OWASP Top Ten Backdoors



Similar documents
Members of the UK cyber security forum. Soteria Health Check. A Cyber Security Health Check for SAP systems

ArcGIS Server Security Threats & Best Practices David Cordes Michael Young

WEB SECURITY CONCERNS THAT WEB VULNERABILITY SCANNING CAN IDENTIFY

Reducing Application Vulnerabilities by Security Engineering

KASPERSKY SECURITY INTELLIGENCE SERVICES. EXPERT SERVICES.

Where every interaction matters.

WHITE PAPER. FortiWeb and the OWASP Top 10 Mitigating the most dangerous application security threats

πωχ Notes on Domino Black Hat Las Vegas 2003 Aldora Louw PricewaterhouseCoopers

Thick Client Application Security

Secure Web Application Coding Team Introductory Meeting December 1, :00 2:00PM Bits & Pieces Room, Sansom West Room 306 Agenda

Columbia University Web Security Standards and Practices. Objective and Scope

Adobe Systems Incorporated

S E C U R I T Y A S S E S S M E N T : B o m g a r B o x T M. Bomgar. Product Penetration Test. September 2010

Passing PCI Compliance How to Address the Application Security Mandates

Magento Security and Vulnerabilities. Roman Stepanov

05.0 Application Development

Securing Database Servers. Database security for enterprise information systems and security professionals

OWASP Top Ten Tools and Tactics

How to break in. Tecniche avanzate di pen testing in ambito Web Application, Internal Network and Social Engineering

Top 10 Database. Misconfigurations.

AIRDEFENSE SOLUTIONS PROTECT YOUR WIRELESS NETWORK AND YOUR CRITICAL DATA SECURITY AND COMPLIANCE

North Dakota 2013 IT Security Audit Vulnerability Assessment & Penetration Test Project Briefing

S E C U R I T Y A S S E S S M E N T : B o m g a r A p p l i a n c e s

Threats and Attacks. Modifications by Prof. Dong Xuan and Adam C. Champion. Principles of Information Security, 5th Edition 1

Cisco Advanced Services for Network Security

Barracuda Web Site Firewall Ensures PCI DSS Compliance

Overview of the Penetration Test Implementation and Service. Peter Kanters

Appalachian Regional Commission Evaluation Report. Table of Contents. Results of Evaluation Areas for Improvement... 2

AIRDEFENSE SOLUTIONS PROTECT YOUR WIRELESS NETWORK AND YOUR CRITICAL DATA SECURITY AND COMPLIANCE

White Paper. Guide to PCI Application Security Compliance for Merchants and Service Providers

Cyber Exploits: Improving Defenses Against Penetration Attempts

OWASP AND APPLICATION SECURITY

8 Steps for Network Security Protection

8 Steps For Network Security Protection

Device Hardening, Vulnerability Remediation and Mitigation for Security Compliance

The Risks of Cloud Storage

Network Security Audit. Vulnerability Assessment (VA)

The Top Web Application Attacks: Are you vulnerable?

Database Security Guideline. Version 2.0 February 1, 2009 Database Security Consortium Security Guideline WG

SENSE Security overview 2014

SAST, DAST and Vulnerability Assessments, = 4

Penetration Testing Guidelines For the Financial Industry in Singapore. 31 July 2015

Cloud Security:Threats & Mitgations

Privileged. Account Management. Accounts Discovery, Password Protection & Management. Overview. Privileged. Accounts Discovery

Securing SaaS Applications: A Cloud Security Perspective for Application Providers

Security Testing. Vulnerability Assessment vs Penetration Testing. Gabriel Mihai Tanase, Director KPMG Romania. 29 October 2014

Application Security Policy

The Weakest Link: Mitigating Web Application Vulnerabilities. webscurity White Paper. webscurity Inc. Minneapolis, Minnesota USA

Windows Remote Access

3. Broken Account and Session Management. 4. Cross-Site Scripting (XSS) Flaws. Web browsers execute code sent from websites. Account Management

Secure Web Applications. The front line defense

Top 10 Cloud Risks That Will Keep You Awake at Night

ASP.NET MVC Secure Coding 4-Day hands on Course. Course Syllabus

Securing Your Web Application against security vulnerabilities. Ong Khai Wei, IT Specialist, Development Tools (Rational) IBM Software Group

THE HACKERS NEXT TARGET

Web applications. Web security: web basics. HTTP requests. URLs. GET request. Myrto Arapinis School of Informatics University of Edinburgh

Criteria for web application security check. Version

Penetration Testing in Romania

Host Hardening. Presented by. Douglas Couch & Nathan Heck Security Analysts for ITaP 1

Detecting Web Application Vulnerabilities Using Open Source Means. OWASP 3rd Free / Libre / Open Source Software (FLOSS) Conference 27/5/2008

WEB SITE SECURITY. Jeff Aliber Verizon Digital Media Services

Smart (and safe) Lighting:

Introduction to IT Security

NETWORK AND CERTIFICATE SYSTEM SECURITY REQUIREMENTS

Secure Programming Lecture 12: Web Application Security III

Introduction to Web Application Security. Microsoft CSO Roundtable Houston, TX. September 13 th, 2006

ETHICAL HACKING APPLICATIO WIRELESS110 00NETWORK APPLICATION MOBILE MOBILE0001

What is Web Security? Motivation

SECURITY TRENDS & VULNERABILITIES REVIEW 2015

Web Engineering Web Application Security Issues

Making your web application. White paper - August secure

Comprehensive Approach to Database Security

Annex B - Content Management System (CMS) Qualifying Procedure

An Introduction to Application Security In ASP.NET Environments. Houston.NET User Group. February 23 rd, 2006

Architectural Design Patterns. Design and Use Cases for OWASP. Wei Zhang & Marco Morana OWASP Cincinnati, U.S.A.

SQL Injection January 23, 2013

SecurityMetrics Vision whitepaper

Board Portal Security: How to keep one step ahead in an ever-evolving game

Mitigating Server Breaches with Secure Computation. Yehuda Lindell Bar-Ilan University and Dyadic Security

COURSE NAME: INFORMATION SECURITY INTERNSHIP PROGRAM

Penetration Test Report

IBM Managed Security Services Vulnerability Scanning:

Information Security Services

Cyber R &D Research Roundtable

REGULATIONS FOR THE SECURITY OF INTERNET BANKING

APPLICATION SECURITY: FROM WEB TO MOBILE. DIFFERENT VECTORS AND NEW ATTACK

Elevation of Mobile Security Risks in the Enterprise Threat Landscape

Securing Enterprise Web Applications at the Source: An Application Security Perspective

Security Best Practices Overview

Protecting Your Organisation from Targeted Cyber Intrusion

Penetration Testing - a way for improving our cyber security

Question Name C 1.1 Do all users and administrators have a unique ID and password? Yes

VICTORIA UNIVERSITY OF WELLINGTON Te Whare Wānanga o te Ūpoko o te Ika a Māui

Strategic Information Security. Attacking and Defending Web Services

HTExploit: Bypassing htaccess Restrictions

Information Supplement: Requirement 6.6 Code Reviews and Application Firewalls Clarified

MatriXay WEB Application Vulnerability Scanner V Overview. (DAS- WEBScan ) The best WEB application assessment tool

Projectplace: A Secure Project Collaboration Solution

Web Vulnerability Scanner by Using HTTP Method

Desktop Security. Overview and Technology Guidance. Michael Ramsey Network Specialist, NC DPI

Transcription:

OWASP Top Ten Backdoors 1 Yaniv Simsolo, COMSEC Consulting The news about the above agreement was posted on Cisco site in mid 1998. Shortly this news was removed from Cisco website. Gradually all this information which was readily available about backdoors and doorbells was removed from the internet.

OWASP Top Ten Backdoors Prologue Definition Top Ten Most Common Backdoors Impacts Summary 2

OWASP Top Ten Backdoors The OWASP Top Ten Backdoors paper provides a list of the most common backdoors in applications. Just like the OWASP Top Ten outlines the top ten mistakes developers make in applications, the top ten backdoors discuss the top ten features in systems that leave the application vulnerable. The Top Ten Backdoors are relevant to any application including web applications, clientserver applications, multi-tier enterprise applications etc. 3

Prologue Backdoors are more common then developers and system professionals think. Hackers and malicious users can exploit backdoors easily, without leaving any special traces in the system. For example, a common unconventional backdoor in enterprises is a middle-tier system that does not employ authentication and authorization mechanisms Trust-based architecture Any user within the enterprise can exploit such a backdoor easily by requesting the middle-tier system for confidential data and un-authorized actions within the enterprise systems. 4

Definition Definitions of backdoor: A hidden entrance to a computer system that can be used to bypass security policies (MS definition). An undocumented way to get access to a computer system or the data it contains. A way of getting into a guarded system without using the required password. 5

Definition Problem: definitions are too wide Fine separation line between security vulnerabilities and backdoors. Backdoor is: A security vulnerability That can be used to bypass security policies and mechanisms in a system Two main types of backdoors: Conventional (hidden parameters, redundant interfaces, etc.) Unconventional Considering relative risk, exposure and damage the unconventional backdoors are more dangerous 6

OWASP Top Ten Backdoors Top Ten backdoors 7

OWASP Top Ten Backdoors Conventional backdoors 8

OWASP Top Ten Backdoors, Number 1 Administration And Management Interfaces Exposed */admin - everywhere Access control management - limited scope Only protected by authentication. Usually only PWD protection. Administration interfaces are thus exposed to: Brute-Force Dictionary attacks Lockout attacks (depending on architecture) 9

OWASP Top Ten Backdoors, Number 1 Administration And Management Interfaces Exposed 10

OWASP Top Ten Backdoors, Number 1 Administration And Management Interfaces Exposed Allowing anyone to take control over the application 3 rd party systems force backdoors on organizations Once the administrator credentials are default hackers heaven! OWASP A10 Insecure Configuration Management 11

OWASP Top Ten Backdoors, Number 2 Redundant interfaces/functions/features debug=true Backdoors by design Uploaded to production environment By mistake On purpose Due to faulted procedures Enable various actions and control over systems Exploitable at large by hackers OWASP A10 Insecure Configuration Management OWASP A1 Unvalidated Input 12

OWASP Top Ten Backdoors, Number 3 Hidden parameters *=-999 Backdoors by design Uploaded to production environment on purpose 3 rd party systems expose the enterprise: Without protection Without knowledge of backdoor existence Enable various actions and control over systems Exploitable at large by hackers OWASP A1 Unvalidated Input? 13

OWASP Top Ten Backdoors, Number 4 Redundant users guest, testuser, scott (tiger) Usually default users Uploaded to production environment due to faulted procedures Common knowledge May enable hackers to take total control over the system Easily mitigated OWASP A10 Insecure Configuration Management 14

OWASP Top Ten Backdoors, Number 5 Authorization for 3 rd party access Backdoors by design Uploaded to production environment By design By mistake Apparently difficult to control authorization issues 3 rd party access may expose the enterprise or system without protection Should be controlled by procedures Organization awareness and continuous monitoring a must OWASP A10 Insecure Configuration Management 15

OWASP Top Ten Backdoors Unconventional backdoors 16

OWASP Top Ten Backdoors, Number 6 Authentication and Authorization between application components Most common application level backdoor vulnerability Difficult to Fix. In 3 rd party systems sometimes impossible to fix Leaves the system totally open to the knowledgeable hacker 17

OWASP Top Ten Backdoors, Number 6 Middle-tier system actual API in production environment - No authorization, No Authentication 18

OWASP Top Ten Backdoors, Number 6 Authentication and Authorization between application components Once open to the web security disaster Within the enterprise: Common knowledge for developers and others Embedded in systems design Suggests flawed development procedures Once exposes other enterprise systems - security nightmare OWASP A3 Broken Authentication OWASP A10 Insecure Configuration Management 19

OWASP Top Ten Backdoors, Number 7 Old Users in Systems Probably most common in enterprises Originally created according to standard procedures Old users are backdoors to systems enabling identity fraud bypassing systems security mechanisms very difficult to locate in real time Hard to locate, remove, and control 20

OWASP Top Ten Backdoors, Number 7 Old Users in Systems Commonly exploited by employees for various purposes (not necessarily innocent) Commonly exploited by developers as standard development process Old users that were administrators enable ANYONE in becoming an administrator of the system. In an enterprise core system jackpot for malicious users. All the above discovered on daily basis in organizations. OWASP A10 Insecure Configuration Management 21

OWASP Top Ten Backdoors, Number 8 Flawed hardening xp_cmdshell Perfect hardening is difficult to achieve Hardening of ALL system components is mandatory Common failure in organizations lack of hardening Enables malicious entities multiple attack vectors, up to a total control of the system OWASP A10 Insecure Configuration Management 22

OWASP Top Ten Backdoors, Number 8 Flawed hardening Most (aware) organizations perform: OS hardening Application servers hardening DB hardening What about application hardening? OWASP A10 Insecure Configuration Management 23

OWASP Top Ten Backdoors, Number 8 Flawed hardening 24

OWASP Top Ten Backdoors, Number 9 Exposed Configuration Data Common within organizations Linked databases PWD files Difficult to mitigate Weaved into systems architecture Collateral implications on the enterprise Even encryption is difficult May effect other systems 25

OWASP Top Ten Backdoors, Number 10 Lack of separation between environments Not a backdoor in itself However: A security vulnerability That can be used to bypass security policies and mechanisms in a system A problem for most organizations and enterprises 26

OWASP Top Ten Backdoors, Number 10 Lack of separation between environments Only two options for mitigation: Obfuscate data in test and development environments Employ identical security mechanisms and policies in production and other environments Both very difficult to employ 27

OWASP Top Ten Backdoors, Number 10 Identical authentication parameters in PROD and TEST environments 28

OWASP Top Ten Backdoors Impacts 29

Impacts Backdoors can not be mitigated easily Are deeply established within the enterprise Mitigation is resource-consuming Usually represented as vulnerabilities: Hiding the full impact Lacking total resolution Limited scope of referencing (a backdoor in system can affect other systems) 30

Impacts Impacts are larger then conceived Some backdoors may even enable creating additional backdoors Furthermore impacts may effect multiple systems (Note to self: watch security managers responses for such backdoors discovery ) 31

Summary Backdoors are abundant Represent a security nightmare Like most application level vulnerabilities - best if discovered and mitigated in design and development phases Should not be ignored 32

Questions? 33