DOS ATTACKS USING SQL WILDCARDS
|
|
|
- Randolf Green
- 10 years ago
- Views:
Transcription
1 DOS ATTACKS USING SQL WILDCARDS Ferruh Mavituna This paper discusses abusing Microsoft SQL Query wildcards to consume CPU in database servers. This can be achieved using only the search field present in most common web applications 1. If an application has the following properties then it is highly possibly vulnerable to wildcard attacks: 1- An SQL Server Backend; 2- More than 300 records in the database and around 500 bytes of data per row; 3- An application level search feature. As you might notice I have just described 90% of Microsoft SQL Server based CMSs, blogs, CRMs and e-commerce web applications. Other databases could be vulnerable depending on how the applications implement search functionalities although common implementation of the search functionality in SQL Server back-end applications is vulnerable. SEARCH QUERIES The SQL Server supports the following wildcards in LIKE queries 2. %, [], [^] and _ If you were to enter 'foo' into the search box, the resulting SQL query might be: SELECT * FROM Article WHERE Content LIKE '%foo%' In a decent database with records the query above will take less than a second. The following query, in the very same database, will take about 6 seconds with only 2600 records. 3 1 This attack does not only affect web applications, also can occur in any other application with a back-end database and search functionality Ferruh Mavituna, DoS Attacks Using SQL Wildcards
2 SELECT TOP 10 * FROM Article WHERE Content LIKE '%_[^!_%/%a?f%_d)_(f%)_%([)({}%){()} $&N%_)$* ()$*R"_)][%](%[x])%a][$*" $-9]_%' So, if an attacker wanted to tie up the CPU for 6 seconds they would enter the following to the search box: _[^!_%/%a?f%_d)_(f%)_%([)({}%){()} $&N%_)$* ()$*R"_)][%](%[x])%a][$*" $-9]_ Furthermore, if multiple search terms are supplied (separated with spaces), the application will often separate them with spaces, e.g. If we search for 'foo bar', the resulting SQL query will be: SELECT * FROM Article WHERE Content LIKE '%foo%' OR Content LIKE '%bar%' This leads to an even more efficient attack if we supply several wildcard attacks separated with spaces. This will cause a SQL Query similar to the following to be run in the database: SELECT TOP 10 * FROM Article WHERE Content LIKE '%_[^!_%/%a?f%_d)_(f%)_%([)({}%){()} $&N%_)$* ()$*R"_)][%](%[x])%a][$*" $-9]_%' OR Content LIKE '%_[X_%/%a?F%_D)_(F%)_%([)({}%){()} $&N%_)$* ()$*R"_)][%](%[x])%a][$*" $-9]_%' OR Content LIKE '%_[()_%/%a?f%_d)_(f%)_%([)({}%){()} $&N%_)$* ()$*R"_)][%](%[x])%a][$*" $-9]_%' This takes 36 seconds in the same database and consumes 100% of CPU during the execution. As seen in this example the affects of extra OR statements are linear. This problem allows an attacker to consume database resources and the database connection pool within 1-2 minutes with a humble Internet connection such as Mbit/s., maybe even with a dial-up connection. The query time is also strongly correlated with number of records searched and the length of each field searched. TESTING FOR SQL WILD CARD DOS Testing is quite simple; just craft a query which will not return a result 4 and includes several wildcards. Send this data through the search feature of the application. If the application takes more time than a usual search, it is vulnerable. More details about crafting a wildcard attack can be found under Crafting Search Keywords below. During testing I used the Web Application Stress Tool 5 to carry out attacks. Any similar tool can be employed for this purpose. CONNECTION POOLI NG Depending on the connection pooling settings of the application and the time taken for attack query to execute, an attacker might be able to consume all connections in the connection pool, which will cause database queries to fail for legitimate users. 3 These benchmarks based on a test hardware, timing might differ in another systems. Benchmarks timing generally refers to CPU Time. 4 To be able to force the database server to scan whole index, a-439e-a67d-75a89aa36495&displaylang=en 2 Ferruh Mavituna, DoS Attacks Using SQL Wildcards
3 By default in ASP.NET, the maximum allowed connections in the pool is 100 and timeout is 30 seconds. Thus if an attacker can run 100 multiple queries with 30+ seconds execution time within 30 seconds no one else would be able to use the database related parts of the application. Therefore a DoS attack against an application no longer takes 1000 bots, anyone with a decent Internet connection can do this! It should be noted that Connection Pool Exhausting attacks do not have to consume a lot of CPU, it s enough for them to run for a long time in the database server. Other reasons for long-running queries could include buggy SLEEP 6 code, several DNS requests or HTTP requests in the executed query. CRAFTING SEARCH KEYWORDS Some points to consider while crafting search keywords are: Queries should return a few results as possible or even none at all. In this way we can be sure that we actually forced database server to search all records; During the OR combinations every OR statement should be different, otherwise the database will optimise it. Changing one character is enough; In Microsoft SQL Server, my experience 7 showed me that every character after an open bracket [ causes unusually longer execution time, this can be used to improve the affect, some examples: LIKE '%_[a[! -z]@$!_% LIKE '%_[aaaaaaaaa[! -z]@$!_%' LIKE '%_[aaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaa[! -z]@$!_%' ms ms ms. Longer queries will generally result with longer execution time. Craft the longest possible query allowed by the application; Starting with % and ending with % generally will cause more expensive queries; Some implementations might cache search results. During the testing every search query should be slightly different to avoid this; Performance is always about experimenting. Try different combinations to find the most expensive queries for that particular target system and data. REAL WORLD IM PACT It has been said that this issue affects almost all SQL Server backend systems with a search feature. To show how common is this problem I downloaded and tested some open source web applications for this issue. 6 Several DBMSs have this sort of functionality such as ORACLE DBMS_SLEEP. Also a database server can implement this functionality by invoking underlying OS commands. 7 These experiments were based on Fuzzing, Manual tweaking over fuzzed results and testing them in test applications. 3 Ferruh Mavituna, DoS Attacks Using SQL Wildcards
4 Both of the test applications listed in here are forum applications, which does not mean that other applications are safe. These were just easy to setup and test also they are prone to get bigger in data level which makes them more vulnerable to wildcard attacks. Besides these, I did several tests against bespoke web applications. Results were similar. SAMPLE FORUM APPL ICATION S I used two forum applications one was ASP.NET and the other was Classic ASP with an SQL Server backend. After 2000 records one search query takes more than 30 seconds to execute, which leads to timeout database connection. Example setups stopped responding within 2 minutes with a connection speed of 1.5Mb. OTHER DBMSS Even though other database servers are not included in this paper they are vulnerable to this attack with different search operators but SQL Server is the only major database system which comes with extra wildcards in the LIKE queries. The following search operators are vulnerable to this problem: 8 PostgreSQL RegExp Match (~ 9 ) SQL Server Full Text Search Functionality (CONTAINS 10 ) MS Access LIKE Queries (LIKE 11 ) MySQL REGEXP (REGEXP 12 ) INCREASING THE IMPACT Some applications allow users to choose different options for the advanced search functionality. This will generally help an attacker to increase the impact. If an application allows you to choose the fields to search in: o o If it searches them with OR operator then select all fields; If it's using AND operator to do searches then select the largest field such as text data type instead of a varchar type and do not use spaces to avoid several AND conditions in the query. Choose OR conditions where possible. This is generally corresponds to the "Any of These Keywords" option in the web applications; 8 Other major DBMSs should have similar functionalities but it s out of the scope of this paper Ferruh Mavituna, DoS Attacks Using SQL Wildcards
5 Try to force the application to join tables as much as possible (although in rare instances joins can decrease query time); Generally applications will try to join conditions with OR operators by default, try using spaces between entered keywords as i.e. : _[r/a)_%_fm (r/b) (r-d)_ DDOS (DISTR IBUTED D ENIA L OF SERV ICE) ATTACKS If an application accepts search queries over GET requests 13 then an attacker can use a Web Spamming Tool 14 to auto-register to open forums, send forum posts and blog comments with the URL of this search or can send this search URL as the src value of an image tag. In this way attacker can use other websites visitors to attack the targeted application. Obviously it is possible for an attacker to perform XSS attacks in some popular websites and then by producing several Iframe or image tags, to attack the application. In this situation, applications that use POST requests are still vulnerable since an attacker can force victims to carry out POST requests over an XSS vulnerability. APPLI CATION LEVEL DOS These described attacks generally will affect database servers not the application itself but from an attacker's point of view there are some possibilities for performing application level DoS by exploiting search features in the application 15. This is mainly about causing the application to process so many records and consume CPU in the application server. In wildcard attacks it is generally a good idea to not return any records since that means you have done the largest search in the index but when it comes to DoS attacks against the application itself we should try to return as many as records that we can. This will cause the application to process those records and depending on the application level algorithm and the SQL query, this might result in a big impact. If the application actually tries to return records because of a buggy paging SQL query, this will consume a lot of CPU in the application and database layers. One real world example of this can be seen in Subsonic ORM system 16, where if an attacker can send -1 as the requested data page number, the application will try to return all results in the dataset. Paging issues are not only common in search pages, they are also quite common in other listing pages where query conditions cannot be controlled by the attacker. Supplying large numbers, negative numbers and unexpected input can force an application to return all of the results in one response. SQL INJECTIO N AND DOS ATTACK S I have talked about DoS in the application without SQL Injection but if an application is vulnerable to SQL Injection DoS attacks are quite trivial. Different DBMSs provide different functions to achieve this. 13 Application shouldn t have a CSRF protection either 14 XRumer is an example of Web Spamming Tools Logical problems or different Application Level DoS Attacks like filling up the database, locking accounts, password reset spam are out of the scope of this document Ferruh Mavituna, DoS Attacks Using SQL Wildcards
6 An infinite loop with some expensive functions 17 will consume the CPU as soon as the connection times out. Some DBMSs also provide specific functions such as BENCHMARK in MySQL which allows executing a function repeatedly. Using SQL Injection the possibilities of DoS are endless, for example an attacker can simply DROP all tables in the database. Depending on the privileges of an attacker, they can even shutdown the system or database server. PROTECTION It is important to realise that wildcard attacks are not the result of a flaw at the database level, it is the application that is at fault. The application should be responsible for filtering wildcards. The subsections below detail some mitigation strategies which can be implemented at the application level to protect against wildcard attacks. LIMITING SE ARCH If the application does not require this sort of advanced search, all wildcards should be escaped or filtered. Alternatively, the application should restrict access to the advanced search functionality by implementing CAPTCHA. In order to maintain usability, an application could implement different solutions such as only allowing registered users to access the search functionality. Each user should be given a quota of searches per day or a quota of CPU time to prevent registered users from mounting wildcard attacks. Obviously registration would need to implement a CAPTCHA solution, to prevent automated registration. Since longer queries generally take longer to process a limit on the number of characters or words in a query could be enforced. 17 Such as SHA1() in MySQL 6 Ferruh Mavituna, DoS Attacks Using SQL Wildcards
7 WHITE LISTING Where possible the application should have a white list of accepted characters. After white listing wildcard characters should be escaped unless wildcard queries are required. CAPTCHA S ECUR ITY This paper refers to CAPTCHA 18 as a security mechanism. However, weak CAPTCHA implementations can be a problem, for example: CAPTCHAs that actually be solved by a computer; Poor implementation of CAPTCHAs at the application level i.e. Where the CAPTCHA solution is stored in an image filename or ALT attribute. In some conditions implementing CAPTCHA or similar functionality might not be enough. In this paper I showed some examples where a query takes about 40 seconds. This is not acceptable by any means. In this situation even a manual attack can cause DoS using this sort of queries. LIMITING SQL QU ERY EXECUT ION TIME To improve security, the database connection timeout could be reduced, or the execution time of for search queries could be limited. However, limiting execution time for search queries might not be an easy task in some web application frameworks or languages. PREVENTING A PPL ICATION LEVE L DOS Limiting the number of records returned by database queries using LIMIT or TOP or similar keywords will help to prevent application level DoS attacks. Typically each record returned to the application will need to be processed before being sent to the user e.g. converted to presentation markup (often HTML). Processing 1 million records for example would most likely cause a significant load on the application layer. The application should carry out strict checking over user input, especially in the record paging functionality. Such as input should be numeric, should be positive and should not be more than the defined maximum number of records. CSRF PROTECTIONS CRSF 19 (Cross-site Request Forgery) protections are essential to prevent the types of DDoS attacks discussed above. This is particularly important for pages which are CPU-intensive to generate. 18 Completely Automated Public Turing test to tell Computers and Humans Apart Ferruh Mavituna, DoS Attacks Using SQL Wildcards
8 DOCUMENT HISTORY 20/04/2008 Idea & Experimentation 25/04/2008 Initial Write-up and Peer Reviews 28/04/ Revising the paper based on Peer Reviews 02/05/2008 Improvements in several sections based on new fuzz results and analyses, 08/05/2008 Improvements and proof read, 09/05/2008 Ready to public Release CREDITS & THANKS Thanks to Mark Lowe of Portcullis Computer Security for peer review, proof reading and all of his help during the research. Thanks to Bedirhan Urgun of WTG ( and Sumit Siddarth of Portcullis Computer Security for peer reviews. 8 Ferruh Mavituna, DoS Attacks Using SQL Wildcards
Kentico CMS security facts
Kentico CMS security facts ELSE 1 www.kentico.com Preface The document provides the reader an overview of how security is handled by Kentico CMS. It does not give a full list of all possibilities in the
SQL Injection 2.0: Bigger, Badder, Faster and More Dangerous Than Ever. Dana Tamir, Product Marketing Manager, Imperva
SQL Injection 2.0: Bigger, Badder, Faster and More Dangerous Than Ever Dana Tamir, Product Marketing Manager, Imperva Consider this: In the first half of 2008, SQL injection was the number one attack vector
Magento Security and Vulnerabilities. Roman Stepanov
Magento Security and Vulnerabilities Roman Stepanov http://ice.eltrino.com/ Table of contents Introduction Open Web Application Security Project OWASP TOP 10 List Common issues in Magento A1 Injection
FINAL DoIT 11.03.2015 - v.4 PAYMENT CARD INDUSTRY DATA SECURITY STANDARDS APPLICATION DEVELOPMENT AND MAINTENANCE PROCEDURES
Purpose: The Department of Information Technology (DoIT) is committed to developing secure applications. DoIT s System Development Methodology (SDM) and Application Development requirements ensure that
External Network & Web Application Assessment. For The XXX Group LLC October 2012
External Network & Web Application Assessment For The XXX Group LLC October 2012 This report is solely for the use of client personal. No part of it may be circulated, quoted, or reproduced for distribution
Lecture 15 - Web Security
CSE497b Introduction to Computer and Network Security - Spring 2007 - Professor Jaeger Lecture 15 - Web Security CSE497b - Spring 2007 Introduction Computer and Network Security Professor Jaeger www.cse.psu.edu/~tjaeger/cse497b-s07/
Sitefinity Security and Best Practices
Sitefinity Security and Best Practices Table of Contents Overview The Ten Most Critical Web Application Security Risks Injection Cross-Site-Scripting (XSS) Broken Authentication and Session Management
VIDEO intypedia007en LESSON 7: WEB APPLICATION SECURITY - INTRODUCTION TO SQL INJECTION TECHNIQUES. AUTHOR: Chema Alonso
VIDEO intypedia007en LESSON 7: WEB APPLICATION SECURITY - INTRODUCTION TO SQL INJECTION TECHNIQUES AUTHOR: Chema Alonso Informática 64. Microsoft MVP Enterprise Security Hello and welcome to Intypedia.
STATE OF WASHINGTON DEPARTMENT OF SOCIAL AND HEALTH SERVICES P.O. Box 45810, Olympia, Washington 98504 5810. October 21, 2013
STATE OF WASHINGTON DEPARTMENT OF SOCIAL AND HEALTH SERVICES P.O. Box 45810, Olympia, Washington 98504 5810 October 21, 2013 To: RE: All Vendors Request for Information (RFI) The State of Washington, Department
WHITE PAPER. FortiWeb and the OWASP Top 10 Mitigating the most dangerous application security threats
WHITE PAPER FortiWeb and the OWASP Top 10 PAGE 2 Introduction The Open Web Application Security project (OWASP) Top Ten provides a powerful awareness document for web application security. The OWASP Top
Where every interaction matters.
Where every interaction matters. Peer 1 Vigilant Web Application Firewall Powered by Alert Logic The Open Web Application Security Project (OWASP) Top Ten Web Security Risks and Countermeasures White Paper
Web Application Security
Chapter 1 Web Application Security In this chapter: OWASP Top 10..........................................................2 General Principles to Live By.............................................. 4
Is Drupal secure? A high-level perspective on web vulnerabilities, Drupal s solutions, and how to maintain site security
Is Drupal secure? A high-level perspective on web vulnerabilities, Drupal s solutions, and how to maintain site security Presented 2009-05-29 by David Strauss Thinking Securely Security is a process, not
Secure Web Application Coding Team Introductory Meeting December 1, 2005 1:00 2:00PM Bits & Pieces Room, Sansom West Room 306 Agenda
Secure Web Application Coding Team Introductory Meeting December 1, 2005 1:00 2:00PM Bits & Pieces Room, Sansom West Room 306 Agenda 1. Introductions for new members (5 minutes) 2. Name of group 3. Current
Adobe Systems Incorporated
Adobe Connect 9.2 Page 1 of 8 Adobe Systems Incorporated Adobe Connect 9.2 Hosted Solution June 20 th 2014 Adobe Connect 9.2 Page 2 of 8 Table of Contents Engagement Overview... 3 About Connect 9.2...
Understanding Web Application Security Issues
Understanding Web Application Security Issues Pankaj Sharma January 30, 2009 Indian Computer Emergency Response Team ( CERT - IN ) Department Of Information Technology 1 Agenda Introduction What are Web
Intrusion detection for web applications
Intrusion detection for web applications Intrusion detection for web applications Łukasz Pilorz Application Security Team, Allegro.pl Reasons for using IDS solutions known weaknesses and vulnerabilities
Ethical Hacking Penetrating Web 2.0 Security
Ethical Hacking Penetrating Web 2.0 Security Contact Sam Bowne Computer Networking and Information Technology City College San Francisco Email: [email protected] Web: samsclass.info 2 Two Hacking Classes
Project 2: Web Security Pitfalls
EECS 388 September 19, 2014 Intro to Computer Security Project 2: Web Security Pitfalls Project 2: Web Security Pitfalls This project is due on Thursday, October 9 at 6 p.m. and counts for 8% of your course
[state of the internet] / SEO Attacks. Threat Advisory: Continuous Uptick in SEO Attacks
TLP: GREEN Issue Date: 1.12.16 Threat Advisory: Continuous Uptick in SEO Attacks Risk Factor High The Akamai Threat Research Team has identified a highly sophisticated Search Engine Optimization (SEO)
Advanced Web Technology 10) XSS, CSRF and SQL Injection 2
Berner Fachhochschule, Technik und Informatik Advanced Web Technology 10) XSS, CSRF and SQL Injection Dr. E. Benoist Fall Semester 2010/2011 Table of Contents Cross Site Request Forgery - CSRF Presentation
WEB SECURITY CONCERNS THAT WEB VULNERABILITY SCANNING CAN IDENTIFY
WEB SECURITY CONCERNS THAT WEB VULNERABILITY SCANNING CAN IDENTIFY www.alliancetechpartners.com WEB SECURITY CONCERNS THAT WEB VULNERABILITY SCANNING CAN IDENTIFY More than 70% of all websites have vulnerabilities
Out of the Fire - Adding Layers of Protection When Deploying Oracle EBS to the Internet
Out of the Fire - Adding Layers of Protection When Deploying Oracle EBS to the Internet March 8, 2012 Stephen Kost Chief Technology Officer Integrigy Corporation Phil Reimann Director of Business Development
Penetration Test Report
Penetration Test Report Acme Test Company ACMEIT System 26 th November 2010 Executive Summary Info-Assure Ltd was engaged by Acme Test Company to perform an IT Health Check (ITHC) on the ACMEIT System
Cracking the Perimeter via Web Application Hacking. Zach Grace, CISSP, CEH [email protected] January 17, 2014 2014 Mega Conference
Cracking the Perimeter via Web Application Hacking Zach Grace, CISSP, CEH [email protected] January 17, 2014 2014 Mega Conference About 403 Labs 403 Labs is a full-service information security and compliance
What is Web Security? Motivation
[email protected] http://www.brucker.ch/ Information Security ETH Zürich Zürich, Switzerland Information Security Fundamentals March 23, 2004 The End Users View The Server Providers View What is Web
Ruby on Rails Secure Coding Recommendations
Introduction Altius IT s list of Ruby on Rails Secure Coding Recommendations is based upon security best practices. This list may not be complete and Altius IT recommends this list be augmented with additional
Columbia University Web Security Standards and Practices. Objective and Scope
Columbia University Web Security Standards and Practices Objective and Scope Effective Date: January 2011 This Web Security Standards and Practices document establishes a baseline of security related requirements
Last update: February 23, 2004
Last update: February 23, 2004 Web Security Glossary The Web Security Glossary is an alphabetical index of terms and terminology relating to web application security. The purpose of the Glossary is to
Web Vulnerability Scanner by Using HTTP Method
Available Online at www.ijcsmc.com International Journal of Computer Science and Mobile Computing A Monthly Journal of Computer Science and Information Technology IJCSMC, Vol. 4, Issue. 9, September 2015,
Security features of ZK Framework
1 Security features of ZK Framework This document provides a brief overview of security concerns related to JavaScript powered enterprise web application in general and how ZK built-in features secures
Criteria for web application security check. Version 2015.1
Criteria for web application security check Version 2015.1 i Content Introduction... iii ISC- P- 001 ISC- P- 001.1 ISC- P- 001.2 ISC- P- 001.3 ISC- P- 001.4 ISC- P- 001.5 ISC- P- 001.6 ISC- P- 001.7 ISC-
Network Threats and Vulnerabilities. Ed Crowley
Network Threats and Vulnerabilities Ed Crowley Objectives At the end of this unit, you will be able to describe and explain: Network attack terms Major types of attacks including Denial of Service DoS
ArcGIS Server Security Threats & Best Practices 2014. David Cordes Michael Young
ArcGIS Server Security Threats & Best Practices 2014 David Cordes Michael Young Agenda Introduction Threats Best practice - ArcGIS Server settings - Infrastructure settings - Processes Summary Introduction
Web Application Security Assessment and Vulnerability Mitigation Tests
White paper BMC Remedy Action Request System 7.6.04 Web Application Security Assessment and Vulnerability Mitigation Tests January 2011 www.bmc.com Contacting BMC Software You can access the BMC Software
Advanced PostgreSQL SQL Injection and Filter Bypass Techniques
Advanced PostgreSQL SQL Injection and Filter Bypass Techniques INFIGO-TD TD-200 2009-04 2009-06 06-17 Leon Juranić [email protected] INFIGO IS. All rights reserved. This document contains information
Using Nessus In Web Application Vulnerability Assessments
Using Nessus In Web Application Vulnerability Assessments Paul Asadoorian Product Evangelist Tenable Network Security [email protected] About Tenable Nessus vulnerability scanner, ProfessionalFeed
Finding and Preventing Cross- Site Request Forgery. Tom Gallagher Security Test Lead, Microsoft
Finding and Preventing Cross- Site Request Forgery Tom Gallagher Security Test Lead, Microsoft Agenda Quick reminder of how HTML forms work How cross-site request forgery (CSRF) attack works Obstacles
Security Testing with Selenium
with Selenium Vidar Kongsli Montréal, October 25th, 2007 Versjon 1.0 Page 1 whois 127.0.0.1? Vidar Kongsli System architect & developer Head of security group Bekk Consulting Technology and Management
Web Application Vulnerability Testing with Nessus
The OWASP Foundation http://www.owasp.org Web Application Vulnerability Testing with Nessus Rïk A. Jones, CISSP [email protected] Rïk A. Jones Web developer since 1995 (16+ years) Involved with information
External Vulnerability Assessment. -Technical Summary- ABC ORGANIZATION
External Vulnerability Assessment -Technical Summary- Prepared for: ABC ORGANIZATI On March 9, 2008 Prepared by: AOS Security Solutions 1 of 13 Table of Contents Executive Summary... 3 Discovered Security
Lesson 7 - Website Administration
Lesson 7 - Website Administration If you are hired as a web designer, your client will most likely expect you do more than just create their website. They will expect you to also know how to get their
REDCap General Security Overview
REDCap General Security Overview Introduction REDCap is a web application for building and managing online surveys and databases, and thus proper security practices must instituted on the network and server(s)
Common Security Vulnerabilities in Online Payment Systems
Common Security Vulnerabilities in Online Payment Systems Author- Hitesh Malviya(Information Security analyst) Qualifications: C!EH, EC!SA, MCITP, CCNA, MCP Current Position: CEO at HCF Infosec Limited
Columbia University Web Application Security Standards and Practices. Objective and Scope
Columbia University Web Application Security Standards and Practices Objective and Scope Effective Date: January 2011 This Web Application Security Standards and Practices document establishes a baseline
WHITE PAPER FORTIWEB WEB APPLICATION FIREWALL. Ensuring Compliance for PCI DSS 6.5 and 6.6
WHITE PAPER FORTIWEB WEB APPLICATION FIREWALL Ensuring Compliance for PCI DSS 6.5 and 6.6 CONTENTS 04 04 06 08 11 12 13 Overview Payment Card Industry Data Security Standard PCI Compliance for Web Applications
SQL Injection Protection by Variable Normalization of SQL Statement
Page 1 of 9 SQL Injection Protection by Variable Normalization of SQL Statement by: Sam M.S. NG, 0 http://www.securitydocs.com/library/3388 "Make everything as simple as possible, but not simpler." --
Secrets of Vulnerability Scanning: Nessus, Nmap and More. Ron Bowes - Researcher, Tenable Network Security
Secrets of Vulnerability Scanning: Nessus, Nmap and More Ron Bowes - Researcher, Tenable Network Security 1 About me Ron Bowes (@iagox86) My affiliations (note: I m here to educate, not sell) 2 SkullSpace
CSE598i - Web 2.0 Security OWASP Top 10: The Ten Most Critical Web Application Security Vulnerabilities
CSE598i - Web 2.0 Security OWASP Top 10: The Ten Most Critical Web Application Security Vulnerabilities Thomas Moyer Spring 2010 1 Web Applications What has changed with web applications? Traditional applications
STOPPING LAYER 7 ATTACKS with F5 ASM. Sven Müller Security Solution Architect
STOPPING LAYER 7 ATTACKS with F5 ASM Sven Müller Security Solution Architect Agenda Who is targeted How do Layer 7 attacks look like How to protect against Layer 7 attacks Building a security policy Layer
Web application security
Web application security Sebastian Lopienski CERN Computer Security Team openlab and summer lectures 2010 (non-web question) Is this OK? int set_non_root_uid(int uid) { // making sure that uid is not 0
QuickBooks Online: Security & Infrastructure
QuickBooks Online: Security & Infrastructure May 2014 Contents Introduction: QuickBooks Online Security and Infrastructure... 3 Security of Your Data... 3 Access Control... 3 Privacy... 4 Availability...
Testing the OWASP Top 10 Security Issues
Testing the OWASP Top 10 Security Issues Andy Tinkham & Zach Bergman, Magenic Technologies Contact Us 1600 Utica Avenue South, Suite 800 St. Louis Park, MN 55416 1 (877)-277-1044 [email protected] Who Are
ASL IT Security Advanced Web Exploitation Kung Fu V2.0
ASL IT Security Advanced Web Exploitation Kung Fu V2.0 A S L I T S e c u r i t y P v t L t d. Page 1 Overview: There is a lot more in modern day web exploitation than the good old alert( xss ) and union
EC-Council CAST CENTER FOR ADVANCED SECURITY TRAINING. CAST 619 Advanced SQLi Attacks and Countermeasures. Make The Difference CAST.
CENTER FOR ADVANCED SECURITY TRAINING 619 Advanced SQLi Attacks and Countermeasures Make The Difference About Center of Advanced Security Training () The rapidly evolving information security landscape
Web Application Penetration Testing
Web Application Penetration Testing 2010 2010 AT&T Intellectual Property. All rights reserved. AT&T and the AT&T logo are trademarks of AT&T Intellectual Property. Will Bechtel [email protected]
Threat Modeling. Categorizing the nature and severity of system vulnerabilities. John B. Dickson, CISSP
Threat Modeling Categorizing the nature and severity of system vulnerabilities John B. Dickson, CISSP What is Threat Modeling? Structured approach to identifying, quantifying, and addressing threats. Threat
ASP.NET MVC Secure Coding 4-Day hands on Course. Course Syllabus
ASP.NET MVC Secure Coding 4-Day hands on Course Course Syllabus Course description ASP.NET MVC Secure Coding 4-Day hands on Course Secure programming is the best defense against hackers. This multilayered
Cloud Security:Threats & Mitgations
Cloud Security:Threats & Mitgations Vineet Mago Naresh Khalasi Vayana 1 What are we gonna talk about? What we need to know to get started Its your responsibility Threats and Remediations: Hacker v/s Developer
Web Application Security. Radovan Gibala Senior Field Systems Engineer F5 Networks [email protected]
Web Application Security Radovan Gibala Senior Field Systems Engineer F5 Networks [email protected] Security s Gaping Hole 64% of the 10 million security incidents tracked targeted port 80. Information Week
Web Application Attacks and Countermeasures: Case Studies from Financial Systems
Web Application Attacks and Countermeasures: Case Studies from Financial Systems Dr. Michael Liu, CISSP, Senior Application Security Consultant, HSBC Inc Overview Information Security Briefing Web Applications
OWASP and OWASP Top 10 (2007 Update) OWASP. The OWASP Foundation. Dave Wichers. The OWASP Foundation. OWASP Conferences Chair dave.wichers@owasp.
and Top 10 (2007 Update) Dave Wichers The Foundation Conferences Chair [email protected] COO, Aspect Security [email protected] Copyright 2007 - The Foundation This work is available
How To Fix A Web Application Security Vulnerability
Proposal of Improving Web Application Security in Context of Latest Hacking Trends RADEK VALA, ROMAN JASEK Department of Informatics and Artificial Intelligence Tomas Bata University in Zlin, Faculty of
Web Application Guidelines
Web Application Guidelines Web applications have become one of the most important topics in the security field. This is for several reasons: It can be simple for anyone to create working code without security
Baidu: Webmaster Tools Overview and Guidelines
Baidu: Webmaster Tools Overview and Guidelines Agenda Introduction Register Data Submission Domain Transfer Monitor Web Analytics Mobile 2 Introduction What is Baidu Baidu is the leading search engine
05.0 Application Development
Number 5.0 Policy Owner Information Security and Technology Policy Application Development Effective 01/01/2014 Last Revision 12/30/2013 Department of Innovation and Technology 5. Application Development
Acunetix Website Audit. 5 November, 2014. Developer Report. Generated by Acunetix WVS Reporter (v8.0 Build 20120808)
Acunetix Website Audit 5 November, 2014 Developer Report Generated by Acunetix WVS Reporter (v8.0 Build 20120808) Scan of http://filesbi.go.id:80/ Scan details Scan information Starttime 05/11/2014 14:44:06
Application Denial of Service Is it Really That Easy?
Application Denial of Service Is it Really That Easy? Shay Chen Agenda Introduction to Denial of Service Attacks Application Level DoS Techniques Case Study Denial of Service Testing Mitigation Summary
Short notes on webpage programming languages
Short notes on webpage programming languages What is HTML? HTML is a language for describing web pages. HTML stands for Hyper Text Markup Language HTML is a markup language A markup language is a set of
SECURING APACHE : THE BASICS - III
SECURING APACHE : THE BASICS - III Securing your applications learn how break-ins occur Shown in Figure 2 is a typical client-server Web architecture, which also indicates various attack vectors, or ways
SQL Injection. By Artem Kazanstev, ITSO and Alex Beutel, Student
SQL Injection By Artem Kazanstev, ITSO and Alex Beutel, Student SANS Priority No 2 As of September 2009, Web application vulnerabilities such as SQL injection and Cross-Site Scripting flaws in open-source
Web Application Threats and Vulnerabilities Web Server Hacking and Web Application Vulnerability
Web Application Threats and Vulnerabilities Web Server Hacking and Web Application Vulnerability WWW Based upon HTTP and HTML Runs in TCP s application layer Runs on top of the Internet Used to exchange
Creating Stronger, Safer, Web Facing Code. JPL IT Security Mary Rivera June 17, 2011
Creating Stronger, Safer, Web Facing Code JPL IT Security Mary Rivera June 17, 2011 Agenda Evolving Threats Operating System Application User Generated Content JPL s Application Security Program Securing
WHITE PAPER. FortiWeb Web Application Firewall Ensuring Compliance for PCI DSS 6.5 and 6.6
WHITE PAPER FortiWeb Web Application Firewall Ensuring Compliance for PCI DSS 6.5 and 6.6 Ensuring compliance for PCI DSS 6.5 and 6.6 Page 2 Overview Web applications and the elements surrounding them
How to achieve PCI DSS Compliance with Checkmarx Source Code Analysis
How to achieve PCI DSS Compliance with Checkmarx Source Code Analysis Document Scope This document aims to assist organizations comply with PCI DSS 3 when it comes to Application Security best practices.
A Review of Web Application Security for Preventing Cyber Crimes
International Journal of Information & Computation Technology. ISSN 0974-2239 Volume 4, Number 7 (2014), pp. 699-704 International Research Publications House http://www. irphouse.com A Review of Web Application
Web Application Security
Web Application Security Security Mitigations Halito 26 juni 2014 Content Content... 2 Scope of this document... 3 OWASP Top 10... 4 A1 - Injection... 4... 4... 4 A2 - Broken Authentication and Session
CCM 4350 Week 11. Security Architecture and Engineering. Guest Lecturer: Mr Louis Slabbert School of Science and Technology.
CCM 4350 Week 11 Security Architecture and Engineering Guest Lecturer: Mr Louis Slabbert School of Science and Technology CCM4350_CNSec 1 Web Server Security The Web is the most visible part of the net
WHITEPAPER. Nessus Exploit Integration
Nessus Exploit Integration v2 Tenable Network Security has committed to providing context around vulnerabilities, and correlating them to other sources, such as available exploits. We currently pull information
Thick Client Application Security
Thick Client Application Security Arindam Mandal ([email protected]) (http://www.paladion.net) January 2005 This paper discusses the critical vulnerabilities and corresponding risks in a two
SECURITY ADVISORY. December 2008 Barracuda Load Balancer admin login Cross-site Scripting
SECURITY ADVISORY December 2008 Barracuda Load Balancer admin login Cross-site Scripting Discovered in December 2008 by FortConsult s Security Research Team/Jan Skovgren WARNING NOT FOR DISCLOSURE BEFORE
WEB APPLICATION VULNERABILITY STATISTICS (2013)
WEB APPLICATION VULNERABILITY STATISTICS (2013) Page 1 CONTENTS Contents 2 1. Introduction 3 2. Research Methodology 4 3. Summary 5 4. Participant Portrait 6 5. Vulnerability Statistics 7 5.1. The most
Client logo placeholder XXX REPORT. Page 1 of 37
Client logo placeholder XXX REPORT Page 1 of 37 Report Details Title Xxx Penetration Testing Report Version V1.0 Author Tester(s) Approved by Client Classification Confidential Recipient Name Title Company
SQL injection: Not only AND 1=1. The OWASP Foundation. Bernardo Damele A. G. Penetration Tester Portcullis Computer Security Ltd
SQL injection: Not only AND 1=1 Bernardo Damele A. G. Penetration Tester Portcullis Computer Security Ltd [email protected] +44 7788962949 Copyright Bernardo Damele Assumpcao Guimaraes Permission
Secure development and the SDLC. Presented By Jerry Hoff @jerryhoff
Secure development and the SDLC Presented By Jerry Hoff @jerryhoff Agenda Part 1: The Big Picture Part 2: Web Attacks Part 3: Secure Development Part 4: Organizational Defense Part 1: The Big Picture Non
Web Application Hacking (Penetration Testing) 5-day Hands-On Course
Web Application Hacking (Penetration Testing) 5-day Hands-On Course Web Application Hacking (Penetration Testing) 5-day Hands-On Course Course Description Our web sites are under attack on a daily basis
We protect you applications! No, you don t. Digicomp Hacking Day 2013 May 16 th 2013
We protect you applications! No, you don t Digicomp Hacking Day 2013 May 16 th 2013 Sven Vetsch Partner & CTO at Redguard AG www.redguard.ch Specialized in Application Security (Web, Web-Services, Mobile,
How to break in. Tecniche avanzate di pen testing in ambito Web Application, Internal Network and Social Engineering
How to break in Tecniche avanzate di pen testing in ambito Web Application, Internal Network and Social Engineering Time Agenda Agenda Item 9:30 10:00 Introduction 10:00 10:45 Web Application Penetration
Web Application Security
Web Application Security John Zaharopoulos ITS - Security 10/9/2012 1 Web App Security Trends Web 2.0 Dynamic Webpages Growth of Ajax / Client side Javascript Hardening of OSes Secure by default Auto-patching
Hacking the WordpressEcosystem
Hacking the WordpressEcosystem About Me Dan Catalin VASILE Information Security Consultant Researcher / Writer / Presenter OWASP Romania Board Member Online presence http://www.pentest.ro [email protected]/
JOOMLA SECURITY. ireland website design. by Oliver Hummel. ADDRESS Unit 12D, Six Cross Roads Business Park, Waterford City
JOOMLA SECURITY by Oliver Hummel ADDRESS Unit 12D, Six Cross Roads Business Park, Waterford City CONTACT Nicholas Butler 051-393524 089-4278112 [email protected] Contents Introduction 3 Installation
Chapter 4 Application, Data and Host Security
Chapter 4 Application, Data and Host Security 4.1 Application Security Chapter 4 Application Security Concepts Concepts include fuzzing, secure coding, cross-site scripting prevention, crosssite request
Annual Web Application Security Report 2011
Annual Web Application Security Report 2011 An analysis of vulnerabilities found in external Web Application Security tests conducted by NTA Monitor during 2010 Contents 1.0 Introduction... 3 2.0 Summary...
Ethical Hacking as a Professional Penetration Testing Technique
Ethical Hacking as a Professional Penetration Testing Technique Rochester ISSA Chapter Rochester OWASP Chapter - Durkee Consulting, Inc. [email protected] 2 Background Founder of Durkee Consulting since 1996
Webapps Vulnerability Report
Tuesday, May 1, 2012 Webapps Vulnerability Report Introduction This report provides detailed information of every vulnerability that was found and successfully exploited by CORE Impact Professional during
Detecting Web Application Vulnerabilities Using Open Source Means. OWASP 3rd Free / Libre / Open Source Software (FLOSS) Conference 27/5/2008
Detecting Web Application Vulnerabilities Using Open Source Means OWASP 3rd Free / Libre / Open Source Software (FLOSS) Conference 27/5/2008 Kostas Papapanagiotou Committee Member OWASP Greek Chapter [email protected]
Introduction. Two levels of security vulnerabilities:
Introduction Two levels of security vulnerabilities: Project level (cyphers, standard protocols, BAN logic, etc.) Implementation level (bugs, unhandled inputs, misconfigurations, etc.) There are two levels
