The SQL Injection Attacking Prevention Applying the Design Techniques

Size: px
Start display at page:

Download "The SQL Injection Attacking Prevention Applying the Design Techniques"

Transcription

1 The SQL Injection Attacking Prevention Applying the Design Techniques of IPTABLES Faculty of Informatics, Mahasarakham University, Thailand, Abstract This study presents the SQL Injection Prevention using the design techniques of IPTABLES. It applied the IPTABLES s special feature that is able to investigate the application layers to detect and drop the packets that contains SQL patterns ( e.g. ' or '1'=' ). Besides, the study suggests the methods for designing the IPTABLES rule without a confliction or that has least possibility of confliction between the rules. The researcher presents how to adjust IPTABLES to filter the SQL Injection packets more rapidly by applying the concept of relation and Cartesian product into designing the rule and using the rule repositioning method. The researcher has also collected various patterns that used to be attacked with SQL Injection, from different reliable sources, to find out the common signatures. Then these patterns were concluded to be about 10 patterns only so that they would function with least overhead. In addition, the researcher has run the performance testing and found that the response time has been slightly increased, while the possibility of false positive appeared at an acceptable rate. Keywords: Web Security, Database Security, Sql Injection, Hack, Firewall, IPTABLES 1. Introduction Attacking with SQL Injection is popularly used amongst the hackers and even the university students who are knowledgeable in either computer software or information technology since SQL Injection is an approach launched to attack web server and database without any tools required. It can be launched immediately on a browser and give a sudden result. In this regard, an organization "Open Web Application Security Project" (OWASP) [1] has ranked a top 10 web server attacking and named SQL Injection as a first attacking approach that has fluently found and mostly harmful. (based on the information provided in "OWASP Top 10 for 2010"). The samples of the most harmful incidents caused by the SQL Injection are as follows. - July 2012: 450,000 accounts of Yahoo mail has been hacked for their usernames and passwords. - June 2012: the passwords and credit card database of a million customers of SONY have been hacked. - March 2011: a webpage of mysql.com, the MySQL database maker, has been hacked and changed by a hacker. Apparently, the above mentioned websites has been attacked with the SQL Injection [2], so people should be more aware of the SQL Injection attacking. The best solution is educating the web programmers with more information about how to write a web code with strong security and encouraging them to focus more on testing the web security i.e. penetration testing, Black-Box testing, and White-Box testing, as well as web application hardening. However, the prevention by web application hardening requires a high cost and takes very much time. Thus, purchasing the tools as Web Application Firewall (WAF) that can prevent the SQL Injection could be another way out. The examples of these WAF are Cisco IPS [3], Barracuda [4], etc. Still, these tools are expensive and difficult for being updated to handle the new attacking approaches. For these reasons, the researcher tries to seek out a proper solution with low cost but still contains a strong security and able to effectively prevent any kinds of attacking. Journal of Convergence Information Technology(JCIT) Volume 7, Number 22, Dec 2012 doi : /jcit.vol7.issue

2 2. Background and Related Works The SQL Injection attacking can be launched by entering the SQL command in a login browser or searching browser. (or entering the command directly in an address bar browser), for example entering ' or '1'=' or ' or ''='. After these strings have been sent to web server, they would be merged with the SQL command on a server s side and its logical outcome would be true e.g. SELECT * FROM users WHERE name = '' OR '1'='1'. Through this method, a hacker will be able to bypass the authentication system; the skillful hacker will adjust the SQL Injection s strings to allow himself to log into the system as the administrator, in which he can either edit or steal the important information from the website. A number of researches have been conducted on the SQL Injection attacking. For examples, G N V Prasad and V. Siva Parvathi [5] suggested how to prevent the SQL Injection by adjusting the web application code with the command "mysql_real_escape_string()", but this method only worked on some platforms since some platforms did not have that kind of command. Meanwhile, Theodoor Scholte et al. [6] had studied on detecting the XSS:Cross Site Scripting and SQL Injection but mentioned nothing about the useful preventions. Indrani & E. Ramaraj [7] proposed the frame work to prevent the SQL Injection by designing and equipping it with X-log Generator, X-log Authentication and Vulnerability Guard but still had a problem since the software needs to be installed on a dedicated computer and placed on the route between a client and a server. Khwairakpam Amitab et al. [8] presented how to detect the SQL Injection using Chi-square test but suggested nothing about the solutions. Perumalsamy Ramasamy et al [9] suggested the prevention technique by inserting a code on the web application and on all servers. Meanwhile, K. Ahmad [10] suggested the prevention technique by writing a special application to be installed on a dedicated computer and put between the web server and database server. Overall, this method functioned with high speed because the preventer was not put between the web server and internet. However, with this method, to detect the SQL Injection would be more difficult than those that were put in the front of the web server. 3. Designing Since the SQL Injection is an attacking on an application layer, i.e. Layer-7 of OSI Reference Model, with a special string e.g. ' or '1'='1. Typically, a route of the attacking packets will begin from the outside (from the internet) and go straight into Demilitarized Zone (DMZ) where the web servers located. Sometimes, the attacking packets may come from an internal network caused by either a local user or guest who intended to attack the internal web server. After all, the attacking packets will travel through the firewall so the preventer is purposively located at the same point as the firewalls. 3.1 Designing as the Application-Layer Filter The regular firewall will filter the packets at Layer-3 and Layer-4 of OSI Reference Model, whereas the SQL Injection attacking happens at Layer-7. The researcher is willed to study on and seeks out the proper solution and has found that IPTABLES is the suitable firewall to take this mission, since it is able to detect the packets at Layer-7 with a parameter "-m string" and "--string". Additionally, IPTABLES is an open source and free software that is cheap and easy to be implemented. Example: the rule used in preventing the SQL Injection. iptables -A FORWARD -s /0 -m string --string %27+or+%271%27%3d%271 -j DROP From the example, it can be seen that no matter source that they have been launched from (-s /0), the packets will be detected if there is "%27+or+%271%27%3d%271" contained in the strings content. If the mentioned exists, that packet will be dropped immediately. Note: "%27+or+%271%27%3d%271" is an URL encoding that can be decoded as ' or '1'=1, a sample of the SQL Injection attacking patterns. 67

3 3.2 Designing to Decrease the Rule Confliction and Increase the Detecting Speed. The sample patterns of the SQL Injection attacking are presented as below. ' -- ' or '1'='1 ' or ''=' These patterns are separately defined on each line of the IPTABLES rule; meanwhile the servers that located in Demilitarized Zone (DMZ) also include not only the web servers, but also other related servers e.g. mail servers or DNS servers. Thus, besides the IPTABLES rule, there are more rules required for preventing the different servers. These also include the rules to prevent the attacking launched on the internal user s IP Address. In particular, inside the IPTABLES requires the rule that allow only the internal user with some port number to connect to the internet. Based on a study on the firewall rule designing (including IPTABLES), the researcher notices that the firewall rule designing may cause some confliction between the rules; the kinds of confliction may vary. Particularly, the rule conflictions needed to be aware of include Shadowing Anomaly, Correlation Anomaly, and Redundancy Anomaly. Shadow Anomaly is a confliction that exists because there is the rule that hides and does not allow the packets to match with the next rules below. The example of this confliction is present as follows. Rule-1: iptables -A FORWARD -d /24 -dport 80 -j ACCEPT Rule-2: iptables -A FORWARD -d dport 80 -m string --string %27+or+%271%27%3d%271 -j DROP From the example, Rule-2 is hidden by Rule-1 in which no packets can match with Rule-2. Indeed, Rule-2 refers to the SQL Injection prevention that protects the server with IP address: ; therefore, if Rule-2 is hidden by Rule-1, the prevention will not be processed. Correlation Anomaly is a confliction existing since the two rules take different actions and partly are overlapped. If the firewall administrators swap the positions of these two rules, the packet decision (to accept or to drop the packet) will be changed as follows. Rule-3: iptables -A FORWARD -s d /24 -dport 80 -j ACCEPT Rule-4: iptables -A FORWARD -s /24 -d dport 80 -m string -- string %27+or+%271%27%3d%271 -j DROP From the example, Rule-3 and Rule-4 have been swapped and the decision on the packet with Source IP = and Destination IP = will be mistakenly changed from "to be accepted" to "to be dropped" Redundancy Anomaly is the redundant rule. It means that the previous rules redundant with the latter rules as follows. Rule-5: iptables -A FORWARD -s /24 -d dport 80 -m string --string %27+or+%271%27%3d%271 -j DROP Rule-6: iptables -A FORWARD -s /0 -d dport 80 -m string --string %27+or+%271%27%3d%271 -j DROP As apparently seen, the packets that match Rule-5 also match Rule-6 (noticed from that /24 is a subset of /0). In fact, despite without Rule-5, the firewall still works on with the same policy. Therefore, Rule-5 becomes an unnecessary redundancy and as it is redundant with Rule-6; consequently, Rule-5 should be deleted. To decrease the possibility of the mentioned confliction, the researcher has designed the rule using Destination IP at the 1st priority and Destination Port at the 2nd priority. The Source IP will be the 3rd priority as presented in Table 1. 68

4 Table 1. The structure of firewall rule to decrease the rule confliction Destination IP Destination Port Source IP Action Server 1 Server 2 Server 2 Server N User DROP all packets The design in Table 1 has it benefit in which Shadowing Anomaly and Redundancy Anomaly do not exist (or in lower rate); meanwhile, the possibility of Correlation Anomaly is at a lower rate. In this regard, the condition DROP all packets must be the last in order. It s possible to prove that Shadow Anomaly did not really exist by using the following equation. The packet meant to match with any rules must be resulted from this Cartesian product. [Destination IP's range] X [Destination Port's range] X [Source IP's range] Note: an X symbolizes a Cartesian product operation. To make it more understandable, the researcher demonstrates the rule as follows. iptables -A --dst-range dport 21:22 --src-range j DROP This rule contains its matching packets including the following 12 packets. 1. DestinationIP= , DestinationPort=21, SourceIP= DestinationIP= , DestinationPort=21, SourceIP= DestinationIP= , DestinationPort=21, SourceIP= DestinationIP= , DestinationPort=22, SourceIP= DestinationIP= , DestinationPort=22, SourceIP= DestinationIP= , DestinationPort=22, SourceIP= DestinationIP= , DestinationPort=21, SourceIP= DestinationIP= , DestinationPort=21, SourceIP= DestinationIP= , DestinationPort=21, SourceIP= DestinationIP= , DestinationPort=22, SourceIP= DestinationIP= , DestinationPort=22, SourceIP= DestinationIP= , DestinationPort=22, SourceIP= Running the Cartesian product results as "Relation" (Relation is subset of Cartesian product of domain); therefore, every single rule on the rule list has its own matching packets. The packet matching with any rule will be a member within the relation resulted from the Cartesian product running on that rule. Indeed, the rule can be mapped to relation by calculating the numbers in each column (e.g. Destination IP, Destination Port, and Source IP, with Action excluded) and running a Cartesian 69

5 product. For example, Rule-1 can be mapped to R1, and Rule-n is mapped to Rn. Based on the analysis, the packets that have arrived at the firewall will firstly match with Rule-1 before Rule-2, so the packets reaching Rule-2 will be a member of R2 R1. Similarly, the packets reaching Rule-n become a member of R(n) - R(n-1)-...-R2-R1. From this model, the existence of Anomaly can be explained as follows. - Shadow Anomaly exists from R(n)-R(n-1)-...-R2-R1, which is an empty set. - Correlation Anomaly exists when R(i) intersecting with R(i+1), not an empty set, and rule-(i) and rule-(i+1) take different actions (The rule swapping will causes a change in the policy) - Redundancy Anomaly exists when R(i) is a subset of R(i+1) and rule-(i) and rule-(i+1) take the same action. The rule structure in Table 1 can be presented as the Rule List with the string's condition that needs to be filtered to prevent the SQL Injection. The result is illustrated in Table 2 but these are only rough formats, not the IPTABLES formats. Table 2. The firewall rules which ready to be implemented as the IPTABLES rule Role-No Destination IP Destination Port Source IP Filter Action 1 WebServer 0-21 Any DROP 2 WebServer 22 Admin ACCEPT 3 WebServer 22! Admin DROP 4 WebServer Any DROP 5 WebServer 80 Any -- DROP 6 WebServer 80 Any or '1'='1 DROP 7 WebServer 80 Any or ''=' DROP 8 WebServer 80 Any ACCEPT 9 WebServer Any DROP 10 MailServer 0-21 Any DROP 11 MailServer 22 Admin ACCEPT 12 MailServer 22! Admin DROP 13 MailServer Any DROP 14 MailServer 25 Any ACCEPT 15 MailServer Any DROP 16 MailServer 143 Internal-IP ACCEPT 17 MailServer 143! Internal-IP DROP 18 MailServer Any DROP 19 Remote-User-IP 22 Any ACCEPT 20 Any 80,443 Internal-IP ACCEPT 21 Any Any Admin ACCEPT 22 Any Any Any DROP From Table 2, if the researcher maps Rule-1 to relation (by running the Cartesian product on Destination IP, Destination Port, and Source IP), it will result as 22 rows of members. Thus, it means that there are 22 packets that match with Rul-1. In contrast, if mapping Rule-2 to relation, it will be found that there is only one packet that matches with Rule-2. When comparing R1 with R2 (R refers to relation resulted from the rule mapping), it was found that R1 intersecting with R2 resulted as an empty set. As a consequence, it can be concluded as follows. - Rule-2 cannot be Shadowed Rule since R2 R1 is not an empty set. - Rule-1 and Rule-2 cannot cause Correlation Anomaly since R1 intersecting with R2 result as an empty set. - Rule-1 is not redundant to Rule-2 because R1 is not a subset of R2. Making each rule dependent (the rule intersection gives an empty set) or namely if R1, R2,, Rn do not overlap one another, the existence of the anomaly within the rule set will be impossible. 70

6 From Table 1, it can be seen that Server1, Server2, ServerN, and Users are the IP addresses or a group of IP address that do not overlap one another. Therefore, although these IP addresses take the Cartesian product with any values in the columns i.e. Destination Port and Source IP, they will not cause the overlapped relations. Theorem: If D1 (Domain1) intersecting with D2 (Domain2) results as an empty set, (D1 X E1 X F1) intersecting with D2 X E2 X F2) also results as an empty set. (Note: E1, E2, F1, and F2 are sample Domains) Similar to designing Server1, Server2, ServerN, and Users as the IP address or a group of IP address that do not overlap one another, the researcher applies the same method with the values in Destination Port and Source Port columns, as presented below (See Table 1 and Table 2). In a final stage, the researcher implemented the same rule in Table 2 as the IPTABLES rule. The result is revealed as shown in Figure 3. Figure 3. Sample of the IPTABLES rule that filter the SQL Injection with the least confliction Note: The presented IPTABLES rule does not include other initializing commands e.g. iptables -F, iptables -P INPUT DROP, and other required commands including NAT (Network Address Translation). Nevertheless, the researcher has designed the last rule to cover all the packets in order to create a 100% packet protection that does not allow the packets to mistakenly be dropped. 4. Rule Development Table 3. the attacking patterns of the SQL Injection SQL Injection Common signatures SQL Injection Common signatures patterns patterns (cont.) ' or 0=0 -- ' or 1 --'" ' or -- or "a"="a or "x"="x or " "=" ' -- ' or '1'='1'-- ' -- or ''=' or ' or 0=0 -- or 0=0 or 'x'='x '=' or 0=0 # -- or a"="a or a or "= or a=a-- ) or (a"="a ) or ( ;shutdown

7 ) or ('a'='a admin'-- ) or ('x'='x hi' or 'a'='a ' or ' hi" or "a"="a " or 'hi' or 'x'='x'; '=' hi" -- hi") or ("a"="a ") or (" hi') or ('a'='a ') or (' or 0=0 -- or 0=0 # or 0=0 -- ' or select * ' or ''=' -- ' or or '1'=1' or ' The researcher has collected the packets used to be attacked by the SQL Injection from various security websites e.g. edeyehack.blogspot.com.au, and etc., and found that there are over 40 attacking patterns of the SQL Injection popularly used. After that, these collected patterns were grouped and examined for the matched sub-patterns (the matched sub-pattern is called the common signature) as presented in Table 3 Next, the researcher analyzed the common signatures to be put in the IPTABLES rule. These common signatures are shown in Table 4 (alphabetically ordered). Table 4. Common signature of the SQL Injection attacking Begin with space ( char(32) ) Not begin with space -- ) or ( ' or ') or (' ' or ' or ' " or ' or "=" or 0=0 ) or ( '=' or ' or " or 0=0 or a From an additional analysis, the researcher found that some common signatures are a subset of other common signatures as presented in Table 5. Subset ' or Table 5. The common signatures as a subset of another signature Superset ' or ' (begin with space) or 0=0 or 0=0 (begin with space) (begin with space) or ' or ' (begin with space) ) or ( ) or ( (begin with space) ') or (' Due to the data in Table 5, all 40 patterns can be reduced into only 10 main patterns. Besides, the data in Table 5 suggests that when needed to be practically implemented, the rule with the common signature as a subset of another signature must be in a prior order to the rule with the common signature as a superset, as the following examples. Rule-1: iptables -A FORWARD -m string --string ) or ( -j DROP Rule-2: iptables -A FORWARD -m string --string ') or ( -j DROP Otherwise, Shadow Anomaly will be exist. 72

8 Filtering the strings of the common signatures will result as an incorrect entry or false positive on the website uploaded with the source code in the computer language such as a packet with the source code inside e.g. if (a1=a2) or (b1=b2), then DoSomething() will be dropped by Rule-1; meanwhile, if (a1='string2') or (b1='string1'), then DoSomething() will be dropped by Rule-2. For the common data, number of false positives was very small. 5. Performance Testing and Analysis The researcher has run the test on the common signatures in Table 5 to find their performance. It was found that each common signature gave different outcomes in terms of the prevention and false positive, as follows. ) or ( gave false positive < 0.01% for common data and 3.42% for Source code in computer language ) or ( gave false positive < 0.01% for common data and 1.83% for Source code in computer language (this pattern begin with space or Char(32)) ') or ( gave false positive < 0.01% for common data and 0.41% for Source code in computer language However, it is possible to reduce the false positive by selecting an appropriate common signature e.g. do not use ) or ( while filtering the string of the IPTABLES rule. The test resulted as presented in Table 6. Common signature (SQL Injection pattern) ' or ' or ' (begin with space) or 0=0 or 0=0 (begin with space) (begin with space) or ' (begin with space) or ' ) or ( ) or ( (begin with space) ') or ( Table 6. Test Result False positive for common data False positive for Source code in computer languages 0.16 % 3.42 % 1.83 % 0.41 % Based on the analysis, it was found that the proposed model provides the benefits in three aspects including the functional speed, the security, and the ease of use and additional implementations. 5.1 Speed In designing each rule after mapped to relation that does not overlap one another, it is possible to move up the rule fluently matched by the packets to be on a prior order without causing the anomaly and changing the policy. Differently, the rule that rarely matched by the packets can be moved down to be on a latter order. From Figure 3, Rule-5, Rule-6, and Rule-7 are the SQL Injection prevention. When delicately considered (based on the strings needed to be filtered and taking the Cartesian product with the 3 mentioned columns), these three rules will be mapped to be an overlapped relations. Nevertheless, the repositioning amongst these rules will not cause the Correlation Anomaly because they take different actions. In trying out using the IPTABLES rule with filtering the common signature 73

9 (SQL Injection patterns), the researcher found that the response time between the client and server has been 3% increased. When testing on a regular computer with the CPU = Intel Core i5 2.4GHz, RAM=8GB, OS=CentOS5.3, to see the difference between a testing without any IPTABLES rue and that with the IPTABLES rule designed by the researcher, it was found that the response time has been increased because the computer that functions as the firewall needs to process the IPTABLES rule and detect the SQL Injection patterns. Still, if using the computer with a more rapid functional speed or with multi CPU, the response time might be decreased. 5.2 Security Practically, the researcher s designed model helps in reducing the possibility of Shadow Anomaly. If the firewall administrator creates a rule to prevent the SQL Injection attacking and put it in a suitable position, he can be sure that the rule entered into the IPTABLES will definitely be processed. In case that the firewall administrator has detected a new pattern of the SQL Injection attacking, he can insert the rule in a proper order e.g. inserting a newly created rule in a range before Rue-5 to those after Rule- 7, as seen appropriate, as shown in Figure 3. In this regard, it is necessary to be aware of the Shadow Anomaly possibly caused by the common signature of the previous rule. 5.3 Ease of Use The researcher s model provides the prevention for the SQL Injection attacking by creating the rule on the IPTABLES and suggesting how to create the rule without causing the anomaly (with a small number of the anomaly). If a user has studied well on anomaly and restrictively follows the researcher s guidance, he will notice that it is very easy to practically implement this SQL Injection prevention model. In addition to the three benefits previously mentioned, it is affirmed that the researcher s model practically helps reduce the cost in purchasing on the expensive additional prevention tools because it is the implementation on Linux. 6. Conclusion and Future works In this study, the researcher purposively presents the model and methods on the SQL Injection attacking prevention by applying the design techniques of the IPTABLES without the rule confliction or with a small number of conflictions. The researcher suggests the IPTABLES to be used in filtering the application-layer data in order to prevent the strings of the SQL Injection attacking. Besides, the researcher demonstrates how to put the rule in a suitable order to prevent Shadow, Correlation, and Redundancy Anomalies and to allow the rule on the SQL Injection attacking prevention line to be processed. Meanwhile, the IPTABLES rule processing will be done more rapidly since it is possible to move up the rules frequently matched with various packets to be on a prior order. Furthermore, a large number of the SQL Injection attacking patterns can be concluded into only 10 patterns so that it helps decreasing the burden on the firewall s CPU. The researcher has run the performance test and found that the response time between the client and server has been 3% increased when comparing between testing without the IPTABLES rule and that with the IPTABLES rule designed by the researcher. Technically, this increased response time could be decreased when the high-performance computer is used as the firewall. Also, the test has been run to find number of false positive and it indicates that the website uploaded with common data is faced with a small number of false positive; lower than 0.01%. In contrast, the website uploaded with the source code encounters a larger number of false positive depending on the SQL Injection attacking patterns. Fortunately, it is possible to reduce a number of false positive if a user applies the appropriate common signatures. 7. Reference [1] [2] [3] Earl Carter, CCSP IPS Exam Certification Guide, Cisco Press, ISBN-10: , [4] Barracuda web application firewall-web application protection against hackers and vulnerabilities, 74

10 from [5] G N V Prasad, V. Siva Parvathi, Signature Based Evaluation to Counter and Prevent Injection Attacks, Asian Journal Of Computer Science And Information Technology, Vol. 1, No. 3, pp.81 85, [6] Theodoor Scholte, Davide Balzarotti and Engin Kirda, Quo Vadis? A Study of the Evolution of Input Validation Vulnerabilities in Web Applications, In Proceedings of the International Conference on Financial Cryptography and Data Security, Saint Lucia, Vol. 7035, pp , [7] B. Indrani, E. Ramaraj, X-Log Authentication Technique to Prevent SQL Injection Attacks, International Journal of Information Technology and Knowledge Management, Vol. 4, No. 1, pp , [8] Khwairakpam Amitab, Padmavati, Comparison of SQL Injection Detection Techniques which uses Chi-Square Test, International Journal of Engineering Science & Technology, Vol. 3 No. 6, pp , [9] Perumalsamy Ramasamy, Sunitha Abburu, SQL Injection Attack Detection and Prevention, International Journal of Engineering Science and Technology (IJEST), Vol. 4, No. 4, pp , [10] K. Ahmad, J. Shekhar and K. P. Yadav, Coalesce Techniques to Secure Web Applications and Databases against SQL Injection Attacks, Electronic Journal of Computer Science and Information Technology (ejcsit), Vol. 3, No. 1, pp.26-39,

The purpose of this report is to educate our prospective clients about capabilities of Hackers Locked.

The purpose of this report is to educate our prospective clients about capabilities of Hackers Locked. This sample report is published with prior consent of our client in view of the fact that the current release of this web application is three major releases ahead in its life cycle. Issues pointed out

More information

EC-Council CAST CENTER FOR ADVANCED SECURITY TRAINING. CAST 619 Advanced SQLi Attacks and Countermeasures. Make The Difference CAST.

EC-Council CAST CENTER FOR ADVANCED SECURITY TRAINING. CAST 619 Advanced SQLi Attacks and Countermeasures. Make The Difference CAST. CENTER FOR ADVANCED SECURITY TRAINING 619 Advanced SQLi Attacks and Countermeasures Make The Difference About Center of Advanced Security Training () The rapidly evolving information security landscape

More information

Linux firewall. Need of firewall Single connection between network Allows restricted traffic between networks Denies un authorized users

Linux firewall. Need of firewall Single connection between network Allows restricted traffic between networks Denies un authorized users Linux firewall Need of firewall Single connection between network Allows restricted traffic between networks Denies un authorized users Linux firewall Linux is a open source operating system and any firewall

More information

Detecting Policy Anomalies in Firewalls by Relational Algebra and Raining 2D-Box Model

Detecting Policy Anomalies in Firewalls by Relational Algebra and Raining 2D-Box Model 94 IJCSNS International Journal of Computer Science and Network Security, VOL.13 No.5, May 2013 Detecting Policy Anomalies in Firewalls by Relational Algebra and Raining 2D-Box Model Naveen Mukkapati,

More information

JOOMLA SECURITY. ireland website design. by Oliver Hummel. ADDRESS Unit 12D, Six Cross Roads Business Park, Waterford City

JOOMLA SECURITY. ireland website design. by Oliver Hummel. ADDRESS Unit 12D, Six Cross Roads Business Park, Waterford City JOOMLA SECURITY by Oliver Hummel ADDRESS Unit 12D, Six Cross Roads Business Park, Waterford City CONTACT Nicholas Butler 051-393524 089-4278112 [email protected] Contents Introduction 3 Installation

More information

DOMAIN NAME SECURITY EXTENSIONS

DOMAIN NAME SECURITY EXTENSIONS DOMAIN NAME SECURITY EXTENSIONS The aim of this paper is to provide information with regards to the current status of Domain Name System (DNS) and its evolution into Domain Name System Security Extensions

More information

Contemporary Web Application Attacks. Ivan Pang Senior Consultant Edvance Limited

Contemporary Web Application Attacks. Ivan Pang Senior Consultant Edvance Limited Contemporary Web Application Attacks Ivan Pang Senior Consultant Edvance Limited Agenda How Web Application Attack impact to your business? What are the common attacks? What is Web Application Firewall

More information

INTRODUCTION TO FIREWALL SECURITY

INTRODUCTION TO FIREWALL SECURITY INTRODUCTION TO FIREWALL SECURITY SESSION 1 Agenda Introduction to Firewalls Types of Firewalls Modes and Deployments Key Features in a Firewall Emerging Trends 2 Printed in USA. What Is a Firewall DMZ

More information

Security Awareness. Wireless Network Security

Security Awareness. Wireless Network Security Security Awareness Wireless Network Security Attacks on Wireless Networks Three-step process Discovering the wireless network Connecting to the network Launching assaults Security Awareness, 3 rd Edition

More information

Network Security Management

Network Security Management Network Security Management TWNIC 2003 Objective Have an overview concept on network security management. Learn how to use NIDS and firewall technologies to secure our networks. 1 Outline Network Security

More information

How To Protect Your Network From Attack From Outside From Inside And Outside

How To Protect Your Network From Attack From Outside From Inside And Outside IT 4823 Information Security Administration Firewalls and Intrusion Prevention October 7 Notice: This session is being recorded. Lecture slides prepared by Dr Lawrie Brown for Computer Security: Principles

More information

Recon and Mapping Tools and Exploitation Tools in SamuraiWTF Report section Nick Robbins

Recon and Mapping Tools and Exploitation Tools in SamuraiWTF Report section Nick Robbins Recon and Mapping Tools and Exploitation Tools in SamuraiWTF Report section Nick Robbins During initial stages of penetration testing it is essential to build a strong information foundation before you

More information

How To Prevent Hacker Attacks With Network Behavior Analysis

How To Prevent Hacker Attacks With Network Behavior Analysis E-Guide Signature vs. anomaly-based behavior analysis News of successful network attacks has become so commonplace that they are almost no longer news. Hackers have broken into commercial sites to steal

More information

CMPT 471 Networking II

CMPT 471 Networking II CMPT 471 Networking II Firewalls Janice Regan, 2006-2013 1 Security When is a computer secure When the data and software on the computer are available on demand only to those people who should have access

More information

A SQL Injection : Internal Investigation of Injection, Detection and Prevention of SQL Injection Attacks

A SQL Injection : Internal Investigation of Injection, Detection and Prevention of SQL Injection Attacks A SQL Injection : Internal Investigation of Injection, Detection and Prevention of SQL Injection Attacks Abhay K. Kolhe Faculty, Dept. Of Computer Engineering MPSTME, NMIMS Mumbai, India Pratik Adhikari

More information

VIDEO intypedia007en LESSON 7: WEB APPLICATION SECURITY - INTRODUCTION TO SQL INJECTION TECHNIQUES. AUTHOR: Chema Alonso

VIDEO intypedia007en LESSON 7: WEB APPLICATION SECURITY - INTRODUCTION TO SQL INJECTION TECHNIQUES. AUTHOR: Chema Alonso VIDEO intypedia007en LESSON 7: WEB APPLICATION SECURITY - INTRODUCTION TO SQL INJECTION TECHNIQUES AUTHOR: Chema Alonso Informática 64. Microsoft MVP Enterprise Security Hello and welcome to Intypedia.

More information

Introduction: 1. Daily 360 Website Scanning for Malware

Introduction: 1. Daily 360 Website Scanning for Malware Introduction: SiteLock scans your website to find and fix any existing malware and vulnerabilities followed by using the protective TrueShield firewall to keep the harmful traffic away for good. Moreover

More information

Security+ Guide to Network Security Fundamentals, Fourth Edition. Chapter 6 Network Security

Security+ Guide to Network Security Fundamentals, Fourth Edition. Chapter 6 Network Security Security+ Guide to Network Security Fundamentals, Fourth Edition Chapter 6 Network Security Objectives List the different types of network security devices and explain how they can be used Define network

More information

Networking Basics and Network Security

Networking Basics and Network Security Why do we need networks? Networking Basics and Network Security Shared Data and Functions Availability Performance, Load Balancing What is needed for a network? ISO 7-Layer Model Physical Connection Wired:

More information

CSC574 - Computer and Network Security Module: Firewalls

CSC574 - Computer and Network Security Module: Firewalls CSC574 - Computer and Network Security Module: Firewalls Prof. William Enck Spring 2013 1 Firewalls A firewall... is a physical barrier inside a building or vehicle, designed to limit the spread of fire,

More information

Application Layer Encryption: Protecting against Application Logic and Session Theft Attacks. Whitepaper

Application Layer Encryption: Protecting against Application Logic and Session Theft Attacks. Whitepaper Application Layer Encryption: Protecting against Application Logic and Session Theft Attacks Whitepaper The security industry has extensively focused on protecting against malicious injection attacks like

More information

Cryptography and Network Security Prof. D. Mukhopadhyay Department of Computer Science and Engineering Indian Institute of Technology, Kharagpur

Cryptography and Network Security Prof. D. Mukhopadhyay Department of Computer Science and Engineering Indian Institute of Technology, Kharagpur Cryptography and Network Security Prof. D. Mukhopadhyay Department of Computer Science and Engineering Indian Institute of Technology, Kharagpur Module No. # 01 Lecture No. # 40 Firewalls and Intrusion

More information

A Decision Maker s Guide to Securing an IT Infrastructure

A Decision Maker s Guide to Securing an IT Infrastructure A Decision Maker s Guide to Securing an IT Infrastructure A Rackspace White Paper Spring 2010 Summary With so many malicious attacks taking place now, securing an IT infrastructure is vital. The purpose

More information

CSE543 - Computer and Network Security Module: Firewalls

CSE543 - Computer and Network Security Module: Firewalls CSE543 - Computer and Network Security Module: Firewalls Professor Trent Jaeger Fall 2010 1 Firewalls A firewall... is a physical barrier inside a building or vehicle, designed to limit the spread of fire,

More information

Firewall implementation and testing

Firewall implementation and testing Firewall implementation and testing Patrik Ragnarsson, Niclas Gustafsson E-mail: [email protected], [email protected] Supervisor: David Byers, [email protected] Project Report for Information

More information

Broadband Phone Gateway BPG510 Technical Users Guide

Broadband Phone Gateway BPG510 Technical Users Guide Broadband Phone Gateway BPG510 Technical Users Guide (Firmware version 0.14.1 and later) Revision 1.0 2006, 8x8 Inc. Table of Contents About your Broadband Phone Gateway (BPG510)... 4 Opening the BPG510's

More information

CS 5410 - Computer and Network Security: Firewalls

CS 5410 - Computer and Network Security: Firewalls CS 5410 - Computer and Network Security: Firewalls Professor Kevin Butler Fall 2015 Firewalls A firewall... is a physical barrier inside a building or vehicle, designed to limit the spread of fire, heat

More information

Firewalls, IDS and IPS

Firewalls, IDS and IPS Session 9 Firewalls, IDS and IPS Prepared By: Dr. Mohamed Abd-Eldayem Ref.: Corporate Computer and Network Security By: Raymond Panko Basic Firewall Operation 2. Internet Border Firewall 1. Internet (Not

More information

CRYPTUS DIPLOMA IN IT SECURITY

CRYPTUS DIPLOMA IN IT SECURITY CRYPTUS DIPLOMA IN IT SECURITY 6 MONTHS OF TRAINING ON ETHICAL HACKING & INFORMATION SECURITY COURSE NAME: CRYPTUS 6 MONTHS DIPLOMA IN IT SECURITY Course Description This is the Ethical hacking & Information

More information

How To Understand A Firewall

How To Understand A Firewall Module II. Internet Security Chapter 6 Firewall Web Security: Theory & Applications School of Software, Sun Yat-sen University Outline 6.1 Introduction to Firewall What Is a Firewall Types of Firewall

More information

Firewall. IPTables and its use in a realistic scenario. José Bateira ei10133 Pedro Cunha ei05064 Pedro Grilo ei09137 FEUP MIEIC SSIN

Firewall. IPTables and its use in a realistic scenario. José Bateira ei10133 Pedro Cunha ei05064 Pedro Grilo ei09137 FEUP MIEIC SSIN Firewall IPTables and its use in a realistic scenario FEUP MIEIC SSIN José Bateira ei10133 Pedro Cunha ei05064 Pedro Grilo ei09137 Topics 1- Firewall 1.1 - How they work? 1.2 - Why use them? 1.3 - NAT

More information

Recommended IP Telephony Architecture

Recommended IP Telephony Architecture Report Number: I332-009R-2006 Recommended IP Telephony Architecture Systems and Network Attack Center (SNAC) Updated: 1 May 2006 Version 1.0 [email protected] This Page Intentionally Left Blank ii Warnings

More information

Firewalls. Firewalls. Idea: separate local network from the Internet 2/24/15. Intranet DMZ. Trusted hosts and networks. Firewall.

Firewalls. Firewalls. Idea: separate local network from the Internet 2/24/15. Intranet DMZ. Trusted hosts and networks. Firewall. Firewalls 1 Firewalls Idea: separate local network from the Internet Trusted hosts and networks Firewall Intranet Router DMZ Demilitarized Zone: publicly accessible servers and networks 2 1 Castle and

More information

Two Novel Server-Side Attacks against Log File in Shared Web Hosting Servers

Two Novel Server-Side Attacks against Log File in Shared Web Hosting Servers Two Novel Server-Side Attacks against Log File in Shared Web Hosting Servers Seyed Ali Mirheidari 1, Sajjad Arshad 2, Saeidreza Khoshkdahan 3, Rasool Jalili 4 1 Computer Engineering Department, Sharif

More information

Firewalls. Chien-Chung Shen [email protected]

Firewalls. Chien-Chung Shen cshen@cis.udel.edu Firewalls Chien-Chung Shen [email protected] The Need for Firewalls Internet connectivity is essential however it creates a threat vs. host-based security services (e.g., intrusion detection), not cost-effective

More information

Analysis of SQL injection prevention using a proxy server

Analysis of SQL injection prevention using a proxy server Computer Science Honours 2005 Project Proposal Analysis of SQL injection prevention using a proxy server By David Rowe Supervisor: Barry Irwin Department of Computer

More information

CS 5410 - Computer and Network Security: Firewalls

CS 5410 - Computer and Network Security: Firewalls CS 5410 - Computer and Network Security: Firewalls Professor Patrick Traynor Spring 2015 Firewalls A firewall... is a physical barrier inside a building or vehicle, designed to limit the spread of fire,

More information

STABLE & SECURE BANK lab writeup. Page 1 of 21

STABLE & SECURE BANK lab writeup. Page 1 of 21 STABLE & SECURE BANK lab writeup 1 of 21 Penetrating an imaginary bank through real present-date security vulnerabilities PENTESTIT, a Russian Information Security company has launched its new, eighth

More information

Chapter 8 Router and Network Management

Chapter 8 Router and Network Management Chapter 8 Router and Network Management This chapter describes how to use the network management features of your ProSafe Dual WAN Gigabit Firewall with SSL & IPsec VPN. These features can be found by

More information

Firewalls Overview and Best Practices. White Paper

Firewalls Overview and Best Practices. White Paper Firewalls Overview and Best Practices White Paper Copyright Decipher Information Systems, 2005. All rights reserved. The information in this publication is furnished for information use only, does not

More information

Considerations In Developing Firewall Selection Criteria. Adeptech Systems, Inc.

Considerations In Developing Firewall Selection Criteria. Adeptech Systems, Inc. Considerations In Developing Firewall Selection Criteria Adeptech Systems, Inc. Table of Contents Introduction... 1 Firewall s Function...1 Firewall Selection Considerations... 1 Firewall Types... 2 Packet

More information

Where every interaction matters.

Where every interaction matters. Where every interaction matters. Peer 1 Vigilant Web Application Firewall Powered by Alert Logic The Open Web Application Security Project (OWASP) Top Ten Web Security Risks and Countermeasures White Paper

More information

Cryptography and network security

Cryptography and network security Cryptography and network security Firewalls slide 1 Firewalls Idea: separate local network from the Internet Trusted hosts and networks Firewall Intranet Router DMZ Demilitarized Zone: publicly accessible

More information

M2M Series Routers. Port Forwarding / DMZ Setup

M2M Series Routers. Port Forwarding / DMZ Setup Introduction Port forwarding enables programs or devices running on your LAN to communicate with the internet as if they were directly connected. Many internet services and applications use designated

More information

How To Set Up An Ip Firewall On Linux With Iptables (For Ubuntu) And Iptable (For Windows)

How To Set Up An Ip Firewall On Linux With Iptables (For Ubuntu) And Iptable (For Windows) Security principles Firewalls and NAT These materials are licensed under the Creative Commons Attribution-Noncommercial 3.0 Unported license (http://creativecommons.org/licenses/by-nc/3.0/) Host vs Network

More information

DMZ Network Visibility with Wireshark June 15, 2010

DMZ Network Visibility with Wireshark June 15, 2010 DMZ Network Visibility with Wireshark June 15, 2010 Ashok Desai Senior Network Specialist Intel Information Technology SHARKFEST 10 Stanford University June 14-17, 2010 Outline Presentation Objective DMZ

More information

Web Forensic Evidence of SQL Injection Analysis

Web Forensic Evidence of SQL Injection Analysis International Journal of Science and Engineering Vol.5 No.1(2015):157-162 157 Web Forensic Evidence of SQL Injection Analysis 針 對 SQL Injection 攻 擊 鑑 識 之 分 析 Chinyang Henry Tseng 1 National Taipei University

More information

Cisco Secure PIX Firewall with Two Routers Configuration Example

Cisco Secure PIX Firewall with Two Routers Configuration Example Cisco Secure PIX Firewall with Two Routers Configuration Example Document ID: 15244 Interactive: This document offers customized analysis of your Cisco device. Contents Introduction Prerequisites Requirements

More information

Guidelines for Web applications protection with dedicated Web Application Firewall

Guidelines for Web applications protection with dedicated Web Application Firewall Guidelines for Web applications protection with dedicated Web Application Firewall Prepared by: dr inŝ. Mariusz Stawowski, CISSP Bartosz Kryński, Imperva Certified Security Engineer INTRODUCTION Security

More information

Penetration Testing Lessons Learned. Security Research

Penetration Testing Lessons Learned. Security Research 1 Penetration Testing Lessons Learned Security Research 2 Who am I? CTO at Immunity, Inc. Privately held information security company Consulting Training Specialized Security Products CANVAS SILICA Based

More information

REQUIREMENTS AND INSTALLATION OF THE NEFSIS DEDICATED SERVER

REQUIREMENTS AND INSTALLATION OF THE NEFSIS DEDICATED SERVER NEFSIS TRAINING SERIES Nefsis Dedicated Server version 5.1.0.XXX Requirements and Implementation Guide (Rev 4-10209) REQUIREMENTS AND INSTALLATION OF THE NEFSIS DEDICATED SERVER Nefsis Training Series

More information

Advanced Web Security, Lab

Advanced Web Security, Lab Advanced Web Security, Lab Web Server Security: Attacking and Defending November 13, 2013 Read this earlier than one day before the lab! Note that you will not have any internet access during the lab,

More information

Workflow Templates Library

Workflow Templates Library Workflow s Library Table of Contents Intro... 2 Active Directory... 3 Application... 5 Cisco... 7 Database... 8 Excel Automation... 9 Files and Folders... 10 FTP Tasks... 13 Incident Management... 14 Security

More information

Firewalls. ITS335: IT Security. Sirindhorn International Institute of Technology Thammasat University ITS335. Firewalls. Characteristics.

Firewalls. ITS335: IT Security. Sirindhorn International Institute of Technology Thammasat University ITS335. Firewalls. Characteristics. ITS335: IT Security Sirindhorn International Institute of Technology Thammasat University Prepared by Steven Gordon on 25 October 2013 its335y13s2l08, Steve/Courses/2013/s2/its335/lectures/firewalls.tex,

More information

Firewalls. Contents. ITS335: IT Security. Firewall Characteristics. Types of Firewalls. Firewall Locations. Summary

Firewalls. Contents. ITS335: IT Security. Firewall Characteristics. Types of Firewalls. Firewall Locations. Summary 2 : IT Security Sirindhorn International Institute of Technology Thammasat University Prepared by Steven Gordon on 25 October 2013 its335y13s2l08, Steve/Courses/2013/s2/its335/lectures/firewalls.tex, r2958

More information

Module: Firewalls. Professor Patrick McDaniel Spring 2009. CMPSC443 - Introduction to Computer and Network Security

Module: Firewalls. Professor Patrick McDaniel Spring 2009. CMPSC443 - Introduction to Computer and Network Security CMPSC443 - Introduction to Computer and Network Security Module: Firewalls Professor Patrick McDaniel Spring 2009 1 Firewalls A firewall... is a physical barrier inside a building or vehicle, designed

More information

Detailed Description about course module wise:

Detailed Description about course module wise: Detailed Description about course module wise: Module 1: Basics of Networking and Major Protocols 1.1 Networks and its Types. 1.2 Network Topologies 1.3 Major Protocols and their Functions 1.4 OSI Reference

More information

Penta Security 3rd Generation Web Application Firewall No Signature Required. www.gasystems.com.au

Penta Security 3rd Generation Web Application Firewall No Signature Required. www.gasystems.com.au Penta Security 3rd Generation Web Application Firewall No Signature Required www.gasystems.com.au 1 1 The Web Presence Demand The Web Still Grows INTERNET USERS 2006 1.2B Internet Users - 18% of 6.5B people

More information

Packet Filtering Rule List Analysis

Packet Filtering Rule List Analysis Filtering List Analysis Chotipat Pornavalai and Thawatchai Chomsiri Faculty of Information Technology, King Mongkut's Institute of Technology Ladkrabang Ladkrabang, Bangkok 10520, Thailand. Abstract: Firewalls

More information

CIS 433/533 - Computer and Network Security Firewalls

CIS 433/533 - Computer and Network Security Firewalls CIS 433/533 - Computer and Network Security Firewalls Professor Kevin Butler Winter 2011 Computer and Information Science Firewalls A firewall... is a physical barrier inside a building or vehicle, designed

More information

Overview. Firewall Security. Perimeter Security Devices. Routers

Overview. Firewall Security. Perimeter Security Devices. Routers Overview Firewall Security Chapter 8 Perimeter Security Devices H/W vs. S/W Packet Filtering vs. Stateful Inspection Firewall Topologies Firewall Rulebases Lecturer: Pei-yih Ting 1 2 Perimeter Security

More information

Volume SYSLOG JUNCTION. User s Guide. User s Guide

Volume SYSLOG JUNCTION. User s Guide. User s Guide Volume 1 SYSLOG JUNCTION User s Guide User s Guide SYSLOG JUNCTION USER S GUIDE Introduction I n simple terms, Syslog junction is a log viewer with graphing capabilities. It can receive syslog messages

More information

74% 96 Action Items. Compliance

74% 96 Action Items. Compliance Compliance Report PCI DSS 2.0 Generated by Check Point Compliance Blade, on July 02, 2013 11:12 AM 1 74% Compliance 96 Action Items Upcoming 0 items About PCI DSS 2.0 PCI-DSS is a legal obligation mandated

More information

COURSE NAME: INFORMATION SECURITY INTERNSHIP PROGRAM

COURSE NAME: INFORMATION SECURITY INTERNSHIP PROGRAM COURSE NAME: INFORMATION SECURITY INTERNSHIP PROGRAM Course Description This is the Information Security Training program. The Training provides you Penetration Testing in the various field of cyber world.

More information

5 Mistakes to Avoid on Your Drupal Website

5 Mistakes to Avoid on Your Drupal Website 5 Mistakes to Avoid on Your Drupal Website Table of Contents Introduction.... 3 Architecture: Content.... 4 Architecture: Display... 5 Architecture: Site or Functionality.... 6 Security.... 8 Performance...

More information

SECURING APACHE : THE BASICS - III

SECURING APACHE : THE BASICS - III SECURING APACHE : THE BASICS - III Securing your applications learn how break-ins occur Shown in Figure 2 is a typical client-server Web architecture, which also indicates various attack vectors, or ways

More information

Reducing Application Vulnerabilities by Security Engineering

Reducing Application Vulnerabilities by Security Engineering Reducing Application Vulnerabilities by Security Engineering - Subash Newton Manager Projects (Non Functional Testing, PT CoE Group) 2008, Cognizant Technology Solutions. All Rights Reserved. The information

More information

From Network Security To Content Filtering

From Network Security To Content Filtering Computer Fraud & Security, May 2007 page 1/10 From Network Security To Content Filtering Network security has evolved dramatically in the last few years not only for what concerns the tools at our disposals

More information

JK0-022 CompTIA Academic/E2C Security+ Certification Exam CompTIA

JK0-022 CompTIA Academic/E2C Security+ Certification Exam CompTIA JK0-022 CompTIA Academic/E2C Security+ Certification Exam CompTIA To purchase Full version of Practice exam click below; http://www.certshome.com/jk0-022-practice-test.html FOR CompTIA JK0-022 Exam Candidates

More information

IP Application Security Manager and. VMware vcloud Air

IP Application Security Manager and. VMware vcloud Air Securing Web Applications with F5 BIG- IP Application Security Manager and VMware vcloud Air D E P L O Y M E N T G U I D E Securing Web Applications Migrating application workloads to the public cloud

More information

CCM 4350 Week 11. Security Architecture and Engineering. Guest Lecturer: Mr Louis Slabbert School of Science and Technology.

CCM 4350 Week 11. Security Architecture and Engineering. Guest Lecturer: Mr Louis Slabbert School of Science and Technology. CCM 4350 Week 11 Security Architecture and Engineering Guest Lecturer: Mr Louis Slabbert School of Science and Technology CCM4350_CNSec 1 Web Server Security The Web is the most visible part of the net

More information

ASL IT SECURITY BEGINNERS WEB HACKING AND EXPLOITATION

ASL IT SECURITY BEGINNERS WEB HACKING AND EXPLOITATION ASL IT SECURITY BEGINNERS WEB HACKING AND EXPLOITATION V 2.0 A S L I T S e c u r i t y P v t L t d. Page 1 Overview: Learn the various attacks like sql injections, cross site scripting, command execution

More information

SQL INJECTION ATTACKS By Zelinski Radu, Technical University of Moldova

SQL INJECTION ATTACKS By Zelinski Radu, Technical University of Moldova SQL INJECTION ATTACKS By Zelinski Radu, Technical University of Moldova Where someone is building a Web application, often he need to use databases to store information, or to manage user accounts. And

More information

Detecting and Exploiting XSS with Xenotix XSS Exploit Framework

Detecting and Exploiting XSS with Xenotix XSS Exploit Framework Detecting and Exploiting XSS with Xenotix XSS Exploit Framework [email protected] keralacyberforce.in Introduction Cross Site Scripting or XSS vulnerabilities have been reported and exploited since 1990s.

More information

Where can I install GFI EventsManager on my network?

Where can I install GFI EventsManager on my network? Installation Introduction Where can I install GFI EventsManager on my network? GFI EventsManager can be installed on any computer which meets the minimum system requirements irrespective of the location

More information

Internet infrastructure. Prof. dr. ir. André Mariën

Internet infrastructure. Prof. dr. ir. André Mariën Internet infrastructure Prof. dr. ir. André Mariën (c) A. Mariën 31/01/2006 Topic Firewalls (c) A. Mariën 31/01/2006 Firewalls Only a short introduction See for instance: Building Internet Firewalls, second

More information

SQL Injection for newbie

SQL Injection for newbie SQL Injection for newbie SQL injection is a security vulnerability that occurs in a database layer of an application. It is technique to inject SQL query/command as an input via web pages. Sometimes we

More information

Mingyu Web Application Firewall (DAS- WAF) - - - All transparent deployment for Web application gateway

Mingyu Web Application Firewall (DAS- WAF) - - - All transparent deployment for Web application gateway Mingyu Web Application Firewall (DAS- WAF) - - - All transparent deployment for Web application gateway All transparent deployment Full HTTPS site defense Prevention of OWASP top 10 Website Acceleration

More information

Microsoft Terminal Server and Citrix Presentation Server Deployment Environments

Microsoft Terminal Server and Citrix Presentation Server Deployment Environments Microsoft Terminal Server and Citrix Presentation Server Deployment Environments Understanding the use of Act! in a Terminal Server or Citrix Presentation Server environment Table of Contents Introduction...

More information

NSFOCUS Web Application Firewall White Paper

NSFOCUS Web Application Firewall White Paper White Paper NSFOCUS Web Application Firewall White Paper By NSFOCUS White Paper - 2014 NSFOCUS NSFOCUS is the trademark of NSFOCUS Information Technology Co., Ltd. NSFOCUS enjoys all copyrights with respect

More information

Firewalls. Test your Firewall knowledge. Test your Firewall knowledge (cont) (March 4, 2015)

Firewalls. Test your Firewall knowledge. Test your Firewall knowledge (cont) (March 4, 2015) s (March 4, 2015) Abdou Illia Spring 2015 Test your knowledge Which of the following is true about firewalls? a) A firewall is a hardware device b) A firewall is a software program c) s could be hardware

More information

Project 2: Firewall Design (Phase I)

Project 2: Firewall Design (Phase I) Project 2: Firewall Design (Phase I) CS 161 - Joseph/Tygar November 12, 2006 1 Edits If we need to make clarifications or corrections to this document after distributing it, we will post a new version

More information

SQL Injection 2.0: Bigger, Badder, Faster and More Dangerous Than Ever. Dana Tamir, Product Marketing Manager, Imperva

SQL Injection 2.0: Bigger, Badder, Faster and More Dangerous Than Ever. Dana Tamir, Product Marketing Manager, Imperva SQL Injection 2.0: Bigger, Badder, Faster and More Dangerous Than Ever Dana Tamir, Product Marketing Manager, Imperva Consider this: In the first half of 2008, SQL injection was the number one attack vector

More information

ΕΠΛ 674: Εργαστήριο 5 Firewalls

ΕΠΛ 674: Εργαστήριο 5 Firewalls ΕΠΛ 674: Εργαστήριο 5 Firewalls Παύλος Αντωνίου Εαρινό Εξάμηνο 2011 Department of Computer Science Firewalls A firewall is hardware, software, or a combination of both that is used to prevent unauthorized

More information

Cyber Security Workshop Ethical Web Hacking

Cyber Security Workshop Ethical Web Hacking Cyber Security Workshop Ethical Web Hacking May 2015 Setting up WebGoat and Burp Suite Hacking Challenges in WebGoat Concepts in Web Technologies and Ethical Hacking 1 P a g e Downloading WebGoat and Burp

More information

DNS REBINDING DENIS BARANOV, POSITIVE TECHNOLOGIES

DNS REBINDING DENIS BARANOV, POSITIVE TECHNOLOGIES DNS REBINDING DENIS BARANOV, POSITIVE TECHNOLOGIES TABLE OF CONTENTS 1 Bypassing The Restrictions 3 2 Putting It into Practice 5 3 Actual Load 7 4 Detection Of The Application Version 5 Guessing A/The

More information

Juniper Secure Analytics Release Notes

Juniper Secure Analytics Release Notes Juniper Secure Analytics Release Notes 2014.5 February 2016 Juniper Networks is pleased to introduce JSA 2014.5. Juniper Secure Analytics (JSA) 2014.5 Release Notes provides new features, known issues

More information

IndusGuard Web Application Firewall Test Drive User Registration

IndusGuard Web Application Firewall Test Drive User Registration IndusGuard Web Application Firewall Test Drive User Registration Document Version 1.0 24/06/2015 Confidentiality INDUSFACE HAS PREPARED THIS DOCUMENT FOR INTERNAL PURPOSE. NEITHER THIS DOCUMENT NOR ITS

More information

Running the SANS Top 5 Essential Log Reports with Activeworx Security Center

Running the SANS Top 5 Essential Log Reports with Activeworx Security Center Running the SANS Top 5 Essential Log Reports with Activeworx Security Center Creating valuable information from millions of system events can be an extremely difficult and time consuming task. Particularly

More information

Web Application Security

Web Application Security Web Application Security John Zaharopoulos ITS - Security 10/9/2012 1 Web App Security Trends Web 2.0 Dynamic Webpages Growth of Ajax / Client side Javascript Hardening of OSes Secure by default Auto-patching

More information

a) Encryption is enabled on the access point. b) The conference room network is on a separate virtual local area network (VLAN)

a) Encryption is enabled on the access point. b) The conference room network is on a separate virtual local area network (VLAN) MIS5206 Week 12 Your Name Date 1. Which significant risk is introduced by running the file transfer protocol (FTP) service on a server in a demilitarized zone (DMZ)? a) User from within could send a file

More information

shortcut Tap into learning NOW! Visit www.informit.com/shortcuts for a complete list of Short Cuts. Your Short Cut to Knowledge

shortcut Tap into learning NOW! Visit www.informit.com/shortcuts for a complete list of Short Cuts. Your Short Cut to Knowledge shortcut Your Short Cut to Knowledge The following is an excerpt from a Short Cut published by one of the Pearson Education imprints. Short Cuts are short, concise, PDF documents designed specifically

More information

Protecting and controlling Virtual LANs by Linux router-firewall

Protecting and controlling Virtual LANs by Linux router-firewall Protecting and controlling Virtual LANs by Linux router-firewall Tihomir Katić Mile Šikić Krešimir Šikić Faculty of Electrical Engineering and Computing University of Zagreb Unska 3, HR 10000 Zagreb, Croatia

More information

This article describes a detailed configuration example that demonstrates how to configure Cyberoam to provide the access of internal resources.

This article describes a detailed configuration example that demonstrates how to configure Cyberoam to provide the access of internal resources. How To Configure Port Forwarding using Virtual Host to access devices on Internal network Applicable to versions 9.5.3 build 14 or above This article describes a detailed configuration example that demonstrates

More information

Securing Web Applications...at the Network Layer

Securing Web Applications...at the Network Layer Securing Web Applications......at the Network Layer OWASP Spain Chapter Meeting 16 th June, 2006 Barcelona (ES) Carlos Fragoso Mariscal Chief Technical Director [email protected] Securing Web Applications

More information