to Analyze Web Session Management Foundstone Professional Services May 2005 Web Session Management Managing web sessions has become a critical component of secure coding techniques.
MadCap Software. Upgrading Guide. Pulse
MadCap Software Upgrading Guide Pulse Copyright 2014 MadCap Software. All rights reserved. Information in this document is subject to change without notice. The software described in this document is furnished
Setup Corporate (Microsoft Exchange) Email. This tutorial will walk you through the steps of setting up your corporate email account.
Setup Corporate (Microsoft Exchange) Email This tutorial will walk you through the steps of setting up your corporate email account. Microsoft Exchange Email Support Exchange Server Information You will
How to complete the Secure Internet Site Declaration (SISD) form
1 How to complete the Secure Internet Site Declaration (SISD) form The following instructions are designed to assist you in completing the SISD form that forms part of your Merchant application. Once completed,
Cyber Security Workshop Ethical Web Hacking
Cyber Security Workshop Ethical Web Hacking May 2015 Setting up WebGoat and Burp Suite Hacking Challenges in WebGoat Concepts in Web Technologies and Ethical Hacking 1 P a g e Downloading WebGoat and Burp
Last update: February 23, 2004
Last update: February 23, 2004 Web Security Glossary The Web Security Glossary is an alphabetical index of terms and terminology relating to web application security. The purpose of the Glossary is to
Online Data Services. Security Guidelines. Online Data Services by Esri UK. Security Best Practice
Online Data Services Security Guidelines Online Data Services by Esri UK Security Best Practice 28 November 2014 Contents Contents... 1 1. Introduction... 2 2. Data Service Accounts, Security and Fair
Criteria for web application security check. Version 2015.1
Criteria for web application security check Version 2015.1 i Content Introduction... iii ISC- P- 001 ISC- P- 001.1 ISC- P- 001.2 ISC- P- 001.3 ISC- P- 001.4 ISC- P- 001.5 ISC- P- 001.6 ISC- P- 001.7 ISC-
Annual Web Application Security Report 2011
Annual Web Application Security Report 2011 An analysis of vulnerabilities found in external Web Application Security tests conducted by NTA Monitor during 2010 Contents 1.0 Introduction... 3 2.0 Summary...
Passing PCI Compliance How to Address the Application Security Mandates
Passing PCI Compliance How to Address the Application Security Mandates The Payment Card Industry Data Security Standards includes several requirements that mandate security at the application layer. These
External Vulnerability Assessment. -Technical Summary- ABC ORGANIZATION
External Vulnerability Assessment -Technical Summary- Prepared for: ABC ORGANIZATI On March 9, 2008 Prepared by: AOS Security Solutions 1 of 13 Table of Contents Executive Summary... 3 Discovered Security
What is Web Security? Motivation
[email protected] http://www.brucker.ch/ Information Security ETH Zürich Zürich, Switzerland Information Security Fundamentals March 23, 2004 The End Users View The Server Providers View What is Web
Testing Web Applications for SQL Injection Sam Shober [email protected]
Testing Web Applications for SQL Injection Sam Shober [email protected] Abstract: This paper discusses the SQL injection vulnerability, its impact on web applications, methods for pre-deployment and
HTTPParameter Pollution. ChrysostomosDaniel
HTTPParameter Pollution ChrysostomosDaniel Introduction Nowadays, many components from web applications are commonly run on the user s computer (such as Javascript), and not just on the application s provider
How to break in. Tecniche avanzate di pen testing in ambito Web Application, Internal Network and Social Engineering
How to break in Tecniche avanzate di pen testing in ambito Web Application, Internal Network and Social Engineering Time Agenda Agenda Item 9:30 10:00 Introduction 10:00 10:45 Web Application Penetration
External Network & Web Application Assessment. For The XXX Group LLC October 2012
External Network & Web Application Assessment For The XXX Group LLC October 2012 This report is solely for the use of client personal. No part of it may be circulated, quoted, or reproduced for distribution
Common Security Vulnerabilities in Online Payment Systems
Common Security Vulnerabilities in Online Payment Systems Author- Hitesh Malviya(Information Security analyst) Qualifications: C!EH, EC!SA, MCITP, CCNA, MCP Current Position: CEO at HCF Infosec Limited
Web Security School Final Exam
Web Security School Final Exam By Michael Cobb 1.) Which of the following services is not required to run a Windows server solely configured to run IIS and publish a Web site on the Internet? a. IIS Admin
Web Plus Security Features and Recommendations
Web Plus Security Features and Recommendations (Based on Web Plus Version 3.x) Centers for Disease Control and Prevention National Center for Chronic Disease Prevention and Health Promotion Division of
4. Getting started: Performing an audit
4. Getting started: Performing an audit Introduction Security scans enable systems administrators to identify and assess possible risks within a network. Through GFI LANguard N.S.S. this is performed automatically,
USING MYWEBSQL FIGURE 1: FIRST AUTHENTICATION LAYER (ENTER YOUR REGULAR SIMMONS USERNAME AND PASSWORD)
USING MYWEBSQL MyWebSQL is a database web administration tool that will be used during LIS 458 & CS 333. This document will provide the basic steps for you to become familiar with the application. 1. To
Installation Procedure SSL Certificates in IIS 7
Installation Procedure SSL Certificates in IIS 7 This document will explain the creation and installation procedures for enabling an IIS website to use Secure Socket Layer (SSL). Check IIS for existing
SQL Injection for newbie
SQL Injection for newbie SQL injection is a security vulnerability that occurs in a database layer of an application. It is technique to inject SQL query/command as an input via web pages. Sometimes we
Last Updated: July 2011. STATISTICA Enterprise Server Security
Last Updated: July 2011 STATISTICA Enterprise Server Security STATISTICA Enterprise Server Security Page 2 of 10 Table of Contents Executive Summary... 3 Introduction to STATISTICA Enterprise Server...
CA Performance Center
CA Performance Center Single Sign-On User Guide 2.4 This Documentation, which includes embedded help systems and electronically distributed materials, (hereinafter referred to as the Documentation ) is
05.0 Application Development
Number 5.0 Policy Owner Information Security and Technology Policy Application Development Effective 01/01/2014 Last Revision 12/30/2013 Department of Innovation and Technology 5. Application Development
The Top Web Application Attacks: Are you vulnerable?
QM07 The Top Web Application Attacks: Are you vulnerable? John Burroughs, CISSP Sr Security Architect, Watchfire Solutions [email protected] Agenda Current State of Web Application Security Understanding
Web Application Report
Web Application Report This report includes important security information about your Web Application. Security Report This report was created by IBM Rational AppScan 8.5.0.1 11/14/2012 8:52:13 AM 11/14/2012
E-Commerce Security. The Client-Side Vulnerabilities. Securing the Data Transaction LECTURE 7 (SECURITY)
E-Commerce Security An e-commerce security system has four fronts: LECTURE 7 (SECURITY) Web Client Security Data Transport Security Web Server Security Operating System Security A safe e-commerce system
Application Security Policy
Purpose This document establishes the corporate policy and standards for ensuring that applications developed or purchased at LandStar Title Agency, Inc meet a minimum acceptable level of security. Policy
SCADA Security. Enabling Integrated Windows Authentication For CitectSCADA Web Client. Applies To: CitectSCADA 6.xx and 7.xx VijeoCitect 6.xx and 7.
Enabling Integrated Windows Authentication For CitectSCADA Web Client Applies To: CitectSCADA 6.xx and 7.xx VijeoCitect 6.xx and 7.xx Summary: What is the difference between Basic Authentication and Windows
Thick Client Application Security
Thick Client Application Security Arindam Mandal ([email protected]) (http://www.paladion.net) January 2005 This paper discusses the critical vulnerabilities and corresponding risks in a two
Security and Control Issues within Relational Databases
Security and Control Issues within Relational Databases David C. Ogbolumani, CISA, CISSP, CIA, CISM Practice Manager Information Security Preview of Key Points The Database Environment Top Database Threats
3. Broken Account and Session Management. 4. Cross-Site Scripting (XSS) Flaws. Web browsers execute code sent from websites. Account Management
What is an? s Ten Most Critical Web Application Security Vulnerabilities Anthony LAI, CISSP, CISA Chapter Leader (Hong Kong) [email protected] Open Web Application Security Project http://www.owasp.org
WEB SECURITY. Oriana Kondakciu 0054118 Software Engineering 4C03 Project
WEB SECURITY Oriana Kondakciu 0054118 Software Engineering 4C03 Project The Internet is a collection of networks, in which the web servers construct autonomous systems. The data routing infrastructure
Certified Secure Web Application Security Test Checklist
www.certifiedsecure.com [email protected] Tel.: +31 (0)70 310 13 40 Loire 128-A 2491 AJ The Hague The Netherlands Certified Secure Checklist About Certified Secure exists to encourage and fulfill
Security Features: Lettings & Property Management Software
Security Features: Lettings & Property Management Software V 2.0 (23/02/2015) Table of Contents Introduction to Web Application Security... 2 Potential Security Vulnerabilities for Web Applications...
DESLock+ Basic Setup Guide Version 1.20, rev: June 9th 2014
DESLock+ Basic Setup Guide Version 1.20, rev: June 9th 2014 Contents Overview... 2 System requirements:... 2 Before installing... 3 Download and installation... 3 Configure DESLock+ Enterprise Server...
SECURITY DOCUMENT. BetterTranslationTechnology
SECURITY DOCUMENT BetterTranslationTechnology XTM Security Document Documentation for XTM Version 6.2 Published by XTM International Ltd. Copyright XTM International Ltd. All rights reserved. No part of
WHITE PAPER. FortiWeb and the OWASP Top 10 Mitigating the most dangerous application security threats
WHITE PAPER FortiWeb and the OWASP Top 10 PAGE 2 Introduction The Open Web Application Security project (OWASP) Top Ten provides a powerful awareness document for web application security. The OWASP Top
Web application security
Web application security Sebastian Lopienski CERN Computer Security Team openlab and summer lectures 2010 (non-web question) Is this OK? int set_non_root_uid(int uid) { // making sure that uid is not 0
(WAPT) Web Application Penetration Testing
(WAPT) Web Application Penetration Testing Module 0: Introduction 1. Introduction to the course. 2. How to get most out of the course 3. Resources you will need for the course 4. What is WAPT? Module 1:
Preparing for GO!Enterprise MDM On-Demand Service
Preparing for GO!Enterprise MDM On-Demand Service This guide provides information on...... An overview of GO!Enterprise MDM... Preparing your environment for GO!Enterprise MDM On-Demand... Firewall rules
PCI-DSS and Application Security Achieving PCI DSS Compliance with Seeker
PCI-DSS and Application Security Achieving PCI DSS Compliance with Seeker www.quotium.com 1/14 Summary Abstract 3 PCI DSS Statistics 4 PCI DSS Application Security 5 How Seeker Helps You Achieve PCI DSS
Acunetix Web Vulnerability Scanner. Getting Started. By Acunetix Ltd.
Acunetix Web Vulnerability Scanner Getting Started V8 By Acunetix Ltd. 1 Starting a Scan The Scan Wizard allows you to quickly set-up an automated scan of your website. An automated scan provides a comprehensive
OWASP Web Application Penetration Checklist. Version 1.1
Version 1.1 July 14, 2004 This document is released under the GNU documentation license and is Copyrighted to the OWASP Foundation. You should read and understand that license and copyright conditions.
Perceptive Content Security
Perceptive Content Security Best Practices Perceptive Content, Version: 7.1.x Written by: Product Knowledge, R&D Date: June 2015 2015 Perceptive Software. All rights reserved. Perceptive Software is a
Secure Web Development Teaching Modules 1. Security Testing. 1.1 Security Practices for Software Verification
Secure Web Development Teaching Modules 1 Security Testing Contents 1 Concepts... 1 1.1 Security Practices for Software Verification... 1 1.2 Software Security Testing... 2 2 Labs Objectives... 2 3 Lab
Web Application Security
E-SPIN PROFESSIONAL BOOK Vulnerability Management Web Application Security ALL THE PRACTICAL KNOW HOW AND HOW TO RELATED TO THE SUBJECT MATTERS. COMBATING THE WEB VULNERABILITY THREAT Editor s Summary
Password Reset Server Installation Guide Windows 8 / 8.1 Windows Server 2012 / R2
Password Reset Server Installation Guide Windows 8 / 8.1 Windows Server 2012 / R2 Last revised: November 12, 2014 Table of Contents Table of Contents... 2 I. Introduction... 4 A. ASP.NET Website... 4 B.
E-Commerce: Designing And Creating An Online Store
E-Commerce: Designing And Creating An Online Store Introduction About Steve Green Ministries Solo Performance Artist for 19 Years. Released over 26 Records, Several Kids Movies, and Books. My History With
Web Application Attacks and Countermeasures: Case Studies from Financial Systems
Web Application Attacks and Countermeasures: Case Studies from Financial Systems Dr. Michael Liu, CISSP, Senior Application Security Consultant, HSBC Inc Overview Information Security Briefing Web Applications
Lecture 11 Web Application Security (part 1)
Lecture 11 Web Application Security (part 1) Computer and Network Security 4th of January 2016 Computer Science and Engineering Department CSE Dep, ACS, UPB Lecture 11, Web Application Security (part 1)
1. Introduction. 2. Web Application. 3. Components. 4. Common Vulnerabilities. 5. Improving security in Web applications
1. Introduction 2. Web Application 3. Components 4. Common Vulnerabilities 5. Improving security in Web applications 2 What does World Wide Web security mean? Webmasters=> confidence that their site won
Pcounter CGI Utilities Installation and Configuration For Pcounter for Windows version 2.55 and above
Pcounter CGI Utilities Installation and Configuration For Pcounter for Windows version 2.55 and above About this document The core Pcounter application contains a number of CGI extension applications which
Authentication and Single Sign On
Contents 1. Introduction 2. Fronter Authentication 2.1 Passwords in Fronter 2.2 Secure Sockets Layer 2.3 Fronter remote authentication 3. External authentication through remote LDAP 3.1 Regular LDAP authentication
Web Security School Entrance Exam
Web Security School Entrance Exam By Michael Cobb 1) What is SSL used for? a. Encrypt data as it travels over a network b. Encrypt files located on a Web server c. Encrypt passwords for storage in a database
GTS Software Pty Ltd. Remote Desktop Services
GTS Software Pty Ltd Remote Desktop Services Secure web access to GTS Software applications CONTENTS Overview... 2 What GTS can provide with Remote Desktop Services... 2 Main Features... 3 RD Web Access...
White Paper BMC Remedy Action Request System Security
White Paper BMC Remedy Action Request System Security June 2008 www.bmc.com Contacting BMC Software You can access the BMC Software website at http://www.bmc.com. From this website, you can obtain information
SQL Server Automated Administration
SQL Server Automated Administration To automate administration: Establish the administrative responsibilities or server events that occur regularly and can be administered programmatically. Define a set
Web attacks and security: SQL injection and cross-site scripting (XSS)
Web attacks and security: SQL injection and cross-site scripting (XSS) License This work by Z. Cliffe Schreuders at Leeds Metropolitan University is licensed under a Creative Commons Attribution-ShareAlike
Talk Internet User Guides Controlgate Administrative User Guide
Talk Internet User Guides Controlgate Administrative User Guide Contents Contents (This Page) 2 Accessing the Controlgate Interface 3 Adding a new domain 4 Setup Website Hosting 5 Setup FTP Users 6 Setup
Ruby on Rails Secure Coding Recommendations
Introduction Altius IT s list of Ruby on Rails Secure Coding Recommendations is based upon security best practices. This list may not be complete and Altius IT recommends this list be augmented with additional
Owner of the content within this article is www.isaserver.org Written by Marc Grote www.it-training-grote.de
Owner of the content within this article is www.isaserver.org Written by Marc Grote www.it-training-grote.de Microsoft Forefront TMG How to use SQL Server 2008 Express Reporting Services Abstract In this
GO!NotifyLink. Database Maintenance. GO!NotifyLink Database Maintenance 1
GO!NotifyLink Database Maintenance GO!NotifyLink Database Maintenance 1 Table of Contents Database Maintenance 3 Database Cleanup... 3 Database Backups... 3 Database Configuration... 4 The Procedure via
Active Directory Self-Service FAQ
Active Directory Self-Service FAQ General Information: [email protected] Online Support: [email protected] CionSystems Inc. Mailing Address: 16625 Redmond Way, Ste M106 Redmond, WA. 98052 http://www.cionsystems.com
Authentication Methods
Authentication Methods Overview In addition to the OU Campus-managed authentication system, OU Campus supports LDAP, CAS, and Shibboleth authentication methods. LDAP users can be configured through the
Recommended Browser Setting for MySBU Portal
The MySBU portal is built using Microsoft s SharePoint technology framework, therefore, for the best viewing experience, Southwest Baptist University recommends the use of Microsoft s Internet Explorer,
Using EMC Unisphere in a Web Browsing Environment: Browser and Security Settings to Improve the Experience
Using EMC Unisphere in a Web Browsing Environment: Browser and Security Settings to Improve the Experience Applied Technology Abstract The Web-based approach to system management taken by EMC Unisphere
Installation Guide ARGUS Symphony 1.6 and Business App Toolkit. 6/13/2014 2014 ARGUS Software, Inc.
ARGUS Symphony 1.6 and Business App Toolkit 6/13/2014 2014 ARGUS Software, Inc. Installation Guide for ARGUS Symphony 1.600.0 6/13/2014 Published by: ARGUS Software, Inc. 3050 Post Oak Boulevard Suite
User Guide. Version R91. English
AuthAnvil User Guide Version R91 English August 25, 2015 Agreement The purchase and use of all Software and Services is subject to the Agreement as defined in Kaseya s Click-Accept EULATOS as updated from
Where every interaction matters.
Where every interaction matters. Peer 1 Vigilant Web Application Firewall Powered by Alert Logic The Open Web Application Security Project (OWASP) Top Ten Web Security Risks and Countermeasures White Paper
Web Application Firewall on SonicWALL SSL VPN
Web Application Firewall on SonicWALL SSL VPN Document Scope This document describes how to configure and use the Web Application Firewall feature in SonicWALL SSL VPN 5.0. This document contains the following
Embedded Document Accounting Solution (edas) for Cost Recovery. Administrator's Guide
Embedded Document Accounting Solution (edas) for Cost Recovery Administrator's Guide September 2013 www.lexmark.com Contents 2 Contents Overview...4 Getting started...5 Understanding installation requirements...5
Application Layer Encryption: Protecting against Application Logic and Session Theft Attacks. Whitepaper
Application Layer Encryption: Protecting against Application Logic and Session Theft Attacks Whitepaper The security industry has extensively focused on protecting against malicious injection attacks like
Setting Up SSL on IIS6 for MEGA Advisor
Setting Up SSL on IIS6 for MEGA Advisor Revised: July 5, 2012 Created: February 1, 2008 Author: Melinda BODROGI CONTENTS Contents... 2 Principle... 3 Requirements... 4 Install the certification authority
Högskoleexamen. Web application Security. Sektionen för informationsvetenskap, data- och elektroteknik. Rapport för Högskoleexamen, January 2013
Rapport för Högskoleexamen, January 2013 Högskoleexamen Sektionen för informationsvetenskap, data- och elektroteknik Web application Security Jose Enrique Charpentier Rojas Web application security Network
F-Secure Messaging Security Gateway. Deployment Guide
F-Secure Messaging Security Gateway Deployment Guide TOC F-Secure Messaging Security Gateway Contents Chapter 1: Deploying F-Secure Messaging Security Gateway...3 1.1 The typical product deployment model...4
Rational AppScan & Ounce Products
IBM Software Group Rational AppScan & Ounce Products Presenters Tony Sisson and Frank Sassano 2007 IBM Corporation IBM Software Group The Alarming Truth CheckFree warns 5 million customers after hack http://infosecurity.us/?p=5168
Xerox DocuShare Security Features. Security White Paper
Xerox DocuShare Security Features Security White Paper Xerox DocuShare Security Features Businesses are increasingly concerned with protecting the security of their networks. Any application added to a
Hardening Joomla 1. HARDENING PHP. 1.1 Installing Suhosin. 1.2 Disable Remote Includes. 1.3 Disable Unneeded Functions & Classes
1. HARDENING PHP Hardening Joomla 1.1 Installing Suhosin Suhosin is a PHP Hardening patch which aims to protect the PHP engine and runtime environment from common exploits, such as buffer overflows in
Web Application Guidelines
Web Application Guidelines Web applications have become one of the most important topics in the security field. This is for several reasons: It can be simple for anyone to create working code without security
Secure Socket Layer (SSL) Machines included: Contents 1: Basic Overview
Secure Socket Layer (SSL) Machines included: HL-4040CN HL-4050CDN HL-4070CDW DCP-9040CN DCP-9045CDN MFC-9440CN MFC-9840CDW Contents 1) Basic overview 2) Brief history 3) Benefit of using SSL 4) How to
Web Application Security Considerations
Web Application Security Considerations Eric Peele, Kevin Gainey International Field Directors & Technology Conference 2006 May 21 24, 2006 RTI International is a trade name of Research Triangle Institute
NeoMail Guide. Neotel (Pty) Ltd
NeoMail Guide Neotel (Pty) Ltd NeoMail Connect Guide... 1 1. POP and IMAP Client access... 3 2. Outlook Web Access... 4 3. Outlook (IMAP and POP)... 6 4. Outlook 2007... 16 5. Outlook Express... 24 1.
Description of Microsoft Internet Information Services (IIS) 5.0 and
Page 1 of 10 Article ID: 318380 - Last Review: July 7, 2008 - Revision: 8.1 Description of Microsoft Internet Information Services (IIS) 5.0 and 6.0 status codes This article was previously published under
Server Security. Contents. Is Rumpus Secure? 2. Use Care When Creating User Accounts 2. Managing Passwords 3. Watch Out For Aliases 4
Contents Is Rumpus Secure? 2 Use Care When Creating User Accounts 2 Managing Passwords 3 Watch Out For Aliases 4 Deploy A Firewall 5 Minimize Running Applications And Processes 5 Manage Physical Access
User Management Guide
AlienVault Unified Security Management (USM) 4.x-5.x User Management Guide USM v4.x-5.x User Management Guide, rev 1 Copyright 2015 AlienVault, Inc. All rights reserved. The AlienVault Logo, AlienVault,
NAPS Scholastic Tracking & Accountability Record (NSTAR) Frequently Asked Questions (FAQs)
NAPS Scholastic Tracking & Accountability Record (NSTAR) Frequently Asked Questions (FAQs) Prepared By: USNA ITSD Information Engineering Department Date: 15-August 2009 General Information: Q1. What is
Securing Data on Microsoft SQL Server 2012
Securing Data on Microsoft SQL Server 2012 Course 55096 The goal of this two-day instructor-led course is to provide students with the database and SQL server security knowledge and skills necessary to
In this topic we will cover the security functionality provided with SAP Business One.
In this topic we will cover the security functionality provided with SAP Business One. 1 After completing this topic, you will be able to: Describe the security functions provided by the System Landscape
