Web Maniac Hacking Trust. Aditya K Sood [adi_ks [at] secniche.org] SecNiche Security



Similar documents
Exploiting Fundamental Weaknesses in Command and Control (C&C) Panels

Introduction to Penetration Testing Graham Weston

Securing Your Web Application against security vulnerabilities. Ong Khai Wei, IT Specialist, Development Tools (Rational) IBM Software Group

ASL IT SECURITY BEGINNERS WEB HACKING AND EXPLOITATION

Pentests more than just using the proper tools

The Web AppSec How-to: The Defenders Toolbox

An approach to Web Application Penetration Testing. By: Whiskah

Pentests more than just using the proper tools

Conducting Web Application Pentests. From Scoping to Report For Education Purposes Only

Advancements in Botnet Attacks and Malware Distribution

The Top Web Application Attacks: Are you vulnerable?

Web Application Security

Security Testing. Vulnerability Assessment vs Penetration Testing. Gabriel Mihai Tanase, Director KPMG Romania. 29 October 2014

Attack and Penetration Testing 101

Adobe ColdFusion. Secure Profile Web Application Penetration Test. July 31, Neohapsis 217 North Jefferson Street, Suite 200 Chicago, IL 60661

Penetration Testing in Romania

Hacking for Fun and Profit

Reducing Application Vulnerabilities by Security Engineering

How to break in. Tecniche avanzate di pen testing in ambito Web Application, Internal Network and Social Engineering

Aiming at Higher Network Security Levels Through Extensive PENETRATION TESTING. Anestis Bechtsoudis. abechtsoudis (at) ieee.

Introduction to Web Application Security. Microsoft CSO Roundtable Houston, TX. September 13 th, 2006

Mobile Application Hacking for Android and iphone. 4-Day Hands-On Course. Syllabus

Demystifying Penetration Testing for the Enterprise. Presented by Pravesh Gaonjur

Metasploit The Elixir of Network Security

Using Free Tools To Test Web Application Security

ArcGIS Server Security Threats & Best Practices David Cordes Michael Young

SCOPING QUESTIONNAIRE FOR PENETRATION TESTING

A Network Administrator s Guide to Web App Security

Cracking the Perimeter via Web Application Hacking. Zach Grace, CISSP, CEH January 17, Mega Conference

OWASP Top Ten Tools and Tactics

Testing the OWASP Top 10 Security Issues

Ethical Hacking as a Professional Penetration Testing Technique

Recon and Mapping Tools and Exploitation Tools in SamuraiWTF Report section Nick Robbins

SOCIAL NETWORKS AND INFECTION MODEL

Bank Hacking Live! Ofer Maor CTO, Hacktics Ltd. ATC-4, 12 Jun 2006, 4:30PM

MetaXSSploit. Bringing XSS in Pentesting A journey in building a security tool. Claudio

EC-Council CAST CENTER FOR ADVANCED SECURITY TRAINING. CAST 619 Advanced SQLi Attacks and Countermeasures. Make The Difference CAST.

How To Understand And Understand The Security Of A Web Browser (For Web Users)

Application Security Testing

State of The Art: Automated Black Box Web Application Vulnerability Testing. Jason Bau, Elie Bursztein, Divij Gupta, John Mitchell

Common Security Vulnerabilities in Online Payment Systems

Out of the Fire - Adding Layers of Protection When Deploying Oracle EBS to the Internet

Rational AppScan & Ounce Products

Security vulnerabilities in new web applications. Ing. Pavol Lupták, CISSP, CEH Lead Security Consultant

COURSE NAME: INFORMATION SECURITY INTERNSHIP PROGRAM

Web Application Penetration Testing

National Information Security Group The Top Web Application Hack Attacks. Danny Allan Director, Security Research

Auditing Web Applications

ASL IT Security Advanced Web Exploitation Kung Fu V2.0

Penetration Testing - a way for improving our cyber security

Creating Stronger, Safer, Web Facing Code. JPL IT Security Mary Rivera June 17, 2011

LEADING CYBER SECURITY AND PENETRATION TESTING COMPANY

NEW AND IMPROVED: HACKING ORACLE FROM WEB. Sumit sid Siddharth 7Safe Limited UK

TACKYDROID. Pentesting Android Applications in Style

SQuAD: Application Security Testing

Application security testing: Protecting your application and data

CRYPTUS DIPLOMA IN IT SECURITY

Introduction: 1. Daily 360 Website Scanning for Malware

Web Application security testing: who tests the test?

Penetration Testing Scope Factors

Web Application Hacking (Penetration Testing) 5-day Hands-On Course

InfoSec Academy Application & Secure Code Track

How to Avoid an Attack - Security Testing as Part of Your Software Testing Process

State of Web Application Security

Penetration: from Application down to OS

Evaluation of Web Security Mechanisms Using Inline Scenario & Online Scenario

FORBIDDEN - Ethical Hacking Workshop Duration

A Penetration Testing Maturity and Scoring Model

Auditing After a Cyber Attack JAX IIA Chapter Meeting Cybersecurity and Law Enforcement

Application Security Audit Fault Injection Model, Fuzz Generators & Static Code Analysis. Training Brochure

3. Broken Account and Session Management. 4. Cross-Site Scripting (XSS) Flaws. Web browsers execute code sent from websites. Account Management

Where every interaction matters.

Penetration Testing. Types Black Box. Methods Automated Manual Hybrid. oless productive, more difficult White Box

We ve been hacked! We did it! Rick Grandy Lockheed Martin Hanford Site

Passing PCI Compliance How to Address the Application Security Mandates

Mobile Application Hacking for ios. 3-Day Hands-On Course. Syllabus

Detecting and Defending Against Security Vulnerabilities for Web 2.0 Applications

Web Application Security Considerations

G Data Mobile MalwareReport. Half-Year Report July December G Data SecurityLabs

Social-Engineering. Hacking a mature security program. Strategic Penetration Testing

Turning your managed Anti-Virus

ISSECO Syllabus Public Version v1.0

Mean Time to Fix (MTTF) IT Risk s Dirty Little Secret Joe Krull, CPP, CISSP, IAM, CISA, A.Inst.ISP, CRISC, CIPP

WHITE PAPER. FortiWeb and the OWASP Top 10 Mitigating the most dangerous application security threats

Client Side Cross Site Scripting

Overview of the Penetration Test Implementation and Service. Peter Kanters

Transcription:

Web Maniac Hacking Trust Aditya K Sood [adi_ks [at] secniche.org] SecNiche Security

Disclaimer Web Maniac - Hacking Trust Pentesting web applications in a hacker s way. Attack surface varies from application to application. How to think below the surface? That s the aim! All contents of this presentation represent my own beliefs and views and do not, unless explicitly stated otherwise, represent the beliefs of my current, or any of my previous in that effect, employers. Screenshots have been shared from various resources. This is done to show the comparative model of various methodologies.

About Me Founder, SECNICHE Security Labs. http://www.secniche.org PhD Candidate at Michigan State University Worked previously for Armorize as Senior Security Practitioner, COSEINC as Senior Security Researcher and Security Consultant for KPMG Written content Author for HITB E-Zine, Hakin9,ELSEVIER, USENIX Journals. Like to do Bug Hunting and Malware dissection. Released Advisories to Forefront Companies. Active Speaker at Security Conferences including RSA etc. Blog: http://secniche.blogspot.com http://zeroknock.blogspot.com

Agenda Web Application Security Standards Web Application Security- A view of Reality Web Application Testing and Development Methodologies Facets of Web Application Pen Testing (WAPT) Demonstrations Live Targets

Web Application Security Standards Really

Web Application Security Standards -??! Answers! Standards provide specific classification of vulnerabilities Do they comprise of all types of vulnerabilities? Are all types of web attacks predefined in them? Do you think the design of web application matters? [to what extent ] A view of web application and a website under testing. Do platforms and web servers matter while web application assessment? Do you think penetration testing of web applications is beyond these standards?

Web Application State and Risks OWASP

Web Application Architecture - Development

Web Application Testing - Methodologies

Why Security Testing? Defacement Statistics Zone H

Web Application Security! Reality - Broken

Is that Ethical?

Existence and Reality Web Penetration Test Is this all about compliance (PCI)? Is this all about reporting generic issues and using reports for cert s? Do you think organizational teams patch all the reported issues? White box or Black box Changed definitions. Security Assessment! = Penetration Testing [ Mismatch ] Time dependency A big factor in determining the effectiveness Penetration Tests Does not provide security / That s the Truth Applied security comes out of the actions taken to remove those vulnerabilities which are exploited during the course of penetration testing. Vulnerability assessment provides a glimpse of security to some degree Penetration tests emulate real world attacks to exploit the network and web infrastructure Effective penetration tests provide a degree to which systems can be exploited. It can be more.

Pentesting Stringency in Real World

Is that True? # Then what about Human Ignorance? # A critical component in every sphere. Hard to beat it.

Thinking in the Wild Web Penetration Testing. Is it all about shooting what we see? Do we need to take care of the hidden or shadowed?

Web Penetration Test The Refined Art Turning the Black Box Testing into White box Testing Expertise Hacking in a controlled manner Meeting the expectations

The One Murphy s Law (Variation) Pen Tester The Word of Advice Everything that goes wrong on the target host, network, or on the Internet from two weeks before you plug in to two weeks after you submit the report will be your fault.

Demonstration Attacking Web Apps through Content Rendering 4: 15 M SQLXSSI XSS through SQL Injections : Yahoo 5:30 M Persistent Redirection Attacks and Malware - 4:00 M Content Delivery Networks Infection Behavior - 4:09 M Widget Redirection Attacks Outbrain 3:20 M

Demo 1: Document Content Rendering Attacks

Demo 2 : SQLXSSI Using SQLI to conduct XSS

Demo 3 : Persistent Logout Redirection Attacks

Demo 4 : Third Party Content Delivery Infections

Demo 5 : Widget Redirection Attacks

Questions and Queries

Thanks SecNiche Security : http://www.secniche.org Hacker Halted http://www.hackerhalted.com