TOOL EVALUATION REPORT: FORTIFY
|
|
|
- Beryl Gardner
- 10 years ago
- Views:
Transcription
1 TOOL EVALUATION REPORT: FORTIFY Derek D Souza, Yoon Phil Kim, Tim Kral, Tejas Ranade, Somesh Sasalatti ABOUT THE TOOL Background The tool that we have evaluated is the Fortify Source Code Analyzer (Fortify SCA) created by Fortify Software. Fortify software is a software security vendor of choice of government and Fortune 500 companies in a wide variety of industries. They provide products that identify and remediate security vulnerabilities in software in order to mitigate enterprise security risks. The Fortify SCA tool attempts to protect systems from security flaws in business-critical software applications. Fortify SCA drives down cost and risk by automating and enhancing key software audit, development, testing and deployment processes. Unlike traditional network security, Fortify SCA strengthens the software applications themselves so that hackers and malicious insiders cannot access vital assets or disrupt business processes. In addition to the Fortify SCA tool some of their other products are as follows: Fortify Tracer - the first and only automated solution that makes Black Box security testing actionable and measurable, Fortify Tester - the first black box security testing plug-in for Microsoft Visual Studio, Fortify Defender - the first and only intrusion prevention software solution for web applications already in deployment, and Fortify Manager - the definitive software security risk management dashboard. ( Languages/Platform supported Fortify SCA supports a wide variety of languages, frameworks and operating systems. Languages: ASP.NET, C/C++, C#, ColdFusion, Java, JSP, PL/SQL, T-SQL, XML, VB.NET and other.net languages Platforms: Windows, Solaris, Linux, Mac OS X, HP-UX, AIX Frameworks: J2EE/EJB, Struts, Hibernate 1
2 IDEs: Microsoft Visual Studio, Eclipse, Web Sphere Application Developer, IBM Rational Application Developer How it Works Fortify SCA is a static analysis tool and it processes code in a manner similar to a code compiler. It uses a build tool that runs on a source code file or set of files and converts it into an intermediate model that is optimized for security analysis by Fortify. This model is put through a series of analyzers (Data flow, Semantic, Control Flow, Configuration, and Structural). Fortify SCA also uses Fortify Secure Coding Rule Packs to analyze the code base for violations of secure coding practices. Fortify Rules Builder allows to extend and expand analysis capabilities to include custom rules as well. The results can be viewed in a number of ways using the Audit Workbench and the Fortify Manager. ( Capabilities/Features Fortify SCA is used to find and fix following software vulnerabilities at the root cause: Buffer Overflow, Command Injection, Cross-Site Scripting, Denial of Service, Format String, Integer Overflow, Log Forging, Password, Management, Path Manipulation, Privacy Violation, Race Conditions, Session Fixation, SQL Injection, System Information Leak, and Unreleased Resource. It sorts, filters, prioritizes 2
3 and categorizes the issues found in various forms for easy viewing and analysis through the Audit Workbench and Fortify Manager. The results can also be exported as a report in formats such as html and xml. The SCA tool supports integration with black box security testers such as Watchfire s Appscan and it also supports integration with Findbugs for central security and quality issue reporting. TOOL AND EXPERIMENTS SETUP Tool Setup The SCA tool comes in three editions: Enterprise, Team, and Developer. We used the Team Edition which is intended for smaller organizations, and consists of Fortify SCA, Fortify Audit Workbench, and Fortify Rules Builder. We believe this edition will be the most relevant and interesting to other MSE and MSIT students because the majority of studio and practicum projects are being done in a Windows environment with small teams. The tool was downloaded with the evaluation license from Artifacts We ran Fortify SCA on the following artifacts: OpenSSH (Large C/C++ code base) we used the tool on this project to test its analysis on a large well-known code base. Small C/C++ application injected with bugs we created a small test file that we injected with bugs to test precisely for false positives, false negatives, and effectiveness of the tool in finding bugs. JSPWiki (Large Java code base) we used the tool on this project to evaluate it on a different language (Java) and to compare it with existing bug reports on the tool to test its efficacy. Crystal (Small Java code base) we used the tool on Crystal to evaluate a project that we have actively been using this semester and have some familiarity with. How to Use An analysis can be performed with the Fortify SCA tool in two steps: 1) Use the command line to run the sourceanalyzer on the project source files and obtain a.fpr file. 2) Use the Audit workbench or Fortify Manager on the.fpr file to explore the results of the analysis. 3
4 The first step in performing an analysis involves running a series of commands at the command line prompt to build the source files. For Java projects, the classpath and the source folder or file must be provided. For C/C++ projects, a makefile is required. Once the build is successful, a.fpr file is generated on which we ran the Audit Workbench to analyze the results. The screenshot shows the Fortify Audit workbench used to analyze the Crystal code base: Fig 1: Screenshot of Fortify SCA Audit Workbench The list of issues grouped as Warnings can be viewed here with the Null Deference bug highlighted. It zooms in on the piece of code that contains the bug. The bottom right box shows a summary of the bug as well as details in separate tabs. The bottom left box gives the bug trace found in the analysis. 4
5 EVALUATION CRITERIA Performance We measured the performance in terms of the time required for the analysis to complete, memory usage, and CPU usage. These criteria helped us determine if the tool was reasonable in its usage of resources, and how it performed on different codebases. Our evaluation was limited to a large C codebase, and a medium sized Java codebase. An interesting observation was that even on a large code base like OpenSSH, SCA s performance was quite impressive. Although the custom build took long, the actual scan time of 2.45 minutes to scan lines of code across 152 files is noteworthy. Criteria OpenSSH JSPWiki Size of the code base (KLOC) Language C Java CPU Usage 30-50% 50% Memory usage (K bytes) Execution time Compilation (minutes) Scanning 3 1 Number of bugs and quality of the findings The tool reports bugs in four categories: (1) semantic, (2) data flow, (3) structural and (4) control flow. In addition, bugs are categorized as Hot issues, Warnings and Information. Although the number of bugs reported, particularly for OpenSSH and JSPWiki is high, the categorization of bugs makes it much easier to understand and prioritize them. The tool also allows the user to configure the prioritization of bugs, which makes it possible to specify what you believe is important for the system being analyzed. On OpenSSH and JSPWiki, the bug lists have entries in the order of a few hundred. One can notice from the bug list that there several types of errors found. Each of them relates to some security vulnerability that can be exploited. Some of the common ones are buffer overflows, unreleased resource errors, memory leaks etc. In addition to these, some bugs that can be very important in security analysis were also reported. For example, the tool reports denial of service bugs, which can occur when a thread sleeps for variable time. Another useful report was that of command injections for command executions that use relative paths. Such a bug can be exploited by a malicious user by changing the environment variable to point to malicious code. Fortify identifies parts of the code where such paths are used. On Crystal, the tool reported 4 bug warnings and 145 miscellaneous notes. The finding that was most useful was a null deference bug that would have caused a null pointer exception every time that piece of code was run. There were two instances where getstacktrace() was called that the tool reported as System Information warnings since it could potentially provide important system information which can be exploited by an attacker. In addition, the tool found an instance of an unreleased resource after 5
6 getprintwriter() was being called. The 145 notes provided useful information in categories of issues such as poor error handling, poor logging practices, model violations, and dead code found in Crystal. Level of Detail in the Reports For all the issues the tool finds, the level of detail is sufficient to gain an understanding of what the problem is. Double clicking on a specific issue zooms in on the portion of the problematic code. Fortify provides both summary and detailed descriptions of all bugs found. Detailed summaries include a full explanation about the type of bug found, why it is a bug, where in the current source code it is occurring (including data flow traces if applicable), fully explanatory examples of the bug in sample code and in some cases, references for further reading about the bug. The tool also provides sample code to illustrate how the issue can potentially be exploited by an attacker of the system. Suggested fixes, fixing time For each of the issues found, the tool provides a list of recommendations and tips. Some of these are helpful, but some are not. For example, for the null deference bug the tool s recommendation was Security problems caused by dereferencing null pointers are almost always related to the way in which the program handles runtime exceptions. If the software has a solid and well-executed approach to dealing with runtime exceptions, the potential for security damage is significantly diminished. This does not provide any particularly useful information for fixing the bug and seems more like background information on the issue. However, for some other bugs, the recommendations also contained useful sample code which can be used as reference for fixing the bug. Given that some of the recommendations are quite specific, the fix time for bugs is low. Even for the reports that do not provide very useful suggestions, the location of the bug can be pin-pointed, which makes it a lot simpler to debug. We found Fortify to be more intuitive for fixing bugs than most of the analysis tools we have used during this course. False Positives: On the whole, the tool does not report a large percentage of false positives in comparison to the number of bugs reported. It does; however, report some false positives. The Fortify tool website also acknowledges this in a disclaimer. Among the false positives we noticed, here is an example: The tool assumes that dynamic memory is freed within the scope of a function. As a result, if custom free methods are called, it throws a potential memory leak. A code snippet that illustrates this is shown below: { int *ptr = (int*)malloc(2*sizeof(int)); 6
7 Myfree(ptr); } Myfree(int *ptr){ free(ptr); } In this snippet, the memory allocated to ptr is released in the method Myfree(int *). However, the tool does not understand that the memory is freed in another method which is outside the scope of ptr. This is a common source of false positives in the SSH source code. Another source of false positive that we observed was the report of a SQL injection at places where we did not find any hint of a dynamic SQL query generation. This type of result was observed in JSPWiki code. False Negatives / Overlooks: One of our interesting investigations involved trying to find false negatives. Our approach, as documented in the proposal, was to compare the results of the tool with the bugs reported on the bug list in an open source forum. We did not have a substantial degree of success finding open source software which we could use that had well documented bug-lists. However, we did find an instance of a false negative in the analysis of JSPWiki. Here is the sample. 1 String password = profile.getpassword(); 2 String existingpassword = ( existingprofile == null )? null : existingprofile.getpassword(); 3 if ( "".equals( password ) ){ 4 password = null; 5 } 6 if ( password == null){ 7 password = existingpassword; 8 } 9 // If password changed, hash it before we save 10 if (!password.equals( existingpassword ) ) There is a null dereference error in line 10 of the code displayed above. Although password is being checked previously for null value, it is actually being assigned to existingpassword (line 7). Now existingpassword can very well be null, as indicated by line 2. Therefore, there is a possibility of a null dereference in line 10, but Fortify fails to catch it. This bug was one of the bugs noticed in the forum, and corrected thereafter. (Ref. Another observation was that the tool does not identify shallow copy as an illegal operation. If an alias to a pointer is created, then the tool does not warn that an inappropriate operation might result. 7
8 Usability: Good An audit workbench is available for viewing the results and analyzing the issues. The audit workbench we used was an Eclipse plug-in. The workbench is very easy to use, and it reports the bugs in an understandable fashion; including color-coding for severity, hierarchies based on bug types and file structures. It also allows easy location of bugs in the source code. Other than the files that need to be generated automatically, the tool does not require any annotations, specification or customization to the source code or the tool. Thus, the time spent in preparing for the analysis is very low. Bad The intermediate files and the analysis files need to be built from a command line interface. The analysis file can then be opened in the workbench. This process is especially painful on machines that are not configured as test machines. We spent a considerable time trying to make the analysis work, particularly on C and C++ codebases. A usability bug exists in the audit workbench. If the source file is edited while it is being viewed in the workbench, then the line numbers for the errors can get skewed. Interesting bug types: Some of the more interesting bugs caught by the tool are as follows: Least Privilege Violation: There is a point in the code where the privilege level to execute the code was escalated, but was not reverted back immediately after the operation. This vulnerability can be exploited by an attacker by injecting code which can be run in an escalated privilege. Insecure temporary file. There is a point in the code of SSH where an insecure temporary swap file is being created. Fortify identifies that this temporary file is not secured. Command Injection: There are several places in the code where relative paths are being specified for files and commands. If an attacker changes the $PATH env variable which is being used, then he can get a malicious binary to execute. Practicality: The bugs reported by Fortify are very relevant particularly from a security standpoint. Also, they are good indicators of overall code quality and coding practices. The bug list cannot be considered complete in all respects. However, we believe that it is worthwhile to spend time fixing the bugs that the analyst is concerned about. There might be certain classes of bugs, or certain areas in the application that need to be given attention to. Fortify SCA presents the bugs by order of configurable importance, as well as by location. Also as noticed before, the bug reports are comprehensive ensuring relatively low fix time. Considering the large number of bugs, it will be an overhead to try to fix each one. Therefore, the categorization can be used to identify what to fix. This definitely makes the tool very practical and cost effective. 8
9 LESSONS LEARNED Benefits The Fortify SCA tool provides powerful analysis techniques, including patent pending multi-tier data flow analysis and interactive results viewing. It helps prioritize security risks and thus helps to bring high risk vulnerabilities to the forefront. Fortify SCA efficiently processes large, complex code bases and presents discovered security issues in a well categorized form that makes reporting and remediation significantly faster. Fortify SCA uses the knowledge base of secure coding guidelines and thus brings required expertise and consistency to developers and allows security experts to leverage their knowledge across more projects. The tool provides support for multiple languages and platforms. The tool is easy to setup and does not require any extra work other than building the source files. Drawbacks The SCA tool cannot catch design intentions or analyze the existing design for soundness. There are some usability issues in the build phase of using the tool since this has to be performed through the command line and with the availability of makefiles in some instances. Fortify SCA suffers from what is called the black box problem. For reactive applications and heterogeneous systems, execution does not always take place in available application code. For instance, in reaction to a mouse click, a reactive application can start executing in kernel code to pass the event over and around the operating system. This part of its execution can rarely be analyzed and therefore, static analysis tools can hardly determine what type of data comes out of these calls. Thus, this prevents true inter-procedural analysis. Fortify SCA has issues with discovering bugs from aliasing and considering method calls (it does not cover all execution paths). Scope of application The SCA tool is a useful tool that can be used during the implementation phase while code is being written and also during the testing phases of the software lifecycle. Fortify also provides other tools such as the Fortify Defender which can be used during the production phase. 9
10 CONCLUSIONS If there are no trial restrictions we plan to continue using this tool to analyze our source code. The tool can be used to supplement code inspections since it gives a list of critical security flaws in the code as well as bad coding practice issues. Security is an attribute that is not very easy or tangible to test for with traditional methods, and this tool can significantly help in this area while at the same time helping developers gain an understanding of how certain issues in code can result in security flaws. Identifying these issues early in the lifecycle with the help of this tool can reduce cost of fixing bugs later on down the line once the implementation is complete. This tool is especially useful for teams whose projects will be using or will be used in distributed systems that are open to remote access. For example, the Google team is developing protocol code for an open source library called Libjingle that can be used for file transfers between distributed machines. One of the MSIT practicum teams is developing an online version of the Risk board game that will involve multiple players remotely accessing the game. In these cases, security of the system is critical and this tool can help ensure that the flaws in code that can be exploited by attackers are minimized. In general, this is a very useful tool that can provide a robust and easy to examine analysis that should be used in projects where security is a high priority quality attribute. 10
Source Code Review Using Static Analysis Tools
Source Code Review Using Static Analysis Tools July-August 05 Author: Stavros Moiras Supervisor(s): Stefan Lüders Aimilios Tsouvelekakis CERN openlab Summer Student Report 05 Abstract Many teams at CERN,
Application Code Development Standards
Application Code Development Standards Overview This document is intended to provide guidance to campus system owners and software developers regarding secure software engineering practices. These standards
Passing PCI Compliance How to Address the Application Security Mandates
Passing PCI Compliance How to Address the Application Security Mandates The Payment Card Industry Data Security Standards includes several requirements that mandate security at the application layer. These
Braindumps.C2150-810.50 questions
Braindumps.C2150-810.50 questions Number: C2150-810 Passing Score: 800 Time Limit: 120 min File Version: 5.3 http://www.gratisexam.com/ -810 IBM Security AppScan Source Edition Implementation This is the
HP Fortify Static Code Analyzer
HP Fortify Static Code Analyzer Software Version 4.10 Installation and Configuration Guide Document Release Date: April 2014 Software Release Date: April 2014 Legal Notices Warranty The only warranties
Web Application Report
Web Application Report This report includes important security information about your Web Application. Security Report This report was created by IBM Rational AppScan 8.5.0.1 11/14/2012 8:52:13 AM 11/14/2012
IBM Rational AppScan: Application security and risk management
IBM Software Security November 2011 IBM Rational AppScan: Application security and risk management Identify, prioritize, track and remediate critical security vulnerabilities and compliance demands 2 IBM
Linux Kernel. Security Report
Linux Kernel Security Report September 25 Authors: Andy Chou, Bryan Fulton and Seth Hallem Coverity has combined two years of analysis work carried out in a commercial setting at Coverity with four years
IBM Rational AppScan Source Edition
IBM Software November 2011 IBM Rational AppScan Source Edition Secure applications and build secure software with static application security testing Highlights Identify vulnerabilities in your source
Automatic vs. Manual Code Analysis
Automatic vs. Manual Code Analysis 2009-11-17 Ari Kesäniemi Senior Security Architect Nixu Oy [email protected] Copyright The Foundation Permission is granted to copy, distribute and/or modify this
Product Roadmap. Sushant Rao Principal Product Manager Fortify Software, a HP company
Product Roadmap Sushant Rao Principal Product Manager Fortify Software, a HP company Agenda Next Generation of Security Analysis Future Directions 2 Currently under investigation and not guaranteed to
Rational Application Developer Performance Tips Introduction
Rational Application Developer Performance Tips Introduction This article contains a series of hints and tips that you can use to improve the performance of the Rational Application Developer. This article
Oracle Solaris Studio Code Analyzer
Oracle Solaris Studio Code Analyzer The Oracle Solaris Studio Code Analyzer ensures application reliability and security by detecting application vulnerabilities, including memory leaks and memory access
90% of data breaches are caused by software vulnerabilities.
90% of data breaches are caused by software vulnerabilities. Get the skills you need to build secure software applications Secure Software Development (SSD) www.ce.ucf.edu/ssd Offered in partnership with
Automating Security Testing. Mark Fallon Senior Release Manager Oracle
Automating Security Testing Mark Fallon Senior Release Manager Oracle Some Ground Rules There are no silver bullets You can not test security into a product Testing however, can help discover a large percentage
elearning for Secure Application Development
elearning for Secure Application Development Curriculum Application Security Awareness Series 1-2 Secure Software Development Series 2-8 Secure Architectures and Threat Modeling Series 9 Application Security
<Insert Picture Here> What's New in NetBeans IDE 7.2
Slide 1 What's New in NetBeans IDE 7.2 The following is intended to outline our general product direction. It is intended for information purposes only, and may not be incorporated
Is your software secure?
Is your software secure? HP Fortify Application Security VII konferencja Secure 2013 Warsaw - October 9, 2013 Gunner Winkenwerder Sales Manager Fortify CEE, Russia & CIS HP Enterprise Security +49 (172)
Web application security: automated scanning versus manual penetration testing.
Web application security White paper January 2008 Web application security: automated scanning versus manual penetration testing. Danny Allan, strategic research analyst, IBM Software Group Page 2 Contents
Creating Stronger, Safer, Web Facing Code. JPL IT Security Mary Rivera June 17, 2011
Creating Stronger, Safer, Web Facing Code JPL IT Security Mary Rivera June 17, 2011 Agenda Evolving Threats Operating System Application User Generated Content JPL s Application Security Program Securing
Integrated Network Vulnerability Scanning & Penetration Testing SAINTcorporation.com
SAINT Integrated Network Vulnerability Scanning and Penetration Testing www.saintcorporation.com Introduction While network vulnerability scanning is an important tool in proactive network security, penetration
How to Avoid an Attack - Security Testing as Part of Your Software Testing Process
How to Avoid an Attack - Security Testing as Part of Your Software Testing Process Recent events in the field of information security, which have been publicized extensively in the media - such as the
Network and Host-based Vulnerability Assessment
Network and Host-based Vulnerability Assessment A guide for information systems and network security professionals 6600 Peachtree-Dunwoody Road 300 Embassy Row Atlanta, GA 30348 Tel: 678.443.6000 Toll-free:
Threat Modeling. Categorizing the nature and severity of system vulnerabilities. John B. Dickson, CISSP
Threat Modeling Categorizing the nature and severity of system vulnerabilities John B. Dickson, CISSP What is Threat Modeling? Structured approach to identifying, quantifying, and addressing threats. Threat
Seven Practical Steps to Delivering More Secure Software. January 2011
Seven Practical Steps to Delivering More Secure Software January 2011 Table of Contents Actions You Can Take Today 3 Delivering More Secure Code: The Seven Steps 4 Step 1: Quick Evaluation and Plan 5 Step
STATE OF WASHINGTON DEPARTMENT OF SOCIAL AND HEALTH SERVICES P.O. Box 45810, Olympia, Washington 98504 5810. October 21, 2013
STATE OF WASHINGTON DEPARTMENT OF SOCIAL AND HEALTH SERVICES P.O. Box 45810, Olympia, Washington 98504 5810 October 21, 2013 To: RE: All Vendors Request for Information (RFI) The State of Washington, Department
Instrumentation Software Profiling
Instrumentation Software Profiling Software Profiling Instrumentation of a program so that data related to runtime performance (e.g execution time, memory usage) is gathered for one or more pieces of the
How to achieve PCI DSS Compliance with Checkmarx Source Code Analysis
How to achieve PCI DSS Compliance with Checkmarx Source Code Analysis Document Scope This document aims to assist organizations comply with PCI DSS 3 when it comes to Application Security best practices.
Streamlining Application Vulnerability Management: Communication Between Development and Security Teams
Streamlining Application Vulnerability Management: Communication Between Development and Security Teams October 13, 2012 OWASP Boston Application Security Conference Agenda Introduction / Background Vulnerabilities
An Easier Way for Cross-Platform Data Acquisition Application Development
An Easier Way for Cross-Platform Data Acquisition Application Development For industrial automation and measurement system developers, software technology continues making rapid progress. Software engineers
Source Code Security Analysis Tool Functional Specification Version 1.0
Special Publication 500-268 Source Code Security Analysis Tool Functional Specification Version 1.0 Paul E. Black Michael Kass Michael Koo Software Diagnostics and Conformance Testing Division Information
BI xpress Product Overview
BI xpress Product Overview Develop and manage SSIS packages with ease! Key Features Create a robust auditing and notification framework for SSIS Speed BI development with SSAS calculations and SSIS package
Coverity White Paper. Reduce Your Costs: Eliminate Critical Security Vulnerabilities with Development Testing
Reduce Your Costs: Eliminate Critical Security Vulnerabilities with Development Testing The Stakes Are Rising Security breaches in software and mobile devices are making headline news and costing companies
Basic Unix/Linux 1. Software Testing Interview Prep
Basic Unix/Linux 1 Programming Fundamentals and Concepts 2 1. What is the difference between web application and client server application? Client server application is designed typically to work in a
IBM Security QRadar Vulnerability Manager Version 7.2.1. User Guide
IBM Security QRadar Vulnerability Manager Version 7.2.1 User Guide Note Before using this information and the product that it supports, read the information in Notices on page 61. Copyright IBM Corporation
IBM Security AppScan Source
Source Secure traditional and mobile applications and build secure software with static application security testing Highlights Identify vulnerabilities in your source code, review data and call flows,
HackMiami Web Application Scanner 2013 PwnOff
HackMiami Web Application Scanner 2013 PwnOff An Analysis of Automated Web Application Scanning Suites James Ball, Alexander Heid, Rod Soto http://www.hackmiami.org Overview Web application scanning suites
Protecting Your Organisation from Targeted Cyber Intrusion
Protecting Your Organisation from Targeted Cyber Intrusion How the 35 mitigations against targeted cyber intrusion published by Defence Signals Directorate can be implemented on the Microsoft technology
The purpose of this report is to educate our prospective clients about capabilities of Hackers Locked.
This sample report is published with prior consent of our client in view of the fact that the current release of this web application is three major releases ahead in its life cycle. Issues pointed out
Improve Fortran Code Quality with Static Analysis
Improve Fortran Code Quality with Static Analysis This document is an introductory tutorial describing how to use static analysis on Fortran code to improve software quality, either by eliminating bugs
Application Security Testing How to find software vulnerabilities before you ship or procure code
Application Security Testing How to find software vulnerabilities before you ship or procure code Anita D Amico, Ph.D. Hassan Radwan 1 Overview Why Care About Application Security? Quality vs Security
Coverity Scan. Big Data Spotlight
Coverity Scan Big Data Spotlight Coverity Scan Service The Coverity Scan service began as the largest public-private sector research project in the world focused on open source software quality and security.
KASPERSKY SECURITY INTELLIGENCE SERVICES. EXPERT SERVICES. www.kaspersky.com
KASPERSKY SECURITY INTELLIGENCE SERVICES. EXPERT SERVICES www.kaspersky.com EXPERT SERVICES Expert Services from Kaspersky Lab are exactly that the services of our in-house experts, many of them global
ITEC441- IS Security. Chapter 15 Performing a Penetration Test
1 ITEC441- IS Security Chapter 15 Performing a Penetration Test The PenTest A penetration test (pentest) simulates methods that intruders use to gain unauthorized access to an organization s network and
Web application testing
CL-WTS Web application testing Classroom 2 days Testing plays a very important role in ensuring security and robustness of web applications. Various approaches from high level auditing through penetration
Threat Modeling/ Security Testing. Tarun Banga, Adobe 1. Agenda
Threat Modeling/ Security Testing Presented by: Tarun Banga Sr. Manager Quality Engineering, Adobe Quality Leader (India) Adobe Systems India Pvt. Ltd. Agenda Security Principles Why Security Testing Security
The Hacker Strategy. Dave Aitel [email protected]. Security Research
1 The Hacker Strategy Dave Aitel [email protected] Security Research Who am I? CTO, Immunity Inc. History: NSA->@stake -> Immunity Responsible for new product development Vulnerability Sharing Club
Threat Modelling for Web Application Deployment. Ivan Ristic [email protected] (Thinking Stone)
Threat Modelling for Web Application Deployment Ivan Ristic [email protected] (Thinking Stone) Talk Overview 1. Introducing Threat Modelling 2. Real-world Example 3. Questions Who Am I? Developer /
FISMA / NIST 800-53 REVISION 3 COMPLIANCE
Mandated by the Federal Information Security Management Act (FISMA) of 2002, the National Institute of Standards and Technology (NIST) created special publication 800-53 to provide guidelines on security
Complete Patch Management
Complete Patch Management Complete - Flexible Unique In- Depth Secunia CSI 7 Corporate Software Inspector Take control of the vulnerability threat and optimize your IT security investments. The Secunia
SOFTWARE TESTING TRAINING COURSES CONTENTS
SOFTWARE TESTING TRAINING COURSES CONTENTS 1 Unit I Description Objectves Duration Contents Software Testing Fundamentals and Best Practices This training course will give basic understanding on software
Open Source Security Study How Are Open Source Development Communities Embracing Security Best Practices?
Open Source Security Study How Are Open Source Development Communities Embracing Security Best Practices? Fortify s Security Research Group and Larry Suto July 2008 Open Source Security Study WWW.FORTIFY.COM
Comparing the Effectiveness of Penetration Testing and Static Code Analysis
Comparing the Effectiveness of Penetration Testing and Static Code Analysis Detection of SQL Injection Vulnerabilities in Web Services PRDC 2009 Nuno Antunes, [email protected], [email protected] University
Contents Introduction xxvi Chapter 1: Understanding the Threats: E-mail Viruses, Trojans, Mail Bombers, Worms, and Illicit Servers
Contents Introduction xxvi Chapter 1: Understanding the Threats: E-mail Viruses, Trojans, Mail Bombers, Worms, and Illicit Servers 1 Introduction 2 Essential Concepts 3 Servers, Services, and Clients 3
ARM-BASED PERFORMANCE MONITORING FOR THE ECLIPSE PLATFORM
ARM-BASED PERFORMANCE MONITORING FOR THE ECLIPSE PLATFORM Ashish Patel, Lead Eclipse Committer for ARM, IBM Corporation Oliver E. Cole, President, OC Systems, Inc. The Eclipse Test and Performance Tools
Dell One Identity Manager 7.0. Help Desk Module Administration Guide
Dell 2015 Dell Inc. ALL RIGHTS RESERVED. This guide contains proprietary information protected by copyright. The software described in this guide is furnished under a software license or nondisclosure
Programming Flaws and How to Fix Them
19 ö Programming Flaws and How to Fix Them MICHAEL HOWARD DAVID LEBLANC JOHN VIEGA McGraw-Hill /Osborne New York Chicago San Francisco Lisbon London Madrid Mexico City- Milan New Delhi San Juan Seoul Singapore
Database Application Developer Tools Using Static Analysis and Dynamic Profiling
Database Application Developer Tools Using Static Analysis and Dynamic Profiling Surajit Chaudhuri, Vivek Narasayya, Manoj Syamala Microsoft Research {surajitc,viveknar,manojsy}@microsoft.com Abstract
HoneyBOT User Guide A Windows based honeypot solution
HoneyBOT User Guide A Windows based honeypot solution Visit our website at http://www.atomicsoftwaresolutions.com/ Table of Contents What is a Honeypot?...2 How HoneyBOT Works...2 Secure the HoneyBOT Computer...3
Oracle Essbase Integration Services. Readme. Release 9.3.3.0.00
Oracle Essbase Integration Services Release 9.3.3.0.00 Readme To view the most recent version of this Readme, see the 9.3.x documentation library on Oracle Technology Network (OTN) at http://www.oracle.com/technology/documentation/epm.html.
Application Intrusion Detection
Application Intrusion Detection Drew Miller Black Hat Consulting Application Intrusion Detection Introduction Mitigating Exposures Monitoring Exposures Response Times Proactive Risk Analysis Summary Introduction
Integrigy Corporate Overview
mission critical applications mission critical security Application and Database Security Auditing, Vulnerability Assessment, and Compliance Integrigy Corporate Overview Integrigy Overview Integrigy Corporation
Integration Service Database. Installation Guide - Oracle. On-Premises
Kony MobileFabric Integration Service Database Installation Guide - Oracle On-Premises Release 6.5 Document Relevance and Accuracy This document is considered relevant to the Release stated on this title
VMware Server 2.0 Essentials. Virtualization Deployment and Management
VMware Server 2.0 Essentials Virtualization Deployment and Management . This PDF is provided for personal use only. Unauthorized use, reproduction and/or distribution strictly prohibited. All rights reserved.
KEN VAN WYK. Fundamentals of Secure Coding and how to break Software MARCH 19-23, 2007 RESIDENZA DI RIPETTA - VIA DI RIPETTA, 231 ROME (ITALY)
TECHNOLOGY TRANSFER PRESENTS KEN VAN WYK Fundamentals of Secure Coding and how to break Software MARCH 19-23, 2007 RESIDENZA DI RIPETTA - VIA DI RIPETTA, 231 ROME (ITALY) [email protected] www.technologytransfer.it
Monitoring, Tracing, Debugging (Under Construction)
Monitoring, Tracing, Debugging (Under Construction) I was already tempted to drop this topic from my lecture on operating systems when I found Stephan Siemen's article "Top Speed" in Linux World 10/2003.
Web App Security Audit Services
locuz.com Professional Services Web App Security Audit Services The unsecured world today Today, over 80% of attacks against a company s network come at the Application Layer not the Network or System
How To Improve Performance On An Asa 9.4 Web Application Server (For Advanced Users)
Paper SAS315-2014 SAS 9.4 Web Application Performance: Monitoring, Tuning, Scaling, and Troubleshooting Rob Sioss, SAS Institute Inc., Cary, NC ABSTRACT SAS 9.4 introduces several new software products
Toward A Taxonomy of Techniques to Detect Cross-site Scripting and SQL Injection Vulnerabilities
NCSU CSC TR 2008-4 1 Toward A Taxonomy of Techniques to Detect Cross-site Scripting and SQL Injection Vulnerabilities Yonghee SHIN, Laurie WILLIAMS, Members, IEEE Abstract Since 2002, over half of reported
Interactive Application Security Testing (IAST)
WHITEPAPER Interactive Application Security Testing (IAST) The World s Fastest Application Security Software Software affects virtually every aspect of an individual s finances, safety, government, communication,
White Paper. Automating Your Code Review: Moving to a SaaS Model for Application Security
White Paper Automating Your Code Review: Moving to a SaaS Model for Application Security Contents Overview... 3 Executive Summary... 3 Code Review and Security Analysis Methods... 5 Source Code Review
REAL-TIME WEB APPLICATION PROTECTION. AWF SERIES DATASHEET WEB APPLICATION FIREWALL
REAL-TIME WEB APPLICATION PROTECTION. AWF SERIES DATASHEET WEB APPLICATION FIREWALL AWF Series Web application firewalls provide industry-leading Web application attack protection, ensuring continuity
Extreme Networks Security Upgrade Guide
Extreme Networks Security Upgrade Guide 9034868 Published July 2015 Copyright 2012 2015 All rights reserved. Legal Notice Extreme Networks, Inc. reserves the right to make changes in specifications and
Adobe Systems Incorporated
Adobe Connect 9.2 Page 1 of 8 Adobe Systems Incorporated Adobe Connect 9.2 Hosted Solution June 20 th 2014 Adobe Connect 9.2 Page 2 of 8 Table of Contents Engagement Overview... 3 About Connect 9.2...
SELECTING THE RIGHT HOST INTRUSION PREVENTION SYSTEM:
SELECTING THE RIGHT HOST INTRUSION PREVENTION SYSTEM: 12 Key Questions to Ask Executive Summary Host Intrusion Prevention Systems (HIPS) complement perimeter defenses, and play a vital role in protecting
WHITEPAPER. Nessus Exploit Integration
Nessus Exploit Integration v2 Tenable Network Security has committed to providing context around vulnerabilities, and correlating them to other sources, such as available exploits. We currently pull information
2015 Vulnerability Statistics Report
2015 Vulnerability Statistics Report Introduction or bugs in software may enable cyber criminals to exploit both Internet facing and internal systems. Fraud, theft (financial, identity or data) and denial-of-service
Manipulating Microsoft SQL Server Using SQL Injection
Manipulating Microsoft SQL Server Using SQL Injection Author: Cesar Cerrudo ([email protected]) APPLICATION SECURITY, INC. WEB: E-MAIL: [email protected] TEL: 1-866-9APPSEC 1-212-947-8787 INTRODUCTION
What is Web Security? Motivation
[email protected] http://www.brucker.ch/ Information Security ETH Zürich Zürich, Switzerland Information Security Fundamentals March 23, 2004 The End Users View The Server Providers View What is Web
NETWORK PENETRATION TESTING
Tim West Consulting 6807 Wicklow St. Arlington, TX 76002 817-228-3420 [email protected] OVERVIEW Tim West Consulting Tim West Consulting is a full service IT security and support firm that specializes
Rational AppScan & Ounce Products
IBM Software Group Rational AppScan & Ounce Products Presenters Tony Sisson and Frank Sassano 2007 IBM Corporation IBM Software Group The Alarming Truth CheckFree warns 5 million customers after hack http://infosecurity.us/?p=5168
Web Application Security Assessment and Vulnerability Mitigation Tests
White paper BMC Remedy Action Request System 7.6.04 Web Application Security Assessment and Vulnerability Mitigation Tests January 2011 www.bmc.com Contacting BMC Software You can access the BMC Software
Securing Network Software using Static Analysis
Securing Network Software using Static Analysis Lauri Kolmonen Helsinki University of Technology [email protected] Abstract Writing network software is not easy and developing secure network software
Edit system files. Delete file. ObserveIT Highlights. Change OS settings. Change password. See exactly what users are doing!
ObserveIT auditing software acts like a security camera on your servers. It provides bulletproof video evidence of user sessions, significantly shortening investigation time. Every action performed by
Where every interaction matters.
Where every interaction matters. Peer 1 Vigilant Web Application Firewall Powered by Alert Logic The Open Web Application Security Project (OWASP) Top Ten Web Security Risks and Countermeasures White Paper
Application Backdoor Assessment. Complete securing of your applications
Application Backdoor Assessment Complete securing of your applications Company brief BMS Consulting is established as IT system integrator since 1997 Leading positons in Eastern Europe country Product
Introduction to Web Application Security. Microsoft CSO Roundtable Houston, TX. September 13 th, 2006
Introduction to Web Application Security Microsoft CSO Roundtable Houston, TX September 13 th, 2006 Overview Background What is Application Security and Why Is It Important? Examples Where Do We Go From
Out of the Fire - Adding Layers of Protection When Deploying Oracle EBS to the Internet
Out of the Fire - Adding Layers of Protection When Deploying Oracle EBS to the Internet March 8, 2012 Stephen Kost Chief Technology Officer Integrigy Corporation Phil Reimann Director of Business Development
Security Tools - Hands On
Security Tools - Hands On SecAppDev 2014 Ken van Wyk, @KRvW! Leuven, Belgium 10-14 February 2014 Caveats and Warnings This is not a sales pitch for any product(s) If you want to talk to a sales person,
Attack Vector Detail Report Atlassian
Attack Vector Detail Report Atlassian Report As Of Tuesday, March 24, 2015 Prepared By Report Description Notes [email protected] The Attack Vector Details report provides details of vulnerability
ANNEXURE-1 TO THE TENDER ENQUIRY NO.: DPS/AMPU/MIC/1896. Network Security Software Nessus- Technical Details
Sub: Supply, Installation, setup and testing of Tenable Network Security Nessus vulnerability scanner professional version 6 or latest for scanning the LAN, VLAN, VPN and IPs with 3 years License/Subscription
