The Top Web Application Attacks: Are you vulnerable?



Similar documents
Rational AppScan & Ounce Products

National Information Security Group The Top Web Application Hack Attacks. Danny Allan Director, Security Research

Securing Your Web Application against security vulnerabilities. Ong Khai Wei, IT Specialist, Development Tools (Rational) IBM Software Group

Web Applications The Hacker s New Target

New IBM Security Scanning Software Protects Businesses From Hackers

WHITE PAPER. FortiWeb and the OWASP Top 10 Mitigating the most dangerous application security threats

WEB SECURITY CONCERNS THAT WEB VULNERABILITY SCANNING CAN IDENTIFY

Web Application Penetration Testing

Where every interaction matters.

Creating Stronger, Safer, Web Facing Code. JPL IT Security Mary Rivera June 17, 2011

Web Application Report

Cracking the Perimeter via Web Application Hacking. Zach Grace, CISSP, CEH January 17, Mega Conference

Hack Proof Your Webapps

How to break in. Tecniche avanzate di pen testing in ambito Web Application, Internal Network and Social Engineering

Staying a step ahead of the hackers: the importance of identifying critical Web application vulnerabilities.

Web Application Security. Vulnerabilities, Weakness and Countermeasures. Massimo Cotelli CISSP. Secure

Detecting Web Application Vulnerabilities Using Open Source Means. OWASP 3rd Free / Libre / Open Source Software (FLOSS) Conference 27/5/2008

Criteria for web application security check. Version

Integrating Security Testing into Quality Control

OWASP Top Ten Tools and Tactics

Web applications. Web security: web basics. HTTP requests. URLs. GET request. Myrto Arapinis School of Informatics University of Edinburgh

External Vulnerability Assessment. -Technical Summary- ABC ORGANIZATION

ArcGIS Server Security Threats & Best Practices David Cordes Michael Young

Six Essential Elements of Web Application Security. Cost Effective Strategies for Defending Your Business

FINAL DoIT v.4 PAYMENT CARD INDUSTRY DATA SECURITY STANDARDS APPLICATION DEVELOPMENT AND MAINTENANCE PROCEDURES

FINAL DoIT v.8 APPLICATION SECURITY PROCEDURE

Adobe Systems Incorporated

(WAPT) Web Application Penetration Testing

Web Application Security Assessment and Vulnerability Mitigation Tests

Using Free Tools To Test Web Application Security

Web application security

Overview of the Penetration Test Implementation and Service. Peter Kanters

Web Engineering Web Application Security Issues

Reducing Application Vulnerabilities by Security Engineering

OWASP and OWASP Top 10 (2007 Update) OWASP. The OWASP Foundation. Dave Wichers. The OWASP Foundation. OWASP Conferences Chair

WHITE PAPER FORTIWEB WEB APPLICATION FIREWALL. Ensuring Compliance for PCI DSS 6.5 and 6.6

SQuAD: Application Security Testing

Strategic Information Security. Attacking and Defending Web Services

Passing PCI Compliance How to Address the Application Security Mandates

Table of Contents. Page 2/13

05.0 Application Development

WEB APPLICATION SECURITY

What is Web Security? Motivation

Barracuda Web Site Firewall Ensures PCI DSS Compliance

The purpose of this report is to educate our prospective clients about capabilities of Hackers Locked.

Magento Security and Vulnerabilities. Roman Stepanov

WHITE PAPER. FortiWeb Web Application Firewall Ensuring Compliance for PCI DSS 6.5 and 6.6

Essential IT Security Testing

Web Application Attacks and Countermeasures: Case Studies from Financial Systems

ETHICAL HACKING APPLICATIO WIRELESS110 00NETWORK APPLICATION MOBILE MOBILE0001

Introduction:... 1 Security in SDLC:... 2 Penetration Testing Methodology: Case Study... 3

Bank Hacking Live! Ofer Maor CTO, Hacktics Ltd. ATC-4, 12 Jun 2006, 4:30PM

Testing the OWASP Top 10 Security Issues

CSE598i - Web 2.0 Security OWASP Top 10: The Ten Most Critical Web Application Security Vulnerabilities

MatriXay WEB Application Vulnerability Scanner V Overview. (DAS- WEBScan ) The best WEB application assessment tool

OWASP AND APPLICATION SECURITY

Web application security: automated scanning versus manual penetration testing.

A Network Administrator s Guide to Web App Security

Web Application Security

Last update: February 23, 2004

Members of the UK cyber security forum. Soteria Health Check. A Cyber Security Health Check for SAP systems

Is Drupal secure? A high-level perspective on web vulnerabilities, Drupal s solutions, and how to maintain site security

Web Application Vulnerability Testing with Nessus

Thick Client Application Security

Ethical Hacking as a Professional Penetration Testing Technique

3. Broken Account and Session Management. 4. Cross-Site Scripting (XSS) Flaws. Web browsers execute code sent from websites. Account Management

How to start a software security initiative within your organization: a maturity based and metrics driven approach OWASP

Web Application Hacking (Penetration Testing) 5-day Hands-On Course

How to Build a Trusted Application. John Dickson, CISSP

WEB APPLICATION FIREWALLS: DO WE NEED THEM?

1. Introduction. 2. Web Application. 3. Components. 4. Common Vulnerabilities. 5. Improving security in Web applications

Application Security Best Practices. Wally LEE Principal Consultant

Don t Get Burned! Are you Leaving your Critical Applications Defenseless?

Excellence Doesn t Need a Certificate. Be an. Believe in You AMIGOSEC Consulting Private Limited

Advanced Web Technology 10) XSS, CSRF and SQL Injection 2

Web Application Security

Web Application Security 101

Application security testing: Protecting your application and data

Application Security Testing

elearning for Secure Application Development

Mean Time to Fix (MTTF) IT Risk s Dirty Little Secret Joe Krull, CPP, CISSP, IAM, CISA, A.Inst.ISP, CRISC, CIPP

Port 80 (and 443!) Is Wide Open Scanning for Application-Level Vulnerabilities

Testnet Summerschool. Web Application Security Testing. Dave van Stein

Attack and Penetration Testing 101

Out of the Fire - Adding Layers of Protection When Deploying Oracle EBS to the Internet

Learning objectives for today s session

EC-Council CAST CENTER FOR ADVANCED SECURITY TRAINING. CAST 619 Advanced SQLi Attacks and Countermeasures. Make The Difference CAST.

How to achieve PCI DSS Compliance with Checkmarx Source Code Analysis

Contemporary Web Application Attacks. Ivan Pang Senior Consultant Edvance Limited

Application Security Testing. Erez Metula (CISSP), Founder Application Security Expert

Intrusion detection for web applications

Nuclear Regulatory Commission Computer Security Office Computer Security Standard

Threat Modeling. Categorizing the nature and severity of system vulnerabilities. John B. Dickson, CISSP

Chapter 1 Web Application (In)security 1

Application Layer Encryption: Protecting against Application Logic and Session Theft Attacks. Whitepaper

Detecting and Defending Against Security Vulnerabilities for Web 2.0 Applications

A Server and Browser-Transparent CSRF Defense for Web 2.0 Applications. Slides by Connor Schnaith

Transcription:

QM07 The Top Web Application Attacks: Are you vulnerable? John Burroughs, CISSP Sr Security Architect, Watchfire Solutions jburroughs@uk.ibm.com

Agenda Current State of Web Application Security Understanding Web Application Attacks Demo of the 4 top vulnerabilities affecting Web Application and how they can be exploited How to automatically find these vulnerabilities on your Web Site QM07 The Top Web Application Attacks: Are you vulnerable? 2

Security The Challenge for Organizations Security Spending % of Attacks % of Dollars Web Applications 10% 75% 90% 25% Network Server 75% of All Attacks on Information Security Are Directed to the Web Application Layer Sources: Gartner, Watchfire QM07 The Top Web Application Attacks: Are you vulnerable? 3

Application Security Defects #1 & #2 Vulnerabilities QM07 The Top Web Application Attacks: Are you vulnerable? 4

Drivers for Web Application Attacks* Web Applications hacks have replaced email as the preferred delivery method of Malware (viruses, root kits and trojans) *From Web Hacking Incidents Database 2007 QM07 The Top Web Application Attacks: Are you vulnerable? 5

Incident by Attack Type (2007) QM07 The Top Web Application Attacks: Are you vulnerable? 6

Cost of an Application Security Breach Media attention/ Brand damage Sharp decline in Stock Prices Communication/Monitoring Service Costs Legal Fees (Reported $3-4 million/incident) FTC Penalties (Fines can range up to 15 million/incident) Additional 3 rd party Audits New Security Spending Customer Lawsuits Customer Loss TJ Maxx s Application Security Breach cost them over 45 million dollars!! QM07 The Top Web Application Attacks: Are you vulnerable? 7

Why Application Security Problems Exist Root Cause: Developers are not trained to write or test for secure code Firewalls and IDS/IPS systems don t block application attacks. Port 80/443 is wide open for attack. Network scanners won t find application vulnerabilities. Network security (firewall, IDS, etc) do nothing once an organization web enables an application. Current State: Goal: Organizations test tactically at a late & costly stage in the SDLC A communication gap exists between security and development as such vulnerabilities are not fixed Testing coverage is incomplete To build better and more secure applications/websites QM07 The Top Web Application Attacks: Are you vulnerable? 8

Understanding Web Application Attacks QM07 The Top Web Application Attacks: Are you vulnerable? 9

High Level Web Application Architecture Review Customer App is deployed here Sensitive data is stored here Internet Firewall Client Tier (Browser) Protects Transport SSL Protects Network (Presentation) Middle Tier App Server (Business Logic) Database Data Tier QM07 The Top Web Application Attacks: Are you vulnerable? 10

Security The Myth: Our Site Is Safe We Have Firewalls in Place We Audit It Once a Quarter with Pen Testers We use SSL We Use Network Vulnerability Scanners QM07 The Top Web Application Attacks: Are you vulnerable? 11

OWASP and the OWASP Top 10 list Open Web Application Security Project an open organization dedicated to fight insecure software The OWASP Top Ten document represents a broad consensus about what the most critical web application security flaws are We will use the Top 10 list to cover some of the most common security issues in web applications QM07 The Top Web Application Attacks: Are you vulnerable? 12

OWASP Top 10 Application Attacks Application Threat Negative Impact Example Impact Cross Site scripting Injection Flaws Malicious File Execution Insecure Direct Object Reference Cross-Site Request Forgery Information Leakage and Improper Error Handling Broken Authentication & Session Management Insecure Cryptographic Storage Insecure Communications Identity Theft, Sensitive Information Leakage, Attacker can manipulate queries to the DB / LDAP / Other system Execute shell commands on server, up to full control Attacker can access sensitive files and resources Attacker can invoke blind actions on web applications, impersonating as a trusted user Attackers can gain detailed system information Session tokens not guarded or invalidated properly Weak encryption techniques may lead to broken encryption Sensitive info sent unencrypted over insecure channel Hackers can impersonate legitimate users, and control their accounts. Hackers can access backend database information, alter it or steal it. Site modified to transfer all interactions to the hacker. Web application returns contents of sensitive file (instead of harmless one) Blind requests to bank account transfer money to hacker Malicious system reconnaissance may assist in developing further attacks Hacker can force session token on victim; session tokens can be stolen after logout Confidential information (SSN, Credit Cards) can be decrypted by malicious users Unencrypted credentials sniffed and used by hacker to impersonate user Failure to Restrict URL Access Hacker can access unauthorized Hacker can forcefully browse and access a page resources past the login page QM07 The Top Web Application Attacks: Are you vulnerable? 13

1. Cross-Site Scripting (XSS) What is it? Malicious script echoed back into HTML returned from a trusted site, and runs under trusted context What are the implications? Session Tokens stolen (browser security circumvented) Complete page content compromised Future pages in browser compromised QM07 The Top Web Application Attacks: Are you vulnerable? 14

Demonstration Cross Site Scripting Main points covered in the demo or video: Locating an a place where user input which is echoed back to the browser Seeing if the user input is echoed back asis or if it is properly encoded Exploiting the vulnerability QM07 The Top Web Application Attacks: Are you vulnerable? 15

XSS Example I HTML code: QM07 The Top Web Application Attacks: Are you vulnerable? 16

XSS Example II HTML code: QM07 The Top Web Application Attacks: Are you vulnerable? 17

XSS Details Common in Search, Error Pages and returned forms. But can be found on any type of page Any input may be echoed back Path, Query, Post-data, Cookie, Header, etc. Browser technology used to aid attack XMLHttpRequest (AJAX), Flash, IFrame Has many variations XSS in attribute, DOM Based XSS, etc. QM07 The Top Web Application Attacks: Are you vulnerable? 18

Cross Site Scripting The Exploit Process Evil.org 1) Link to bank.com sent to user via E-mail or HTTP User 4) Script sends user s cookie and session information without the user s consent or knowledge 5) Evil.org uses stolen session information to impersonate user 2) User sends script embedded as data 3) Script/data returned, executed by browser bank.com QM07 The Top Web Application Attacks: Are you vulnerable? 19

Exploiting XSS If I can get you to run my JavaScript, I can Steal your cookies for the domain you re browsing Track every action you do in that browser from now on Redirect you to a Phishing site Completely modify the content of any page you see on this domain Exploit browser vulnerabilities to take over machine QM07 The Top Web Application Attacks: Are you vulnerable? 20

2 - Injection Flaws What is it? User-supplied data is sent to an interpreter as part of a command, query or data. What are the implications? SQL Injection Access/modify data in DB SSI Injection Execute commands on server and access sensitive data LDAP Injection Bypass authentication QM07 The Top Web Application Attacks: Are you vulnerable? 21

SQL Injection User input inserted into SQL Command: Get product details by id: Select * from products where id= $REQUEST[ id ] ; Hack: send param id with value or 1 = 1 Resulting executed SQL: Select * from products where id= or 1 = 1 All products returned QM07 The Top Web Application Attacks: Are you vulnerable? 22

SQL Injection User input is embedded as-is in predefined SQL statements: query = "SELECT * from Users where userid=' + iuserid + ' AND password=' + ipassword + '"; jsmith demo1234 SELECT * from Users where userid= jsmith' 1824 AND demo1234 password= demo1234' John Smith Hacker supplies input that modifies the original SQL statement, for example: iuserid = UserID Username ' or 1=1 -- Password Name SELECT * from UserID Users Username where Password Name userid=' 1 admin $#kaoefor56 ' AND Administrator password='bar' QM07 The Top Web Application Attacks: Are you vulnerable? 23

SQL Injection Example I QM07 The Top Web Application Attacks: Are you vulnerable? 24

SQL Injection Example II QM07 The Top Web Application Attacks: Are you vulnerable? 25

SQL Injection Example - Exploit QM07 The Top Web Application Attacks: Are you vulnerable? 26

SQL Injection Example - Outcome QM07 The Top Web Application Attacks: Are you vulnerable? 27

Demonstration SQL Injection Main points covered in the demo or video: How to find a SQL injection vulnerability How to exploit a SQL injection vulnerability QM07 The Top Web Application Attacks: Are you vulnerable? 28

3 - Malicious File Execution What is it? Application tricked into executing commands or creating files on server What are the implications? Command execution on server complete takeover Site Defacement, including XSS option QM07 The Top Web Application Attacks: Are you vulnerable? 29

Demonstration Malicious File Main points covered in the demo or video: Demonstrating how a Malicious File Exploit attack can be used to get access to system files QM07 The Top Web Application Attacks: Are you vulnerable? 30

Malicious File Execution Example I QM07 The Top Web Application Attacks: Are you vulnerable? 31

Malicious File Execution Example cont. QM07 The Top Web Application Attacks: Are you vulnerable? 32

Malicious File Execution Example cont. QM07 The Top Web Application Attacks: Are you vulnerable? 33

4 - Insecure Direct Object Reference What is it? Part or all of a resource (file, table, etc.) name controlled by user input. What are the implications? Access to sensitive resources Information Leakage, aids future hacks QM07 The Top Web Application Attacks: Are you vulnerable? 34

Demonstration Insecure Direct Object References Main points covered in the demo or video: Demonstrating how to extract files from the host system using the poison null byte attack QM07 The Top Web Application Attacks: Are you vulnerable? 35

Insecure Direct Object Reference - Example QM07 The Top Web Application Attacks: Are you vulnerable? 36

Insecure Direct Object Reference Example Cont. QM07 The Top Web Application Attacks: Are you vulnerable? 37

Insecure Direct Object Reference Example Cont. QM07 The Top Web Application Attacks: Are you vulnerable? 38

Organizations must mitigate the risk! Organizations need to mitigate the risk of a Web Application Security breach! They need to find and remediate vulnerabilities in their Web Applications before they are exploited by Hackers IBM Rational AppScan is the tool to help them do this! QM07 The Top Web Application Attacks: Are you vulnerable? 39

QM07 Demo of IBM Rational AppScan Empowering Organizations to mitigate risk

When to test your Applications for Security Defects??. QM07 The Top Web Application Attacks: Are you vulnerable? 41

Application Security Maturity Model External Security Cost Per Application Tested Internal Tactical Strategic Operationalized 0% 25% 50% 75% 100% Application Coverage QM07 The Top Web Application Attacks: Are you vulnerable? 42

Testing early reduces cost and time to market Found in Design Found in Coding Found in Integration Found in Beta Found in GA Design Errors 1x 5x 10x 15x 30x Coding Errors 1x 10x 20x 30x Integration Errors 1x 10x 20x * http://www.nist.gov/director/prog-ofc/report02-3.pdf QM07 The Top Web Application Attacks: Are you vulnerable? 43

IBM Rational AppScan SDLC Ecosystem Includes Fall 2008 Releases IBM Rational AppScan Enterprise / Reporting Console AppScan Developer Ed (Eclipse IDE) AppScan Ent. QuickScan (web client) AppScan Developer Ed for build systems (scanning agent) AppScan Tester Ed (scanning agent) AppScan Tester Ed (QA client) AppScan Enterprise user (web client) AppScan Standard Ed (desktop) Rational Application Developer Rational Software Analyzer Rational ClearCase Rational BuildForge Rational ClearQuest Rational Quality Manager Build security testing into the IDE Automate Security / Compliance testing in the Build Process Security / compliance testing incorporated into testing & remediation workflows Security and Compliance Testing, oversight, control, policy, in-depth tests Code Build QA Security IBM Rational Web Based Training for AppScan QM07 The Top Web Application Attacks: Are you vulnerable? 44

Q&A QM07