Securing Web Services with ModSecurity
|
|
|
- Phillip Pierce
- 9 years ago
- Views:
Transcription
1 Securing Web Services with ModSecurity This document is largely based on Shreeraj Shah s article of the same name that appeared in the June, 9 th 2005 Oreilly OnLamp Security Dev Center posting ( Ryan C. Barnett, Director of Application Security Training at Breach Security, has updated numerous sections to reflect the advanced ModSecurity 2.0 rules language. Web services are increasingly becoming an integral part of next-generation web applications, however they re also vulnerable to attacks. The nature of these attacks is the same as for traditional web applications, but the modus operandi is different. These attacks can lead to information leakage; further, they aid in remote command execution. By using WSDL, an attacker can determine an access point and available interfaces for web services. These interfaces or methods take inputs using SOAP over HTTP/HTTPS. Without good defense at the source code level, your application is in danger of compromise and exploitation. ModSecurity operates as an Apache web server module, ideal for defending web services against attacks that also include malicious POST data containing SOAP envelopes. The Problem Domain Web services have four main attack vectors: Variable-length buffer injection Meta character injection SQL injection SOAP fault code disclosure Common firewall configurations allow incoming HTTP/HTTPS traffic to pass through unobstructed. Each of these attacks is, simply put, malicious incoming traffic camouflaged to look like legitimate HTTP/HTTPS traffic and therefore able to penetrate firewalls quite easily. This article examines ways and means to first distinguish between legitimate and malicious HTTP/HTTPS traffic, and then block such traffic. Doing so can mitigate port 80/443 attacks to a very great extent. What Is the Solution? Solutions can take many different forms, ranging from secure coding practices to proper input validation. One approach is to perform content validation for each incoming request and compare it with predefined rules. This approach stops malicious SOAP requests from penetrating to the web services source code level. ModSecurity can help in defending against all of the above attacks, if you have deployed and configured it properly for web services. This article discusses in detail how ModSecurity 2.0 can be an effective web services defense tool.
2 After deploying web services, it is important to provide a sound defense against different sets of attack vectors. Each attack vector needs a different defense strategy. Consider a case study of a bank--a fictitious one and meant to serve only as an example. Blue Bank ( has recently deployed web services securely using ModSecurity. It provides banking services over the internet for its financial partners and clients. Its web services provide online customer services such as account balances, money transfers, and modifying customer information. Figure 1 illustrates the web services deployment architecture at Blue Bank. Figure 1. Deployment at Blue Bank There are many different ways to deploy web services. In this case, the web service runs on Tomcat/Axis and plugs into the Apache web server. The banking web services application is Java code (with the.jws file extension). Relevant sample snippets of Apache and Axis configuration files include the Apache httpd.conf, which loads Tomcat: LoadModule jk2_module modules/mod_jk2.so JkSet config.file /usr/local/apache2/conf/workers2.properties The Axis web.xml file, which supports AxisServlet for web services processing: <servlet-mapping> <servlet-name>axisservlet</servlet-name> <url-pattern>*.jws</url-pattern> </servlet-mapping>
3 Once the above configuration is in place, you can deploy any web services on this server. If you observe the header information sent out with this server's responses, you can identify this line: Server: Apache/2.2.0 (Unix) mod_ssl/ OpenSSL/0.9.7d mod_jk2/2.0.4 The above header suggests that the web server is Apache/2.2.0 (Unix) running the Tomcat module mod_jk2/ Axis runs as part of the Tomcat web application and is ready for the deployment of web services. To provide a defense at the web services level, Blue Bank has loaded the ModSecurity module that provides application-filtering capabilities. The following line in httpd.conf loads the security module: LoadModule security2_module modules/mod_security2.so With ModSecurity in place, Blue Bank can add filtering rules from the Core Ruleset in httpd.conf: <IfModule security2_module> Include conf/rules/*.conf </IfModule> Then, if you follow the steps outlined in the following Blog post Handling False Positives and Create Custom Rules you can then implement Web Service rules in a modsecurity_crs_15_customrules.conf file. With this, Blue Bank has everything in place for systems administrators and developers to build web services and use the ModSecurity's effective content filtering capability to defend against malicious incoming HTTP/HTTPS requests. Consider a sample web service at The WSDL response for this specific web service comes from Note: is a hypothetical domain used only as an example. Method/Interface data derived from WSDL to show account balance Scrutinize the WSDL response obtained as a result of the HTTP request passed. Of specific interest here is the invocation method, which takes the bank id and passes relevant account balance information back to the client over HTTP. The operation tag specifies methods that a web services client can invoke. The relevant snippets of the WSDL file include: <wsdl:operation name="getinput"> <wsdlsoap:operation soapaction=""/> <wsdl:input name="getinputrequest"> <wsdlsoap:body encodingstyle= namespace=" use="encoded"/> </wsdl:input>
4 <wsdl:output name="getinputresponse"> <wsdlsoap:body encodingstyle= namespace=" use="encoded"/> </wsdl:output> <wsdl:message name="getinputresponse"> <wsdl:part name="getinputreturn" type="xsd:string"/> </wsdl:message> <wsdl:message name="getinputrequest"> <wsdl:part name="id" type="xsd:string"/> </wsdl:message> As shown above, passing an id to this particular method will cause it to return a string as output. When you pass a bank account id as input to the web service, you will receive the account balance available for that particular account id. Invoking the web service over HTTP Blue Bank's clients or partners seeking account balance information over the internet can fetch the requisite information by sending a properly formatted envelope to the banking web services. Figure 2 shows an HTTP request for account balance information for account id being sent to the web service. Figure 2. Invoking the web service over HTTP
5 There are several different ways to create SOAP clients that generate properly formatted SOAP requests. Here is an example of a SOAP client using SOAP::Lite in Perl. The following simple code generates a SOAP request on the wire. #!perl -w use SOAP::Lite; print SOAP::Lite -> service(' -> getinput('12123'); Another option for sending SOAP/XML requests is to use the Curl application. Let s say you have the following example SOAP/XML data in a file called xml.post - <?xml version="1.0" encoding="utf-8"?> <soap:envelope xmlns:soap=" xmlns:soapenc=" xmlns:tns=" xmlns:types=" xmlns:xsi=" xmlns:xsd=" <soap:body soap:encodingstyle=" <q1:getinput xmlns:q1=" <id xsi:type="xsd:string">12123</id> </q1:getinput> </soap:body> </soap:envelope> With curl, you can use command line options to quickly simulate sending XML POST data by using the -d flag to send the data in the xml.post file such as this # curl -d "`cat xml.post`" -H 'Content-Type: text/xml; charset=utf-8' - H 'SOAPAction: ""' The advantage of using a tool such as curl for this task is that if you decide to alter the data in the xml.post file (to insert malicious attack payloads), curl will automatically correct the Content-Length header size. An HTTP/SOAP request sent to with the id of will generate something like: POST /axis/getbalance.jws HTTP/1.0 Content-Type: text/xml; charset=utf-8 SOAPAction: "" Content-Length: 576 Expect: 100-continue
6 Host: <?xml version="1.0" encoding="utf-8"?> <soap:envelope xmlns:soap=" xmlns:soapenc=" xmlns:tns=" xmlns:types=" xmlns:xsi=" xmlns:xsd=" <soap:body soap:encodingstyle=" <q1:getinput xmlns:q1=" <id xsi:type="xsd:string">12123</id> </q1:getinput> </soap:body> </soap:envelope>... HTTP/ OK Date: Mon, 03 Jan :24:10 GMT Server: Apache/ (Unix) mod_ssl/ OpenSSL/0.9.7d mod_jk2/2.0.4 Set-Cookie: JSESSIONID=69C6540CC427A8B064C0795ADDFC20EA; Path=/axis Content-Type: text/xml;charset=utf-8 Connection: close <?xml version="1.0" encoding="utf-8"?> <soapenv:envelope xmlns:soapenv=" xmlns:xsd=" xmlns:xsi=" <soapenv:body> <ns1:getinputresponse soapenv:encodingstyle=" xmlns:ns1=" <ns1:getinputreturn xsi:type="xsd:string">$2500</ns1:getinputreturn> </ns1:getinputresponse> </soapenv:body> </soapenv:envelope> Gluing a Web Services Resource into ModSecurity Blue Bank's web service uses the URL It's generally a good idea to create a rule set for this resource. To do so, Blue Bank has glued its resource into modsecurity_crs_15_customerules.conf file with: SecRuleEngine On SecRequestBodyAccess On SecResponseBodyAccess On SecResponseBodyMimeType text/xml text/plain text/html SecDebugLog logs/modsec_debug_log SecDebugLogLevel 3
7 SecAuditLogType Serial SecAuditEngine RelevantOnly SecAuditLogRelevantStatus "^(?:5 4\d[^4])" SecAuditLog logs/mod_audit_log SecDefaultAction phase:2,deny,log,status:500 t:urldecodeuni,t:htmlentitydecode,t:lowercase # Rules for web services SecRule REQUEST_HEADERS:Content-Type "text/xml" \ "phase:1,t:lowercase,nolog,pass,ctl:requestbodyprocessor=xml" <Location /axis/getbalance.jws> SecRule REQBODY_PROCESSOR "!^XML$" skip:1,t:none SecRule XML "@validateschema /path/to/soapenvelope.xml" SecRule XML:/soap:Envelope/soap:Body/q1:getInput/id/text() \ "^(RegEx)$" "phase:2,capture,log,deny,status:500, \ xmlns:soap= \ xmlns:q1= Input Data \ Violation: %{TX.0}'" </Location> # The following directive block applies filtering criteria for /axis/getbalance.jws. This adds the required placeholder for the defense of the web service. Placeholders go in the <Location> block. SecRuleEngine On SecRequestBodyAccess On SecResponseBodyAccess On SecResponseBodyMimeType text/xml text/plain text/html SecDebugLog logs/modsec_debug_log SecDebugLogLevel 3 SecAuditLogType Serial SecAuditEngine RelevantOnly SecAuditLogRelevantStatus "^(?:5 4\d[^4])" SecAuditLog logs/mod_audit_log SecDefaultAction phase:2,deny,log,status:500 t:urldecodeuni,t:htmlentitydecode,t:lowercase # Rules for web services SecRule REQUEST_HEADERS:Content-Type "text/xml" \ "phase:1,t:lowercase,nolog,pass,ctl:requestbodyprocessor=xml" <Location /axis/getbalance.jws> SecRule REQBODY_PROCESSOR "!^XML$" skip:1,t:none SecRule XML "@validateschema /path/to/soapenvelope.xml" SecRule XML:/soap:Envelope/soap:Body/q1:getInput/id/text() \ "^(RegEx)$" "phase:2,capture,log,deny,status:500, \ xmlns:soap= \ xmlns:q1= Input Data \ Violation: %{TX.0}'" </Location> #
8 There are five important actions taking place here: 1. Enabling Request Body Access Web services invocation methods go over POST. Hence, the next directive to enable is SecRequestBodyAccess to enable inspection of POST XML payload data SecRequestBodyAccess On 2. Enabling the XML request body processor By default, ModSecurity does not use the an XML processor to parse the request body content. In order to enable this functionality, you must enable it in phase:1 so that it can then properly parse the data when it reads the request body content in phase:2. So, how do we know that the request body is in XML format? We inspect the Content-Type request header to identify the body type. The following rule handles this action REQUEST_HEADERS:Content-Type "text/xml" \ "phase:1,t:lowercase,nolog,pass,ctl:requestbodyprocessor=xml" 3. Setting up an XML location container In this scenario, there is only one location that utilizes web services functionality - /axis/getbalance.jws. Therefore, we want to contain our XML processing and inspection to only this location. We can do this by placing the remaining rules in an Apache <Location> scope directive container like this <Location /axis/getbalance.jws> ModSecurity Rules </Location> 4. Using operator operator is used to inspect the format and syntax of the XML body. Oftentimes, malicious requests will alter the various location fields and this rule will catch them quite easily. 5. Using the XPath variable location The main advantage that ModSecurity 2 has over its previous version is that it is able to utilize XPath variables to define specific input vectors in the XML body. In previous ModSecurity versions, you would have to inspect the entire POST_PAYLOAD data and use regular expressions to attempt to trap the desired XML field location. The ability to use XPath expressions increases the rules accuracy and significantly decreases false positives. SecRule XML:/soap:Envelope/soap:Body/q1:getInput/id/text() \
9 "^(RegEx)$" "phase:2,capture,log,deny,status:500, \ xmlns:soap= \ xmlns:q1= Input Data \ Violation: %{TX.0}'" It is important to also note that you will most likely need to use the xmlns action to specify XML Name Spaces that are required for XPath processing. With the above details in place, Blue Bank has deployed a shield in the form of ModSecurity. It also knows its defense target--the content of id, which clients pass to the web service over a SOAP envelope. Defending Attack Vectors As a first step to defend all incoming malicious requests, Blue Bank needs to trap the value of id to prevent a client from passing an invalid value. The SOAP request uses an XML tag to pass this id information to the internal web services code, looking something like: <q1:getinput xmlns:q1=" <id xsi:type="xsd:string">12123</id> </q1:getinput> To filter the request, ModSecurity must have some way to read the value associated with the tag; in this case it is ModSecurity provides the XML variable as a way to trap an XML field location value passed through a POST request. Here is an example of a customized filter: SecRule XML:/soap:Envelope/soap:Body/q1:getInput/id/text() \ "^(RegEx)$" "phase:2,capture,log,deny,status:500, \ xmlns:soap= \ xmlns:q1= Input Data \ Violation: %{TX.0}'" The highlighted line traps the request made to id by using an XPath expression which traverses the XML path to the targeted location. If the sent XML request has an id field contained in it, the server can process the information. However, a malicious client can modify this particular value to inject malicious content into it. There are four main popular attack vectors. Attack vector 1: variable-length buffer injection One of the major security concerns when passing a large buffer to a variable is that a large buffer may cause the application to misbehave and/or crash somewhere down the line during execution. The following rule defends the variable id against precisely this type of attack: SecRule XML:/soap:Envelope/soap:Body/q1:getInput/id/text() \ "^(.{6,})$" "phase:2,capture,log,deny,status:500, \
10 xmlns:soap= \ xmlns:q1= Input Data \ Violation: %{TX.0}'" In the above directive, the regular expression pattern ^(.{6,})$ restricts the buffer to allow only a buffer of five characters. In order to ascertain the effect of the above directive block, Blue Bank can send across two requests, one that matches the buffer length set and the other that exceeds the buffer length set in the directive block. POST /axis/getbalance.jws HTTP/1.0 Content-Type: text/xml; charset=utf-8 SOAPAction: "" Content-Length: 576 Expect: 100-continue Host: <?xml version="1.0" encoding="utf-8"?> <soap:envelope xmlns:soap=" xmlns:soapenc=" xmlns:tns=" xmlns:types=" xmlns:xsi=" xmlns:xsd=" <soap:body soap:encodingstyle=" <q1:getinput xmlns:q1=" <id xsi:type="xsd:string">12123</id> </q1:getinput> </soap:body> </soap:envelope>... HTTP/ OK Date: Mon, 03 Jan :24:10 GMT Server: Apache/ (Unix) mod_ssl/ OpenSSL/0.9.7d mod_jk2/2.0.4 Set-Cookie: JSESSIONID=69C6540CC427A8B064C0795ADDFC20EA; Path=/axis Content-Type: text/xml;charset=utf-8 Connection: close <?xml version="1.0" encoding="utf-8"?> <soapenv:envelope xmlns:soapenv=" xmlns:xsd=" xmlns:xsi=" <soapenv:body> <ns1:getinputresponse soapenv:encodingstyle=" xmlns:ns1=" <ns1:getinputreturn xsi:type="xsd:string">$2500</ns1:getinputreturn> </ns1:getinputresponse> </soapenv:body>
11 </soapenv:envelope> In the above case, a buffer of five characters is passed, and the server sent a response with the value of $2500. Here's the response and request with a modified id of (six characters): POST /axis/getblalance.jws HTTP/1.0 Content-Type: text/xml; charset=utf-8 SOAPAction: "" Content-Length: 577 Expect: 100-continue Host: <?xml version="1.0" encoding="utf-8"?> <soap:envelope xmlns:soap=" xmlns:soapenc=" xmlns:tns=" xmlns:types=" xmlns:xsi=" xmlns:xsd=" <soap:body soap:encodingstyle=" <q1:getinput xmlns:q1=" <id xsi:type="xsd:string">121234</id> </q1:getinput> </soap:body> </soap:envelope>... HTTP/ Internal Server Error Date: Mon, 03 Jan :00:33 GMT Server: Apache/ (Unix) mod_ssl/ OpenSSL/0.9.7d mod_jk2/2.0.4 Content-Length: 657 Connection: close Content-Type: text/html; charset=iso <!DOCTYPE HTML PUBLIC "-//IETF//DTD HTML 2.0//EN"> <html><head> <title>500 Internal Server Error</title> </head><body> <h1>internal Server Error</h1> <p>the server encountered an internal error or misconfiguration and was unable to complete your request.</p> <p>please contact the server administrator, [email protected] and inform them of the time the error occurred, and anything you might have done that may have caused the error.</p> <p>more information about this error may be available in the server Error log.</p> <hr /> </body></html>
12 The ModSecurity module has rejected this request. Status 500 is the response received. This indicates that the request never hit the web services level. Blue Bank has succeeded, therefore, in providing a sound defense against any kind of buffer overflow, the most common and often ignored vulnerability. Attack vector 2: meta-character injection Another major threat to input variables is the use of metacharacters such as %, single quote ('), and double quotes ("). These characters can cause SQL injection attacks to occur and may also cause unnecessary information leakage. Adopting the following strategy provides a sound defense against such attacks. SecRule XML:/soap:Envelope/soap:Body/q1:getInput/id/text() \ "^(.{6,} [^\d])$" \ "phase:2,capture,log,deny,status:500, \ xmlns:soap= \ xmlns:q1= Input Data \ Violation: %{TX.0}'" Instead of taking a negative policy enforcement methodology and listing every possible meta-character that could potentially cause problems, it is much wiser to use a positive policy rule to enforce specific data types. The regular expression pattern "[^\d]" denies an HTTP request if the id XPath variable's data consists of any non-digit characters. The ability to create positive security rulesets by either forcing regular expression character classes or by using ModSecurity s rule inversion (with the! character) is an important technique in ModSecurity. Here is the request and response sent using an id of 12'12: POST /axis/getbalance.jws HTTP/1.0 Content-Type: text/xml; charset=utf-8 SOAPAction: "" Content-Length: 576 Expect: 100-continue Host: <?xml version="1.0" encoding="utf-8"?> <soap:envelope xmlns:soap=" xmlns:soapenc=" xmlns:tns=" xmlns:types=" xmlns:xsi=" xmlns:xsd=" <soap:body soap:encodingstyle=" <q1:getinput xmlns:q1=" <id xsi:type="xsd:string">12'12</id> </q1:getinput> </soap:body> </soap:envelope>
13 Internal Server Error HTTP/ Internal Server Error Date: Mon, 03 Jan :00:33 GMT Server: Apache/ (Unix) mod_ssl/ OpenSSL/0.9.7d mod_jk2/2.0.4 Content-Length: 657 Connection: close Content-Type: text/html; charset=iso This attack also failed, and ModSecurity caught it. Attack vector 3: SQL injection It is also possible to inject SQL statements in variables. Concatenating together many SQL statements is possible. If your application does not sanitize its input, malicious clients can append additional SQL statements to existing SQL queries, often with disastrous consequences. Fortunately, Blue Bank already has protections to block SQL injection attacks by using the previous positive policy filter! When you combine both the size restrictions and only allowing digit characters, it is not possible to successfully execute an SQL infection attack. Attack vector 4: SOAP fault code disclosure One of the major sources of information in web services is the fault code. A forced error on the server can create a fault code. This type of detailed error message may aid an attacker by divulging technical information that could help them to fine tune their next attack. Let s assume that either an attacker somehow found a method to evade our inbound protection rules or if we didn t implement any inbound protections and was able to cause an error with our web service. Here's the request and response from a malicious user probing Blue Bank by sending a request with the character a in the id variable instead of an integer: POST /axis/getbalance.jws HTTP/1.0 Content-Type: text/xml; charset=utf-8 SOAPAction: "" Content-Length: 569 Expect: 100-continue Host: <?xml version="1.0" encoding="utf-8"?> <soap:envelope xmlns:soap=" xmlns:soapenc=" xmlns:tns=" xmlns:types=" xmlns:xsi=" xmlns:xsd="
14 <soap:body soap:encodingstyle=" <q1:getinput xmlns:q1=" <id xsi:type="xsd:string">a</id> </q1:getinput> </soap:body> </soap:envelope> Internal Server Error HTTP/ Internal Server Error Date: Tue, 04 Jan :22:14 GMT Server: Apache/ (Unix) mod_ssl/ OpenSSL/0.9.7d mod_jk2/2.0.4 Set-Cookie: JSESSIONID=1CAF4CD0ED0F38FB40ECBC7BDAB56C75; Path=/axis Content-Type: text/xml;charset=utf-8 Connection: close <?xml version="1.0" encoding="utf-8"?> <soapenv:envelope xmlns:soapenv=" xmlns:xsd=" xmlns:xsi=" <soapenv:body> <soapenv:fault> <faultcode>soapenv:server.userexception</faultcode> <faultstring>java.lang.numberformatexception: For input string:"a"</faultstring> <detail/> </soapenv:fault> </soapenv:body> </soapenv:envelope> As shown in the response, the fault code may disclose critical internal information. That's reason enough to define and apply filters. Blue Bank can fix this by applying the following rules: SecRuleEngine On SecRequestBodyAccess On SecResponseBodyAccess On SecResponseBodyMimeType text/xml text/plain text/html SecDebugLog logs/modsec_debug_log SecDebugLogLevel 3 SecAuditLogType Serial SecAuditEngine RelevantOnly SecAuditLogRelevantStatus "^(?:5 4\d[^4])" SecAuditLog logs/mod_audit_log SecDefaultAction phase:2,deny,log,status:500 t:urldecodeuni,t:htmlentitydecode,t:lowercase # Rules for web services SecRule REQUEST_HEADERS:Content-Type "text/xml" \ "phase:1,t:lowercase,nolog,pass,ctl:requestbodyprocessor=xml" <Location /axis/getbalance.jws>
15 SecRule REQBODY_PROCESSOR "!^XML$" skip:1,t:none SecRule XML /path/to/soapenvelope.xml" SecRule XML:/soap:Envelope/soap:Body/q1:getInput/id/text() \ "^(.{6,} [^\d])$" "phase:2,capture,log,deny,status:500, \ xmlns:soap= \ xmlns:q1= Input Data \ Violation: %{TX.0}'" SecRule RESPONSE_BODY "\<fault(code string)\>.*\\</fault(code string)\>" \ "phase:4,deny,status:500,capture,msg:'soap fault code disclosure detected: %{TX.0}'" </Location> # In order to scan the response body data, we need to set the SecResponseBodyAccess directive to On. Additionally, we need to make sure to add the text/xml mime-type to the SecResponseBodyMimeType directive. SecResponseBodyAccess On SecResponseBodyMimeType text/xml text/plain text/html We can then apply this rule that will inspect the RESPONSE_BODY variable and look for the fault-code html tags. SecRule RESPONSE_BODY "\<fault(code string)\>.*\\</fault(code string)\>" \ "phase:4,deny,status:500,capture,msg:'soap fault code disclosure detected: %{TX.0}'" This directive blocks outgoing traffic that contains fault codes. If the attacker sends the ill-formed request again with a in the integer field, he will receive a response more like: HTTP/ Internal Server Error Date: Mon, 03 Jan :00:33 GMT Server: Apache/ (Unix) mod_ssl/ OpenSSL/0.9.7d mod_jk2/2.0.4 Content-Length: 657 Connection: close Content-Type: text/html; charset=iso <!DOCTYPE HTML PUBLIC "-//IETF//DTD HTML 2.0//EN"> <html><head> <title>500 Internal Server Error</title> </head><body> <h1>internal Server Error</h1> <p>the server encountered an internal error or misconfiguration and was unable to complete your request.</p> <p>please contact the server administrator, [email protected] and inform them of the time the error occurred, and anything you might have done that may have caused the error.</p> <p>more information about this error may be available in the server error log.</p>
16 <hr /> </body></html> ModSecurity, properly configured, has also defended against this information leakage attack. Conclusion ModSecurity may seem like just another tool in the security firmament, but it has a subtle advantage over other security tools already available. While providing intrusion detection and defense capabilities at the HTTP layer, ModSecurity also allows both Request and Response body filtering capabilities. However, the advantage ModSecurity offers is in allowing developers and web administrators to defend web services without actually modifying their source code. This doesn't make shabby code tolerable; it simply means that an organization can mount an additional effective defense of its web services without having to run through numerous lines of code. This article focuses on just one of the techniques for securing web services, and an effective one too. Feel free to choose your own techniques of defending web services. About Ryan C. Barnett Ryan C. Barnett is the Director of Application Security Training at Breach Security. He is also a Faculty Member for the SANS Institute, where his duties include Instructor/Courseware Developer for Apache Security/Building a Web Application Firewall Workshop, Top 20 Vulnerabilities Team Member and Local Mentor for the SANS Track 4, "Hacker Techniques, Exploits and Incident Handling" course. He holds six SANS Global Information Assurance Certifications (GIAC): Intrusion Analyst (GCIA), Systems and Network Auditor (GSNA), Forensic Analyst (GCFA), Incident Handler (GCIH), Unix Security Administrator (GCUX) and Security Essentials (GSEC). In addition to the SANS Institute, he is also the Team Lead for the Center for Internet Security Apache Benchmark Project and a Member of the Web Application Security Consortium. Mr. Barnett has also authored a web security book for Addison/Wesley Publishing entitled "Preventing Web Attacks with Apache." About Breach Security, Inc. Breach Security, Inc. is a leading provider of next-generation web application security that protects corporate-critical information. Breach effectively protects web applications of commercial enterprises and government agencies alike against Internet hacking attacks and provides an effective solution for expanding security challenges such as identity theft, information leakage, and insecurely coded applications. Breach s solutions are ideal for any organization s regulatory compliance requirements for security. Breach was founded in 2004 and is headquartered in Carlsbad, Calif. For more information visit: About Shreeraj Shah Shreeraj Shah, BE, MSCS, MBA, is the founder of Net-Square and leads Net-Square s consulting, training and R&D activities. He previously worked with Foundstone, Chase Manhattan Bank and IBM. He is also the author of Hacking Web Services (Thomson) and co-author of Web Hacking: Attacks and Defense (Addison-Wesley). In addition, he has published several advisories, tools, and whitepapers, and has presented at numerous conferences including RSA, AusCERT, InfosecWorld (Misti), HackInTheBox, Blackhat, OSCON, Bellua, Syscan, etc. His
17 articles are published on Securityfocus, O Reilly, InformIT and HNS. You can read his blog at shreeraj.blogspot.com.
Dissecting and digging application source code for vulnerabilities
1 Dissecting and digging application source code for vulnerabilities by Abstract Application source code scanning for vulnerability detection is an interesting challenge and relatively complex problem
Addressing Application Layer Attacks with Mod Security
Addressing Application Layer Attacks with Mod Security This article sheds some light on some of the important concepts pertaining to Web Application Firewalls (WAF). We have also looked at the Mod_Security
Playing with Web Application Firewalls
Playing with Web Application Firewalls DEFCON 16, August 8-10, 2008, Las Vegas, NV, USA Who is Wendel Guglielmetti Henrique? Penetration Test analyst at SecurityLabs - Intruders Tiger Team Security division
Advanced Web Security, Lab
Advanced Web Security, Lab Web Server Security: Attacking and Defending November 13, 2013 Read this earlier than one day before the lab! Note that you will not have any internet access during the lab,
Implementation of Web Application Firewall
Implementation of Web Application Firewall OuTian 1 Introduction Abstract Web 層 應 用 程 式 之 攻 擊 日 趨 嚴 重, 而 國 內 多 數 企 業 仍 不 知 該 如 何 以 資 安 設 備 阻 擋, 仍 在 採 購 傳 統 的 Firewall/IPS,
Secure Web Application Coding Team Introductory Meeting December 1, 2005 1:00 2:00PM Bits & Pieces Room, Sansom West Room 306 Agenda
Secure Web Application Coding Team Introductory Meeting December 1, 2005 1:00 2:00PM Bits & Pieces Room, Sansom West Room 306 Agenda 1. Introductions for new members (5 minutes) 2. Name of group 3. Current
Out of the Fire - Adding Layers of Protection When Deploying Oracle EBS to the Internet
Out of the Fire - Adding Layers of Protection When Deploying Oracle EBS to the Internet March 8, 2012 Stephen Kost Chief Technology Officer Integrigy Corporation Phil Reimann Director of Business Development
Web Application Report
Web Application Report This report includes important security information about your Web Application. Security Report This report was created by IBM Rational AppScan 8.5.0.1 11/14/2012 8:52:13 AM 11/14/2012
WHITE PAPER. FortiWeb and the OWASP Top 10 Mitigating the most dangerous application security threats
WHITE PAPER FortiWeb and the OWASP Top 10 PAGE 2 Introduction The Open Web Application Security project (OWASP) Top Ten provides a powerful awareness document for web application security. The OWASP Top
Web. Services. Web Technologies. Today. Web. Technologies. Internet WWW. Protocols TCP/IP HTTP. Apache. Next Time. Lecture #3 2008 3 Apache.
JSP, and JSP, and JSP, and 1 2 Lecture #3 2008 3 JSP, and JSP, and Markup & presentation (HTML, XHTML, CSS etc) Data storage & access (JDBC, XML etc) Network & application protocols (, etc) Programming
Web Application Security 101
dotdefender Web Application Security Web Application Security 101 1 Web Application Security 101 As the Internet has evolved over the years, it has become an integral part of virtually every aspect in
Barracuda Web Application Firewall vs. Intrusion Prevention Systems (IPS) Whitepaper
Barracuda Web Application Firewall vs. Intrusion Prevention Systems (IPS) Whitepaper Securing Web Applications As hackers moved from attacking the network to attacking the deployed applications, a category
HTTP Fingerprinting and Advanced Assessment Techniques
HTTP Fingerprinting and Advanced Assessment Techniques Saumil Shah Director, Net-Square Author: Web Hacking - Attacks and Defense BlackHat 2003, Washington DC The Web Hacker s playground Web Client Web
How To Protect A Web Application From Attack From A Trusted Environment
Standard: Version: Date: Requirement: Author: PCI Data Security Standard (PCI DSS) 1.2 October 2008 6.6 PCI Security Standards Council Information Supplement: Application Reviews and Web Application Firewalls
Getting started with OWASP WebGoat 4.0 and SOAPUI.
Getting started with OWASP WebGoat 4.0 and SOAPUI. Hacking web services, an introduction. Version 1.0 by Philippe Bogaerts [email protected] www.radarhack.com Reviewed by Erwin Geirnaert
Divide and Conquer Real World Distributed Port Scanning
Divide and Conquer Real World Distributed Port Scanning Ofer Maor CTO Hacktics 16 Feb 2006 Hackers & Threats I, 3:25PM (HT1-302) Introduction Divide and Conquer: Real World Distributed Port Scanning reviews
External Vulnerability Assessment. -Technical Summary- ABC ORGANIZATION
External Vulnerability Assessment -Technical Summary- Prepared for: ABC ORGANIZATI On March 9, 2008 Prepared by: AOS Security Solutions 1 of 13 Table of Contents Executive Summary... 3 Discovered Security
Information Supplement: Requirement 6.6 Code Reviews and Application Firewalls Clarified
Standard: Data Security Standard (DSS) Requirement: 6.6 Date: February 2008 Information Supplement: Requirement 6.6 Code Reviews and Application Firewalls Clarified Release date: 2008-04-15 General PCI
Barracuda Web Site Firewall Ensures PCI DSS Compliance
Barracuda Web Site Firewall Ensures PCI DSS Compliance E-commerce sales are estimated to reach $259.1 billion in 2007, up from the $219.9 billion earned in 2006, according to The State of Retailing Online
SOAP Web Services Attacks
SOAP Web Services Attacks Part 1 Introduction and Simple Injection Are your web applications vulnerable? by Sacha Faust Table of Contents Introduction... 1 Background... 1 Limitations...1 Understanding
FINAL DoIT 04.01.2013- v.8 APPLICATION SECURITY PROCEDURE
Purpose: This procedure identifies what is required to ensure the development of a secure application. Procedure: The five basic areas covered by this document include: Standards for Privacy and Security
Top Ten Web Attacks. Saumil Shah Net-Square. BlackHat Asia 2002, Singapore
Top Ten Web Attacks Saumil Shah Net-Square BlackHat Asia 2002, Singapore TodayÕs battleground Ð the Web Web sites and web applications rapidly growing. Complex business applications are now delivered over
Advanced Administration for Citrix NetScaler 9.0 Platinum Edition
Advanced Administration for Citrix NetScaler 9.0 Platinum Edition Course Length: 5 Days Course Code: CNS-300 Course Description This course provides the foundation to manage, configure and monitor advanced
ModSecurity as Universal Cross-platform Web Protection Tool
ModSecurity as Universal Cross-platform Web Protection Tool Ryan Barnett Greg Wroblewski Abstract For many years ModSecurity was a number one free open source web application firewall for the Apache web
Internet Technologies. World Wide Web (WWW) Proxy Server Network Address Translator (NAT)
Internet Technologies World Wide Web (WWW) Proxy Server Network Address Translator (NAT) What is WWW? System of interlinked Hypertext documents Text, Images, Videos, and other multimedia documents navigate
Penetration Testing Workshop
Penetration Testing Workshop Who are we? Carter Poe Nathan Ritchey Mahdi Shapouri Fred Araujo Outline Ethical hacking What is penetration testing? Planning Reconnaissance Footprinting Network Endpoint
Web Intrusion Detection with ModSecurity. Ivan Ristic <[email protected]>
Web Intrusion Detection with ModSecurity Ivan Ristic Aim of This Talk Discuss the state of Web Intrusion Detection Introduce ModSecurity Introduce an open source web application
Webapps Vulnerability Report
Tuesday, May 1, 2012 Webapps Vulnerability Report Introduction This report provides detailed information of every vulnerability that was found and successfully exploited by CORE Impact Professional during
FINAL DoIT 11.03.2015 - v.4 PAYMENT CARD INDUSTRY DATA SECURITY STANDARDS APPLICATION DEVELOPMENT AND MAINTENANCE PROCEDURES
Purpose: The Department of Information Technology (DoIT) is committed to developing secure applications. DoIT s System Development Methodology (SDM) and Application Development requirements ensure that
ModSecurity The Open Source Web Application Firewall
OWASP AppSec NYC 2008 ModSecurity The Open Source Web Application Firewall Ivan Ristić Vice President, Security Research Breach Security 1/46 Introduction Ivan Ristić Web application security and web application
3. Broken Account and Session Management. 4. Cross-Site Scripting (XSS) Flaws. Web browsers execute code sent from websites. Account Management
What is an? s Ten Most Critical Web Application Security Vulnerabilities Anthony LAI, CISSP, CISA Chapter Leader (Hong Kong) [email protected] Open Web Application Security Project http://www.owasp.org
Application Firewall Overview. Published: February 2007 For the latest information, please see http://www.microsoft.com/iag
Application Firewall Overview Published: February 2007 For the latest information, please see http://www.microsoft.com/iag Contents IAG Application Firewall: An Overview... 1 Features and Benefits... 2
Where every interaction matters.
Where every interaction matters. Peer 1 Vigilant Web Application Firewall Powered by Alert Logic The Open Web Application Security Project (OWASP) Top Ten Web Security Risks and Countermeasures White Paper
Course Descriptions November 2014
Master of Science In Information Security Management Course Descriptions November 2014 Master of Science in Information Security Management The Master of Science in Information Security Management (MSISM)
Java Web Application Security
Java Web Application Security RJUG Nov 11, 2003 Durkee Consulting www.rd1.net 1 Ralph Durkee SANS Certified Mentor/Instructor SANS GIAC Network Security and Software Development Consulting Durkee Consulting
Web Application Gateway
Présentation OSSIR - 14/09/2004 Nicolas Dirand Directeur R&D [email protected] Eric Battistoni C.T.O. [email protected] Web Application Gateway Introducing Bee Ware History Strong Business Model
Web Application Security
E-SPIN PROFESSIONAL BOOK Vulnerability Management Web Application Security ALL THE PRACTICAL KNOW HOW AND HOW TO RELATED TO THE SUBJECT MATTERS. COMBATING THE WEB VULNERABILITY THREAT Editor s Summary
Basic & Advanced Administration for Citrix NetScaler 9.2
Basic & Advanced Administration for Citrix NetScaler 9.2 Day One Introducing and deploying Citrix NetScaler Key - Brief Introduction to the NetScaler system Planning a NetScaler deployment Deployment scenarios
Web Application Threats and Vulnerabilities Web Server Hacking and Web Application Vulnerability
Web Application Threats and Vulnerabilities Web Server Hacking and Web Application Vulnerability WWW Based upon HTTP and HTML Runs in TCP s application layer Runs on top of the Internet Used to exchange
LAMP Secure Web Hosting. A.J. Newmaster & Matt Payne 8/10/2005
LAMP Secure Web Hosting A.J. Newmaster & Matt Payne 8/10/2005 How do I lock down my server? & ModSecurity is an open source intrusion detection and prevention engine for web applications. Operating as
NSFOCUS Web Application Firewall White Paper
White Paper NSFOCUS Web Application Firewall White Paper By NSFOCUS White Paper - 2014 NSFOCUS NSFOCUS is the trademark of NSFOCUS Information Technology Co., Ltd. NSFOCUS enjoys all copyrights with respect
WEB APPLICATION FIREWALLS: DO WE NEED THEM?
DISTRIBUTING EMERGING TECHNOLOGIES, REGION-WIDE WEB APPLICATION FIREWALLS: DO WE NEED THEM? SHAIKH SURMED Sr. Solutions Engineer [email protected] www.fvc.com HAVE YOU BEEN HACKED????? WHAT IS THE PROBLEM?
Web Application Security
Web Application Security Prof. Sukumar Nandi Indian Institute of Technology Guwahati Agenda Web Application basics Web Network Security Web Host Security Web Application Security Best Practices Questions?
Web Application Security
Web Application Security Ng Wee Kai Senior Security Consultant PulseSecure Pte Ltd About PulseSecure IT Security Consulting Company Part of Consortium in IDA (T) 606 Term Tender Cover most of the IT Security
Evading Infrastructure Security Mohamed Bedewi Penetration Testing Consultant
Evading Infrastructure Security Mohamed Bedewi Penetration Testing Consultant What infrastructure security really means? Infrastructure Security is Making sure that your system services are always running
Adobe Systems Incorporated
Adobe Connect 9.2 Page 1 of 8 Adobe Systems Incorporated Adobe Connect 9.2 Hosted Solution June 20 th 2014 Adobe Connect 9.2 Page 2 of 8 Table of Contents Engagement Overview... 3 About Connect 9.2...
Client vs. Server Implementations of Mitigating XSS Security Threats on Web Applications
Journal of Basic and Applied Engineering Research pp. 50-54 Krishi Sanskriti Publications http://www.krishisanskriti.org/jbaer.html Client vs. Server Implementations of Mitigating XSS Security Threats
Attack Vector Detail Report Atlassian
Attack Vector Detail Report Atlassian Report As Of Tuesday, March 24, 2015 Prepared By Report Description Notes [email protected] The Attack Vector Details report provides details of vulnerability
Information Security Engineering
Master of Science In Information Security Engineering Course Descriptions November 2014 Master of Science in Information Security Engineering The program of study for the Master of Science in Information
VoIP LAB. 陳 懷 恩 博 士 助 理 教 授 兼 所 長 國 立 宜 蘭 大 學 資 訊 工 程 研 究 所 Email: [email protected] TEL: 03-9357400 # 255
SIP Traversal over NAT 陳 懷 恩 博 士 助 理 教 授 兼 所 長 國 立 宜 蘭 大 學 資 訊 工 程 研 究 所 Email: [email protected] TEL: 03-9357400 # 255 Outline Introduction to SIP and NAT NAT Problem Definition NAT Solutions on NTP VoIP
THE ROLE OF IDS & ADS IN NETWORK SECURITY
THE ROLE OF IDS & ADS IN NETWORK SECURITY The Role of IDS & ADS in Network Security When it comes to security, most networks today are like an egg: hard on the outside, gooey in the middle. Once a hacker
WIRIS quizzes web services Getting started with PHP and Java
WIRIS quizzes web services Getting started with PHP and Java Document Release: 1.3 2011 march, Maths for More www.wiris.com Summary This document provides client examples for PHP and Java. Contents WIRIS
SECURING APACHE : THE BASICS - III
SECURING APACHE : THE BASICS - III Securing your applications learn how break-ins occur Shown in Figure 2 is a typical client-server Web architecture, which also indicates various attack vectors, or ways
CCM 4350 Week 11. Security Architecture and Engineering. Guest Lecturer: Mr Louis Slabbert School of Science and Technology.
CCM 4350 Week 11 Security Architecture and Engineering Guest Lecturer: Mr Louis Slabbert School of Science and Technology CCM4350_CNSec 1 Web Server Security The Web is the most visible part of the net
April 23, 2015 ACME Company. Security Assessment Report
April 23, 2015 ACME Company Security Assessment Report 1 Contents Contents... 1 Executive Summary... 2 Project Scope... 3 Network Vulnerabilities... 4 Open Ports... 5 Web Application Vulnerabilities...
Securing your Apache Tomcat installation. Tim Funk November 2009
Securing your Apache Tomcat installation Tim Funk November 2009 Who am I? Tomcat committer for over 7 years Day job: programmer at Armstrong World Industries. Why? function search() { var q = document.search.q.value.split(/\w+/);
Usage of Evaluate Client Certificate with SSL support in Mediator and CentraSite
Usage of Evaluate Client Certificate with SSL support in Mediator and CentraSite Introduction Pre-requisite Configuration Configure keystore and truststore Asset Creation and Deployment Troubleshooting
What is Web Security? Motivation
[email protected] http://www.brucker.ch/ Information Security ETH Zürich Zürich, Switzerland Information Security Fundamentals March 23, 2004 The End Users View The Server Providers View What is Web
Second-generation (GenII) honeypots
Second-generation (GenII) honeypots Bojan Zdrnja CompSci 725, University of Auckland, Oct 2004. [email protected] Abstract Honeypots are security resources which trap malicious activities, so they
Web Application Firewall Technology Insight OWASP 22/2-2007. The OWASP Foundation. Joakim Sandström Role: OWASP Prospect. http://www.owasp.
Web Application Firewall Technology Insight Joakim Sandström Role: Prospect 22/2-2007 Copyright The Foundation Permission is granted to copy, distribute and/or modify this document under the terms of the
Making Database Security an IT Security Priority
Sponsored by Oracle Making Database Security an IT Security Priority A SANS Whitepaper November 2009 Written by Tanya Baccam Security Strategy Overview Why a Database Security Strategy? Making Databases
COMP 112 Assignment 1: HTTP Servers
COMP 112 Assignment 1: HTTP Servers Lead TA: Jim Mao Based on an assignment from Alva Couch Tufts University Due 11:59 PM September 24, 2015 Introduction In this assignment, you will write a web server
Web application security Executive brief Managing a growing threat: an executive s guide to Web application security.
Web application security Executive brief Managing a growing threat: an executive s guide to Web application security. Danny Allan, strategic research analyst, IBM Software Group Contents 2 Introduction
WEB APPLICATION FIREWALL
WEB APPLICATION FIREWALL Sdn. Bhd. (1015448-T) A-5-10 Empire Tower SS16/1, Subang Jaya 47500, Selangor, Malaysia. Tel : +603 5021 8290 Fax : +603 5021 8291 Email : [email protected] Web: http://www.kaapagamtech.com
Cross-Site Scripting
Cross-Site Scripting (XSS) Computer and Network Security Seminar Fabrice Bodmer ([email protected]) UNIFR - Winter Semester 2006-2007 XSS: Table of contents What is Cross-Site Scripting (XSS)? Some
THE SMARTEST WAY TO PROTECT WEBSITES AND WEB APPS FROM ATTACKS
THE SMARTEST WAY TO PROTECT WEBSITES AND WEB APPS FROM ATTACKS INCONVENIENT STATISTICS 70% of ALL threats are at the Web application layer. Gartner 73% of organizations have been hacked in the past two
Cisco IPS Tuning Overview
Cisco IPS Tuning Overview Overview Increasingly sophisticated attacks on business networks can impede business productivity, obstruct access to applications and resources, and significantly disrupt communications.
SAST, DAST and Vulnerability Assessments, 1+1+1 = 4
SAST, DAST and Vulnerability Assessments, 1+1+1 = 4 Gordon MacKay Digital Defense, Inc. Chris Wysopal Veracode Session ID: Session Classification: ASEC-W25 Intermediate AGENDA Risk Management Challenges
[state of the internet] / SEO Attacks. Threat Advisory: Continuous Uptick in SEO Attacks
TLP: GREEN Issue Date: 1.12.16 Threat Advisory: Continuous Uptick in SEO Attacks Risk Factor High The Akamai Threat Research Team has identified a highly sophisticated Search Engine Optimization (SEO)
The New PCI Requirement: Application Firewall vs. Code Review
The New PCI Requirement: Application Firewall vs. Code Review The Imperva SecureSphere Web Application Firewall meets the new PCI requirement for an application layer firewall. With the highest security
Penetration Testing Corporate Collaboration Portals. Giorgio Fedon, Co-Founder at Minded Security
Penetration Testing Corporate Collaboration Portals Giorgio Fedon, Co-Founder at Minded Security Something About Me Security Researcher Owasp Italy Member Web Application Security and Malware Research
Securing Your Web Application against security vulnerabilities. Ong Khai Wei, IT Specialist, Development Tools (Rational) IBM Software Group
Securing Your Web Application against security vulnerabilities Ong Khai Wei, IT Specialist, Development Tools (Rational) IBM Software Group Agenda Security Landscape Vulnerability Analysis Automated Vulnerability
SQL Injection Attacks: Detection in a Web Application Environment
SQL Injection Attacks: Detection in a Web Application Environment Table of Contents 1 Foreword... 1 2 Background... 3 2.1 Web Application Environment... 3 2.2 SQL Attack Overview... 3 2.3 Applications
B database Security - A Case Study
WHITE PAPER: ENTERPRISE SECURITY Strengthening Database Security White Paper: Enterprise Security Strengthening Database Security Contents Introduction........................................................................4
Threat Modeling. A workshop on how to create threat models by creating a hands-on example
Threat Modeling A workshop on how to create threat models by creating a hands-on example Introduction 2 Introduction 3 Part 1: Application- Layer Attacks A brief primer on some web application attacks
Security Advisory. Some IPS systems can be easily fingerprinted using simple techniques.
Some IPS systems can be easily fingered using simple techniques. The unintentional disclosure of which security devices are deployed within your defences could put your network at significant risk. Security
Cyber Defense Operations Graduate Certificate
The SANS Technology Institute makes shorter groups of courses available to students who are unable to commit to a full master s degree program. These certificate programs will augment your skills, provide
Web Application Penetration Testing
Web Application Penetration Testing 2010 2010 AT&T Intellectual Property. All rights reserved. AT&T and the AT&T logo are trademarks of AT&T Intellectual Property. Will Bechtel [email protected]
Exploiting Web 2.0 Next Generation Vulnerabilities
Exploiting Web 2.0 Next Generation Vulnerabilities OWASP EU09 Poland Shreeraj Shah Chapter Lead Founder & Director Blueinfy Solutions [email protected] Copyright The OWASP Foundation Permission is
A Tale of the Weaknesses of Current Client-Side XSS Filtering
Call To Arms: A Tale of the Weaknesses of Current Client-Side XSS Filtering Martin Johns, Ben Stock, Sebastian Lekies About us Martin Johns, Ben Stock, Sebastian Lekies Security Researchers at SAP, Uni
Network Security: 30 Questions Every Manager Should Ask. Author: Dr. Eric Cole Chief Security Strategist Secure Anchor Consulting
Network Security: 30 Questions Every Manager Should Ask Author: Dr. Eric Cole Chief Security Strategist Secure Anchor Consulting Network Security: 30 Questions Every Manager/Executive Must Answer in Order
State of Web Application Security. Ralph Durkee Durkee Consulting, Inc. Rochester ISSA & OWASP Chapters [email protected]
Ralph Durkee Durkee Consulting, Inc. Rochester ISSA & OWASP Chapters [email protected] Ralph Durkee Founder of Durkee Consulting since 1996 Founder of Rochester OWASP since 2004 President of Rochester ISSA chapter
1 Recommended Readings. 2 Resources Required. 3 Compiling and Running on Linux
CSC 482/582 Assignment #2 Securing SimpleWebServer Due: September 29, 2015 The goal of this assignment is to learn how to validate input securely. To this purpose, students will add a feature to upload
IS TEST 3 - TIPS FOUR (4) levels of detective controls offered by intrusion detection system (IDS) methodologies. First layer is typically responsible for monitoring the network and network devices. NIDS
EC-Council CAST CENTER FOR ADVANCED SECURITY TRAINING. CAST 619 Advanced SQLi Attacks and Countermeasures. Make The Difference CAST.
CENTER FOR ADVANCED SECURITY TRAINING 619 Advanced SQLi Attacks and Countermeasures Make The Difference About Center of Advanced Security Training () The rapidly evolving information security landscape
Web applications. Web security: web basics. HTTP requests. URLs. GET request. Myrto Arapinis School of Informatics University of Edinburgh
Web applications Web security: web basics Myrto Arapinis School of Informatics University of Edinburgh HTTP March 19, 2015 Client Server Database (HTML, JavaScript) (PHP) (SQL) 1 / 24 2 / 24 URLs HTTP
INTRUSION DETECTION AND PREVENTION SYSTEM: CGI ATTACKS. A Thesis. Presented to. The Faculty of the Department of Computer Science
INTRUSION DETECTION AND PREVENTION SYSTEM: CGI ATTACKS A Thesis Presented to The Faculty of the Department of Computer Science San José State University In Partial Fulfillment of the Requirements for the
WEB SERVICES VULNERABILITIES
WEB SERVICES VULNERABILITIES A white paper outlining the application-level threats to web services Prepared By: Date: February 15, 2007 Nishchal Bhalla Sahba Kazerooni Abstract Security has become the
Hardening Joomla 1. HARDENING PHP. 1.1 Installing Suhosin. 1.2 Disable Remote Includes. 1.3 Disable Unneeded Functions & Classes
1. HARDENING PHP Hardening Joomla 1.1 Installing Suhosin Suhosin is a PHP Hardening patch which aims to protect the PHP engine and runtime environment from common exploits, such as buffer overflows in
Security Threat Kill Chain What log data would you need to identify an APT and perform forensic analysis?
Security Threat Kill Chain What log data would you need to identify an APT and perform forensic analysis? This paper presents a scenario in which an attacker attempts to hack into the internal network
Hack Yourself First. Troy Hunt @troyhunt troyhunt.com [email protected]
Hack Yourself First Troy Hunt @troyhunt troyhunt.com [email protected] We re gonna turn you into lean, mean hacking machines! Because if we don t, these kids are going to hack you Jake Davies, 19 (and
CS 558 Internet Systems and Technologies
CS 558 Internet Systems and Technologies Dimitris Deyannis [email protected] 881 Heat seeking Honeypots: Design and Experience Abstract Compromised Web servers are used to perform many malicious activities.
Ethical Hacking as a Professional Penetration Testing Technique
Ethical Hacking as a Professional Penetration Testing Technique Rochester ISSA Chapter Rochester OWASP Chapter - Durkee Consulting, Inc. [email protected] 2 Background Founder of Durkee Consulting since 1996
International Journal of Enterprise Computing and Business Systems ISSN (Online) : 2230-8849
WINDOWS-BASED APPLICATION AWARE NETWORK INTERCEPTOR Ms. Shalvi Dave [1], Mr. Jimit Mahadevia [2], Prof. Bhushan Trivedi [3] [1] Asst.Prof., MCA Department, IITE, Ahmedabad, INDIA [2] Chief Architect, Elitecore
Strategic Information Security. Attacking and Defending Web Services
Security PS Strategic Information Security. Attacking and Defending Web Services Presented By: David W. Green, CISSP [email protected] Introduction About Security PS Application Security Assessments
Importance of Web Application Firewall Technology for Protecting Web-based Resources
Importance of Web Application Firewall Technology for Protecting Web-based Resources By Andrew J. Hacker, CISSP, ISSAP Senior Security Analyst, ICSA Labs January 10, 2008 ICSA Labs 1000 Bent Creek Blvd.,
