Improving Web Application Firewall Testing (WAF) for better Deployment in Production Networks January 2009 OWASP Israel
|
|
|
- Hilary Melton
- 10 years ago
- Views:
Transcription
1 Improving Web Application Firewall Testing (WAF) for better Deployment in Production Networks January 2009 OWASP Israel Gregory Fresnais Director of International Business Development Tel:
2 BreakingPoint Systems Founded September 2005 Management track record Deep networking, security, & performance assurance expertise Breakthrough, award-winning products Privately held and based in Austin, TX Sales & Support: US, Canada, UK, France, Italy, Spain, Netherlands, Belgium, Israel, China, Japan, Korea, Taiwan, Malaysia, New Zeeland, Australia. Represented by WebHouse Technologies in Israel.
3 What Does BreakingPoint Deliver? Comprehensive Layer 2-7 testing for network equipment and application servers High-performance, compact, flexible and easy-to-use products Realistic performance and security validation using stateful application protocols and live security attacks 3
4 Examples of BreakingPoint Tests Realistic Traffic Emulation: Layer 2-7 Bit Blaster - Generates Ethernet frames (L2 Tests) Routing Robot - Generates IP packets (L3 Tests) Session Sender - Generates valid TCP sessions (L4 Tests) App Sim Generates 70+ realistic application flows (L7 Tests) Capture and Recreate - Capture and playback PCAP Layer 4-7 Malicious Traffic Simulation Layer 2-7 Security Module 3,700+ unique attacks, 80+ evasion types Stack Scrambler Protocol fuzzing 4
5 70+ Client and Server Protocols Supported HTTP HTTPS POP3 IMAP Finger RTMP MAPI Yahoo! Messenger Informix Database MSN Messenger Jabber ICQ QOTD Gopher DNS RTP SIP TCP/UDP SMTP RTSP SNMP FTP RLogin Rshell QQ Messenger RSync DB2 Database AOL IM BOOTPS DCE/RPC LDAP NFSD NTP SSH Postgres Database FIX FIXT CIFS SMB BitTorrent edonkey NetBIOS RADIUS Accounting RADIUS Access Gnutella VMware VMotion Telnet Sybase Database MM4 Oracle Database Microsoft SQL Server World of Warcraft 5
6 Web Application Firewall Deployment Scenarios 6
7 Simple Web Service Infrastructure Topology: Client Web Server Application Server Database Server 7
8 Different Protocols to Exchange Information Communication between Client and Web Server over HTTP Communication between Web and Application Servers over HTTP Communication between Application and Database Server over SQL 8
9 Different Types of WAF Deploy WAFs between Client and Server, Web Server and Application Server, and Application Server and Database Server 9
10 Network Topologies for Deploying Web Application Firewall 10
11 Transparent Bridge Deployment WAF deployed in Transparent Bridge Client and Server in same subnet 11
12 Router/NAT Deployment WAF deployed in Router/NAT Client and Server in different subnet Server IP address abstracted 12
13 Reverse Proxy Deployment WAF deployed in Reverse Proxy Client and Server in different subnet Server IP address abstracted L7 features enabled like Load Balancing, Compression, Caching, TCP Connection Multiplexing, URL Rewriting, etc 13
14 Configuration Options for Deploying Web Application Firewall 14
15 Communication Via HTTP Communication between the Client and the WAF over HTTP Communication between the WAF and the Server over HTTP 15
16 Communication Via HTTPS and HTTP Communication between the Client and the WAF over HTTPS Communication between the WAF and the Server over HTTP 16
17 Communication Via HTTPS Communication between the Client and the WAF over HTTPS Communication between the WAF and the Server over HTTPS 17
18 Communication Via SQL Communication between the Client and the WAF over SQL Communication between the WAF and the Server over SQL 18
19 Testing Web Application Firewalls Before Deployment 19
20 WAF Vendor Comparison Vs. Cannot make the right decision with the limited information on vendor datasheets What are the HTTP Transactions per Second? HTTP 1.0 vs. HTTP 1.1, Object Size, TCP Close RST vs. FIN, What are the HTTPS Transaction per Second? HTTP 1.0 vs. HTTP 1.1, Object Size, Key Size, Cipher, SSL Re-use ID, What is the HTTPS Bandwidth? HTTP 1.0 vs. HTTP 1.1, Object Size. Key Size, Cipher, SSL Re-use ID, 20
21 Testing Web Application Firewalls 21
22 Web Application Firewall Testing Infrastructure Test Equipment Capabilities: Simulate a large number of different Clients and Servers Simulate different application protocols and define a variety of settings to validate the WAF under different configurations Reach the limitation of WAF 22
23 Types of Tests Required to Validate Web Application Firewalls 23
24 Lab Test Scenario WAF Test Methodology Test executed on several Web Application Vendor products Web Application Firewall Performance with Good Traffic Maximum HTTP Transaction per Second Maximum SQL Queries per Second Maximum Concurrent TCP Connections Maximum HTTP Bandwidth Maximum SQL Bandwidth Web Application Firewall Performance with Security Attacks Maximum HTTP Attacks per Second Maximum SQL Attacks per Second Web Application Firewall Performance Blended Traffic Maximum HTTP Transaction per Second with Attacks Maximum SQL Queries per Second with Attacks 24
25 Real-World Test Scenario - WAF Test Methodology Test executed on one Web Application Vendor product Web Service Performance Without the Web Application Firewall Maximum New Users per Second Maximum Concurrent Users Maximum Bandwidth Web Service Performance With the Web Application Firewall Maximum New Users per Second Maximum Concurrent Users Maximum Bandwidth Web Service Security with Web Application Firewall Mix Good Traffic and Security Attacks 25
26 Maximum WAF Performance Lab Test Scenario 26
27 Web Application Firewall Performance for Good Traffic 27
28 Maximum HTTP Transactions per Second Supported by WAF Worst Case 28
29 Maximum HTTP 1.0 Transactions per Second Test Objective Find the Maximum HTTP Transactions per Second in worst case where 1 HTTP transaction is sent over one TCP Connection. Breaking Point Low HTTP Transaction Response Time Low Number of Concurrent TCP Connections 100% of HTTP Transaction Successful Performance Measurement Maximum HTTP Transaction per Second Average HTTP Transaction Response Time Maximum Concurrent TCP Connections Bandwidth 29
30 Communication Via HTTP Check performance using different Oobject sizes: 1024, 5120, and
31 Communication Via HTTPS and HTTP Check performance using different object size Check performance using different key size: 512, 1024 and 2048 Check performance using different Cipher RC4-MD5, AES, 31
32 Communication Via HTTPS Check performance using different object size Check performance using different key size: 512, 1024 and 2048 Check performance using different Cipher RC4-MD5, AES, 32
33 Maximum HTTP Transactions per Second Supported by WAF Best Case 33
34 Maximum HTTP 1.1 Transaction per Second Test Objective Find the Maximum HTTP Transactions per Second in best case where several HTTP transactions are sent over 1 TCP Connection. Breaking Point Low HTTP Transaction Response Time Low Number of Concurrent TCP Connections 100% of HTTP Transaction Successful Performance Measurement Maximum HTTP Transaction per Second Average HTTP Transaction Response Time Maximum Concurrent TCP Connections Bandwidth 34
35 Communication Via HTTP Check performance using different object sizes: 1024, 5120, and
36 Communication Via HTTPS and HTTP Check performance using different object sizes Check performance using different key sizes: 512, 1024 and 2048 Check performance using different Cipher RC4-MD5, AES, 36
37 Communication Via HTTPS Check performance using different object Sizes Check performance using different key sizes: 512, 1024 and 2048 Check performance using different Cipher RC4-MD5, AES, 37
38 Maximum Concurrent TCP Connections Supported by WAF 38
39 Maximum Concurrent TCP Connections Test Objective Find the maximum concurrent TCP connections where several HTTP transactions are sent over one TCP connection. Client Think Time is inserted between each client request to keep the TCP connection open. Breaking Point Low HTTP Transaction Response Time 100% of HTTP Transaction Successful Performance Measurement Maximum Concurrent TCP Connections Maximum HTTP Transaction per Second Average HTTP Transaction Response Time Bandwidth 39
40 Communication Via HTTP Check performance using different small object sizes:
41 Communication Via HTTPS Check performance using different object sizes: 1024 Check performance using different key sizes: 512, 1024 and 2048 Check performance using different Cipher RC4-MD5, AES, 41
42 Communication Via HTTPS Check performance using different object sizes: 1024 Check performance using different key sizes: 512, 1024 and 2048 Check performance using different Cipher RC4-MD5, AES, 42
43 Maximum HTTP Bandwidth Supported by WAF 43
44 Maximum HTTP Bandwidth Test Objective Find the maximum HTTP bandwidth using several HTTP transactions over one TCP connection. Breaking Point 100% of HTTP Transactions Successful Performance Measurement Bandwidth Maximum Concurrent TCP Connections Average HTTP Transaction Response Time 44
45 Communication Via HTTP Check performance using large object sizes like 1Mb 45
46 Communication Via HTTPS and HTTP Check performance using large object sizes like 1 Mb Check performance using different key sizes: 512, 1024 and 2048 Check performance using different Cipher RC4-MD5, AES, 46
47 Communication Via HTTPS Check performance using large object sizes like 1 Mb Check performance using different key sizes: 512, 1024 and 2048 Check performance using different Cipher RC4-MD5, AES, 47
48 Maximum Single SQL Queries per Second Supported by WAF 48
49 Maximum Single SQL Queries per Second Test Objective Find the maximum SQL Queries per Second where one SQL query is sent over one TCP connection. Breaking Point Low SQL Query Response Time Low Number of Concurrent TCP Connections 100% of SQL Queries Successful Performance Measurement Maximum SQL Queries per Second Average SQL Query Response Time Maximum Concurrent TCP Connections Bandwidth 49
50 Maximum Single SQL Queries per Second Check performance using different query responses: 1024, 5120, and
51 Maximum Multiple SQL Queries per Second Supported by WAF 51
52 Maximum Multiple SQL Queries per Second Test Objective Find the maximum SQL Queries per Second where several SQL queries are sent over one TCP connection Breaking Point Low SQL Query Response Time Low Number of Concurrent TCP Connections 100% of SQL Queries Successful Performance Measurement Maximum SQL Queries per Second Average SQL Query Response Time Maximum Concurrent TCP Connections Bandwidth 52
53 Maximum Multiple SQL Queries per Second Check performance using different query responses: 1024, 5120, and
54 Maximum SQL Bandwidth Supported by WAF 54
55 Maximum SQL Bandwidth Test Objective Find the maximum SQL bandwidth. Several SQL queries are sent over one TCP connection Breaking Point 100% of SQL Queries Successful Performance Measurement Bandwidth Maximum SQL Queries per Second Maximum Concurrent TCP Connections 55
56 Maximum SQL Bandwidth Check performance using large response like 1Mb 56
57 WAF Performance Security Attacks 57
58 Performance Security Testing Used attacks for performance testing under CVE-ID, OSVDB and BugTrag Ensure attack is detected before executing performance test Used attacks under the TOP 10 OWASP A1 Cross Site Scripting (XSS) A2 Injection Flaws A3 Malicious File Execution A4 Insecure Direct Object Reference A5 Cross Site Request Forgery (CSRF) A6 Information Leakage and Improper Error Handling A7 Broken Authentication and Session Management A8 Insecure Cryptographic Storage A9 Insecure Communications A10 Failure to Restrict URL Access 58
59 Maximum Single Type of HTTP Attacks per Second Detected by WAF 59
60 Maximum Single HTTP Attacks per Second Test Objective Find the Maximum Attacks per Second detected. The same attack is used during entire test. Breaking Point Number of Attacks per Second sent doesn t match with number of Attacks detected Performance Measurement Maximum Attacks per Second detected 60
61 Communication Via HTTP Check number of attacks detected versus the number of attacks of attacks sent 61
62 Communication Via HTTPS Check number of attacks detected versus the number of attacks of attacks sent 62
63 Communication Via HTTPS Check number of attacks detected versus the number of attacks of attacks sent 63
64 Maximum Multiple Types of HTTP Attacks per second Detected by WAF 64
65 Maximum HTTP Attack per Second Test Objective Find the Maximum Attacks per Second detected. Mix of different types of attacks (TOP 10 OWASP) are used during the entire test. Breaking Point Number of Attacks per Second Send doesn t match with number of Attacks Detected Performance Measurement Maximum Attacks per Second detected 65
66 Communication Via HTTP Check number of attacks detected versus the number of attacks of attacks sent 66
67 Communication Via HTTPS and HTTP Check number of attacks detected versus the number of attacks of attacks sent 67
68 Communication Via HTTPS Check number of attacks detected versus the number of attacks of attacks sent 68
69 Maximum Single SQL Attacks per second Detected by WAF 69
70 Maximum SQL Attacks per Second Test Objective Find the Maximum Attacks per Second detected. The same SQL attacks are used during the entire test. Breaking Point Number of Attacks per Second sent doesn t match with number of Attacks Detected Performance Measurement Maximum Attacks per Second detected 70
71 Maximum SQL Attacks per Second Check number of attacks detected versus the number of attacks of attacks sent 71
72 Maximum Multiple Type SQL Attacks per second Detected by WAF 72
73 Maximum SQL Attacks per Second Test Objective Find the Maximum Attacks per Second detected. Mix of different types attacks are used during the entire test. Breaking Point Number of Attacks per Second Sent doesn t match with number of Attacks Detected Performance Measurement Maximum Attacks per Second Detected 73
74 Maximum SQL Attacks per Second Check number of attacks detected versus the number of attacks of attacks sent 74
75 WAF Performance Good Traffic and Security Attacks 75
76 Communication Via HTTP Check performance in terms of Transactions per Second Check number of attacks detected versus the number of attacks sent 76
77 Communication Via HTTPS and HTTP Check performance in terms of Transactions per Second Check number of attacks detected versus the number of attacks of attacks sent 77
78 Communication Via HTTPS Check performance in terms of Transactions per Second Check number of attacks detected versus the number of attacks of attacks sent 78
79 Maximum Single SQL Queries per Second Check performance in terms of SQL Queries per Second Check number of attacks detected versus the number of attacks of attacks sent 79
80 Maximum WAF Performance Real-World Test Scenario 80
81 Real-World Test Scenario - WAF Test Methodology Test is performed on WAF Vendor selected Web Service Performance without WAF Maximum New Users per Second Maximum Concurrent Users Maximum Bandwidth Web Service Performance with WAF Maximum New Users per Second Maximum Concurrent Users Maximum Bandwidth Web Service Performance and Security with WAF Mix Good Traffic and Security Attacks 81
82 Web Service Performance Without WAF Check Maximum New Users per Second of Web Service Check Maximum Concurrent Users of Web Service Check Maximum Bandwidth of Web Service 82
83 Web Service Performance With WAF Check Maximum New Users per Second of Web Service Check Maximum Concurrent Users of Web Service Check Maximum Bandwidth of Web Service 83
84 Web Service Performance and Security With WAF Check Maximum New Users per Second of Web Service Check Maximum Concurrent Users of Web Service Check Maximum Bandwidth of Web Service Check All Attacks Sent are Detected by WAF 84
85 Key Benefits of Web Application Firewall Testing 85
86 Better Visibility of WAF Performance Know the real performance of your WAF Performance Matrix Maximum HTTP Transactions per Second Maximum HTTPS Transactions per Second Maximum SQL Queries per Second Maximum Concurrent TCP Connections Maximum Concurrent SSL Sessions Maximum HTTP Bandwidth Maximum HTTPS Bandwidth Maximum SQL Bandwidth You know the real capacity of your WAF Performance Matrix Maximum New Users per Second Maximum Concurrent Users 86
87 Better Visibility of WAF Performance Choose the best WAF for your needs Deploy your WAF in the right configuration for optimal performance Be more proactive because you know how your WAF will behave under load and attacks 87
88 Contact Information For more Information for Israel contact WebHouse: Alon Refaeli: Amir Pled: For more information outside of Israel contact BreakingPoint Systems: Gregory Fresnais:
89 Thank You 89
Validate the performance and security of IPS/IDS, Firewall and Proxy - January 2009
Validate the performance and security of IPS/IDS, Firewall and Proxy - January 2009 Gregory Fresnais [email protected] +33672510922 Director of International Business Development BreakingPoint Systems
Load Balancing Security Gateways WHITE PAPER
Load Balancing Security Gateways WHITE PAPER Table of Contents Acceleration and Optimization... 4 High Performance DDoS Protection... 4 Web Application Firewall... 5 DNS Application Firewall... 5 SSL Insight...
A host-based firewall can be used in addition to a network-based firewall to provide multiple layers of protection.
A firewall is a software- or hardware-based network security system that allows or denies network traffic according to a set of rules. Firewalls can be categorized by their location on the network: A network-based
IBM. Vulnerability scanning and best practices
IBM Vulnerability scanning and best practices ii Vulnerability scanning and best practices Contents Vulnerability scanning strategy and best practices.............. 1 Scan types............... 2 Scan duration
Reducing Application Vulnerabilities by Security Engineering
Reducing Application Vulnerabilities by Security Engineering - Subash Newton Manager Projects (Non Functional Testing, PT CoE Group) 2008, Cognizant Technology Solutions. All Rights Reserved. The information
Where every interaction matters.
Where every interaction matters. Peer 1 Vigilant Web Application Firewall Powered by Alert Logic The Open Web Application Security Project (OWASP) Top Ten Web Security Risks and Countermeasures White Paper
WEB APPLICATION FIREWALLS: DO WE NEED THEM?
DISTRIBUTING EMERGING TECHNOLOGIES, REGION-WIDE WEB APPLICATION FIREWALLS: DO WE NEED THEM? SHAIKH SURMED Sr. Solutions Engineer [email protected] www.fvc.com HAVE YOU BEEN HACKED????? WHAT IS THE PROBLEM?
IxLoad - Layer 4-7 Performance Testing of Content Aware Devices and Networks
IxLoad - Layer 4-7 Performance Testing of Content Aware Devices and Networks IxLoad is a highly scalable solution for accurately assessing the performance of content-aware devices and networks. IxLoad
White Paper A10 Thunder and AX Series Load Balancing Security Gateways
White Paper A10 Thunder and AX Series Load Balancing Security Gateways June 2013 WP_LB FW 062013 Disclaimer This document does not create any express or implied warranty about A10 Networks or about its
IxLoad TM Adobe HDS Player Emulation
IxLoad TM Adobe HDS Player Emulation HTTP Dynamic Streaming (HDS) is a solution developed by Adobe Systems to playback high quality live and on-demand content. The playback uses HTTP for streaming fragmented
Implementation of Web Application Firewall
Implementation of Web Application Firewall OuTian 1 Introduction Abstract Web 層 應 用 程 式 之 攻 擊 日 趨 嚴 重, 而 國 內 多 數 企 業 仍 不 知 該 如 何 以 資 安 設 備 阻 擋, 仍 在 採 購 傳 統 的 Firewall/IPS,
WHITE PAPER. FortiWeb and the OWASP Top 10 Mitigating the most dangerous application security threats
WHITE PAPER FortiWeb and the OWASP Top 10 PAGE 2 Introduction The Open Web Application Security project (OWASP) Top Ten provides a powerful awareness document for web application security. The OWASP Top
Considerations In Developing Firewall Selection Criteria. Adeptech Systems, Inc.
Considerations In Developing Firewall Selection Criteria Adeptech Systems, Inc. Table of Contents Introduction... 1 Firewall s Function...1 Firewall Selection Considerations... 1 Firewall Types... 2 Packet
Mingyu Web Application Firewall (DAS- WAF) - - - All transparent deployment for Web application gateway
Mingyu Web Application Firewall (DAS- WAF) - - - All transparent deployment for Web application gateway All transparent deployment Full HTTPS site defense Prevention of OWASP top 10 Website Acceleration
Out of the Fire - Adding Layers of Protection When Deploying Oracle EBS to the Internet
Out of the Fire - Adding Layers of Protection When Deploying Oracle EBS to the Internet March 8, 2012 Stephen Kost Chief Technology Officer Integrigy Corporation Phil Reimann Director of Business Development
Advanced Network Security Testing. Michael Jack
Advanced Network Security Testing Avalanche Unified Security Testing Michael Jack Agenda The need for Defense In-depth Security Performance Issues Unified Testing Spirent User Quality of Experience Products
Penta Security 3rd Generation Web Application Firewall No Signature Required. www.gasystems.com.au
Penta Security 3rd Generation Web Application Firewall No Signature Required www.gasystems.com.au 1 1 The Web Presence Demand The Web Still Grows INTERNET USERS 2006 1.2B Internet Users - 18% of 6.5B people
Table of Contents. Page 2/13
Page 1/13 Table of Contents Introduction...3 Top Reasons Firewalls Are Not Enough...3 Extreme Vulnerabilities...3 TD Ameritrade Security Breach...3 OWASP s Top 10 Web Application Security Vulnerabilities
ZEN LOAD BALANCER EE v3.04 DATASHEET The Load Balancing made easy
ZEN LOAD BALANCER EE v3.04 DATASHEET The Load Balancing made easy OVERVIEW The global communication and the continuous growth of services provided through the Internet or local infrastructure require to
Move over, TMG! Replacing TMG with Sophos UTM
Move over, TMG! Replacing TMG with Sophos UTM Christoph Litzbach, Pre-Sales Engineer NSG 39 Key Features of TMG HTTP Antivirus/spyware URL Filtering HTTPS forward inspection Web Caching Role based access
FortiGate-3950B Scores 95/100 on BreakingPoint Resiliency Score (Security, Performance, & Stability)
FortiGate-3950B Scores 95/100 on BreakingPoint Resiliency Score (Security, Performance, & Stability) Overview Fortinet FortiGate -3950B enterprise consolidated security appliance has achieved a BreakingPoint
Contemporary Web Application Attacks. Ivan Pang Senior Consultant Edvance Limited
Contemporary Web Application Attacks Ivan Pang Senior Consultant Edvance Limited Agenda How Web Application Attack impact to your business? What are the common attacks? What is Web Application Firewall
Firewalls P+S Linux Router & Firewall 2013
Firewalls P+S Linux Router & Firewall 2013 Firewall Techniques What is a firewall? A firewall is a hardware or software device which is configured to permit, deny, or proxy data through a computer network
APV9650. Application Delivery Controller
APV9650 D a t a S h e e t Application Delivery Controller Array Networks APV Series of Application Delivery Controllers optimizes the availability, user experience, performance, security and scalability
TCP/UDP # General Name Short Description
This appendix is designed to provide general information about service ports that are discovered on IP networks. Outlined are ports 1-80, along with many other common higher ports and specific ports found
Application Security Best Practices. Wally LEE <[email protected]> Principal Consultant
Application Security Best Practices Wally LEE Principal Consultant 17/18 March 2009 Speaker Profile Wally LEE CISSP BS7799 Lead Auditor Certified Ultimate Hacking Instructor Certified
Table of Contents. 1 Overview 1-1 Introduction 1-1 Product Design 1-1 Appearance 1-2
Table of Contents 1 Overview 1-1 Introduction 1-1 Product Design 1-1 Appearance 1-2 2 Features and Benefits 2-1 Key Features 2-1 Support for the Browser/Server Resource Access Model 2-1 Support for Client/Server
Configuring Health Monitoring
CHAPTER4 Note The information in this chapter applies to both the ACE module and the ACE appliance unless otherwise noted. The features that are described in this chapter apply to both IPv6 and IPv4 unless
Web Application Vulnerability Testing with Nessus
The OWASP Foundation http://www.owasp.org Web Application Vulnerability Testing with Nessus Rïk A. Jones, CISSP [email protected] Rïk A. Jones Web developer since 1995 (16+ years) Involved with information
Proxies. Chapter 4. Network & Security Gildas Avoine
Proxies Chapter 4 Network & Security Gildas Avoine SUMMARY OF CHAPTER 4 Generalities Forward Proxies Reverse Proxies Open Proxies Conclusion GENERALITIES Generalities Forward Proxies Reverse Proxies Open
Web Application Firewall for Untrusted Web Environments > White Paper
> White Paper ProxySG Web Application Firewall Web-based solutions are being implemented for nearly every aspect of business operations, and these are increasingly under attack within public web access
Basic Network Configuration
Basic Network Configuration 2 Table of Contents Basic Network Configuration... 25 LAN (local area network) vs WAN (wide area network)... 25 Local Area Network... 25 Wide Area Network... 26 Accessing the
Load Balancing and Sessions. C. Kopparapu, Load Balancing Servers, Firewalls and Caches. Wiley, 2002.
Load Balancing and Sessions C. Kopparapu, Load Balancing Servers, Firewalls and Caches. Wiley, 2002. Scalability multiple servers Availability server fails Manageability Goals do not route to it take servers
05.0 Application Development
Number 5.0 Policy Owner Information Security and Technology Policy Application Development Effective 01/01/2014 Last Revision 12/30/2013 Department of Innovation and Technology 5. Application Development
CSE331: Introduction to Networks and Security. Lecture 12 Fall 2006
CSE331: Introduction to Networks and Security Lecture 12 Fall 2006 Announcements Midterm I will be held Friday, Oct. 6th. True/False Multiple Choice Calculation Short answer Short essay Project 2 is on
Web Application Security. Radovan Gibala Senior Field Systems Engineer F5 Networks [email protected]
Web Application Security Radovan Gibala Senior Field Systems Engineer F5 Networks [email protected] Security s Gaping Hole 64% of the 10 million security incidents tracked targeted port 80. Information Week
PERFORMANCE VALIDATION OF JUNIPER NETWORKS SRX5800 SERVICES GATEWAY
APPLICATION NOTE PERFORMANCE VALIDATION OF JUNIPER NETWORKS SRX5800 SERVICES GATEWAY Copyright 2010, Juniper Networks, Inc. Table of Contents Introduction........................................................................................
Evaluating IPv6 Firewalls & Verifying Firewall Security Performance
Next Generation IPv6 Network Security IPv6 Summit Bonn 30 th June 2004 Evaluating IPv6 Firewalls & Verifying Firewall Security Performance [ Vital questions to ask your firewall vendor ] Yvon Rouault Agilent
DEPLOYMENT GUIDE Version 1.0. Deploying the BIG-IP Edge Gateway for Layered Security and Acceleration Services
DEPLOYMENT GUIDE Version 1.0 Deploying the BIG-IP Edge Gateway for Layered Security and Acceleration Services Table of Contents Table of Contents Using the BIG-IP Edge Gateway for layered security and
FAQs for Oracle iplanet Proxy Server 4.0
FAQs for Oracle iplanet Proxy Server 4.0 Get answers to the questions most frequently asked about Oracle iplanet Proxy Server Q: What is Oracle iplanet Proxy Server (Java System Web Proxy Server)? A: Oracle
Basics of Internet Security
Basics of Internet Security Premraj Jeyaprakash About Technowave, Inc. Technowave is a strategic and technical consulting group focused on bringing processes and technology into line with organizational
APV x600 Series. Application Delivery Controller APV1600, APV2600, APV4600, APV5600, APV6600, APV8600, APV9600
APV x600 Series D a t a S h e e t Application Delivery Controller APV1600, APV2600, APV4600, APV5600, APV6600, APV8600, APV9600 Array Networks APV Series of Application Delivery Controllers optimizes the
Virtual Server and DDNS. Virtual Server and DDNS. For BIPAC 741/743GE
Virtual Server and DDNS For BIPAC 741/743GE August, 2003 1 Port Number In TCP/IP and UDP networks, a port is a 16-bit number, used by the host-to-host protocol to identify to which application program
SonicWALL Clean VPN. Protect applications with granular access control based on user identity and device identity/integrity
SSL-VPN Combined With Network Security Introducing A popular feature of the SonicWALL Aventail SSL VPN appliances is called End Point Control (EPC). This allows the administrator to define specific criteria
1 Data information is sent onto the network cable using which of the following? A Communication protocol B Data packet
Review questions 1 Data information is sent onto the network cable using which of the following? A Communication protocol B Data packet C Media access method D Packages 2 To which TCP/IP architecture layer
Next Generation IPv6 Network Security a Practical Approach Is Your Firewall Ready for Voice over IPv6?
Next Generation IPv6 Network Security a Practical Approach Is Your Firewall Ready for Voice over IPv6? - and many other vital questions to ask your firewall vendor Zlata Trhulj Agilent Technologies [email protected]
Network Configuration/Bandwidth Planning Scope
Network Configuration/Bandwidth Planning Scope Workshop Focus and Objective Workshop Focus Drive key planning considerations for Office 365 domain and domain name service (DNS) records configuration Network
FortiWeb 5.0, Web Application Firewall Course #251
FortiWeb 5.0, Web Application Firewall Course #251 Course Overview Through this 1-day instructor-led classroom or online virtual training, participants learn the basic configuration and administration
Introduction to Computer Security Benoit Donnet Academic Year 2015-2016
Introduction to Computer Security Benoit Donnet Academic Year 2015-2016 1 Agenda Networking Chapter 1: Firewalls Chapter 2: Proxy Chapter 3: Intrusion Detection System Chapter 4: Network Attacks Chapter
Bypassing Firewall. @ PISA AGM Theme Seminar 2005. Presented by Ricky Lou Zecure Lab Limited
Bypassing Firewall @ PISA AGM Theme Seminar 2005 Presented by Ricky Lou Zecure Lab Limited Firewall Piercing (Inside-Out Attacks) Disclaimer We hereby disclaim all responsibility for the following hacks.
FortiWeb for ISP. Web Application Firewall. Copyright Fortinet Inc. All rights reserved.
FortiWeb for ISP Web Application Firewall Copyright Fortinet Inc. All rights reserved. Agenda Introduction to FortiWeb Highlights Main Features Additional FortiWEB Services for the ISP FortiWeb Family
Networking for Caribbean Development
Networking for Caribbean Development BELIZE NOV 2 NOV 6, 2015 w w w. c a r i b n o g. o r g N E T W O R K I N G F O R C A R I B B E A N D E V E L O P M E N T BELIZE NOV 2 NOV 6, 2015 w w w. c a r i b n
Colasoft Capsa Technical White Paper. Maximize Network Value
Colasoft Capsa Technical White Paper Maximize Network Value Content Content BACKGROUND... 3 OVERVIEW... 3 CONCEPT AND PRINCIPLE... 4 HOW TO WORK... 4 DATA CAPTURE... 4 DATA ANALYSIS... 5 EXPORTING DATA...
NSFOCUS Web Application Firewall White Paper
White Paper NSFOCUS Web Application Firewall White Paper By NSFOCUS White Paper - 2014 NSFOCUS NSFOCUS is the trademark of NSFOCUS Information Technology Co., Ltd. NSFOCUS enjoys all copyrights with respect
Basic & Advanced Administration for Citrix NetScaler 9.2
Basic & Advanced Administration for Citrix NetScaler 9.2 Day One Introducing and deploying Citrix NetScaler Key - Brief Introduction to the NetScaler system Planning a NetScaler deployment Deployment scenarios
Web Application Security Assessment and Vulnerability Mitigation Tests
White paper BMC Remedy Action Request System 7.6.04 Web Application Security Assessment and Vulnerability Mitigation Tests January 2011 www.bmc.com Contacting BMC Software You can access the BMC Software
Exam Questions SY0-401
Exam Questions SY0-401 CompTIA Security+ Certification http://www.2passeasy.com/dumps/sy0-401/ 1. A company has implemented PPTP as a VPN solution. Which of the following ports would need to be opened
MatriXay WEB Application Vulnerability Scanner V 5.0. 1. Overview. (DAS- WEBScan ) - - - - - The best WEB application assessment tool
MatriXay DAS-WEBScan MatriXay WEB Application Vulnerability Scanner V 5.0 (DAS- WEBScan ) - - - - - The best WEB application assessment tool 1. Overview MatriXay DAS- Webscan is a specific application
Configure a Microsoft Windows Workstation Internal IP Stateful Firewall
70 Lab #5 Lab #5 Assessment Spreadsheet A Review the default settings for Windows Firewall on your student workstation and indicate your settings below: GENERAL Recommended (Firewall On/Off) Don t Allow
Firewalls. Basic Firewall Concept. Why firewalls? Firewall goals. Two Separable Topics. Firewall Design & Architecture Issues
CS 155 May 20, 2004 Firewalls Basic Firewall Concept Separate local area net from internet Firewall John Mitchell Credit: some text, illustrations from Simon Cooper Router All packets between LAN and internet
Cisco IOS Firewall. Scenarios
Cisco IOS Firewall Common Deployment Scenarios http://www.cisco.com/go/iosfirewall com/go/iosfirewall Presentation_ID 2007 Cisco Systems, Inc. All rights reserved. 1 Cisco IOS Firewall Feature Overview
IxLoad TM : Data HTTP, SSL, and FTP
IxLoad TM : Data HTTP, SSL, and FTP IxLoad tests the scalability and performance of content-aware networks and devices by emulating HTTP(S), SSL, and FTP clients and servers. IxLoad can be used to: Test
REAL-TIME WEB APPLICATION PROTECTION. AWF SERIES DATASHEET WEB APPLICATION FIREWALL
REAL-TIME WEB APPLICATION PROTECTION. AWF SERIES DATASHEET WEB APPLICATION FIREWALL AWF Series Web application firewalls provide industry-leading Web application attack protection, ensuring continuity
Web application security
Web application security Sebastian Lopienski CERN Computer Security Team openlab and summer lectures 2010 (non-web question) Is this OK? int set_non_root_uid(int uid) { // making sure that uid is not 0
OWASP and OWASP Top 10 (2007 Update) OWASP. The OWASP Foundation. Dave Wichers. The OWASP Foundation. OWASP Conferences Chair dave.wichers@owasp.
and Top 10 (2007 Update) Dave Wichers The Foundation Conferences Chair [email protected] COO, Aspect Security [email protected] Copyright 2007 - The Foundation This work is available
IxLoad: Testing Microsoft IPTV
IxLoad: Testing Microsoft IPTV IxLoad provides a comprehensive solution for validating service delivery networks utilizing Microsoft IPTV. IxLoad offers a complete solution that simulates core systems
Ignify ecommerce. Item Requirements Notes
wwwignifycom Tel (888) IGNIFY5 sales@ignifycom Fax (408) 516-9006 Ignify ecommerce Server Configuration 1 Hardware Requirement (Minimum configuration) Item Requirements Notes Operating System Processor
Barracuda Web Application Firewall vs. Intrusion Prevention Systems (IPS) Whitepaper
Barracuda Web Application Firewall vs. Intrusion Prevention Systems (IPS) Whitepaper Securing Web Applications As hackers moved from attacking the network to attacking the deployed applications, a category
Deployment Guide May-2015 rev. a. APV Oracle PeopleSoft Enterprise 9 Deployment Guide
Deployment Guide May-2015 rev. a APV Oracle PeopleSoft Enterprise 9 Deployment Guide 1 Introduction... 3 2 Prerequisites and Assumptions... 4 2.1 Oracle PeopleSoft Enterprise... 4 2.2 Array Networks APV
Course Overview: Learn the essential skills needed to set up, configure, support, and troubleshoot your TCP/IP-based network.
Course Name: TCP/IP Networking Course Overview: Learn the essential skills needed to set up, configure, support, and troubleshoot your TCP/IP-based network. TCP/IP is the globally accepted group of protocols
SonicWALL Unified Threat Management. Alvin Mann April 2009
SonicWALL Unified Threat Management Alvin Mann April 2009 Agenda Who is SonicWALL? Networking Drivers & Trends SonicWALL Unified Threat Management (UTM) Next Generation Protection SonicWALL CONFIDENTIAL
Professional Integrated SSL-VPN Appliance for Small and Medium-sized businesses
Professional Integrated Appliance for Small and Medium-sized businesses Benefits Clientless Secure Remote Access Seamless Integration behind the Existing Firewall Infrastructure UTM Security Integration
Hosting more than one FortiOS instance on. VLANs. 1. Network topology
Hosting more than one FortiOS instance on a single FortiGate unit using VDOMs and VLANs 1. Network topology Use Virtual domains (VDOMs) to divide the FortiGate unit into two or more virtual instances of
https://elearn.zdresearch.com https://training.zdresearch.com/course/pentesting
https://elearn.zdresearch.com https://training.zdresearch.com/course/pentesting Chapter 1 1. Introducing Penetration Testing 1.1 What is penetration testing 1.2 Different types of test 1.2.1 External Tests
Post-TMG: Securely Delivering Microsoft Applications
Post-TMG: Securely Delivering Microsoft Applications Microsoft Forefront Threat Management Gateway customers need an alternative to secure their Internet-facing Microsoft applications. F5 BIG-IP Application
ZEN LOAD BALANCER EE v3.02 DATASHEET The Load Balancing made easy
ZEN LOAD BALANCER EE v3.02 DATASHEET The Load Balancing made easy OVERVIEW The global communication and the continuous growth of services provided through the Internet or local infrastructure require to
Security+ Guide to Network Security Fundamentals, Fourth Edition. Chapter 6 Network Security
Security+ Guide to Network Security Fundamentals, Fourth Edition Chapter 6 Network Security Objectives List the different types of network security devices and explain how they can be used Define network
Importance of Web Application Firewall Technology for Protecting Web-based Resources
Importance of Web Application Firewall Technology for Protecting Web-based Resources By Andrew J. Hacker, CISSP, ISSAP Senior Security Analyst, ICSA Labs January 10, 2008 ICSA Labs 1000 Bent Creek Blvd.,
Network Security. Protective and Dependable. Pioneer of IP Innovation
Network Protective and Dependable Pioneer of IP Innovation Why PLANET Network Solution? With the growth of the threats, network security becomes the fundamental concerns of home and enterprise network.
Microsoft Exchange 2013 DEPLOYMENT GUIDE
Microsoft Exchange 2013 DEPLOYMENT GUIDE Table of Contents Introduction... 2 Deployment Guide Prerequisites... 2 Deployment Notes and Updates... 2 Exchange Server Roles... 2 Accessing the Thunder ADC Device...
DMZ Network Visibility with Wireshark June 15, 2010
DMZ Network Visibility with Wireshark June 15, 2010 Ashok Desai Senior Network Specialist Intel Information Technology SHARKFEST 10 Stanford University June 14-17, 2010 Outline Presentation Objective DMZ
Accelerating the Deployment of the Evolved Cyber Range
White Paper Accelerating the Deployment of the Evolved Cyber Range Ixia BreakingPoint Uses Patented Innovation to Deliver a Pragmatic Solution for Arming and Training Cyber Warriors 26601 Agoura Road,
Communication ports used by Citrix Technologies. July 2011 Version 1.5
Communication ports used by Citrix Technologies July 2011 Version 1.5 Overview Introduction This document provides an overview of ports that are used by Citrix components and must be considered as part
Firewall Testing Methodology W H I T E P A P E R
Firewall ing W H I T E P A P E R Introduction With the deployment of application-aware firewalls, UTMs, and DPI engines, the network is becoming more intelligent at the application level With this awareness
Building a Systems Infrastructure to Support e- Business
Building a Systems Infrastructure to Support e- Business NO WARRANTIES OF ANY NATURE ARE EXTENDED BY THE DOCUMENT. Any product and related material disclosed herein are only furnished pursuant and subject
Computer Networks. Secure Systems
Computer Networks Secure Systems Summary Common Secure Protocols SSH HTTPS (SSL/TSL) IPSec Wireless Security WPA2 PSK vs EAP Firewalls Discussion Secure Shell (SSH) A protocol to allow secure login to
WEB SITE SECURITY. Jeff Aliber Verizon Digital Media Services
WEB SITE SECURITY Jeff Aliber Verizon Digital Media Services 1 SECURITY & THE CLOUD The Cloud (Web) o The Cloud is becoming the de-facto way for enterprises to leverage common infrastructure while innovating
Web Application Attacks And WAF Evasion
Web Application Attacks And WAF Evasion Ahmed ALaa (EG-CERT) 19 March 2013 What Are We Going To Talk About? - introduction to web attacks - OWASP organization - OWASP frameworks - Crawling & info. gathering
Gigabit SSL VPN Security Router
As Internet becomes essential for business, the crucial solution to prevent your Internet connection from failure is to have more than one connection. PLANET is the ideal to help the SMBs increase the
Detecting Web Application Vulnerabilities Using Open Source Means. OWASP 3rd Free / Libre / Open Source Software (FLOSS) Conference 27/5/2008
Detecting Web Application Vulnerabilities Using Open Source Means OWASP 3rd Free / Libre / Open Source Software (FLOSS) Conference 27/5/2008 Kostas Papapanagiotou Committee Member OWASP Greek Chapter [email protected]
Cyber Essentials. Test Specification
Cyber Essentials Test Specification Contents Scope of the Audit...2 Assumptions...3 Success Criteria...3 External systems...4 Required tests...4 Test Details...4 Internal systems...7 Tester pre-requisites...8
Semantic based Web Application Firewall (SWAF V 1.6) Operations and User Manual. Document Version 1.0
Semantic based Web Application Firewall (SWAF V 1.6) Operations and User Manual Document Version 1.0 Table of Contents 1 SWAF... 4 1.1 SWAF Features... 4 2 Operations and User Manual... 7 2.1 SWAF Administrator
Application Note. Onsight Connect Network Requirements v6.3
Application Note Onsight Connect Network Requirements v6.3 APPLICATION NOTE... 1 ONSIGHT CONNECT NETWORK REQUIREMENTS V6.3... 1 1 ONSIGHT CONNECT SERVICE NETWORK REQUIREMENTS... 3 1.1 Onsight Connect Overview...
Gateway Security at Stateful Inspection/Application Proxy
Gateway Security at Stateful Inspection/Application Proxy Michael Lai Sales Engineer - Secure Computing Corporation MBA, MSc, BEng(Hons), CISSP, CISA, BS7799 Lead Auditor (BSI) Agenda Who is Secure Computing
Lab Testing Summary Report
Lab Testing Summary Report September 2007 Report 070914 Product Category: WAN Optimization Vendor Tested: Packeteer, Inc. Product Tested: ishaper 400 Key findings and conclusions: Deep packet inspection
SSL-TLS VPN 3.0 Certification Report. For: Array Networks, Inc.
SSL-TLS VPN 3.0 Certification Report For: Array Networks, Inc. Prepared by: ICSA Labs 1000 Bent Creek Blvd., Suite 200 Mechanicsburg, PA 17050 USA http://www.icsalabs.com SSL-TLS VPN 3.0 Certification
IxLoad VoIP SIP, MGCP Features
IxLoad VoIP SIP, MGCP Features Aptixia IxLoad can test the performance of VoIP networks and devices by emulating SIP and MGCP user agents. IxLoad can be used to: Test the scalability and performance of
