Web Application Security



Similar documents
Information Supplement: Requirement 6.6 Code Reviews and Application Firewalls Clarified

How To Protect A Web Application From Attack From A Trusted Environment

Web Application Security. Vulnerabilities, Weakness and Countermeasures. Massimo Cotelli CISSP. Secure

Passing PCI Compliance How to Address the Application Security Mandates

FINAL DoIT v.4 PAYMENT CARD INDUSTRY DATA SECURITY STANDARDS APPLICATION DEVELOPMENT AND MAINTENANCE PROCEDURES

Where every interaction matters.

The Top Web Application Attacks: Are you vulnerable?

Out of the Fire - Adding Layers of Protection When Deploying Oracle EBS to the Internet

OWASP Top Ten Tools and Tactics

Mingyu Web Application Firewall (DAS- WAF) All transparent deployment for Web application gateway

(WAPT) Web Application Penetration Testing

Using Foundstone CookieDigger to Analyze Web Session Management

Using Free Tools To Test Web Application Security

Magento Security and Vulnerabilities. Roman Stepanov

ArcGIS Server Security Threats & Best Practices David Cordes Michael Young

DFW INTERNATIONAL AIRPORT STANDARD OPERATING PROCEDURE (SOP)

Web Application Hacking (Penetration Testing) 5-day Hands-On Course

How to break in. Tecniche avanzate di pen testing in ambito Web Application, Internal Network and Social Engineering

Barracuda Web Site Firewall Ensures PCI DSS Compliance

Securing Your Web Application against security vulnerabilities. Ong Khai Wei, IT Specialist, Development Tools (Rational) IBM Software Group

Reducing Application Vulnerabilities by Security Engineering

Secure Web Applications. The front line defense

What is Web Security? Motivation

Detecting Web Application Vulnerabilities Using Open Source Means. OWASP 3rd Free / Libre / Open Source Software (FLOSS) Conference 27/5/2008

Creating Stronger, Safer, Web Facing Code. JPL IT Security Mary Rivera June 17, 2011

3. Broken Account and Session Management. 4. Cross-Site Scripting (XSS) Flaws. Web browsers execute code sent from websites. Account Management

Guidelines for Web applications protection with dedicated Web Application Firewall

PCI Requirements Coverage Summary Table

White Paper. Guide to PCI Application Security Compliance for Merchants and Service Providers

How to achieve PCI DSS Compliance with Checkmarx Source Code Analysis

FINAL DoIT v.8 APPLICATION SECURITY PROCEDURE

05.0 Application Development

Web Application Security

Information Technology Policy

How to complete the Secure Internet Site Declaration (SISD) form

OWASP AND APPLICATION SECURITY

Cross-Site Scripting

WHITE PAPER. FortiWeb and the OWASP Top 10 Mitigating the most dangerous application security threats

Web Application Security 101

WHITE PAPER. FortiWeb Web Application Firewall Ensuring Compliance for PCI DSS 6.5 and 6.6

WHITE PAPER FORTIWEB WEB APPLICATION FIREWALL. Ensuring Compliance for PCI DSS 6.5 and 6.6

Sitefinity Security and Best Practices

Check list for web developers

Web Application Penetration Testing

Integrating Security Testing into Quality Control

elearning for Secure Application Development

Adobe Systems Incorporated

WEB SECURITY CONCERNS THAT WEB VULNERABILITY SCANNING CAN IDENTIFY

Application Security Testing

BAE Systems PCI Essentail. PCI Requirements Coverage Summary Table

Bank Hacking Live! Ofer Maor CTO, Hacktics Ltd. ATC-4, 12 Jun 2006, 4:30PM

The New PCI Requirement: Application Firewall vs. Code Review

Device Hardening, Vulnerability Remediation and Mitigation for Security Compliance

Strategic Information Security. Attacking and Defending Web Services

Why Web Applications are making a hackers life easy. Presented by Jon Grew BT SBS

Web App Security Audit Services

Web application security

Criteria for web application security check. Version

How to start a software security initiative within your organization: a maturity based and metrics driven approach OWASP

Introduction to Web Application Security. Microsoft CSO Roundtable Houston, TX. September 13 th, 2006

How Security Testing can ensure Your Mobile Application Security. Yohannes, CEHv8, ECSAv8, ISE, OSCP(PWK) Information Security Consultant

Recon and Mapping Tools and Exploitation Tools in SamuraiWTF Report section Nick Robbins

CORE Security and the Payment Card Industry Data Security Standard (PCI DSS)

SECURE APPLICATION DEVELOPMENT CODING POLICY OCIO TABLE OF CONTENTS

Enterprise Application Security Workshop Series

10 Things Every Web Application Firewall Should Provide Share this ebook

WEB APPLICATION FIREWALL

Managing Vulnerabilities for PCI Compliance White Paper. Christopher S. Harper Managing Director, Agio Security Services

Adobe ColdFusion. Secure Profile Web Application Penetration Test. July 31, Neohapsis 217 North Jefferson Street, Suite 200 Chicago, IL 60661

Kenna Platform Security. A technical overview of the comprehensive security measures Kenna uses to protect your data

JVA-122. Secure Java Web Development

Web Application Security

Functional vs. Load Testing

PCI Requirements Coverage Summary Table

Application and Database Security with F5 BIG-IP ASM and IBM InfoSphere Guardium

Cracking the Perimeter via Web Application Hacking. Zach Grace, CISSP, CEH January 17, Mega Conference

Conducting Web Application Pentests. From Scoping to Report For Education Purposes Only

WEB APPLICATION VULNERABILITY STATISTICS (2013)

Client vs. Server Implementations of Mitigating XSS Security Threats on Web Applications

Application Security Best Practices. Wally LEE Principal Consultant

HTTPParameter Pollution. ChrysostomosDaniel

Barracuda Web Application Firewall vs. Intrusion Prevention Systems (IPS) Whitepaper

Protecting Your Organisation from Targeted Cyber Intrusion

STOPPING LAYER 7 ATTACKS with F5 ASM. Sven Müller Security Solution Architect

THE SMARTEST WAY TO PROTECT WEBSITES AND WEB APPS FROM ATTACKS

Data Breaches and Web Servers: The Giant Sucking Sound

SERENA SOFTWARE Serena Service Manager Security

ASP.NET MVC Secure Coding 4-Day hands on Course. Course Syllabus

Web Application Attacks and Countermeasures: Case Studies from Financial Systems

Application Layer Encryption: Protecting against Application Logic and Session Theft Attacks. Whitepaper

FortiWeb Web Application Firewall. Ensuring Compliance for PCI DSS requirement 6.6 SOLUTION GUIDE

National Information Security Group The Top Web Application Hack Attacks. Danny Allan Director, Security Research

Arrow ECS University 2015 Radware Hybrid Cloud WAF Service. 9 Ottobre 2015

Overview of Banking Application Security and PCI DSS Compliance for Banking Applications

Columbia University Web Security Standards and Practices. Objective and Scope

How to Build a Trusted Application. John Dickson, CISSP

Transcription:

Web Application Security Ng Wee Kai Senior Security Consultant PulseSecure Pte Ltd

About PulseSecure IT Security Consulting Company Part of Consortium in IDA (T) 606 Term Tender Cover most of the IT Security services: Audit & Review Assessment & Penetration Testing Policies & Standards Development Training Particularly strong in Web Application, Ethical Hacking and Secure Code Review 2

Our Accomplishments In 2008 Performed penetration test on over 60 applications Conducted security training to over 1,500 customer users Audited huge government infrastructure, over 26 government agencies with 40,000 stations Awarded global assessment term contract from world leading top 5 Insurance Group Developed and published exploits codes such as MITM for bank s 2 factor authentication Active participation in Hack in the Box & contribution to security articles

Agenda Hackers New Target Why Are Web Application Attacks Getting Popular? What Is Needed To Exploit A Web Application? Increasing Institutional Pressure Demo of Attacks What Can You Do About This? Summary 4

What Are Web Applications Web applications have many non traditional characteristics: Uses HTTP protocol Reliance on web browser No intrinsic notion of a session Standardized but optional security via HTTPS/SSL 5

Web Applications Invite Public Access To Your Most Sensitive Data Par t Suppl ie ner Sup r Suppl i er pl i e r Employ e U se r Hacker e Customer Customer m C u s to loy Emp er Partn er ee U se plo Em r ye e 6

SQL Injection Demo SQL injection is an attack in which malicious code is inserted into strings that are later passed to an instance of SQL Server for parsing and execution. Occurs when external input is used in dynamic construction of database commands. SQL Injection Demo 7

For Profit Hacking 8

Number of Web Attacks Are Increasing In 2008 Gartner Group: Today over 75% of attacks against a company s network come at the Application Layer, not at the Network or System Layer. 9

Hackers Knows That Most Web Application Are Vulnerable! 70% of websites at immediate risk of being hacked! Accunetix Jan 2007 http://www.acunetix.com/news/security audit results.htm 8 out of 10 websites vulnerable to attack WhiteHat security report Nov 2006 https://whitehatsec.market2lead.com/go/whitehatsec/webappstats1106 Since 2008, more than 70% of all the vulnerabilities reported worldwide are web Application related and are mostly classified as trivially exploitable percent of hacks happen at the application. InforWorld 64 percent of developers are not confident in their ability to write secure applications. Microsoft Developer Research The battle between hackers and security professionals has moved from the network layer to the Web applications themselves. Network World 10

Why Are Web Application Attacks Getting Popular? 11

Web Attack How To Is Easily Available A simple Google search results SQL Injection Techniques 2,260,000 web pages SQL Attack 30,141 Blogs SQL Attack Tools 322,000 XSS Techniques 752,000 web pages XSS Attack 9,769 Blogs XSS Attack Tools 251,000 web pages 12

Attack Characteristics Web Attacks are Stealth Incidents are not detected. Simpler Attack Vector Traditional Technology that require compiler, system functions like C++, C, Java Javascript, XML, CSS, HTML and forgiving browser Online services provide anonymous hosting Less traceable Indirectly Place traps so that victims are ensnared 13

Traditional Methods Do Not Protect You from Web Attack Applications: Unprotected and ignored Application Attack Web Server Attack Protected by intrusion prevention, OS Hardening, Patch Management Network Attack Secured by firewall/ips/ids 14

Typical Web Application http://www.corporate.com/profile/myprofile.asp?pg=1&id=5 Browser Web Server Application Server Database Server Web/Portal Application Database 15

Typical Point of Attacks Authenticating users Provide secure configuration Preventing parameter manipulation Handle exceptions Protecting sensitive data Browser Web Server Web Application Application Server Application Database Server Database Protecting sensitive data Preventing session hijacking and cookie replay attack Validating Input Authorizing users Authenticating and authorizing upstream Identities Auditing and logging activity and transactions Encrypting or hashing sensitive data 16

What Is Needed To Exploit A Web Application? 17

URL is a Cruise Missile http://www.corporate.com/profile/myprofile.asp?pg=1&id=5 Browser Web Server Application Server Database Server Web/Portal Application Database 18

New Form of Backdoor 19

Increasing Institutional Pressure There is an increasing institutional awareness of the fact that standards, which organizations must comply with, need to be determined. These institutional standards are appearing in both the public and private sectors and include: Sarbanes Oxley Act PCI Security Standards CMMI ISO27001 Google Flagging Etc

PCI DSS: 6 sections and 12 requirements Build and Maintain a Secure Network 1. Install and maintain a firewall configuration to Section protect data 6.5: develop secure web apps, 2. Do not use vendor supplied defaults for system cover passwords and other security parameters prevention of OWASP vulnerabilities Protect Cardholder Data Section 6.6: Ensure all web facing apps 3. Protect stored cardholder data are protected against known attacks using 4. Encrypt transmission of cardholder data and sensitive either of the information following across methods open public networks secure coding practices Maintain a Vulnerability Management Program 5. Use and regularly update anti virus software 6. Develop and maintain secure systems and applications installing a Web App FW* 21

OWASP Emerging standards body Focus on application security OWASP top ten project 22

XSS Demo Occurs when web application uses input from a user in output it generates without validating or encoding it Three known types of XSS Reflected XSS Stored XSS DOM Based XSS Reflect XSS Demo 23

Italian Bank XSS Form Injected by Fraudster 24

Site Keeping Track of XSS 25

What Can You Do About This? 26

What Can You Do About This? 27

Traditional SDLC Focus on Features 28

Secure-SDLC Security Awareness Security Response Asset Identification Deployment Guideline Threat Modeling Make Security Requirement Explicit Tools 3 rd Party Assessment Address the Threat Coding Standards, Best Practices Tools 29

Assessment Tools White box assessment Audit the code for insecure practice CodeSecure, Fortify Black box assessment Test the application with know attacks Webinspect, Watchfire 30

Penetration Testing and Auditing Penetration Testing Black Box/White Box approach Insider/Outsider Auditing Analyzing Configuration Files Architecture Source Code Policy Conformance Operational Plans and Procedures 31

What Can You Do About This? 32

Developer oriented Prevention Developers are increasingly seen as responsible for web application security The application must protect itself The developer must know how to include such protection in codes The developer must know the attacks General principles Variances 33

What Can You Do About This? 34

What are WAF New Type of Firewall to address this new threat Preventing attacks that network firewalls and intrusion detection systems can't, and they do not require modification of application source code 35

Advantage of WAF Protects in house applications Protects third party applications Continuous security assessment Virtual Patching, giving you a window for change management Allows for separate roles for security officers

Summary 37

Security is an Ongoing Process Internet is here to stay and more Web Applications are made available online everyday Most Web Applications are vulnerable Hackers are aware of these easily targets Organization must get ready to address these new threats PulseSecure can help 38

Contact Email: weekai@pulsesecure.com WebSite:www.pulsesecure.com The End 39