A NEW APPROACH OF WEB ATTACKS CLASSIFICATION FOR TESTING SECURITY TOOLS AT THE APPLICATION LEVEL
|
|
|
- Ellen Glenn
- 9 years ago
- Views:
Transcription
1 A NEW APPROACH OF WEB ATTACKS CLASSIFICATION FOR TESTING SECURITY TOOLS AT THE APPLICATION LEVEL 1 KARIM ABOUELMEHDI, 2 AHMED BENTAJER, 3 LOUBNA DALI, 4 NACER SEFIANI 1,4 The Mohammadia Engineering School laboratory l ASTIMI, Rabat, Morocco 2 University Cadi Ayyad, High School of Technology Safi, Morocco 3 Research Lab D.CS, Bowie State University.Maryland, USA 1 [email protected] ABSTRACT Classification of web attacks is the focus of cyber security nowadays. Therefore, it is still infancy, but like the cyber security, is evolving constantly. Therefore, classification needs to be properly organized in order to choose the best tests, to better choose the fixtures, for web security systems. The goal of this paper is to classify the web attacks using the classification of OWASP, the Open Web Application Security Project, which deals with the top ten security web attacks. We present and describe a classification method that assists to figure out the growth of web attacks. The particularity of our approach is not only it gives relevant information about the current web attacks but also can predict and estimate the likely future attacks. Our method is tree based classification. Keywords: Web Attacks, Attacks Categories, Web Security Tools, Classification Tree 1. INTRODUCTION Even though there are a lot of security tools to use in web attacks, the greatest difficulty in using them is to study their effectiveness and make sure that they are working properly. To solve this issue, we have proposed a tree based classification method along with the top ten vulnerabilities in web application identified by OWASP. More specifically, classifying these attacks so that a test will take only one element of each class. Several studies has been done in order to easily identify and analyze the common features of known venerability [1,2, 3].As a result several non profit organizations have been created. For example, the Web Application Security Consortium (WASC) which is made up of an international group of experts, industry practitioners, and organizational representatives who produce open source to standardize the web security. In addition to WASC, there is The Open Web Application Security Project (OWASP) which makes software security visible. so that decision about true software security risks can be made. For the latter, OWASP publishes OWASP10 which ranks the top 10 dangerous attacks in the web application. We will use this ranking to establish a new ranking. The aim of our approach is to find a suitable classification algorithm which can test systems for web application attacks. To do that, first we grouped attacks into several classes where each class has a set of attacks. Then, test one attack and generalize to the test to all attacks that belongs to the same group or class. 2. PRESENTATION OF WEB ATTACKS Web applications are targeted by a wide variety of attacks, some of which are known and dangerous and others unknown. For this reason, several databases are dedicated to save the attackers vulnerabilities, such as CVE (Common Vulnerabilities and Exposures) NVD (national vulnerability database) and VUPEN (vulnerability penetration testing). Because of numerous web attacks on application web, many organizations are forced and merged to asses and improve the security level of their web applications. 347
2 3. SECURITY TOOLS AGAINST WEB ATTACKS 3.1 Firewall-WAF Firewalls are filtering tools that block unwanted addresses (Zone of unauthorized IP addresses+ port number) and allow access to others (zone of authorized IP addresses + port number). [12] In web applications, firewall has a role as an agent ("inverse proxy") [13] to check the exchanged requests between the client and the web application, it is also called WAF (web application firewall). The customer sees the WAF as his/her web server in inverse-proxy mode, this latest hide the infrastructure that host the web application from network and users. The server side is protected by WAF firewall, through attacks signature database [14], which does verify the client requests as well. Being a barrier against attempts, The WAF is accordingly used to prevent attacks, detect and block almost all known attacks. Otherwise, with all its features, using the WAF by itself is not enough.[15] 3.2 Intrusion Detection Systems (IDS) Definition of Intrusion Detection Systems (IDS) An intrusion detection system (IDS) is a mechanism that detects abnormal or suspicious activity on a target data. And, several studies have been done over the past 20 years to increase their effectiveness. There are two types of IDS: the Network IDS (NIDS) and Host IDS (HIDS). In this paper, and since they belong to the application layer, we will focus on (HIDS). There are two detection approaches used by IDS: Scenario approach It is based on comparing the observed interaction with a corresponding reference signatures or known attack scenarios, if such a signature is found in the database of signatures, in this case it will be considered as an attack. [16, 17] behavioral approach IDS generate an alert if there is a deviation from the normal behavior and the observed behavior [18] The IDS of application layer In this section, we will present three intrusion detection tools of application layer whose source is free on the internet: w3af Created by ANDRES RANCHO in 2006 and is one of the most efficient [19]. It is also free and allow users to access and modify its different modules. One of these modules is the SQLi Module that detects SQL injections in authentication forms [20] Skip Fish Developed by Google and it is based on [21]. It detects a large number of vulnerabilities on web servers. In addition it checks the site out and collects only all the appearing stable pages. To check if a page is stable, Skip Fish applications sends 15 identical queries and compare answers. If the answers are similar then the page is considered stable. Wapiti It is an open source and based on [22]. It detects SQL, XSS and LDAP injections, control operating system injection from an URL and mishandled files. Furthermore, it sends queries exploiting vulnerabilities, researching error messages in the resulted answers. 4. EXESTING CLASSIFICATION OF WEB ATTACKS 4.1 WASC Classification "WASC threat Classification" reports an exhaustive list of web applications security threats.furthermore, they are grouped into the following six categories [10]. Insufficient authentication: includes websites attacks whose target is the validation system of the users ID, service, or application. Insufficient authorization: covers all websites attacks whose target is the 348
3 verification system of user privileges, service or application trying to perform an application interaction. Client-side attacks: includes user s attacks during the application performance. Command execution: contains all attacks that execute commands on any of the website architectural component. Information leakage: defines all the attacks discovering hidden features or any kind of information. Logical attack: characterizes attacks that use processes (change password system, account system...) OWASP Classification Unlike WASC who define all possible attacks on a web application, OWASP focus on the processing level, in fact, it covers the ten greatest security risks designed. The "OWASP Top 10" report help focusing on protecting the Web application from dangerous threats, as a consequence the protection will be cheaper and easier to implement rather than trying to shelter from all dangers. Injection: occurs when sending a unreliable data that might be either command or query to an interpreter [4]. So the attacker's non respective data can easily trick the interpreter and let him/her execute unusual commands or access to unauthorized data [5]. Cross-Site Scripting (XSS) : occurs when unreliable data is sent it to a web browser without validation [6], whenever an application has data causing diversion of user sessions,as result the user is redirected to another undersigned websites depending also on XSS, whether it allows attackers to execute scripts in the victim browser[9]. Broken authentication and session management: occurs if the functions are incorrectly implemented, so the attackers can easily compromise keys, session's tokens, in addition to appropriating the user s identities thanks to vulnerabilities [7]. Insecure direct object reference: occurs when a developer has a reference to an internal variable, as a record of database, for example a file name, file, or a key database. However, an access control or protection is necessary to avoid the attacker s use of these references and access to unauthorized data. Cross-site request Forgery (CSRF): forces the browser of an authenticated victim to send an HTTP request including its information and cookie session to vulnerable web application. Legitimating the victim [6]. The attacker generates requests through victim's browser. Security Misconfiguration: occurs when the application servers, Web servers, database server, and the platform are not safe or properly configured [7]. Sensitive data Exposure: occurs when Web application does not properly protect sensitive and confidential data, such as credit card numbers [6]. URL Restricted access: happens Whenever URL access is unsecure. So, it is necessary for the applications to control their access, hence, the attackers cannot force the URLs to access to hidden pages [8]. 349
4 Missing function level access control: occurs when applications fail to encrypt and secure the confidentiality and integrity of sensitive network traffic. Even if they do, they carry less powerful algorithms, using expired or invalid certificates, so the deployment remains incorrect [9]. Invalidated redirects and forwards: occurs when a user is redirected to another web page, determining the destination pages using unreliable data. In fact, the lock of validation is good advantage for the attackers, they redirect victims to phishing sites or malware, also access to unauthorized pages using footnotes[8] 5. OUR CLASSIFICATION APPROACH It should be noted that the decision tree is a testing tool that is used in software development as well as the artificial intelligence. Our method is based on OWASP and decision tree. Using the top ten risks cited by OWASP10, we presented each risk in form of decision tree. This tree is reduced so that will contain all the attacks categories. It will also predict potential attacks that are not yet created. Furthermore, the tree created will generates test cases which can be used as a tool to test attacks assessment. While there is study by GADELRAB [11] that classify attacks using decision tree, our work in particular focus on the top ten web attacks that OWASP published and it was the last quote made our days. -Average: method or algorithm used by the attacker to achieve his/her goal. -Target: data or functions that wish to reach the attacker. - Objective of attacker: financial purpose, terrorism, personal purpose, etc...). -Privilege: files (right to read or write, etc....). -Vulnerability Exploited by the attacker: which are the weak points. Step 2 Rank Keep the most important properties and take the least important ones off, which are: -Attack source: Our classification aim is to test the performance of attacks detection tools. That is preventing the attack regardless of its source. -Attack Type: the detection system must detect all types of known attacks, which is random in our case. -Attack objective: Regardless of the attack target, the goal is to prevent it before achieve its goal. Step 3 Draw a diagram of each attack cited by OWASP 10. Then, save only the five most important properties so that we can reduce the final diagram into all possible attacks. 7. RESULTS 6. OUTILNE OF OUR APPROACH Step 1 First, we begin extracting properties of each attack of the top ten listed by OWASP. The following properties are found: -Attack Type: viruses, Trojan horses, denied service etc.. Figure1:Injection 350
5 Figure 2:Cross Site Scripting Figure 6: Security Misconfiguration Figure 3: Broken authentication and session management Figure 7:Sensitive data exposure Figure 8: URL restricted access Figure 4: Insecure direct object reference Figure 9: Missing function level access control Figure 5: Cross-site request Forgery 351
6 Figure 10: Invalidated redirect and forwards To obtain the final diagram of our approach, we have eliminated the redundancy of properties so that the final attack pattern will not have any common properties. In addition, the source property of attack is also removed because our main objective is to test the performance of attack detection tools whatever the source is. (Figure 11) 8. DECISION OF OUR APPROACH In our approach, we have classified attacks into categories, and each category has sub categories. This was based on our ranking that selects the most important attributes (e.g., source privilege obtained, medium, and target). In addition, we believe that the dimensions "type" and "detection technique" does not establish a clear categorization. On the other hand, combinations of different suspected (considering the fine classification) results in the test cases 480. For example: (vulnerability = implementation, privilege = Root, target = logfiles Average = pirate open source accounts) is an attack that should test among the 480 test cases. 9. CONCLUSION AND PERSPECTIVE It is becoming increasingly necessary to evaluate the robustness of each system web security regardless of the type of attack.this will help the administrator to check whether their system is secure or not. Another immediate research that we will pursue is that, we will test this approach on web attacks after classifying and saving them. REFERENCES: [1] M. S. Gad El Rab, A. Abou El Kalam, Testing Intrusion Detection Systems: An Engineered Approach, IASTED International Conference on Software Engineering and Applications (SEA 2006), Nov [2] Common Vulnerabilities an Exposures "CVE»: [3] Open Source Vulnerability Data Base OSVDB : [4] A. Kiezun, P. J. Guo, K. Jayaraman, M. D. Ernst. Automatic Creation of SQL Injection and Cross-Site Scripting Attacks. ICSE, p , 2009 [5] M. Contensin. Web Application Security, in training PHP/MySQL chapter 6. CNRS, 2007 [6] D. Gollmann. Securing Web applications. in Information Security Technical Report, chapter 1-9, Elsevier, 2008 [7] J. Scambray, V. Liu et C. Sima. Hacking Exposed Web Applications: Web Application Security Secrets and Solutions, Osborne/McGraw-Hill, 482p, 2010 [8] Z. Su et G. Wassermann. The essence of command injection attacks in Web applications. in POPL'06 Conference, ACM SIGPLAN Notices, p , 2006 [9] Y.-W. Huang, C.-H. Tsai, T.-P. Lin, S.-K. H., D.T. Lee et S.-Y. Kuo. A testing framework for Web application security assessment.in Computer Networks, pages , 2005 [10] [11]M.Gadelrab, Evaluation of intrusion detection system a doctoral thesis pages35-40, 2008 [12] W. R. Cheswik, S. M. Bellovin, Firewalls and Internet Security, Addison-Wesley, [13] R.Barnett ET B.Rectanus WAF Virtual Patching Workshop: Securing WebGoat with ModSecurity, Breach Security, 2009 [14] Mod Security: Open Source Web Application Firewall : [15] Bee Ware - Web Security : [16] H.Debar, M.Dacier, A.Wespi, A revised taxonomy for intrusion detection systems, Annales des Telecommunications, vol. 55, pp , [17] Y.Deswarte, Chapitre 1 : La sécurité des systèmes d information et de communication, In Sécurité des réseaux et des systèmes répartis, dir. Yves Deswarte, Ludovic Mé, Traité IC2, Hermès, ISBN , pp 15-65, octobre [18] A. Kartit, A. Saidi, F. Bezzazi, M. El Marraki & A. Radi, "A new approach to intrusion 352
7 detection system", Journal of Theoretical and Applied Information Technology, Vol. 36, No. 2, 2012, pp [19] Top 10 vulnerability scanners: on 02/22/10] [20] W3af - Source Forge: [21] Skipfish - Google Code: [22] Wapiti - Source Forge: wapiti.sourceforge.net/ 353
8 Figure 11: A new approach of web attacks classification 354
Where every interaction matters.
Where every interaction matters. Peer 1 Vigilant Web Application Firewall Powered by Alert Logic The Open Web Application Security Project (OWASP) Top Ten Web Security Risks and Countermeasures White Paper
WEB SECURITY CONCERNS THAT WEB VULNERABILITY SCANNING CAN IDENTIFY
WEB SECURITY CONCERNS THAT WEB VULNERABILITY SCANNING CAN IDENTIFY www.alliancetechpartners.com WEB SECURITY CONCERNS THAT WEB VULNERABILITY SCANNING CAN IDENTIFY More than 70% of all websites have vulnerabilities
Magento Security and Vulnerabilities. Roman Stepanov
Magento Security and Vulnerabilities Roman Stepanov http://ice.eltrino.com/ Table of contents Introduction Open Web Application Security Project OWASP TOP 10 List Common issues in Magento A1 Injection
WHITE PAPER. FortiWeb and the OWASP Top 10 Mitigating the most dangerous application security threats
WHITE PAPER FortiWeb and the OWASP Top 10 PAGE 2 Introduction The Open Web Application Security project (OWASP) Top Ten provides a powerful awareness document for web application security. The OWASP Top
WHITE PAPER FORTIWEB WEB APPLICATION FIREWALL. Ensuring Compliance for PCI DSS 6.5 and 6.6
WHITE PAPER FORTIWEB WEB APPLICATION FIREWALL Ensuring Compliance for PCI DSS 6.5 and 6.6 CONTENTS 04 04 06 08 11 12 13 Overview Payment Card Industry Data Security Standard PCI Compliance for Web Applications
OWASP Top Ten Tools and Tactics
OWASP Top Ten Tools and Tactics Russ McRee Copyright 2012 HolisticInfoSec.org SANSFIRE 2012 10 JULY Welcome Manager, Security Analytics for Microsoft Online Services Security & Compliance Writer (toolsmith),
ArcGIS Server Security Threats & Best Practices 2014. David Cordes Michael Young
ArcGIS Server Security Threats & Best Practices 2014 David Cordes Michael Young Agenda Introduction Threats Best practice - ArcGIS Server settings - Infrastructure settings - Processes Summary Introduction
WHITE PAPER. FortiWeb Web Application Firewall Ensuring Compliance for PCI DSS 6.5 and 6.6
WHITE PAPER FortiWeb Web Application Firewall Ensuring Compliance for PCI DSS 6.5 and 6.6 Ensuring compliance for PCI DSS 6.5 and 6.6 Page 2 Overview Web applications and the elements surrounding them
Columbia University Web Security Standards and Practices. Objective and Scope
Columbia University Web Security Standards and Practices Objective and Scope Effective Date: January 2011 This Web Security Standards and Practices document establishes a baseline of security related requirements
Guidelines for Web applications protection with dedicated Web Application Firewall
Guidelines for Web applications protection with dedicated Web Application Firewall Prepared by: dr inŝ. Mariusz Stawowski, CISSP Bartosz Kryński, Imperva Certified Security Engineer INTRODUCTION Security
Sitefinity Security and Best Practices
Sitefinity Security and Best Practices Table of Contents Overview The Ten Most Critical Web Application Security Risks Injection Cross-Site-Scripting (XSS) Broken Authentication and Session Management
Overview of the Penetration Test Implementation and Service. Peter Kanters
Penetration Test Service @ ABN AMRO Overview of the Penetration Test Implementation and Service. Peter Kanters ABN AMRO / ISO April 2010 Contents 1. Introduction. 2. The history of Penetration Testing
The Top Web Application Attacks: Are you vulnerable?
QM07 The Top Web Application Attacks: Are you vulnerable? John Burroughs, CISSP Sr Security Architect, Watchfire Solutions [email protected] Agenda Current State of Web Application Security Understanding
Essential IT Security Testing
Essential IT Security Testing Application Security Testing for System Testers By Andrew Muller Director of Ionize Who is this guy? IT Security consultant to the stars Member of OWASP Member of IT-012-04
FINAL DoIT 11.03.2015 - v.4 PAYMENT CARD INDUSTRY DATA SECURITY STANDARDS APPLICATION DEVELOPMENT AND MAINTENANCE PROCEDURES
Purpose: The Department of Information Technology (DoIT) is committed to developing secure applications. DoIT s System Development Methodology (SDM) and Application Development requirements ensure that
Six Essential Elements of Web Application Security. Cost Effective Strategies for Defending Your Business
6 Six Essential Elements of Web Application Security Cost Effective Strategies for Defending Your Business An Introduction to Defending Your Business Against Today s Most Common Cyber Attacks When web
Web Engineering Web Application Security Issues
Security Issues Dec 14 2009 Katharina Siorpaes Copyright 2009 STI - INNSBRUCK www.sti-innsbruck.at It is NOT Network Security It is securing: Custom Code that drives a web application Libraries Backend
Attack Vector Detail Report Atlassian
Attack Vector Detail Report Atlassian Report As Of Tuesday, March 24, 2015 Prepared By Report Description Notes [email protected] The Attack Vector Details report provides details of vulnerability
Web Application Penetration Testing
Web Application Penetration Testing 2010 2010 AT&T Intellectual Property. All rights reserved. AT&T and the AT&T logo are trademarks of AT&T Intellectual Property. Will Bechtel [email protected]
How to break in. Tecniche avanzate di pen testing in ambito Web Application, Internal Network and Social Engineering
How to break in Tecniche avanzate di pen testing in ambito Web Application, Internal Network and Social Engineering Time Agenda Agenda Item 9:30 10:00 Introduction 10:00 10:45 Web Application Penetration
Out of the Fire - Adding Layers of Protection When Deploying Oracle EBS to the Internet
Out of the Fire - Adding Layers of Protection When Deploying Oracle EBS to the Internet March 8, 2012 Stephen Kost Chief Technology Officer Integrigy Corporation Phil Reimann Director of Business Development
Intrusion detection for web applications
Intrusion detection for web applications Intrusion detection for web applications Łukasz Pilorz Application Security Team, Allegro.pl Reasons for using IDS solutions known weaknesses and vulnerabilities
Penta Security 3rd Generation Web Application Firewall No Signature Required. www.gasystems.com.au
Penta Security 3rd Generation Web Application Firewall No Signature Required www.gasystems.com.au 1 1 The Web Presence Demand The Web Still Grows INTERNET USERS 2006 1.2B Internet Users - 18% of 6.5B people
OWASP AND APPLICATION SECURITY
SECURING THE 3DEXPERIENCE PLATFORM OWASP AND APPLICATION SECURITY Milan Bruchter/Shutterstock.com WHITE PAPER EXECUTIVE SUMMARY As part of Dassault Systèmes efforts to counter threats of hacking, particularly
05.0 Application Development
Number 5.0 Policy Owner Information Security and Technology Policy Application Development Effective 01/01/2014 Last Revision 12/30/2013 Department of Innovation and Technology 5. Application Development
Rational AppScan & Ounce Products
IBM Software Group Rational AppScan & Ounce Products Presenters Tony Sisson and Frank Sassano 2007 IBM Corporation IBM Software Group The Alarming Truth CheckFree warns 5 million customers after hack http://infosecurity.us/?p=5168
Table of Contents. Page 2/13
Page 1/13 Table of Contents Introduction...3 Top Reasons Firewalls Are Not Enough...3 Extreme Vulnerabilities...3 TD Ameritrade Security Breach...3 OWASP s Top 10 Web Application Security Vulnerabilities
Web App Security Audit Services
locuz.com Professional Services Web App Security Audit Services The unsecured world today Today, over 80% of attacks against a company s network come at the Application Layer not the Network or System
Web applications. Web security: web basics. HTTP requests. URLs. GET request. Myrto Arapinis School of Informatics University of Edinburgh
Web applications Web security: web basics Myrto Arapinis School of Informatics University of Edinburgh HTTP March 19, 2015 Client Server Database (HTML, JavaScript) (PHP) (SQL) 1 / 24 2 / 24 URLs HTTP
TECHNICAL AUDITS FOR CERTIFYING EUROPEAN CITIZEN COLLECTION SYSTEMS
TECHNICAL AUDITS FOR CERTIFYING EUROPEAN CITIZEN COLLECTION SYSTEMS Technical audits in accordance with Regulation 211/2011 of the European Union and according to Executional Regulation 1179/2011 of the
Web Application Security. Vulnerabilities, Weakness and Countermeasures. Massimo Cotelli CISSP. Secure
Vulnerabilities, Weakness and Countermeasures Massimo Cotelli CISSP Secure : Goal of This Talk Security awareness purpose Know the Web Application vulnerabilities Understand the impacts and consequences
Adobe Systems Incorporated
Adobe Connect 9.2 Page 1 of 8 Adobe Systems Incorporated Adobe Connect 9.2 Hosted Solution June 20 th 2014 Adobe Connect 9.2 Page 2 of 8 Table of Contents Engagement Overview... 3 About Connect 9.2...
How To Fix A Web Application Security Vulnerability
Proposal of Improving Web Application Security in Context of Latest Hacking Trends RADEK VALA, ROMAN JASEK Department of Informatics and Artificial Intelligence Tomas Bata University in Zlin, Faculty of
GFI White Paper PCI-DSS compliance and GFI Software products
White Paper PCI-DSS compliance and Software products The Payment Card Industry Data Standard () compliance is a set of specific security standards developed by the payment brands* to help promote the adoption
DFW INTERNATIONAL AIRPORT STANDARD OPERATING PROCEDURE (SOP)
Title: Functional Category: Information Technology Services Issuing Department: Information Technology Services Code Number: xx.xxx.xx Effective Date: xx/xx/2014 1.0 PURPOSE 1.1 To appropriately manage
Passing PCI Compliance How to Address the Application Security Mandates
Passing PCI Compliance How to Address the Application Security Mandates The Payment Card Industry Data Security Standards includes several requirements that mandate security at the application layer. These
ETHICAL HACKING 010101010101APPLICATIO 00100101010WIRELESS110 00NETWORK1100011000 101001010101011APPLICATION0 1100011010MOBILE0001010 10101MOBILE0001
001011 1100010110 0010110001 010110001 0110001011000 011000101100 010101010101APPLICATIO 0 010WIRELESS110001 10100MOBILE00010100111010 0010NETW110001100001 10101APPLICATION00010 00100101010WIRELESS110
Detecting Web Application Vulnerabilities Using Open Source Means. OWASP 3rd Free / Libre / Open Source Software (FLOSS) Conference 27/5/2008
Detecting Web Application Vulnerabilities Using Open Source Means OWASP 3rd Free / Libre / Open Source Software (FLOSS) Conference 27/5/2008 Kostas Papapanagiotou Committee Member OWASP Greek Chapter [email protected]
Introduction:... 1 Security in SDLC:... 2 Penetration Testing Methodology: Case Study... 3
Table of Contents Introduction:... 1 Security in SDLC:... 2 Penetration Testing Methodology: Case Study... 3 Information Gathering... 3 Vulnerability Testing... 7 OWASP TOP 10 Vulnerabilities:... 8 Injection
Securing Your Web Application against security vulnerabilities. Ong Khai Wei, IT Specialist, Development Tools (Rational) IBM Software Group
Securing Your Web Application against security vulnerabilities Ong Khai Wei, IT Specialist, Development Tools (Rational) IBM Software Group Agenda Security Landscape Vulnerability Analysis Automated Vulnerability
PCI-DSS and Application Security Achieving PCI DSS Compliance with Seeker
PCI-DSS and Application Security Achieving PCI DSS Compliance with Seeker www.quotium.com 1/14 Summary Abstract 3 PCI DSS Statistics 4 PCI DSS Application Security 5 How Seeker Helps You Achieve PCI DSS
FortiWeb Web Application Firewall. Ensuring Compliance for PCI DSS requirement 6.6 SOLUTION GUIDE
FortiWeb Web Application Firewall Ensuring Compliance for PCI DSS requirement 6.6 SOLUTION GUIDE Overview Web applications and the elements surrounding them have not only become a key part of every company
Is Drupal secure? A high-level perspective on web vulnerabilities, Drupal s solutions, and how to maintain site security
Is Drupal secure? A high-level perspective on web vulnerabilities, Drupal s solutions, and how to maintain site security Presented 2009-05-29 by David Strauss Thinking Securely Security is a process, not
Cracking the Perimeter via Web Application Hacking. Zach Grace, CISSP, CEH [email protected] January 17, 2014 2014 Mega Conference
Cracking the Perimeter via Web Application Hacking Zach Grace, CISSP, CEH [email protected] January 17, 2014 2014 Mega Conference About 403 Labs 403 Labs is a full-service information security and compliance
MatriXay WEB Application Vulnerability Scanner V 5.0. 1. Overview. (DAS- WEBScan ) - - - - - The best WEB application assessment tool
MatriXay DAS-WEBScan MatriXay WEB Application Vulnerability Scanner V 5.0 (DAS- WEBScan ) - - - - - The best WEB application assessment tool 1. Overview MatriXay DAS- Webscan is a specific application
Nuclear Regulatory Commission Computer Security Office Computer Security Standard
Nuclear Regulatory Commission Computer Security Office Computer Security Standard Office Instruction: Office Instruction Title: CSO-STD-1108 Web Application Standard Revision Number: 1.0 Effective Date:
Reducing Application Vulnerabilities by Security Engineering
Reducing Application Vulnerabilities by Security Engineering - Subash Newton Manager Projects (Non Functional Testing, PT CoE Group) 2008, Cognizant Technology Solutions. All Rights Reserved. The information
Penetration Testing Service. By Comsec Information Security Consulting
Penetration Testing Service By Consulting February, 2007 Background The number of hacking and intrusion incidents is increasing year by year as technology rolls out. Equally, there is no hiding place your
Web application testing
CL-WTS Web application testing Classroom 2 days Testing plays a very important role in ensuring security and robustness of web applications. Various approaches from high level auditing through penetration
Kenna Platform Security. A technical overview of the comprehensive security measures Kenna uses to protect your data
Kenna Platform Security A technical overview of the comprehensive security measures Kenna uses to protect your data V2.0, JULY 2015 Multiple Layers of Protection Overview Password Salted-Hash Thank you
Contemporary Web Application Attacks. Ivan Pang Senior Consultant Edvance Limited
Contemporary Web Application Attacks Ivan Pang Senior Consultant Edvance Limited Agenda How Web Application Attack impact to your business? What are the common attacks? What is Web Application Firewall
Web Vulnerability Scanner by Using HTTP Method
Available Online at www.ijcsmc.com International Journal of Computer Science and Mobile Computing A Monthly Journal of Computer Science and Information Technology IJCSMC, Vol. 4, Issue. 9, September 2015,
OWASP TOP 10 ILIA ALSHANETSKY @ILIAA HTTPS://JOIND.IN/15741
OWASP TOP 10 ILIA ALSHANETSKY @ILIAA HTTPS://JOIND.IN/15741 ME, MYSELF & I PHP Core Developer Author of Guide to PHP Security Security Aficionado THE CONUNDRUM USABILITY SECURITY YOU CAN HAVE ONE ;-) OPEN
What is Web Security? Motivation
[email protected] http://www.brucker.ch/ Information Security ETH Zürich Zürich, Switzerland Information Security Fundamentals March 23, 2004 The End Users View The Server Providers View What is Web
HTTPParameter Pollution. ChrysostomosDaniel
HTTPParameter Pollution ChrysostomosDaniel Introduction Nowadays, many components from web applications are commonly run on the user s computer (such as Javascript), and not just on the application s provider
KASPERSKY SECURITY INTELLIGENCE SERVICES. EXPERT SERVICES. www.kaspersky.com
KASPERSKY SECURITY INTELLIGENCE SERVICES. EXPERT SERVICES www.kaspersky.com EXPERT SERVICES Expert Services from Kaspersky Lab are exactly that the services of our in-house experts, many of them global
elearning for Secure Application Development
elearning for Secure Application Development Curriculum Application Security Awareness Series 1-2 Secure Software Development Series 2-8 Secure Architectures and Threat Modeling Series 9 Application Security
Web Application Report
Web Application Report This report includes important security information about your Web Application. OWASP Top Ten 2010 The Ten Most Critical Web Application Report This report was created by IBM Rational
Penetration Test Report
Penetration Test Report Acme Test Company ACMEIT System 26 th November 2010 Executive Summary Info-Assure Ltd was engaged by Acme Test Company to perform an IT Health Check (ITHC) on the ACMEIT System
Protect Your IT Infrastructure from Zero-Day Attacks and New Vulnerabilities
Protect Your IT Infrastructure from Zero-Day Attacks and New Vulnerabilities Protecting a business s IT infrastructure is complex. Take, for example, a retailer operating a standard multi-tier infrastructure
Web Application Security Assessment and Vulnerability Mitigation Tests
White paper BMC Remedy Action Request System 7.6.04 Web Application Security Assessment and Vulnerability Mitigation Tests January 2011 www.bmc.com Contacting BMC Software You can access the BMC Software
SAST, DAST and Vulnerability Assessments, 1+1+1 = 4
SAST, DAST and Vulnerability Assessments, 1+1+1 = 4 Gordon MacKay Digital Defense, Inc. Chris Wysopal Veracode Session ID: Session Classification: ASEC-W25 Intermediate AGENDA Risk Management Challenges
Secure Web Application Coding Team Introductory Meeting December 1, 2005 1:00 2:00PM Bits & Pieces Room, Sansom West Room 306 Agenda
Secure Web Application Coding Team Introductory Meeting December 1, 2005 1:00 2:00PM Bits & Pieces Room, Sansom West Room 306 Agenda 1. Introductions for new members (5 minutes) 2. Name of group 3. Current
Members of the UK cyber security forum. Soteria Health Check. A Cyber Security Health Check for SAP systems
Soteria Health Check A Cyber Security Health Check for SAP systems Soteria Cyber Security are staffed by SAP certified consultants. We are CISSP qualified, and members of the UK Cyber Security Forum. Security
Web Application Attacks and Countermeasures: Case Studies from Financial Systems
Web Application Attacks and Countermeasures: Case Studies from Financial Systems Dr. Michael Liu, CISSP, Senior Application Security Consultant, HSBC Inc Overview Information Security Briefing Web Applications
Mingyu Web Application Firewall (DAS- WAF) - - - All transparent deployment for Web application gateway
Mingyu Web Application Firewall (DAS- WAF) - - - All transparent deployment for Web application gateway All transparent deployment Full HTTPS site defense Prevention of OWASP top 10 Website Acceleration
IJMIE Volume 2, Issue 9 ISSN: 2249-0558
Survey on Web Application Vulnerabilities Prevention Tools Student, Nilesh Khochare* Student,Satish Chalurkar* Professor, Dr.B.B.Meshram* Abstract There are many commercial software security assurance
How To Protect A Web Application From Attack From A Trusted Environment
Standard: Version: Date: Requirement: Author: PCI Data Security Standard (PCI DSS) 1.2 October 2008 6.6 PCI Security Standards Council Information Supplement: Application Reviews and Web Application Firewalls
Global Partner Management Notice
Global Partner Management Notice Subject: Critical Vulnerabilities Identified to Alert Payment System Participants of Data Compromise Trends Dated: May 4, 2009 Announcement: To support compliance with
Integrating Security Testing into Quality Control
Integrating Security Testing into Quality Control Executive Summary At a time when 82% of all application vulnerabilities are found in web applications 1, CIOs are looking for traditional and non-traditional
Pentests more than just using the proper tools
Pentests more than just using the proper tools Agenda 1. Information Security @ TÜV Rheinland 2. Penetration testing Introduction Evaluation scheme Security Analyses of web applications Internal Security
Web Application Security and the OWASP Top 10. Web Application Security and the OWASP Top 10
Web Application Security and the OWASP Top 10 1 Sapient Corporation 2011 Web Application Security and the OWASP Top 10 This paper describes the most common vulnerabilities of web applications, as outlined
Information Security for Modern Enterprises
Information Security for Modern Enterprises Kamal Jyoti 1. Abstract Many enterprises are using Enterprise Content Management (ECM) systems, in order to manage sensitive information related to the organization.
Information Supplement: Requirement 6.6 Code Reviews and Application Firewalls Clarified
Standard: Data Security Standard (DSS) Requirement: 6.6 Date: February 2008 Information Supplement: Requirement 6.6 Code Reviews and Application Firewalls Clarified Release date: 2008-04-15 General PCI
Introduction. Two levels of security vulnerabilities:
Introduction Two levels of security vulnerabilities: Project level (cyphers, standard protocols, BAN logic, etc.) Implementation level (bugs, unhandled inputs, misconfigurations, etc.) There are two levels
Pentests more than just using the proper tools
Pentests more than just using the proper tools Agenda 1. Information Security @ TÜV Rheinland 2. Security testing 3. Penetration testing Introduction Evaluation scheme Security Analyses of web applications
WEB APPLICATION FIREWALLS: DO WE NEED THEM?
DISTRIBUTING EMERGING TECHNOLOGIES, REGION-WIDE WEB APPLICATION FIREWALLS: DO WE NEED THEM? SHAIKH SURMED Sr. Solutions Engineer [email protected] www.fvc.com HAVE YOU BEEN HACKED????? WHAT IS THE PROBLEM?
Web application security
Web application security Sebastian Lopienski CERN Computer Security Team openlab and summer lectures 2010 (non-web question) Is this OK? int set_non_root_uid(int uid) { // making sure that uid is not 0
Spigit, Inc. Web Application Vulnerability Assessment/Penetration Test. Prepared By: Accuvant LABS
Web Application Vulnerability Assessment/enetration Test repared By: Accuvant LABS November 20, 2012 Web Application Vulnerability Assessment/enetration Test Introduction Defending the enterprise against
Using Free Tools To Test Web Application Security
Using Free Tools To Test Web Application Security Speaker Biography Matt Neely, CISSP, CTGA, GCIH, and GCWN Manager of the Profiling Team at SecureState Areas of expertise: wireless, penetration testing,
Criteria for web application security check. Version 2015.1
Criteria for web application security check Version 2015.1 i Content Introduction... iii ISC- P- 001 ISC- P- 001.1 ISC- P- 001.2 ISC- P- 001.3 ISC- P- 001.4 ISC- P- 001.5 ISC- P- 001.6 ISC- P- 001.7 ISC-
Development Processes (Lecture outline)
Development*Process*for*Secure* So2ware Development Processes (Lecture outline) Emphasis on building secure software as opposed to building security software Major methodologies Microsoft's Security Development
WEB ATTACKS AND COUNTERMEASURES
WEB ATTACKS AND COUNTERMEASURES February 2008 The Government of the Hong Kong Special Administrative Region The contents of this document remain the property of, and may not be reproduced in whole or in
Secure Programming Lecture 12: Web Application Security III
Secure Programming Lecture 12: Web Application Security III David Aspinall 6th March 2014 Outline Overview Recent failures More on authorization Redirects Sensitive data Cross-site Request Forgery (CSRF)
Web Application Firewall on SonicWALL SSL VPN
Web Application Firewall on SonicWALL SSL VPN Document Scope This document describes how to configure and use the Web Application Firewall feature in SonicWALL SSL VPN 5.0. This document contains the following
Mean Time to Fix (MTTF) IT Risk s Dirty Little Secret Joe Krull, CPP, CISSP, IAM, CISA, A.Inst.ISP, CRISC, CIPP
Mean Time to Fix (MTTF) IT Risk s Dirty Little Secret Joe Krull, CPP, CISSP, IAM, CISA, A.Inst.ISP, CRISC, CIPP Presentation Overview Basic Application Security (AppSec) Fundamentals Risks Associated With
Cloud Security:Threats & Mitgations
Cloud Security:Threats & Mitgations Vineet Mago Naresh Khalasi Vayana 1 What are we gonna talk about? What we need to know to get started Its your responsibility Threats and Remediations: Hacker v/s Developer
A Novel Frame Work to Detect Malicious Attacks in Web Applications
Technology, Volume-2, Issue-1, January-March, 2014, pp. 23-28, IASTER 2014, www.iaster.com, Online:2347-5099, Print:2348-0009 A Novel Frame Work to Detect Malicious Attacks in Web Applications N. Jayakanthan
Integrated Network Vulnerability Scanning & Penetration Testing SAINTcorporation.com
SAINT Integrated Network Vulnerability Scanning and Penetration Testing www.saintcorporation.com Introduction While network vulnerability scanning is an important tool in proactive network security, penetration
CORE Security and the Payment Card Industry Data Security Standard (PCI DSS)
CORE Security and the Payment Card Industry Data Security Standard (PCI DSS) Addressing the PCI DSS with Predictive Security Intelligence Solutions from CORE Security CORE Security +1 617.399-6980 [email protected]
74% 96 Action Items. Compliance
Compliance Report PCI DSS 2.0 Generated by Check Point Compliance Blade, on July 02, 2013 11:12 AM 1 74% Compliance 96 Action Items Upcoming 0 items About PCI DSS 2.0 PCI-DSS is a legal obligation mandated
[state of the internet] / SEO Attacks. Threat Advisory: Continuous Uptick in SEO Attacks
TLP: GREEN Issue Date: 1.12.16 Threat Advisory: Continuous Uptick in SEO Attacks Risk Factor High The Akamai Threat Research Team has identified a highly sophisticated Search Engine Optimization (SEO)
Visa U.S.A Cardholder Information Security Program (CISP) Payment Application Best Practices
This document is to be used to verify that a payment application has been validated against Visa U.S.A. Payment Application Best Practices and to create the Report on Validation. Please note that payment
Columbia University Web Application Security Standards and Practices. Objective and Scope
Columbia University Web Application Security Standards and Practices Objective and Scope Effective Date: January 2011 This Web Application Security Standards and Practices document establishes a baseline
A Survey on Security and Vulnerabilities of Web Application
A Survey on Security and Vulnerabilities of Web Application Gopal R. Chaudhari, Prof. Madhav V. Vaidya Department of Information Technology, SGGS IE & T, Nanded, Maharashtra, India-431606 Abstract Web
