INFORMATION SECURITY - PRACTICAL ASSESSMENT - TP2 - BASICS IN WEB EXPLOITATION
|
|
|
- Darrell Ferguson
- 10 years ago
- Views:
Transcription
1 INFORMATION SECURITY - PRACTICAL ASSESSMENT - TP2 - BASICS IN WEB EXPLOITATION GRENOBLE INP ENSIMAG COMPUTER SCIENCE 3RD YEAR SIF-LOAD - 1ST SEMESTER, 2011 Lecturers: Fabien Duchene - Karim Hossen firstname.lastname [ at ] imag.fr NOTE: Practical assessment regarding the course we had on Thu. 29th, September 2011 and regarding the chapter 1.2. web vulnerabilities common_vulnerabilities_and_attacks-chapter_1-web.pdf. It is due for Tuesday 18th, October pm59. This practical assessment will give you some methods used by security professionals to exploit WEB VUL- NERABILITIES. This is an introduction to such exploitation techniques. Goals: get familiar with the Backtrack pen-testing distribution Exploit web vulnerabilities: path traversal, blind sql injection, stored xss, reflected xss Perform a basic risk analysis 1 Requirements: hypervisor and virtual machine image Download the hypervisor for your platform from Install it on your laptop Download the virtual machine image from import it into VirtualBox (follow the instructions at VirtualBox-) save a snapshot of the virtual machine (in its turned off state) launch the virtual machine Log-on using those credentials (username / password): ensimag-student / ensimag-student (for TP2-web-application exploitation.7z) Warning: i forgot to change the keyboard mapping (I am used to type in QWERTY..). Thus, at the first logon screen, in case you are using an azerty keyboard, please type ensi,qg)student and then also the same for the password If you want to start the GUI
2 2 1 s t a r t x For this practical assessment, you will work on the web applications located in on the virtual machine IMPORTANT NOTES Deliverables: your report (.txt /.pdf) (accepted languages: french FR-FR or english EN-UK / EN-US) (may be inside your report): how you would rate that assessment: how many (efficient) hours you did spend on that assessment? what you enjoyed? what you did not enjoy? what was easy? what was hard? any suggestion Each time you use a command related to a pentesting tool: write the command and the most relevant part of the output... in your report! In case of an error, or a question, please send an to your teachers and write the question at exploitations_and_basic_risk_analysis Before starting run start assessment.sh (on the virtual machine desktop)
3 3 1. (Bonus question) What is the name of that guy? (Hint: it might not be as simple as you might think...) 2 Ex 1 - BackTrack? 2. That Backtrack version 5.1: to which operating system family does it belong? [provide YOUR command and its execution result] what is the underlying distribution of that BT5.1? [provide YOUR command and its execution result] 3. Pen-testing executables location: list the content of / [provide YOUR command and its execution result] which directory(ies) do(es) seem particularly interesting for the current practical assessment? then within one of the following subfolders (web, enumeration/www, enumeration/web) of the previous interesting directory, randomly choose 1 tool and briefly describe its purpose. 3 Ex0 - PedrO has the LFI magic! 4. Briefly remind what is a path traversal, and a local file inclusion
4 4 5. Observe the application Now we do focus on the inputs that the attacker is able to control. (a) Have a look at that brief reminder of the relevant fields of an HTTP request Which inputs do seems the most relevant in the Request-line and the Request-headers? (among each field of GET, POST parameters, cookies, HTTP request headers) (b) Which entity does send them? (c) Now, we will use the Firefox browser add-on live HTTP headers launch it: Firefox > Tools > Live HTTP Headers capture the HTTP headers of the request GET using the Replay function of that add-on, change the fields in the request that you think are most relevant, and observe the difference between the different pages. can you propose a formula giving the changing parts of the webpage output depending of the request inputs? what knowledge did you gain regarding the files that are included when that webpage is rendered? Hint1: Pedro is an international guy, thus his website is available in english and in french. Hint2: have a look at the request headers 6. Goal: performing a LFI attack, get the content of easter-eggs/ex0-secret.b64, that is located somewhere on the webserver (and that is not directly readable by visitors) Tool 0: Firefox browser add-on live HTTP headers (a) indicate the most relevant part of your request query (b) what is the content of the easter-eggs/ex0-secret.b64 file?
5 5 7. Now instead of that Firefox add, we will use Tool 1: Burp. The goal is the very same than the previous question. Burp Proxy is an intercepting proxy server for security testing of web applications. It operates as a man-in-the-middle between your browser and the target application (a) write a brief schema explaining the relationships between the browser, burp and the web-server (also write how they are connected (TCP, UDP) and on which ip:port) (b) configure Firefox and Burp to work together: start Burp: Backtrack > Vulnerability Assessment > Web Application Assessment > Web Application Proxies > burpsuite proxy > options > check running on the line where 8080 is written configure Firefox to use Burp as a proxy: in the navigation bar, type about:config configure the values as show below: now from Firefox, load Burp will intercept the packet and let you modify it:
6 6 (c) Modify and Forward the request so that the browser will display the content of eastereggs/ex0-secret.b64 [provide a screenshot of YOUR work] (the upper red rectangle in the screenshot)
7 7 8. What is the secret message that PedrO did store? (ie the clear-text message from the.b64 file) 4 Ex1 - please XSS and SQLi me! PHPList is A newsletter manager which allows you to add and manage users along with creating and newsletters. (PHP, MySQL). Ciss Had-Minh is the system administrator of that platform, and he is concerned by its security. Please do your best to find security holes in that application! Run Firefox and load the webpage and then the ex1 webpage 4.1 Step 0: information gathering tell me who you are basic information gathering Regarding the webpage (a) Perform a full OS detection using nmap [provide YOUR command and its execution result] (b) Using httprint, located in /pentest/enumeration/www/httprint/linux/httprint, perform a basic webserver detection [provide YOUR command and its execution result] (c) Using whatweb, located in /pentest/enumeration/web/whatweb, indicate [provide YOUR command and its execution result] the PHP interpreter version the PHPList newsletter manager version (d) Without being authenticated in the application and without using anything else than Firefox (and without using any plugin nor add-on), explain how you find: the PHPList version on the homepage the Web-Server software used, its version and the base operating system What kind of vulnerability did allow you to determine this? 4.2 XSS fever.. we are legion! Ciss heard very few about Cross Site Scripting issues. Explain a bit more to him: 10. (a) Briefly remind the names of the 3 XSS types that we saw during the lecture. (b) Describe the type 1 and 2 within 1 or 2 sentences for each Ciss did considered only the following threat: an administrator would get his session ticket stolen He will consider a XSS as being successful if he is able to run at least one javascript function Attack1: Users stealing administrators credentials 11. Observe how normal users (ie non administrator ones) can interact with the application ex1/, and explain why the Attack1 does not seem possible: (a) which inputs could be controlled by users willing to (un)subscribe to mailing-lists? (b) indicate the tests you made (meaning which concrete attacks you attempted) (c) and for each one how the output is modified
8 Attack2: Administrators stealing credentials of others Quiouteeau is a malicious user and he wants to steal the credentials of St@lqu3uR. His intuition tells him that some stored XSS probably do exist in that PHPList version. Let us discover some of them! observation Log on as quiouteeau / iluvs3qr1m@g on create a new user using one of the ensimag login of your group students on admin/?page=user using the Firefox add-on Firebug (already installed), right click on an input element, and observe how the input field is formed (a) choose a javascript code to inject either a very simple one such as (also please include your ensimag login) using the XSS Cheat Sheet There are some elegant ones there! (b) find a form input that is vulnerable to XSS injection. Which one is it? (c) as a POC Proof Of Concept, perform inject the javascript code you chose on that webpage and show that you are able to inject and run code in the context of Quiouteeau [provide a screenshot of YOUR work]
9 Attack Now perform a stored XSS attack on St@lqu3uR ( password: e-pévé 3L l0v3 r ). Briefly describe each step and provide a screenshot showing your login and that the victim was St@lqu3uR [provide a screenshot of YOUR work] 14. I discovered one of those easy vulnerabilities while playing with that application. However, I am not the first one having discovered that XSS vulnerability. Find the reference on seclist.org and include the URL in your report. 4.3 SQL injection - Where is little bobby tables? Now remove the user thanks to which Quiouteeau stole St@lqu3uR credentials. If necessary use the admin credentials (admin / since there seems to be some problems when deleting from non PHPList super-admins on that implementation 15. Remind to Ciss what is a SQL injection. He assumes that his application might be vulnerable to such attacks, since the users are stored in a database supporting the SQL language. 16. Log on again as St@lqu3uR. (a) What does the term Blind SQL injection mean? (b) Identity a SQL injection on Play with the GET parameters. The goal is to find a way (field and a way to format it) to discriminate the results eg: AND 1=1 AND 2=1 include the different values of the field in your report [provide a screenshot of YOUR work](the screenshot has to show the URL and a user with a name of one of the students of your group) Hint: a code auditor told us to have a look at the findby parameter, and that it might not take only string as values.. (c) When the condition is evaluated to false, find a string on the webpage output that will help us to discriminate later. Which one did you choose?
10 How to jump from a Blind SQLi to a LFI? Note: we will use the PHPList admin login (see previous section) for that part. 17. We are able to perform a Blind SQL injection. Now we would like to include a local file on the server thanks to that. (a) MySQL has the following function html#function_load-file. Which privilege the PHPList database user has to have? (we will assume that this privilege is granted) (b) we will SQL inject on the using the field you found before (and on the administrator users webpage). However, there is some filtering done on it Can we use the following characters ( >, =, ) in our SQL injection? (justify for each character) (c) when we perform a String Blind SQL injection, how do we relate this to an integer blind SQL injection? why do we do this? (d) we will assume that the file we will load is ASCII encoded. how can we relate getting the file blind sql injection to a string blind sql injection? (e) since some htmlspecialchars filtering is done, we are however unable to manipulate bytes in their ASCII encoding. What do you propose? FYI, here is a part of the python + SQL code responsible for that file blind sql injection : 1 s u b s t r ( lpad ( bin ( ord ( s u b s t r ( l o a d f i l e (0 x + f i l e. encode ( hex )+ ), +s t r ( charpos +1)+, 1 ) ) ), 8, 0 ), +s t r ( b i t p o s +1)+, 1 )=1
11 Using the script located at /home/ensimag-student/desktop/ex1-script/, get the content of the file /root/www/easter-eggs/ex1-lfi.txt [provide YOUR command and its execution result] Note: In case you entered a wrong discriminant, here is the output you would have: 1... [+] / r o o t /www/ e a s t e r eggs /ex1 l f i. t x t length : Here is a screenshot of a part of the correct output: One of the easter eggs you might find.. ;) 5 Ex2 - Do you still love the cloud? - Risk analysis The overall objective of that exercise is to perform a risk analysis regarding your data. Stanislas Quastana (Microsoft), 2011, Risques et opportunités de la Consumérisation de l IT - partie 3 - périphériques amovibles, stockage dans le Cloud et données d entreprise risques-et-opportunit-233-s-de-la-consum-233-risation-de-l-it-partie-3-p-233-riph-233-riques-amovibles aspx
12 Note: I did provide some questions as starting points. This part is not a rigorous risk analysis, see it just as an introduction, for you to be aware of the kind of questions you would have to ask yourself. Those question are not exhaustive, just to help you to go through your thinking. I expect you to enhance it with your additional own questions, and to answer to those questions (the ones I wrote plus your own ones (at least 2 additional questions for each step)). For each question, briefly justify. You will perform a more rigourous risk analysis in the very next question. (a) scope definition: what do we mean by data? (is it just your s? documents? photos? source code?...) (b) security properties to be ensured: (c) threats: what do YOU care more? (eg: personally I prefer to maintain the confidentiality of my data, thus my backups are encrypted, but if I loose the private key, I might loose the availability property.) thus, prioritize the security properties you want to ensure on your data... your usb key gets stolen your computer is burned several earthquakes destroy the Googl datacenters... (d) vulnerabilities (aka security weaknesses in the OWASP risk rating method) of the systems on which your data are stored? storage: on which peripheral do you store you data? do you rely on cloud services? if so, where are the data stored? in which datacenters?... confidentiality and access control: who can access your data? (the provider, a government agency?...) how to authenticate to access your data? (1 factor authentication (note an authentication factor has one of the following characteristics: what I know (eg: password), what I own (eg: physical token), what I am (eg: biometry))) is the authentication process secure? what kind of data is stored within such a system? when you wipe / delete your data, what are the kind of residual data remaining on that system? (cache, temporary files, logs)? are you aware of how the wiping process is performed?... (e) existing counter-measures (aka security controls in the OWASP risk rating method) Some example questions: do you use an intrusion detection system or your computer? do you rely on a backup solution? does your application provider do? are the data encrypted? is the encryption scheme secure? regarding what kind of attacks?... (f) technical impacts which security property would you loose if such a threat has to happen? how much money / work hours / efficiency would you loose?... (g) what to do with that identified risk? reduce it: deploy additional counter-measures to put the risk at an acceptable level transfer it: eg. insurance accept it: the potential additional countermeasures cost is too important regarding the cost of the corresponding threat to happen
13 (a) Perform a OWASP Risk Rating according to the method described at php/owasp_risk_rating_methodology regarding one of the threats that you identified before. (b) Regarding the threat you chose, draw an attack paths for a given threat diagram (such as the following one). (you are free to realize an ASCII, Visio, Omnigraffle, TikZ.. or even to use tools such as CORAS http: // coras. sourceforge. net/ downloads. html, there also are some nice risk analysis icons there!) 6 (on your free time) Going further In case you really did enjoy that practical assessment, and you have some free time, here are some training stuff for you: 6.1 Web exploitation WebGoat Gruyere Risk analysis MEHARI: EBIOS 2010: methods-to-achieve-iss/ebios-2010-expression-of-needs-and-identification-of-security-objectives. html CORAS
The purpose of this report is to educate our prospective clients about capabilities of Hackers Locked.
This sample report is published with prior consent of our client in view of the fact that the current release of this web application is three major releases ahead in its life cycle. Issues pointed out
Secure Web Development Teaching Modules 1. Threat Assessment
Secure Web Development Teaching Modules 1 Threat Assessment Contents 1 Concepts... 1 1.1 Software Assurance Maturity Model... 1 1.2 Security practices for construction... 3 1.3 Web application security
Criteria for web application security check. Version 2015.1
Criteria for web application security check Version 2015.1 i Content Introduction... iii ISC- P- 001 ISC- P- 001.1 ISC- P- 001.2 ISC- P- 001.3 ISC- P- 001.4 ISC- P- 001.5 ISC- P- 001.6 ISC- P- 001.7 ISC-
Bug Report. Date: March 19, 2011 Reporter: Chris Jarabek ([email protected])
Bug Report Date: March 19, 2011 Reporter: Chris Jarabek ([email protected]) Software: Kimai Version: 0.9.1.1205 Website: http://www.kimai.org Description: Kimai is a web based time-tracking application.
How to break in. Tecniche avanzate di pen testing in ambito Web Application, Internal Network and Social Engineering
How to break in Tecniche avanzate di pen testing in ambito Web Application, Internal Network and Social Engineering Time Agenda Agenda Item 9:30 10:00 Introduction 10:00 10:45 Web Application Penetration
Check list for web developers
Check list for web developers Requirement Yes No Remarks 1. Input Validation 1.1) Have you done input validation for all the user inputs using white listing and/or sanitization? 1.2) Does the input validation
SECURITY ADVISORY. December 2008 Barracuda Load Balancer admin login Cross-site Scripting
SECURITY ADVISORY December 2008 Barracuda Load Balancer admin login Cross-site Scripting Discovered in December 2008 by FortConsult s Security Research Team/Jan Skovgren WARNING NOT FOR DISCLOSURE BEFORE
Cross Site Scripting in Joomla Acajoom Component
Whitepaper Cross Site Scripting in Joomla Acajoom Component Vandan Joshi December 2011 TABLE OF CONTENTS Abstract... 3 Introduction... 3 A Likely Scenario... 5 The Exploit... 9 The Impact... 12 Recommended
Advanced Web Security, Lab
Advanced Web Security, Lab Web Server Security: Attacking and Defending November 13, 2013 Read this earlier than one day before the lab! Note that you will not have any internet access during the lab,
Essential IT Security Testing
Essential IT Security Testing Application Security Testing for System Testers By Andrew Muller Director of Ionize Who is this guy? IT Security consultant to the stars Member of OWASP Member of IT-012-04
QualysGuard WAS. Getting Started Guide Version 3.3. March 21, 2014
QualysGuard WAS Getting Started Guide Version 3.3 March 21, 2014 Copyright 2011-2014 by Qualys, Inc. All Rights Reserved. Qualys, the Qualys logo and QualysGuard are registered trademarks of Qualys, Inc.
Data Breaches and Web Servers: The Giant Sucking Sound
Data Breaches and Web Servers: The Giant Sucking Sound Guy Helmer CTO, Palisade Systems, Inc. Lecturer, Iowa State University @ghelmer Session ID: DAS-204 Session Classification: Intermediate The Giant
Cyber Security Workshop Ethical Web Hacking
Cyber Security Workshop Ethical Web Hacking May 2015 Setting up WebGoat and Burp Suite Hacking Challenges in WebGoat Concepts in Web Technologies and Ethical Hacking 1 P a g e Downloading WebGoat and Burp
Thick Client Application Security
Thick Client Application Security Arindam Mandal ([email protected]) (http://www.paladion.net) January 2005 This paper discusses the critical vulnerabilities and corresponding risks in a two
(WAPT) Web Application Penetration Testing
(WAPT) Web Application Penetration Testing Module 0: Introduction 1. Introduction to the course. 2. How to get most out of the course 3. Resources you will need for the course 4. What is WAPT? Module 1:
EVALUATING COMMERCIAL WEB APPLICATION SECURITY. By Aaron Parke
EVALUATING COMMERCIAL WEB APPLICATION SECURITY By Aaron Parke Outline Project background What and why? Targeted sites Testing process Burp s findings Technical talk My findings and thoughts Questions Project
Where every interaction matters.
Where every interaction matters. Peer 1 Vigilant Web Application Firewall Powered by Alert Logic The Open Web Application Security Project (OWASP) Top Ten Web Security Risks and Countermeasures White Paper
Web application security: Testing for vulnerabilities
Web application security: Testing for vulnerabilities Using open source tools to test your site Jeff Orloff Technology Coordinator/Consultant Sequoia Media Services Inc. Skill Level: Intermediate Date:
1. Building Testing Environment
The Practice of Web Application Penetration Testing 1. Building Testing Environment Intrusion of websites is illegal in many countries, so you cannot take other s web sites as your testing target. First,
What is Web Security? Motivation
[email protected] http://www.brucker.ch/ Information Security ETH Zürich Zürich, Switzerland Information Security Fundamentals March 23, 2004 The End Users View The Server Providers View What is Web
Still Aren't Doing. Frank Kim
Ten Things Web Developers Still Aren't Doing Frank Kim Think Security Consulting Background Frank Kim Consultant, Think Security Consulting Security in the SDLC SANS Author & Instructor DEV541 Secure Coding
Recon and Mapping Tools and Exploitation Tools in SamuraiWTF Report section Nick Robbins
Recon and Mapping Tools and Exploitation Tools in SamuraiWTF Report section Nick Robbins During initial stages of penetration testing it is essential to build a strong information foundation before you
Cyber Security Challenge Australia 2014
Cyber Security Challenge Australia 2014 www.cyberchallenge.com.au CySCA2014 Web Penetration Testing Writeup Background: Pentest the web server that is hosted in the environment at www.fortcerts.cysca Web
External Vulnerability Assessment. -Technical Summary- ABC ORGANIZATION
External Vulnerability Assessment -Technical Summary- Prepared for: ABC ORGANIZATI On March 9, 2008 Prepared by: AOS Security Solutions 1 of 13 Table of Contents Executive Summary... 3 Discovered Security
Web Application Attacks And WAF Evasion
Web Application Attacks And WAF Evasion Ahmed ALaa (EG-CERT) 19 March 2013 What Are We Going To Talk About? - introduction to web attacks - OWASP organization - OWASP frameworks - Crawling & info. gathering
Web Application Security
Web Application Security John Zaharopoulos ITS - Security 10/9/2012 1 Web App Security Trends Web 2.0 Dynamic Webpages Growth of Ajax / Client side Javascript Hardening of OSes Secure by default Auto-patching
Threat Modeling. Categorizing the nature and severity of system vulnerabilities. John B. Dickson, CISSP
Threat Modeling Categorizing the nature and severity of system vulnerabilities John B. Dickson, CISSP What is Threat Modeling? Structured approach to identifying, quantifying, and addressing threats. Threat
Web application security
Web application security Sebastian Lopienski CERN Computer Security Team openlab and summer lectures 2010 (non-web question) Is this OK? int set_non_root_uid(int uid) { // making sure that uid is not 0
ABC LTD EXTERNAL WEBSITE AND INFRASTRUCTURE IT HEALTH CHECK (ITHC) / PENETRATION TEST
ABC LTD EXTERNAL WEBSITE AND INFRASTRUCTURE IT HEALTH CHECK (ITHC) / PENETRATION TEST Performed Between Testing start date and end date By SSL247 Limited SSL247 Limited 63, Lisson Street Marylebone London
Conducting Web Application Pentests. From Scoping to Report For Education Purposes Only
Conducting Web Application Pentests From Scoping to Report For Education Purposes Only Web App Pen Tests According to OWASP: A Web Application Penetration Test focuses only on evaluating the security of
Common Security Vulnerabilities in Online Payment Systems
Common Security Vulnerabilities in Online Payment Systems Author- Hitesh Malviya(Information Security analyst) Qualifications: C!EH, EC!SA, MCITP, CCNA, MCP Current Position: CEO at HCF Infosec Limited
Secure Web Application Coding Team Introductory Meeting December 1, 2005 1:00 2:00PM Bits & Pieces Room, Sansom West Room 306 Agenda
Secure Web Application Coding Team Introductory Meeting December 1, 2005 1:00 2:00PM Bits & Pieces Room, Sansom West Room 306 Agenda 1. Introductions for new members (5 minutes) 2. Name of group 3. Current
HackMiami Web Application Scanner 2013 PwnOff
HackMiami Web Application Scanner 2013 PwnOff An Analysis of Automated Web Application Scanning Suites James Ball, Alexander Heid, Rod Soto http://www.hackmiami.org Overview Web application scanning suites
Web Application Guidelines
Web Application Guidelines Web applications have become one of the most important topics in the security field. This is for several reasons: It can be simple for anyone to create working code without security
Creating Stronger, Safer, Web Facing Code. JPL IT Security Mary Rivera June 17, 2011
Creating Stronger, Safer, Web Facing Code JPL IT Security Mary Rivera June 17, 2011 Agenda Evolving Threats Operating System Application User Generated Content JPL s Application Security Program Securing
ASL IT SECURITY BEGINNERS WEB HACKING AND EXPLOITATION
ASL IT SECURITY BEGINNERS WEB HACKING AND EXPLOITATION V 2.0 A S L I T S e c u r i t y P v t L t d. Page 1 Overview: Learn the various attacks like sql injections, cross site scripting, command execution
Web Application Security. Vulnerabilities, Weakness and Countermeasures. Massimo Cotelli CISSP. Secure
Vulnerabilities, Weakness and Countermeasures Massimo Cotelli CISSP Secure : Goal of This Talk Security awareness purpose Know the Web Application vulnerabilities Understand the impacts and consequences
Attack and Penetration Testing 101
Attack and Penetration Testing 101 Presented by Paul Petefish [email protected] July 15, 2009 Copyright 2000-2009, Solutionary, Inc. All rights reserved. Version 2.2 Agenda Penetration Testing
Web attacks and security: SQL injection and cross-site scripting (XSS)
Web attacks and security: SQL injection and cross-site scripting (XSS) License This work by Z. Cliffe Schreuders at Leeds Metropolitan University is licensed under a Creative Commons Attribution-ShareAlike
FINAL DoIT 11.03.2015 - v.4 PAYMENT CARD INDUSTRY DATA SECURITY STANDARDS APPLICATION DEVELOPMENT AND MAINTENANCE PROCEDURES
Purpose: The Department of Information Technology (DoIT) is committed to developing secure applications. DoIT s System Development Methodology (SDM) and Application Development requirements ensure that
An Insight into Cookie Security
An Insight into Cookie Security Today most websites and web based applications use cookies. Cookies are primarily used by the web server to track an authenticated user or other user specific details. This
Detecting and Exploiting XSS with Xenotix XSS Exploit Framework
Detecting and Exploiting XSS with Xenotix XSS Exploit Framework [email protected] keralacyberforce.in Introduction Cross Site Scripting or XSS vulnerabilities have been reported and exploited since 1990s.
ArcGIS Server Security Threats & Best Practices 2014. David Cordes Michael Young
ArcGIS Server Security Threats & Best Practices 2014 David Cordes Michael Young Agenda Introduction Threats Best practice - ArcGIS Server settings - Infrastructure settings - Processes Summary Introduction
FINAL DoIT 04.01.2013- v.8 APPLICATION SECURITY PROCEDURE
Purpose: This procedure identifies what is required to ensure the development of a secure application. Procedure: The five basic areas covered by this document include: Standards for Privacy and Security
Detecting Web Application Vulnerabilities Using Open Source Means. OWASP 3rd Free / Libre / Open Source Software (FLOSS) Conference 27/5/2008
Detecting Web Application Vulnerabilities Using Open Source Means OWASP 3rd Free / Libre / Open Source Software (FLOSS) Conference 27/5/2008 Kostas Papapanagiotou Committee Member OWASP Greek Chapter [email protected]
Secure Web Development Teaching Modules 1. Security Testing. 1.1 Security Practices for Software Verification
Secure Web Development Teaching Modules 1 Security Testing Contents 1 Concepts... 1 1.1 Security Practices for Software Verification... 1 1.2 Software Security Testing... 2 2 Labs Objectives... 2 3 Lab
WebCruiser Web Vulnerability Scanner User Guide
WebCruiser Web Vulnerability Scanner User Guide Content 1. Software Introduction...2 2. Key Features...3 2.1. POST Data Resend...3 2.2. Vulnerability Scanner...6 2.3. SQL Injection...8 2.3.1. POST SQL
STABLE & SECURE BANK lab writeup. Page 1 of 21
STABLE & SECURE BANK lab writeup 1 of 21 Penetrating an imaginary bank through real present-date security vulnerabilities PENTESTIT, a Russian Information Security company has launched its new, eighth
Threat Modeling/ Security Testing. Tarun Banga, Adobe 1. Agenda
Threat Modeling/ Security Testing Presented by: Tarun Banga Sr. Manager Quality Engineering, Adobe Quality Leader (India) Adobe Systems India Pvt. Ltd. Agenda Security Principles Why Security Testing Security
Project 2: Web Security Pitfalls
EECS 388 September 19, 2014 Intro to Computer Security Project 2: Web Security Pitfalls Project 2: Web Security Pitfalls This project is due on Thursday, October 9 at 6 p.m. and counts for 8% of your course
Using Nessus In Web Application Vulnerability Assessments
Using Nessus In Web Application Vulnerability Assessments Paul Asadoorian Product Evangelist Tenable Network Security [email protected] About Tenable Nessus vulnerability scanner, ProfessionalFeed
Lecture 11 Web Application Security (part 1)
Lecture 11 Web Application Security (part 1) Computer and Network Security 4th of January 2016 Computer Science and Engineering Department CSE Dep, ACS, UPB Lecture 11, Web Application Security (part 1)
Firewalls and Software Updates
Firewalls and Software Updates License This work by Z. Cliffe Schreuders at Leeds Metropolitan University is licensed under a Creative Commons Attribution-ShareAlike 3.0 Unported License. Contents General
Web Application Report
Web Application Report This report includes important security information about your Web Application. Security Report This report was created by IBM Rational AppScan 8.5.0.1 11/14/2012 8:52:13 AM 11/14/2012
Cross-Site Scripting
Cross-Site Scripting (XSS) Computer and Network Security Seminar Fabrice Bodmer ([email protected]) UNIFR - Winter Semester 2006-2007 XSS: Table of contents What is Cross-Site Scripting (XSS)? Some
CMP3002 Advanced Web Technology
CMP3002 Advanced Web Technology Assignment 1: Web Security Audit A web security audit on a proposed eshop website By Adam Wright Table of Contents Table of Contents... 2 Table of Tables... 2 Introduction...
CS 161 Computer Security
Paxson Spring 2013 CS 161 Computer Security Homework 2 Due: Wednesday, March 6, at 10PM Version 1.1 (02Mar13) Instructions. This assignment must be done on your own, and in accordance with the course policies
Workday Mobile Security FAQ
Workday Mobile Security FAQ Workday Mobile Security FAQ Contents The Workday Approach 2 Authentication 3 Session 3 Mobile Device Management (MDM) 3 Workday Applications 4 Web 4 Transport Security 5 Privacy
Magento Security and Vulnerabilities. Roman Stepanov
Magento Security and Vulnerabilities Roman Stepanov http://ice.eltrino.com/ Table of contents Introduction Open Web Application Security Project OWASP TOP 10 List Common issues in Magento A1 Injection
How to hack a website with Metasploit
How to hack a website with Metasploit By Sumedt Jitpukdebodin Normally, Penetration Tester or a Hacker use Metasploit to exploit vulnerability services in the target server or to create a payload to make
Guidelines for Web applications protection with dedicated Web Application Firewall
Guidelines for Web applications protection with dedicated Web Application Firewall Prepared by: dr inŝ. Mariusz Stawowski, CISSP Bartosz Kryński, Imperva Certified Security Engineer INTRODUCTION Security
Is Drupal secure? A high-level perspective on web vulnerabilities, Drupal s solutions, and how to maintain site security
Is Drupal secure? A high-level perspective on web vulnerabilities, Drupal s solutions, and how to maintain site security Presented 2009-05-29 by David Strauss Thinking Securely Security is a process, not
3. Broken Account and Session Management. 4. Cross-Site Scripting (XSS) Flaws. Web browsers execute code sent from websites. Account Management
What is an? s Ten Most Critical Web Application Security Vulnerabilities Anthony LAI, CISSP, CISA Chapter Leader (Hong Kong) [email protected] Open Web Application Security Project http://www.owasp.org
Application Security Testing. Generic Test Strategy
Application Security Testing Generic Test Strategy Page 2 of 8 Contents 1 Introduction 3 1.1 Purpose: 3 1.2 Application Security Testing: 3 2 Audience 3 3 Test Strategy guidelines 3 3.1 Authentication
Acunetix Website Audit. 5 November, 2014. Developer Report. Generated by Acunetix WVS Reporter (v8.0 Build 20120808)
Acunetix Website Audit 5 November, 2014 Developer Report Generated by Acunetix WVS Reporter (v8.0 Build 20120808) Scan of http://filesbi.go.id:80/ Scan details Scan information Starttime 05/11/2014 14:44:06
Top 10 Web Application Security Vulnerabilities - with focus on PHP
Top 10 Web Application Security Vulnerabilities - with focus on PHP Louise Berthilson Alberto Escudero Pascual 1 Resources The Top 10 Project by OWASP www.owasp.org/index.php/owasp_top_ten_project
WEB SECURITY CONCERNS THAT WEB VULNERABILITY SCANNING CAN IDENTIFY
WEB SECURITY CONCERNS THAT WEB VULNERABILITY SCANNING CAN IDENTIFY www.alliancetechpartners.com WEB SECURITY CONCERNS THAT WEB VULNERABILITY SCANNING CAN IDENTIFY More than 70% of all websites have vulnerabilities
https://elearn.zdresearch.com https://training.zdresearch.com/course/pentesting
https://elearn.zdresearch.com https://training.zdresearch.com/course/pentesting Chapter 1 1. Introducing Penetration Testing 1.1 What is penetration testing 1.2 Different types of test 1.2.1 External Tests
ASL IT Security Advanced Web Exploitation Kung Fu V2.0
ASL IT Security Advanced Web Exploitation Kung Fu V2.0 A S L I T S e c u r i t y P v t L t d. Page 1 Overview: There is a lot more in modern day web exploitation than the good old alert( xss ) and union
BASELINE SECURITY TEST PLAN FOR EDUCATIONAL WEB AND MOBILE APPLICATIONS
BASELINE SECURITY TEST PLAN FOR EDUCATIONAL WEB AND MOBILE APPLICATIONS Published by Tony Porterfield Feb 1, 2015. Overview The intent of this test plan is to evaluate a baseline set of data security practices
Web Application Security Considerations
Web Application Security Considerations Eric Peele, Kevin Gainey International Field Directors & Technology Conference 2006 May 21 24, 2006 RTI International is a trade name of Research Triangle Institute
WordPress Security Scan Configuration
WordPress Security Scan Configuration To configure the - WordPress Security Scan - plugin in your WordPress driven Blog, login to WordPress as administrator, by simply entering the url_of_your_website/wp-admin
A Server and Browser-Transparent CSRF Defense for Web 2.0 Applications. Slides by Connor Schnaith
A Server and Browser-Transparent CSRF Defense for Web 2.0 Applications Slides by Connor Schnaith Cross-Site Request Forgery One-click attack, session riding Recorded since 2001 Fourth out of top 25 most
HP WebInspect Tutorial
HP WebInspect Tutorial Introduction: With the exponential increase in internet usage, companies around the world are now obsessed about having a web application of their own which would provide all the
JOOMLA SECURITY. ireland website design. by Oliver Hummel. ADDRESS Unit 12D, Six Cross Roads Business Park, Waterford City
JOOMLA SECURITY by Oliver Hummel ADDRESS Unit 12D, Six Cross Roads Business Park, Waterford City CONTACT Nicholas Butler 051-393524 089-4278112 [email protected] Contents Introduction 3 Installation
Chapter 1 Web Application (In)security 1
Introduction xxiii Chapter 1 Web Application (In)security 1 The Evolution of Web Applications 2 Common Web Application Functions 4 Benefits of Web Applications 5 Web Application Security 6 "This Site Is
Web Application Threats and Vulnerabilities Web Server Hacking and Web Application Vulnerability
Web Application Threats and Vulnerabilities Web Server Hacking and Web Application Vulnerability WWW Based upon HTTP and HTML Runs in TCP s application layer Runs on top of the Internet Used to exchange
The Top Web Application Attacks: Are you vulnerable?
QM07 The Top Web Application Attacks: Are you vulnerable? John Burroughs, CISSP Sr Security Architect, Watchfire Solutions [email protected] Agenda Current State of Web Application Security Understanding
INTRODUCTION TO ATRIUM... 2 SYSTEM REQUIREMENTS... 2 TECHNICAL DETAILS... 2 LOGGING INTO ATRIUM... 3 SETTINGS... 4 NAVIGATION PANEL...
INTRODUCTION TO ATRIUM... 2 SYSTEM REQUIREMENTS... 2 TECHNICAL DETAILS... 2 LOGGING INTO ATRIUM... 3 SETTINGS... 4 CONTROL PANEL... 4 ADDING GROUPS... 6 APPEARANCE... 7 BANNER URL:... 7 NAVIGATION... 8
Web Application Security
E-SPIN PROFESSIONAL BOOK Vulnerability Management Web Application Security ALL THE PRACTICAL KNOW HOW AND HOW TO RELATED TO THE SUBJECT MATTERS. COMBATING THE WEB VULNERABILITY THREAT Editor s Summary
Columbia University Web Security Standards and Practices. Objective and Scope
Columbia University Web Security Standards and Practices Objective and Scope Effective Date: January 2011 This Web Security Standards and Practices document establishes a baseline of security related requirements
CSE598i - Web 2.0 Security OWASP Top 10: The Ten Most Critical Web Application Security Vulnerabilities
CSE598i - Web 2.0 Security OWASP Top 10: The Ten Most Critical Web Application Security Vulnerabilities Thomas Moyer Spring 2010 1 Web Applications What has changed with web applications? Traditional applications
Web Application Vulnerability Testing with Nessus
The OWASP Foundation http://www.owasp.org Web Application Vulnerability Testing with Nessus Rïk A. Jones, CISSP [email protected] Rïk A. Jones Web developer since 1995 (16+ years) Involved with information
CS 361S - Network Security and Privacy Spring 2014. Homework #1
CS 361S - Network Security and Privacy Spring 2014 Homework #1 Due: 11am CST (in class), February 11, 2014 YOUR NAME: Collaboration policy No collaboration is permitted on this assignment. Any cheating
Web Application Security Assessment and Vulnerability Mitigation Tests
White paper BMC Remedy Action Request System 7.6.04 Web Application Security Assessment and Vulnerability Mitigation Tests January 2011 www.bmc.com Contacting BMC Software You can access the BMC Software
Enterprise Application Security Workshop Series
Enterprise Application Security Workshop Series Phone 877-697-2434 fax 877-697-2434 www.thesagegrp.com Defending JAVA Applications (3 Days) In The Sage Group s Defending JAVA Applications workshop, participants
Avactis PHP Shopping Cart (www.avactis.com) Full Disclosure
12/04/16 [email protected] Avactis PHP Shopping Cart (www.avactis.com) Full Disclosure Performers: Maurizio Abdel Adim Oisfi - [email protected] Andrei Manole - [email protected] Luca Milano
EECS 398 Project 2: Classic Web Vulnerabilities
EECS 398 Project 2: Classic Web Vulnerabilities Revision History 3.0 (October 27, 2009) Revise CSRF attacks 1 and 2 to make them possible to complete within the constraints of the project. Clarify that
Application Layer Encryption: Protecting against Application Logic and Session Theft Attacks. Whitepaper
Application Layer Encryption: Protecting against Application Logic and Session Theft Attacks Whitepaper The security industry has extensively focused on protecting against malicious injection attacks like
Advanced Web Technology 10) XSS, CSRF and SQL Injection 2
Berner Fachhochschule, Technik und Informatik Advanced Web Technology 10) XSS, CSRF and SQL Injection Dr. E. Benoist Fall Semester 2010/2011 Table of Contents Cross Site Request Forgery - CSRF Presentation
Introduction:... 1 Security in SDLC:... 2 Penetration Testing Methodology: Case Study... 3
Table of Contents Introduction:... 1 Security in SDLC:... 2 Penetration Testing Methodology: Case Study... 3 Information Gathering... 3 Vulnerability Testing... 7 OWASP TOP 10 Vulnerabilities:... 8 Injection
Smartphone Pentest Framework v0.1. User Guide
Smartphone Pentest Framework v0.1 User Guide 1 Introduction: The Smartphone Pentest Framework (SPF) is an open source tool designed to allow users to assess the security posture of the smartphones deployed
VIDEO intypedia007en LESSON 7: WEB APPLICATION SECURITY - INTRODUCTION TO SQL INJECTION TECHNIQUES. AUTHOR: Chema Alonso
VIDEO intypedia007en LESSON 7: WEB APPLICATION SECURITY - INTRODUCTION TO SQL INJECTION TECHNIQUES AUTHOR: Chema Alonso Informática 64. Microsoft MVP Enterprise Security Hello and welcome to Intypedia.
Web Vulnerability Assessment Report
Web Vulnerability Assessment Report Target Scanned: www.daflavan.com Report Generated: Mon May 5 14:43:24 2014 Identified Vulnerabilities: 39 Threat Level: High Screenshot of www.daflavan.com HomePage
Secure development and the SDLC. Presented By Jerry Hoff @jerryhoff
Secure development and the SDLC Presented By Jerry Hoff @jerryhoff Agenda Part 1: The Big Picture Part 2: Web Attacks Part 3: Secure Development Part 4: Organizational Defense Part 1: The Big Picture Non
ASP.NET MVC Secure Coding 4-Day hands on Course. Course Syllabus
ASP.NET MVC Secure Coding 4-Day hands on Course Course Syllabus Course description ASP.NET MVC Secure Coding 4-Day hands on Course Secure programming is the best defense against hackers. This multilayered
FileMaker Server 11. FileMaker Server Help
FileMaker Server 11 FileMaker Server Help 2010 FileMaker, Inc. All Rights Reserved. FileMaker, Inc. 5201 Patrick Henry Drive Santa Clara, California 95054 FileMaker is a trademark of FileMaker, Inc. registered
WEB SECURITY. Oriana Kondakciu 0054118 Software Engineering 4C03 Project
WEB SECURITY Oriana Kondakciu 0054118 Software Engineering 4C03 Project The Internet is a collection of networks, in which the web servers construct autonomous systems. The data routing infrastructure
