New Methods in Automated XSS Detection & Dynamic Exploit Creation. A Multi-deck Presentation. Kenneth F. Belva, CISSP, CEH. xsswarrior.
|
|
|
- Cecil Parker
- 10 years ago
- Views:
Transcription
1 New Methods in Automated XSS Detection & Dynamic Exploit Creation A Multi-deck Presentation Kenneth F. Belva, CISSP, CEH xsswarrior.com All Material and Methods Contained Here Patent Pending Globally. All Rights Reserved. xsswarrior.com 1
2 Contents & Deck Content Contact Information / Bio Slide Deck 1: Methods and Techniques Overview Describes the overall picture of how things work Slide Deck 2: OWASP AppSecUSA 2015 Presentation Gives more details about methods and variations Slide Deck 3: xsswarrior & XSS: A Basic Introduction Non-Technical Introduction with screenshots of product showing this is not just theory / vaporware All Material and Methods Contained Here Patent Pending Globally. All Rights Reserved. xsswarrior.com 2
3 Ken's Contact Information Product: Twitter: Me: xsswarrior.com Research: Essays: Stop by and say, 'Hi'! All Material and Methods Contained Here Patent Pending Globally. All Rights Reserved. xsswarrior.com 3
4 Bio of Kenneth F. Belva Kenneth F. Belva is the Publisher and Editor-in-Chief of bloginfosec.com. He is current develops xsswarrior, currently the only scanner than can automate testing for Stored XSS, for commercial use at xsswarrior.com. In addition, he is an independent penetration tester and security researcher. For the past 15 years he worked in Cyber Security mainly in the financial services vertical, most recently at a multinational conglomerate, conducting both technical and non-technical risk assessments at the application and network layers. From he managed an Information Technology Risk Management Program for a bank whose assets are Billions of dollars. At the OWASP AppSec2013 conference BugCrowd validated three of his 0-day vulnerabilities he found in Yahoo, Yandex and Angelist within the first two days of BugBash2013. He has since been credited with finding a number of other vulnerabilities on sites such as Netflix and OKCupid. He was previously on the board of the New York Metro Chapter of the Information Systems Security Association (ISSA) where he served in various capacities over the past 9 years. He has spoken and moderated at the United Nations as well as presented on AT&T s Internet Security News Network (ISNN) on discovering unknown web application vulnerabilities as well as being interviewed on security enablement. ITsecurity.com recognized him as one of the top information security influencers in In 2009, he was published in the Information Security Management Handbook, Sixth Edition, edited by Hal Tipton and Micki Krause. He also co-authored one of the central chapters in Enterprise Information Security and Privacy, edited by Warren Axelrod, Jennifer L. Bayuk and Daniel Schutzer. He recently co-authored a paper entitled Creating Business Through Virtual Trust: How to Gain and Sustain a Competitive Advantage Using Information Security with Sam Dekay of The Bank of New York. of security breaches on stock prices. Mr. Belva frequently presents at information security conferences around the US as well as globally. He writes on day-to-day information security experiences in a non-essay format at SecurityMaverick.com when time permits and can be followed on All Material and Methods Contained Here Patent Pending Globally. All Rights Reserved. xsswarrior.com 4
5 Slide Deck 1 Methods and Techniques Overview All Material and Methods Contained Here Patent Pending Globally. All Rights Reserved. xsswarrior.com 5
6 New Methods in Automated XSS Detection & Dynamic Exploit Creation Kenneth F. Belva, CISSP, CEH xsswarrior.com All Material and Methods Contained Here Patent Pending Globally. All Rights Reserved. xsswarrior.com 6
7 Overview of Methods and Techniques Presented at OWASP AppSecUSA 2015 All Material and Methods Contained Here Patent Pending Globally. All Rights Reserved. xsswarrior.com 7
8 Points of Interest Please note: This presentation is a very simple explanation to communicate the method and concepts See OWASP presentation for more in-depth ideas and examples Not vapor-ware: Advanced Scanner Exists Links on second to last slide for more information Please visit: xsswarrior.com All Material and Methods Contained Here Patent Pending Globally. All Rights Reserved. xsswarrior.com 8
9 Part 1: The Current Automated Methodology All Material and Methods Contained Here Patent Pending Globally. All Rights Reserved. xsswarrior.com 9
10 Most Popular XSS Detection Methodology: The Exploit String Includes the Payload/Token <script>alert(12345)</script> Scanners Slam Strings into Application Hoping for a Callback or Event to Fire for Validation Inefficient and Inaccurate All Material and Methods Contained Here Patent Pending Globally. All Rights Reserved. xsswarrior.com 10
11 One Major Problem is Transformations "script"alert12345"/script" Most Popular XSS Detection Methods Cannot Account for Different Exploit Situations All Material and Methods Contained Here Patent Pending Globally. All Rights Reserved. xsswarrior.com 11
12 Part 2: The New Testing Methodology Applies to All XSS: Reflected, ReflectedStored, Stored, DOM All Material and Methods Contained Here Patent Pending Globally. All Rights Reserved. xsswarrior.com 12
13 Step 1: Tracing Data and Building Cases: Inputs and Outputs The goal: Track where the data goes into the application and where it comes out We assign a unique slug value to each field and load it into the application Assign unique slug value to a field and submit -> Spider site to see where unique slugs come out in HTML/JS /DOM/etc. In this way we build cases of input and output Page 1 ---> Page 2 / Page 3 / Page 4 Example of Slug in HTML Output <img src="12345" >some text</img> <a href="a">12345</a> We can inject custom script into DOM and search for our slug All Material and Methods Contained Here Patent Pending Globally. All Rights Reserved. xsswarrior.com 13
14 Step 2: Parse source where slug found to get MINUMUM characters needed for each context <img src="12345" >some text</img> "> is needed for Case 1 Exploit and None Needed for Case 2 Exploit Case 1: <img src="12345">[exploit]</img> Case 2: <img src="[exploit.js]">some text</img> All Material and Methods Contained Here Patent Pending Globally. All Rights Reserved. xsswarrior.com 14
15 Step 3: Use Sandwich Method to Determine Potential Vulnerability and Build Table of Characters that Pass though App/Filter Sandwich Method: Enclose string to search between two unique slugs 12345" <12345 As these unique strings are searchable we will know if they come out the other side for our cases built in Step Potential Vulnerability: <img src="12345"12345" >some text</img> <a href="a">12345<12345</a> Not Vulnerable (in modern browsers): <img src="12345"12345" >some text</img> <a href="a">12345<12345</a> All Material and Methods Contained Here Patent Pending Globally. All Rights Reserved. xsswarrior.com 15
16 Step 4: If potential vulnerability exists check for exploit characters that fit the context Case 1 HTML: <img src="12345"12345" >some text</img> Exploit 1: <img src=" >some text</img> Exploit 2: <img src="eviljs.js" >some text</img> Potential Exploits & Special Characters: --> :/. EvilJS.js -->. Case 2 HTML: <a href="a">12345<12345</a> Exploit 1: <script>alert(10)</script> --> <>()/ Exploit 2: <script>string.fromcharcode(88,83,83)</script> --> <>()/., All Material and Methods Contained Here Patent Pending Globally. All Rights Reserved. xsswarrior.com 16
17 Step 5: From Built Table We Can Further Determine Exploit Selection: Which Should Work & Which Should Fail Based on Which Characters Make it Through Filter (Accurately Determine Transformations) Translation Name Value-Originally Value-Submit Value-Detect ASCII < < < HTML < < < HTML-NoSemi " " " HTML-pre < < < HTML-pre " " " Value-Submit = Value Submitted to Application 12345< < "12345 Value-Detect = Value Searched in HTML/JS/DOM by Scanner 12345< < "12345 When Submitted The Character Should be tested with and without URL encoding since older browser do not encode before submission 12345% All Material and Methods Contained Here Patent Pending Globally. All Rights Reserved. xsswarrior.com 17
18 Step 6: Build Exploit with Proper Syntax and Test (A Simple Example) Assume Proper Characters Passed Filter and in our Table HTML Case: <img src="12345" >some text</img> Syntax from parsing: " > Exploit: <script>alert(1)</script> Dynamic Exploit: "><script>alert(1)</script> Test / Submit & Scan: 12345"><script>alert(1)</script>12345 Result 1 (Valid): <img src="12345"><script>alert(1)</script>12345 >some text</img> An Invalid Might look Like: <img src="12345"><>alert1</s>12345 >some text</img> 12345"><>alert1</s>12345 Does not Match 12345"><script>alert(1)</script>12345 Since we can parse the HTML/JavaScript/DOM (syntax) and know what gets through the filter we can build complex dynamic XSS exploits All Material and Methods Contained Here Patent Pending Globally. All Rights Reserved. xsswarrior.com 18
19 Additional Notes All Other String Combinations are Searchable. For Example, Anti-XSS Libraries: 12345<script <script>12345 All Material and Methods Contained Here Patent Pending Globally. All Rights Reserved. xsswarrior.com 19
20 Part 3: Additional Automated XSS Exploit Techniques All Material and Methods Contained Here Patent Pending Globally. All Rights Reserved. xsswarrior.com 20
21 Item 1: New Exploit Validation Method without Callbacks or Event Trigger If data is assigned a variable by definition the code has executed Assume our exploit is: <script> sploitvalidationfield = </script> If we search for sploitvalidationfield in the DOM and find the value in it is We will know our exploit will work (Call backs and event triggers are still valid too) All Material and Methods Contained Here Patent Pending Globally. All Rights Reserved. xsswarrior.com 21
22 Item 2: Privilege Escalation Testing Build Case in following way: Authenticate and Load Slugs as User of one Level (Input) Authenticate as Higher Level user and Scan for Slugs (Output) Once Mapped from Lower to Higher User Test using Above Methods All Material and Methods Contained Here Patent Pending Globally. All Rights Reserved. xsswarrior.com 22
23 Closing Remarks & Links Support Our Cyber Security Industry Independent Researchers: Please License: Don't Steal Currently Available as API and Service Offering LinkedIn Application Business Page Contact information for Engagements and Speaking Linkedin Profile xsswarrior YouTube Video: OWASP AppSecUSA All Material and Methods Contained Here Patent Pending Globally. All Rights Reserved. xsswarrior.com 23
24 Thank You Much For Your Time All Material and Methods Contained Here Patent Pending Globally. All Rights Reserved. xsswarrior.com 24
25 Slide Deck 2 OWASP AppSecUSA 2015 Presentation All Material and Methods Contained Here Patent Pending Globally. All Rights Reserved. xsswarrior.com 25
26 New Methods in Automated XSS Detection: Dynamic XSS Testing without Using Static Payloads Kenneth F. Belva, CISSP 2015 All Material and Methods Contained Here Patent Pending. All Rights Reserved
27 Table of Contents Introduction / Background What this presentation is and what it is not... Some History: Discovering the Dynamic XSS Methodologies Part 1: The State of Automated XSS Discovery Today On Payloads: Static / Signature Analysis Current Known & Popular Automated XSS Testing Methods Issues with Payloads: Syntax and Transformations The Payload Slam The Tracing Payload The Trace and then Payload Replace
28 Table of Contents (pt2) Part 2: New Methods - Dynamic Analysis of XSS Vulnerabilities: The Theory & (Some) Practice Change of Focus from Payloads to Characters Application Component Review: Filters, DB, Memory, Source & DOM Let's briefly talk about slugs and fields Tracing and parsing for needed characters The Sandwich Method The New XSS Detection Logic A Quick Reflected XSS Example Sandwich Method Extended: Brute-Force, Special Strings, Various Encodings & more Filtering in the field: A Real-life Pen Test Example The Questions of Accuracy and Efficiency Browser Considerations Goodbye Payloads! XSS is now about Characters, Slugs, Parsing & Filtering
29 Table of Contents (pt3) Part 2: New Methods Dynamic Analysis of XSS Vulnerabilities: The Practice Spidering for Slugs and XSS HTTP Methods: GET / POST / HEADER / COOKIES Another Simple Reflected XSS Example A Simple Stored XSS Detection Example A brief word on DOM-Based XSS
30 Table of Contents (pt4) Part 3: New Methods - Dynamic XSS Exploitation
31 Introduction / Background
32 What this presentation is & what it is not This presentation is a starter introduction to a new way of doing Dynamic XSS vulnerability detection This presentation shows SIMPLE examples in order to communicate the UNDERLYING CONCEPTS of Dynamic XSS Discovery It does NOT cover every iteration of the methods described I briefly cover DOM based XSS in this presentation but the methods described here can be extended for this as well I will cover some of these verbally It does NOT cover more complex ideas and XSS cases but it should be understood from the presentation how these may be pragmatically solved and implemented The presentation covers straight HTML / JavaScript but it should also be understood that the methods contained herein also apply to additional technologies such as Flash and ActiveX It is NOT a product pitch xsswarrior: The methodology presented herein is not theory. A real application exists that embodies this presentation and it is continuing to be enhanced to add more and more functionality described here
33 Some History Discovering the Dynamic XSS Methodologies I used major and open source scanners in large scale environments ( ) When the current automated scanners finished processing I would review the sites manually and I could almost always find additional XSS vulnerabilities not found by the scanners I noticed that the exploits returned back from these scanners did not always function properly: namely, I needed to correct the syntax to get them to execute Valentines Day 2014 Yahoo! offers a doubles bounty for sports.yahoo.co m. Found XSS Across 17 domains and every page on those domains. Why didn't their scanner(s) catch it? This lead me to create an improved automated XSS vulnerability scanning detection system that can find the types of vulnerabilities I was finding manually before I wrote a quick prototype scanner and found a bunch of XSS in bounties using the method I developed I subsequently turned prototype into a full fledged scanner xsswarrior which included expanding my original method to include Stored XSS & DOM based XSS All material contained within is patent pending
34 Part 1: The State of Automated XSS Discovery Today
35 On Payloads Static / Signature Analysis Almost all automated scanners today use a payload methodology These strings consist of: Problem: The big issue is that one needs a high volume of use cases to satisfy every single variation Problem: If it doesn't fit something predefined it isn't found Let's turn to a few Open Source examples: Sample exploits Satisfying all variations is not possible This is the XSS equivalent to antivirus signatures Please note I am a big fan of OWASP and their projects. Syntax Cannot handle complex or unique XSS issues Sometimes these strings contain an identifier or tracer value Sometimes callback / debugging payloads
36 OWASP Xenotix XSS Payloads
37 Sample Xenotix Payload Variations
38 Other Tool Payloads (XSSer)
39 Other Tool Payloads (W3af)
40 Current Know & Popular Automated XSS Testing Methods When searching out in the wild for XSS detection, all methods found used payloads to some degree Generally speaking there are only three distinct methods The rest appear to be a variation of the three Some combine different elements of the three This would include added predefined / static characters strings into the front for syntax Clearly some of these methods will yield better results When we examine the methods we will look at The underlying ideas behind the method The logic The elements / components of the payload How it all fits together in order to test for XSS
41 The Payload Slam Underlying Idea: Assign the variable's data value with a known payload without anything else to it. Notice: no trace value The logic: (signature)
42 The Tracing Payload Underlying Ideas: Put a tracer value in a known payload so the payload can be tracked If we determine the payload executes, we know which one did The Logic: (signature) The trace value, such as 12345, is embedded in the predefined payload. Example:
43 The Trace and then Payload Replace Underlying Idea: Similar to the Slam but puts a tracevalue into the logic Assign the variable's data value with a tracevalue to see if user supplied data return to the application If the tracevalue is returned, assigned a payload and determine if vulnerable The Logic: (signature)
44 Issue with Payloads Syntax and Transformations Often times a filter will: Complex Script Tag Syntax We need to be able to account for when data is transformed: example, from %27 to ' or \x27 to ' Payloads will often fail because they cannot account for filtering variations Eliminate anything to right of the bad character It needs to fit the exact payload syntax Reject the entire string if it contains a bad character
45 Part 2: New Methods Dynamic Analysis of XSS Vulnerabilities: The Theory & Practice
46 The Change of Focus from Payloads to Characters The idea is that instead of using payloads we test each situation individually based on it's specific circumstances We do this by figuring out which characters need to be tested in any given situation (context and syntax) The move from Payloads to Characters gives some distinct advantages We can figure out how the application interprets characters that are passed to it and, should there be filtering, figure out the rules of the filter. We can narrow our requirements to exactly what the situation calls for and test only for those characters needed (derived from the context and syntax) We can account for more complexity when the application does not fit a per defined set of assumptions: we can figure out the unique combination of characters and the correct syntax to define proper HTML/JavaScript/JSON/XML/etc. For example, a complex script tag. It allows for more fine grained testing This process may be used in an automated system With the characters and syntax information can dynamically discover XSS vulns, especially complex ones With the character and syntax information can write custom exploits too The key points: if we know what characters are needed for correct syntax and we know which characters get through the filter (and how to get them through) there is an extremely high probability there is an vulnerability and in some cases we can know it 100% With this information we can then turn to validation of the vulnerability and test different ways (browser / character encodings / specific strings / etc.) it may come about as well as write specific tests for the XSS issue found
47 Let`s briefly talk about slugs and fields Assignment, Tracing, Tracking & Syntax Parsing
48 Application Component Review: Filters, DB, Memory, Source & DOM
49 The Sandwich Method Remember: can advantageously be automated tests any and every character and string combinations! Instead of using a single slug (such as ), we use two in concert with one another Between the two trace slugs we can then place any additional character or string creating a new unique string Examples (no spaces normally): A <script> ' % Etc / etc / etc... If we detect the unique string in the output of the application we know our character or string has made it through the application. For example, we test a URL encoded character: We submit to app string A: % We search output for string B: ' We know if we find string B in the output we know the ' has made it through the application
50 The New Automated Dynamic XSS Detection Logic Underlying Ideas: The goal is to determine the characters needed to complete the syntax needed for XSS We can then determine if the characters and strings needed for XSS make it through the application We can create variations based on specific scenarios and get accurate testing results instead of firing blind We can create encoding variations for different characters and determine if the output would be vulnerable when interpreted by specific browser versions The Logic: <-- If tracervalue is returned somewhere in the application or found in the DOM we have a potential vulnerability <-- Parse for syntax & determine HMTL/script/etc. characters needed <-- Parse for other elements such as tags to generate XSS exploits specific for that specific scenario <--- Now we can test for special characters to see what gets through the filter <--- There can be a lot of variations on characters/strings that get tested/passed (character encodings, known strings, etc.) (custom)>tracervalue <--- Payloads get created based on results of character and string testing <--- Possible but not always needed (custom) <--- Final result (Note we are now using custom values instead of payload signatures)
51 Sandwich Method Extended Brute-Force, Special Strings, Various Encodings & more (In reality: no spaces in the examples below) 6ea261c8 <script 6ea261c8 6ea261c8 <script> 6ea261c8 6ea261c8 %3c 6ea261c8 (URL encode >) 6ea261c8 9 6ea261c8 (Decimal: ') 6ea261c8 ' 6ea261c8 (HTML Hex: ') 6ea261c8 \u0027 6ea261c8 (Unicode: ') 6ea261c8 \x27 6ea261c8 (Straight Hex: ')
52 Filtering in the field A Real-life Pen Test Example Case 1: < did not work %3c did not work %%3c WORKED Case 2: javascript did not work (it was filtered) ' did not work (it was filtered) java'script did work: turned into javascript And we can test for these cases because we are testing for characters and strings without using payloads!
53 The Questions of Accuarcy And Efficiency For most fields we only need to check the characters that make up the syntax (and any encoding variations we choose to run) Therefore: we check fewer characters than the payload method which usually checks all payloads for a parameter This is especially true if we determine that one of the essential characters needed for the syntax fails: we don't need to continue checking the additional characters. Example: a double quote needed in an HTML attribute If we like we can add additional characters we plan to use in our exploit to determine which exploit to use or how we need to build it (based on the context / syntax analysis). Examples: If we use String.fromCharCode we may want to add, (). Or if we decide to use data:text/html;base64 in an href we may need to add :/; Extremely accurate If the strings don't match we know character didn't make it through If we don't find that the essential syntax characters, strings and / or our exploit characters pass we know it will not be vulnerable We can analyze more complex issues
54 Browser Considerations Once we know the characters that pass through the application, we can build strings that are browser specific if we know that &#; will make it through but something like < will not We can get strings through that would be interpreted differently on different browsers This means we can test for XSS per browser and not just generic, perhaps IE8 is vulnerable but not IE10 or FireFox 35, etc.
55 Goodbye Payloads XSS is about Characters, Slugs, Parsing & Filtering Key Takeaways! Figure out how the application works via character determination is more advantageous than blindly submitting payload strings We can figure how the application behaves by using the sandwich method to trace character and string data to figure out how the application will behave: filter and / or transform data Using the character & syntax data is more accurate and efficient We can use the character & syntax data to determine if a vulnerability or potentially vulnerability exists and then create custom exploits especially when the syntax is complex. We can use the sandwich method to test for characters and strings in other circumstances even if we cannot parse the source: Flash, ActiveX, etc.
56 Part 2: New Methods Dynamic Analysis of XSS Vulnerabilities: The Practice
57 Spidering for slugs and XSS In reality any number of methods can be used to get URLs (especially for AJAX URLs ) for ease of discussion we will stick with spidering Whatever method is used, when spidering the application the components search for slugs If they are immediately found after the page submission we have a Reflected XSS If they are submitted but found on another page (in the same session) we have InMemory XSS If they are found after the session is cleared and a new one is formed we have Stored XSS We find our slugs referenced in the immediate page in the client memory (DOM based) If these slugs are found, they are recorded and associated with the location they were inputted The goal is to find places to input but also find where slugs are outputted We map the input to output of the slugs: this may be a 1 to Many relationship, especially when dealing with Stored XSS (think a name field) Once we have the input and then the output we can test which characters go in and come out using the Sandwhich Method. We can then track the results and the one's that have vulnerabilities based on characters and syntax we can being generating exploits.
58 Testing Application Methods & Synataxes We can use the sandwich and detection methods described above to test different methods and parts of the application GET / POST / HEADER / COOKIES The application can also test for different syntax formats and test those JSON / HTML / XML / Etc.
59 A bried word on DOM-Based XSS We can search through the DOM for the slug We can then search through the DOM for the slug sandwich and determine the characters can be represented / not filtered or transformed We can determine what strings / exploits can be represented in the DOM We can then used various validation methods such as callbacks, debug, etc. to test exploits
60 Part 3: New Methods A Brief Method for Dynamic XSS Exploitation
61 Issues with Current Static XSS Exploit Payloads The issue is that the payload is the exploit It is not customized for the context / syntax It could transform due to a filter but there still may be a vulnerability Introducing Dynamic XSS Exploit Analysis and Generation By knowing the characters and the context a customized exploit may be developed for specific situation, including accounting for transformations of characters through the filter (see pen testing example earlier %%3c)
62 Method to Determine and Create Custom XSS Exploit (pt1) Recall our testing logic: <-- If tracervalue is returned somewhere in the application or found in the DOM we have a potential vulnerability <-- Parse for syntax & determine HMTL/script/etc. characters needed <-- Parse for other elements such as tags to generate XSS exploits specific for that specific scenario <--- Now we can test for special characters to see what gets through the filter <--- There can be a lot of variations on characters/strings that get tested/passed (character encodings, known strings, etc.) (custom)>tracervalue <--- Payload based on results of testing <--- Possible but not always needed (custom) <--- Final result
63 Method to Determine and Create Custom XSS Exploit (pt2) A Simple Dynamic Custom XSS Exploit Method Step 1: Find Slug in HTML Step 2: Parse HTML to determine where CheckSum exists / syntax check Step 3: Determine characters needed to pass through filter based on HTML Syntax Step 4: Use XSS Test Method to determine characters that pass through filter Step 5: If characters pass through filter, build exploit string based on characters and context and then check if exploit string passes through filter Step 6: (optional) Exploit string can be out of band callback for extra validation Step 7: Remove MD5 Check Sum and Save Exploit Based on the characters and syntax needed, we may decide to add special characters to test which we most likely would use in the exploit we plan to use We can technically make this determination either after we test the preliminary characters That is to say, after we determine if the necessary characters get through via step Step 3 Or, we can guess and add them to Step 3 and test everything at once
64 Writing the Dynamic Exploit We can make it more complex depending on the different exploits for the context: html tag / text or attribute / script / etc. For instance, in the body tag: If we can pass =() we might be able to exploit onload="exploit()" Where we might not be able to pass </>() ><script>alert(10)</script> < We can account for the transformation and / or filtering mechanisms in place in the application < will not make it through but %% does
65 Q&A
66 Ken`s Contact Information Product: Twitter: Me: Research: Essays: Stop by and say, 'Hi'!
67 Bio of Kenneth F.Belva Kenneth F. Belva is the Publisher and Editor-in-Chief of bloginfosec.com. He is current develops xsswarrior, currently the only scanner than can automate testing for Stored XSS, for commercial use at xsswarrior.com. In addition, he is an independent penetration tester and security researcher. For the past 15 years he worked in Cyber Security mainly in the financial services vertical, most recently at a multinational conglomerate, conducting both technical and non-technical risk assessments at the application and network layers. From he managed an Information Technology Risk Management Program for a bank whose assets are Billions of dollars. At the OWASP AppSec2013 conference BugCrowd validated three of his 0-day vulnerabilities he found in Yahoo, Yandex and Angelist within the first two days of BugBash2013. He has since been credited with finding a number of other vulnerabilities on sites such as Netflix and OKCupid. He was previously on the board of the New York Metro Chapter of the Information Systems Security Association (ISSA) where he served in various capacities over the past 9 years. He has spoken and moderated at the United Nations as well as presented on AT&T s Internet Security News Network (ISNN) on discovering unknown web application vulnerabilities as well as being interviewed on security enablement. ITsecurity.com recognized him as one of the top information security influencers in In 2009, he was published in the Information Security Management Handbook, Sixth Edition, edited by Hal Tipton and Micki Krause. He also co-authored one of the central chapters in Enterprise Information Security and Privacy, edited by Warren Axelrod, Jennifer L. Bayuk and Daniel Schutzer. He recently co-authored a paper entitled Creating Business Through Virtual Trust: How to Gain and Sustain a Competitive Advantage Using Information Security with Sam Dekay of The Bank of New York. of security breaches on stock prices. Mr. Belva frequently presents at information security conferences around the US as well as globally. He writes on day-to-day information security experiences in a non-essay format at SecurityMaverick.com when time permits and can be followed on
68 Slide Deck 3 xsswarrior & XSS: A Basic Introduction All Material and Methods Contained Here Patent Pending Globally. All Rights Reserved. xsswarrior.com 26
69 xsswarrior & XSS: A Basic Introduction Kenneth F. Belva, CISSP, CEH All Material and Methods Contained Here Patent Pending Globally. All Rights Reserved. xsswarrior.com 27
70 xsswarrior & XSS Presented at One of World's Top Cyber Sec Conferences What are some of the consequences of XSS? How is it different? What are some benefits? Some Public Results Graphical Interfaces Conclusion Who Am I? Contact Information All Material and Methods Contained Here Patent Pending Globally. All Rights Reserved. xsswarrior.com 28
71 What are some of the the consequences of XSS? Log in as another person (session stealing) Install malware such as APTs (Advanced Persistent Threats) on the user visiting the compromised website Redirect users to a fake / malicious website under attacker's control All Material and Methods Contained Here Patent Pending Globally. All Rights Reserved. xsswarrior.com 29
72 How is it different? What are some benefits? xsswarrior uses a proprietary method to test and detect for XSS vulnerabilities Finds difficult XSS vulnerabilities in complex code The scanner excels at a notorious difficult XSS issue: Stored XSS Up to now most scanners cannot test for this accurately due to the limitations of the current techniques The Benefits: With the new automated process, the application lowers the total cost to find XSS vulnerabilities Tool easily fits into existing automated scanning processes and procedures All Material and Methods Contained Here Patent Pending Globally. All Rights Reserved. xsswarrior.com 30
73 Some Public Results Patent-Pending Technique used to find XSS vulnerabilities on following Bug Bounty programs Netflix Yahoo OKCupid Yandex xsswarrior found XSS in below applications resulting in CVEs CVE Exponent CMS CVE Your online shop CVE Pizza Inn [To be assigned] TomatoCart CVE MyConnection Server 8.2b All Material and Methods Contained Here Patent Pending Globally. All Rights Reserved. xsswarrior.com 31
74 All Material and Methods Contained Here Patent Pending Globally. All Rights Reserved. xsswarrior.com 32
75 Graphical Interface All Material and Methods Contained Here Patent Pending Globally. All Rights Reserved. xsswarrior.com 33
76 Results Part 1 All Material and Methods Contained Here Patent Pending Globally. All Rights Reserved. xsswarrior.com 34
77 Results Part 2 All Material and Methods Contained Here Patent Pending Globally. All Rights Reserved. xsswarrior.com 35
78 Conclusion Use xsswarrior to find common and hard to find XSS vulnerabilities in web properties Protect the infrastructure by finding security holes before bad guys do (defense) Find XSS holes in adversaries websites before they do (offense) All Material and Methods Contained Here Patent Pending Globally. All Rights Reserved. xsswarrior.com 36
79 Who Am I? I am almost 20 year veteran in the cyber security field Had technical and managerial roles in the cyber space: currently developing xsswarrior for public release Active in NYC cyber scene: prior 8+ year board member of NYC chapter of ISSA Presented at NYC chapters of OWASP, ISSA, ISC2 and ASIS All Material and Methods Contained Here Patent Pending Globally. All Rights Reserved. xsswarrior.com 37
Acunetix Website Audit. 5 November, 2014. Developer Report. Generated by Acunetix WVS Reporter (v8.0 Build 20120808)
Acunetix Website Audit 5 November, 2014 Developer Report Generated by Acunetix WVS Reporter (v8.0 Build 20120808) Scan of http://filesbi.go.id:80/ Scan details Scan information Starttime 05/11/2014 14:44:06
The Top Web Application Attacks: Are you vulnerable?
QM07 The Top Web Application Attacks: Are you vulnerable? John Burroughs, CISSP Sr Security Architect, Watchfire Solutions [email protected] Agenda Current State of Web Application Security Understanding
HTTPParameter Pollution. ChrysostomosDaniel
HTTPParameter Pollution ChrysostomosDaniel Introduction Nowadays, many components from web applications are commonly run on the user s computer (such as Javascript), and not just on the application s provider
Detecting and Exploiting XSS with Xenotix XSS Exploit Framework
Detecting and Exploiting XSS with Xenotix XSS Exploit Framework [email protected] keralacyberforce.in Introduction Cross Site Scripting or XSS vulnerabilities have been reported and exploited since 1990s.
EVALUATING COMMERCIAL WEB APPLICATION SECURITY. By Aaron Parke
EVALUATING COMMERCIAL WEB APPLICATION SECURITY By Aaron Parke Outline Project background What and why? Targeted sites Testing process Burp s findings Technical talk My findings and thoughts Questions Project
Web Application Security. Vulnerabilities, Weakness and Countermeasures. Massimo Cotelli CISSP. Secure
Vulnerabilities, Weakness and Countermeasures Massimo Cotelli CISSP Secure : Goal of This Talk Security awareness purpose Know the Web Application vulnerabilities Understand the impacts and consequences
Intrusion detection for web applications
Intrusion detection for web applications Intrusion detection for web applications Łukasz Pilorz Application Security Team, Allegro.pl Reasons for using IDS solutions known weaknesses and vulnerabilities
Blackbox Reversing of XSS Filters
Blackbox Reversing of XSS Filters Alexander Sotirov [email protected] Introduction Web applications are the future Reversing web apps blackbox reversing very different environment and tools Cross-site scripting
Creating Stronger, Safer, Web Facing Code. JPL IT Security Mary Rivera June 17, 2011
Creating Stronger, Safer, Web Facing Code JPL IT Security Mary Rivera June 17, 2011 Agenda Evolving Threats Operating System Application User Generated Content JPL s Application Security Program Securing
Web Application Security
Web Application Security John Zaharopoulos ITS - Security 10/9/2012 1 Web App Security Trends Web 2.0 Dynamic Webpages Growth of Ajax / Client side Javascript Hardening of OSes Secure by default Auto-patching
(WAPT) Web Application Penetration Testing
(WAPT) Web Application Penetration Testing Module 0: Introduction 1. Introduction to the course. 2. How to get most out of the course 3. Resources you will need for the course 4. What is WAPT? Module 1:
Web Application Attacks And WAF Evasion
Web Application Attacks And WAF Evasion Ahmed ALaa (EG-CERT) 19 March 2013 What Are We Going To Talk About? - introduction to web attacks - OWASP organization - OWASP frameworks - Crawling & info. gathering
Project 2: Web Security Pitfalls
EECS 388 September 19, 2014 Intro to Computer Security Project 2: Web Security Pitfalls Project 2: Web Security Pitfalls This project is due on Thursday, October 9 at 6 p.m. and counts for 8% of your course
A Server and Browser-Transparent CSRF Defense for Web 2.0 Applications. Slides by Connor Schnaith
A Server and Browser-Transparent CSRF Defense for Web 2.0 Applications Slides by Connor Schnaith Cross-Site Request Forgery One-click attack, session riding Recorded since 2001 Fourth out of top 25 most
Bypassing Web Application Firewalls (WAFs) Ing. Pavol Lupták, CISSP, CEH Lead Security Consultant
Bypassing Web Application Firewalls (WAFs) Ing. Pavol Lupták, CISSP, CEH Lead Security Consultant Nethemba All About Security Highly experienced certified IT security experts (CISSP, C EH, SCSecA) Core
Adobe Systems Incorporated
Adobe Connect 9.2 Page 1 of 8 Adobe Systems Incorporated Adobe Connect 9.2 Hosted Solution June 20 th 2014 Adobe Connect 9.2 Page 2 of 8 Table of Contents Engagement Overview... 3 About Connect 9.2...
Cracking the Perimeter via Web Application Hacking. Zach Grace, CISSP, CEH [email protected] January 17, 2014 2014 Mega Conference
Cracking the Perimeter via Web Application Hacking Zach Grace, CISSP, CEH [email protected] January 17, 2014 2014 Mega Conference About 403 Labs 403 Labs is a full-service information security and compliance
Web Application Hacking (Penetration Testing) 5-day Hands-On Course
Web Application Hacking (Penetration Testing) 5-day Hands-On Course Web Application Hacking (Penetration Testing) 5-day Hands-On Course Course Description Our web sites are under attack on a daily basis
Application security testing: Protecting your application and data
E-Book Application security testing: Protecting your application and data Application security testing is critical in ensuring your data and application is safe from security attack. This ebook offers
ASL IT SECURITY BEGINNERS WEB HACKING AND EXPLOITATION
ASL IT SECURITY BEGINNERS WEB HACKING AND EXPLOITATION V 2.0 A S L I T S e c u r i t y P v t L t d. Page 1 Overview: Learn the various attacks like sql injections, cross site scripting, command execution
VIDEO intypedia007en LESSON 7: WEB APPLICATION SECURITY - INTRODUCTION TO SQL INJECTION TECHNIQUES. AUTHOR: Chema Alonso
VIDEO intypedia007en LESSON 7: WEB APPLICATION SECURITY - INTRODUCTION TO SQL INJECTION TECHNIQUES AUTHOR: Chema Alonso Informática 64. Microsoft MVP Enterprise Security Hello and welcome to Intypedia.
Integrating Web Application Security into the IT Curriculum
Integrating Web Application Security into the IT Curriculum James Walden Northern Kentucky University Topics 1. 2. 3. 4. Why should we teach web application security? What material do we need to cover?
Criteria for web application security check. Version 2015.1
Criteria for web application security check Version 2015.1 i Content Introduction... iii ISC- P- 001 ISC- P- 001.1 ISC- P- 001.2 ISC- P- 001.3 ISC- P- 001.4 ISC- P- 001.5 ISC- P- 001.6 ISC- P- 001.7 ISC-
The Web AppSec How-to: The Defenders Toolbox
The Web AppSec How-to: The Defenders Toolbox Web application security has made headline news in the past few years. Incidents such as the targeting of specific sites as a channel to distribute malware
The purpose of this report is to educate our prospective clients about capabilities of Hackers Locked.
This sample report is published with prior consent of our client in view of the fact that the current release of this web application is three major releases ahead in its life cycle. Issues pointed out
CSE598i - Web 2.0 Security OWASP Top 10: The Ten Most Critical Web Application Security Vulnerabilities
CSE598i - Web 2.0 Security OWASP Top 10: The Ten Most Critical Web Application Security Vulnerabilities Thomas Moyer Spring 2010 1 Web Applications What has changed with web applications? Traditional applications
Web Security Testing Cookbook*
Web Security Testing Cookbook* Systematic Techniques to Find Problems Fast Paco Hope and Ben Walther O'REILLY' Beijing Cambridge Farnham Koln Sebastopol Tokyo Table of Contents Foreword Preface xiii xv
External Vulnerability Assessment. -Technical Summary- ABC ORGANIZATION
External Vulnerability Assessment -Technical Summary- Prepared for: ABC ORGANIZATI On March 9, 2008 Prepared by: AOS Security Solutions 1 of 13 Table of Contents Executive Summary... 3 Discovered Security
Chapter 1 Web Application (In)security 1
Introduction xxiii Chapter 1 Web Application (In)security 1 The Evolution of Web Applications 2 Common Web Application Functions 4 Benefits of Web Applications 5 Web Application Security 6 "This Site Is
Where every interaction matters.
Where every interaction matters. Peer 1 Vigilant Web Application Firewall Powered by Alert Logic The Open Web Application Security Project (OWASP) Top Ten Web Security Risks and Countermeasures White Paper
Security Research Advisory IBM inotes 9 Active Content Filtering Bypass
Security Research Advisory IBM inotes 9 Active Content Filtering Bypass Table of Contents SUMMARY 3 VULNERABILITY DETAILS 3 TECHNICAL DETAILS 4 LEGAL NOTICES 7 Active Content Filtering Bypass Advisory
Rational AppScan & Ounce Products
IBM Software Group Rational AppScan & Ounce Products Presenters Tony Sisson and Frank Sassano 2007 IBM Corporation IBM Software Group The Alarming Truth CheckFree warns 5 million customers after hack http://infosecurity.us/?p=5168
RIA SECURITY TECHNOLOGY
RIA SECURITY TECHNOLOGY Ulysses Wang Security Researcher, Websense Hermes Li Security Researcher, Websense 2009 Websense, Inc. All rights reserved. Agenda RIA Introduction Flash Security Attack Vectors
Carlos Muñoz Application Security Engineer WhiteHat Security @RTWaysea
Carlos Muñoz Application Security Engineer WhiteHat Security @RTWaysea Bypass: History Explanation: What Is Going On Process: Things To Look For Demos: alert(1) Done Live (hopefully) CSP: Content Security
Application Security Testing. Erez Metula (CISSP), Founder Application Security Expert [email protected]
Application Security Testing Erez Metula (CISSP), Founder Application Security Expert [email protected] Agenda The most common security vulnerabilities you should test for Understanding the problems
Cross Site Scripting (XSS) and PHP Security. Anthony Ferrara NYPHP and OWASP Security Series June 30, 2011
Cross Site Scripting (XSS) and PHP Security Anthony Ferrara NYPHP and OWASP Security Series June 30, 2011 What Is Cross Site Scripting? Injecting Scripts Into Otherwise Benign and Trusted Browser Rendered
Web Application Security
E-SPIN PROFESSIONAL BOOK Vulnerability Management Web Application Security ALL THE PRACTICAL KNOW HOW AND HOW TO RELATED TO THE SUBJECT MATTERS. COMBATING THE WEB VULNERABILITY THREAT Editor s Summary
A Tale of the Weaknesses of Current Client-Side XSS Filtering
Call To Arms: A Tale of the Weaknesses of Current Client-Side XSS Filtering Martin Johns, Ben Stock, Sebastian Lekies About us Martin Johns, Ben Stock, Sebastian Lekies Security Researchers at SAP, Uni
Sandy. The Malicious Exploit Analysis. http://exploit-analysis.com/ Static Analysis and Dynamic exploit analysis. Garage4Hackers
Sandy The Malicious Exploit Analysis. http://exploit-analysis.com/ Static Analysis and Dynamic exploit analysis About Me! I work as a Researcher for a Global Threat Research firm.! Spoke at the few security
Input Validation Vulnerabilities, Encoded Attack Vectors and Mitigations OWASP. The OWASP Foundation. Marco Morana & Scott Nusbaum
Input Validation Vulnerabilities, Encoded Attack Vectors and Mitigations Marco Morana & Scott Nusbaum Cincinnati Chapter September 08 Meeting Copyright 2008 The Foundation Permission is granted to copy,
Implementation of Web Application Security Solution using Open Source Gaurav Gupta 1, B. K. Murthy 2, P. N. Barwal 3
Implementation of Web Application Security Solution using Open Source Gaurav Gupta 1, B. K. Murthy 2, P. N. Barwal 3 ABSTRACT 1 Project Engineer, CDACC-56/1, Sector-62, Noida, 2 Executive Director, CDACC-56/1,
Revisiting SQL Injection Will we ever get it right? Michael Sutton, Security Evangelist
Revisiting SQL Injection Will we ever get it right? Michael Sutton, Security Evangelist Overview Background What it is? How are we doing? Web 2.0 SQL injection meets AJAX Fuggle SQL Injection meets Google
How To Protect A Web Application From Attack From A Trusted Environment
Standard: Version: Date: Requirement: Author: PCI Data Security Standard (PCI DSS) 1.2 October 2008 6.6 PCI Security Standards Council Information Supplement: Application Reviews and Web Application Firewalls
Recon and Mapping Tools and Exploitation Tools in SamuraiWTF Report section Nick Robbins
Recon and Mapping Tools and Exploitation Tools in SamuraiWTF Report section Nick Robbins During initial stages of penetration testing it is essential to build a strong information foundation before you
Cross Site Scripting Prevention
Project Report CS 649 : Network Security Cross Site Scripting Prevention Under Guidance of Prof. Bernard Menezes Submitted By Neelamadhav (09305045) Raju Chinthala (09305056) Kiran Akipogu (09305074) Vijaya
QualysGuard WAS. Getting Started Guide Version 3.3. March 21, 2014
QualysGuard WAS Getting Started Guide Version 3.3 March 21, 2014 Copyright 2011-2014 by Qualys, Inc. All Rights Reserved. Qualys, the Qualys logo and QualysGuard are registered trademarks of Qualys, Inc.
Web Application Penetration Testing
Web Application Penetration Testing 2010 2010 AT&T Intellectual Property. All rights reserved. AT&T and the AT&T logo are trademarks of AT&T Intellectual Property. Will Bechtel [email protected]
<Insert Picture Here> Oracle Web Cache 11g Overview
Oracle Web Cache 11g Overview Oracle Web Cache Oracle Web Cache is a secure reverse proxy cache and a compression engine deployed between Browser and HTTP server Browser and Content
Bypassing Internet Explorer s XSS Filter
Bypassing Internet Explorer s XSS Filter Or: Oops, that s not supposed to happen. Carlos @RTWaysea About Me Mechanical Drafting Background Engine parts, Architectural fixtures, etc. Friend said Try This
WHITE PAPER. FortiWeb and the OWASP Top 10 Mitigating the most dangerous application security threats
WHITE PAPER FortiWeb and the OWASP Top 10 PAGE 2 Introduction The Open Web Application Security project (OWASP) Top Ten provides a powerful awareness document for web application security. The OWASP Top
Information Supplement: Requirement 6.6 Code Reviews and Application Firewalls Clarified
Standard: Data Security Standard (DSS) Requirement: 6.6 Date: February 2008 Information Supplement: Requirement 6.6 Code Reviews and Application Firewalls Clarified Release date: 2008-04-15 General PCI
Out of the Fire - Adding Layers of Protection When Deploying Oracle EBS to the Internet
Out of the Fire - Adding Layers of Protection When Deploying Oracle EBS to the Internet March 8, 2012 Stephen Kost Chief Technology Officer Integrigy Corporation Phil Reimann Director of Business Development
Newsletter - September 2014. T o o l s W a t c h T e a m NJ OUCHN & MJ SOLER
Newsletter - September 2014 T o o l s W a t c h T e a m NJ OUCHN & MJ SOLER Tools! Lots of Tools Released! During September 2014, we published 7 Posts with 2 News Tools. Organized by Date OWASP Xenotix
Introduction:... 1 Security in SDLC:... 2 Penetration Testing Methodology: Case Study... 3
Table of Contents Introduction:... 1 Security in SDLC:... 2 Penetration Testing Methodology: Case Study... 3 Information Gathering... 3 Vulnerability Testing... 7 OWASP TOP 10 Vulnerabilities:... 8 Injection
Penetration Test Report
Penetration Test Report Acme Test Company ACMEIT System 26 th November 2010 Executive Summary Info-Assure Ltd was engaged by Acme Test Company to perform an IT Health Check (ITHC) on the ACMEIT System
SESSION IDENTIFIER ARE FOR NOW, PASSWORDS ARE FOREVER
SESSION IDENTIFIER ARE FOR NOW, PASSWORDS ARE FOREVER XSS-BASED ABUSE OF BROWSER PASSWORD MANAGERS Ben Stock, Martin Johns, Sebastian Lekies Browser choices Full disclosure: Ben was an intern with Microsoft
Improving Web Vulnerability Scanning. Daniel Zulla
Improving Web Vulnerability Scanning 1 Daniel Zulla Introduction Hey! 2 Hi there! I m Dan. This is my first year at DEFCON. I do programming and security start-ups. I do some penetration testing as well
The Dark Side of Ajax. Jacob West Fortify Software
The Dark Side of Ajax Jacob West Fortify Software Mashup Pink Floyd Dark Side of the Moon AJAX all purpose cleaner Ajax! " Fancier and easier-to-use web applications using: Asynchronous JavaScript And
Securing Secure Browsers
Securing Secure Browsers SESSION ID: TRM-T11 Prashant Kumar Verma Sr. Consultant & Head (Security Testing) Paladion Networks @prashantverma21 Agenda Browser Threats Secure Browsers to address threats Secure
Hack Proof Your Webapps
Hack Proof Your Webapps About ERM About the speaker Web Application Security Expert Enterprise Risk Management, Inc. Background Web Development and System Administration Florida International University
HTML5. Eoin Keary CTO BCC Risk Advisory. www.bccriskadvisory.com www.edgescan.com
HTML5 Eoin Keary CTO BCC Risk Advisory www.bccriskadvisory.com www.edgescan.com Where are we going? WebSockets HTML5 AngularJS HTML5 Sinks WebSockets: Full duplex communications between client or server
Cyber Security Challenge Australia 2014
Cyber Security Challenge Australia 2014 www.cyberchallenge.com.au CySCA2014 Web Penetration Testing Writeup Background: Pentest the web server that is hosted in the environment at www.fortcerts.cysca Web
WEB ATTACKS AND COUNTERMEASURES
WEB ATTACKS AND COUNTERMEASURES February 2008 The Government of the Hong Kong Special Administrative Region The contents of this document remain the property of, and may not be reproduced in whole or in
ASP.NET MVC Secure Coding 4-Day hands on Course. Course Syllabus
ASP.NET MVC Secure Coding 4-Day hands on Course Course Syllabus Course description ASP.NET MVC Secure Coding 4-Day hands on Course Secure programming is the best defense against hackers. This multilayered
ABC LTD EXTERNAL WEBSITE AND INFRASTRUCTURE IT HEALTH CHECK (ITHC) / PENETRATION TEST
ABC LTD EXTERNAL WEBSITE AND INFRASTRUCTURE IT HEALTH CHECK (ITHC) / PENETRATION TEST Performed Between Testing start date and end date By SSL247 Limited SSL247 Limited 63, Lisson Street Marylebone London
ASL IT Security Advanced Web Exploitation Kung Fu V2.0
ASL IT Security Advanced Web Exploitation Kung Fu V2.0 A S L I T S e c u r i t y P v t L t d. Page 1 Overview: There is a lot more in modern day web exploitation than the good old alert( xss ) and union
EC-Council CAST CENTER FOR ADVANCED SECURITY TRAINING. CAST 619 Advanced SQLi Attacks and Countermeasures. Make The Difference CAST.
CENTER FOR ADVANCED SECURITY TRAINING 619 Advanced SQLi Attacks and Countermeasures Make The Difference About Center of Advanced Security Training () The rapidly evolving information security landscape
Cross-Site Scripting
Cross-Site Scripting (XSS) Computer and Network Security Seminar Fabrice Bodmer ([email protected]) UNIFR - Winter Semester 2006-2007 XSS: Table of contents What is Cross-Site Scripting (XSS)? Some
Check list for web developers
Check list for web developers Requirement Yes No Remarks 1. Input Validation 1.1) Have you done input validation for all the user inputs using white listing and/or sanitization? 1.2) Does the input validation
What is Web Security? Motivation
[email protected] http://www.brucker.ch/ Information Security ETH Zürich Zürich, Switzerland Information Security Fundamentals March 23, 2004 The End Users View The Server Providers View What is Web
Excellence Doesn t Need a Certificate. Be an. Believe in You. 2014 AMIGOSEC Consulting Private Limited
Excellence Doesn t Need a Certificate Be an 2014 AMIGOSEC Consulting Private Limited Believe in You Introduction In this age of emerging technologies where IT plays a crucial role in enabling and running
Web Application Security
White Paper Web Application Security Managing Cross-Site Scripting, The Number One Item on OWASP s Top Ten List Introduction: What is OWASP? The Open Web Application Security Project (OWASP) is, by its
Web Application Worms & Browser Insecurity
Web Application Worms & Browser Insecurity Mike Shema Welcome Background Hacking Exposed: Web Applications The Anti-Hacker Toolkit Hack Notes: Web Security Currently working at Qualys
Application Layer Encryption: Protecting against Application Logic and Session Theft Attacks. Whitepaper
Application Layer Encryption: Protecting against Application Logic and Session Theft Attacks Whitepaper The security industry has extensively focused on protecting against malicious injection attacks like
MetaXSSploit. Bringing XSS in Pentesting A journey in building a security tool. Claudio Criscione @paradoxengine
` MetaXSSploit Bringing XSS in Pentesting A journey in building a security tool Claudio Criscione @paradoxengine /me No Aff XSS And how a security tool is born! Relevant? Web Application Security Statistics
Finding Your Way in Testing Jungle. A Learning Approach to Web Security Testing.
Finding Your Way in Testing Jungle A Learning Approach to Web Security Testing. Research Questions Why is it important to improve website security? What techniques are already in place to test security?
Practical Exploitation Using A Malicious Service Set Identifier (SSID)
Practical Exploitation Using A Malicious Service Set Identifier (SSID) Deral Heiland Senior Security Engineer CDW Advanced Technology Services Mike Belton Technical Lead CDW Advanced Technology Services
Web-Application Security
Web-Application Security Kristian Beilke Arbeitsgruppe Sichere Identität Fachbereich Mathematik und Informatik Freie Universität Berlin 29. Juni 2011 Overview Web Applications SQL Injection XSS Bad Practice
MWR InfoSecurity Security Advisory. BT Home Hub SSID Script Injection Vulnerability. 10 th May 2010. Contents
Contents MWR InfoSecurity Security Advisory BT Home Hub SSID Script Injection Vulnerability 10 th May 2010 2010-05-10 Page 1 of 8 Contents Contents 1 Detailed Vulnerability Description... 5 1.1 Technical
Conducting Web Application Pentests. From Scoping to Report For Education Purposes Only
Conducting Web Application Pentests From Scoping to Report For Education Purposes Only Web App Pen Tests According to OWASP: A Web Application Penetration Test focuses only on evaluating the security of
Security vulnerabilities in new web applications. Ing. Pavol Lupták, CISSP, CEH Lead Security Consultant
Security vulnerabilities in new web applications Ing. Pavol Lupták, CISSP, CEH Lead Security Consultant $whoami Introduction Pavol Lupták 10+ years of practical experience in security and seeking vulnerabilities
Secure in 2010? Broken in 2011! Matias Madou, PhD Principal Security Researcher
Secure in 2010? Broken in 2011! Matias Madou, PhD Principal Security Researcher Matias Madou Principal Security Researcher, Fortify an HP Company Static Analysis Rules Insider Threat Research Runtime products:
Hacking Intranet Websites from the Outside (Take 2) Fun With & Without JavaScript Malware
Hacking Intranet Websites from the Outside (Take 2) Fun With & Without JavaScript Malware July 2007 Jeremiah Grossman Founder and CTO, WhiteHat Security A WhiteHat Security Whitepaper 3003 Bunker Hill
Webapps Vulnerability Report
Tuesday, May 1, 2012 Webapps Vulnerability Report Introduction This report provides detailed information of every vulnerability that was found and successfully exploited by CORE Impact Professional during
How to break in. Tecniche avanzate di pen testing in ambito Web Application, Internal Network and Social Engineering
How to break in Tecniche avanzate di pen testing in ambito Web Application, Internal Network and Social Engineering Time Agenda Agenda Item 9:30 10:00 Introduction 10:00 10:45 Web Application Penetration
How to Build a Trusted Application. John Dickson, CISSP
How to Build a Trusted Application John Dickson, CISSP Overview What is Application Security? Examples of Potential Vulnerabilities Strategies to Build Secure Apps Questions and Answers Denim Group, Ltd.
National Information Security Group The Top Web Application Hack Attacks. Danny Allan Director, Security Research
National Information Security Group The Top Web Application Hack Attacks Danny Allan Director, Security Research 1 Agenda Web Application Security Background What are the Top 10 Web Application Attacks?
ArcGIS Server Security Threats & Best Practices 2014. David Cordes Michael Young
ArcGIS Server Security Threats & Best Practices 2014 David Cordes Michael Young Agenda Introduction Threats Best practice - ArcGIS Server settings - Infrastructure settings - Processes Summary Introduction
Strategic Information Security. Attacking and Defending Web Services
Security PS Strategic Information Security. Attacking and Defending Web Services Presented By: David W. Green, CISSP [email protected] Introduction About Security PS Application Security Assessments
Cross Site Scripting in Joomla Acajoom Component
Whitepaper Cross Site Scripting in Joomla Acajoom Component Vandan Joshi December 2011 TABLE OF CONTENTS Abstract... 3 Introduction... 3 A Likely Scenario... 5 The Exploit... 9 The Impact... 12 Recommended
Still Aren't Doing. Frank Kim
Ten Things Web Developers Still Aren't Doing Frank Kim Think Security Consulting Background Frank Kim Consultant, Think Security Consulting Security in the SDLC SANS Author & Instructor DEV541 Secure Coding
How To Understand The History Of The Web (Web)
(World Wide) Web WWW A way to connect computers that provide information (servers) with computers that ask for it (clients like you and me) uses the Internet, but it's not the same as the Internet URL
Passing PCI Compliance How to Address the Application Security Mandates
Passing PCI Compliance How to Address the Application Security Mandates The Payment Card Industry Data Security Standards includes several requirements that mandate security at the application layer. These
