Greater Than One. Defeating strong authentication in web applications. - Brendan O Connor
|
|
|
- Ada Richards
- 10 years ago
- Views:
Transcription
1 Greater Than One Defeating strong authentication in web applications - Brendan O Connor
2 Introduction Background Information Control Types Device Fingerprinting One Time Passwords Knowledge Base Archives Conclusions
3 Introduction Internet Banking Bill Pay Car Loans and Mortgages Retirement Plans / 401K Stock Trading / Investments
4 Background Federal Financial Institution Examination Council Authentication in an Internet Banking Environment The agencies consider single-factor authentication, as the only control mechanism, to be inadequate for high-risk transactions involving access to customer information or the movement of funds to other parties... Account fraud and identity theft are frequently the result of single-factor (e.g., ID/password) authentication exploitation. source:
5 Background Access to customer information or movement of funds read: pretty much every screen in an Internet Banking application Does not mandate 2 factor authentication says that single factor is insufficient (greater than one) Hardware tokens are expensive and easily lost or broken Biometrics for the end user are out of the question
6 Control Types Mutual Authentication Device Fingerprinting Out of Band Authentication One Time Passwords Knowledge Base Archives
7 Control Types Mutual Auth This is not device based Mutual Auth Site to user authentication Device Fingerprinting Persistent cookies Information from HTTP headers Device Interrogation
8 Control Types Out of Band Auth Not true OOB Auth Only delivery is Out of Band. Authentication still happens within HTTP session delivery, SMS message to cell phone, Phone call that reads you a PIN
9 Control Types One Time Passwords Dynamic single use password or PIN (generally delivered via OOB method) Static pre-issued One Time Pads Not to be confused with algorithmic token based auth (such as RSA SecurID )
10 Control Types Knowledge Base Archives (KBAs) Questions based on information gleaned from public records databases In 2002 did you buy: 1. Honda Accord 2. Toyota Camry 3. Ford Taurus 4. None of the Above
11 Control Types Bolt On vs. Built In Enhanced authentication is usually a third party product integrated into existing application Increased attack surface Standard authentication process must be interrupted Exploit architectural weaknesses
12 Authentication Architecture Simple Request/Response Authentication 1. Post username/password 2. Database lookup 3. Return 1 or 0 4. Invalid username or password
13 Device Fingerprinting Hybrid Approach Picture/phrase based mutual auth OTP or challenge questions required if device is not recognized Persistent cookie set after passing auth criteria Request Analysis Single server or multiple server authentication
14 Device Fingerprinting Request Flow 1. Push auth to new system 2. Valid user? 3. Match auth criteria? (cookie, fprint) 4. Challenge questions/otp 5. Success Resume authentication 6. Logged In
15 Authentication Flow Post username (and cookie if exists) Challenge for device fingerprint Post Fingerprint (if no cookie) New Authentication challenge Answer challenge Old login
16 Device Fingerprinting How are 2 different servers with different SSL sessions keeping state? Analyze Post body What are they trying to do? How are they doing it? Dissecting parameters and values
17
18
19 Device Fingerprinting - Analysis pm_fpua = mozilla/5.0 (windows; u; windows nt 5.1; en-us; rv: ) gecko/ firefox/ (Windows; en-us) Win32 pm_fpsc = pm_fpsw = def pdf swf qt6 qt5 qt4 qt3 qt2 qt1 j11 j12 j13 j14 j32 wpm drn drm pm_fptz = -4 pm_fpln = lang=en-us syslang= userlang= pm_fpjv = 1 pm_fpco = 1
20 Device Fingerprinting - Analysis auth_devicesignature "appcodename":"mozilla", "appname":"microsoft Internet Explorer","appMinorVersion":"0", "cpuclass":"x86","platform":"win32","systemlanguage":"en-us", "userlanguage":"en-us", "appversion":"4.0 (compatible; MSIE 7.0;..UA Stuff..)", "useragent":"mozilla/4.0 (compatible;..more UA Stuff..)", "plugins":[{"name":"adobe Acrobat Plugin","version":"1"}, {"name":"quicktime Plug-in","version":".."}, {"name":"windows Media Player Plug-in Dynamic Link Library","version":""}, {"name":"macromedia Shockwave Flash","version":"8"}, {"name":"java Virtual Machine","version":""}], "screen":{"availheight":990,"availwidth":1251,"colordepth":32,"height":1024," width":1280},
21 Device Fingerprinting - Analysis The application is trying to gather information specific to your device to form a fingerprint How can their web server interrogate you device? Javascript of course! Reverse Engineering isn t hard when you have source code
22 Device Fingerprinting - Analysis /* This function captures the User Agent String from the Client Browser */ function fingerprint_browser () { /* This function captures the Client's Screen Information */ function fingerprint_display () { That wasn t too hard
23 Device Fingerprinting Failing Device Fingerprinting Challenge questions One time password Out of band delivery Session ID is not enforced (usually) Successful Authentication Picture and pass phrase for mutual auth Persistent cookie is set (Are you using a private or public computer?)
24 Device Fingerprinting - Attack Fuzz fingerprinting parameters Determine failure thresholds Site specific IP lookup Challenge Questions Lack of randomization Q1, Q2, Q3, Q1 Trivial to enumerate valid usernames
25 Device Fingerprinting - Attack Multiple servers and redirects The client keeps state You are the client Systems that use a single session Out of state requests are possible Force an OTP to be sent Force challenge questions
26 Device Fingerprinting - Attack Mutual Authentication Picture and Passphrase Servers mask Get request through GUIDs or Stream Ciphers How can we defeat this? 1. IV Collision (exhaustive requests) 2. MitM On the Fly replacement 3. Clear text Alt tags
27 Device Fingerprinting - Attack All Implementations of this System have the same Alt tag for each unique image. Shared catalog of images Having access to any one app using this system allows you to mirror the image catalog No need to attack the app s dynamic link function
28 Device Fingerprinting Measure Up Designed to Combat Phishing Transaction Fraud Identity Theft
29 Device Fingerprinting Phishing Phishing is targeted at a specific organization Attacker can simply copy the fingerprinting Jscript from target site As long as username is correct, failing fprint will present challenge questions Attacker gets answer, and the questions are not random
30 Device Fingerprinting Phishing Spear-phishing easier than ever Valid account names can be enumerated Device fingerprint can be brute forced What are the chances valid account names are used for ? etc.) A phishing including a user s security image and passphrase has a greater chance of success
31 Device Fingerprinting - Fraud Does absolutely nothing to stop Fraud Inheritance trust model still applies Once authenticated, all transactions are valid Identity Theft Datamasking (account #*******1234) Check Images > just an account number E-Statements or Tax forms
32 One Time Passwords Covered some of this already Only delivery is out of band Hardware and Soft tokens If the app isn t enforcing all phases within a single session, same issues apply Long or non-existent TTLs OTPs are most effective when required for every login
33 One Time Passwords Can be Man in the Middle d or SMS delivery sets a pattern for the user XSRF is possible in conjunction with a phishing site
34 One Time Passwords Measure Up Better than fingerprinting because its more difficult to be transparent Trains the user to trust more Clicking links Using for security purposes Does nothing to combat Fraud or Identity Theft Inheritance trust model still applies
35 Knowledge Base Archives Not nearly as common (but out there) Used in conjunction with persistent cookie (usually) By definition, public records are used Skip this question option Randomization works in our favor Multiple requests from multiple sessions Pattern analysis
36 Knowledge Base Archives In 2002 did you buy 1. Honda Accord 2. Toyota Camry 3. Ford Taurus 4. None of the Above In 2002 did you buy 1. Nissan Sentra 2. Chevy Cavalier 3. Ford Taurus 4. None of the Above
37 Knowledge Base Archives Less effective than challenge questions Can be defeated through response analysis with zero prior knowledge Same shortcomings as other solutions Doesn t stop phishing Doesn t stop transaction fraud May make Identity Theft easier
38 Is There a Better Way? Mutual Auth Responses must always be given Same response must always be given for same authentication criteria Auth should be algorithmic Challenge Questions Still single factor Replacing something the user knows with 2 things the user knows Flawed by design users can pick simple questions with simple answers
39 Is There a Better Way? Device Fingerprinting Current implementations can be bypassed or replicated with ease Replacing something the user knows with something the computer knows Forgiving thresholds and persistent cookies aren t buying us anything
40 Is There a Better Way? Stop fingerprinting devices, start fingerprinting behaviors True transaction based behavior analysis and anomaly detection HTTP header information!= behavioral analysis Hurdles for secure implementation Sheer volume of data Bolt On vs. Built In this needs to be built into the application itself
41 Is There a Better Way? Use a Positive Authentication Model New transactions should require strong auth Use hash values of transactions to prevent tampering Trojans and BHOs that target specific institutions are not uncommon Sit and Wait on the fly transaction replacement by malware is in the wild Force the user to review and verify login events and transactions Make the user be involved in the security of their account
42 Is There a Better Way? Hardware tokens have a good security record If the company doesn t want to pay, let the user opt-in and share the cost
43 Conclusions Why did I do this? Traditional attack vectors are still a threat This does not address any other vulnerability types, which are still an issue If XSS exists, these controls are generally worthless (persistent cookie) Browser based vulnerabilities are still a problem Putting controls in the wrong place too much attack surface
44 Conclusions Financial Industry Problems If a customer loses their checkbook or credit card, the FI picks up the tab Who pays for online fraud due to phishing or malware? Lose/Lose Company Free online services may go away (Risk vs Reward) Customer Stop using online systems, because they re covered in the physical world
45 Conclusions The Cycle People complain about phishing, fraud, and ID theft Government regulates and legislates Private sector implements technology that satisfies legal requirements but does not address the real problem Attackers adapt Rinse, Repeat
46 Conclusions Why we re worse off False sense of security to end user Taking a step backwards in some cases Most technologies being deployed aren t addressing the real problem App vendors need to build it in, not bolt it on Security products should reduce attack surface, not increase it
47 Thank You
Where every interaction matters.
Where every interaction matters. Peer 1 Vigilant Web Application Firewall Powered by Alert Logic The Open Web Application Security Project (OWASP) Top Ten Web Security Risks and Countermeasures White Paper
Security Evaluation CLX.Sentinel
Security Evaluation CLX.Sentinel October 15th, 2009 Walter Sprenger [email protected] Compass Security AG Glärnischstrasse 7 Postfach 1628 CH-8640 Rapperswil Tel.+41 55-214 41 60 Fax+41 55-214 41
Layered security in authentication. An effective defense against Phishing and Pharming
1 Layered security in authentication. An effective defense against Phishing and Pharming The most widely used authentication method is the username and password. The advantages in usability for users offered
Protecting Online Customers from Man-inthe-Browser and Man-in-the-Middle Attacks
Protecting Online Customers from Man-inthe-Browser and Man-in-the-Middle Attacks Whitepaper W H I T E P A P E R OVERVIEW Arcot s unmatched authentication expertise and unique technology give organizations
Enhancing Web Application Security
Enhancing Web Application Security Using Another Authentication Factor Karen Lu and Asad Ali Gemalto, Inc. Technology & Innovations Austin, TX, USA Overview Introduction Current Statet Smart Cards Two-Factor
Two-Factor Authentication and Swivel
Two-Factor Authentication and Swivel Abstract This document looks at why the username and password are no longer sufficient for authentication and how the Swivel Secure authentication platform can provide
IDRBT Working Paper No. 11 Authentication factors for Internet banking
IDRBT Working Paper No. 11 Authentication factors for Internet banking M V N K Prasad and S Ganesh Kumar ABSTRACT The all pervasive and continued growth being provided by technology coupled with the increased
XYPRO Technology Brief: Stronger User Security with Device-centric Authentication
Ken Scudder Senior Director Business Development & Strategic Alliances XYPRO Technology Talbot A. Harty CEO DeviceAuthority XYPRO Technology Brief: Stronger User Security with Device-centric Authentication
Guide to Evaluating Multi-Factor Authentication Solutions
Guide to Evaluating Multi-Factor Authentication Solutions PhoneFactor, Inc. 7301 West 129th Street Overland Park, KS 66213 1-877-No-Token / 1-877-668-6536 www.phonefactor.com Guide to Evaluating Multi-Factor
Security+ Guide to Network Security Fundamentals, Fourth Edition. Chapter 10 Authentication and Account Management
Security+ Guide to Network Security Fundamentals, Fourth Edition Chapter 10 Authentication and Account Management Objectives Describe the three types of authentication credentials Explain what single sign-on
WEB SECURITY CONCERNS THAT WEB VULNERABILITY SCANNING CAN IDENTIFY
WEB SECURITY CONCERNS THAT WEB VULNERABILITY SCANNING CAN IDENTIFY www.alliancetechpartners.com WEB SECURITY CONCERNS THAT WEB VULNERABILITY SCANNING CAN IDENTIFY More than 70% of all websites have vulnerabilities
New Brunswick Internal Services Agency. RSA Self-Service Console User Guide
New Brunswick Internal Services Agency RSA Self-Service Console User Guide Version: 1.0 Created: November 27, 2013 Modified: November 27, 2013 Table of Contents Introduction...1 Logging on to the RSA Self-Service
Stop Identity Theft. with Transparent Two-Factor Authentication. e-lock Corporation Sdn Bhd
Stop Identity Theft with Transparent Two-Factor Authentication e-lock Corporation Sdn Bhd December 2009 Table Of Content Table Of Content... 2 Executive Summary... 3 1. Introduction... 4 1.1 The Issue
How CA Arcot Solutions Protect Against Internet Threats
TECHNOLOGY BRIEF How CA Arcot Solutions Protect Against Internet Threats How CA Arcot Solutions Protect Against Internet Threats we can table of contents executive summary 3 SECTION 1: CA ArcotID Security
Load balancing Microsoft IAG
Load balancing Microsoft IAG Using ZXTM with Microsoft IAG (Intelligent Application Gateway) Server Zeus Technology Limited Zeus Technology UK: +44 (0)1223 525000 The Jeffreys Building 1955 Landings Drive
(WAPT) Web Application Penetration Testing
(WAPT) Web Application Penetration Testing Module 0: Introduction 1. Introduction to the course. 2. How to get most out of the course 3. Resources you will need for the course 4. What is WAPT? Module 1:
BEST SECURITY PRACTICES IN ONLINE BANKING PLATFORMS
BEST SECURITY PRACTICES IN ONLINE BANKING PLATFORMS TABLE OF CONTENTS BEST SECURITY PRACTICES Home banking platforms have been implemented as an ever more efficient 1 channel through for banking transactions.
KEYSTROKE DYNAMIC BIOMETRIC AUTHENTICATION FOR WEB PORTALS
KEYSTROKE DYNAMIC BIOMETRIC AUTHENTICATION FOR WEB PORTALS Plurilock Security Solutions Inc. www.plurilock.com [email protected] 2 H IGHLIGHTS: PluriPass is Plurilock static keystroke dynamic biometric
Security in an Increasingly Threatened World. SMS: A better way of doing Two Factor Authentication (2FA)
Security in an Increasingly Threatened World SMS: A better way of doing Two Factor Authentication (2FA) January 2015 The Proliferation of The App World The revolution of the smart phone forever affected
A Server and Browser-Transparent CSRF Defense for Web 2.0 Applications. Slides by Connor Schnaith
A Server and Browser-Transparent CSRF Defense for Web 2.0 Applications Slides by Connor Schnaith Cross-Site Request Forgery One-click attack, session riding Recorded since 2001 Fourth out of top 25 most
Web Application Hacking (Penetration Testing) 5-day Hands-On Course
Web Application Hacking (Penetration Testing) 5-day Hands-On Course Web Application Hacking (Penetration Testing) 5-day Hands-On Course Course Description Our web sites are under attack on a daily basis
White Paper Preventing Man in the Middle Phishing Attacks with Multi-Factor Authentication
White Paper Preventing Man in the Middle Phishing Attacks with Multi-Factor Authentication Page 1 of 8 Introduction As businesses and consumers grow increasingly reliant on the Internet for conducting
Apache Server Implementation Guide
Apache Server Implementation Guide 340 March Road Suite 600 Kanata, Ontario, Canada K2K 2E4 Tel: +1-613-599-2441 Fax: +1-613-599-2442 International Voice: +1-613-599-2441 North America Toll Free: 1-800-307-7042
Contents. Identity Assurance (Scott Rea Dartmouth College) IdM Workshop, Brisbane Australia, August 19, 2008
Identity Assurance (Scott Rea Dartmouth College) IdM Workshop, Brisbane Australia, August 19, 2008 Contents Authentication and Identity Assurance The Identity Assurance continuum Plain Password Authentication
Sichere Software- Entwicklung für Java Entwickler
Sichere Software- Entwicklung für Java Entwickler Dominik Schadow Senior Consultant Trivadis GmbH 05/09/2012 BASEL BERN LAUSANNE ZÜRICH DÜSSELDORF FRANKFURT A.M. FREIBURG I.BR. HAMBURG MÜNCHEN STUTTGART
Application Layer Encryption: Protecting against Application Logic and Session Theft Attacks. Whitepaper
Application Layer Encryption: Protecting against Application Logic and Session Theft Attacks Whitepaper The security industry has extensively focused on protecting against malicious injection attacks like
WHITE PAPER. FortiWeb and the OWASP Top 10 Mitigating the most dangerous application security threats
WHITE PAPER FortiWeb and the OWASP Top 10 PAGE 2 Introduction The Open Web Application Security project (OWASP) Top Ten provides a powerful awareness document for web application security. The OWASP Top
Internet Banking System Web Application Penetration Test Report
Internet Banking System Web Application Penetration Test Report Kiev - 2014 1. Executive Summary This report represents the results of the Bank (hereinafter the Client) Internet Banking Web Application
Using Foundstone CookieDigger to Analyze Web Session Management
Using Foundstone CookieDigger to Analyze Web Session Management Foundstone Professional Services May 2005 Web Session Management Managing web sessions has become a critical component of secure coding techniques.
Sitefinity Security and Best Practices
Sitefinity Security and Best Practices Table of Contents Overview The Ten Most Critical Web Application Security Risks Injection Cross-Site-Scripting (XSS) Broken Authentication and Session Management
A brief on Two-Factor Authentication
Application Note A brief on Two-Factor Authentication Summary This document provides a technology brief on two-factor authentication and how it is used on Netgear SSL312, VPN Firewall, and other UTM products.
State of The Art: Automated Black Box Web Application Vulnerability Testing. Jason Bau, Elie Bursztein, Divij Gupta, John Mitchell
Stanford Computer Security Lab State of The Art: Automated Black Box Web Application Vulnerability Testing, Elie Bursztein, Divij Gupta, John Mitchell Background Web Application Vulnerability Protection
Multi-Factor Authentication of Online Transactions
Multi-Factor Authentication of Online Transactions Shelli Wobken-Plagge May 7, 2009 Agenda How are economic and fraud trends evolving? What tools are available to secure online transactions? What are best
White Paper: Multi-Factor Authentication Platform
White Paper: Multi-Factor Authentication Platform Version: 1.4 Updated: 29/10/13 Contents: About zero knowledge proof authentication protocols: 3 About Pairing-Based Cryptography (PBC) 4 Putting it all
Enterprise Cybersecurity Best Practices Part Number MAN-00363 Revision 006
Enterprise Cybersecurity Best Practices Part Number MAN-00363 Revision 006 April 2013 Hologic and the Hologic Logo are trademarks or registered trademarks of Hologic, Inc. Microsoft, Active Directory,
SECURITY B-SIDES: ATLANTA STRATEGIC PENETRATION TESTING. Presented by: Dave Kennedy Eric Smith
SECURITY B-SIDES: ATLANTA STRATEGIC PENETRATION TESTING Presented by: Dave Kennedy Eric Smith AGENDA Penetration Testing by the masses Review of current state by most service providers Deficiencies in
FINAL DoIT 04.01.2013- v.8 APPLICATION SECURITY PROCEDURE
Purpose: This procedure identifies what is required to ensure the development of a secure application. Procedure: The five basic areas covered by this document include: Standards for Privacy and Security
How Secure is your Authentication Technology?
How Secure is your Authentication Technology? Compare the merits and vulnerabilities of 1.5 Factor Authentication technologies available on the market today White Paper Introduction A key feature of any
WHITE PAPER FORTIWEB WEB APPLICATION FIREWALL. Ensuring Compliance for PCI DSS 6.5 and 6.6
WHITE PAPER FORTIWEB WEB APPLICATION FIREWALL Ensuring Compliance for PCI DSS 6.5 and 6.6 CONTENTS 04 04 06 08 11 12 13 Overview Payment Card Industry Data Security Standard PCI Compliance for Web Applications
a. StarToken controls the loss due to you losing your Internet banking username and password.
1. What is StarToken? StarToken is the next generation Internet banking security solution that is being offered by Bank of India to all its Internet Banking customers (Retail as well as Corporate). StarToken
Business Banking Customer Login Experience for Enhanced Login Security
Business Banking Customer Login Experience for Enhanced Login Security User credentials uniquely identify each person who uses the banking platform. The intent of authentication is unequivocal verification
ONLINE ACCESS ONLINE ACCESS FAQS FAQS
ONLINE ACCESS ONLINE ACCESS FAQS FAQS How do I create an Online Access Account? There are three options for setting up an Online Access Account 1. Use your member number and temporary password given to
Cross-Site Scripting
Cross-Site Scripting (XSS) Computer and Network Security Seminar Fabrice Bodmer ([email protected]) UNIFR - Winter Semester 2006-2007 XSS: Table of contents What is Cross-Site Scripting (XSS)? Some
Implementing two-factor authentication: Google s experiences. Cem Paya ([email protected]) Information Security Team Google Inc.
Implementing two-factor authentication: Google s experiences Cem Paya ([email protected]) Information Security Team Google Inc. Google services and personalization Identity management at Google 1. Internal
Security vulnerabilities in new web applications. Ing. Pavol Lupták, CISSP, CEH Lead Security Consultant
Security vulnerabilities in new web applications Ing. Pavol Lupták, CISSP, CEH Lead Security Consultant $whoami Introduction Pavol Lupták 10+ years of practical experience in security and seeking vulnerabilities
Repsheet. A Behavior Based Approach to Web Application Security. Aaron Bedra Application Security Lead Braintree Payments. tirsdag den 1.
Repsheet A Behavior Based Approach to Web Application Security Aaron Bedra Application Security Lead Braintree Payments Right now, your web applications are being attacked And it will happen again, and
Passing PCI Compliance How to Address the Application Security Mandates
Passing PCI Compliance How to Address the Application Security Mandates The Payment Card Industry Data Security Standards includes several requirements that mandate security at the application layer. These
Device Fingerprinting and Fraud Protection Whitepaper
Device Fingerprinting and Fraud Protection Whitepaper 1 of 6 Table Of Contents 1 Overview... 3 2 What is Device Fingerprinting?... 3 3 Why is Device fingerprinting necessary?... 3 4 How can Device Fingerprinting
BASELINE SECURITY TEST PLAN FOR EDUCATIONAL WEB AND MOBILE APPLICATIONS
BASELINE SECURITY TEST PLAN FOR EDUCATIONAL WEB AND MOBILE APPLICATIONS Published by Tony Porterfield Feb 1, 2015. Overview The intent of this test plan is to evaluate a baseline set of data security practices
Multi-factor authentication
CYBER SECURITY OPERATIONS CENTRE (UPDATED) 201 (U) LEGAL NOTICE: THIS PUBLICATION HAS BEEN PRODUCED BY THE DEFENCE SIGNALS DIRECTORATE (DSD), ALSO KNOWN AS THE AUSTRALIAN SIGNALS DIRECTORATE (ASD). ALL
How to break in. Tecniche avanzate di pen testing in ambito Web Application, Internal Network and Social Engineering
How to break in Tecniche avanzate di pen testing in ambito Web Application, Internal Network and Social Engineering Time Agenda Agenda Item 9:30 10:00 Introduction 10:00 10:45 Web Application Penetration
Web Tracking for You. Gregory Fleischer
Web Tracking for You Gregory Fleischer 1 INTRODUCTION 2 Me Gregory Fleischer Senior Security Consultant at FishNet Security 3 Disclaimer Why do you hate? 4 Reasons For Tracking TradiFonal reasons for tracking
Multi-Factor Authentication Reference Guide
Multi-Factor Authentication Reference Guide March 2011 Support: (800) 350-3557 www.pacificwesternbank.com Table of Contents Multi-Factor Authentication (MFA) Required for All Customers...page 2 Challenge
Advanced Web Security, Lab
Advanced Web Security, Lab Web Server Security: Attacking and Defending November 13, 2013 Read this earlier than one day before the lab! Note that you will not have any internet access during the lab,
Adaptive Authentication Integration Options. John Murray Manager, RSA Systems Engineering
Adaptive Authentication Integration Options John Murray Manager, RSA Systems Engineering What is RSA Adaptive Authentication? Comprehensive authentication and fraud detection platform Powered by Risk-Based
Finding Your Way in Testing Jungle. A Learning Approach to Web Security Testing.
Finding Your Way in Testing Jungle A Learning Approach to Web Security Testing. Research Questions Why is it important to improve website security? What techniques are already in place to test security?
The Authentication Revolution: Phones Become the Leading Multi-Factor Authentication Device
The Authentication Revolution: Phones Become the Leading Multi-Factor Authentication Device PhoneFactor, Inc. 7301 West 129th Street Overland Park, KS 66213 1-877-668-6536 www.phonefactor.com Executive
Multi Factor Authentication API
GEORGIA INSTITUTE OF TECHNOLOGY Multi Factor Authentication API Yusuf Nadir Saghar Amay Singhal CONTENTS Abstract... 3 Motivation... 3 Overall Design:... 4 MFA Architecture... 5 Authentication Workflow...
Analytics, Big Data, & Threat Intelligence: How Security is Transforming
Analytics, Big Data, & Threat Intelligence: How Security is Transforming Jason Sloderbeck Director, Product Management RSA Web Threat Detection 1 Presentation Overview The Largest Threat How Can Big Data
Monitoring mobile communication network, how does it work? How to prevent such thing about that?
Monitoring mobile communication network, how does it work? How to prevent such thing about that? 潘 維 亞 周 明 哲 劉 子 揚 (P78017058) (P48027049) (N96011156) 1 Contents How mobile communications work Why monitoring?
Recommended readings. Lecture 11 - Securing Web. Applications. Security. Declarative Security
Recommended readings Lecture 11 Securing Web http://www.theserverside.com/tt/articles/content/tomcats ecurity/tomcatsecurity.pdf http://localhost:8080/tomcat-docs/security-managerhowto.html http://courses.coreservlets.com/course-
Crowbar: New generation web application brute force attack tool
Crowbar: New generation web application brute force attack tool 1 Tables of contents Introduction... 3 Challenges with brute force attacks... 3 Crowbar a fresh approach... 3 Other applications of crowbar...
ADAPTIVE AUTHENTICATION ADAPTER FOR JUNIPER SSL VPNS. Adaptive Authentication in Juniper SSL VPN Environments. Solution Brief
ADAPTIVE AUTHENTICATION ADAPTER FOR JUNIPER SSL VPNS Adaptive Authentication in Juniper SSL VPN Environments Solution Brief RSA Adaptive Authentication is a comprehensive authentication platform providing
Risk Based Authentication and AM 8. What you need to know!
Risk Based Authentication and AM 8 What you need to know! Agenda Authentication Manager 8 Customer Use Cases Risk Based Authentication (RBA) RBA Integration and Deployment 2 SecurID / Authentication Manager
Attack and Penetration Testing 101
Attack and Penetration Testing 101 Presented by Paul Petefish [email protected] July 15, 2009 Copyright 2000-2009, Solutionary, Inc. All rights reserved. Version 2.2 Agenda Penetration Testing
Web Application Penetration Testing
Web Application Penetration Testing 2010 2010 AT&T Intellectual Property. All rights reserved. AT&T and the AT&T logo are trademarks of AT&T Intellectual Property. Will Bechtel [email protected]
Instructions for Using Secure Email. (SMail) via Outlook Web Access. with an RSA Token
Instructions for Using Secure Email (SMail) via Outlook Web Access with an RSA Token Version 4 April 2010 Office of the Associate CIO for IT Support Services United States Department of Energy Requirements
Authentication Tokens
State Capitol P.O. Box 2062 Albany, NY 12220-0062 www.its.ny.gov New York State Information Technology Standard IT Standard: Authentication Tokens No: NYS-S14-006 Updated: 05/15/2015 Issued By: NYS ITS
STRONGER AUTHENTICATION for CA SiteMinder
STRONGER AUTHENTICATION for CA SiteMinder Adding Stronger Authentication for CA SiteMinder Access Control 1 STRONGER AUTHENTICATION for CA SiteMinder Access Control CA SITEMINDER provides a comprehensive
USER-FAQ (2FA) Q. What are the key features of Fraud Management Solution (Baroda isecure)?
USER-FAQ (2FA) Q. What is Fraud Management Solution (Baroda isecure)? Ans. Fraud Management Solution (Baroda isecure) is an enhanced security solution which helps reduce chances of phishing attack on customer
Two Factor Authentication (TFA; 2FA) is a security process in which two methods of authentication are used to verify who you are.
Two Factor Authentication Two Factor Authentication (TFA; 2FA) is a security process in which two methods of authentication are used to verify who you are. For example, one method currently utilized within
Welcome to the Protecting Your Identity. Training Module
Welcome to the Training Module 1 Introduction Does loss of control over your online identities bother you? 2 Objective By the end of this module, you will be able to: Identify the challenges in protecting
Check list for web developers
Check list for web developers Requirement Yes No Remarks 1. Input Validation 1.1) Have you done input validation for all the user inputs using white listing and/or sanitization? 1.2) Does the input validation
TECHNOLOGY LEADER IN GLOBAL REAL-TIME TWO-FACTOR AUTHENTICATION
TECHNOLOGY LEADER IN GLOBAL REAL-TIME TWO-FACTOR AUTHENTICATION SMS PASSCODE is the leading technology in a new generation of two-factor authentication systems protecting against the modern Internet threats.
The Top Web Application Attacks: Are you vulnerable?
QM07 The Top Web Application Attacks: Are you vulnerable? John Burroughs, CISSP Sr Security Architect, Watchfire Solutions [email protected] Agenda Current State of Web Application Security Understanding
CS 558 Internet Systems and Technologies
CS 558 Internet Systems and Technologies Dimitris Deyannis [email protected] 881 Heat seeking Honeypots: Design and Experience Abstract Compromised Web servers are used to perform many malicious activities.
Server Security. Contents. Is Rumpus Secure? 2. Use Care When Creating User Accounts 2. Managing Passwords 3. Watch Out For Aliases 4
Contents Is Rumpus Secure? 2 Use Care When Creating User Accounts 2 Managing Passwords 3 Watch Out For Aliases 4 Deploy A Firewall 5 Minimize Running Applications And Processes 5 Manage Physical Access
Beyond passwords: Protect the mobile enterprise with smarter security solutions
IBM Software Thought Leadership White Paper September 2013 Beyond passwords: Protect the mobile enterprise with smarter security solutions Prevent fraud and improve the user experience with an adaptive
BlackShield ID Agent for Remote Web Workplace
Agent for Remote Web Workplace 2010 CRYPTOCard Corp. All rights reserved. http:// www.cryptocard.com Copyright Copyright 2010, CRYPTOCard All Rights Reserved. No part of this publication may be reproduced,
Using SAML for Single Sign-On in the SOA Software Platform
Using SAML for Single Sign-On in the SOA Software Platform SOA Software Community Manager: Using SAML on the Platform 1 Policy Manager / Community Manager Using SAML for Single Sign-On in the SOA Software
nexus Hybrid Access Gateway
Product Sheet nexus Hybrid Access Gateway nexus Hybrid Access Gateway nexus Hybrid Access Gateway uses the inherent simplicity of virtual appliances to create matchless security, even beyond the boundaries
MIGRATION GUIDE. Authentication Server
MIGRATION GUIDE RSA Authentication Manager to IDENTIKEY Authentication Server Disclaimer Disclaimer of Warranties and Limitation of Liabilities All information contained in this document is provided 'as
Dashlane Security Whitepaper
Dashlane Security Whitepaper November 2014 Protection of User Data in Dashlane Protection of User Data in Dashlane relies on 3 separate secrets: The User Master Password Never stored locally nor remotely.
Web Application Firewall
Web Application Firewall Getting Started Guide August 3, 2015 Copyright 2014-2015 by Qualys, Inc. All Rights Reserved. Qualys and the Qualys logo are registered trademarks of Qualys, Inc. All other trademarks
Combating Web Fraud with Predictive Analytics. Dave Moore Novetta Solutions [email protected]
Combating Web Fraud with Predictive Analytics Dave Moore Novetta Solutions [email protected] Novetta Solutions Formerly, International Biometric Group (IBG) Consulting DoD, DHS, DRDC IR&D Identity Cyber
The evolution of virtual endpoint security. Comparing vsentry with traditional endpoint virtualization security solutions
The evolution of virtual endpoint security Comparing vsentry with traditional endpoint virtualization security solutions Executive Summary First generation endpoint virtualization based security solutions
Architectural Design Patterns. Design and Use Cases for OWASP. Wei Zhang & Marco Morana OWASP Cincinnati, U.S.A. http://www.owasp.
Architectural Design Patterns for SSO (Single Sign On) Design and Use Cases for Financial i Web Applications Wei Zhang & Marco Morana OWASP Cincinnati, U.S.A. OWASP Copyright The OWASP Foundation Permission
BlackShield ID Agent for Terminal Services Web and Remote Desktop Web
Agent for Terminal Services Web and Remote Desktop Web 2010 CRYPTOCard Corp. All rights reserved. http:// www.cryptocard.com Copyright Copyright 2010, CRYPTOCard All Rights Reserved. No part of this publication
Strong Authentication for Microsoft TS Web / RD Web
Strong Authentication for Microsoft TS Web / RD Web with Powerful Authentication Management for Service Providers and Enterprises Authentication Service Delivery Made EASY Copyright Copyright 2011. CRYPTOCard
Finding and Preventing Cross- Site Request Forgery. Tom Gallagher Security Test Lead, Microsoft
Finding and Preventing Cross- Site Request Forgery Tom Gallagher Security Test Lead, Microsoft Agenda Quick reminder of how HTML forms work How cross-site request forgery (CSRF) attack works Obstacles
Out-of-Band Multi-Factor Authentication Cloud Services Whitepaper
Out-of-Band Multi-Factor Authentication Cloud Services Whitepaper StrikeForce Technologies, Inc. 1090 King Georges Post Rd. Edison, NJ 08837, USA Tel: 732 661-9641 Fax: 732 661-9647 http://www.sftnj.com
Cyber Security Workshop Ethical Web Hacking
Cyber Security Workshop Ethical Web Hacking May 2015 Setting up WebGoat and Burp Suite Hacking Challenges in WebGoat Concepts in Web Technologies and Ethical Hacking 1 P a g e Downloading WebGoat and Burp
SECURING YOUR REMOTE DESKTOP CONNECTION
White Paper SECURING YOUR REMOTE DESKTOP CONNECTION HOW TO PROPERLY SECURE REMOTE ACCESS 2015 SecurityMetrics SECURING YOUR REMOTE DESKTOP CONNECTION 1 SECURING YOUR REMOTE DESKTOP CONNECTION HOW TO PROPERLY
