Contemporary Web Application Attacks. Ivan Pang Senior Consultant Edvance Limited



Similar documents
10 Things Every Web Application Firewall Should Provide Share this ebook

WEB APPLICATION FIREWALLS: DO WE NEED THEM?

Web Application Security. Radovan Gibala Senior Field Systems Engineer F5 Networks

STOPPING LAYER 7 ATTACKS with F5 ASM. Sven Müller Security Solution Architect

WHITE PAPER. FortiWeb and the OWASP Top 10 Mitigating the most dangerous application security threats

Mingyu Web Application Firewall (DAS- WAF) All transparent deployment for Web application gateway

How To Protect A Web Application From Attack From A Trusted Environment

Protect the data that drives our customers business. Data Security. Imperva s mission is simple:

FortiWeb 5.0, Web Application Firewall Course #251

FortiWeb for ISP. Web Application Firewall. Copyright Fortinet Inc. All rights reserved.

Networking and High Availability

Information Supplement: Requirement 6.6 Code Reviews and Application Firewalls Clarified

Penta Security 3rd Generation Web Application Firewall No Signature Required.

Networking and High Availability

Arrow ECS University 2015 Radware Hybrid Cloud WAF Service. 9 Ottobre 2015

The Top Web Application Attacks: Are you vulnerable?

Creating Stronger, Safer, Web Facing Code. JPL IT Security Mary Rivera June 17, 2011

NSFOCUS Web Application Firewall

How Web Application Security Can Prevent Malicious Attacks

THE SMARTEST WAY TO PROTECT WEBSITES AND WEB APPS FROM ATTACKS

Application Security Testing

IJMIE Volume 2, Issue 9 ISSN:

IBM Advanced Threat Protection Solution

REAL-TIME WEB APPLICATION PROTECTION. AWF SERIES DATASHEET WEB APPLICATION FIREWALL

Rational AppScan & Ounce Products

Table of Contents. Page 2/13

Application Layer Encryption: Protecting against Application Logic and Session Theft Attacks. Whitepaper

Implementation of Web Application Firewall

Passing PCI Compliance How to Address the Application Security Mandates

Swordfish

How To Protect Your Web Applications From Attack From A Malicious Web Application From A Web Attack

IBM Protocol Analysis Module

Security 101: BIG-IP ASM and IPS Differences Defined

Web Application Security

Imperva s Response to Information Supplement to PCI DSS Requirement Section 6.6

Recon and Mapping Tools and Exploitation Tools in SamuraiWTF Report section Nick Robbins

NSFOCUS Web Application Firewall White Paper

Detecting and Exploiting XSS with Xenotix XSS Exploit Framework

Application Code Development Standards

Enterprise-Grade Security from the Cloud

Importance of Web Application Firewall Technology for Protecting Web-based Resources

EC-Council CAST CENTER FOR ADVANCED SECURITY TRAINING. CAST 619 Advanced SQLi Attacks and Countermeasures. Make The Difference CAST.

THE BLIND SPOT IN THREAT INTELLIGENCE THE BLIND SPOT IN THREAT INTELLIGENCE

Web Application Firewall on SonicWALL SSL VPN

Introduction: 1. Daily 360 Website Scanning for Malware

External Network & Web Application Assessment. For The XXX Group LLC October 2012

ETHICAL HACKING APPLICATIO WIRELESS110 00NETWORK APPLICATION MOBILE MOBILE0001

Where every interaction matters.

From the Bottom to the Top: The Evolution of Application Monitoring

Web Application Firewalls: When Are They Useful? OWASP AppSec Europe May The OWASP Foundation

Analytics, Big Data, & Threat Intelligence: How Security is Transforming

Semantic based Web Application Firewall (SWAF V 1.6) Operations and User Manual. Document Version 1.0

MatriXay WEB Application Vulnerability Scanner V Overview. (DAS- WEBScan ) The best WEB application assessment tool

Web Application Attacks and Countermeasures: Case Studies from Financial Systems

Networking for Caribbean Development

Application Denial of Service Is it Really That Easy?

Securing Your Web Application against security vulnerabilities. Ong Khai Wei, IT Specialist, Development Tools (Rational) IBM Software Group

Emerging Network Security Threats and what they mean for internal auditors. December 11, 2013 John Gagne, CISSP, CISA

Powered by. Incapsula Cloud WAF

A Decision Maker s Guide to Securing an IT Infrastructure

WEB SITE SECURITY. Jeff Aliber Verizon Digital Media Services

From Rivals to BFF: WAF & VA Unite OWASP The OWASP Foundation

Security Assessment of Waratek AppSecurity for Java. Executive Summary

Web Application Firewall

Protecting against DoS/DDoS Attacks with FortiWeb Web Application Firewall

Enterprise level security, the Huddle way.

Barracuda Web Application Firewall vs. Intrusion Prevention Systems (IPS) Whitepaper

Website Security. End-to-End Application Security from the Cloud. Cloud-Based, Big Data Security Approach. Datasheet: What You Get. Why Incapsula?

SQL Injection 2.0: Bigger, Badder, Faster and More Dangerous Than Ever. Dana Tamir, Product Marketing Manager, Imperva

Application and Database Security with F5 BIG-IP ASM and IBM InfoSphere Guardium

Kenna Platform Security. A technical overview of the comprehensive security measures Kenna uses to protect your data

SANS Top 20 Critical Controls for Effective Cyber Defense

FortiWeb TM. Web Application Firewall. Unmatched Protection for Web Applications. Emerging Threats Create New Challenges

Cracking the Perimeter via Web Application Hacking. Zach Grace, CISSP, CEH January 17, Mega Conference

ABC LTD EXTERNAL WEBSITE AND INFRASTRUCTURE IT HEALTH CHECK (ITHC) / PENETRATION TEST

Firewalls P+S Linux Router & Firewall 2013

(WAPT) Web Application Penetration Testing

Web Application Firewall on SonicWALL SRA

ArcGIS Server Security Threats & Best Practices David Cordes Michael Young

A Network Administrator s Guide to Web App Security

Bank Hacking Live! Ofer Maor CTO, Hacktics Ltd. ATC-4, 12 Jun 2006, 4:30PM

Imperva Cloud WAF. How to Protect Your Website from Hackers. Hackers. *Bots. Legitimate. Your Websites. Scrapers. Comment Spammers

Pentests more than just using the proper tools

IndusGuard Web Application Firewall Test Drive User Registration

Complete Protection against Evolving DDoS Threats

Introducing IBM s Advanced Threat Protection Platform

White Paper Secure Reverse Proxy Server and Web Application Firewall

Pentests more than just using the proper tools

Web Application Security. Vulnerabilities, Weakness and Countermeasures. Massimo Cotelli CISSP. Secure

Some Notes on Web Application Firewalls

NSFOCUS Web Vulnerability Scanning System

FINAL DoIT v.8 APPLICATION SECURITY PROCEDURE

SECURITY ADVISORY. December 2008 Barracuda Load Balancer admin login Cross-site Scripting

INTRUSION PREVENTION (IPS) Features SECURITY OF INFORMATION TECHNOLOGIES

Multi-Layer Security for Multi-Layer Attacks. Preston Hogue Dir, Cloud and Security Marketing Architectures

Transcription:

Contemporary Web Application Attacks Ivan Pang Senior Consultant Edvance Limited

Agenda How Web Application Attack impact to your business? What are the common attacks? What is Web Application Firewall (WAF)? How can we select the right WAF? Edvance Confidential 2

How Web Application Attack impact to your business What are the attacker going to do? Discover any valuable information Credit Card information, personal information, corporation financial information On-line Service interruption Denial of Service Damage of corporate image Looking for some Web Servers to launch Attacks Edvance Confidential 3

How attackers launch attacks? The threat is evolving Well funded Well-organized Sophisticated Automated attacks are the new frontier Large scale Shifting locations Shifting techniques IBM Internet Security Systems, X-Force 2009 Mid-Year Trend and Risk Report Edvance Confidential 4

What are the common attacks? Top 10 Common Attacks to Web Application (According to OWASP 2010 rc1) http://www.owasp.org/index.php/top_10 Edvance Confidential 5

How bad the damage can be done TYPICAL WEB ATTACK DEMO Edvance Confidential 6

Attack Step one Understand Web Server & Database Edvance Confidential 7

Attack Step one Understand Web Server & Database Edvance Confidential 8

Try to capture other cookie information Cross-site Scripting Edvance Confidential 9

Try to capture other cookie information Cross-site Scripting Edvance Confidential 10

Bypass login authentication SQL Injection Edvance Confidential 11

Bypass login authentication SQL Injection Edvance Confidential 12

Extract what data you want SQL Injection Edvance Confidential 13

Extract what data you want SQL Injection Edvance Confidential 14

Extract what data you want SQL Injection Edvance Confidential 15

Extract what data you want SQL Injection Edvance Confidential 16

Extract what data you want SQL Injection Edvance Confidential 17

Extract what data you want SQL Injection Edvance Confidential 18

Shutdown database server Edvance Confidential 19

Shutdown database server Edvance Confidential 20

Why Web Application Firewall Web Application Firewalls alone detect attacks against applications! Traditional firewalls only detect network attacks Only inspect IP address, port/service number IDS products only detect known signatures No application understanding; high rate of false positives/negatives No user/session tracking; No protection of SSL traffic Data Application (OSI Layer 7+) Protocol Network Protocols (OSI Layer 4 6) Network Access (OSI Layer 1 3)

How to choose the right Web Application Firewall WAF SELECTION CRITERIA Edvance Confidential 22

How to choose the right WAF? Throughput and latency Ease of use Reporting Depth of protection False positives and negatives Price Edvance Confidential 23

Common WAF requirements of Customers Security: SQLi, Cross Site Scripting, Cross Site Request Forgery, etc mitigation, signature is not enough False positive correction with minimal security impact Detailed Alert/Violation forensics Anonymous proxy and Botnet awareness Automated vulnerability scanner integration Track web username Automatic Security Update Management/Reporting Central management of policies, alerts, reports, etc Flexible security policy assignment and creation Effective reporting system Custom reporting capabilities Flexible in deployment mode Edvance Confidential 24

Deployment mode Critical Factor of performance Transparent Inline Bridge Supports full enforcement Data Center High performance, low latency Fail-open interfaces Transparent & Reverse Proxy High performance for content modification URL rewriting, cookie signing, SSL termination INTERNET Switch Non-inline Deployment Reverse Non-Inline Proxy Bridge Deployment Primarily for monitoring, zero network latency Software mode installation Edvance Confidential 25

Preemptive protection Attack Source Feeds Security Research Team Hacker A Malicious/ TOR IP Application vulnerability recon WAF Hacker B Anonymous Proxy Zero Day Attack Hacker C Phishing Site Phishing Incident Edvance Confidential 26

Q & A SECTION Edvance Confidential 27