Countering The Faults Of Web Scanners Through Byte-code Injection
|
|
|
- Leonard Park
- 10 years ago
- Views:
Transcription
1 Countering The Faults Of Web Scanners Through Byte-code Injection Introduction Penetration testing, web application scanning, black box security testing these terms all refer to a common technique of probing a running application with various inputs in order to simulate attacks and identify potential vulnerabilities in an application. While effective at finding some vulnerabilities, these tests lack transparency and their thoroughness is often debated. In this whitepaper, we will first take a look at what penetration testers thought about the thoroughness of their tests and second, the results of conducting automated web scanning against a number of open-source applications. We will then explore the shortcomings that become obvious as we probed deeper into those results and the application itself. We will then go through a proposal that attempts to address these shortcomings in web scanners. The Process We started our analysis by conducting a survey of several different security experts and developers to see how effective they thought their penetration tests were. After collecting the results from the survey, we analyzed an expert penetration tester as he conducted automated and manual penetration tests on five test applications ranging in size and scope. We used both a general code coverage tool called EMMA and a specialized tool called Fortify Tracer, which sits inside the application being tested and examines what s being tested. Findings Between our survey and the extensive analysis we generated three key findings: 1) Penetration testers admit a low level of awareness in terms of thoroughness but estimate high coverage 2) In our analysis, automated and manual penetration testing yielded very low and inconsistent coverage numbers, averaging only 25% of security related APIs
2 3) Even when a penetration test reached a portion of an application, it often failed to identify a critical vulnerability Finding 1: Penetration Testers admit a low level of awareness in terms of thoroughness but estimate high coverage The nature of black box security tests is such that the test operates outside the application, with no knowledge of the internal code structure or how data flows throughout the application. As a result, there is an inherent lack of information about what is taking place and how thorough the test really is. We wanted to get a sense for how confident security experts were in the tests they conducted. We surveyed experts at various organizations and asked them several questions about the penetration tests they conducted on their applications. The questions that generated the most insightful answers were: Do you know how thorough your penetration test is? 40% 35% 30% 25% 20% 15% 10% 5% 0% No Idea Very uncertain Could guess within 30% Could guess within 15% Extremely confident
3 The answers were fairly split with only 37% saying they were extremely confident, the remainder acknowledging they were not confident to a reasonable degree, and over a quarter saying they were very unaware. The next question forced the respondents to estimate the percentage of their application they were able to test when conducting a black box test. If you had to estimate, what percentage of the security APIs do you think your test hit? 50% 40% 30% 20% 10% 0% 0-20% of the Application Almost 50% of the respondents estimated that their penetration tests were able to reach at least 80% of their application s security related APIs, and the majority believed they could hit over 61%. We were surprised by how many people believed strongly in the thoroughness of their penetration tests and wanted to investigate these claims. While nobody actually currently tracks these statistics on individual application, we conducted penetration tests using two of the most common commercial web application vulnerability scanners on a number of open source applications by using a standard code coverage tool called EMMA, and a specialized tool called Fortify Tracer that analyzes coverage of security critical functions within an application.
4 Finding 2: In our analysis, automated and manual penetration testing yielded low and inconsistent coverage numbers, averaging only 25% of security related APIs After instrumenting our test applications with EMMA & Fortify Tracer, we performed multiple penetration test against them using two of the market leading penetration testing tools. While these tools claim to provide thorough scanning capability, we found a noticeable difference in their effectiveness. Below we show the percentage of security critical points that these two penetration testing tools were able to generate on our five test applications. We pointed the tools at our applications and let them run, with no customization or manual work to tailor the test to our application other than specifying login credentials. Coverage of Security Critical Areas Test Applications Coverage % Penetration Testing Tool 1 Coverage % Penetration Testing Tool 2 Test Application 1 42% 27% Test Application 2 46% 10% Test Application 3 13% 8% Test Application 4 28% 27% Test Application 5 18% 29% Average 29% 20% As you can see, not only are the coverage numbers inconsistent between the two tools (leading one to question their effectiveness), they are extremely low. To some extent this is to be expected, as most companies augment automate testing efforts with manual testing. However, after manual testing the applications, we were only able to increase the coverage by on average - a small amount. Coverage of Security Critical Areas With Additional Manual Efforts
5 Test Applications Coverage % Penetration Testing Tool 1 Coverage % Additional Manual Efforts Test Application 1 42% 55% Test Application 2 46% 49% Test Application 3 13% 29% Test Application 4 28% 73% Test Application 5 18% 42% Average 29% 50% Test Applications Coverage % Penetration Testing Tool 2 Coverage % Additional Manual Efforts Test Application 1 27% 49% Test Application 2 10% 5% Test Application 3 8% 30% Test Application 4 27% 68% Test Application 5 29% 32% Average 20% 37% Finding 3: Even when a penetration test reached a portion of an application, it often failed to identify a critical vulnerability False negatives are a failure to identify a legitimate security issue. We can think of three possibilities why this could happen. The first possibility is pretty obvious: the vulnerabilities that are not found because the penetration test failed to test that area of the application. The second possibility is very interesting the vulnerabilities that web scanners fail to catch even when they actually reached that area of the application. How could this happen? Some vulnerabilities may be difficult to find using traditional web scanners because they may not display an obvious HTTP response indicating the existence of such vulnerabilities. Examples of this include blind injection vulnerabilities that offer very little clue about the existence of the vulnerability. Very often, if a web application configures its error page properly, these tools have difficulty finding these vulnerabilities because they rely on matching the HTTP response with a set known signature if a general error page is shown instead, the tools cannot determine the existence of such vulnerabilities. Finally, the third possibility is that web scanners are not capable of finding certain vulnerabilities. Examples include vulnerabilities like privacy violation that may occur when an application needlessly writes social security numbers or credit card numbers to a log file that a regular web administrator may view. Since these types of
6 vulnerabilities are not possible to determine through the HTTP interface, web scanners simply cannot catch these vulnerabilities. The first two findings lack of coverage information & resulting low coverage numbers are related. Since the testers don t know the coverage of their test, they cannot improve on the test to yield high coverage. The key to solving the lack of coverage information is to gain insight into the application while the tests are running to understand which areas of the application are being exercised and which parts aren t. Solving the false negative fault of the web scanners also seem to indicate a similar solution to gain insight into the application while the tests are running specifically to monitor security related APIs as they are being exercised. In the next section, we try to solve the faults of web scanners by doing exactly that putting monitors inside the application to gain insight into the application while it is running. Proposal: Injecting Monitors Through Byte-code Injection The fault and findings that we have uncovered in regard to using these web scanners all seem to share a common theme lack of information about what is happening inside the application while the tests are running. Our proposal is this: put monitors inside the application to observe the penetration testing. The below is a conceptual model of what this process looks like:
7 Here, we have monitors looking at both incoming & outgoing traffic through the application, as well as the execution of security critical functions. The monitors are controlled through a centralized rules file for modularity, and the results of what the monitor sees is fed into a console. In order to make this happen, we need to answer 3 basic questions: 1. How do I inject the monitors inside the application? 2. Where inside the application do I inject the monitors? 3. What should the monitors do? How do I inject the monitors? One way to inject the monitors is the simply put them into the source code of the application, recompile the code, and redeploy the application. But this can be challenging if you don t have the source code or if you don t have a compilable environment.
8 On the other hand, it is definitely more feasible to simply have access to a running application whether that is a WAR file for a Java application or a MSIL dll for a.net application. Assuming you have access to a running application, what we propose is to inject the monitors through byte-code weaving, using aspect tools using AspectJ for Java and AspectDNG for.net. Byte-code weaving takes classes/dlls and aspects and weaves them together to produce a binary-compatible.class/dll files that run in any normal Java /.NET environment. An informal description of an aspect is a file that describes a specific point in a program flow, and a body of code that gets executed at that point in time. For example, one aspect file may describe to print some statement to the console (body of code) when a SQL statement is being executed (specific point in a program flow). Where inside the application do I inject the monitors? Let s reflect back to what problems we are trying to solve. The 2 problems we are trying to solve are the following: 1. Gain coverage information 2. Reduce false negatives Let s look at coverage. As a tester, you want to ensure that all attack surface exposed is tested. In a web application, you are interested in all areas that read input. In a Java application, they correspond to APIs like javax.servlet.servletrequest.getparameter and its equivalent in various different web frameworks. Now, let s look at reducing false negatives. Recall the 3 possibilities why web scanners fail to detect vulnerabilities didn t reach, difficult to detect, impossible to detect. While the existence of monitors cannot directly help the didn t reach situation, it can help the tester become aware of that situation so that they can improve the test to gain better coverage. To combat the difficult to detect and simply cannot detect causes we propose to put the monitors directly at all the security related APIs. For difficult to detect vulnerabilities such as SQL Injection or Command Injection, the best place to monitor is right at the API call. For SQL Injection, it would be java.sql.statement.executequery ; for command injection, it would be java.lang.runtime.exec. If unfiltered user input reaches these APIs, you don t need to take a look at HTTP response to know that there is a vulnerability the user is in fact directly
9 manipulating these security sensitive APIs. For previously impossible to detect vulnerabilities, we propose the same put the monitors directly on the relevant API call. For example to detect vulnerabilities such as logging credit card numbers to a log file, we will put monitors directly on the file writing APIs. If what is being written to a file using that API contains credit card numbers, then we flag it as an vulnerability. What should the monitors do? Once the monitors are in place, all we need to do to get coverage information is to signal when the monitor s code is called. This can be as simple as logging the name/location of the monitor that was hit. To detect whether a vulnerability exists in the area monitored, the monitors need to do some real work, and this depends on the nature of vulnerability that you want to detect. Take the example of SQL Injection. A typical web scanner will send a single quote to attempt to generate an error in the application and look for error messages coming back in HTTP response. Instead, using injected monitors, we can examine the actual argument passed to the executequery API. If the sql statement being executed contains an odd number of single quotes, that means that the user s single quote reached into the sql statement without being validated. We can immediately determine that this is a SQL Injection vulnerability. While this is a very simple illustration of what monitors can do, it illustrates a very important point: it is much easier detecting vulnerabilities at the source rather than through the HTTP response. The main advantage here over the web scanner is the ability to look at the sql statement being executed. If the application has proper error handling mechanism or simply has an error page configured, most web scanners will fail to detect this SQL Injection vulnerability. On the other hand, the monitor will have no trouble determining the existence of this SQL Injection vulnerability. What about the kinds of vulnerabilities that web scanners simply cannot detect? What should the monitors do to detect these kinds of vulnerabilities? Let s take a concrete example say that we want to detect instances of privacy violations where credit card numbers are being logged to a file. Since logging a credit card number has no manifestation in the HTTP response
10 stream, there is no chance web scanners can find this vulnerability. The monitor, on the other hand, simply needs to run a regular expression on the argument to a file write API to see whether a credit card number is being written to a log file. Similar to SQL Injection case, the monitor s task is to examine the content of the argument to the API and compare it against its ruleset. Proof Of Concept In order to demonstrate this concept, we will go through an actual example. The following is an example of a simple SQL Injection monitor: aspect SQLInjection { pointcut sqlexec(string sql): call(resultset Statement.executeQuery(String)) && args(sql); before(string sql) : sqlexec(sql) { checkinjection(sql, thisjoinpoint.getsignature()); void checkinjection(string sql, Signature sig){ if(config.isinignoremode()){ return; // If there is an odd # of single quotes if (sql.split( ).length % 2 == 0) { System.out.println( SQL Injection exists!!! ); The above SQL Injection aspect does a very simple check if the sql statement about to be executed has an odd number of single quote, flag it as a SQL Injection vulnerability. The
11 location of the monitor is at call(resultset Statement.executeQuery(String)). Right before executequery method is called, call the checkinjection code that looks for SQL injection vulnerability. To find all input areas to a web application, we have the following aspect: aspect CoverageWebSource { pointcut coverageservletrequest() : call(string ServletRequest+.getParameter(..)) call(enumeration ServletRequest+.getParameterNames(..)) call(string[] ServletRequest+.getParameterValues(..)) call(map ServletRequest+.getParameterMap(..)); /*struts*/ //ActionForm pointcut coverageactionform() : call(* ActionForm+.get*(..)); before() : coverageservletrequest() coverageactionform() { System.out.println("HIT:" + filename + " " + thisjoinpoint.getsignature() + " " + thisjoinpoint.getsourcelocation().getline(); The above aspect is for illustrative purposes we should ideally exhaustively put all known APIs to read web input into the above aspect file. For this proof of concept, we took a simple struts based application called SPLC. When we applied our CoverageWebSource aspect to the sample application, it yielded 45 web input sources. When we ran one of the two most popular web scanners, we were immediately able to tell that it only hit 28 of the web input sources about 62%. Furthermore, it has missed to identify a SQL Injection vulnerability in the application that the monitors had detected. When
12 we went back into the application and disabled a default error page in the web.xml file of the application, the web scanner was able to find 5 SQL Injection vulnerabilities in the same application. Conclusion While penetration testing has become a popular approach to testing applications for security vulnerabilities, it has significant shortcomings that need to be addressed. Due to the black box nature of these tests, not only do web scanners have difficulties reaching all areas of the application but also fail to report any information that aids the users find this flaw. In the areas that these tests actually reached, they often failed to identify key vulnerabilities. Using bytecode injection, users now can gain visibility into the coverage of these web scanners as well as detect vulnerabilities that these web scanners have previously failed to uncover. Running a web scanner and testing a running application is a crucial step but it needs to be augmented with insight into the running application and its code.
Automating Security Testing. Mark Fallon Senior Release Manager Oracle
Automating Security Testing Mark Fallon Senior Release Manager Oracle Some Ground Rules There are no silver bullets You can not test security into a product Testing however, can help discover a large percentage
Host Discovery with nmap
Host Discovery with nmap By: Mark Wolfgang [email protected] November 2002 Table of Contents Host Discovery with nmap... 1 1. Introduction... 3 1.1 What is Host Discovery?... 4 2. Exploring nmap s Default
Web application security: automated scanning versus manual penetration testing.
Web application security White paper January 2008 Web application security: automated scanning versus manual penetration testing. Danny Allan, strategic research analyst, IBM Software Group Page 2 Contents
Security and Vulnerability Testing How critical it is?
Security and Vulnerability Testing How critical it is? It begins and ends with your willingness and drive to change the way you perform testing today Security and Vulnerability Testing - Challenges and
THE 2014 THREAT DETECTION CHECKLIST. Six ways to tell a criminal from a customer.
THE 2014 THREAT DETECTION CHECKLIST Six ways to tell a criminal from a customer. Telling criminals from customers online isn t getting any easier. Attackers target the entire online user lifecycle from
IMPROVING VULNERABILITY MANAGEMENT EFFECTIVENESS WITH APPLICATION SECURITY MONITORING
IMPROVING VULNERABILITY MANAGEMENT EFFECTIVENESS WITH APPLICATION SECURITY How runtime application security monitoring helps enterprises make smarter decisions on remediation 2 ABSTRACT Enterprises today
Web Application Security
Chapter 1 Web Application Security In this chapter: OWASP Top 10..........................................................2 General Principles to Live By.............................................. 4
Comparing the Effectiveness of Penetration Testing and Static Code Analysis
Comparing the Effectiveness of Penetration Testing and Static Code Analysis Detection of SQL Injection Vulnerabilities in Web Services PRDC 2009 Nuno Antunes, [email protected], [email protected] University
Testing Web Applications for SQL Injection Sam Shober [email protected]
Testing Web Applications for SQL Injection Sam Shober [email protected] Abstract: This paper discusses the SQL injection vulnerability, its impact on web applications, methods for pre-deployment and
HackMiami Web Application Scanner 2013 PwnOff
HackMiami Web Application Scanner 2013 PwnOff An Analysis of Automated Web Application Scanning Suites James Ball, Alexander Heid, Rod Soto http://www.hackmiami.org Overview Web application scanning suites
Secure in 2010? Broken in 2011!
Secure in 2010? Broken in 2011! Matias Madou Principal Security Researcher Abstract In 2010, a security research firm stumbled on a couple of vulnerabilities in Apache OFBiz, a widely used open source
The Web AppSec How-to: The Defenders Toolbox
The Web AppSec How-to: The Defenders Toolbox Web application security has made headline news in the past few years. Incidents such as the targeting of specific sites as a channel to distribute malware
STABLE & SECURE BANK lab writeup. Page 1 of 21
STABLE & SECURE BANK lab writeup 1 of 21 Penetrating an imaginary bank through real present-date security vulnerabilities PENTESTIT, a Russian Information Security company has launched its new, eighth
Secrets of Vulnerability Scanning: Nessus, Nmap and More. Ron Bowes - Researcher, Tenable Network Security
Secrets of Vulnerability Scanning: Nessus, Nmap and More Ron Bowes - Researcher, Tenable Network Security 1 About me Ron Bowes (@iagox86) My affiliations (note: I m here to educate, not sell) 2 SkullSpace
How To Choose the Right Vendor Information you need to select the IT Security Testing vendor that is right for you.
Information you need to select the IT Security Testing vendor that is right for you. Netragard, Inc Main: 617-934- 0269 Email: [email protected] Website: http://www.netragard.com Blog: http://pentest.netragard.com
CS 558 Internet Systems and Technologies
CS 558 Internet Systems and Technologies Dimitris Deyannis [email protected] 881 Heat seeking Honeypots: Design and Experience Abstract Compromised Web servers are used to perform many malicious activities.
Comparing Application Security Tools
Comparing Application Security Tools Defcon 15-8/3/2007 Eddie Lee Fortify Software Agenda Intro to experiment Methodology to reproduce experiment on your own Results from my experiment Conclusions Introduction
FIREWALLS & NETWORK SECURITY with Intrusion Detection and VPNs, 2 nd ed. Chapter 4 Finding Network Vulnerabilities
FIREWALLS & NETWORK SECURITY with Intrusion Detection and VPNs, 2 nd ed. Chapter 4 Finding Network Vulnerabilities Learning Objectives Name the common categories of vulnerabilities Discuss common system
Application Code Development Standards
Application Code Development Standards Overview This document is intended to provide guidance to campus system owners and software developers regarding secure software engineering practices. These standards
WHITEPAPER. Nessus Exploit Integration
Nessus Exploit Integration v2 Tenable Network Security has committed to providing context around vulnerabilities, and correlating them to other sources, such as available exploits. We currently pull information
A very short history of networking
A New vision for network architecture David Clark M.I.T. Laboratory for Computer Science September, 2002 V3.0 Abstract This is a proposal for a long-term program in network research, consistent with the
Detecting Web Application Vulnerabilities Using Open Source Means. OWASP 3rd Free / Libre / Open Source Software (FLOSS) Conference 27/5/2008
Detecting Web Application Vulnerabilities Using Open Source Means OWASP 3rd Free / Libre / Open Source Software (FLOSS) Conference 27/5/2008 Kostas Papapanagiotou Committee Member OWASP Greek Chapter [email protected]
Vulnerability management lifecycle: defining vulnerability management
Framework for building a vulnerability management lifecycle program http://searchsecurity.techtarget.com/magazinecontent/framework-for-building-avulnerability-management-lifecycle-program August 2011 By
Make a folder named Lab3. We will be using Unix redirection commands to create several output files in that folder.
CMSC 355 Lab 3 : Penetration Testing Tools Due: September 31, 2010 In the previous lab, we used some basic system administration tools to figure out which programs where running on a system and which files
Automatic vs. Manual Code Analysis
Automatic vs. Manual Code Analysis 2009-11-17 Ari Kesäniemi Senior Security Architect Nixu Oy [email protected] Copyright The Foundation Permission is granted to copy, distribute and/or modify this
Interactive Application Security Testing (IAST)
WHITEPAPER Interactive Application Security Testing (IAST) The World s Fastest Application Security Software Software affects virtually every aspect of an individual s finances, safety, government, communication,
WEB SECURITY CONCERNS THAT WEB VULNERABILITY SCANNING CAN IDENTIFY
WEB SECURITY CONCERNS THAT WEB VULNERABILITY SCANNING CAN IDENTIFY www.alliancetechpartners.com WEB SECURITY CONCERNS THAT WEB VULNERABILITY SCANNING CAN IDENTIFY More than 70% of all websites have vulnerabilities
Secure in 2010? Broken in 2011! Matias Madou, PhD Principal Security Researcher
Secure in 2010? Broken in 2011! Matias Madou, PhD Principal Security Researcher Matias Madou Principal Security Researcher, Fortify an HP Company Static Analysis Rules Insider Threat Research Runtime products:
DISCOVERY OF WEB-APPLICATION VULNERABILITIES USING FUZZING TECHNIQUES
DISCOVERY OF WEB-APPLICATION VULNERABILITIES USING FUZZING TECHNIQUES By Michael Crouse Dr. Errin W. Fulp, Ph.D., Advisor Abstract The increasingly high volume of users on the web and their use of web
SEO - Access Logs After Excel Fails...
Server Logs After Excel Fails @ohgm Prepare for walls of text. About Me Former Senior Technical Consultant @ builtvisible. Now Freelance Technical SEO Consultant. @ohgm on Twitter. ohgm.co.uk for my webzone.
Firewall Cracking and Security By: Lukasz Majowicz Dr. Stefan Robila 12/15/08
Firewall Cracking and Security By: Lukasz Majowicz Dr. Stefan Robila 12/15/08 What is a firewall? Firewalls are programs that were designed to protect computers from unwanted attacks and intrusions. Wikipedia
FINAL DoIT 11.03.2015 - v.4 PAYMENT CARD INDUSTRY DATA SECURITY STANDARDS APPLICATION DEVELOPMENT AND MAINTENANCE PROCEDURES
Purpose: The Department of Information Technology (DoIT) is committed to developing secure applications. DoIT s System Development Methodology (SDM) and Application Development requirements ensure that
Iron Chef: John Henry Challenge
Iron Chef: John Henry Challenge Brian Chess Pravir Chandra Black Hat 3/27/2008 Amsterdam Sean Fay Jacob West Concept We love Iron Chef. We can t cook. Concept Compare tools and manual code review in head-tohead
Redhawk Network Security, LLC 62958 Layton Ave., Suite One, Bend, OR 97701 [email protected] 866-605- 6328 www.redhawksecurity.
Planning Guide for Penetration Testing John Pelley, CISSP, ISSAP, MBCI Long seen as a Payment Card Industry (PCI) best practice, penetration testing has become a requirement for PCI 3.1 effective July
Seven Practical Steps to Delivering More Secure Software. January 2011
Seven Practical Steps to Delivering More Secure Software January 2011 Table of Contents Actions You Can Take Today 3 Delivering More Secure Code: The Seven Steps 4 Step 1: Quick Evaluation and Plan 5 Step
Outline. Outline. Outline
Network Forensics: Network Prefix Scott Hand September 30 th, 2011 1 What is network forensics? 2 What areas will we focus on today? Basics Some Techniques What is it? OS fingerprinting aims to gather
Evading Infrastructure Security Mohamed Bedewi Penetration Testing Consultant
Evading Infrastructure Security Mohamed Bedewi Penetration Testing Consultant What infrastructure security really means? Infrastructure Security is Making sure that your system services are always running
Penetration Testing. Types Black Box. Methods Automated Manual Hybrid. oless productive, more difficult White Box
Penetration Testing Penetration Testing Types Black Box oless productive, more difficult White Box oopen, team supported, typically internal osource available Gray Box (Grey Box) omixture of the two Methods
3. Broken Account and Session Management. 4. Cross-Site Scripting (XSS) Flaws. Web browsers execute code sent from websites. Account Management
What is an? s Ten Most Critical Web Application Security Vulnerabilities Anthony LAI, CISSP, CISA Chapter Leader (Hong Kong) [email protected] Open Web Application Security Project http://www.owasp.org
Recon and Mapping Tools and Exploitation Tools in SamuraiWTF Report section Nick Robbins
Recon and Mapping Tools and Exploitation Tools in SamuraiWTF Report section Nick Robbins During initial stages of penetration testing it is essential to build a strong information foundation before you
Guidelines for Web applications protection with dedicated Web Application Firewall
Guidelines for Web applications protection with dedicated Web Application Firewall Prepared by: dr inŝ. Mariusz Stawowski, CISSP Bartosz Kryński, Imperva Certified Security Engineer INTRODUCTION Security
METHODS TO TEST WEB APPLICATION SCANNERS
METHODS TO TEST WEB APPLICATION SCANNERS Fernando Román Muñoz, Luis Javier García Villalba Group of Analysis, Security and Systems (GASS) Department of Software Engineering and Artificial Intelligence
Multi Factor Authentication API
GEORGIA INSTITUTE OF TECHNOLOGY Multi Factor Authentication API Yusuf Nadir Saghar Amay Singhal CONTENTS Abstract... 3 Motivation... 3 Overall Design:... 4 MFA Architecture... 5 Authentication Workflow...
A framework for creating custom rules for static analysis tools
A framework for creating custom rules for static analysis tools Eric Dalci John Steven Cigital Inc. 21351 Ridgetop Circle, Suite 400 Dulles VA 20166 (703) 404-9293 edalci,[email protected] Abstract Code
Agile speech analytics: a simple and effective way to use speech analytics in contact centres
Agile speech analytics: a simple and effective way to use speech analytics in contact centres Whitepaper Contact centres have successfully used speech analytics to help reduce avoidable calls, improve
Detecting SQL Injection Vulnerabilities in Web Services
Detecting SQL Injection Vulnerabilities in Web Services Nuno Antunes, {nmsa, mvieira}@dei.uc.pt LADC 2009 CISUC Department of Informatics Engineering University of Coimbra Outline n Web Services n Web
Application Security Testing
Tstsec - Version: 1 09 July 2016 Application Security Testing Application Security Testing Tstsec - Version: 1 4 days Course Description: We are living in a world of data and communication, in which the
Evaluation of Penetration Testing Software. Research
Evaluation of Penetration Testing Software Research Penetration testing is an evaluation of system security by simulating a malicious attack, which, at the most fundamental level, consists of an intellectual
Securing Your Web Application against security vulnerabilities. Ong Khai Wei, IT Specialist, Development Tools (Rational) IBM Software Group
Securing Your Web Application against security vulnerabilities Ong Khai Wei, IT Specialist, Development Tools (Rational) IBM Software Group Agenda Security Landscape Vulnerability Analysis Automated Vulnerability
Braindumps.C2150-810.50 questions
Braindumps.C2150-810.50 questions Number: C2150-810 Passing Score: 800 Time Limit: 120 min File Version: 5.3 http://www.gratisexam.com/ -810 IBM Security AppScan Source Edition Implementation This is the
Using Nessus In Web Application Vulnerability Assessments
Using Nessus In Web Application Vulnerability Assessments Paul Asadoorian Product Evangelist Tenable Network Security [email protected] About Tenable Nessus vulnerability scanner, ProfessionalFeed
HP WebInspect Tutorial
HP WebInspect Tutorial Introduction: With the exponential increase in internet usage, companies around the world are now obsessed about having a web application of their own which would provide all the
About Effective Penetration Testing Methodology
보안공학연구논문지 (Journal of Security Engineering), 제 5권 제 5호 2008년 10월 About Effective Penetration Testing Methodology Byeong-Ho KANG 1) Abstract Penetration testing is one of the oldest methods for assessing
B database Security - A Case Study
WHITE PAPER: ENTERPRISE SECURITY Strengthening Database Security White Paper: Enterprise Security Strengthening Database Security Contents Introduction........................................................................4
SAST, DAST and Vulnerability Assessments, 1+1+1 = 4
SAST, DAST and Vulnerability Assessments, 1+1+1 = 4 Gordon MacKay Digital Defense, Inc. Chris Wysopal Veracode Session ID: Session Classification: ASEC-W25 Intermediate AGENDA Risk Management Challenges
INTRUSION DECEPTION CZYLI BAW SIĘ W CIUCIUBABKĘ Z NAMI
INTRUSION DECEPTION CZYLI BAW SIĘ W CIUCIUBABKĘ Z NAMI Na przykładzie Junos WebApp Secure Edmund Asare INCONVENIENT STATISTICS 70% of ALL threats are at the Web application layer. Gartner 73% of organizations
Lifecycle Vulnerability Management and Continuous Monitoring with Rapid7 Nexpose
Lifecycle Vulnerability Management and Continuous Monitoring with Rapid7 Nexpose SPONSORED BY WhatWorks is a user-to-user program in which security managers who have implemented effective Internet security
Mobile Application Security Study
Report Mobile Application Security Study 2013 report Table of contents 3 Report Findings 4 Research Findings 4 Privacy Issues 5 Lack of Binary Protection 5 Insecure Data Storage 5 Transport Security 6
Developing A Successful Patch Management Process
Developing A Successful Patch Management Process White Paper FoxGuard Solutions, Inc. August 2014 Introduction Almost every day, new vulnerabilities are discovered and disclosed to software vendors, who
WHITE PAPER. FortiWeb and the OWASP Top 10 Mitigating the most dangerous application security threats
WHITE PAPER FortiWeb and the OWASP Top 10 PAGE 2 Introduction The Open Web Application Security project (OWASP) Top Ten provides a powerful awareness document for web application security. The OWASP Top
Is Drupal secure? A high-level perspective on web vulnerabilities, Drupal s solutions, and how to maintain site security
Is Drupal secure? A high-level perspective on web vulnerabilities, Drupal s solutions, and how to maintain site security Presented 2009-05-29 by David Strauss Thinking Securely Security is a process, not
PCI-DSS Penetration Testing
PCI-DSS Penetration Testing Adam Goslin, Co-Founder High Bit Security May 10, 2011 About High Bit Security High Bit helps companies obtain or maintain their PCI compliance (Level 1 through Level 4 compliance)
Analysis of SQL injection prevention using a proxy server
Computer Science Honours 2005 Project Proposal Analysis of SQL injection prevention using a proxy server By David Rowe Supervisor: Barry Irwin Department of Computer
Exploiting Transparent User Identification Systems
Exploiting Transparent User Identification Systems Wayne Murphy Benjamin Burns Version 1.0a 1 CONTENTS 1.0 Introduction... 3 1.1 Project Objectives... 3 2.0 Brief Summary of Findings... 4 3.0 Background
SERENA SOFTWARE Serena Service Manager Security
SERENA SOFTWARE Serena Service Manager Security 2014-09-08 Table of Contents Who Should Read This Paper?... 3 Overview... 3 Security Aspects... 3 Reference... 6 2 Serena Software Operational Security (On-Demand
elearning for Secure Application Development
elearning for Secure Application Development Curriculum Application Security Awareness Series 1-2 Secure Software Development Series 2-8 Secure Architectures and Threat Modeling Series 9 Application Security
Real-time hybrid analysis:
Real-time hybrid : Find more, fix faster Technology white paper Brian Chess, Ph.D., Distinguished Technologist, HP Founder and Chief Scientist, HP Fortify Summary Real-time hybrid marks a substantial evolution
Network- vs. Host-based Intrusion Detection
Network- vs. Host-based Intrusion Detection A Guide to Intrusion Detection Technology 6600 Peachtree-Dunwoody Road 300 Embassy Row Atlanta, GA 30348 Tel: 678.443.6000 Toll-free: 800.776.2362 Fax: 678.443.6477
Project 2: Penetration Testing (Phase II)
Project 2: Penetration Testing (Phase II) CS 161 - Joseph/Tygar November 17, 2006 1 Edits If we need to make clarifications or corrections to this document after distributing it, we will post a new version
How to Avoid an Attack - Security Testing as Part of Your Software Testing Process
How to Avoid an Attack - Security Testing as Part of Your Software Testing Process Recent events in the field of information security, which have been publicized extensively in the media - such as the
Wikto how does it work and how do I use it?
Wikto how does it work and how do I use it? Introduction This document describes how to use Wikto to quickly and easily perform web server assessments. Before we start we need to know what Wikto does and
Making Database Security an IT Security Priority
Sponsored by Oracle Making Database Security an IT Security Priority A SANS Whitepaper November 2009 Written by Tanya Baccam Security Strategy Overview Why a Database Security Strategy? Making Databases
Certification Report
Certification Report EAL 2+ Evaluation of Symantec Endpoint Protection Version 12.1.2 Issued by: Communications Security Establishment Canada Certification Body Canadian Common Criteria Evaluation and
STOPPING LAYER 7 ATTACKS with F5 ASM. Sven Müller Security Solution Architect
STOPPING LAYER 7 ATTACKS with F5 ASM Sven Müller Security Solution Architect Agenda Who is targeted How do Layer 7 attacks look like How to protect against Layer 7 attacks Building a security policy Layer
Hacking the EULA: Reverse Benchmarking Web Application Security Scanners
Hacking the EULA: Reverse Benchmarking Web Application Security Scanners Overview Each year thousands of work hours are lost by security practitioners sorting through web application security reports separating
How to Instrument for Advanced Web Application Penetration Testing
How to Instrument for Advanced Web Application Penetration Testing Table of Contents 1 Foreword... 3 2 Problem... 4 3 Background... 4 3.1 Dynamic Application Security Testing (DAST)... 4 3.2 Static Application
VIDEO intypedia007en LESSON 7: WEB APPLICATION SECURITY - INTRODUCTION TO SQL INJECTION TECHNIQUES. AUTHOR: Chema Alonso
VIDEO intypedia007en LESSON 7: WEB APPLICATION SECURITY - INTRODUCTION TO SQL INJECTION TECHNIQUES AUTHOR: Chema Alonso Informática 64. Microsoft MVP Enterprise Security Hello and welcome to Intypedia.
How to Get from Scans to a Vulnerability Management Program
How to Get from Scans to a Vulnerability Management Program Gary McCully Any views or opinions presented are solely those of the author and do not necessarily represent those of SecureState LLC. Synopsis
Security Testing. Vulnerability Assessment vs Penetration Testing. Gabriel Mihai Tanase, Director KPMG Romania. 29 October 2014
Security Testing Vulnerability Assessment vs Penetration Testing Gabriel Mihai Tanase, Director KPMG Romania 29 October 2014 Agenda What is? Vulnerability Assessment Penetration Testing Acting as Conclusion
Internet Security and Acceleration Server 2000 with Service Pack 1 Audit. An analysis by Foundstone, Inc.
Internet Security and Acceleration Server 2000 with Service Pack 1 Audit An analysis by Foundstone, Inc. Internet Security and Acceleration Server 2000 with Service Pack 1 Audit This paper presents an
Manipulating Microsoft SQL Server Using SQL Injection
Manipulating Microsoft SQL Server Using SQL Injection Author: Cesar Cerrudo ([email protected]) APPLICATION SECURITY, INC. WEB: E-MAIL: [email protected] TEL: 1-866-9APPSEC 1-212-947-8787 INTRODUCTION
PCI-DSS and Application Security Achieving PCI DSS Compliance with Seeker
PCI-DSS and Application Security Achieving PCI DSS Compliance with Seeker www.quotium.com 1/14 Summary Abstract 3 PCI DSS Statistics 4 PCI DSS Application Security 5 How Seeker Helps You Achieve PCI DSS
Six Signs. you are ready for BI WHITE PAPER
Six Signs you are ready for BI WHITE PAPER LET S TAKE A LOOK AT THE WAY YOU MIGHT BE MONITORING AND MEASURING YOUR COMPANY About the auther You re managing information from a number of different data sources.
How Your Current IT Security System Might Be Leaving You Exposed TAKEAWAYS CHALLENGES WHITE PAPER
WHITE PAPER CHALLENGES Protecting company systems and data from costly hacker intrusions Finding tools and training to affordably and effectively enhance IT security Building More Secure Companies (and
CUSTOMERS & CRIMINALS: USE WEB SESSION INTELLIGENCE TO DETECT WHO IS WHO ONLINE
CUSTOMERS & CRIMINALS: USE WEB SESSION INTELLIGENCE TO DETECT WHO IS WHO ONLINE Jason Sloderbeck Silver Tail Systems, Part of RSA Session ID: SPO1-W22 Session Classification: General Track Question Do
Web Application Penetration Testing
Web Application Penetration Testing 2010 2010 AT&T Intellectual Property. All rights reserved. AT&T and the AT&T logo are trademarks of AT&T Intellectual Property. Will Bechtel [email protected]
Lecture 9 Chrome Extensions
Lecture 9 Chrome Extensions 1 / 22 Agenda 1. Chrome Extensions 1. Manifest files 2. Content Scripts 3. Background Pages 4. Page Actions 5. Browser Actions 2 / 22 Chrome Extensions 3 / 22 What are browser
Passing PCI Compliance How to Address the Application Security Mandates
Passing PCI Compliance How to Address the Application Security Mandates The Payment Card Industry Data Security Standards includes several requirements that mandate security at the application layer. These
