Protocol-Level Evasion of Web Application Firewalls
|
|
|
- Beatrice Horton
- 10 years ago
- Views:
Transcription
1 Protocol-Level Evasion of Web Application Firewalls USA2012 Ivan Ristic Director of Engineering
2 True Evasion Story Once, a long time ago, I evaded a web application firewall by adding a single character to a valid request. Can you spot it below? GET /myapp/admin.php?userid=1001 HTTP/1.1 Host: User-Agent: Mozilla/5.0 (Windows NT 6.1; WOW64; rv:13.0) Gecko/ Firefox/ Accept: text/html,application/xhtml+xml,application/xml;q=0.9 Accept-Language: en-us,en;q=0.5 Accept-Encoding: gzip, deflate DNT: 1 Connection: keep-alive 1
3 True Evasion Story Once, a long time ago, I evaded a web application firewall by adding a single character to a valid request. Can you spot it below? GET /myapp/admin.php?userid=1001 HTTP/1.1 Host: User-Agent: Mozilla/5.0 (Windows NT 6.1; WOW64; rv:13.0) Gecko/ Firefox/ Accept: text/html,application/xhtml+xml,application/xml;q=0.9 Accept-Language: en-us,en;q=0.5 Accept-Encoding: gzip, deflate DNT: 1 Connection: keep-alive 2
4 Why Do I Care? Spent years developing WAFs and related software: Built ModSecurity ( ) Built libhtp ( ) Now working on IronBee (not coding, though) WAF concepts are powerful, but the field needs more research and the market needs more transparency libhtp 3
5 INTRODUCTION TO PROTOCOL-LEVEL EVASION Protocol-Level Evasion of Web Application Firewalls
6 Impedance Mismatch Impedance mismatch, in the context of security monitoring, refers to the problem of different interpretations of the same data stream The security tool sees one thing The backend server sees another Possible causes: Ambiguous standards Partial and Works for me backend implementations Helpful developer mentality Insufficient attention by security product developers 5
7 Protocol-Level Evasion Overview HTTP Message parsing Request line Request headers Cookies Hostname Path Parameters Request body Urlencoded Multipart Method Path Query string Protocol Header name Header value SP Header value Header name Header value Header name Header value Request body 6
8 Protocol-Level Evasion Overview HTTP Message parsing Request line Request headers Cookies Hostname Path Parameters Request body Urlencoded Multipart Method Path Query string Protocol Header name Header value SP Header value Header name Header value Header name Header value Request body 7
9 Virtual Patching Virtual patching is probably the most widely used WAF feature 1. You know you have a problem 2. You can t resolve it, or can t resolve it in a timely manner 3. You deploy a WAF as a short-term mitigation measure Challenge: To support the narrow focus of virtual patches, WAFs have to make a lot of processing decisions The more decision points there are, the easier it is to successfully evade detection 8
10 PATH EVASION Protocol-Level Evasion of Web Application Firewalls
11 Attacking Patch Activation An application entry point might look like this: /myapp/admin.php?userid=1001 And the virtual patch, using Apache and ModSecurity, like this: <Location /myapp/admin.php> # Allow only numbers in userid SecRule ARGS:userid "!^\d+$" </Location>
12 PATH_INFO and Path Parameters Surprisingly, some WAFs* still don t know about PATH_INFO: /myapp/admin.php/xyz?userid=x If PATH_INFO is not supported by the backend server, you might want to try path parameters (e.g., works on Tomcat): /myapp/admin.php;random=value?userid=x (*) Neither approach works against Apache, because it uses Location parameter as prefix.
13 Self-Contained ModSecurity Rules Rules written like this are very easy to find: SecRule REQUEST_FILENAME /myapp/admin.php \ "chain,phase:2,deny" SecRule ARGS:userid "!^\d+$" Problems: The use misses PATH_INFO and path parameters attacks Apache may not handle all obfuscation attacks, for example: /myapp//admin.php /myapp/./admin.php /myapp/xyz/../admin.php
14 Self-Contained ModSecurity Rules Here s a better version of the same patch: SecRule REQUEST_FILENAME \ "@beginswith /myapp/admin.php" \ "chain,phase:2,t:normalizepath,deny" SecRule ARGS:userid "!^\d+$ Improvements: (@contains is good, too) Use transformation function normalizepath to counter path evasion attacks
15 Backend Feature Variations In a proxy deployment, you have to watch for impedance mismatch with various backend features: /myapp\admin.php /myapp/admin.php Using Apache and ModSecurity: <Location ~ (?i)^[\x5c/]+myapp[\x5c/]+admin\.php> SecRule ARGS:userid "!^\d+$" </Location>
16 Backend Feature Variations In a proxy deployment, you have to watch for impedance mismatch with various backend features: /myapp\admin.php /myapp/admin.php ModSecurity only: SecRule REQUEST_FILENAME \ "@beginswith /myapp/admin.php" \ "chain,phase:2,t:lowercase,t:normalizepathwin,deny" SecRule ARGS:userid "!^[0-9]+$"
17 Path Parameters Again Path parameters are actually path segment parameters, and can be used with any segment: /myapp;param=value/admin.php?userid=x New patch version: <Location ~ (?i)^[\x5c/]+myapp(;[^\x5c/]*)? [\x5c/]+admin\.php(;[^\x5c/]*)?> SecRule ARGS:userid "!^\d+$" </Location> ModSecurity needs a new transformation function; could use the same pattern as above or reject all path segment parameters
18 Short Filenames on Windows Windows uses short filenames to support legacy applications. For example: admin.aspx becomes ADMIN~1.ASP Ideal for virtual patch evasion under right circumstances: Does not work with IIS But does work with Apache running on Windows
19 Path Evasion against IIS 5.1 IIS 5.1 (and, presumably, earlier) are very flexible when it comes to path processing: 1. Overlong 2- or 3-byte UTF-8 representing either / or \ 2. In fact, any overlong UTF-8 character facilitates evasion 3. Best-fit mapping of UTF-8 characters; for example U+0107 becomes c 4. Best-fit mapping of %u-encoded characters 5. Full-width mapping with UTF-8 encoded characters; for example U+FF0F becomes / 6. Full-width mapping of %u encoding 7. Terminate path using an encoded NUL byte (%00) IIS 5.1 and IIS 6 accept %u-encoded slashes
20 Path Handling of Major Platforms
21 Path Handling of Major Platforms 42 TESTS
22 PARAMETER EVASION Protocol-Level Evasion of Web Application Firewalls
23 Parameter Cardinality and Case In the simplest case, supplying multiple parameters or varying the case of parameter names may work: /myapp/admin.php?userid=1&userid=2 /myapp/admin.php?userid=1&userid=2 However, these techniques are more likely to work against custom-coded defenses; WAFs will have caught up by now.
24 PHP s Cookies as Parameters PHP can be configured to treat cookies as parameters, and place them in the $_REQUEST array: GET /myapp/admin.php Cookie: userid=x This is still the default behaviour in the code, with an override in the default php.ini (which can easily be misconfigured).
25 HTTP Parameter Pollution Depending on the backend and the code used, the WAF may not know exactly that the application sees: /myapp/admin.php?userid=1&userid=2 Technology Behaviour Result ASP Concatenate userid=1,2 PHP Last occurrence userid=2 Java First occurrence userid=1 A better overview is available in the HTTP Parameter Pollution slides.
26 Tricks with PHP Parameter Names PHP will change parameter names when they contain some characters it does not like: Whitespace at the beginning is removed Whitespace, dot, and open bracket characters in the middle converted to underscores /myapp/admin.php?+userid=x
27 Invalid URL Encoding Different platforms react differently to invalid encoding. ASP removes a % character that is not followed by 2 hexadecimal digits: /myapp/admin.php?user%id=x In the old days, many C-based applications had incorrect decoding routines, which lacked error detection. /myapp/admin.php?user%}9d=x /myapp/admin.php?user%69d=x
28 Content Type Evasion When parameters are transported in request body, you can attack the encoding detection mechanism Attack applications that hard-code processing: Omit the Content-Type request header Place an arbitrary value in it Use multipart/form-data, and craft the request body to be a valid multipart payload (the app will still parse as Urlencoded) Attack apps with lax content type detection: For example, Apache Commons FileUpload accepts any MIME type that begins with multipart/ as multipart/form-data Use less common formats, such as JSON Use a different transport, for example WebSockets
29 ModSecurity Bypass By default, ModSecurity ignores unknown MIME types With Apache Commons FileUpload, send a request body with multipart/whatever MIME type Request bodies using encodings other than Urlencoded and Multipart are completely ignored Possible improvements to ModSecurity: Fail closed upon detecting unknown MIME type Inspect all request bodies as a stream of bytes
30 MULTIPART EVASION Protocol-Level Evasion of Web Application Firewalls
31 Multipart Format Overview POST / HTTP/1.0 1 Content-Type: multipart/form-data; boundary=0000 Host: Content-Length: Content-Disposition: form-data; name="name" 4 2 John Smith Content-Disposition: form-data; name=" " [email protected] Content-Disposition: form-data; name="image"; filename="image.jpg" Content-Type: image/jpeg FILE CONTENTS REMOVED
32 Apache Commons FileUpload Define constant for later use: public static final String MULTIPART = "multipart/"; Determine if Multipart request body is present: if (contenttype.tolowercase(). startswith(multipart)) { return true; } 31
33 ModSecurity CRS Bypass ModSecurity Core Rules will attempt to restrict MIME types, but not always successfully: With Apache Commons FileUpload, send a request body with multipart/ MIME type. Reported as fixed in CRS The flaw was in this rule, where the check was not strict enough: SecRule REQUEST_CONTENT_TYPE "!@within \ application/x-www-form-urlencoded \ multipart/form-data"
34 Content-Type Evasion Trick the WAF into not seeing a Multipart request body Examples: Content-Type: multipart/form-data ; boundary=0000 Content-Type: multipart/form-data; boundary=0000 Content-Type: multipart/form-datax; boundary=0000 Content-Type: multipart/form-data, boundary=0000 Content-Type: multipart/form-data boundary=0000 Content-Type: multipart/whatever; boundary=0000 Content-Type: multipart/; boundary=0000 ModSecurity with Apache Commons FileUpload bypass 33
35 PHP Source Code 1 boundary = strstr(content_type, "boundary"); if (!boundary) { /* 2 Lowercase header and try again */ } if (!boundary 3!(boundary = strchr(boundary, '='))) { /* Return with error */ } 34
36 Boundary Evasion Trick the WAF into seeing a different boundary Examples: Content-Type: multipart/form-data; boundary =0000; boundary=1111 Content-Type: multipart/form-data; boundaryx=0000; boundary=1111 Content-Type: multipart/form-data; boundary=0000; boundary=1111 Content-Type: multipart/form-data; boundary=0000; BOUNDARY=1111 Content-Type: multipart/form-data; boundary=0000' Reported by Stefan Esser in 2009 to have worked against F5
37 Part Evasion Boundary evasion leads to part evasion, but even when you get the boundary right you can still miss things In 2009, Stefan Esser reported that PHP continues to process the parts that appear after the last part Content-Disposition: form-data; name="name" John Smith Content-Disposition: form-data; name= name" ATTACK
38 Parameter Name Evasion Focuses on differences in parameter name parsing. Example attacks: Content-Disposition: form-data; name="n1"; name="n2" Content-Disposition: form-data; name="n1"; name ="n2" How PHP parses parameter names: Content-Disposition: form-data; name="n1"; name="n2" Content-Disposition: form-data; name="n1"; name ="n2" 37
39 Parameter Type Evasion WAFs may treat files differently. For example: ModSecurity has different inspection controls for files No file inspection in the CRS ModSecurity bypass reported by Stefan Esser in 2009 Thought to have been fixed (I was not involved) Stefan s original payload below Content-Disposition: form-data; name=';filename="';name=payload;" 38
40 Parameter Type Evasion This is what ModSecurity saw: Content-Disposition: form-data; name=';filename="';name=payload;" name filename This is what PHP sees: Content-Disposition: form-data; name=';filename="';name=payload;" name (ignored) name 39
41 Parameter Type Evasion Flaw thought to have been fixed I rediscovered the problem during my evasion research The original problem had been misunderstood and addressed incorrectly: ModSecurity added support for single quotes in parameter values PHP supports single-quote escaping anywhere within the C-D header New ModSecurity bypass* with only 1 extra character: Content-Disposition: form-data; name=x';filename="';name=payload;" (*) Reported to have been addressed in ModSecurity
42 Multipart Evasion Summary Complex and vaguely specified format Implementations are often: Quick & dirty (whatever works) Focused on real-life use cases (not the specification) Rife opportunities for evasion There are 37 tests available in the repository Tested against ModSecurity and PHP Testing of the major platforms will follow soon 37 TESTS 41
43 WHAT NEXT? Protocol-Level Evasion of Web Application Firewalls
44 Future Work At this time: Path handling has good coverage (tests + results) Parameter handling and multipart test cases in good shape Need to test major platforms Future activity Complete other areas of protocol-level evasion HTTP parsing Character set issues Hostname evasion Document all techniques in the Evasion Techniques Catalogue
45 Where to Go From Here More information in the accompanying whitepaper Get the tools and docs from GitHub: Path handling research Baseline, path, and multipart test cases Test your security products Contribute your results >100 TESTS 44
46 USA2012 Thank You Ivan Ristic
47 How to Write a Good Virtual Patch Take these steps to write a good virtual patch: 1. Study the problem, ideally by reading source code If the source code is not available, do what you can by analyzing the advisory, the exploit, and by attacking the application 2. Use a path that can withstand evasion attempts 3. Enumerate all parameters 4. For each parameter 1. Determine how many times it can appear in request 2. Determine what it is allowed to contain 5. Reject requests with unknown parameters Outside the patch, enforce strict configuration that does not allow requests with anomalies 46
48 Baseline Tests In the repository, there is a set of baseline tests designed to determine if all parts of a HTTP requests are inspected by a WAF Instructions: 1. Find one payload that is blocked by the WAF 2. Submit payload in every different logical location 3. Determine locations that are not monitored 4. Seek ways to exploit the application in that way 22 TESTS 47
49 Why Should You Care? Researchers: Fascinating new data, and effort to systematically and collaboratively analyse how WAFs perform in this area Testers (breakers): Lots of practical assessment techniques Defenders: Lots of practical information about Apache and ModSecurity A better picture of the true state of your defences (and an opportunity to tell your vendor how much you care) Vendors: Good reason to allocate more funds to the core functionality of your WAF, leading to a better product 48
50 Donald Knuth on is a wonderful thing for people whose role in life is to be on top of things. But not for me; my role is to be on the bottom of things. 49
51 Previous Work A look at whisker s anti-ids tactics Rain Forest Puppy (1999) Bypassing Content Filtering Software 3APA3A (2002) HTTP IDS Evasions Revisited Daniel J. Roelker (2003) Snort's README.http_inspect Sourcefire et al (2005) Shocking News in PHP Exploitation Stefan Esser (2009) HTTP Parameter Pollution Luca Carettoni and Stefano di Paola (2009) 50
52 About Ivan Ristic Ivan is a compulsive developer, application security researcher, writer, publisher, and entrepreneur. Apache Security, O Reilly (2005) ModSecurity, open source web application firewall SSL Labs, SSL/TLS, and PKI research ModSecurity Handbook, Feisty Duck (2010) IronBee, a next-generation open source web application firewall 51
Web Intrusion Detection with ModSecurity. Ivan Ristic <[email protected]>
Web Intrusion Detection with ModSecurity Ivan Ristic Aim of This Talk Discuss the state of Web Intrusion Detection Introduce ModSecurity Introduce an open source web application
BCR Export Protocol SHAPE 2012
BCR Export Protocol SHAPE 2012 Business Card Reader sends HTTP POST multipart request optional HTTP authentication is supported, BASIC and DIGEST methods with the following parameters: command - Action
Web applications. Web security: web basics. HTTP requests. URLs. GET request. Myrto Arapinis School of Informatics University of Edinburgh
Web applications Web security: web basics Myrto Arapinis School of Informatics University of Edinburgh HTTP March 19, 2015 Client Server Database (HTML, JavaScript) (PHP) (SQL) 1 / 24 2 / 24 URLs HTTP
Web Application Firewall Bypassing
Web Application Firewall Bypassing how to defeat the blue team KHALIL BIJJOU CYBER RISK SERVICES DELOITTE 29 th Octobre 2015 STRUCTURE Motivation & Objective Introduction to Web Application Firewalls Bypassing
Playing with Web Application Firewalls
Playing with Web Application Firewalls DEFCON 16, August 8-10, 2008, Las Vegas, NV, USA Who is Wendel Guglielmetti Henrique? Penetration Test analyst at SecurityLabs - Intruders Tiger Team Security division
ModSecurity The Open Source Web Application Firewall
OWASP AppSec NYC 2008 ModSecurity The Open Source Web Application Firewall Ivan Ristić Vice President, Security Research Breach Security 1/46 Introduction Ivan Ristić Web application security and web application
Implementation of Web Application Firewall
Implementation of Web Application Firewall OuTian 1 Introduction Abstract Web 層 應 用 程 式 之 攻 擊 日 趨 嚴 重, 而 國 內 多 數 企 業 仍 不 知 該 如 何 以 資 安 設 備 阻 擋, 仍 在 採 購 傳 統 的 Firewall/IPS,
Playing with Web Application Firewalls
Playing with Web Application Firewalls Who is Wendel? Independent penetration test analyst. Affiliated to Hackaholic team. Over 7 years in the security industry. Discovered vulnerabilities in Webmails,
Using SAML for Single Sign-On in the SOA Software Platform
Using SAML for Single Sign-On in the SOA Software Platform SOA Software Community Manager: Using SAML on the Platform 1 Policy Manager / Community Manager Using SAML for Single Sign-On in the SOA Software
reference: HTTP: The Definitive Guide by David Gourley and Brian Totty (O Reilly, 2002)
1 cse879-03 2010-03-29 17:23 Kyung-Goo Doh Chapter 3. Web Application Technologies reference: HTTP: The Definitive Guide by David Gourley and Brian Totty (O Reilly, 2002) 1. The HTTP Protocol. HTTP = HyperText
THE PROXY SERVER 1 1 PURPOSE 3 2 USAGE EXAMPLES 4 3 STARTING THE PROXY SERVER 5 4 READING THE LOG 6
The Proxy Server THE PROXY SERVER 1 1 PURPOSE 3 2 USAGE EXAMPLES 4 3 STARTING THE PROXY SERVER 5 4 READING THE LOG 6 2 1 Purpose The proxy server acts as an intermediate server that relays requests between
A Study of What Really Breaks SSL HITB Amsterdam 2011
A Study of What Really Breaks SSL HITB Amsterdam 2011 v1.0 Ivan Ristic Michael Small 20 May 2011 Agenda 1. State of SSL 2. Quick intro to SSL Labs 3. SSL Configuration Surveys 4. Survey of Actual SSL Usage
Web Application Attacks And WAF Evasion
Web Application Attacks And WAF Evasion Ahmed ALaa (EG-CERT) 19 March 2013 What Are We Going To Talk About? - introduction to web attacks - OWASP organization - OWASP frameworks - Crawling & info. gathering
HTTP Parameter Pollution. OWASP EU09 Poland. The OWASP Foundation. Luca Carettoni Independent Researcher luca.carettoni@ikkisoft.
HTTP Parameter Pollution Luca Carettoni Independent Researcher [email protected] OWASP EU09 Poland Stefano di Paola CTO @ Minded Security [email protected] Copyright The OWASP
Secure Web Application Coding Team Introductory Meeting December 1, 2005 1:00 2:00PM Bits & Pieces Room, Sansom West Room 306 Agenda
Secure Web Application Coding Team Introductory Meeting December 1, 2005 1:00 2:00PM Bits & Pieces Room, Sansom West Room 306 Agenda 1. Introductions for new members (5 minutes) 2. Name of group 3. Current
Hypertext for Hyper Techs
Hypertext for Hyper Techs An Introduction to HTTP for SecPros Bio Josh Little, GSEC ~14 years in IT. Support, Server/Storage Admin, Webmaster, Web App Dev, Networking, VoIP, Projects, Security. Currently
Security-Assessment.com White Paper Leveraging XSRF with Apache Web Server Compatibility with older browser feature and Java Applet
Security-Assessment.com White Paper Leveraging XSRF with Apache Web Server Compatibility with older browser feature and Java Applet Prepared by: Roberto Suggi Liverani Senior Security Consultant Security-Assessment.com
We protect you applications! No, you don t. Digicomp Hacking Day 2013 May 16 th 2013
We protect you applications! No, you don t Digicomp Hacking Day 2013 May 16 th 2013 Sven Vetsch Partner & CTO at Redguard AG www.redguard.ch Specialized in Application Security (Web, Web-Services, Mobile,
LBL Application Availability Infrastructure Unified Secure Reverse Proxy
LBL Application Availability Infrastructure Unified Secure Reverse Proxy Valerio Mezzalira TCOGROUP Company Outline Mission: Development of Software Tools Aimed at Enhancing High Availability (HA) of IT
Web Application Firewall Technology Insight OWASP 22/2-2007. The OWASP Foundation. Joakim Sandström Role: OWASP Prospect. http://www.owasp.
Web Application Firewall Technology Insight Joakim Sandström Role: Prospect 22/2-2007 Copyright The Foundation Permission is granted to copy, distribute and/or modify this document under the terms of the
HTTP Response Splitting
The Attack HTTP Response Splitting is a protocol manipulation attack, similar to Parameter Tampering The attack is valid only for applications that use HTTP to exchange data Works just as well with HTTPS
Barracuda Networks Web Application Firewall
McAfee Enterprise Security Manager Data Source Configuration Guide Data Source: Barracuda Networks Web Application Firewall January 30, 2015 Barracuda Networks Web Application Firewall Page 1 of 10 Important
Java Web Application Security
Java Web Application Security RJUG Nov 11, 2003 Durkee Consulting www.rd1.net 1 Ralph Durkee SANS Certified Mentor/Instructor SANS GIAC Network Security and Software Development Consulting Durkee Consulting
DNS Pinning and Web Proxies
DNS Pinning and Web Proxies An NGSSoftware Insight Security Research (NISR) Publication 2007 Next Generation Security Software Ltd Abstract DNS-based attacks can be used to perform a partial breach of
Research of Web Real-Time Communication Based on Web Socket
Int. J. Communications, Network and System Sciences, 2012, 5, 797-801 http://dx.doi.org/10.4236/ijcns.2012.512083 Published Online December 2012 (http://www.scirp.org/journal/ijcns) Research of Web Real-Time
Pre-authentication XXE vulnerability in the Services Drupal module
Pre-authentication XXE vulnerability in the Services Drupal module Security advisory 24/04/2015 Renaud Dubourguais www.synacktiv.com 14 rue Mademoiselle 75015 Paris 1. Vulnerability description 1.1. The
Crowbar: New generation web application brute force attack tool
Crowbar: New generation web application brute force attack tool 1 Tables of contents Introduction... 3 Challenges with brute force attacks... 3 Crowbar a fresh approach... 3 Other applications of crowbar...
Top Ten Web Attacks. Saumil Shah Net-Square. BlackHat Asia 2002, Singapore
Top Ten Web Attacks Saumil Shah Net-Square BlackHat Asia 2002, Singapore TodayÕs battleground Ð the Web Web sites and web applications rapidly growing. Complex business applications are now delivered over
Package httprequest. R topics documented: February 20, 2015
Version 0.0.10 Date 2014-09-29 Title Basic HTTP Request Author Eryk Witold Wolski, Andreas Westfeld Package httprequest February 20, 2015 Maintainer Andreas Westfeld HTTP
Web. Services. Web Technologies. Today. Web. Technologies. Internet WWW. Protocols TCP/IP HTTP. Apache. Next Time. Lecture #3 2008 3 Apache.
JSP, and JSP, and JSP, and 1 2 Lecture #3 2008 3 JSP, and JSP, and Markup & presentation (HTML, XHTML, CSS etc) Data storage & access (JDBC, XML etc) Network & application protocols (, etc) Programming
Web Application Forensics:
Web Application Forensics: The Uncharted Territory By Ory Segal, Sanctum Security Group Introduction If criminals would always schedule their movements like railway trains, it would certainly be more convenient
[state of the internet] / SEO Attacks. Threat Advisory: Continuous Uptick in SEO Attacks
TLP: GREEN Issue Date: 1.12.16 Threat Advisory: Continuous Uptick in SEO Attacks Risk Factor High The Akamai Threat Research Team has identified a highly sophisticated Search Engine Optimization (SEO)
WEB APPLICATION FIREWALL
WEB APPLICATION FIREWALL CS499 : B.Tech Project Final Report by Namit Gupta (Y3188) Abakash Saikia (Y3349) under the supervision of Dr. Dheeraj Sanghi submitted to Department of Computer Science and Engineering
ICSA Labs Web Application Firewall Certification Testing Report Web Application Firewall - Version 2.1 (Corrected) Radware Inc. AppWall V5.6.4.
ICSA Labs Web Application Firewall Certification Testing Report Radware Inc. V5.6.4.1 May 30, 2013 Prepared by ICSA Labs 1000 Bent Creek Blvd., Suite 200 Mechanicsburg, PA 17050 www.icsalabs.com WAFX RADWAREINC-2013-0530-01
SSL BEST PRACTICES OVERVIEW
SSL BEST PRACTICES OVERVIEW THESE PROBLEMS ARE PERVASIVE 77.9% 5.2% 19.2% 42.3% 77.9% of sites are HTTP 5.2% have an incomplete chain 19.2% support weak/insecure cipher suites 42.3% support SSL 3.0 83.1%
Web Application Firewalls: When Are They Useful? OWASP AppSec Europe May 2006. The OWASP Foundation http://www.owasp.org/
Web Application Firewalls: When Are They Useful? OWASP AppSec Europe May 2006 Ivan Ristic Thinking Stone [email protected] +44 7766 508 210 Copyright 2006 - The OWASP Foundation Permission is granted
IronBee Open Source Web Application Firewall
IronBee Open Source Web Application Firewall Building a universal web application firewall engine www.ironbee.com Introduction Qualys is announcing the development of IronBee, a new open source project
PHP Magic Tricks: Type Juggling. PHP Magic Tricks: Type Juggling
Who Am I Chris Smith (@chrismsnz) Previously: Polyglot Developer - Python, PHP, Go + more Linux Sysadmin Currently: Pentester, Consultant at Insomnia Security Little bit of research Insomnia Security Group
<Insert Picture Here> Oracle Web Cache 11g Overview
Oracle Web Cache 11g Overview Oracle Web Cache Oracle Web Cache is a secure reverse proxy cache and a compression engine deployed between Browser and HTTP server Browser and Content
600-152 People Data and the Web Forms and CGI CGI. Facilitating interactive web applications
CGI Facilitating interactive web applications Outline In Informatics 1, worksheet 7 says You will learn more about CGI and forms if you enroll in Informatics 2. Now we make good on that promise. First
HTTPParameter Pollution. ChrysostomosDaniel
HTTPParameter Pollution ChrysostomosDaniel Introduction Nowadays, many components from web applications are commonly run on the user s computer (such as Javascript), and not just on the application s provider
ModSecurity as Universal Cross-platform Web Protection Tool
ModSecurity as Universal Cross-platform Web Protection Tool Ryan Barnett Greg Wroblewski Abstract For many years ModSecurity was a number one free open source web application firewall for the Apache web
Cyber Security Workshop Ethical Web Hacking
Cyber Security Workshop Ethical Web Hacking May 2015 Setting up WebGoat and Burp Suite Hacking Challenges in WebGoat Concepts in Web Technologies and Ethical Hacking 1 P a g e Downloading WebGoat and Burp
Chapter 2: Interactive Web Applications
Chapter 2: Interactive Web Applications 2.1 Interactivity and Multimedia in the WWW architecture 2.2 Interactive Client-Side Scripting for Multimedia (Example HTML5/JavaScript) 2.3 Interactive Server-Side
Acunetix Website Audit. 5 November, 2014. Developer Report. Generated by Acunetix WVS Reporter (v8.0 Build 20120808)
Acunetix Website Audit 5 November, 2014 Developer Report Generated by Acunetix WVS Reporter (v8.0 Build 20120808) Scan of http://filesbi.go.id:80/ Scan details Scan information Starttime 05/11/2014 14:44:06
WHITE PAPER. FortiWeb and the OWASP Top 10 Mitigating the most dangerous application security threats
WHITE PAPER FortiWeb and the OWASP Top 10 PAGE 2 Introduction The Open Web Application Security project (OWASP) Top Ten provides a powerful awareness document for web application security. The OWASP Top
Polyglot: Automatic Extraction of Protocol Message Format using Dynamic Binary Analysis
Polyglot: Automatic Extraction of Protocol Message Format using Dynamic Binary Analysis Juan Caballero, Heng Yin, Zhenkai Liang Carnegie Mellon University Dawn Song Carnegie Mellon University & UC Berkeley
7 Why Use Perl for CGI?
7 Why Use Perl for CGI? Perl is the de facto standard for CGI programming for a number of reasons, but perhaps the most important are: Socket Support: Perl makes it easy to create programs that interface
HTTP. Internet Engineering. Fall 2015. Bahador Bakhshi CE & IT Department, Amirkabir University of Technology
HTTP Internet Engineering Fall 2015 Bahador Bakhshi CE & IT Department, Amirkabir University of Technology Questions Q1) How do web server and client browser talk to each other? Q1.1) What is the common
SQL Injection Attack Lab
Laboratory for Computer Security Education 1 SQL Injection Attack Lab Copyright c 2006-2010 Wenliang Du, Syracuse University. The development of this document is funded by the National Science Foundation
Creating Stronger, Safer, Web Facing Code. JPL IT Security Mary Rivera June 17, 2011
Creating Stronger, Safer, Web Facing Code JPL IT Security Mary Rivera June 17, 2011 Agenda Evolving Threats Operating System Application User Generated Content JPL s Application Security Program Securing
Project 2: Web Security Pitfalls
EECS 388 September 19, 2014 Intro to Computer Security Project 2: Web Security Pitfalls Project 2: Web Security Pitfalls This project is due on Thursday, October 9 at 6 p.m. and counts for 8% of your course
EC-Council CAST CENTER FOR ADVANCED SECURITY TRAINING. CAST 619 Advanced SQLi Attacks and Countermeasures. Make The Difference CAST.
CENTER FOR ADVANCED SECURITY TRAINING 619 Advanced SQLi Attacks and Countermeasures Make The Difference About Center of Advanced Security Training () The rapidly evolving information security landscape
MWR InfoSecurity Security Advisory. pfsense DHCP Script Injection Vulnerability. 25 th July 2008. Contents
Contents MWR InfoSecurity Security Advisory pfsense DHCP Script Injection Vulnerability 25 th July 2008 2008-07-25 Page 1 of 10 Contents Contents 1 Detailed Vulnerability Description... 5 1.1 Technical
All You Can Eat Realtime
HTML5 WebSocket: All You Can Eat Realtime By Peter Lubbers, Kaazing May 14, 2010 1 About Peter Lubbers Director of Documentation and Training, Kaazing Co-Founder San Francisco HTML5 User Group http://www.sfhtml5.org/
Security Assessment of Waratek AppSecurity for Java. Executive Summary
Security Assessment of Waratek AppSecurity for Java Executive Summary ExecutiveSummary Security Assessment of Waratek AppSecurity for Java! Introduction! Between September and November 2014 BCC Risk Advisory
SSL and Browsers: The Pillars of Broken Security
SSL and Browsers: The Pillars of Broken Security Ivan Ristic Wolfgang Kandek Qualys, Inc. Session ID: TECH-403 Session Classification: Intermediate SSL, TLS, And PKI SSL (or TLS, if you prefer) is the
Owner of the content within this article is www.isaserver.org Written by Marc Grote www.it-training-grote.de
Owner of the content within this article is www.isaserver.org Written by Marc Grote www.it-training-grote.de Configuring the Forefront TMG HTTP Filter Abstract In this article I will show you how to configure
External Vulnerability Assessment. -Technical Summary- ABC ORGANIZATION
External Vulnerability Assessment -Technical Summary- Prepared for: ABC ORGANIZATI On March 9, 2008 Prepared by: AOS Security Solutions 1 of 13 Table of Contents Executive Summary... 3 Discovered Security
CS640: Introduction to Computer Networks. Applications FTP: The File Transfer Protocol
CS640: Introduction to Computer Networks Aditya Akella Lecture 4 - Application Protocols, Performance Applications FTP: The File Transfer Protocol user at host FTP FTP user client interface local file
How To Protect A Web Application From Attack From A Trusted Environment
Standard: Version: Date: Requirement: Author: PCI Data Security Standard (PCI DSS) 1.2 October 2008 6.6 PCI Security Standards Council Information Supplement: Application Reviews and Web Application Firewalls
HTTP Caching & Cache-Busting for Content Publishers
HTTP Caching & Cache-Busting for Content Publishers Michael J. Radwin http://public.yahoo.com/~radwin/ OSCON 2005 Thursday, August 4th, 2005 1 1 Agenda HTTP in 3 minutes Caching concepts Hit, Miss, Revalidation
Application Layer Encryption: Protecting against Application Logic and Session Theft Attacks. Whitepaper
Application Layer Encryption: Protecting against Application Logic and Session Theft Attacks Whitepaper The security industry has extensively focused on protecting against malicious injection attacks like
Still Aren't Doing. Frank Kim
Ten Things Web Developers Still Aren't Doing Frank Kim Think Security Consulting Background Frank Kim Consultant, Think Security Consulting Security in the SDLC SANS Author & Instructor DEV541 Secure Coding
LAMP Secure Web Hosting. A.J. Newmaster & Matt Payne 8/10/2005
LAMP Secure Web Hosting A.J. Newmaster & Matt Payne 8/10/2005 How do I lock down my server? & ModSecurity is an open source intrusion detection and prevention engine for web applications. Operating as
SQL Injection Attacks: Detection in a Web Application Environment
SQL Injection Attacks: Detection in a Web Application Environment Table of Contents 1 Foreword... 1 2 Background... 3 2.1 Web Application Environment... 3 2.2 SQL Attack Overview... 3 2.3 Applications
A Perfect CRIME? TIME Will Tell. Tal Be ery, Web research TL
A Perfect CRIME? TIME Will Tell Tal Be ery, Web research TL Agenda BEAST + Modes of operation CRIME + Gzip compression + Compression + encryption leak data TIME + Timing + compression leak data Attacking
Advanced Web Security, Lab
Advanced Web Security, Lab Web Server Security: Attacking and Defending November 13, 2013 Read this earlier than one day before the lab! Note that you will not have any internet access during the lab,
Protocolo HTTP. Web and HTTP. HTTP overview. HTTP overview
Web and HTTP Protocolo HTTP Web page consists of objects Object can be HTML file, JPEG image, Java applet, audio file, Web page consists of base HTML-file which includes several referenced objects Each
Hacker Intelligence Initiative, Monthly Trend Report #17
Sept 2013 Hacker Intelligence Initiative, Monthly Trend Report #17 PHP SuperGlobals: Supersized Trouble 1. Executive Summary For a while now, the ADC research group has been looking into the implication
Configuring CQ Security
Configuring CQ Security About Me CQ Architect for Inside Solutions http://inside-solutions.ch CQ Blog: http://cqblog.inside-solutions.ch Customer Projects with Adobe CQ Training Material on Adobe CQ Agenda
CORPORATE AV / EPP COMPARATIVE ANALYSIS
CORPORATE AV / EPP COMPARATIVE ANALYSIS Exploit Evasion Defenses 2013 Randy Abrams, Dipti Ghimire, Joshua Smith Tested Vendors AVG, ESET, F- Secure, Kaspersky, McAfee, Microsoft, Norman, Panda, Sophos,
1. When will an IP process drop a datagram? 2. When will an IP process fragment a datagram? 3. When will a TCP process drop a segment?
Questions 1. When will an IP process drop a datagram? 2. When will an IP process fragment a datagram? 3. When will a TCP process drop a segment? 4. When will a TCP process resend a segment? CP476 Internet
Out of the Fire - Adding Layers of Protection When Deploying Oracle EBS to the Internet
Out of the Fire - Adding Layers of Protection When Deploying Oracle EBS to the Internet March 8, 2012 Stephen Kost Chief Technology Officer Integrigy Corporation Phil Reimann Director of Business Development
Barracuda Web Application Firewall vs. Intrusion Prevention Systems (IPS) Whitepaper
Barracuda Web Application Firewall vs. Intrusion Prevention Systems (IPS) Whitepaper Securing Web Applications As hackers moved from attacking the network to attacking the deployed applications, a category
Uploaded images filter evasion for carrying out XSS attacks
February 25, 2007 Uploaded images filter evasion for carrying out XSS attacks Digitаl Security Research Group (DSecRG) Alexander Polyakov [email protected] http://dsecrg.ru Table of contents Introduction...3
Anatomy of a Pass-Back-Attack: Intercepting Authentication Credentials Stored in Multifunction Printers
Anatomy of a Pass-Back-Attack: Intercepting Authentication Credentials Stored in Multifunction Printers By Deral (PercX) Heiland and Michael (omi) Belton Over the past year, one focus of the Foofus.NET
No. Time Source Destination Protocol Info 1190 131.859385 128.238.245.34 128.119.245.12 HTTP GET /ethereal-labs/http-ethereal-file1.html HTTP/1.
Ethereal Lab: HTTP 1. The Basic HTTP GET/response interaction 1190 131.859385 128.238.245.34 128.119.245.12 HTTP GET /ethereal-labs/http-ethereal-file1.html HTTP/1.1 GET /ethereal-labs/http-ethereal-file1.html
What is Web Security? Motivation
[email protected] http://www.brucker.ch/ Information Security ETH Zürich Zürich, Switzerland Information Security Fundamentals March 23, 2004 The End Users View The Server Providers View What is Web
Bypassing Web Application Firewalls (WAFs) Ing. Pavol Lupták, CISSP, CEH Lead Security Consultant
Bypassing Web Application Firewalls (WAFs) Ing. Pavol Lupták, CISSP, CEH Lead Security Consultant Nethemba All About Security Highly experienced certified IT security experts (CISSP, C EH, SCSecA) Core
The Wide World of WAFs
The Wide World of WAFs Ben Feinstein, CISSP GCFA SecureWorks Counter Threat Unit DEFCON 16 August 8, 2008 What s In This Talk? Web Application Firewalls (WAFs) PCI Data Security Standard Requirement 6.6
CTIS 256 Web Technologies II. Week # 1 Serkan GENÇ
CTIS 256 Web Technologies II Week # 1 Serkan GENÇ Introduction Aim: to be able to develop web-based applications using PHP (programming language) and mysql(dbms). Internet is a huge network structure connecting
The SQL Injection and Signature Evasion
The SQL Injection and Signature Evasion Protecting Web Sites Against SQL Injection SQL injection is one of the most common attack strategies employed by attackers to steal identity and other sensitive
GET /FB/index.html HTTP/1.1 Host: lmi32.cnam.fr
GET /FB/index.html HTTP/1.1 Host: lmi32.cnam.fr HTTP/1.1 200 OK Date: Thu, 20 Oct 2005 14:42:54 GMT Server: Apache/2.0.50 (Linux/SUSE) Last-Modified: Thu, 20 Oct 2005 14:41:56 GMT ETag: "2d7b4-14b-8efd9500"
Information Supplement: Requirement 6.6 Code Reviews and Application Firewalls Clarified
Standard: Data Security Standard (DSS) Requirement: 6.6 Date: February 2008 Information Supplement: Requirement 6.6 Code Reviews and Application Firewalls Clarified Release date: 2008-04-15 General PCI
Web Application Threats and Vulnerabilities Web Server Hacking and Web Application Vulnerability
Web Application Threats and Vulnerabilities Web Server Hacking and Web Application Vulnerability WWW Based upon HTTP and HTML Runs in TCP s application layer Runs on top of the Internet Used to exchange
ASL IT SECURITY BEGINNERS WEB HACKING AND EXPLOITATION
ASL IT SECURITY BEGINNERS WEB HACKING AND EXPLOITATION V 2.0 A S L I T S e c u r i t y P v t L t d. Page 1 Overview: Learn the various attacks like sql injections, cross site scripting, command execution
DEERFIELD.COM. DNS2Go Update API. DNS2Go Update API
DEERFIELD.COM DNS2Go Update API DNS2Go Update API DEERFIELD.COM PRODUCT DOCUMENTATION DNS2Go Update API Deerfield.com 4241 Old U.S. 27 South Gaylord, MI 49686 Phone 989.732.8856 Email [email protected]
SQL injection: Not only AND 1=1. The OWASP Foundation. Bernardo Damele A. G. Penetration Tester Portcullis Computer Security Ltd
SQL injection: Not only AND 1=1 Bernardo Damele A. G. Penetration Tester Portcullis Computer Security Ltd [email protected] +44 7788962949 Copyright Bernardo Damele Assumpcao Guimaraes Permission
WAFFle: Fingerprinting Filter Rules of Web Application Firewalls
Email: [email protected] Twitter: @seecurity WAFFle: Fingerprinting Filter Rules of Web Application Firewalls Isabell Schmitt, Sebastian Schinzel* Friedrich-Alexander Universität Erlangen-Nürnberg
Avactis PHP Shopping Cart (www.avactis.com) Full Disclosure
12/04/16 [email protected] Avactis PHP Shopping Cart (www.avactis.com) Full Disclosure Performers: Maurizio Abdel Adim Oisfi - [email protected] Andrei Manole - [email protected] Luca Milano
Barracuda Intrusion Detection and Prevention System
Providing complete and comprehensive real-time network protection Today s networks are constantly under attack by an ever growing number of emerging exploits and attackers using advanced evasion techniques
NSFOCUS Web Application Firewall White Paper
White Paper NSFOCUS Web Application Firewall White Paper By NSFOCUS White Paper - 2014 NSFOCUS NSFOCUS is the trademark of NSFOCUS Information Technology Co., Ltd. NSFOCUS enjoys all copyrights with respect
Príprava štúdia matematiky a informatiky na FMFI UK v anglickom jazyku
Univerzita Komenského v Bratislave Fakulta matematiky, fyziky a informatiky Príprava štúdia matematiky a informatiky na FMFI UK v anglickom jazyku ITMS: 26140230008 dopytovo orientovaný projekt Moderné
Internet Technologies. World Wide Web (WWW) Proxy Server Network Address Translator (NAT)
Internet Technologies World Wide Web (WWW) Proxy Server Network Address Translator (NAT) What is WWW? System of interlinked Hypertext documents Text, Images, Videos, and other multimedia documents navigate
EVADING ALL WEB-APPLICATION FIREWALLS XSS FILTERS
EVADING ALL WEB-APPLICATION FIREWALLS XSS FILTERS SEPTEMBER 2015 MAZIN AHMED [email protected] @MAZEN160 Table of Contents Topic Page Number Abstract 3 Introduction 3 Testing Environment 4 Products
Sticky Session Setup and Troubleshooting
1 Sticky Session Setup and Troubleshooting Day, Date, 2004 time p.m. ET Teleconference Access: US & Canada: 888-259-4812 Teleconference Access: North America: xxxx Toll Number: 706-679-4880 International:
