An Anatomy of a web hack: SQL injection explained
|
|
|
- Warren Walsh
- 10 years ago
- Views:
Transcription
1 An Anatomy of a web hack: SQL injection explained By David Strom Founding Editor-in-Chief Network Computing Magazine January 2009 Breach Security, Inc. Corporate Headquarters 2141 Palomar Airport Road, #200 Carlsbad, CA USA tel: (760) toll-free: (866) fax: (760)
2 2 Introduction Allow me to show you how to hack into your own website. You don t need any specialized tools other than a web browser and you don t need any specialized skills either. It doesn t take much time, and the payoffs could be huge: an intruder could easily obtain a copy of your most sensitive data in about the time it takes to read through this analysis. While there are many exploits, none are as simple or as potentially destructive as a SQL injection. This isn t something new, but what is new is how frequent this attack happens and how easily you can protect your network with relatively little effort and cost. Let s walk through what is involved with a SQL injection exploit, using examples of both a website that we found at random as well as one that had previously been compromised with the hackers publicly describing their methods over the Internet. We will show you the consequences of doing nothing and leaving this front door wide open for anyone to walk into your data center. Finally, we will talk about ways that you can prevent this from happening in the future and what choices you have to protect your websites and networks....an intruder could easily obtain a copy of your most sensitive data in about the time it takes to read through this analysis. Today s Threat Landscape It used to be most attacks happened through or remote penetrations into the network. With the improvements in anti-virus protection and greater deployment of firewalls, today s threat landscape is a very different one. In a word, it is all about applications and, in particular, web-based applications that tie into traditional databases and interact with browsers across the Internet. Web applications are inherently vulnerable. Clearly, websites are easy targets. They are exposed to the general Internet, indexed efficiently by Google and other search engines to show vulnerable areas and often overlooked by security specialists. Most intrusion prevention and detection systems allow all web traffic free reign on organizational networks, so that any exploit involving a web server and that originates from a random browser are harder to detect and block. Also, some exploits, such as the SQL injection one that we ll show you shortly, don t involve much in the way of sending and receiving traffic across a network. This makes them harder still to detect and prevent. How Databases and Web Servers Work Together Before we begin our tutorial on SQL injection, a few words about how web and database servers work together. Most databases can be thought of as a collection of tables of information: customer address records in one table and purchase records and inventories of products in two others. For a typical ecommerce customer, a browser is used to start the purchasing process by first finding some product of interest. This kicks off a query of the inventory to see if in stock, and then the web server produces a shopping cart page that shows what items are about to be purchased. Because web servers are stateless, there has to be some way for the server to track what path a browser uses as the shopper moves from page to page on the site and queries these particular databases on their journey to check-out and purchase. Application developers employ a number of techniques to track user session state, including setting cookies on a user s machine, using
3 3 downloaded programs that save the browser state, using customer logins and passwords and storing the web queries in special tables of their own. While we have used the example of an ecommerce site, the issue is more general. There are websites that don t sell anything, but allow visitors access to information, such as the IRS to download particular tax forms, the local community center to see what times it is open to the public or the local library to see if a book is on its shelves. In each case, the browser is requesting information from a particular database, and the web server is used to collect, organize and present the information. As Web 2.0 technologies such as AJAX become pervasive, there is more and more information that is presented to browsers dynamically and more information that originates from databases. In order for all this to work, the request for information is translated from the web server into commands that the database server understands. Think of the web browser as an extended keyboard that is operated across the Internet, but directly connected to your database server in your data center. Indeed, that is a good picture to keep in mind, because by the time a SQL injection exploit is finished, it will seem as if the hacker is directly typing in commands to your servers. The problem is that web developers tend to think that database queries are coming from a trusted source, namely the database server itself. But that isn t always the case, and a hacker or even a casual browser can often take control over the web server by entering commands that appear to be valid SQL commands in the right places. The trick is finding the right places. There are two situations where the web and databases intersect that are relevant for our discussion on SQL injection: Places that directly enter database parameters into the URL itself, or Fill-in forms on web pages that will take this information and pass it along to the database server via the HTTP POST command. Think about this for a moment. There are probably dozens, if not hundreds of places across your various websites that fit these two situations. Can you test them all to make sure your developers did everything possible to lock things down? What about a simple form that sends a password back to a particular address in case a (what you might have thought legitimate) user forgot it? This is a simple and very effective way for a hacker to penetrate your defenses and assemble a very complete picture of your database structure, table names and field names. Let s look at the first situation and give you more context. Before we do, we first need to talk about SQL command syntax. Every database server has a similar series of commands to query its tables, narrow down results to a few specific entries and combine information from one table to another. While a general tutorial on SQL database syntax is outside the scope of this paper, there are a few commands that are easily explained. Here is a typical SQL statement: SELECT some-data FROM some table WHERE some-condition-is-met OR something-else-here Here the WHERE specifies a condition, such as user name is equal to John Jones or an account matches a particular ID number. When this command is given to the database server, it returns the results of this query with all matching items that meet this condition. The some-data portion of the command provides the view of the results with particular database fields, such the name, address, phone number fields in a customer database. If you are thinking of tables, each row in the table is a different data item and each column in the table is the different field for each particular item. Now what does this have to do with the web? When we put this data on the web, we use URLs and forms to assemble the query statements. Here is what a typical URL might look like on a website that has a catalog of things for sale, and just after a user has clicked on a particular item to get more information about it:
4 4 We ll get to what happens when you make changes to the URL in a little bit but, for now, realize that the item or ID number in the URL gets taken by the web server and placed into a SQL query such as the following: SELECT name, description, price FROM itemtable WHERE id=6969 The SQL server returns the name, description and price details as a result, and then passes this information back to the web server, where it is displayed on the page. The same thing happens with a web form: the parameter gets passed from the form to the database server, and then back to the web server for presentation and display. Anatomy of a hack Let s assume that a bad guy wants to get into your databases and steal your customers. How does it work? Simple, they first find you on the Internet via Google or some other search engine. Most database servers can be easily found on Google by searching for the right keywords. There are just a few typical search terms, such as login.asp, asp?id=, php?id= and other statements indicating database queries that are being passed from the web server to the database, including web forms as we mentioned earlier. So we do a search on gov: php?id= and one of the results is this site, dealing with Scotland s biodiversity resources: Now let s browse around the site until we get to a page that has specific information we will see a URL like something below: A hacker would use this information to begin his hack by changing the last part of the URL to the following: And the page would be returned with a slew of error codes. Now, before you get frustrated because of the errors, realize that we are finished with our experiment. The goal with SQL injection is to get error pages, reading the codes like a fortune teller reads tea leaves or lines on your hand. These error codes provide a great deal of rich and important information about the internal structure of the database, the location of resources and even, in some cases, the names of the database fields or other content that can be used to further construct more compromising queries. So what do we know from this very simple experiment? First, that the site is running a program called SiteMark and also running MySQL as its database server. Second, we have the directory where the PHP scripts are located. And even the lines of the program that are generating the errors are shown for us here. All we did was send a single page request to get all this information! We didn t have to learn any new skills, download any hacker tools or do anything other than type in a single line of text. Now, admittedly this isn t a site that is going to attract a significant number of criminals, looking to crack into details about Scotland s rich ecological history. But it shows how easily a hacker can discern internal details about a web application simply by playing around with a search engine. More Serious Stuff Let s take things one step further and demonstrate how databases are actually compromised. We ll use for our guide a Russian web site that posted hacking instructions on how to compromise a U.S. state government website:
5 5 While the site is in Russian, you can translate it automatically using Babel Fish or some other service to get the drift. What you see here is a step-by-step series of instructions on how RI.GOV was penetrated. Of course, since this hacking manual was published, the exploit was removed, but this is a very real demonstration of an actual exploit. The Rhode Island government site contains detailed taxpayer information on property records and other information that could be used by cyber-criminals to perpetrate identity theft. There are two key elements to the Rhode Island attack that are explained in Russian. First, is the way that a hacker adds text to a normal SQL query statement using various characters and commands to trick the database server into delivering actual results, rather than just error messages. Depending on the actual SQL query, you can add database commands to the end of the URL or inside an appropriate web form field: or 1=1-- or 1=1-- or 1=1-- or a = a or a = a ) or ( a = a Each line of text typically starts with a single quote, includes an OR statement and then a statement that is always true (1=1). Taken all together, what we are doing here by appending this text is telling the database server to deliver everything, since we are asking for either a single record or else 1=1 meaning, give us all records. The second element to the Russian instructions are how to take the feedback and error codes generated by the Rhode Island site and use it to further investigate the data structures of the site. The instructions show you how the hacker was able to obtain a series of passwords, pass them through a password cracking utility and gain total access to the database. Subsequent screen images show the hacker using a secure telnet login and gaining access to the server and then to the data itself. Recapping what we have learned so far So what have we learned? All SQL injection attacks begin by modifying or adding text to a vulnerable area on a website: either a URL with an embedded hard-coded query statement or inside an otherwise innocuous web form. Information is then passed to the database server and acted upon. There are two different attack strategies: manipulation of the SQL query string and compromised logins, and both were shown in the Russian instructions. The most well known attack is to modify the WHERE clause of the user authentication statement so the WHERE clause always results in TRUE. A second method is by adding information to the string and therefore a series of new commands, such as by using an Execute command in Microsoft SQL Server. Through a series of attempts, a hacker can gain control over the server with a series of educated guesses and using well-known techniques to send information to the database server and monitor the replies. Once a bad guy has this information, s/he can begin to manipulate your authentication defenses and, at worst, gain total control over your data. But even if this doesn t happen, at the very least, a hacker can find out all sorts of things about your network and database structure. Differences in database servers The various database servers have different features when it comes to two critical areas: the ability to send multiple commands together and the ability to send an executable command. Taken together, this makes it easier for hackers to manipulate query strings and compromise these servers.
6 6 Product Multiple Execute Oracle No No Microsoft SQL server Yes Yes Postgre SQL Yes No As you can see, Microsoft s SQL Server is vulnerable in both areas. Potential protective measures So what can you do to protect your data? Well, short of disconnecting your corporate network from the Internet, there are two basic strategies you can follow First, lock down your database servers to remove any potential backdoors. You should do this in any event, as just basic best security practices. While SQL injection comes in through the front door, you should still practice safe computing and treat your database servers as yet another operating system that requires hardening, similar to what you do with your other servers. Do a better QA job and make sure you validate your input scripts and strings that are sent to the database. It goes almost without saying that developers can t test everything. But you can do a better job of looking at all of your web scripts and programs and testing them for exploits. Do you have range limits for all queries? Do you have the appropriate access rights for all users, including the default rights for web users? Do you apply input validation checks for all places that accept input from the web? One common mistake is not checking stored procedures, thinking they are outside the bounds of SQL injection. Not true. Wherever possible, you should restrict the access of web-based applications to stored procedures and make sure you filter any data that is passed to them to eliminate potential exploits. The key takeaway here: it is best to validate all inputs that come from the web, keeping in mind what SQL injection can do. Better protective measures: WebDefend from Breach Security The problem with all of the above protective measures is that they only work for the moment in time that you implement them. As soon as a developer creates a new web application, you are once again vulnerable. They also are a lot of work to maintain and to enforce, and will require a fair amount of skill to implement properly. These measures also assume that your original web and database developers are still around, still remember what they did and can find their way through their code to make the necessary protective measures. That is oftentimes a tall order, especially given the rate of change in websites these days. There is a better way, and that is why we recommend Breach Security s WebDefend web application security appliance. It is a very cost-effective solution, takes a few minutes to set up, doesn t require any special skills to maintain and will keep your data safe and prevent any SQL injection exploit from ever happening, no matter what applications you create down the road. WebDefend can complete the application development lifecycle by providing real-time, continuous web application protection for production applications with passive vulnerability assessment. WebDefend can block attacks from hackers before they are able to gather enough information to launch a successful targeted attack. WebDefend is able to identify and correlate the events that show an attacker is researching the site, giving organizations the power to see and block sophisticated targeted attacks on the application. WebDefend protects web applications from SQL injection attacks by performing validation on all user input to the application. Each input field or query parameter within the application is identified, typed and specified in the security profile. While validating traffic against an application s security profile, WebDefend will check all user input to ensure that it is the correct data type and has the
7 7 appropriate data length. Also, it will check to see that the data does not include any special characters or SQL commands. WebDefend will prevent any SQL injection attacks against a web application by ensuring that user input is only data with no attempts to circumvent an application s normal behavior. WebDefend is the best solution to protect high-value web applications and the data behind them from targeted web-based attacks. WebDefend provides comprehensive web application protection through an architecture designed to address the spectrum of modern web application threats. Automated, behavior-based security profiles are created and maintained for each web application, ensuring that unique application vulnerabilities are successfully addressed. This positive security model ensures that only acceptable behaviors are allowed, thereby protecting against even unknown threats to the application. Summary So we have shown you how easy it is to penetrate the average website and gain information about the underlying database structures inside a network firewall. The notion of SQL injection isn t new, but is still widely misunderstood and many sites are still vulnerable to attack. By using a security appliance such as WebDefend, along with beefing up security practices for web-accessible data, you can fill these holes in your network security as well as provide for tailored web application-specific security and comprehensive protection against the array of potential web-based threats. About THE Author David Strom is a freelance writer and consultant who has written two books and thousands of articles on networking, security and computing topics. He was founding editor-in-chief for Network Computing magazine and has created and run the editorial operations of dozens of web magazines over his career. He has worked in IT departments of private industry and government, and can be reached at [email protected]. About Breach Security Breach Security, Inc. is the leading provider of real-time, continuous web application integrity, security and compliance that protects sensitive web-based information. Breach Security s products protect web applications from hacking attacks and data leakage and ensure applications operate as intended. The company s products are trusted by thousands of organizations around the world, including leaders in finance, healthcare, ecommerce, travel and government. For more information, contact an authorized Breach Security representative or visit Breach Security, Inc. All rights reserved. Breach Security is a trademark and WebDefend is a registered trademark of Breach Security, Inc. All other brand, product and service names are the trademarks, registered trademarks or service marks of their respective owners. 0109
WHITE PAPER. FortiWeb and the OWASP Top 10 Mitigating the most dangerous application security threats
WHITE PAPER FortiWeb and the OWASP Top 10 PAGE 2 Introduction The Open Web Application Security project (OWASP) Top Ten provides a powerful awareness document for web application security. The OWASP Top
Table of Contents. Page 2/13
Page 1/13 Table of Contents Introduction...3 Top Reasons Firewalls Are Not Enough...3 Extreme Vulnerabilities...3 TD Ameritrade Security Breach...3 OWASP s Top 10 Web Application Security Vulnerabilities
The Weakest Link: Mitigating Web Application Vulnerabilities. webscurity White Paper. webscurity Inc. Minneapolis, Minnesota USA
The Weakest Link: Mitigating Web Application Vulnerabilities webscurity White Paper webscurity Inc. Minneapolis, Minnesota USA January 25, 2007 Contents Executive Summary...3 Introduction...4 Target Audience...4
Web application security Executive brief Managing a growing threat: an executive s guide to Web application security.
Web application security Executive brief Managing a growing threat: an executive s guide to Web application security. Danny Allan, strategic research analyst, IBM Software Group Contents 2 Introduction
STABLE & SECURE BANK lab writeup. Page 1 of 21
STABLE & SECURE BANK lab writeup 1 of 21 Penetrating an imaginary bank through real present-date security vulnerabilities PENTESTIT, a Russian Information Security company has launched its new, eighth
Testing Web Applications for SQL Injection Sam Shober [email protected]
Testing Web Applications for SQL Injection Sam Shober [email protected] Abstract: This paper discusses the SQL injection vulnerability, its impact on web applications, methods for pre-deployment and
Integrating Single Sign-on Across the Cloud By David Strom
Integrating Single Sign-on Across the Cloud By David Strom TABLE OF CONTENTS Introduction 1 Access Control: Web and SSO Gateways 2 Web Gateway Key Features 2 SSO Key Features 3 Conclusion 5 Author Bio
WEB SECURITY CONCERNS THAT WEB VULNERABILITY SCANNING CAN IDENTIFY
WEB SECURITY CONCERNS THAT WEB VULNERABILITY SCANNING CAN IDENTIFY www.alliancetechpartners.com WEB SECURITY CONCERNS THAT WEB VULNERABILITY SCANNING CAN IDENTIFY More than 70% of all websites have vulnerabilities
SECURING APACHE : THE BASICS - III
SECURING APACHE : THE BASICS - III Securing your applications learn how break-ins occur Shown in Figure 2 is a typical client-server Web architecture, which also indicates various attack vectors, or ways
Application and Database Security with F5 BIG-IP ASM and IBM InfoSphere Guardium
Application and Database Security with F5 BIG-IP ASM and IBM InfoSphere Guardium Organizations need an end-to-end web application and database security solution to protect data, customers, and their businesses.
What Do You Mean My Cloud Data Isn t Secure?
Kaseya White Paper What Do You Mean My Cloud Data Isn t Secure? Understanding Your Level of Data Protection www.kaseya.com As today s businesses transition more critical applications to the cloud, there
Secure Web Application Coding Team Introductory Meeting December 1, 2005 1:00 2:00PM Bits & Pieces Room, Sansom West Room 306 Agenda
Secure Web Application Coding Team Introductory Meeting December 1, 2005 1:00 2:00PM Bits & Pieces Room, Sansom West Room 306 Agenda 1. Introductions for new members (5 minutes) 2. Name of group 3. Current
EC-Council CAST CENTER FOR ADVANCED SECURITY TRAINING. CAST 619 Advanced SQLi Attacks and Countermeasures. Make The Difference CAST.
CENTER FOR ADVANCED SECURITY TRAINING 619 Advanced SQLi Attacks and Countermeasures Make The Difference About Center of Advanced Security Training () The rapidly evolving information security landscape
3. Broken Account and Session Management. 4. Cross-Site Scripting (XSS) Flaws. Web browsers execute code sent from websites. Account Management
What is an? s Ten Most Critical Web Application Security Vulnerabilities Anthony LAI, CISSP, CISA Chapter Leader (Hong Kong) [email protected] Open Web Application Security Project http://www.owasp.org
Web Application Security
E-SPIN PROFESSIONAL BOOK Vulnerability Management Web Application Security ALL THE PRACTICAL KNOW HOW AND HOW TO RELATED TO THE SUBJECT MATTERS. COMBATING THE WEB VULNERABILITY THREAT Editor s Summary
Beyond the Hype: Advanced Persistent Threats
Advanced Persistent Threats and Real-Time Threat Management The Essentials Series Beyond the Hype: Advanced Persistent Threats sponsored by Dan Sullivan Introduction to Realtime Publishers by Don Jones,
Network and Host-based Vulnerability Assessment
Network and Host-based Vulnerability Assessment A guide for information systems and network security professionals 6600 Peachtree-Dunwoody Road 300 Embassy Row Atlanta, GA 30348 Tel: 678.443.6000 Toll-free:
White Paper. Blindfolded SQL Injection
White Paper In the past few years, SQL Injection attacks have been on the rise. The increase in the number of Database based applications, combined with various publications that explain the problem and
N-CAP Users Guide Everything You Need to Know About Using the Internet! How Firewalls Work
N-CAP Users Guide Everything You Need to Know About Using the Internet! How Firewalls Work How Firewalls Work By: Jeff Tyson If you have been using the internet for any length of time, and especially if
Manipulating Microsoft SQL Server Using SQL Injection
Manipulating Microsoft SQL Server Using SQL Injection Author: Cesar Cerrudo ([email protected]) APPLICATION SECURITY, INC. WEB: E-MAIL: [email protected] TEL: 1-866-9APPSEC 1-212-947-8787 INTRODUCTION
Using Foundstone CookieDigger to Analyze Web Session Management
Using Foundstone CookieDigger to Analyze Web Session Management Foundstone Professional Services May 2005 Web Session Management Managing web sessions has become a critical component of secure coding techniques.
Web Application Vulnerabilities and Avoiding Application Exposure
Web Application Vulnerabilities and Avoiding Application Exposure The introduction of BIG-IP Application Security Manager (ASM) version 9.4.2 marks a major step forward. BIG-IP ASM now offers more features
Secure and Safe Computing Primer Examples of Desktop and Laptop standards and guidelines
Secure and Safe Computing Primer Examples of Desktop and Laptop standards and guidelines 1. Implement anti-virus software An anti-virus program is necessary to protect your computer from malicious programs,
Application Security Testing. Generic Test Strategy
Application Security Testing Generic Test Strategy Page 2 of 8 Contents 1 Introduction 3 1.1 Purpose: 3 1.2 Application Security Testing: 3 2 Audience 3 3 Test Strategy guidelines 3 3.1 Authentication
Common Security Vulnerabilities in Online Payment Systems
Common Security Vulnerabilities in Online Payment Systems Author- Hitesh Malviya(Information Security analyst) Qualifications: C!EH, EC!SA, MCITP, CCNA, MCP Current Position: CEO at HCF Infosec Limited
SQL Injection for newbie
SQL Injection for newbie SQL injection is a security vulnerability that occurs in a database layer of an application. It is technique to inject SQL query/command as an input via web pages. Sometimes we
ICTN 4040. Enterprise Database Security Issues and Solutions
Huff 1 ICTN 4040 Section 001 Enterprise Information Security Enterprise Database Security Issues and Solutions Roger Brenton Huff East Carolina University Huff 2 Abstract This paper will review some of
Complete Web Application Security. Phase1-Building Web Application Security into Your Development Process
Complete Web Application Security Phase1-Building Web Application Security into Your Development Process Table of Contents Introduction 3 Thinking of security as a process 4 The Development Life Cycle
Analysis of SQL injection prevention using a proxy server
Computer Science Honours 2005 Project Proposal Analysis of SQL injection prevention using a proxy server By David Rowe Supervisor: Barry Irwin Department of Computer
10 Things Every Web Application Firewall Should Provide Share this ebook
The Future of Web Security 10 Things Every Web Application Firewall Should Provide Contents THE FUTURE OF WEB SECURITY EBOOK SECTION 1: The Future of Web Security SECTION 2: Why Traditional Network Security
Barracuda Web Site Firewall Ensures PCI DSS Compliance
Barracuda Web Site Firewall Ensures PCI DSS Compliance E-commerce sales are estimated to reach $259.1 billion in 2007, up from the $219.9 billion earned in 2006, according to The State of Retailing Online
Cyber Security: Beginners Guide to Firewalls
Cyber Security: Beginners Guide to Firewalls A Non-Technical Guide Essential for Business Managers Office Managers Operations Managers This appendix is a supplement to the Cyber Security: Getting Started
Why The Security You Bought Yesterday, Won t Save You Today
9th Annual Courts and Local Government Technology Conference Why The Security You Bought Yesterday, Won t Save You Today Ian Robertson Director of Information Security Michael Gough Sr. Risk Analyst About
Web Application Security Considerations
Web Application Security Considerations Eric Peele, Kevin Gainey International Field Directors & Technology Conference 2006 May 21 24, 2006 RTI International is a trade name of Research Triangle Institute
Symantec Protection Suite Enterprise Edition for Servers Complete and high performance protection where you need it
Complete and high performance protection where you need it Overview delivers high-performance protection against physical and virtual server downtime with policy based prevention, using multiple protection
Is Drupal secure? A high-level perspective on web vulnerabilities, Drupal s solutions, and how to maintain site security
Is Drupal secure? A high-level perspective on web vulnerabilities, Drupal s solutions, and how to maintain site security Presented 2009-05-29 by David Strauss Thinking Securely Security is a process, not
Hack Your SQL Server Database Before the Hackers Do
Note: This article was edited in Oct. 2013, from numerous Web Sources. TJS At the Install: The default install for SQL server makes it is as secure as it will ever be. DBAs and developers will eventually
Streamlining Web and Email Security
How to Protect Your Business from Malware, Phishing, and Cybercrime The SMB Security Series Streamlining Web and Email Security sponsored by Introduction to Realtime Publishers by Don Jones, Series Editor
Integrated Network Vulnerability Scanning & Penetration Testing SAINTcorporation.com
SAINT Integrated Network Vulnerability Scanning and Penetration Testing www.saintcorporation.com Introduction While network vulnerability scanning is an important tool in proactive network security, penetration
Advanced Web Security, Lab
Advanced Web Security, Lab Web Server Security: Attacking and Defending November 13, 2013 Read this earlier than one day before the lab! Note that you will not have any internet access during the lab,
MONTHLY WEBSITE MAINTENANCE PACKAGES
MONTHLY WEBSITE MAINTENANCE PACKAGES The security and maintenance of your website is serious business, and what you don t know can certainly hurt you. A hacked or spamvertised site can wreak havoc on search
This session was presented by Jim Stickley of TraceSecurity on Wednesday, October 23 rd at the Cyber Security Summit.
The hidden risks of mobile applications This session was presented by Jim Stickley of TraceSecurity on Wednesday, October 23 rd at the Cyber Security Summit. To learn more about TraceSecurity visit www.tracesecurity.com
The New PCI Requirement: Application Firewall vs. Code Review
The New PCI Requirement: Application Firewall vs. Code Review The Imperva SecureSphere Web Application Firewall meets the new PCI requirement for an application layer firewall. With the highest security
KASPERSKY SECURITY INTELLIGENCE SERVICES. EXPERT SERVICES. www.kaspersky.com
KASPERSKY SECURITY INTELLIGENCE SERVICES. EXPERT SERVICES www.kaspersky.com EXPERT SERVICES Expert Services from Kaspersky Lab are exactly that the services of our in-house experts, many of them global
defending against advanced persistent threats: strategies for a new era of attacks agility made possible
defending against advanced persistent threats: strategies for a new era of attacks agility made possible security threats as we know them are changing The traditional dangers IT security teams have been
THE OPEN UNIVERSITY OF TANZANIA
THE OPEN UNIVERSITY OF TANZANIA Institute of Educational and Management Technologies COURSE OUTLINES FOR DIPLOMA IN COMPUTER SCIENCE 2 nd YEAR (NTA LEVEL 6) SEMESTER I 06101: Advanced Website Design Gather
Radware s Behavioral Server Cracking Protection
Radware s Behavioral Server Cracking Protection A DefensePro Whitepaper By Renaud Bidou Senior Security Specialist,Radware October 2007 www.radware.com Page - 2 - Table of Contents Abstract...3 Information
elearning for Secure Application Development
elearning for Secure Application Development Curriculum Application Security Awareness Series 1-2 Secure Software Development Series 2-8 Secure Architectures and Threat Modeling Series 9 Application Security
The Top Web Application Attacks: Are you vulnerable?
QM07 The Top Web Application Attacks: Are you vulnerable? John Burroughs, CISSP Sr Security Architect, Watchfire Solutions [email protected] Agenda Current State of Web Application Security Understanding
Making Database Security an IT Security Priority
Sponsored by Oracle Making Database Security an IT Security Priority A SANS Whitepaper November 2009 Written by Tanya Baccam Security Strategy Overview Why a Database Security Strategy? Making Databases
Check list for web developers
Check list for web developers Requirement Yes No Remarks 1. Input Validation 1.1) Have you done input validation for all the user inputs using white listing and/or sanitization? 1.2) Does the input validation
WEB ATTACKS AND COUNTERMEASURES
WEB ATTACKS AND COUNTERMEASURES February 2008 The Government of the Hong Kong Special Administrative Region The contents of this document remain the property of, and may not be reproduced in whole or in
DEFENSE THROUGHOUT THE VULNERABILITY LIFE CYCLE WITH ALERT LOGIC THREAT AND LOG MANAGER
DEFENSE THROUGHOUT THE VULNERABILITY LIFE CYCLE WITH ALERT LOGIC THREAT AND Introduction > New security threats are emerging all the time, from new forms of malware and web application exploits that target
WHITE PAPER FORTIWEB WEB APPLICATION FIREWALL. Ensuring Compliance for PCI DSS 6.5 and 6.6
WHITE PAPER FORTIWEB WEB APPLICATION FIREWALL Ensuring Compliance for PCI DSS 6.5 and 6.6 CONTENTS 04 04 06 08 11 12 13 Overview Payment Card Industry Data Security Standard PCI Compliance for Web Applications
How Your Current IT Security System Might Be Leaving You Exposed TAKEAWAYS CHALLENGES WHITE PAPER
WHITE PAPER CHALLENGES Protecting company systems and data from costly hacker intrusions Finding tools and training to affordably and effectively enhance IT security Building More Secure Companies (and
WatchGuard Technologies, Inc. 505 Fifth Avenue South Suite 500, Seattle, WA 98104 www.watchguard.com
SMALL BUSINESS NETWORK SECURITY GUIDE WHY A REAL FIREWALL PROVIDES THE BEST NETWORK PROTECTION AUGUST 2004 SMALL BUSINESS NETWORK SECURITY GUIDE: WHY A REAL FIREWALL PROVIDES THE BEST NETWORK PROTECTION
Cisco IPS Tuning Overview
Cisco IPS Tuning Overview Overview Increasingly sophisticated attacks on business networks can impede business productivity, obstruct access to applications and resources, and significantly disrupt communications.
Security Threat Kill Chain What log data would you need to identify an APT and perform forensic analysis?
Security Threat Kill Chain What log data would you need to identify an APT and perform forensic analysis? This paper presents a scenario in which an attacker attempts to hack into the internal network
Today s Topics. Protect - Detect - Respond A Security-First Strategy. HCCA Compliance Institute April 27, 2009. Concepts.
Protect - Detect - Respond A Security-First Strategy HCCA Compliance Institute April 27, 2009 1 Today s Topics Concepts Case Study Sound Security Strategy 2 1 Security = Culture!! Security is a BUSINESS
References NYS Office of Cyber Security and Critical Infrastructure Coordination Best Practices and Assessment Tools for the Household
This appendix is a supplement to the Cyber Security: Getting Started Guide, a non-technical reference essential for business managers, office managers, and operations managers. This appendix is one of
Securing Your Web Application against security vulnerabilities. Ong Khai Wei, IT Specialist, Development Tools (Rational) IBM Software Group
Securing Your Web Application against security vulnerabilities Ong Khai Wei, IT Specialist, Development Tools (Rational) IBM Software Group Agenda Security Landscape Vulnerability Analysis Automated Vulnerability
Web Application Report
Web Application Report This report includes important security information about your Web Application. Security Report This report was created by IBM Rational AppScan 8.5.0.1 11/14/2012 8:52:13 AM 11/14/2012
Where every interaction matters.
Where every interaction matters. Peer 1 Vigilant Web Application Firewall Powered by Alert Logic The Open Web Application Security Project (OWASP) Top Ten Web Security Risks and Countermeasures White Paper
INTEGRATION GUIDE. DIGIPASS Authentication for Salesforce using IDENTIKEY Federation Server
INTEGRATION GUIDE DIGIPASS Authentication for Salesforce using IDENTIKEY Federation Server Disclaimer Disclaimer of Warranties and Limitation of Liabilities All information contained in this document is
Web Security School Final Exam
Web Security School Final Exam By Michael Cobb 1.) Which of the following services is not required to run a Windows server solely configured to run IIS and publish a Web site on the Internet? a. IIS Admin
OWASP and OWASP Top 10 (2007 Update) OWASP. The OWASP Foundation. Dave Wichers. The OWASP Foundation. OWASP Conferences Chair dave.wichers@owasp.
and Top 10 (2007 Update) Dave Wichers The Foundation Conferences Chair [email protected] COO, Aspect Security [email protected] Copyright 2007 - The Foundation This work is available
Cyber Security Beginners Guide to Firewalls A Non-Technical Guide
Cyber Security Beginners Guide to Firewalls A Non-Technical Guide Essential for Business Managers Office Managers Operations Managers Multi-State Information Sharing and Analysis Center (MS-ISAC) U.S.
Protect Your IT Infrastructure from Zero-Day Attacks and New Vulnerabilities
Protect Your IT Infrastructure from Zero-Day Attacks and New Vulnerabilities Protecting a business s IT infrastructure is complex. Take, for example, a retailer operating a standard multi-tier infrastructure
AVOIDING ONLINE THREATS CYBER SECURITY MYTHS, FACTS, TIPS. ftrsecure.com
AVOIDING ONLINE THREATS CYBER SECURITY MYTHS, FACTS, TIPS ftrsecure.com Can You Separate Myths From Facts? Many Internet myths still persist that could leave you vulnerable to internet crimes. Check out
5 Simple Steps to Secure Database Development
E-Guide 5 Simple Steps to Secure Database Development Databases and the information they hold are always an attractive target for hackers looking to exploit weaknesses in database applications. This expert
Web Applications Security: SQL Injection Attack
Web Applications Security: SQL Injection Attack S. C. Kothari CPRE 556: Lecture 8, February 2, 2006 Electrical and Computer Engineering Dept. Iowa State University SQL Injection: What is it A technique
EXTRA. Vulnerability scanners are indispensable both VULNERABILITY SCANNER
Vulnerability scanners are indispensable both for vulnerability assessments and penetration tests. One of the first things a tester does when faced with a network is fire up a network scanner or even several
SOAP Web Services Attacks
SOAP Web Services Attacks Part 1 Introduction and Simple Injection Are your web applications vulnerable? by Sacha Faust Table of Contents Introduction... 1 Background... 1 Limitations...1 Understanding
ITEC441- IS Security. Chapter 15 Performing a Penetration Test
1 ITEC441- IS Security Chapter 15 Performing a Penetration Test The PenTest A penetration test (pentest) simulates methods that intruders use to gain unauthorized access to an organization s network and
Penetration Testing Service. By Comsec Information Security Consulting
Penetration Testing Service By Consulting February, 2007 Background The number of hacking and intrusion incidents is increasing year by year as technology rolls out. Equally, there is no hiding place your
AIRDEFENSE SOLUTIONS PROTECT YOUR WIRELESS NETWORK AND YOUR CRITICAL DATA SECURITY AND COMPLIANCE
AIRDEFENSE SOLUTIONS PROTECT YOUR WIRELESS NETWORK AND YOUR CRITICAL DATA SECURITY AND COMPLIANCE THE CHALLENGE: SECURE THE OPEN AIR Wirelesss communication lets you take your business wherever your customers,
Rational AppScan & Ounce Products
IBM Software Group Rational AppScan & Ounce Products Presenters Tony Sisson and Frank Sassano 2007 IBM Corporation IBM Software Group The Alarming Truth CheckFree warns 5 million customers after hack http://infosecurity.us/?p=5168
[state of the internet] / SEO Attacks. Threat Advisory: Continuous Uptick in SEO Attacks
TLP: GREEN Issue Date: 1.12.16 Threat Advisory: Continuous Uptick in SEO Attacks Risk Factor High The Akamai Threat Research Team has identified a highly sophisticated Search Engine Optimization (SEO)
Marble & MobileIron Mobile App Risk Mitigation
Marble & MobileIron Mobile App Risk Mitigation SOLUTION GUIDE Enterprise users routinely expose their employers data and threaten network security by unknowingly installing malicious mobile apps onto their
Computer Security Self-Test: Questions & Scenarios
Computer Security Self-Test: Questions & Scenarios Rev. Sept 2015 Scenario #1: Your supervisor is very busy and asks you to log into the HR Server using her user-id and password to retrieve some reports.
A Database Security Management White Paper: Securing the Information Business Relies On. November 2004
A Database Security Management White Paper: Securing the Information Business Relies On November 2004 IPLocks, Inc. 441-A W. Trimble Road, San Jose, CA 95131 USA A Database Security Management White Paper:
PCI Data Security Standards (DSS)
ENTERPRISE APPLICATION WHITELISTING SOLUTION Achieving PCI Compliance at the Point of Sale Using Bit9 Parity TM to Protect Cardholder Data PCI: Protecting Cardholder Data As the technology used by merchants
FINAL DoIT 11.03.2015 - v.4 PAYMENT CARD INDUSTRY DATA SECURITY STANDARDS APPLICATION DEVELOPMENT AND MAINTENANCE PROCEDURES
Purpose: The Department of Information Technology (DoIT) is committed to developing secure applications. DoIT s System Development Methodology (SDM) and Application Development requirements ensure that
IP Application Security Manager and. VMware vcloud Air
Securing Web Applications with F5 BIG- IP Application Security Manager and VMware vcloud Air D E P L O Y M E N T G U I D E Securing Web Applications Migrating application workloads to the public cloud
Enterprise-Grade Security from the Cloud
Datasheet Website Security Enterprise-Grade Security from the Cloud Unmatched web application security experience, enhanced by real-time big data analytics, enables Incapsula to provide best-of-breed security
Why Device Fingerprinting Provides Better Network Security than IP Blocking. How to transform the economics of hacking in your favor
Why Device Fingerprinting Provides Better Network Security than IP Blocking How to transform the economics of hacking in your favor Why Device Fingerprinting Provides Better Network Security than IP Blocking
Protecting Your Organisation from Targeted Cyber Intrusion
Protecting Your Organisation from Targeted Cyber Intrusion How the 35 mitigations against targeted cyber intrusion published by Defence Signals Directorate can be implemented on the Microsoft technology
Chapter 28: Expanding Web Studio
CHAPTER 25 - SAVING WEB SITES TO THE INTERNET Having successfully completed your Web site you are now ready to save (or post, or upload, or ftp) your Web site to the Internet. Web Studio has three ways
JOOMLA SECURITY. ireland website design. by Oliver Hummel. ADDRESS Unit 12D, Six Cross Roads Business Park, Waterford City
JOOMLA SECURITY by Oliver Hummel ADDRESS Unit 12D, Six Cross Roads Business Park, Waterford City CONTACT Nicholas Butler 051-393524 089-4278112 [email protected] Contents Introduction 3 Installation
