Secure in 2010? Broken in 2011!
|
|
|
- Brice Francis
- 10 years ago
- Views:
Transcription
1 Secure in 2010? Broken in 2011! Matias Madou Principal Security Researcher Abstract In 2010, a security research firm stumbled on a couple of vulnerabilities in Apache OFBiz, a widely used open source enterprise automation software project. As a proof of concept, it posted a video showing how easy it was to become an administrator exploiting one of the XSS issues in the application. To remain credible, the OFBiz team was forced to invest in security. In fact, as a result of digging into its bug database, the OFBiz team gathered security knowledge from different sources to make its product better, and made a big push to resolve the known issues in early Barely a year later, the exact same code base thought to be secure is again seriously broken. This scenario actually occurs quite frequently for several reasons. In this Whitepaper, we discuss: The experiment The test application What s new in 2011 o New vulnerabilities o New assessment techniques Continued testing Conclusion 1
2 The experiment While investigating our gray-box analysis technique, we wanted to gather some empirical data to prove that we were taking a new approach to finding security issues. After choosing our test application and beginning our investigation, we actually found more interesting results than what we had expected. We also wound up conducting a white-box and black analysis to find out more about the security of the application, and how that compared to the state of the application only a year ago. The test application We looked for an application which was written in Java or.net without taking the underlying packages into consideration. Most importantly, we had to choose an application that was widely used and one in which security improvements had been implemented. After evaluating a dozen open source Enterprise Resource Planning (ERP) and/or Customer Relationship Management (CRM) packages, we chose the widely used Apache OFBiz for our experiment. Apache OFBiz is ranked the #1 Open Source ERP Software Application 1, and we saw additional value in Apache OFBiz for various reasons. First of all, a long list of well known end users like flowers, Olympus.de, united.com and bt.com are using this software. But on top of that, the framework itself is used in various other products and projects. One of the most known ERP/CRM solutions based on Apache OFBiz is OpenTabs, which is used by enterprises like Toyota and HoneyWell. Needless to say our test application is well used and integrated in today s businesses
3 The security of the Apache OFBiz solution seemed to have undergone some scrutiny. By searching the web, it becomes clear that numerous vulnerabilities like XSS were reported and fixed from early on in the Apache OFBiz history. The most notable security incident was in 2010 when a security research firm discovered a couple of vulnerabilities in Apache OFBiz and posted a proof of concept video showing how easy it was to become an administrator exploiting one of the XSS issues in the application. The OFBiz team took action and fixed the security issues. In fact, as a result of digging into its bug database, the OFBiz team gathered security knowledge from different sources to make its product better, and made a push to resolve the known issues in early So from a security perspective, the application we ve taken for our experiment has undergone security improvements. What s new in 2011? Both white hats and black hats seem to be coming up with new ways to break applications. In most cases, new rules can be added to current assessment techniques to find these new categories of vulnerabilities. Here, we ll discuss a problem found in the SUN JVM which can lead to a Denial-of-Service. a) New vulnerabilities 2011 had barely begun when a problem was discovered in the SUN JVM. CVE points out that the Java Runtime Environment hangs when converting e-308 to a binary floating-point number. More concrete, when the mentioned value is given as the first parameter in the API Double.parseDouble(param1), the JVM goes in to an infinite loop as it is oscillating between DBL_MIN (0x1p- 1022), and the largest subnormal double-precision floating-point number (0x0.fffffffffffffp-1022) 2. While chances are fairly slim that this value appears in regular java applications, it s obvious that an attacker can inject this special value in the right place in order to hang the application. Interestingly enough, this problem was not reported for the first time in Dating back as early as 2001, there were bugs revealing this problem. At that time, the bug was not considered a 4-low priority, as its consequences were not well understood. When it became clear that application servers like Apache Tomcat were remotely vulnerable-- regardless of the web applications they were running, the bug got fixed in record time. Second, new assessment techniques can find more of the same. Where the typical white-box and black-box techniques can find a big chunk of the vulnerabilities, a novel assessment technique called gray-box analysis takes the best of both worlds and finds additional exploits. We ll also discuss how the new gray-box analysis finds exploits of well known vulnerability categories. While the root cause of this problem lies in the SUN JVM, some enterprise environments cannot quickly upgrade to the latest JVM. These enterprises must also rely on other mechanisms to reduce their exposure. As most enterprises already use WAF technology, new rules can be added to protect against this type of attack. However, as always, it s important not to forget any pattern. As the CVE only mentions e-308, it s incorrect to only protect against this pattern. The rule should also protect against e-307 up till Some comments on the web also suggested that there are other tiny values that can trigger this behavior too, so how to protect against these? 2 3
4 A second way to remediate is patching the exposed applications. The Apache Tomcat problem was quickly remediated by pushing out a fixed 5.5, 6.0 and 7.0 version. The solution is a white-listing approach, where they only accept strings with a certain length, making it impossible for the magic value to go in the infinite loop. Now, when looking in Apache OFBiz, we found numerous of these problems using different analysis techniques. Doing a simple grep of Double.parseDouble on the Apache OFBiz application reveals the API is used some 25 times. However, that does not say anything about the actual paths from a source which can be used by an attacker to a vulnerable sink. By means of static analysis, (white-box analysis), such smarter analysis can be done. We scanned the code and found many of these paths. For example, check out Figure 1: there is an analysis trace from the Input class to the ShoppingCartItem. As static analysis points out, paths that are possible in theory, doesn t mean they can be taken in practice. In this case, however, the analysis trace can be executed in practice as well. Figure 1: Example of a ShoppingCartItem While static analysis does not have the show-me factor, penetration testing tools (black-box analysis) do. When attacking Apache OFBiz with a penetration testing tool configured to find the Denial-of-Service problems, the penetration testing tool takes the application down pretty quickly. As such, there is plenty of opportunity to launch a Denial-of-Service attack by exploiting this problem. A list of example URLs: fycart (update_0, update_1, ) em/showcart (quantity, add_product_id) em/quickadd (quantity) em/keywordsearch (quantity) em/advancedsearch (quantity) em/showpromotiondetails (quantity) em/product (quantity,add_amount) em/lastviewedproduct (update_0) em/showforum (quantity) em/category (quantity) em/main (quantity) em (quantity) em/setdesiredalternategwpproductid ( ) 4
5 b) New assessment techniques Black-box analysis such as penetration testing and whitebox analysis such as static analysis are common these days as enterprises take security seriously. The strength of Black-box analysis is the evidence such tool can provide to show that an issue is exploitable and the application is really broken. The weakness of such tool is it fails to find inputs to test all the executable paths through the application which results in testing only a portion of the application instead of the entire application. White-box analysis strength and weakness are just the other way around: the analysis is thorough while lacking the convincing aspect of why an issue should really be fixed. Gray-box analysis is about marrying the two analyses techniques and overcoming each other s weaknesses. The goal is to find more issues and fix the issues faster. To find more issues, white-box techniques are used to make sure the coverage is satisfying. To fix issues faster, information from inside and outside the application is given to prove that the issue is real and information is provided as to where the issue can be fixed. Gray-box analysis starts off as black-box analysis where attacks are sent out to a running application. In addition, a monitor component is installed in the running application which observes the incoming attacks and the execution of the application. We call the attacking component the Dynamic Analysis and the runtime component the Real- Time Analysis. By observing the executed code, the monitor can give real time feedback to the Dynamic Analysis that is attacking the application. In essence, the Real-Time Analysis component can give multiple hints to the Dynamic Analyzer. First, the Real- Time Analyzer can tell the Dynamic Analyzer the attack surface. It may be the case that not all pages in the application have a link from the main application. Normal black-box analysis has a minimal chance of penetrating these hidden pages. Now, with gray-box analysis, it s trivial for the monitor to tell about these pages which we call the attack surface. Second, the Real-Time Analyzer can describe the exact consequence of an attack performed by the Dynamic Analyzer, while in a black-box analysis scenario, the success of an attack was determined based on what,(if anything at all), was coming back to the black-box analyzer. Now, the Real-Time Analyzer knows if an attack was successful or not, and can transfer that piece of information back to the Dynamic Analyzer. In the case of our test application, Apache OFBiz, we analyzed the increase in attack surface, the effect of this increase on the findings, and the number of findings in general compared to pure black analysis. First, it was obvious that the number of scanned directories improved dramatically. The number of scanned directories was 3.5Xpure black box analysis. These new directories were the direct reason of a dozen new Cross-Site Scripting (XSS) vulnerabilities in Apache OFBiz. Where the pure black-box analysis didn t find the webslinger directory, the graybox analysis did scan this directory and found five new XSS issues. From an attacker perspective, at least five new URLs could be created to get the XSS in the webslinger directory. However, with the information we saw in the Real-Time Analyzer component, the analyzer determined that all five issues had one root cause in the code. Now, really detailed information can be given back to the developer to fix this problem. In gray-box analysis, the five URLs together with line of code details where the problem occurs in the application can be transferred to the developer. In this case, the developer fixing this problem in the code has to fix one root issue in code and will as such reduce the exposure of the application to XSS by five issues. 5
6 Continues testing Let s come back to the root question, how could the team working on this application prevent the application being broken in 2011? The only solution is continuous, automated testing of the application, even if that application s code is frozen and in production. Companies with a good security initiative do continuous testing of their applications while they are under development, however, once someone signs off for the security in the applications and they are in production, the applications may go out of that cycle of continuous testing. From that moment on, companies rely on bandages in the form of a WAF to fix problems when they appear. In most cases, the code is fixed when breached, so the code is always patched too late. Conclusion Applications in production need continuous, automated testing with the latest security knowledge. When a new vulnerability comes to light, it s important to scan the applications in production for these problems. Similarly, when analysis techniques are available which take a different approach, it may be a good idea to scan the applications in production to see if they have kept up with the latest vulnerability finding techniques. The attackers can use these techniques too, which means they know more about the applications you re running! 6
7 About the author Matias Madou is Principal Security Researcher for HP Enterprise Security Products (former Fortify). He works on technical projects, ranging from kicking off an insider threat project, to spearheading new protection mechanisms in the runtime tools, to leading the correlation and integration of current HP Fortify security solutions and has been instrumental in defining and refining the HP Fortify solutions offerings. When he s away from his desk, he s serving as an instructor to advanced training courses, helping the field on short notice or presenting at anchor industry conferences including: DefCon, RSA, BruCon, Owasp, and more. He holds a Ph.D. in computer engineering from Ghent University, where he studied application security through program obfuscation to hide the inner workings of an application. During his Ph.D., he collaborated with top research and industry players in the field of program obfuscation, which has helped mold the research he continues to work on today. References Real-Time Hybrid Analysis: Find More, Fix Faster by Brian Chess 7
Secure in 2010? Broken in 2011! Matias Madou, PhD Principal Security Researcher
Secure in 2010? Broken in 2011! Matias Madou, PhD Principal Security Researcher Matias Madou Principal Security Researcher, Fortify an HP Company Static Analysis Rules Insider Threat Research Runtime products:
Real-time hybrid analysis:
Real-time hybrid : Find more, fix faster Technology white paper Brian Chess, Ph.D., Distinguished Technologist, HP Founder and Chief Scientist, HP Fortify Summary Real-time hybrid marks a substantial evolution
Adobe Systems Incorporated
Adobe Connect 9.2 Page 1 of 8 Adobe Systems Incorporated Adobe Connect 9.2 Hosted Solution June 20 th 2014 Adobe Connect 9.2 Page 2 of 8 Table of Contents Engagement Overview... 3 About Connect 9.2...
IMPROVING VULNERABILITY MANAGEMENT EFFECTIVENESS WITH APPLICATION SECURITY MONITORING
IMPROVING VULNERABILITY MANAGEMENT EFFECTIVENESS WITH APPLICATION SECURITY How runtime application security monitoring helps enterprises make smarter decisions on remediation 2 ABSTRACT Enterprises today
Black Box versus White Box: Different App Testing Strategies John B. Dickson, CISSP
Black Box versus White Box: Different App Testing Strategies John B. Dickson, CISSP Learning objectives for today s session Understand different types of application assessments and how they differ Be
white SECURITY TESTING WHITE PAPER
white SECURITY TESTING WHITE PAPER Contents: Introduction...3 The Need for Security Testing...4 Security Scorecards...5 Test Approach... 11 Framework... 16 Project Initiation Process... 17 Conclusion...
Integrated Network Vulnerability Scanning & Penetration Testing SAINTcorporation.com
SAINT Integrated Network Vulnerability Scanning and Penetration Testing www.saintcorporation.com Introduction While network vulnerability scanning is an important tool in proactive network security, penetration
Adobe ColdFusion. Secure Profile Web Application Penetration Test. July 31, 2014. Neohapsis 217 North Jefferson Street, Suite 200 Chicago, IL 60661
Adobe ColdFusion Secure Profile Web Application Penetration Test July 31, 2014 Neohapsis 217 North Jefferson Street, Suite 200 Chicago, IL 60661 Chicago Dallas This document contains and constitutes the
Learning objectives for today s session
Black Box versus White Box: Different App Testing Strategies John B. Dickson, CISSP Learning objectives for today s session Understand what a black box and white box assessment is and how they differ Identify
WEB APPLICATION VULNERABILITY STATISTICS (2013)
WEB APPLICATION VULNERABILITY STATISTICS (2013) Page 1 CONTENTS Contents 2 1. Introduction 3 2. Research Methodology 4 3. Summary 5 4. Participant Portrait 6 5. Vulnerability Statistics 7 5.1. The most
SAST, DAST and Vulnerability Assessments, 1+1+1 = 4
SAST, DAST and Vulnerability Assessments, 1+1+1 = 4 Gordon MacKay Digital Defense, Inc. Chris Wysopal Veracode Session ID: Session Classification: ASEC-W25 Intermediate AGENDA Risk Management Challenges
National Endowment for the Arts Evaluation Report. Table of Contents. Results of Evaluation... 1. Areas for Improvement... 2. Exit Conference...
NEA OIG Report No. R-13-03 Table of Contents Results of Evaluation... 1 Areas for Improvement... 2 Area for Improvement 1: The agency should implement ongoing scanning to detect vulnerabilities... 2 Area
JBoss security: penetration, protection and patching. David Jorm [email protected]
JBoss security: penetration, protection and patching David Jorm [email protected] Contents The problem Background Historical vulnerabilities JBoss worm Security response for products The solution The Problem
Online Vulnerability Scanner Quick Start Guide
Online Vulnerability Scanner Quick Start Guide Information in this document is subject to change without notice. Companies, names, and data used in examples herein are fictitious unless otherwise noted.
ETHICAL HACKING 010101010101APPLICATIO 00100101010WIRELESS110 00NETWORK1100011000 101001010101011APPLICATION0 1100011010MOBILE0001010 10101MOBILE0001
001011 1100010110 0010110001 010110001 0110001011000 011000101100 010101010101APPLICATIO 0 010WIRELESS110001 10100MOBILE00010100111010 0010NETW110001100001 10101APPLICATION00010 00100101010WIRELESS110
Application Security Testing How to find software vulnerabilities before you ship or procure code
Application Security Testing How to find software vulnerabilities before you ship or procure code Anita D Amico, Ph.D. Hassan Radwan 1 Overview Why Care About Application Security? Quality vs Security
KASPERSKY SECURITY INTELLIGENCE SERVICES. EXPERT SERVICES. www.kaspersky.com
KASPERSKY SECURITY INTELLIGENCE SERVICES. EXPERT SERVICES www.kaspersky.com EXPERT SERVICES Expert Services from Kaspersky Lab are exactly that the services of our in-house experts, many of them global
JavaScript static security analysis made easy with JSPrime
JavaScript static security analysis made easy with JSPrime Nishant Das Patnaik & Sarathi Sabyasachi Sahoo [email protected] & [email protected] JavaScript is the lingua-franca of Web 2.0 and, recently,
From the Bottom to the Top: The Evolution of Application Monitoring
From the Bottom to the Top: The Evolution of Application Monitoring Narayan Makaram, CISSP Director, Security Solutions HP/Enterprise Security Business Unit Session ID: SP01-202 Session 2012 Classification:
Application Code Development Standards
Application Code Development Standards Overview This document is intended to provide guidance to campus system owners and software developers regarding secure software engineering practices. These standards
Interactive Application Security Testing (IAST)
WHITEPAPER Interactive Application Security Testing (IAST) The World s Fastest Application Security Software Software affects virtually every aspect of an individual s finances, safety, government, communication,
Application Security Testing. Erez Metula (CISSP), Founder Application Security Expert [email protected]
Application Security Testing Erez Metula (CISSP), Founder Application Security Expert [email protected] Agenda The most common security vulnerabilities you should test for Understanding the problems
eguide: Designing a Continuous Response Architecture 5 Steps For Windows Server 2003 End of Life Success
: Designing a Continuous Response Architecture 5 Steps For Windows Server 2003 End of Life Success FAST FACTS Over 10 Million Windows Server 2003 Devices Still In Use Less Than 250 Days To Windows Server
Columbia University Web Security Standards and Practices. Objective and Scope
Columbia University Web Security Standards and Practices Objective and Scope Effective Date: January 2011 This Web Security Standards and Practices document establishes a baseline of security related requirements
Why Your SIEM Isn t Adding Value And Why It May Not Be The Tool s Fault. Best Practices Whitepaper June 18, 2014
Why Your SIEM Isn t Adding Value And Why It May Not Be The Tool s Fault Best Practices Whitepaper June 18, 2014 2 Table of Contents LIVING UP TO THE SALES PITCH... 3 THE INITIAL PURCHASE AND SELECTION
Assuring Application Security: Deploying Code that Keeps Data Safe
Assuring Application Security: Deploying Code that Keeps Data Safe Assuring Application Security: Deploying Code that Keeps Data Safe 2 Introduction There s an app for that has become the mantra of users,
2015 Vulnerability Statistics Report
2015 Vulnerability Statistics Report Introduction or bugs in software may enable cyber criminals to exploit both Internet facing and internal systems. Fraud, theft (financial, identity or data) and denial-of-service
Introduction: 1. Daily 360 Website Scanning for Malware
Introduction: SiteLock scans your website to find and fix any existing malware and vulnerabilities followed by using the protective TrueShield firewall to keep the harmful traffic away for good. Moreover
The Web AppSec How-to: The Defenders Toolbox
The Web AppSec How-to: The Defenders Toolbox Web application security has made headline news in the past few years. Incidents such as the targeting of specific sites as a channel to distribute malware
OWASP Top Ten Tools and Tactics
OWASP Top Ten Tools and Tactics Russ McRee Copyright 2012 HolisticInfoSec.org SANSFIRE 2012 10 JULY Welcome Manager, Security Analytics for Microsoft Online Services Security & Compliance Writer (toolsmith),
Passing PCI Compliance How to Address the Application Security Mandates
Passing PCI Compliance How to Address the Application Security Mandates The Payment Card Industry Data Security Standards includes several requirements that mandate security at the application layer. These
NETWORK PENETRATION TESTS FOR EHR MANAGEMENT SOLUTIONS PROVIDER
A C a s e s t u d y o n h o w Z e n Q h a s h e l p e d a L e a d i n g K - 1 2 E d u c a t i o n & L e a r n i n g S o l u t i o n s P r o v i d e r i n U S g a u g e c a p a c i t y o f t h e i r f l
5 Reasons Why Your Security Education Program isn t Working (and how to fix it)
5 Reasons Why Your Security Education Program isn t Working (and how to fix it) February 2015 Presentation Agenda 5 Reasons Your Program isn t Working 10 Learning Science Principles Continuous Training
Business white paper. Missioncritical. defense. Creating a coordinated response to application security attacks
Business white paper Missioncritical defense Creating a coordinated response to application security attacks Table of contents 3 Your business is under persistent attack 4 Respond to those attacks seamlessly
Web Application Report
Web Application Report This report includes important security information about your Web Application. OWASP Top Ten 2010 The Ten Most Critical Web Application Report This report was created by IBM Rational
Mean Time to Fix (MTTF) IT Risk s Dirty Little Secret Joe Krull, CPP, CISSP, IAM, CISA, A.Inst.ISP, CRISC, CIPP
Mean Time to Fix (MTTF) IT Risk s Dirty Little Secret Joe Krull, CPP, CISSP, IAM, CISA, A.Inst.ISP, CRISC, CIPP Presentation Overview Basic Application Security (AppSec) Fundamentals Risks Associated With
From Rivals to BFF: WAF & VA Unite OWASP 07.23.2009. The OWASP Foundation http://www.owasp.org
From Rivals to BFF: WAF & VA Unite 07.23.2009 Brian Contos, Chief Security Strategist Imperva Inc. [email protected] +1 (650) 832.6054 Copyright The Foundation Permission is granted to copy, distribute
Using Nessus In Web Application Vulnerability Assessments
Using Nessus In Web Application Vulnerability Assessments Paul Asadoorian Product Evangelist Tenable Network Security [email protected] About Tenable Nessus vulnerability scanner, ProfessionalFeed
labs Attacking JAVA Serialized Communication By: Manish S. Saindane
ATTACK & DEFENSE labs Attacking JAVA Serialized Communication By: Manish S. Saindane Black Hat Europe 2010 2 Introduction Many applications written in JAVA make use of Object Serialization to transfer
Kenna Platform Security. A technical overview of the comprehensive security measures Kenna uses to protect your data
Kenna Platform Security A technical overview of the comprehensive security measures Kenna uses to protect your data V2.0, JULY 2015 Multiple Layers of Protection Overview Password Salted-Hash Thank you
How To Test For Security On A Network Without Being Hacked
A Simple Guide to Successful Penetration Testing Table of Contents Penetration Testing, Simplified. Scanning is Not Testing. Test Well. Test Often. Pen Test to Avoid a Mess. Six-phase Methodology. A Few
Secure Web Application Coding Team Introductory Meeting December 1, 2005 1:00 2:00PM Bits & Pieces Room, Sansom West Room 306 Agenda
Secure Web Application Coding Team Introductory Meeting December 1, 2005 1:00 2:00PM Bits & Pieces Room, Sansom West Room 306 Agenda 1. Introductions for new members (5 minutes) 2. Name of group 3. Current
Application security testing: Protecting your application and data
E-Book Application security testing: Protecting your application and data Application security testing is critical in ensuring your data and application is safe from security attack. This ebook offers
Magento Security and Vulnerabilities. Roman Stepanov
Magento Security and Vulnerabilities Roman Stepanov http://ice.eltrino.com/ Table of contents Introduction Open Web Application Security Project OWASP TOP 10 List Common issues in Magento A1 Injection
RACK911 Labs. Year in Review. May 6, 2014
RACK911 Labs Year in Review May 6, 014 The security of the hosting industry has always been a concern of RACK911 and in May of 013 we decided to take a more proactive role by creating a new brand called
Web Application Threats and Vulnerabilities Web Server Hacking and Web Application Vulnerability
Web Application Threats and Vulnerabilities Web Server Hacking and Web Application Vulnerability WWW Based upon HTTP and HTML Runs in TCP s application layer Runs on top of the Internet Used to exchange
What Do You Mean My Cloud Data Isn t Secure?
Kaseya White Paper What Do You Mean My Cloud Data Isn t Secure? Understanding Your Level of Data Protection www.kaseya.com As today s businesses transition more critical applications to the cloud, there
THE BLIND SPOT IN THREAT INTELLIGENCE THE BLIND SPOT IN THREAT INTELLIGENCE
THE BLIND SPOT IN THREAT INTELLIGENCE THE BLIND SPOT IN THREAT INTELLIGENCE How application threat intelligence can make existing enterprise security infrastructures smarter THE BLIND SPOT IN THREAT INTELLIGENCE
Web App Security Audit Services
locuz.com Professional Services Web App Security Audit Services The unsecured world today Today, over 80% of attacks against a company s network come at the Application Layer not the Network or System
Braindumps.C2150-810.50 questions
Braindumps.C2150-810.50 questions Number: C2150-810 Passing Score: 800 Time Limit: 120 min File Version: 5.3 http://www.gratisexam.com/ -810 IBM Security AppScan Source Edition Implementation This is the
WHITEPAPER. Nessus Exploit Integration
Nessus Exploit Integration v2 Tenable Network Security has committed to providing context around vulnerabilities, and correlating them to other sources, such as available exploits. We currently pull information
Countering The Faults Of Web Scanners Through Byte-code Injection
Countering The Faults Of Web Scanners Through Byte-code Injection Introduction Penetration testing, web application scanning, black box security testing these terms all refer to a common technique of probing
Scanless Vulnerability Assessment. A Next-Generation Approach to Vulnerability Management
Scanless Vulnerability Assessment A Next-Generation Approach to Vulnerability Management WHITEPAPER Overview Vulnerability scanning, or the process of identifying a list of known security gaps in the network
Bernardus. adventures in SEO land
Bernardus adventures in SEO land adventures in SEO land Page 2 of 7 the most asked question of my life? Why would anyone attend a SEO seminar? Just search for SEO tip and Google will return over 74 million
SAFECode Security Development Lifecycle (SDL)
SAFECode Security Development Lifecycle (SDL) Michael Howard Microsoft Matthew Coles EMC 15th Semi-annual Software Assurance Forum, September 12-16, 2011 Agenda Introduction to SAFECode Security Training
Coverity Scan. Big Data Spotlight
Coverity Scan Big Data Spotlight Coverity Scan Service The Coverity Scan service began as the largest public-private sector research project in the world focused on open source software quality and security.
Application Security Testing. Generic Test Strategy
Application Security Testing Generic Test Strategy Page 2 of 8 Contents 1 Introduction 3 1.1 Purpose: 3 1.2 Application Security Testing: 3 2 Audience 3 3 Test Strategy guidelines 3 3.1 Authentication
STABLE & SECURE BANK lab writeup. Page 1 of 21
STABLE & SECURE BANK lab writeup 1 of 21 Penetrating an imaginary bank through real present-date security vulnerabilities PENTESTIT, a Russian Information Security company has launched its new, eighth
HP Fortify Application Security Lucas v. Stockhausen PreSales Manager HP Fortify EMEA [email protected] +49 1520 1898430 Enterprise Security
HP Fortify Application Security Lucas v. Stockhausen PreSales Manager HP Fortify EMEA [email protected] +49 1520 1898430 Enterprise Security The problem Cyber attackers are targeting applications
Application Layer Encryption: Protecting against Application Logic and Session Theft Attacks. Whitepaper
Application Layer Encryption: Protecting against Application Logic and Session Theft Attacks Whitepaper The security industry has extensively focused on protecting against malicious injection attacks like
Penetration Testing: Lessons from the Field
Penetration Testing: Lessons from the Field CORE SECURITY TECHNOLOGIES SCS SERVICES May 2009 1 Agenda: About me: Alberto Soliño Director of Security Consulting Services at Core Security One of first five
Web application security: automated scanning versus manual penetration testing.
Web application security White paper January 2008 Web application security: automated scanning versus manual penetration testing. Danny Allan, strategic research analyst, IBM Software Group Page 2 Contents
3. Broken Account and Session Management. 4. Cross-Site Scripting (XSS) Flaws. Web browsers execute code sent from websites. Account Management
What is an? s Ten Most Critical Web Application Security Vulnerabilities Anthony LAI, CISSP, CISA Chapter Leader (Hong Kong) [email protected] Open Web Application Security Project http://www.owasp.org
Security Assessment of Waratek AppSecurity for Java. Executive Summary
Security Assessment of Waratek AppSecurity for Java Executive Summary ExecutiveSummary Security Assessment of Waratek AppSecurity for Java! Introduction! Between September and November 2014 BCC Risk Advisory
Penetration Testing Report Client: Business Solutions June 15 th 2015
Penetration Testing Report Client: Business Solutions June 15 th 2015 Acumen Innovations 80 S.W 8 th St Suite 2000 Miami, FL 33130 United States of America Tel: 1-888-995-7803 Email: [email protected]
Comparing Application Security Tools
Comparing Application Security Tools Defcon 15-8/3/2007 Eddie Lee Fortify Software Agenda Intro to experiment Methodology to reproduce experiment on your own Results from my experiment Conclusions Introduction
Threat Advisory: Accellion File Transfer Appliance Vulnerability
Threat Advisory: Accellion File Transfer Appliance Vulnerability Niara Threat Advisories provide timely information regarding new attacks along with how Niara helps companies quickly detect an attack to
CONTINUOUS DIAGNOSTICS BEGINS WITH REDSEAL
CONTINUOUS DIAGNOSTICS BEGINS WITH REDSEAL WHAT IS CDM? The continuous stream of high profile cybersecurity breaches demonstrates the need to move beyond purely periodic, compliance-based approaches to
Simple Steps to Securing Your SSL VPN
Simple Steps to Securing Your SSL VPN A five-point strategy for secure remote access Managing secure remote access is a tough job. Because remote systems may directly connect to the Internet rather than
Protect Your IT Infrastructure from Zero-Day Attacks and New Vulnerabilities
Protect Your IT Infrastructure from Zero-Day Attacks and New Vulnerabilities Protecting a business s IT infrastructure is complex. Take, for example, a retailer operating a standard multi-tier infrastructure
RESILIENT PRODUCT LIFECYCLE MANAGEMENT STRATEGIES & SOLUTIONS FOR FUTURE-PROOFING PLM
RESILIENT PRODUCT LIFECYCLE MANAGEMENT STRATEGIES & SOLUTIONS FOR FUTURE-PROOFING PLM PLM systems hit the wall when they can t adapt to evolving business requirements and / or when they hold your business
Only Athena provides complete command over these common enterprise mobility needs.
Mobile devices offer great potential for making your enterprise run faster, smarter, and more profitably. However, mobile devices can create considerable challenges for your IT organization, since they
Automating Security Testing. Mark Fallon Senior Release Manager Oracle
Automating Security Testing Mark Fallon Senior Release Manager Oracle Some Ground Rules There are no silver bullets You can not test security into a product Testing however, can help discover a large percentage
Penetration Test Report
Penetration Test Report Acme Test Company ACMEIT System 26 th November 2010 Executive Summary Info-Assure Ltd was engaged by Acme Test Company to perform an IT Health Check (ITHC) on the ACMEIT System
Penetration Testing Service. By Comsec Information Security Consulting
Penetration Testing Service By Consulting February, 2007 Background The number of hacking and intrusion incidents is increasing year by year as technology rolls out. Equally, there is no hiding place your
How to start a software security initiative within your organization: a maturity based and metrics driven approach OWASP
How to start a software security initiative within your organization: a maturity based and metrics driven approach Marco Morana OWASP Lead/ TISO Citigroup OWASP Application Security For E-Government Copyright
We protect you applications! No, you don t. Digicomp Hacking Day 2013 May 16 th 2013
We protect you applications! No, you don t Digicomp Hacking Day 2013 May 16 th 2013 Sven Vetsch Partner & CTO at Redguard AG www.redguard.ch Specialized in Application Security (Web, Web-Services, Mobile,
HP Application Security Center
HP Application Security Center Web application security across the application lifecycle Solution brief HP Application Security Center helps security professionals, quality assurance (QA) specialists and
Web application testing
CL-WTS Web application testing Classroom 2 days Testing plays a very important role in ensuring security and robustness of web applications. Various approaches from high level auditing through penetration
Reducing Application Vulnerabilities by Security Engineering
Reducing Application Vulnerabilities by Security Engineering - Subash Newton Manager Projects (Non Functional Testing, PT CoE Group) 2008, Cognizant Technology Solutions. All Rights Reserved. The information
White Paper THE FOUR ATTACK VECTORS TO PREVENT OR DETECT RETAILER BREACHES. By James Christiansen, VP, Information Risk Management
White Paper THE FOUR ATTACK VECTORS TO PREVENT OR DETECT RETAILER BREACHES By James Christiansen, VP, Information Risk Management Executive Summary Security breaches in the retail sector are becoming more
FIREWALLS & NETWORK SECURITY with Intrusion Detection and VPNs, 2 nd ed. Chapter 4 Finding Network Vulnerabilities
FIREWALLS & NETWORK SECURITY with Intrusion Detection and VPNs, 2 nd ed. Chapter 4 Finding Network Vulnerabilities Learning Objectives Name the common categories of vulnerabilities Discuss common system
IBM Rational AppScan: Application security and risk management
IBM Software Security November 2011 IBM Rational AppScan: Application security and risk management Identify, prioritize, track and remediate critical security vulnerabilities and compliance demands 2 IBM
North Dakota 2013 IT Security Audit Vulnerability Assessment & Penetration Test Project Briefing
North Dakota 2013 IT Security Audit Vulnerability Assessment & Penetration Test Project Briefing Introduction ManTech Project Manager Mark Shaw, Senior Executive Director Cyber Security Solutions Division
APPLICATION SECURITY: FROM WEB TO MOBILE. DIFFERENT VECTORS AND NEW ATTACK
APPLICATION SECURITY: FROM WEB TO MOBILE. DIFFERENT VECTORS AND NEW ATTACK John T Lounsbury Vice President Professional Services, Asia Pacific INTEGRALIS Session ID: MBS-W01 Session Classification: Advanced
Mobile Application Security Study
Report Mobile Application Security Study 2013 report Table of contents 3 Report Findings 4 Research Findings 4 Privacy Issues 5 Lack of Binary Protection 5 Insecure Data Storage 5 Transport Security 6
Introduction to Penetration Testing Graham Weston
Introduction to Penetration Testing Graham Weston March 2014 Agenda Introduction and background Why do penetration testing? Aims and objectives Approaches Types of penetration test What can be penetration
PCI-DSS and Application Security Achieving PCI DSS Compliance with Seeker
PCI-DSS and Application Security Achieving PCI DSS Compliance with Seeker www.quotium.com 1/14 Summary Abstract 3 PCI DSS Statistics 4 PCI DSS Application Security 5 How Seeker Helps You Achieve PCI DSS
CDM Vulnerability Management (VUL) Capability
CDM Vulnerability Management (VUL) Capability Department of Homeland Security Office of Cybersecurity and Communications Federal Network Resilience Vulnerability Management Continuous Diagnostics and Mitigation
ModSecurity as Universal Cross-platform Web Protection Tool
ModSecurity as Universal Cross-platform Web Protection Tool Ryan Barnett Greg Wroblewski Abstract For many years ModSecurity was a number one free open source web application firewall for the Apache web
