Devin Ford Latana Banks. Midterm Report



Similar documents
WEB SECURITY CONCERNS THAT WEB VULNERABILITY SCANNING CAN IDENTIFY

Web Application Vulnerability Testing with Nessus

3. Broken Account and Session Management. 4. Cross-Site Scripting (XSS) Flaws. Web browsers execute code sent from websites. Account Management

WordPress Security Scan Configuration

Conducting Web Application Pentests. From Scoping to Report For Education Purposes Only

(WAPT) Web Application Penetration Testing

Acunetix Web Vulnerability Scanner. Getting Started. By Acunetix Ltd.

Nessus Agents. October 2015

Secure Web Development Teaching Modules 1. Security Testing. 1.1 Security Practices for Software Verification

Source Code Review Using Static Analysis Tools

How to break in. Tecniche avanzate di pen testing in ambito Web Application, Internal Network and Social Engineering

Detecting Web Application Vulnerabilities Using Open Source Means. OWASP 3rd Free / Libre / Open Source Software (FLOSS) Conference 27/5/2008

ANDROID SECURITY ATTACKS AND DEFENSES ABHISHEK DUBEY I ANMOL MISRA. ( r öc) CRC Press VV J Taylor & Francis Group ^ "^ Boca Raton London New York

Secure Web Development Teaching Modules 1. Threat Assessment

Executive Summary On IronWASP

Enter Here -> Directory Submitter Software For One > Visit Here <

Installing and Configuring Nessus by Nitesh Dhanjani

Using Nessus In Web Application Vulnerability Assessments

Recon and Mapping Tools and Exploitation Tools in SamuraiWTF Report section Nick Robbins

Web applications. Web security: web basics. HTTP requests. URLs. GET request. Myrto Arapinis School of Informatics University of Edinburgh

HP WebInspect Tutorial

Web Vulnerability Scanner by Using HTTP Method

Acunetix Website Audit. 5 November, Developer Report. Generated by Acunetix WVS Reporter (v8.0 Build )

AlienVault Unified Security Management (USM) 4.x-5.x. Deploying HIDS Agents to Linux Hosts

Web Application Hacking (Penetration Testing) 5-day Hands-On Course

Comparing Application Security Tools

ArcGIS Server Security Threats & Best Practices David Cordes Michael Young

Web Application Report

STABLE & SECURE BANK lab writeup. Page 1 of 21

The purpose of this report is to educate our prospective clients about capabilities of Hackers Locked.

SANDCAT THE WEB APPLICATION SECURITY ASSESSMENT SUITE WHAT IS SANDCAT? MAIN COMPONENTS. Web Application Security

User Manual of the Pre-built Ubuntu Virutal Machine

ECE 4893: Internetwork Security Lab 12: Web Security

Web attacks and security: SQL injection and cross-site scripting (XSS)

Medical Device Security Health Imaging Digital Capture. Security Assessment Report for the Kodak Capture Link Server V1.00

PTSv2 in pills: The Best First for Beginners who want to become Penetration Testers. Self-paced, online, flexible access

Web Application Threats and Vulnerabilities Web Server Hacking and Web Application Vulnerability

WEB APPLICATION HACKING. Part 2: Tools of the Trade (and how to use them)

Adobe Systems Incorporated

NSFOCUS Web Vulnerability Scanning System

QualysGuard WAS. Getting Started Guide Version 3.3. March 21, 2014

Detecting and Defending Against Security Vulnerabilities for Web 2.0 Applications

Evaluation of Penetration Testing Software. Research

elearning for Secure Application Development

Penetration Testing. Types Black Box. Methods Automated Manual Hybrid. oless productive, more difficult White Box

SYWorks Vulnerable Web Applications Compilation For Penetration Testing Installation Guide

Application Code Development Standards

Web-Application Security

Magento Security and Vulnerabilities. Roman Stepanov

Web Security. Discovering, Analyzing and Mitigating Web Security Threats

The Top Web Application Attacks: Are you vulnerable?

Spigit, Inc. Web Application Vulnerability Assessment/Penetration Test. Prepared By: Accuvant LABS

What is Web Security? Motivation

AN OVERVIEW OF VULNERABILITY SCANNERS

Braindumps.C questions

Technical Proposal. In collaboration with Main Contractor. 24 th April 2012 (VER. 1.0) E-SPIN SDN BHD

Security Assessment through Google Tools -Focusing on the Korea University Website

Creating a DUO MFA Service in AWS

External Network & Web Application Assessment. For The XXX Group LLC October 2012

Introduction: 1. Daily 360 Website Scanning for Malware

How to hack a website with Metasploit

Web Application Security

WHITE PAPER. FortiWeb and the OWASP Top 10 Mitigating the most dangerous application security threats

Interactive Application Security Testing (IAST)

Penetration Testing. NTS330 Unit 1 Penetration V1.0. February 20, Juan Ortega. Juan Ortega, juaorteg@uat.edu. 1 Juan Ortega, juaorteg@uat.

User Manual of the Pre-built Ubuntu 9 Virutal Machine

CS 558 Internet Systems and Technologies

Online Vulnerability Scanner Quick Start Guide

The "Eclipse Classic" version is recommended. Otherwise, a Java or RCP version of Eclipse is recommended.

Medical Device Security Health Imaging Digital Capture. Security Assessment Report for the Kodak DR V2.0

Client logo placeholder XXX REPORT. Page 1 of 37

1 Recommended Readings. 2 Resources Required. 3 Compiling and Running on Linux

Web application security: Testing for vulnerabilities

OWASP AND APPLICATION SECURITY

Bust a cap in a web app with OWASP ZAP

ANNEXURE-1 TO THE TENDER ENQUIRY NO.: DPS/AMPU/MIC/1896. Network Security Software Nessus- Technical Details

Why Web Applications are making a hackers life easy. Presented by Jon Grew BT SBS

JOOMLA SECURITY. ireland website design. by Oliver Hummel. ADDRESS Unit 12D, Six Cross Roads Business Park, Waterford City

WebCruiser Web Vulnerability Scanner User Guide

JVA-122. Secure Java Web Development

Lesson 7 - Website Administration

Medical Device Security Health Imaging Digital Capture. Security Assessment Report for the Kodak CR V4.1

DISCOVERY OF WEB-APPLICATION VULNERABILITIES USING FUZZING TECHNIQUES

1. Introduction. 2. Web Application. 3. Components. 4. Common Vulnerabilities. 5. Improving security in Web applications

Application Security Testing

Using Free Tools To Test Web Application Security

Author: Sumedt Jitpukdebodin. Organization: ACIS i-secure. ID: My Blog:

Penetration Testing Report Client: Business Solutions June 15 th 2015

Pentests more than just using the proper tools

SparkLab May 2015 An Introduction to

Bank Hacking Live! Ofer Maor CTO, Hacktics Ltd. ATC-4, 12 Jun 2006, 4:30PM

Enterprise Application Security Workshop Series

Cloud Security:Threats & Mitgations

STOPPING LAYER 7 ATTACKS with F5 ASM. Sven Müller Security Solution Architect

Transcription:

Skipfish Devin Ford Latana Banks Midterm Report

2 Table of Contents Introduction to Skipfish pg.3 What we plan to do with Skipfish pg.3 Security Issues Skipfish focuses on pg.3-4 What we have completed pg. 4-6 (a) Installation process (b) Challenges we faced (c) Lessons learned pg.4-5 pg.5-6 pg.6 The hands on (a) The purpose of our lab (b) Description of Devin s lab (c) Description of Latana s lab The part of project that we are planning to do Future directions and/or conclusions pg.8 References/work cited pg.9

3 Introduction What is Skipfish? Skipfish is a new open source web application scanner, written in C programming, developed by Google. The goal of Skipfish is similar to the goals of previous web security hole scanners like Nmap and Nessus, it allows web developers to scan their application or site for possible security issues that may be lurking around. Skipfish can be used to determine if code is vulnerable to common attacks such as cross-site scripting (XSS), SQL, and XML injection attacks because it performs high risk flaw, medium risk flaw, and low issue scans.() After Skipfish completes its scan it prepares an interactive site-map for the targeted site by carrying out a recursive crawl and dictionary based probes. Skipfish is said to easily process over two thousand HTTP requests per second if the server being tested can handle the load. What we plan on doing The first task we must complete is that we must create a test application to run the web application scanner. To complete this task we used Google App Engine. Google App Engine is a form of cloud computing that allows you to run web application on Google s infrastructure. We used the eclipse development environment to develop our java application so we downloaded the Google plug-in for eclipse, which allows test and create App Engine application within eclipse. Once the web application is developed we then will the show how to run Skipfish on our application and document finding from the crawl results. Security Issues Skipfish focuses on

4 The security Issues Skipfish focuses on is those of website and web application on the internet and their insecure interfaces. As stated earlier Skipfish allows developer to scan their application for vulnerabilities. A vulnerability being any situation or condition that increases threat which in turn increases risk, the probability that something can happen. The significance of this tool is that developers do not have to wait and see if their application is vulnerable to an attack they can check for their selves. Once we know our weaknesses, they cease to do us any harm a quote by George Christoph Lichtenberg which we believe relates to Skipfish because it allows you to find the weakness in your application and perform the necessary safeguards to reduce it. What we have completed (a)the Installation process Skipfish requires that you use a Linux operating system so we downloaded Ubuntu and next had to download Skipfish. Other requirements where: GNU C Compiler, GNU Make, GNU C Library (including development header), Zlib (including development header), OpenSSL (including development header), and Libidn (including development header). 1. Once in the terminal type wget http://skipfish.googlecode.com/files/skipfish-

5 1.69b.tgz 2. Type zxvf Skipfish-1.69b to extract 3. Type cd Skipfish-1.69b to change to the Skipfish directory and then type nice make to compile What we have completed (b) Challenges we faced Throughout this project we faced several problems because one this was our first time using Ubuntu Linux and two first time using a web application scanner. The first problem we encountered was during the installation phase. While trying to compile Skipfish we kept

6 receiving the error, http_client.c:37:25: error: openssl/ssl.h: No such file or directory. After reading multiple forms it turned out that it was a fairly common problem even if your machine has a fairly good set of dependencies downloaded. There was a fix to our problem all we had to do was type sudo apt-get install libssl-dev build-essential zlibc zlib-bin libidn11-dev libidn11 and it acted as a catchall and we were able to compile Skipfish. The next problem we encountered was when we were trying to scan our test website. The original plan was to create a basic web page in HTML, transfer in to the internet using FileZilla, and scan it with Skipfish. The problem was once we transferred our web page to the internet using FAMU as a host it gave us the default address www.cis.famu.edu/~dford/website name. The problem with this is when trying to scan the website we received the error one of specified scan targets is not a valid absolute URL. The website was not a valid URL so as stated early in the report we then went to Google App Engine and created a test App and it was able to scan it just fine. What we have completed (c)lessons Learned One lessoned we learned from this experience is that if you are experiencing an error with a certain program you are probably the not the only person who has experienced that problem. There are forums available, via the internet for most programs and software and can greatly help you when it comes to trouble shooting. Another lesson was that in order to scan a web site with Skipfish you must use the absolute URL.

7 The Hands on (a) The purpose of our lab We will demonstrate how the scan works by creating a test web application and performing a scan. Demonstrate the use of the scan to our web application for possible security issues which might be lurking around. The Hands on (b) Devin s lab In This lab I will use the Google App Engine to create a web application that will be stored on Google s Infrastructure. The App will be called devinguestbook, and the URL will be devinguestbook.appspot.com/guestbook. The application will simply say hello and whatever your user name is you used to login. After the application is built I will demonstrate how to use Skipfish in order to check the application for vulnerabilities. The Hands on (c)latana s lab In This Lab I will use the Google Skipfish web application scanner to scan websites, document the finding and explain the crawl results. The part of our lab that we plan to do We plan to demonstrate both labs that we mentioned in the text above of the 21 of November.

8 Future direction and/or conclusions When using Skipfish remember that it is open source Google web application and site scanner and it is not a hundred percent accurate and it should not be the only security measure you deploy in protecting you web application or site, it should be coupled with other technologies.

9 Works Cited Google. (2010). Google App Engine. Retrieved November 13, 2011, from google code: http://code.google.com/appengine/docs/whatisgoogleappengine.html Google. (2010). Using the Google Plugin for Eclipse. Retrieved November 13, 2011, from Google Code: http://code.google.com/appengine/docs/java/tools/eclipse.html#installing_the_google_plugin_for_ecli pse Pronsc, M. (2010, March 22). Web Builder Zone. Retrieved November 15, 2011, from Skipfish: Google's New Tool to Harden Web App Security: http://css.dzone.com/news/skipfish-googles-new-tool Techs Worldwide. (2010). Techs Worldwide. Retrieved September 2011, from http://www.techsww.com/tutorials/libraries/openssl/installation/installing_openssl_on_ubuntu_linux.p hp Thomas, V. (2010, March 22). VT' Tech Blog. Retrieved September 2011, from A Tech Discovery Blog on PHP, Ajax, Security and Social Media.: http://blogs.vinuthomas.com/2010/03/22/skipfish-a-webapplication-security-scanner-from-google/ Toby. (2010, May 21). Toby's Technical Ramblings. Retrieved September 2011, from Skipfish No such file or directory: http://tosbourn.com/2010/05/security/skipfish-no-such-file-or-directory/ Ubuntuforums. (2010, October 10). Retrieved September 2011, from Ubuntu Forums: http://ubuntuforums.org/showthread.php?t=1594283 Weaver, R. (2007). Guide To Network Defense and Countermeasures second edition. Danielle Slade. Zalewski, M. (2010). Skipfish Doc Project documentation. Retrieved September 2011, from skipfish - web application security scanner: http://code.google.com/p/skipfish/wiki/skipfishdoc