Hardening Joomla! (MNI)



Similar documents
Web Security - Hardening estudy

Hardening Moodle. Concept and Realization of a Security Component in Moodle. a project by

1: 2: : 3.1: 3.2: 4: 5: & CAPTCHA

Hardening Joomla 1. HARDENING PHP. 1.1 Installing Suhosin. 1.2 Disable Remote Includes. 1.3 Disable Unneeded Functions & Classes

Shop by Manufacturer Custom Module for Magento

Manual for CKForms component Release 1.3.4

Check list for web developers

How To Use Rstickets!Pro On A Pc Or Macbook 2.5 (For Macbook)

05.0 Application Development

JOOMLA SECURITY. ireland website design. by Oliver Hummel. ADDRESS Unit 12D, Six Cross Roads Business Park, Waterford City

Kenna Platform Security. A technical overview of the comprehensive security measures Kenna uses to protect your data

ASL IT SECURITY BEGINNERS WEB HACKING AND EXPLOITATION

Authorize.net for WordPress

censhare-tracker Instruction for using the Version en censhare AG November, 9th 2010

ArcGIS Server Security Threats & Best Practices David Cordes Michael Young

OxyClassifieds Installation Handbook

Product Name: ANZ egate Connect Version: Document Type: Help doc Author: Milople Inc.

HP WebInspect Tutorial

TECHNOLOGY WHITE PAPER Jun 2012

Exploiting Local File Inclusion in A Co-Hosting Environment

Chapter: 9 Forms (7.0.5)

5.2.3 Thank you message Bounce settings Step 6: Subscribers 6.1. Creating subscriber lists 6.2. Add subscribers Manual add 6.2.

Stripe Payment Module Magento 2 USER MANUAL MAGEDELIGHT.COM SUPPORT E: SUPPORT@MAGEDELIGHT.COM P: +1-(248)

About This Document 3. Integration Overview 4. Prerequisites and Requirements 6

Acunetix Web Vulnerability Scanner. Getting Started. By Acunetix Ltd.

THE SMARTEST WAY TO PROTECT WEBSITES AND WEB APPS FROM ATTACKS. Junos WebApp Secure Junos Spotlight Secure

WELCOME TO CITUS CLOUD LOAD TEST

Portal User Guide. Customers. Version 1.1. May of 5

Information Technology Policy

OWASP and OWASP Top 10 (2007 Update) OWASP. The OWASP Foundation. Dave Wichers. The OWASP Foundation. OWASP Conferences Chair

Penetration Test Report

Secure Application Development with the Zend Framework

Onboarding for Administrators

User Manual. for pollxt version 1.2x

Sophos UTM Web Application Firewall for Microsoft Exchange connectivity

Cross Site Scripting in Joomla Acajoom Component

Reseller Panel Step-by-Step Guide

Download and Install the Citrix Receiver for Mac/Linux

Criteria for web application security check. Version

Web Application Security

PaperCut Payment Gateway Module - RBS WorldPay Quick Start Guide

Secure Web Development Teaching Modules 1. Security Testing. 1.1 Security Practices for Software Verification

Hosted Security Quick Start Guide

Sitefinity Security and Best Practices

PaperCut Payment Gateway Module CyberSource Quick Start Guide

BreezingForms Guide. 18 Forms: BreezingForms

New World Construction FTP service User Guide

R 143 CYBERSECURITY RECOMMENDATION FOR MEDIA VENDORS SYSTEMS, SOFTWARE & SERVICES

Integrating ConnectWise Service Desk Ticketing with the Cisco OnPlus Portal

Color Screen Phones: SIP-T48G and SIP-T46G with firmware version 73

LMS 365 Learning Module Builder Add-in Installation Guide VERSION x

Snapt Balancer Manual

TIMETABLE ADMINISTRATOR S MANUAL

Ajax Chat Integration for Joomla 1.5 native

NETASQ ACTIVE DIRECTORY INTEGRATION

WebCruiser Web Vulnerability Scanner User Guide

HDVideoShare! User Documentation Team January

Client logo placeholder XXX REPORT. Page 1 of 37

YubiKey Authentication Module Design Guideline

WordPress Security Scan Configuration

Web Engineering Web Application Security Issues

Magento Extension REVIEW BOOSTER User Guide

About Network Data Collector

Facebook - Twitter - Google +1 all in one plugin for Joomla enable "Twitter button", "Google +1

Module Private Sales User Manual

XTM Drupal Connector. A Translation Management Tool Plugin

B1ST a Premium Ticketing System

TriCore Secure Web Gateway User Guide 1

Features Reference. About Unified Communication System. Before Using This Machine. Starting a Meeting. What You Can Do During the Meeting

Table of Contents. Open-Xchange Authentication & Session Handling. 1.Introduction...3

Juniper Secure Analytics Release Notes

CMS and e-commerce Solutions. version 1.0. Please, visit us at: or contact directly by

Online Vulnerability Scanner Quick Start Guide

Adobe Systems Incorporated

Smart2Pay Magento Plugin Merchant Integration Guide

Intrusion detection for web applications

FIREWALL CHECKLIST. Pre Audit Checklist. 2. Obtain the Internet Policy, Standards, and Procedures relevant to the firewall review.

Cryptshare for Outlook User Guide

Web Application Vulnerability Testing with Nessus

Cloud Security:Threats & Mitgations

SQL Injection Attack Lab Using Collabtive

How to break in. Tecniche avanzate di pen testing in ambito Web Application, Internal Network and Social Engineering

2010 Ing. Punzenberger COPA-DATA GmbH. All rights reserved.

Project Orwell: Distributed Document Integrity Verification

Joomla/Mambo Community Builder

Volume SYSLOG JUNCTION. User s Guide. User s Guide

Bug Report. Date: March 19, 2011 Reporter: Chris Jarabek

What is Web Security? Motivation

FINAL DoIT v.8 APPLICATION SECURITY PROCEDURE

SQL Injection Attack Lab

How To Manage Web Content Management System (Wcm)

OpenCart AliExpress Affiliate Plugin User Guide

The ultimate integrated Magento helpdesk solution

CHARGE Anywhere Universal Shopping Cart

Paxera Uploader Basic Troubleshooting

Web Vulnerability Scanner by Using HTTP Method

JMS MULTISITE for joomla!

Transcription:

Hardening Joomla! (MNI) Web Security SS10 Prof. Dr. Klaus Quibeldey-Cirkel 1

Content Introduction Giessen Aegis Suhosin Security Tests Live Demonstration Conclusion 2

Introduction Project Goal: Implementation of a security architecture for Joomla!(1.5) Tasks: Integration of PHPIDS Implementation of an IPS Statistical Analysis Tests with Jmeter Integration of Suhosin SecurityTests based on the OWASP Top 10 Security Risks 3

Giessen Aegis Plugin plg_giessenaegis ReCaptcha Component com_giessenaegis Module mod_giessenaegis Tests with Jmeter Additional Backend Module mod_phpconfigcheck 4

Plugin plg_giessenaegis PHPIDS calculates threat based on user activities This threat value is used for countermeasure selection These countermeasures include: Logging Email-Notification User Warnings User Logout Restriction of User Access 5

Plugin plg_giessenaegis Log Files and Email Notifications Contain: User ID/IP Date URL of the Page Being Accessed Impact (PHPIDS-Threat Level) User Entry HTTP Method Used (GET/POST/...) Attack Vectors (xss/csrf/id/...) Plain Text Description of the Attack 6

Plugin plg_giessenaegis..makes Use of Other Functionality: Should com_giessenaegis be installed, attack details are saved in database tables as well as in the log file. White Lists: Exceptions to security rules can be created for front end (public) as well as backend (administrator) areas. 7

Plugin plg_giessenaegis... Makes Use of Other Functionality: Updates PHP IDS Library Can operate in simulation mode (IPS deactivated) Display of data from the log file Deletion of the log file or database entries Selectable warning type (URL Redirect, plain text, or Textual Display of Countermeasures) 8

Plugin plg_giessenaegis Backend: 9

Plugin plg_giessenaegis Backend: 10

ReCaptcha Countermeasure: recaptcha Protects against automated attacks and crawlers Captcha is activated by too many requests in too short a time period For example: the average time of request reception from a particular IP for 10 requests is less than 3 seconds The use of the captcha is required to further access the site Realization by means of the Zend Framework 11

ReCaptcha recaptcha Display 12

com_giessenaegis Component Performs statistical analysis Installs Database Tables for: Suspected Attacks Plain text resolution of possible attack types 3 Backend Views Statistics Management Attack Types 13

com_giessenaegis Component Statistical Analysis: Various Statistics for Logged Attacks Amount of Attacks by Attack Type Percent of Attacks by Attack Type Statistical Analysis of Attacks by Specific Users Dynamic display of statistics using JPGraph Display and timeframe of individual statistics can be set 14

com_giessenaegis Component Backend: 15

com_giessenaegis Component Backend: 16

com_giessenaegis Component Management Display: Statistic Management Interface Lists currently restricted users Restricted users can have access reinstated from this display 17

com_giessenaegis Component Backend: 18

com_giessenaegis Component Attack Type Display: Displays a list of attack types which PHP IDS can detect Attack Types can be created, edited, and deleted Resolves abbreviations for attacks plain text names 19

com_giessenaegis Component Backend: 20

mod_giessenaegis Module Creates a front end display of detected attacks Displays a compact view of the most recent suspected attacks More detailed information is displayed in the tooltip specific to the attack Mnemonic Display using Icons: New Attacks neu Symbol Particualarlly Maliscious Attacks Warning Symbol Many display properties can be set in the module parameters 21

mod_giessenaegis Module Frontend: 22

mod_giessenaegis Module Frontend: 23

mod_giessenaegis Module Backend: 24

JMeter-Tests External Attacks SQL-Injections XSS Internal Attacks After Login SQL-Injections XSS Attacking multiple times to simulate logout/banning 25

Backend module mod_phpconfigcheck Displays recommended php.ini options Compares with current runtime settings 26

Suhosin Inclusion Configuration Backend module mod_suhosin 27

Suhosin-Inclusion Server is hardened against attacks and weaknesses in file and PHP code PHP update to version 5.3.3 Installation of Suhosin extension and patches 28

Suhosin-Configuration Customized default configuration Customization was done by examination of log files while using the test system Linked with ClamAV New script to link ClamAV with Suhosin Checks files right after upload 29

Suhosin Backend module Backend module mod_suhosin: Administration of Suhosin in Joomla!`s backend Checks Suhosin`s version & availability Contains a switch to enable/disable simulation mode Displays the Logfile Displays and configures Suhosin settings 30

Suhosin Backend module 31

Suhosin Backend module 32

Security tests: OWASP-Top Ten Risks 33

Security tests: determine the impacts 34

Security tests: determine the impacts 35

Livedemo Giessen Aegis Suhosin 36

Conclusion Status: Nearly ready to use Available for testing at: http://www-test.mni.fh-giessen.de/administrator/index.php http://www-test.mni.fh-giessen.de/ Only available from inside the faculty network (also via VPN) SVN-Repository Currently: http://tracking.mni.fh-giessen.de/svn/joomla/ Soon: http://joomlacode.org/ 37

Conclusion The graphs show that Joomla! Is already protected against most OWASP Risks. But attacks are neither logged, nor are countermeasures executed. The features developed continue to harden the system and give the administrators a better overview of the current security status of his website. 38

Thank you for your attention. Any questions? END 39