Web App Security Audit Services

Similar documents
locuz.com Professional Services Security Audit Services

Web Application Report

Attack Vector Detail Report Atlassian

Application Security Testing

Web Application Threats and Vulnerabilities Web Server Hacking and Web Application Vulnerability

Last update: February 23, 2004

Out of the Fire - Adding Layers of Protection When Deploying Oracle EBS to the Internet

Network Security Audit. Vulnerability Assessment (VA)

Overview of Network Security The need for network security Desirable security properties Common vulnerabilities Security policy designs

Web Application Vulnerability Testing with Nessus

2,000 Websites Later Which Web Programming Languages are Most Secure?

Secure Web Application Coding Team Introductory Meeting December 1, :00 2:00PM Bits & Pieces Room, Sansom West Room 306 Agenda

Arrow ECS University 2015 Radware Hybrid Cloud WAF Service. 9 Ottobre 2015

KEN VAN WYK. Fundamentals of Secure Coding and how to break Software MARCH 19-23, 2007 RESIDENZA DI RIPETTA - VIA DI RIPETTA, 231 ROME (ITALY)

Integrated Network Vulnerability Scanning & Penetration Testing SAINTcorporation.com

CEH Version8 Course Outline

FINAL DoIT v.4 PAYMENT CARD INDUSTRY DATA SECURITY STANDARDS APPLICATION DEVELOPMENT AND MAINTENANCE PROCEDURES

WHITE PAPER. FortiWeb and the OWASP Top 10 Mitigating the most dangerous application security threats

FINAL DoIT v.8 APPLICATION SECURITY PROCEDURE

SAST, DAST and Vulnerability Assessments, = 4

ANNEXURE-1 TO THE TENDER ENQUIRY NO.: DPS/AMPU/MIC/1896. Network Security Software Nessus- Technical Details

1 hours, 30 minutes, 38 seconds Heavy scan. All scanned network resources. Copyright 2001, FTP access obtained

Where every interaction matters.

Web Application Hacking (Penetration Testing) 5-day Hands-On Course

Web Vulnerability Assessment Report

3. Broken Account and Session Management. 4. Cross-Site Scripting (XSS) Flaws. Web browsers execute code sent from websites. Account Management

Application Security Testing. Generic Test Strategy

Professional Penetration Testing Techniques and Vulnerability Assessment ...

Web Application Security. Radovan Gibala Senior Field Systems Engineer F5 Networks

The Top Web Application Attacks: Are you vulnerable?

Learn Ethical Hacking, Become a Pentester

GFI LANguard Network Security Scanner 3.3. Manual. By GFI Software Ltd.


Information Security. Training

External Supplier Control Requirements

Cloud Security:Threats & Mitgations

Directory and File Transfer Services. Chapter 7

Port Scanning and Vulnerability Assessment. ECE4893 Internetwork Security Georgia Institute of Technology

What is Web Security? Motivation

Penetration Testing Service. By Comsec Information Security Consulting

Guidelines for Web applications protection with dedicated Web Application Firewall

Barracuda Web Site Firewall Ensures PCI DSS Compliance

Vulnerability Assessment and Penetration Testing

Sitefinity Security and Best Practices

ASP.NET MVC Secure Coding 4-Day hands on Course. Course Syllabus

Passing PCI Compliance How to Address the Application Security Mandates

Cross-Site Scripting

N-CAP Users Guide Everything You Need to Know About Using the Internet! How Firewalls Work

Understanding Security Testing

SENSITIVE AUSTRALIAN SPORTS COMMISSION ATHLETE MANAGEMENT SYSTEM (AMS) SMARTBASE SECURITY TEST PLAN. Final. Version 1.0

Client logo placeholder XXX REPORT. Page 1 of 37

Web Application Security

Cyber Essentials. Test Specification

FIREWALLS & NETWORK SECURITY with Intrusion Detection and VPNs, 2 nd ed. Chapter 4 Finding Network Vulnerabilities

Web application vulnerability statistics for

MatriXay WEB Application Vulnerability Scanner V Overview. (DAS- WEBScan ) The best WEB application assessment tool

Criteria for web application security check. Version

Advanced Administration for Citrix NetScaler 9.0 Platinum Edition

DFW INTERNATIONAL AIRPORT STANDARD OPERATING PROCEDURE (SOP)

WHITE PAPER FORTIWEB WEB APPLICATION FIREWALL. Ensuring Compliance for PCI DSS 6.5 and 6.6

North Dakota 2013 IT Security Audit Vulnerability Assessment & Penetration Test Project Briefing

ITEC441- IS Security. Chapter 15 Performing a Penetration Test

Web Application Penetration Testing

Certified Ethical Hacker Exam Version Comparison. Version Comparison

Adobe Systems Incorporated

Black Box Penetration Testing For GPEN.KM V1.0 Month dd "#$!%&'(#)*)&'+!,!-./0!.-12!1.03!0045!.567!5895!.467!:;83!-/;0!383;!

Reducing Application Vulnerabilities by Security Engineering

THE SMARTEST WAY TO PROTECT WEBSITES AND WEB APPS FROM ATTACKS

Web application security

How To Perform An External Security Vulnerability Assessment Of An External Computer System

WHITE PAPER. FortiWeb Web Application Firewall Ensuring Compliance for PCI DSS 6.5 and 6.6

The Weakest Link: Mitigating Web Application Vulnerabilities. webscurity White Paper. webscurity Inc. Minneapolis, Minnesota USA

(WAPT) Web Application Penetration Testing

PCI Security Scan Procedures. Version 1.0 December 2004

The purpose of this report is to educate our prospective clients about capabilities of Hackers Locked.

[CEH]: Ethical Hacking and Countermeasures

REPORT ON AUDIT OF LOCAL AREA NETWORK OF C-STAR LAB

Payment Card Industry (PCI) Executive Report. Pukka Software

ETHICAL HACKING APPLICATIO WIRELESS110 00NETWORK APPLICATION MOBILE MOBILE0001

COURSE NAME: INFORMATION SECURITY INTERNSHIP PROGRAM

College Training Program

ArcGIS Server Security Threats & Best Practices David Cordes Michael Young

FORBIDDEN - Ethical Hacking Workshop Duration

CYBERTRON NETWORK SOLUTIONS

Penetration Testing with Kali Linux

Payment Card Industry (PCI) Data Security Standard

Medical Device Security Health Imaging Digital Capture. Security Assessment Report for the Kodak DryView 8150 Imager Release 1.0.

IntruPro TM IPS. Inline Intrusion Prevention. White Paper

Threat Modeling. Frank Piessens ) KATHOLIEKE UNIVERSITEIT LEUVEN

McAfee Certified Assessment Specialist Network

Essential IT Security Testing

A Systems Engineering Approach to Developing Cyber Security Professionals

Application Intrusion Detection

Security Threat Kill Chain What log data would you need to identify an APT and perform forensic analysis?

AppDefend Application Firewall Overview

PTSv2 in pills: The Best First for Beginners who want to become Penetration Testers. Self-paced, online, flexible access

Transcription:

locuz.com Professional Services Web App Security Audit Services

The unsecured world today Today, over 80% of attacks against a company s network come at the Application Layer not the Network or System layer. Immunity against security threats is becoming one of the leading challenges for Enterprise community. The race to go online and develop competitive services are enabling enterprise communities to launch web applications rapidly with less attention to security risk s making the sites vulnerable. Interestingly many corporate sites are vulnerable to hackers in touch of a button. Web-based applications are the portal of choice for illegal entrance to your organization's network. That's why you need to defend your network by arming yourself with the knowledge of how attacks occur-and learn how to fix the problem before someone finds holes in your network security armor. When it comes to Web application security, many companies just scan their systems for vulnerabilities and call it a day. But that's a mistake: Don't rely on system security analysis of the Web platform to indicate whether the application is secured. Many of the most dangerous security holes in IT infrastructure are based not on worms or viruses, and not on known vulnerabilities in Application Servers, but on vulnerabilities in the WEB-applications themselves. These vulnerabilities are unique to each application. Application-level vulnerabilities leave the door open to costly external Web attacks, internal database breaches, and worms. WEB-application Vulnerabilities Occur in Multiple Areas Application Platform Known Vulnerabilities Administration Extension Checking Common File Checks Data Extension Checking Backup Checking Directory Enumeration Path Truncation Hidden Web Paths Forceful Browsing Application Mapping Cookie Manipulation Custom Application Scripting Parameter Manipulation Reserve Directory Transversal Brute Force Application Mapping Cookie Poisoning/Theft Buffer Overflow SQL Injection Cross-site Scripting

Risk Assessment Web applications security vulnerabilities should be identified assessed and addressed as a part of enterprise risk assessment program. Backdoor Broken authentication Brute force Buffer Overflows Code errors Command Injection Cookie Manipulation Cross-site scripting Debug Option Developer comments/ debug Directory Attacks Firewall Configuration error Hidden Field Manipulation HTTP Misformat Insecure email functions Insecure use of encryption Method Matching Null Method OS Configuration Parameter Manipulation Protocol Piggy Back Services Perversion Session Poisoning SQL Injection Subvert Server time Subvertable client-side code Thread Safety Problem URL Encoding Web Server Configuration 12% 15% 42% 23% 42% 23% 31% 27% 8% 31% 23% 35% 27% 45% 35% 27% 12% 27% 38% 15% 31% 42% 38% 38% 0% 10% 20% 30% 40% 50% 60% 70% 80% 90% 100%

Test Scope Test Category Test Types Web App Testing Brute Force Insufficient Authentication Authentication Weak Password Recovery Validation Credential/Session Prediction Authorization Insufficient Authorization Insufficient Session Expiration Session Fixation Abuse of Functionality Logical Attacks Denial of Service Insufficient Anti-Automation Insufficient Process Validation Content Spoofing Client- Side Attacks Cross Site Scripting CGI Scripting Extensive, Including application specific Buffer Overflow Format String Command Execution LDAP Injection OS Commanding SQL Injection SSI injection Directory Indexing Information Disclosure Path Traversal Predictable Resource Location Information Leakage ICMP Checks Windows NT Checks TCP & UDP Port Tests Stealth testing DNS Spoofing RPC testing Initial Sequence Number Prediction System Vulnerability Check FTP abuse checks SMTP relay checks (spam) LDAP checks SNMP checks DNS and bind checks SMB/ NetBIOS checks NFS checks NIS checks WHOIS checks Domain checks Spoofing checks

Locuz Approach Taking Enterprise to Next Level of Security Enterprise must be able to detect the loopholes in their web applications. To enable this process software and security professionals can evaluate the severity of the loopholes and can patch them as quickly as possible. A typical methodology might be to evaluate the portfolio of applications on web connected devices and assess each layer of application logic for potential vulnerabilities by, Performing technical due diligence on a given WEB Application Finding new ways to break into the application Identifying potential holes in the application that might endanger organizations Based on the above process and open web application security project (OWASP) we probe in to both known and unknown vulnerabilities. Benefits Delivers timely and valuable application vulnerability information to assist in developing proactive protection measures Provides advice and actionable data needed to quickly address security holes provided by experts Protects business and information assets against hacking and loss of valuable data Assists in increase of customer confidence and trust on the application Prevents loss of customer s confidential information Overcoming legal hassles due to failure of the application security Reduces the cost of recovery and fixes due to loss of information

Methodology Locuz follows a 5-step process to enable enterprises to meet this challenge. Information Gathering 1 Planning & Analysis 2 Information Gathering 5 Analysis & Report Vulnerability Detection 3 Analysis & Report Vulnerability Detection 4 Attack/ Penetration Testing Assessing Gathering the information from the client regarding his business implications due to the vulnerabilities Understanding the client requirements on the components of the web application (Web servers, Database servers etc) to be performed Verify with the client whether the vulnerability test should be performed on the website on real time or off time Planning Define the scope based on the nature, timing and extent of the evaluation Verify that no test will violate any specific law of local or national statute. Also, our auditor will consider obtaining a signed authorization form from the client agreeing to the deployment of web application penetration testing tools and methods Investigate and use available automated tools to perform web application vulnerability assessments. These tools improve the efficiency and effectiveness of web application security testing Designing Freeze the vulnerability types in discussion with the client Design the security test framework depending on the client environment Perform the attacks on the submitted URLs either locally or remotely

Attacking Assess possible methods of attacks based on identification of vulnerabilities Identify the type of OS employed by target hosts Obtain permission to execute a port scan for those destination target hosts that are live. Execute exploits on the client web environment Analysis & Reporting Run commercial or open source web application vulnerability assessment tools to verify results Defining the scope of the analysis Objectives of the report Period of work performed Nature, timing & extent of web application vulnerability analysis performed Conclusion as to the effectiveness of controls and significance of vulnerabilities identified Deliverables Once testing process is completed, Reports are generated and delivered to the Enterprise under test. These reports are configured to make the user comprehend the impact of the test. This is articulated to the fact that the report is delivered with proper and clear communication language styles (English). The identified security loopholes are categorized as follows: RISK High level risk Medium level risk Low level risk CATEGORIES Vulnerabilities that will breach the Enterprise systems immediately Vulnerabilities that needs yet another combinations to breach the system Vulnerabilities that are un patched and leaves a trace for future attacks The testing steps are documented, the findings are discussed, and all weaknesses identified, have solutions suggested with linking information and references where necessary. Where possible, a range of options might be supplied to allow the IT department to choose the one most applicable. The information in the report can range from technical port scan results to company documents, and is normally of most interest to technical staff.

locuz.com About Locuz Locuz is an IT Infrastructure Solutions and Services company focused on helping enterprises transform their businesses thru innovative and optimal use of technology. Our strong team of specialists, help address the challenge of deploying & managing complex IT Infrastructure in the face of rapid technological change. Apart from providing a wide range of advisory, implementation & managed IT services, Locuz has built innovative platforms in the area of Hybrid Cloud Orchestration, High Performance Computing & Software Asset Analytics. These products have been successfully deployed in leading enterprises and we are helping customers extract greater RoI from their IT Infrastructure assets & investments. Web App Security Audit Services Locuz Enterprise Solutions 401, Krishe Sapphire, Main Road, Madhapur, Hyderabad-500018, Telangana, India