Web Application Firewalls: What the vendors do NOT want you to know SHAKACON III



Similar documents
Web Application Firewalls: What the vendors do NOT want you to know. The OWASP Foundation

Playing with Web Application Firewalls

Playing with Web Application Firewalls

Web Application Firewall Profiling and Evasion. Michael Ritter Cyber Risk Services Deloitte

Some Notes on Web Application Firewalls

Firewalls P+S Linux Router & Firewall 2013

Implementation of Web Application Firewall

Information Supplement: Requirement 6.6 Code Reviews and Application Firewalls Clarified

How To Protect A Web Application From Attack From A Trusted Environment

Information Technology Policy

Barracuda Web Application Firewall vs. Intrusion Prevention Systems (IPS) Whitepaper

Imperva s Response to Information Supplement to PCI DSS Requirement Section 6.6

Intrusion detection for web applications

Check list for web developers

WHITE PAPER. FortiWeb and the OWASP Top 10 Mitigating the most dangerous application security threats

Blackbox Reversing of XSS Filters

Basic & Advanced Administration for Citrix NetScaler 9.2

EVADING ALL WEB-APPLICATION FIREWALLS XSS FILTERS

Semantic based Web Application Firewall (SWAF V 1.6) Operations and User Manual. Document Version 1.0

Contemporary Web Application Attacks. Ivan Pang Senior Consultant Edvance Limited

Out of the Fire - Adding Layers of Protection When Deploying Oracle EBS to the Internet

WEB APPLICATION FIREWALLS: DO WE NEED THEM?

STOPPING LAYER 7 ATTACKS with F5 ASM. Sven Müller Security Solution Architect

(WAPT) Web Application Penetration Testing

Web Application Firewall

FortiWeb 5.0, Web Application Firewall Course #251

Advanced Administration for Citrix NetScaler 9.0 Platinum Edition

Web Application Firewall Bypassing

2013 MONITORAPP Co., Ltd.

Penetration Testing with Kali Linux

Firewalls, NAT and Intrusion Detection and Prevention Systems (IDS)

NSFOCUS Web Application Firewall White Paper

HTTPParameter Pollution. ChrysostomosDaniel

Guidelines for Web applications protection with dedicated Web Application Firewall

A Decision Maker s Guide to Securing an IT Infrastructure

REAL-TIME WEB APPLICATION PROTECTION. AWF SERIES DATASHEET WEB APPLICATION FIREWALL

Web Application Firewall Policy File Specification

The New PCI Requirement: Application Firewall vs. Code Review

Detecting and Exploiting XSS with Xenotix XSS Exploit Framework

Secure Web Application Coding Team Introductory Meeting December 1, :00 2:00PM Bits & Pieces Room, Sansom West Room 306 Agenda

Many network and firewall administrators consider the network firewall at the network edge as their primary defense against all network woes.

Web Application Security. Radovan Gibala Senior Field Systems Engineer F5 Networks

Cracking the Perimeter via Web Application Hacking. Zach Grace, CISSP, CEH January 17, Mega Conference

Integrating Web Application Security into the IT Curriculum

Finding Your Way in Testing Jungle. A Learning Approach to Web Security Testing.

EC-Council CAST CENTER FOR ADVANCED SECURITY TRAINING. CAST 619 Advanced SQLi Attacks and Countermeasures. Make The Difference CAST.

The Wide World of WAFs

Cross Site Scripting Prevention

Web Application Hacking (Penetration Testing) 5-day Hands-On Course

Web Application Attacks And WAF Evasion

TEST METHODOLOGY. Web Application Firewall. v6.2

UNCLASSIFIED CPA SECURITY CHARACTERISTIC WEB APPLICATION FIREWALLS. Version 1.3. Crown Copyright 2011 All Rights Reserved

Creating Stronger, Safer, Web Facing Code. JPL IT Security Mary Rivera June 17, 2011

A Tale of the Weaknesses of Current Client-Side XSS Filtering

Application security testing: Protecting your application and data

Network Security. Chapter 3. Cornelius Diekmann. Version: October 21, Lehrstuhl für Netzarchitekturen und Netzdienste Institut für Informatik

THE SMARTEST WAY TO PROTECT WEBSITES AND WEB APPS FROM ATTACKS

Where every interaction matters.

Last update: February 23, 2004

ASL IT Security Advanced Web Exploitation Kung Fu V2.0

Arrow ECS University 2015 Radware Hybrid Cloud WAF Service. 9 Ottobre 2015

How To Fix A Web Application Security Vulnerability

F5 and Microsoft Exchange Security Solutions

Application Layer Encryption: Protecting against Application Logic and Session Theft Attacks. Whitepaper

Introduction to Web Application Firewalls. Dustin Anders

What is Web Security? Motivation

Firewalls. Firewalls. Idea: separate local network from the Internet 2/24/15. Intranet DMZ. Trusted hosts and networks. Firewall.

Web Application Firewalls: When Are They Useful? OWASP AppSec Europe May The OWASP Foundation

1. Introduction. 2. DoS/DDoS. MilsVPN DoS/DDoS and ISP. 2.1 What is DoS/DDoS? 2.2 What is SYN Flooding?

Web Application Security

Global Web Application Firewall Market

INTRUSION DECEPTION CZYLI BAW SIĘ W CIUCIUBABKĘ Z NAMI

Web Application Firewall on SonicWALL SSL VPN

Web Application Firewall on SonicWALL SRA

Application Security Testing

Powered by. Incapsula Cloud WAF

Chapter 8 Security Pt 2

How To Protect Your Data From Being Stolen

WAFFle: Fingerprinting Filter Rules of Web Application Firewalls

Barracuda Web Site Firewall Ensures PCI DSS Compliance

FIREWALLS. Firewall: isolates organization s internal net from larger Internet, allowing some packets to pass, blocking others

Firewalls. Pehr Söderman KTH-CSC

F5 Silverline Web Application Firewall Onboarding: Technical Note

Mingyu Web Application Firewall (DAS- WAF) All transparent deployment for Web application gateway

Security+ Guide to Network Security Fundamentals, Fourth Edition. Chapter 6 Network Security

Evaluation of Penetration Testing Software. Research

Configuring Personal Firewalls and Understanding IDS. Securing Networks Chapter 3 Part 2 of 4 CA M S Mehta, FCA

Flow Analysis Versus Packet Analysis. What Should You Choose?

Using Nessus In Web Application Vulnerability Assessments

No Cloud Allowed. Denying Service to DDOS Protection Services

Cross-Site Scripting

The Web AppSec How-to: The Defenders Toolbox

Web Application Firewalls Evaluation and Analysis. University of Amsterdam System & Network Engineering MSc

External Network & Web Application Assessment. For The XXX Group LLC October 2012

Transcription:

Web Application Firewalls: What the vendors do NOT want you to know

$ whois WendelGH PT Consultant at Trustwave's SpiderLabs. Over 7 years in the security industry. Vulnerability discovery Webmails, AP, Citrix, etc. Spoke in YSTS 2.0, Defcon 16, H2HC and others. Affiliated to Hackaholic team.

$ whois SandroGauci Founder and CSO EnableSecurity. VOIPPACK (CANVAS addon). Security research papers SIPVicious and SurfJack 9 years old

Introduction WAF - Web Application Firewall next generation protection can be identified, detected bypassing the rules security software is not necessarily secure

What is WAF Attack signatures or abnormal behavior based WAFs products: software or hardware appliance. WAFs AKA 'Deep Packet Inspection Firewall'.

What is WAF Flavors: a reverse proxy, embedded or connected in a switch (SPAN or RAP) WAF products detect both inbound and outbound attacks

Who uses WAF? Many banks around the world Companies which need high protection Many companies in compliance with PCI DSS (Payment Card Industry - Data Security Standard)

Operation Modes: Negative model (blacklist based) Positive model (whitelist based) Mixed / Hybrid

The negative model Relies on a database of known attacks Eg. XSS strings like <script>, </script>, String.fromCharCode, etc. Often regular expressions

The positive model Whitelist based Learning mode to create a security policy of known good HTTP traffic Example: Page news.jsp, the field "id" only accept numbers [0-9] and starting at 0 until 65535.

Common Weaknesses Bad design Bad implementation WAFs have to be similar to the web apps and http servers that they need to protect ergo they can have similar security flaws!

Detection: Cookies Cookies: Some WAF products add their own cookie in the HTTP communication Reason: some WAFs are also load balancers

Detection: Headers Header rewriting Most obvious would be "Server" Sometimes is a feature called server cloaking Connection header might be changed to Cneonction or nncoection

Response codes 404 error codes for existent scripts Different error codes (404, 400, 401, 403, 501, etc) for hostile parameters (even non existent ones) in valid pages.

some are plain weird like this error code 999

Detection: blocked connection Drop Action: Immediately initiate a "connection close" action to tear down the TCP connection by sending a FIN packet. Create a firewall rule to block abusers

Detection: Ruleset Built-in Rules: All (at least all that we know) WAF systems have a built-in group of rules in negative mode these rules are different in each products, this can help us to detect them

Automated detection You should be thinking It s so boring We have to know a lot of products to identify them correctly

WAFW00F An answer to your prayers Detect over 15 different WAF products (the number keeps changing) Options to detect multiple WAFs in place Generic detection methods included!

Bypassing Fingerprint the rules Detect allowed / denied strings Combinations of allowed or denied strings Modify your attack to not match the blacklist

Bypassing Encoding and language support, character sets Spaces, comments, case sensitive mutation, Unicode (%uc0af and %c0%af), etc The web server can parse, decode and interpret and HTTP request differently from the WAF

Bypassing HTML and JS is very flexible Various methods to split and encode your strings

Bypassing WAIT! What about positive model? They are really secure? If we find a positive model should we give up?

Bypassing It s time consuming. Large number of techniques to remember Some techniques may be product specific This calls for some automation!

WAFFUN Test the target and point weakness in the WAF Use with WAFW00F for better results. Works in progress, input welcome!

WAFFUN Checks if the script echos back (esp in the case of xss) Can check if error suppression is supported Finds out how the WAF responds when a it reacts to an attack

WAFFUN Goes through a list of well known blacklisted strings If any were blocked, it tries different encoding methods, null characters, unicode

Latest: XSS Constructor Tries a number of tags to find out which are allowed through Tries a number of DHTML event handlers Tries a number of Javascript methods

WAFFUN

Vulnerabilities Web Application specific issues: XSS, SQLi Overflows DoS

Thank you! Do you have ideas / resources to improve our tools? wsguglielmetti [em] gmail [ponto] com sandro [em] enablesecurity [ponto] com