Security DevOps. staying secure in agile projects. Christian
|
|
|
- August Gray
- 9 years ago
- Views:
Transcription
1 Security DevOps staying secure in agile projects Christian
2 `whoami` www. Christian-Schneider.net» Software Developer, Whitehat Hacker & Trainer» Freelancer since 1997» Focus on JavaEE & Web Security» Speaker at
3 Why Security DevOps?» Keep up with rollout pace in agile projects» Automate certain checks as best as possible within the build-chain» Early feedback to Devs» Does not remove the pentest requirement!» Aims to free pentesters time to hunt more high-hanging bugs
4 Different levels of "Security DevOps" integration» Security DevOps Maturity Model (SDOMM)» Can be seen as some automation tips within OpenSAMM s security practices» Verification: Security Testing» Verification: Code Reviews» Allows to define a RoadMap for projects implementing Security DevOps
5 what levels will we cover? implicit four axes each with four belts as incremental steps master
6 Four different axes Dynamic Depth Consolidation Intensity Static Depth
7 Four different axes Dynamic Depth Consolidation Intensity Static Depth
8 This talk covers two of them Dynamic Depth Consolidation Intensity Static Depth
9 Let s explore these axes» by showing how to implement this with OpenSource solutions used in the Security & Development domains.
10 Axis of "Dynamic Depth" How deep are dynamic scans executed within a Security DevOps CI chain? i.e. "where" are dynamic security tests applied?
11 Axis "Dynamic Depth": Level 1 Scanning of public attack surface (pre-auth): Spidering of UI layer No requirement to authenticate scanner with target Easy integration of scanner(s) in nightly build as post-step "Throw tool at it (in CI-chain) and see what it generates "
12 ZAP in SecDevOps? "OWASP ZAP" features relevant for Security DevOps integration: Passive & active scanning Headless operation mode / daemon REST-API (with several language bindings as pre-built clients) Scriptable CLI
13 ZAP + Jenkins = SecDevOps? "OWASP ZAP" (spider & scanner) + Jenkins plugin "ZAProxy" Allows us to "Spider & Scan" as step in build job via Jenkins plugin Point plugin config to URL of integration system to test Plugin saves HTML-report in project s job for inspection Best as separate Jenkins job to run during nightly build (duration) Use different ZAP proxy ports for different builds to allow parallel execution of different project build jobs
14 Jenkins Plugin "ZAProxy": ZAP Startup
15 Jenkins Plugin "ZAProxy": ZAP Scan
16 Arachni in SecDevOps? "Arachni Scanner" features relevant for Security DevOps integration: Passive & active scanning (Proxy / Spider) Uses internally a headless browser-cluster (for apps with lots of JS) Automation? CLI + RPC API Web-UI (helpful when permanently running as server)
17 Arachni + Jenkins = SecDevOps? "Arachni Scanner" + Jenkins CLI step in build Start in build job as CLI step and point to URL of system under test Generate HTML report and place into workspace for inspection Better execute within nightly build job (due to duration)
18 BDD-Security in SecDevOps? BDD-based framework for functional and technical security tests: Technical security tests (i.e. check against XSS, SQL-Injection, XXE, etc.) uses ZAP as scanning engine (among others) Functional security tests (i.e. check UserA can t access data from UserB) Tightly integrates with Selenium based app navigation workflows Uses JBehave for G/W/T stories & reporting Can run within CI (Jenkins, etc.) due to JBehave or as JUnit tests
19 BDD-Security Story: Scan for XSS
20 Gauntlt in SecDevOps? BDD-based framework for executing many security tools/scanners: Integrates scanners like Arachni, ZAP, sqlmap, etc. Easy to integrate "your custom scanner tool" with Gauntlt as well Allows to call different scan polices via BDD-stories (G/W/T) Integration with Jenkins (or other build servers) by either Linking Gauntlt s HTML report to build, or by modifying how Gauntlt calls Cucumber to produce JUnit output
21 Axis "Dynamic Depth": Level 2 Scanning of authenticated parts (= "post-auth") via UI layer Properly maintaining sessions Different users / roles Spider & scan post-auth Logout-detection & automatic re-login Handling of hardening measures of application under test CSRF-Tokens, etc.
22 Guide ZAP into Post-Auth in CI Use ZAP manually (1x) to configure "Context": Auth, RegExps for Logged-In/ Out Indicators, Users etc. + save as "ZAP Session-File" (could be in code repo) use that "Session-File" from code repo as starting point of scan (loaded as ZAP session during build job). Note: Current version of ZAP has a bugfix pending for loading creds from session file One can set these auth values and/or additional data via ZAP s REST-API during each build before scan starts (from Jenkins/Maven/ ) use that to define current active session etc. during scan Also Scripts in JavaScript or Zest can be registered in ZAP context to programmatically give authentication to ZAP
23 Login config example within ZAP
24 ZAProxy Jenkins Plugin: ZAP session use
25 Guide Arachni into Post-Auth Give authentication infos to Arachni (Auth, Logged-In Indicators, Users) Use Arachni "autologin" plugin to specify via command line Login URL, formfield names, credentials, logged-in indicator, excludes Alternatively write custom ruby script for "login_script" plugin Individual custom login logic possible Logged-In indicators (RegExp) to know when to re-login
26 Login config example within Arachni (used in CI)./arachni --plugin=autologin: url= parameters='j_username=foo&j_password=bar', check='logout' --scope-exclude-pattern=logout.action Eventually also --session-check-url & --session-check-pattern Or individual ruby script if more custom login logic required
27 Guide BDD-Security into Post-Auth Use Selenium to navigate through the login process Based on excellent integration of BDD-Security with Selenium Separate app navigation code (Selenium) from Security testing code Use Selenium class (that handles login) within BDD stories Perform further spidering & active scanning (through ZAP) post-auth
28 public class ShopApplicationScanHelper extends WebApplication implements ILogin { //... integrates with BDD-Security via parent class & interface... }
29 public class ShopApplicationScanHelper extends WebApplication implements ILogin public void openloginpage() { public void login(credentials credentials) { public boolean isloggedin(string role) { }
30 public class ShopApplicationScanHelper extends WebApplication implements ILogin public void openloginpage() { driver.get(config.getinstance().getbaseurl() + "customer/login"); verifytextpresent("login"); public void login(credentials credentials) { UserPassCredentials creds = new UserPassCredentials(credentials); driver.findelement(by.id("username")).clear(); driver.findelement(by.id("username")).sendkeys(creds.getusername()); driver.findelement(by.id("password")).clear(); driver.findelement(by.id("password")).sendkeys(creds.getpassword()); driver.findelement(by.name("_action_login")).click(); public boolean isloggedin(string role) { if (driver.getpagesource().contains("my Account")) { return true; } else { return false; }
31 Axis "Dynamic Depth": Level 3 Separate scanning of different application layers / backends Scan internal WebServices (e.g. SOAP / REST) = directly scan backends Detect and scan parameter positions within XML, JSON, Scan from "within" the different application s layers IAST with distributed agents & instrumentation aims into that direction At least one simple step in that direction: Use the proxy also between your backend service calls
32 Backend scans with ZAP How to achieve this with ZAP? ZAP operates as proxy server: place it between backend calls ZAP can inject payloads in observed XML tags/attributes & JSON fields Capture service call traffic in integration test during CI while either A. executing service tests that directly access the service endpoint, or B. frontend UI tests execute service backend calls indirectly Automatically scan as new requests are seen: "ATTACK Mode" Also keep an eye on an alpha-level SOAP-Scanner ZAP addon
33 Backend scans with Arachni How to achieve this with Arachni? Arachni can also operate as proxy: place it between backend calls Use passive proxy plugin to "train" Arachni of the XML / JSON requests New addition in v1.1 to extract XML / JSON input vectors from it Use that collected input vector data to feed the active scan for the observed requests
34 Axis "Dynamic Depth": Level 4 Targeted scanning of individual forms / wizards (UI) and service layers More individualised workflow coverage (not just simple spidering) Business-logic compliant usage patterns & inputs "fill shopping cart followed by checkout process" "access backend WebServices in special order to test workflow", etc. Custom coded security tests tailored to the application
35 ZAP with special workflows (1/3) Many ways exist The simplest one could be: Re-use existing UI tests (Selenium, ) Proxy this traffic through ZAP in "ATTACK-Mode" (in security test phase of build) Optionally use ZAP Attack-Policies to specify/limit certain attack types
36 ZAP with special workflows (2/3) A more customised handling of individual workflows can be achieved: Re-use & enhance existing "UI test code" at the desired workflow steps with calls to ZAP s (REST)-API ordering attacks Basically it s like Unit-Test code that uses Selenium along with with ZAP-Calls at the proper positions in application workflow Type of "ordered attacks" can again be defined via policies Start ZAP as Daemon from Jenkins via plugin
37 public class ShopApplicationTest { // = regular JUnit unit public void setup() { public void testshippingaddressstep() { } public void testbillingaddressstep() { }
38 public class ShopApplicationTest { // = regular JUnit unit public void setup() { // 1. start new proxy session in running ZAP (via REST-API call) // 2. create Selenium driver (proxying through running ZAP) public void testshippingaddressstep() { } public void testbillingaddressstep() { }
39 public class ShopApplicationTest { // = regular JUnit unit public void setup() { // 1. start new proxy session in running ZAP (via REST-API call) // 2. create Selenium driver (proxying through running ZAP) public void testshippingaddressstep() { // 1. use Selenium to fill shopping cart // 2. use Selenium to proceed to checkout // 3. use Selenium to provide reasonable shipping address data } public void testbillingaddressstep() { }
40 public class ShopApplicationTest { // = regular JUnit unit test public void setup() { // 1. start new proxy session in running ZAP (via REST-API call) // 2. create Selenium driver (proxying through running ZAP) public void testshippingaddressstep() { // 1. use Selenium to fill shopping cart // 2. use Selenium to proceed to checkout // 3. use Selenium to provide reasonable shipping address data // 4. set attack policy (types & strength) in running ZAP (API) /* 5. call ZAP (API) to actively scan the last seen URL (optionally define parameter excludes via API or ZAP "input vector scripts" if custom input format) */ public void testbillingaddressstep() { }
41 public class ShopApplicationTest { // = regular JUnit unit test public void setup() { // 1. start new proxy session in running ZAP (via REST-API call) // 2. create Selenium driver (proxying through running ZAP) public void testshippingaddressstep() { // 1. use Selenium to fill shopping cart // 2. use Selenium to proceed to checkout // 3. use Selenium to provide reasonable shipping address data // 4. set attack policy (types & strength) in running ZAP (API) /* 5. call ZAP (API) to actively scan the last seen URL (optionally define parameter excludes via API or ZAP "input vector scripts" if custom input format) */ public void testbillingaddressstep() { // same idea as above... just continue with the pattern } See for a great working example of Selenium ZAP integration
42 ZAP with special workflows (3/3) Alternatively "train" ZAP about the workflow by recording Zest scripts Keep an eye on "Sequence Scanning" alpha-level ZAP addon Still alpha-level (as of May 2015), but interesting approach
43 BDD with special workflows Use Selenium to further drive BDD-Security initiated checks: Selenium-based test code navigates application workflows This code is integrated with BDD (via Java interfaces), so that: BDD-Security stories can use that code to navigate and generate traffic This generated traffic will be scanned by ZAP via BDD
44 If no Selenium test code exists? Simply give developer teams access to ZAP to (at least) pre-seed the scanner: Developer teams use browser to navigate app workflows while proxying Thereby seed the ZAP session(s) with navigation nodes/workflows Save the ZAP session(s) and check-in into SCM (Git, SVN, ) Point the Jenkins ZAP plugin to the saved ZAP session(s) as starting point Devs can add to this list of URLs for ZAP with each new UI BTW: ZAP is also available as Docker image
45 Axis of "Static Depth" How deep is static code analysis performed within a Security DevOps CI chain? i.e. "where" are static security tests applied?
46 Axis of "Intensity" How intense are the majority of the executed attacks within a Security DevOps CI chain? i.e. "what" is being checked for?
47 Axis of "Consolidation" How complete is the process of handling findings within a Security DevOps CI chain? i.e. "how" are the results used?
48 Axis "Consolidation": Level 1 Generate human-readable (HTML) reports from tools and link them in Jenkins All relevant mentioned static and dynamic scanners generate HTML reports Collect and publish them in Jenkins build: via Jenkins "HTML Publisher Plugin" Use simple criteria to "break the build" on heavy findings (ok, at least "unstable") Dependency-Check, BDD-Security (with the JBehave-stories), FindSecurityBugs (via Sonar when rated as blocker), Arachni (via Gauntlt execution with BDDlike stories), etc. all have capabilities to automatically flag the build For others: at least do a simple log parse from Jenkins "Log Parser Plugin" to flag the build as unstable and/or broken
49 Jenkins "HTML Publisher Plugin": Configuration of HTML reports to link
50 Jenkins "HTML Publisher Plugin": Result in build
51 Axis "Consolidation": Level 2 Custom logic to make build unstable and/or broken depending on Type of vulnerability (CWE or WASC or ) Confidence level (firm vs. tentative) Severity ranking (high risk) Provide useful remediation info to developers Respect suppression mechanisms to rule out false positives
52 Flagging builds from reports How (from within a CI job)? Most scanners also emit XML reports that can be parsed Often a simple XPath count is just fine Alternatively fetch the results by accessing the scanner s API Be sure to only break build with (new?) findings of high severity and high confidence!!! Less is more (when it comes to automation)
53 Axis "Consolidation": Level 3 Consolidation goals: Consolidate & de-duplicate findings from different scanner reports (with better false positive handling) Push consolidated findings into established bug-tracker (known to devs) Delta analysis & trends over consolidated data sets
54 ThreadFix as result consolidator Use a local ThreadFix server, which imports native scanner outputs does the heavy lifting of consolidation & de-duplication pushes findings toward bug-tracker and IDE (via plugins) process can be customised using it s own REST-API ThreadFix imports findings of ZAP, Arachni, FindBugs, Brakeman, etc.
55 Axis "Consolidation": Level 4 Measure the concrete code coverage of your security testing activities Find untested "white spots" Derive where static checks and code reviews should focus more to compensate
56 Code coverage analysis Use "OWASP Code Pulse", which instruments your Java app via agent collects coverage data during dynamic security testing scans generates reports ("code treemaps") of coverage
57 Code Treemap of dynamic scan coverage Bildquelle: OWASP Code Pulse
58 Thank you very much!
59 Links OWASP ZAP ZAP Selenium Demo ZAP Jenkins Plugin BDD-Security Arachni OWASP Dependency Check OWASP Dependency Track FindSecurityBugs FindSecurityBugs-Cloud retire.js ScanJS Jenkins Log Parser Plugin ThreadFix OWASP Code Pulse Seccubus vulndb fuzzdb radamsa Interested in more web security stuff? Visit my Blog: Bildquelle:
BDD FOR AUTOMATING WEB APPLICATION TESTING. Stephen de Vries
BDD FOR AUTOMATING WEB APPLICATION TESTING Stephen de Vries www.continuumsecurity.net INTRODUCTION Security Testing of web applications, both in the form of automated scanning and manual security assessment
How To Protect Your Data From Attack
Integrating Vulnerability Scanning into the SDLC Eric Johnson JavaOne Conference 10/26/2015 1 Eric Johnson (@emjohn20) Senior Security Consultant Certified SANS Instructor Certifications CISSP, GWAPT,
Bust a cap in a web app with OWASP ZAP
The OWASP Foundation http://www.owasp.org Bust a cap in a web app with OWASP ZAP Adrien de Beaupré GSEC, GCIH, GPEN, GWAPT, GCIA, GXPN ZAP Evangelist Intru-Shun.ca Inc. SANS Instructor, Penetration Tester,
HP WebInspect Tutorial
HP WebInspect Tutorial Introduction: With the exponential increase in internet usage, companies around the world are now obsessed about having a web application of their own which would provide all the
Security Automation in Agile SDLC Real World Cases
Security Automation in Agile SDLC Real World Cases Ofer Maor Director of Security Strategy, Synopsys AppSec California, January 2016 Speaker Security Strategy at Synopsys Founder of Seeker / Pioneer of
Security Testing for Developers using OWASP ZAP
JavaOne San Fransisco 2014 The OWASP Foundation http://www.owasp.org Security Testing for Developers using OWASP ZAP Simon Bennetts OWASP ZAP Project Lead Mozilla Security Team [email protected] Copyright
Conducting Web Application Pentests. From Scoping to Report For Education Purposes Only
Conducting Web Application Pentests From Scoping to Report For Education Purposes Only Web App Pen Tests According to OWASP: A Web Application Penetration Test focuses only on evaluating the security of
Pentests more than just using the proper tools
Pentests more than just using the proper tools Agenda 1. Information Security @ TÜV Rheinland 2. Penetration testing Introduction Evaluation scheme Security Analyses of web applications Internal Security
Hybrid Analysis Mapping: Making Security and Development Tools Play Nice Together. Dan Cornell. CTO, Denim Group@danielcornell
Hybrid Analysis Mapping: Making Security and Development Tools Play Nice Together Dan Cornell CTO, Denim Group@danielcornell This presentation contains information about DHS-funded research: Topic Number:
HackMiami Web Application Scanner 2013 PwnOff
HackMiami Web Application Scanner 2013 PwnOff An Analysis of Automated Web Application Scanning Suites James Ball, Alexander Heid, Rod Soto http://www.hackmiami.org Overview Web application scanning suites
Build Automation for Mobile. or How to Deliver Quality Apps Continuously. Angelo Rüggeberg
Build Automation for Mobile or How to Deliver Quality Apps Continuously Angelo Rüggeberg Things to remember Publishing your App should not be painfull Angelo Rüggeberg Code Quality Matters Angelo Rüggeberg
Web Application Penetration Testing
Web Application Penetration Testing 2010 2010 AT&T Intellectual Property. All rights reserved. AT&T and the AT&T logo are trademarks of AT&T Intellectual Property. Will Bechtel [email protected]
Integrating Web Application Security into the IT Curriculum
Integrating Web Application Security into the IT Curriculum James Walden Northern Kentucky University Topics 1. 2. 3. 4. Why should we teach web application security? What material do we need to cover?
Continuous Integration
Continuous Integration WITH FITNESSE AND SELENIUM By Brian Kitchener [email protected] Intro Who am I? Overview Continuous Integration The Tools Selenium Overview Fitnesse Overview Data Dependence My
MarkLogic Server. Reference Application Architecture Guide. MarkLogic 8 February, 2015. Copyright 2015 MarkLogic Corporation. All rights reserved.
Reference Application Architecture Guide 1 MarkLogic 8 February, 2015 Last Revised: 8.0-1, February, 2015 Copyright 2015 MarkLogic Corporation. All rights reserved. Table of Contents Table of Contents
Agile Web Application Testing
Agile Web Application Testing Technologies and Solutions V. Narayan Raman Tyto Software Goals Rapid feedback on the quality of software Problem in Web App Testing Many Browsers Many Operating Systems Browsers
HackPra. Burp Pro: Real-life tips & tricks
HackPra Burp Pro: Real-life tips & tricks Hamburg 22.08.2013 Nicolas Grégoire Me & Myself Founder & owner of Agarri Lot of Web PenTests NOT affiliated with PortSwigger Ltd Using Burp Suite for years And
Progressive Enhancement With GQuery and GWT. Ray Cromwell [email protected]
Progressive Enhancement With GQuery and GWT Ray Cromwell [email protected] Web Application Models Web 1.0, 1 Interaction = 1 Page Refresh Pure JS, No Navigation Away from Page Mixed Model, Page Reloads
(WAPT) Web Application Penetration Testing
(WAPT) Web Application Penetration Testing Module 0: Introduction 1. Introduction to the course. 2. How to get most out of the course 3. Resources you will need for the course 4. What is WAPT? Module 1:
Jenkins World Tour 2015 Santa Clara, CA, September 2-3
1 Jenkins World Tour 2015 Santa Clara, CA, September 2-3 Continuous Delivery with Container Ecosystem CAD @ Platform Equinix - Overview CAD Current Industry - Opportunities Monolithic to Micro Service
Pentests more than just using the proper tools
Pentests more than just using the proper tools Agenda 1. Information Security @ TÜV Rheinland 2. Security testing 3. Penetration testing Introduction Evaluation scheme Security Analyses of web applications
Continuous integration with Jenkins CI
Continuous integration with Jenkins CI Vojtěch Juránek JBoss - a division by Red Hat 17. 2. 2012, Developer conference, Brno Vojtěch Juránek (Red Hat) Continuous integration with Jenkins CI 17. 2. 2012,
Building, testing and deploying mobile apps with Jenkins & friends
Building, testing and deploying mobile apps with Jenkins & friends Christopher Orr https://chris.orr.me.uk/ This is a lightning talk which is basically described by its title, where "mobile apps" really
Windmill. Automated Testing for Web Applications
Windmill Automated Testing for Web Applications Demo! Requirements Quickly build regression tests Easily debug tests Run single test on all target browsers Easily fit in to continuous integration Other
STOPPING LAYER 7 ATTACKS with F5 ASM. Sven Müller Security Solution Architect
STOPPING LAYER 7 ATTACKS with F5 ASM Sven Müller Security Solution Architect Agenda Who is targeted How do Layer 7 attacks look like How to protect against Layer 7 attacks Building a security policy Layer
Know the Difference. Unified Functional Testing (UFT) and Lean Functional Testing (LeanFT) from HP
Know the Difference Unified Functional Testing (UFT) and Lean Functional Testing (LeanFT) from HP 1 Copyright 2015 Hewlett-Packard Development Company, L.P. The information contained herein is subject
Redpaper Axel Buecker Kenny Chow Jenny Wong
Redpaper Axel Buecker Kenny Chow Jenny Wong A Guide to Authentication Services in IBM Security Access Manager for Enterprise Single Sign-On Introduction IBM Security Access Manager for Enterprise Single
Adobe Systems Incorporated
Adobe Connect 9.2 Page 1 of 8 Adobe Systems Incorporated Adobe Connect 9.2 Hosted Solution June 20 th 2014 Adobe Connect 9.2 Page 2 of 8 Table of Contents Engagement Overview... 3 About Connect 9.2...
Improving the Adoption of Dynamic Web Security Vulnerability Scanners
Master Thesis Computing Science Improving the Adoption of Dynamic Web Security Vulnerability Scanners Author: Y.R. Smeets, BSc [email protected] Student No. 4244249 Internal supervisor: Dr. G.
EVALUATING COMMERCIAL WEB APPLICATION SECURITY. By Aaron Parke
EVALUATING COMMERCIAL WEB APPLICATION SECURITY By Aaron Parke Outline Project background What and why? Targeted sites Testing process Burp s findings Technical talk My findings and thoughts Questions Project
Security and Vulnerability Testing How critical it is?
Security and Vulnerability Testing How critical it is? It begins and ends with your willingness and drive to change the way you perform testing today Security and Vulnerability Testing - Challenges and
Penetration Testing Corporate Collaboration Portals. Giorgio Fedon, Co-Founder at Minded Security
Penetration Testing Corporate Collaboration Portals Giorgio Fedon, Co-Founder at Minded Security Something About Me Security Researcher Owasp Italy Member Web Application Security and Malware Research
OWASP Top Ten Tools and Tactics
OWASP Top Ten Tools and Tactics Russ McRee Copyright 2012 HolisticInfoSec.org SANSFIRE 2012 10 JULY Welcome Manager, Security Analytics for Microsoft Online Services Security & Compliance Writer (toolsmith),
Out of the Fire - Adding Layers of Protection When Deploying Oracle EBS to the Internet
Out of the Fire - Adding Layers of Protection When Deploying Oracle EBS to the Internet March 8, 2012 Stephen Kost Chief Technology Officer Integrigy Corporation Phil Reimann Director of Business Development
Black Box versus White Box: Different App Testing Strategies John B. Dickson, CISSP
Black Box versus White Box: Different App Testing Strategies John B. Dickson, CISSP Learning objectives for today s session Understand different types of application assessments and how they differ Be
QEx Whitepaper. Automation Testing Pillar: Selenium. Naveen Saxena. AuthOr: www.hcltech.com
www.hcltech.com QEx Whitepaper Automation Testing Pillar: Selenium Business Assurance & Testing AuthOr: Naveen Saxena Working as a Test Lead, Center of Excellence Group, with HCL Technologies. Has immense
What is Web Security? Motivation
[email protected] http://www.brucker.ch/ Information Security ETH Zürich Zürich, Switzerland Information Security Fundamentals March 23, 2004 The End Users View The Server Providers View What is Web
The Top Web Application Attacks: Are you vulnerable?
QM07 The Top Web Application Attacks: Are you vulnerable? John Burroughs, CISSP Sr Security Architect, Watchfire Solutions [email protected] Agenda Current State of Web Application Security Understanding
Automatic vs. Manual Code Analysis
Automatic vs. Manual Code Analysis 2009-11-17 Ari Kesäniemi Senior Security Architect Nixu Oy [email protected] Copyright The Foundation Permission is granted to copy, distribute and/or modify this
Integrating Security into the Application Development Process. Jerod Brennen, CISSP CTO & Principal Security Consultant, Jacadis
Integrating Security into the Application Development Process Jerod Brennen, CISSP CTO & Principal Security Consultant, Jacadis Agenda Seek First to Understand Source Code Security AppSec and SQA Analyzing
Bank Hacking Live! Ofer Maor CTO, Hacktics Ltd. ATC-4, 12 Jun 2006, 4:30PM
Bank Hacking Live! Ofer Maor CTO, Hacktics Ltd. ATC-4, 12 Jun 2006, 4:30PM Agenda Introduction to Application Hacking Demonstration of Attack Tool Common Web Application Attacks Live Bank Hacking Demonstration
Continuous Integration: Put it at the heart of your development
Continuous Integration: Put it at the heart of your development Susan Duncan Tools Product Manager, Oracle 1 Program Agenda What is CI? What Does It Mean To You? Make it Hudson Evolving Best Practice For
Sonatype CLM Enforcement Points - Continuous Integration (CI) Sonatype CLM Enforcement Points - Continuous Integration (CI)
Sonatype CLM Enforcement Points - Continuous Integration (CI) i Sonatype CLM Enforcement Points - Continuous Integration (CI) Sonatype CLM Enforcement Points - Continuous Integration (CI) ii Contents 1
Recon and Mapping Tools and Exploitation Tools in SamuraiWTF Report section Nick Robbins
Recon and Mapping Tools and Exploitation Tools in SamuraiWTF Report section Nick Robbins During initial stages of penetration testing it is essential to build a strong information foundation before you
The Web AppSec How-to: The Defenders Toolbox
The Web AppSec How-to: The Defenders Toolbox Web application security has made headline news in the past few years. Incidents such as the targeting of specific sites as a channel to distribute malware
Selenium WebDriver. Gianluca Carbone. Selenium WebDriver 1
Selenium WebDriver Gianluca Carbone Selenium WebDriver 1 Contents What is Selenium? History WebDriver High-Level Architectures Architectural themes Non Functional quality Layers & Javascript Design issues
Streamlining Application Vulnerability Management: Communication Between Development and Security Teams
Streamlining Application Vulnerability Management: Communication Between Development and Security Teams October 13, 2012 OWASP Boston Application Security Conference Agenda Introduction / Background Vulnerabilities
Certified Selenium Professional VS-1083
Certified Selenium Professional VS-1083 Certified Selenium Professional Certified Selenium Professional Certification Code VS-1083 Vskills certification for Selenium Professional assesses the candidate
BASELINE SECURITY TEST PLAN FOR EDUCATIONAL WEB AND MOBILE APPLICATIONS
BASELINE SECURITY TEST PLAN FOR EDUCATIONAL WEB AND MOBILE APPLICATIONS Published by Tony Porterfield Feb 1, 2015. Overview The intent of this test plan is to evaluate a baseline set of data security practices
SOA Solutions & Middleware Testing: White Paper
SOA Solutions & Middleware Testing: White Paper Version 1.1 (December 06, 2013) Table of Contents Introduction... 03 Solutions Testing (Beta Testing)... 03 1. Solutions Testing Methods... 03 1.1 End-to-End
Building a Continuous Integration Pipeline with Docker
Building a Continuous Integration Pipeline with Docker August 2015 Table of Contents Overview 3 Architectural Overview and Required Components 3 Architectural Components 3 Workflow 4 Environment Prerequisites
BUILDING AN OFFENSIVE SECURITY PROGRAM BUILDING AN OFFENSIVE SECURITY PROGRAM
BUILDING AN OFFENSIVE SECURITY PROGRAM Common Gaps in Security Programs Outsourcing highly skilled security resources can be cost prohibitive. Annual assessments don t provide the coverage necessary. Software
QualysGuard WAS. Getting Started Guide Version 4.1. April 24, 2015
QualysGuard WAS Getting Started Guide Version 4.1 April 24, 2015 Copyright 2011-2015 by Qualys, Inc. All Rights Reserved. Qualys, the Qualys logo and QualysGuard are registered trademarks of Qualys, Inc.
Continuous Delivery for Alfresco Solutions. Satisfied customers and happy developers with!! Continuous Delivery!
Continuous Delivery for Alfresco Solutions Satisfied customers and happy developers with!! Continuous Delivery! About me Roeland Hofkens #rhofkens [email protected] http://opensource.westernacher.com
Chapter 1 Web Application (In)security 1
Introduction xxiii Chapter 1 Web Application (In)security 1 The Evolution of Web Applications 2 Common Web Application Functions 4 Benefits of Web Applications 5 Web Application Security 6 "This Site Is
Continuous Integration and Bamboo. Ryan Cutter CSCI 5828 2012 Spring Semester
Continuous Integration and Bamboo Ryan Cutter CSCI 5828 2012 Spring Semester Agenda What is CI and how can it help me? Fundamentals of CI Fundamentals of Bamboo Configuration / Price Quick example Features
Drupal CMS for marketing sites
Drupal CMS for marketing sites Intro Sample sites: End to End flow Folder Structure Project setup Content Folder Data Store (Drupal CMS) Importing/Exporting Content Database Migrations Backend Config Unit
Mean Time to Fix (MTTF) IT Risk s Dirty Little Secret Joe Krull, CPP, CISSP, IAM, CISA, A.Inst.ISP, CRISC, CIPP
Mean Time to Fix (MTTF) IT Risk s Dirty Little Secret Joe Krull, CPP, CISSP, IAM, CISA, A.Inst.ISP, CRISC, CIPP Presentation Overview Basic Application Security (AppSec) Fundamentals Risks Associated With
Building a Mobile App Security Risk Management Program. Copyright 2012, Security Risk Advisors, Inc. All Rights Reserved
Building a Mobile App Security Risk Management Program Your Presenters Who Are We? Chris Salerno, Consultant, Security Risk Advisors Lead consultant for mobile, network, web application penetration testing
DevOps, CI, APIs, Oh My! Security Gone Agile. Matt Tesauro, SANS AppSec 2014 Austin, TX, February 2014
DevOps, CI, APIs, Oh My! Security Gone Agile Matt Tesauro, SANS AppSec 2014 Austin, TX, February 2014 Who am i? Matt Tesauro Cloud Application Security Guy + OWASP Racker since October 2011 Rackspace s
SOFTWARE TESTING TRAINING COURSES CONTENTS
SOFTWARE TESTING TRAINING COURSES CONTENTS 1 Unit I Description Objectves Duration Contents Software Testing Fundamentals and Best Practices This training course will give basic understanding on software
DevOps Best Practices for Mobile Apps. Sanjeev Sharma IBM Software Group
DevOps Best Practices for Mobile Apps Sanjeev Sharma IBM Software Group Me 18 year in the software industry 15+ years he has been a solution architect with IBM Areas of work: o DevOps o Enterprise Architecture
Source Code Management for Continuous Integration and Deployment. Version 1.0 DO NOT DISTRIBUTE
Source Code Management for Continuous Integration and Deployment Version 1.0 Copyright 2013, 2014 Amazon Web Services, Inc. and its affiliates. All rights reserved. This work may not be reproduced or redistributed,
Domain Specific Languages for Selenium tests
Domain Specific Languages for Selenium tests Emily Bache, jfokus 2010 What is selenium? Selenium is a suite of tools to automate web application testing Includes Selenium RC (Remote Control) & Selenium
Application Code Development Standards
Application Code Development Standards Overview This document is intended to provide guidance to campus system owners and software developers regarding secure software engineering practices. These standards
Performing a Web Application Security Assessment
IBM Software Group Performing a Web Application Security Assessment 2007 IBM Corporation Coordinate the Time of the Audit Set up a time window with the application owner Inform your security team Inform
Excellence Doesn t Need a Certificate. Be an. Believe in You. 2014 AMIGOSEC Consulting Private Limited
Excellence Doesn t Need a Certificate Be an 2014 AMIGOSEC Consulting Private Limited Believe in You Introduction In this age of emerging technologies where IT plays a crucial role in enabling and running
Continuous Integration & Automated Testing in a multisite.net/cloud Project
Continuous Integration Automated Testing in a multisite.net/cloud Project Entwicklertag 2013 Karlsruhe 5-Jun-2013 Vladislav Kublanov 1 Speaker Vladislav Kublanov Tata Consultancy Services (TCS) Studied
Continuous security audit automation with Spacewalk, Puppet, Mcollective and SCAP
Continuous security audit automation with Spacewalk, Puppet, Mcollective and SCAP Vasileios A. Baousis (Ph.D) Network Applications Team Slide 1 Agenda Introduction Background - SCAP - Puppet &Mcollective
Detecting Web Application Vulnerabilities Using Open Source Means. OWASP 3rd Free / Libre / Open Source Software (FLOSS) Conference 27/5/2008
Detecting Web Application Vulnerabilities Using Open Source Means OWASP 3rd Free / Libre / Open Source Software (FLOSS) Conference 27/5/2008 Kostas Papapanagiotou Committee Member OWASP Greek Chapter [email protected]
Secure Coding SSL, SOAP and REST. Astha Singhal Product Security Engineer salesforce.com
Secure Coding SSL, SOAP and REST Astha Singhal Product Security Engineer salesforce.com Safe Harbor Safe harbor statement under the Private Securities Litigation Reform Act of 1995: This presentation may
Hacking for Fun and Profit
Hacking for Fun and Profit W3Lc0me to Th3 Fu1ur How to break stuff How to trade How to hide Help! Page 1 Knowing the enemy Page 2 E1 - Who am I ^ Ivan Bütler, Uznach, 31.12.1970 ^ Speaker at Blackhat 2008
Gateway Apps - Security Summary SECURITY SUMMARY
Gateway Apps - Security Summary SECURITY SUMMARY 27/02/2015 Document Status Title Harmony Security summary Author(s) Yabing Li Version V1.0 Status draft Change Record Date Author Version Change reference
Revisiting SQL Injection Will we ever get it right? Michael Sutton, Security Evangelist
Revisiting SQL Injection Will we ever get it right? Michael Sutton, Security Evangelist Overview Background What it is? How are we doing? Web 2.0 SQL injection meets AJAX Fuggle SQL Injection meets Google
Escaping the Works-On-My-Machine badge Continuous Integration with PDE Build and Git
Escaping the Works-On-My-Machine badge Continuous Integration with PDE Build and Git Matthias Kempka EclipseSource ` [email protected] 2011 EclipseSource September 2011 About EclipseSource Eclipse
Customize Mobile Apps with MicroStrategy SDK: Custom Security, Plugins, and Extensions
Customize Mobile Apps with MicroStrategy SDK: Custom Security, Plugins, and Extensions MicroStrategy Mobile SDK 1 Agenda MicroStrategy Mobile SDK Overview Requirements & Setup Custom App Delegate Custom
Strategic Information Security. Attacking and Defending Web Services
Security PS Strategic Information Security. Attacking and Defending Web Services Presented By: David W. Green, CISSP [email protected] Introduction About Security PS Application Security Assessments
Cyber Security Challenge Australia 2014
Cyber Security Challenge Australia 2014 www.cyberchallenge.com.au CySCA2014 Web Penetration Testing Writeup Background: Pentest the web server that is hosted in the environment at www.fortcerts.cysca Web
QualysGuard WAS. Getting Started Guide Version 3.3. March 21, 2014
QualysGuard WAS Getting Started Guide Version 3.3 March 21, 2014 Copyright 2011-2014 by Qualys, Inc. All Rights Reserved. Qualys, the Qualys logo and QualysGuard are registered trademarks of Qualys, Inc.
Securing Your Web Application against security vulnerabilities. Ong Khai Wei, IT Specialist, Development Tools (Rational) IBM Software Group
Securing Your Web Application against security vulnerabilities Ong Khai Wei, IT Specialist, Development Tools (Rational) IBM Software Group Agenda Security Landscape Vulnerability Analysis Automated Vulnerability
Points of View. CxO s point of view. Developer s point of view. Attacker s point of view
Web App Security 2 CxO s point of view Points of View Measurable security SCAP (Security Content Automation Protocol) Developer s point of view Secure coding/software security CWE (Common Weakness Enumeration)
Using Sprajax to Test AJAX. OWASP AppSec Seattle Oct 2006. The OWASP Foundation http://www.owasp.org/
Using Sprajax to Test AJAX Security OWASP AppSec Seattle Oct 2006 Dan Cornell, OWASP San Antonio Leader Principal, Denim Group, Ltd. [email protected] (210) 572-4400 Copyright 2006 - The OWASP Foundation
Enterprise Application Security Workshop Series
Enterprise Application Security Workshop Series Phone 877-697-2434 fax 877-697-2434 www.thesagegrp.com Defending JAVA Applications (3 Days) In The Sage Group s Defending JAVA Applications workshop, participants
How to Build a Trusted Application. John Dickson, CISSP
How to Build a Trusted Application John Dickson, CISSP Overview What is Application Security? Examples of Potential Vulnerabilities Strategies to Build Secure Apps Questions and Answers Denim Group, Ltd.
Agile Best Practices and Patterns for Success on an Agile Software development project.
Agile Best Practices and Patterns for Success on an Agile Software development project. Tom Friend SCRUM Master / Coach 1 2014 Agile On Target LLC, All Rights reserved. Tom Friend / Experience Industry
Braindumps.C2150-810.50 questions
Braindumps.C2150-810.50 questions Number: C2150-810 Passing Score: 800 Time Limit: 120 min File Version: 5.3 http://www.gratisexam.com/ -810 IBM Security AppScan Source Edition Implementation This is the
Continuous Prevention Testing
Continuous Prevention Testing By Andre Gironda OWASP October 2007 Bio Andre Gironda OWASP Phoenix, Chicago, MSP Other projects involved in WASC WASSEC NIST SAMATE Web Application Scanner Focus Group Web
