THE RISKS OF CONTENT MANAGEMENT SYSTEMS
|
|
|
- Simon Douglas
- 9 years ago
- Views:
Transcription
1 ii IBM MSS THE RISKS OF CONTENT MANAGEMENT SYSTEMS RESEARCH AND INTELLIGENCE REPORT RELEASE DATE: FEBRUARY 26, 2015 BY: DAVID MCMILLEN, SENIOR THREAT RESEACHER Copyright IBM Corporation All rights reserved. IBM and the IBM logo are trademarks or registered trademarks of the IBM Corporation in the United States,
2 iii TABLE OF CONTENTS EXECUTIVE OVERVIEW/KEY FINDINGS... 1 REFLECTING ON CMS... 1 WHY ARE CMS DEPLOYMENTS VULNERABLE... 2 SECURITY CONCERNS WITH CMS... 2 BRUTE FORCE... 3 THEMES AND PLUGINS... 3 SQL INJECTION AND CROSS SITE SCRIPTING... 3 DDOS... 3 WORDPRESS ATTACK METRICS... 4 GEOGRAPHICAL DISTRIBUTION OF ATTACKSOURCES... 5 INDUSTRIES MOST ATTACKED... 5 WHO IS USING THIS ATTACK?... 6 RECOMMENDATIONS/MITIGATION TECHNIQUES... 7 IDPS SIGNATURES AND/OR SIEM RULES... 7 REFERENCES... 8 CONTRIBUTORS... 9 DISCLAIMER... 9 Copyright IBM Corporation All rights reserved. IBM and the IBM logo are trademarks or registered trademarks of the IBM Corporation in the United States,
3 1 EXECUTIVE OVERVIEW/KEY FINDINGS In today s fast-paced business world, the need for quick changes to web content is greater than ever. In the past, this task was relegated to web masters and coders who created HTML code, JavaScript modules, and plugins on the fly. There was one fundamental problem with that arrangement; it left a most important task up to a handful of people. Web content needs to be dynamic, especially for retailers as their products change daily and, in some cases, hourly. In order to decentralize the tasks of web content management, a new method was introduced and dubbed Content Management Systems, or CMS. Now, let s take a look at the security risks of CSM systems. Due to the ever growing need for quick changes to web content, more businesses are leveraging CMS systems. Some of the more common CMS platforms in wide use today are WordPress, Joomla and Drupal. In fact, these three together represent over 75% of all CMS platforms in use today. These CMS platforms come standard with many cheap web hosting companies via their CPANEL functions. The fact that they come as a standard offering proves their effectiveness and popularity. What is quite concerning, however, is that a WP White Security Study found 73% of all WordPress installations had known unpatched vulnerabilities that could be easily detected with a freeware vulnerability scanner. An argument can be made that 73% is overinflated as the WP study focused on a limited subset of WordPress installations. Regardless of the debate on numbers, cybercriminals know that there are large amounts of unpatched installations and, as a result, focus heavily on CMS. REFLECTING ON CMS The history of CMS begins in the late 1990 s with the first of three stages of CMS development. Some of those early CMS platforms were Roxen, Blitzen, Ingeniux, and Vignette. They all offered a very structured development environment utilizing templates, but lacked a true WYSIWYG (what you see is what you get) component. Most of these early CMS platforms were developed by web design agencies rather than software developers. Following the dot-com crash, the majority of these systems were put out to pasture as most of the design agencies moved out of the coding business and focused more on design. The next phase of CMS development came in the 2000 s and was primarily led by software companies who thought out new ideas and began to build the foundation for the future of CMS systems. They built in features such as WYSIWYG, search capabilities, podcasts and survey tools. They even improved the HTML language. The leading CMS companies during this phase were DotNetNuke, Mambo, and RedDot who later joined together and created the Joomla CMS system. The Open Source movement got its start during this phase due in large part to the high costs of enterprise level software. This created a split
4 2 between paid and free software which today still exists. With the open source market booming, CMS became feature rich and the demand for CMS increased. Web agencies now could use both the coders and the designers to build and sell templates to consumers, allowing them to massage the look and feel of their web sites without having to know how to code. The world is now living currently in what is the third phase of CMS development. This new phase concentrates on the recently well-publicized hacks on open source platforms. The argument of using open source software for commercial usage in an enterprise environment has its roots here. The omnipresence of open source software has not gone unnoticed by the hacker community at large. Hackers are always hard at work attempting to earn more badges of skill by defacing web sites and embedding malware into ecommerce sites in order to harvest credit card information. Some of the key features of third generation CMSs are modular add-ons which require minimal coding for integration, the ability to be run as a hosted application, being able to be sold by design agencies and affiliates (templatemonster.com e.g.) and integration into databases, ecommerce and as modules instead of plugins. Where back-end and server-side code used to be a requirement, CMS platformscan now run front-end client-side code. WHY ARE CMS DEPLOYMENTS VULNERABLE CMS platforms are highly prized targets by hackers. It would be easy to assume that the big three, WordPress, Joomla and Drupal must be security hardened to a great degree out of the box and that the platform developers would have ensured a high degree of security controls into their products. The reverse is true, however. These products are built on open source frameworks within shared developer environments just like Linux, Apache and Open Office. Since these three CSM platforms are so popular, and with widely publicized vulnerabilities built within them (mainly third-party themes and plugins designed by thousands of different authors), they are a prized target of both security researchers as well as hackers. SECURITY CONCERNS WITH CMS Vulnerabilities within CMS platforms are a literal gold mine for hackers allowing them an efficient way of executing mass-scale attacks in an automated fashion. Let s take a look at some security problems that negatively affect CMS.
5 3 BRUTE FORCE Web site operators who use weak passwords leave their Administrator accounts vulnerable to brute force attacks. Obtaining access to an admin account can lead to injection of malware into the web site which could allow them to be turned into Distributed Denial of Service (DDoS) bots, as an example. Obtaining admin level access also allows a hacker to deface or disable a company s web site and distribute malware which could lead to blacklisting on Google and other search engines. THEMES AND PLUGINS There are thousands of developers who design CMS themes and plugins for custom use. Because of the diversity within the development community, no guarantee can be made that any or all of these components are not vulnerable. Once again, this makes them a popular target of hackers. It was found that 20% of the 50 most popular WordPress plugins were vulnerable. Of those 20%, eight million were downloaded from WordPress last year. The average CMS deployment uses four plugins at a minimum. SQL INJECTION AND CROSS SITE SCRIPTING There are hundreds of known SQL Injection and cross-site scripting(xss) attack parameters available in a simple Google search that affect CMS platforms, specifically within the PHP environment - too many to include in this report. New and improved attack strings are widely reported on a daily basis on many underground hacking sites. The SQL Injection attack vector remains on the OWASP list of top ten web vulnerabilities for years and that position at number one is not expected to change. DDOS Security researchers from Securi uncovered a simple trick where attackers simply sent a pingback request to the XML-RPC file within WordPress. A large DDoS attack in 2014 utilized this technique. Over 162,000 WordPress sites were leveraged creating a super DDoS net that focused on one website and took it down. Using this tactic, hackers are able to greatly amplify the bandwidth at its disposal. XML-RPC is a protocol used by WordPress and other CMS platforms and applications in order to provide services such as pingbacks, trackbacks and remote access to users. In this scenario, one single attacker can use thousands of WordPress sites to perform their DDoS attack while remaining hidden. What makes this DDoS attack type even more effective is that XML-RPC is directed at layer 7 (application layer) which handles many
6 4 different protocols including HTTP, DNS, and FTP. Most mainstream DDoS attacks focus on sending streams of data to layer 3 (network layer). Layer 7 DDoS attacks require much less data to be effective. WORDPRESS ATTACK METRICS IBM MSS data indicatesmany SQL Injection and Command Injection attackswere specifically targeting WordPress instances. In the chart below, we see WordPress installations being attacked heavily during the first three months of The pattern then diminishes from April through September where it then briefly resurges. Shellshock attacks against WordPress were noted in the November through December time frame, but were not numerous enough to include in the data. The data represents actual Security Incidents where customers were notified of these attacks. The data query was focused primarily on when the path to WordPress was found within a SQL Injection or Command Injection Security Incident.
7 5 GEOGRAPHICAL DISTRIBUTION OF ATTACKSOURCES IBM MSS WordPress attack metrics indicate that the United States was recognized as the largest source of attacks in A report issued in October 2014 by Imperva entitled the Web Application Attack Report (Waar), blames the United States as the most frequent source of WordPress attacks and cites that attackers from other countries are using hosts within the U.S. to launch attacks due in large part because they are closer to their targets. IBM MSS attack metrics indicate the same findings. INDUSTRIES MOST ATTACKED Retail Trade was by far the most WordPress attacked industry in 2014, followed by finance which was a distant 2 nd. The Web Application Attack Report (Waar), also indicated that the Retail Trade sector was the most frequently attacked WordPress target followed by the Finance Industry. The metrics collected by IBM MSS reflect their findings exactly.
8 6 WHO IS USING THIS ATTACK? Due primarily to the weaknesses outlined in this report, WordPress is a very appealing target to both hackers and security researchers. Tools are very easy to obtain online that enable hackers to perform a wide variety of attack types on many CMS brands. Security Researchers, however, perform a white hat service to the open source industry by trying to identify weaknesses in order to help authors design patches and mitigation procedures as well as providing information sharing concerning the weaknesses they find.
9 7 RECOMMENDATIONS/MITIGATION TECHNIQUES Always run the latest version of any CMS. Update CMS systems regularly. Look specifically for vulnerability patches and bug fixes. Always use trusted sources for themes and plugins. Never use free themes and plugins. Never use default settings. Change the default ADMIN name. Rename default database prefixes to prevent SQL Injection. Reduce credentials. The administrator account should only be needed for performing updates or adding/changing themes and plugins. Those that are editing posts or writing articles should never need to be at an administrator level. Always utilize strong passwords. Protect the.htaccess file. The following code, added within the.htaccess file will prevent anyone from reading or writing any files that begin with hta. (see Securing.htaccess in the References section) Use a Cloud-Based Security Service. Solutions such as Cloudflare and Akamai act as a shield in front of your website. These services block bad user agents and offer some protection against SQL Injection and DDoS attacks. Backup your CMS installations at regular intervals and design a robust disaster recovery plan. IDPS SIGNATURES AND/OR SIEM RULES See Attachment 1 for this information.
10 8 REFERENCES CMS history Content Management Systems Security and Associated Risks Securing.htaccess Is your WordPress site being used as an DDoS attack source? The perils of freeware Securing and hardening Content Management Systems 162,000 WordPress Sites used in DDoS attack OWASP list of top 10 web vulnerabilities WordPress Most Attacked Apllication Web Application Attack Report (WAAR)
11 9 CONTRIBUTORS Lyndon Sutherland - Security Specialist XFTAS Michelle Alvarez Researcher/Editor, Threat Research Group Nick Bradley Practice Lead, Threat Research Group DISCLAIMER This document is intended to inform clients of IBM Security Services of a threat or discovery by IBM Managed Security Services and measures undertaken or suggested by IBM Security Service Teams to remediate the threat. The data contained herein describing tactics, techniques and procedures is classified Confidential for the consumption of IBM MSS clients only.
INDUSTRY OVERVIEW: FINANCIAL
ii IBM MSS INDUSTRY OVERVIEW: FINANCIAL RESEARCH AND INTELLIGENCE REPORT RELEASE DATE: NOVEMBER 5, 2014 BY: JOHN KUHN, SENIOR THREAT RESEARCHER iii TABLE OF CONTENTS EXECUTIVE OVERVIEW... 1 MAJOR FINANCIAL
JOOMLA SECURITY. ireland website design. by Oliver Hummel. ADDRESS Unit 12D, Six Cross Roads Business Park, Waterford City
JOOMLA SECURITY by Oliver Hummel ADDRESS Unit 12D, Six Cross Roads Business Park, Waterford City CONTACT Nicholas Butler 051-393524 089-4278112 [email protected] Contents Introduction 3 Installation
KASPERSKY SECURITY INTELLIGENCE SERVICES. EXPERT SERVICES. www.kaspersky.com
KASPERSKY SECURITY INTELLIGENCE SERVICES. EXPERT SERVICES www.kaspersky.com EXPERT SERVICES Expert Services from Kaspersky Lab are exactly that the services of our in-house experts, many of them global
Recon and Mapping Tools and Exploitation Tools in SamuraiWTF Report section Nick Robbins
Recon and Mapping Tools and Exploitation Tools in SamuraiWTF Report section Nick Robbins During initial stages of penetration testing it is essential to build a strong information foundation before you
Guidelines for Website Security and Security Counter Measures for e-e Governance Project
and Security Counter Measures for e-e Governance Project Mr. Lalthlamuana PIO, DoICT Background (1/8) Nature of Cyber Space Proliferation of Information Technology Rapid Growth in Internet Increasing Online
WordPress Security Scan Configuration
WordPress Security Scan Configuration To configure the - WordPress Security Scan - plugin in your WordPress driven Blog, login to WordPress as administrator, by simply entering the url_of_your_website/wp-admin
ReadySpace Limited Unit J, 16/F Reason Group Tower, 403-413 Castle PeakRoad, Kwai Chung, N.T.
Reputation and Blacklist Monitoring Basic Professional Business Enterprise Reputation Monitoring Blacklist Monitoring Standard Malware Detection Scan for known Malware Scan for known viruses All pages
3. Broken Account and Session Management. 4. Cross-Site Scripting (XSS) Flaws. Web browsers execute code sent from websites. Account Management
What is an? s Ten Most Critical Web Application Security Vulnerabilities Anthony LAI, CISSP, CISA Chapter Leader (Hong Kong) [email protected] Open Web Application Security Project http://www.owasp.org
(WAPT) Web Application Penetration Testing
(WAPT) Web Application Penetration Testing Module 0: Introduction 1. Introduction to the course. 2. How to get most out of the course 3. Resources you will need for the course 4. What is WAPT? Module 1:
Introduction: 1. Daily 360 Website Scanning for Malware
Introduction: SiteLock scans your website to find and fix any existing malware and vulnerabilities followed by using the protective TrueShield firewall to keep the harmful traffic away for good. Moreover
Powerful Online Solutions HOSTING. Price List. Surge Media Pty Ltd MAINTENANCE & SUPPORT Price List 1
Powerful Online Solutions HOSTING Price List Surge Media Pty Ltd MAINTENANCE & SUPPORT Price List 1 Document Control Release history Author Date Version Surge Media 01/02/2016 2.2 Confidentiality The information
A Network Administrator s Guide to Web App Security
A Network Administrator s Guide to Web App Security Speaker: Orion Cassetto, Product Marketing Manager, Incapsula Moderator: Rich Nass, OpenSystems Media Agenda Housekeeping Presentation Questions and
Threat Modelling for Web Application Deployment. Ivan Ristic [email protected] (Thinking Stone)
Threat Modelling for Web Application Deployment Ivan Ristic [email protected] (Thinking Stone) Talk Overview 1. Introducing Threat Modelling 2. Real-world Example 3. Questions Who Am I? Developer /
INDUSTRY OVERVIEW: RETAIL
ii IBM MSS INDUSTRY OVERVIEW: RETAIL RESEARCH AND INTELLIGENCE REPORT RELEASE DATE: JANUARY 5, 215 BY: DAVID MCMILLEN, SENIOR THREAT RESEARCHER Copyright IBM Corporation 214. All rights reserved. IBM and
Attack and Penetration Testing 101
Attack and Penetration Testing 101 Presented by Paul Petefish [email protected] July 15, 2009 Copyright 2000-2009, Solutionary, Inc. All rights reserved. Version 2.2 Agenda Penetration Testing
Detecting and Exploiting XSS with Xenotix XSS Exploit Framework
Detecting and Exploiting XSS with Xenotix XSS Exploit Framework [email protected] keralacyberforce.in Introduction Cross Site Scripting or XSS vulnerabilities have been reported and exploited since 1990s.
WhiteHat Security White Paper. Top 11 PCI DSS 3.0 Changes That Will Affect Your Application Security Program
WhiteHat Security White Paper Top 11 PCI DSS 3.0 Changes That Will Affect Your Application Security Program October 2015 The Payment Card Industry Data Security Standard (PCI DSS) is a proprietary information
ArcGIS Server Security Threats & Best Practices 2014. David Cordes Michael Young
ArcGIS Server Security Threats & Best Practices 2014 David Cordes Michael Young Agenda Introduction Threats Best practice - ArcGIS Server settings - Infrastructure settings - Processes Summary Introduction
Protecting against DoS/DDoS Attacks with FortiWeb Web Application Firewall
Protecting against DoS/DDoS Attacks with FortiWeb Web Application Firewall A FORTINET WHITE PAPER www.fortinet.com Introduction Denial of Service attacks are rapidly becoming a popular attack vector used
Enterprise-Grade Security from the Cloud
Datasheet Website Security Enterprise-Grade Security from the Cloud Unmatched web application security experience, enhanced by real-time big data analytics, enables Incapsula to provide best-of-breed security
10 Things Every Web Application Firewall Should Provide Share this ebook
The Future of Web Security 10 Things Every Web Application Firewall Should Provide Contents THE FUTURE OF WEB SECURITY EBOOK SECTION 1: The Future of Web Security SECTION 2: Why Traditional Network Security
SECURITY TRENDS & VULNERABILITIES REVIEW 2015
SECURITY TRENDS & VULNERABILITIES REVIEW 2015 Contents 1. Introduction...3 2. Executive summary...4 3. Inputs...6 4. Statistics as of 2014. Comparative study of results obtained in 2013...7 4.1. Overall
The Top Web Application Attacks: Are you vulnerable?
QM07 The Top Web Application Attacks: Are you vulnerable? John Burroughs, CISSP Sr Security Architect, Watchfire Solutions [email protected] Agenda Current State of Web Application Security Understanding
Web Vulnerability Scanner by Using HTTP Method
Available Online at www.ijcsmc.com International Journal of Computer Science and Mobile Computing A Monthly Journal of Computer Science and Information Technology IJCSMC, Vol. 4, Issue. 9, September 2015,
The Weakest Link: Mitigating Web Application Vulnerabilities. webscurity White Paper. webscurity Inc. Minneapolis, Minnesota USA
The Weakest Link: Mitigating Web Application Vulnerabilities webscurity White Paper webscurity Inc. Minneapolis, Minnesota USA January 25, 2007 Contents Executive Summary...3 Introduction...4 Target Audience...4
Kenna Platform Security. A technical overview of the comprehensive security measures Kenna uses to protect your data
Kenna Platform Security A technical overview of the comprehensive security measures Kenna uses to protect your data V2.0, JULY 2015 Multiple Layers of Protection Overview Password Salted-Hash Thank you
SQL Injection 2.0: Bigger, Badder, Faster and More Dangerous Than Ever. Dana Tamir, Product Marketing Manager, Imperva
SQL Injection 2.0: Bigger, Badder, Faster and More Dangerous Than Ever Dana Tamir, Product Marketing Manager, Imperva Consider this: In the first half of 2008, SQL injection was the number one attack vector
Joomla Security Report
Joomla Security Report HackerTarget.com HackerTarget.com is the world leader in online open source intelligence and security assessments. All scanning tools are on-line for easy and convenient access.
WHITE PAPER. FortiWeb and the OWASP Top 10 Mitigating the most dangerous application security threats
WHITE PAPER FortiWeb and the OWASP Top 10 PAGE 2 Introduction The Open Web Application Security project (OWASP) Top Ten provides a powerful awareness document for web application security. The OWASP Top
What Do You Mean My Cloud Data Isn t Secure?
Kaseya White Paper What Do You Mean My Cloud Data Isn t Secure? Understanding Your Level of Data Protection www.kaseya.com As today s businesses transition more critical applications to the cloud, there
The Fundamental Failures of End-Point Security. Stefan Frei Research Analyst Director [email protected]
The Fundamental Failures of End-Point Security Stefan Frei Research Analyst Director [email protected] Agenda The Changing Threat Environment Malware Tools & Services Why Cybercriminals Need No 0-Days
Adobe Systems Incorporated
Adobe Connect 9.2 Page 1 of 8 Adobe Systems Incorporated Adobe Connect 9.2 Hosted Solution June 20 th 2014 Adobe Connect 9.2 Page 2 of 8 Table of Contents Engagement Overview... 3 About Connect 9.2...
Newsletter - September 2014. T o o l s W a t c h T e a m NJ OUCHN & MJ SOLER
Newsletter - September 2014 T o o l s W a t c h T e a m NJ OUCHN & MJ SOLER Tools! Lots of Tools Released! During September 2014, we published 7 Posts with 2 News Tools. Organized by Date OWASP Xenotix
Advanced Administration for Citrix NetScaler 9.0 Platinum Edition
Advanced Administration for Citrix NetScaler 9.0 Platinum Edition Course Length: 5 Days Course Code: CNS-300 Course Description This course provides the foundation to manage, configure and monitor advanced
ICTN 4040. Enterprise Database Security Issues and Solutions
Huff 1 ICTN 4040 Section 001 Enterprise Information Security Enterprise Database Security Issues and Solutions Roger Brenton Huff East Carolina University Huff 2 Abstract This paper will review some of
Creating Stronger, Safer, Web Facing Code. JPL IT Security Mary Rivera June 17, 2011
Creating Stronger, Safer, Web Facing Code JPL IT Security Mary Rivera June 17, 2011 Agenda Evolving Threats Operating System Application User Generated Content JPL s Application Security Program Securing
A briefing paper on the osconcert online ticketing system security issues, vulnerabilities and privacy concerns. OSCONCERT SECURITY AND PRIVACY.
osconcert Security and Privacy. A briefing paper on the osconcert online ticketing system security issues, vulnerabilities and privacy concerns. Contents. OSCONCERT SECURITY AND PRIVACY. 1 CONTENTS. 1
Hacker Intelligence Initiative, Monthly Trend Report #15
January 2013 Hacker Intelligence Initiative, Monthly Trend Report #15 Lessons Learned From the Yahoo! Hack How SQL Injection Vulnerabilities in Third-Party Code Can Make for Security Cloudy 1. Executive
Using Nessus In Web Application Vulnerability Assessments
Using Nessus In Web Application Vulnerability Assessments Paul Asadoorian Product Evangelist Tenable Network Security [email protected] About Tenable Nessus vulnerability scanner, ProfessionalFeed
End-to-End Application Security from the Cloud
Datasheet Website Security End-to-End Application Security from the Cloud Unmatched web application security experience, enhanced by real-time big data analytics, enables Incapsula to provide best-of-breed
Secure Web Applications. The front line defense
Secure Web Applications The front line defense Agenda Web Application Security Threat Overview Exploiting Web Applications Common Attacks & Preventative techniques Developing Secure Web Applications -Security
Web Hosting Control Panel
Web Hosting Control Panel Page 1 Our web hosting control panel has been created to provide you with all the tools you need to make the most of your website. Web Hosting Control Panel Home Page Once you
CS 558 Internet Systems and Technologies
CS 558 Internet Systems and Technologies Dimitris Deyannis [email protected] 881 Heat seeking Honeypots: Design and Experience Abstract Compromised Web servers are used to perform many malicious activities.
The Panoptix Building Efficiency Solution: Ensuring a Secure Delivery of Building Efficiency
logo The Panoptix Building Efficiency Solution: Ensuring a Secure Delivery of Building Efficiency Understanding the Multiple Levels of Security Built Into the Panoptix Solution Published: October 2011
Web Application Hacking (Penetration Testing) 5-day Hands-On Course
Web Application Hacking (Penetration Testing) 5-day Hands-On Course Web Application Hacking (Penetration Testing) 5-day Hands-On Course Course Description Our web sites are under attack on a daily basis
Security solutions White paper. Acquire a global view of your organization s security state: the importance of security assessments.
Security solutions White paper Acquire a global view of your organization s security state: the importance of security assessments. April 2007 2 Contents 2 Overview 3 Why conduct security assessments?
Web App Security Audit Services
locuz.com Professional Services Web App Security Audit Services The unsecured world today Today, over 80% of attacks against a company s network come at the Application Layer not the Network or System
What s Wrong with Information Security Today? You are looking in the wrong places for the wrong things.
What s Wrong with Information Security Today? You are looking in the wrong places for the wrong things. AGENDA Current State of Information Security Data Breach Statics Data Breach Case Studies Why current
Rational AppScan & Ounce Products
IBM Software Group Rational AppScan & Ounce Products Presenters Tony Sisson and Frank Sassano 2007 IBM Corporation IBM Software Group The Alarming Truth CheckFree warns 5 million customers after hack http://infosecurity.us/?p=5168
Is Drupal secure? A high-level perspective on web vulnerabilities, Drupal s solutions, and how to maintain site security
Is Drupal secure? A high-level perspective on web vulnerabilities, Drupal s solutions, and how to maintain site security Presented 2009-05-29 by David Strauss Thinking Securely Security is a process, not
IBM Managed Security Services Vulnerability Scanning:
IBM Managed Security Services August 2005 IBM Managed Security Services Vulnerability Scanning: Understanding the methodology and risks Jerry Neely Network Security Analyst, IBM Global Services Page 2
ETHICAL HACKING 010101010101APPLICATIO 00100101010WIRELESS110 00NETWORK1100011000 101001010101011APPLICATION0 1100011010MOBILE0001010 10101MOBILE0001
001011 1100010110 0010110001 010110001 0110001011000 011000101100 010101010101APPLICATIO 0 010WIRELESS110001 10100MOBILE00010100111010 0010NETW110001100001 10101APPLICATION00010 00100101010WIRELESS110
1. Introduction. 2. Web Application. 3. Components. 4. Common Vulnerabilities. 5. Improving security in Web applications
1. Introduction 2. Web Application 3. Components 4. Common Vulnerabilities 5. Improving security in Web applications 2 What does World Wide Web security mean? Webmasters=> confidence that their site won
Malware Analysis Quiz 6
Malware Analysis Quiz 6 1. Are these files packed? If so, which packer? The file is not packed, as running the command strings shelll reveals a number of interesting character sequences, such as: irc.ircnet.net
ASL IT SECURITY BEGINNERS WEB HACKING AND EXPLOITATION
ASL IT SECURITY BEGINNERS WEB HACKING AND EXPLOITATION V 2.0 A S L I T S e c u r i t y P v t L t d. Page 1 Overview: Learn the various attacks like sql injections, cross site scripting, command execution
IBM Security QRadar Vulnerability Manager Version 7.2.6. User Guide IBM
IBM Security QRadar Vulnerability Manager Version 7.2.6 User Guide IBM Note Before using this information and the product that it supports, read the information in Notices on page 91. Product information
HTML5 and security on the new web
HTML5 and security on the new web By James Lyne, Director of Technology Strategy There are lots of changes happening to the key technologies that power the web. The new version of HTML, the dominant web
Joomla Security - Introduction
Joomla Security - Introduction Joomla Security At The Webhost Modern web servers come in all shapes, sizes and hues, hence web server based security issues just cannot be resolved with simple, one-size-fits-all
Hacking the WordpressEcosystem
Hacking the WordpressEcosystem About Me Dan Catalin VASILE Information Security Consultant Researcher / Writer / Presenter OWASP Romania Board Member Online presence http://www.pentest.ro [email protected]/
THE WEB HACKING INCIDENTS DATABASE 2009
THE WEB HACKING INCIDENTS DATABASE 2009 BI-ANNUAL REPORT AUGUST 2009 Breach Security, Inc. Corporate Headquarters 2141 Palomar Airport Road, #200 Carlsbad, CA 92011 USA tel: (760) 268-1924 toll-free: (866)
Protecting Your Organisation from Targeted Cyber Intrusion
Protecting Your Organisation from Targeted Cyber Intrusion How the 35 mitigations against targeted cyber intrusion published by Defence Signals Directorate can be implemented on the Microsoft technology
Cross-Site Scripting
Cross-Site Scripting (XSS) Computer and Network Security Seminar Fabrice Bodmer ([email protected]) UNIFR - Winter Semester 2006-2007 XSS: Table of contents What is Cross-Site Scripting (XSS)? Some
10 BEST PRACTICES FOR A SECURE AND SUCCESSFUL ENTERPRISE WORDPRESS DEPLOYMENT WHITE PAPER
10 BEST PRACTICES FOR A SECURE AND SUCCESSFUL ENTERPRISE WORDPRESS DEPLOYMENT WHITE PAPER Andrei Matei, Solutions Engineer January 2015 Secure, Successful WordPress WordPress is secure, but as with any
Web Security CS25010. 20th November 2012. 2012, Jonathan Francis Roscoe, [email protected] Department of Computer Science, Aberystwyth University
Web Security CS25010 20th November 2012 Session Errors Some people are having errors creating sessions: Warning: session_start() [function.session-start]: open(/var/php_sessions/sess_d7hag76hgsfh2bjuhmdamb974,
Nikolay Zaynelov Annual LUG-БГ Meeting 2015. nikolay.zaynelov.com [email protected]
Nikolay Zaynelov Annual LUG-БГ Meeting 2015 nikolay.zaynelov.com [email protected] Introduction What is WordPress WordPress is a free and open source content management system (CMS). It is the most
Common Security Vulnerabilities in Online Payment Systems
Common Security Vulnerabilities in Online Payment Systems Author- Hitesh Malviya(Information Security analyst) Qualifications: C!EH, EC!SA, MCITP, CCNA, MCP Current Position: CEO at HCF Infosec Limited
IBM Protocol Analysis Module
IBM Protocol Analysis Module The protection engine inside the IBM Security Intrusion Prevention System technologies. Highlights Stops threats before they impact your network and the assets on your network
Out of the Fire - Adding Layers of Protection When Deploying Oracle EBS to the Internet
Out of the Fire - Adding Layers of Protection When Deploying Oracle EBS to the Internet March 8, 2012 Stephen Kost Chief Technology Officer Integrigy Corporation Phil Reimann Director of Business Development
We protect you applications! No, you don t. Digicomp Hacking Day 2013 May 16 th 2013
We protect you applications! No, you don t Digicomp Hacking Day 2013 May 16 th 2013 Sven Vetsch Partner & CTO at Redguard AG www.redguard.ch Specialized in Application Security (Web, Web-Services, Mobile,
EC-Council CAST CENTER FOR ADVANCED SECURITY TRAINING. CAST 619 Advanced SQLi Attacks and Countermeasures. Make The Difference CAST.
CENTER FOR ADVANCED SECURITY TRAINING 619 Advanced SQLi Attacks and Countermeasures Make The Difference About Center of Advanced Security Training () The rapidly evolving information security landscape
Web application security
Web application security Sebastian Lopienski CERN Computer Security Team openlab and summer lectures 2010 (non-web question) Is this OK? int set_non_root_uid(int uid) { // making sure that uid is not 0
External Vulnerability Assessment. -Technical Summary- ABC ORGANIZATION
External Vulnerability Assessment -Technical Summary- Prepared for: ABC ORGANIZATI On March 9, 2008 Prepared by: AOS Security Solutions 1 of 13 Table of Contents Executive Summary... 3 Discovered Security
An analysis of exploitation behaviors on the web and the role of web hosting providers in detecting them
An analysis of exploitation behaviors on the web and the role of web hosting providers in detecting them Davide Canali, Davide Balzarotti Aurélien Francillon Software and System Security Group EURECOM,
Web application security Executive brief Managing a growing threat: an executive s guide to Web application security.
Web application security Executive brief Managing a growing threat: an executive s guide to Web application security. Danny Allan, strategic research analyst, IBM Software Group Contents 2 Introduction
Where every interaction matters.
Where every interaction matters. Peer 1 Vigilant Web Application Firewall Powered by Alert Logic The Open Web Application Security Project (OWASP) Top Ten Web Security Risks and Countermeasures White Paper
Vulnerability Management
Vulnerability Management Buyer s Guide Buyer s Guide 01 Introduction 02 Key Components 03 Other Considerations About Rapid7 01 INTRODUCTION Exploiting weaknesses in browsers, operating systems and other
Contemporary Web Application Attacks. Ivan Pang Senior Consultant Edvance Limited
Contemporary Web Application Attacks Ivan Pang Senior Consultant Edvance Limited Agenda How Web Application Attack impact to your business? What are the common attacks? What is Web Application Firewall
Attack Vector Detail Report Atlassian
Attack Vector Detail Report Atlassian Report As Of Tuesday, March 24, 2015 Prepared By Report Description Notes [email protected] The Attack Vector Details report provides details of vulnerability
elearning for Secure Application Development
elearning for Secure Application Development Curriculum Application Security Awareness Series 1-2 Secure Software Development Series 2-8 Secure Architectures and Threat Modeling Series 9 Application Security
Real World Web Service Testing For Web Hackers
Real World Web Service Testing For Web Hackers TOM ESTON» Senior Security Consultant SecureState» Web Application / Network Penetration Tester» Founder of SocialMediaSecurity.com» Previous Security Research
Stephen Coty Director, Threat Research
Emerging threats facing Cloud Computing Stephen Coty Director, Threat Research Cloud Environments 101 Cloud Adoption is Gaining Momentum Cloud market revenue will increase at a 36% annual rate Analyst
Staying a step ahead of the hackers: the importance of identifying critical Web application vulnerabilities.
Managing business infrastructure White paper Staying a step ahead of the hackers: the importance of identifying critical Web application vulnerabilities. September 2008 2 Contents 2 Overview 5 Understanding
The Value of Vulnerability Management*
The Value of Vulnerability Management* *ISACA/IIA Dallas Presented by: Robert Buchheit, Director Advisory Practice, Dallas Ricky Allen, Manager Advisory Practice, Houston *connectedthinking PwC Agenda
Securing Your Web Application against security vulnerabilities. Ong Khai Wei, IT Specialist, Development Tools (Rational) IBM Software Group
Securing Your Web Application against security vulnerabilities Ong Khai Wei, IT Specialist, Development Tools (Rational) IBM Software Group Agenda Security Landscape Vulnerability Analysis Automated Vulnerability
Protect Your IT Infrastructure from Zero-Day Attacks and New Vulnerabilities
Protect Your IT Infrastructure from Zero-Day Attacks and New Vulnerabilities Protecting a business s IT infrastructure is complex. Take, for example, a retailer operating a standard multi-tier infrastructure
Application security testing: Protecting your application and data
E-Book Application security testing: Protecting your application and data Application security testing is critical in ensuring your data and application is safe from security attack. This ebook offers
OWASP AND APPLICATION SECURITY
SECURING THE 3DEXPERIENCE PLATFORM OWASP AND APPLICATION SECURITY Milan Bruchter/Shutterstock.com WHITE PAPER EXECUTIVE SUMMARY As part of Dassault Systèmes efforts to counter threats of hacking, particularly
Securing SharePoint 101. Rob Rachwald Imperva
Securing SharePoint 101 Rob Rachwald Imperva Major SharePoint Deployment Types Internal Portal Uses include SharePoint as a file repository Only accessible by internal users Company Intranet External Portal
Web Engineering Web Application Security Issues
Security Issues Dec 14 2009 Katharina Siorpaes Copyright 2009 STI - INNSBRUCK www.sti-innsbruck.at It is NOT Network Security It is securing: Custom Code that drives a web application Libraries Backend
White Paper. What the ideal cloud-based web security service should provide. the tools and services to look for
White Paper What the ideal cloud-based web security service should provide A White Paper by Bloor Research Author : Fran Howarth Publish date : February 2010 The components required of an effective web
Beyond the Hype: Advanced Persistent Threats
Advanced Persistent Threats and Real-Time Threat Management The Essentials Series Beyond the Hype: Advanced Persistent Threats sponsored by Dan Sullivan Introduction to Realtime Publishers by Don Jones,
