An approach to Web Application Penetration Testing. By: Whiskah



Similar documents
ASL IT SECURITY BEGINNERS WEB HACKING AND EXPLOITATION

Security Testing. Vulnerability Assessment vs Penetration Testing. Gabriel Mihai Tanase, Director KPMG Romania. 29 October 2014

Penetration Testing in Romania

Overview of the Penetration Test Implementation and Service. Peter Kanters

Detecting Web Application Vulnerabilities Using Open Source Means. OWASP 3rd Free / Libre / Open Source Software (FLOSS) Conference 27/5/2008

Application Security Testing

Web Application security testing: who tests the test?

BUILDING AN OFFENSIVE SECURITY PROGRAM BUILDING AN OFFENSIVE SECURITY PROGRAM

ETHICAL HACKING APPLICATIO WIRELESS110 00NETWORK APPLICATION MOBILE MOBILE0001

Adobe ColdFusion. Secure Profile Web Application Penetration Test. July 31, Neohapsis 217 North Jefferson Street, Suite 200 Chicago, IL 60661

New Zealand Company Six full time technical staff Offices in Auckland and Wellington

Web Maniac Hacking Trust. Aditya K Sood [adi_ks [at] secniche.org] SecNiche Security

Securing Your Web Application against security vulnerabilities. Ong Khai Wei, IT Specialist, Development Tools (Rational) IBM Software Group

FINAL DoIT v.4 PAYMENT CARD INDUSTRY DATA SECURITY STANDARDS APPLICATION DEVELOPMENT AND MAINTENANCE PROCEDURES

Preventive Approach for Web Applications Security Testing OWASP 10/30/2009. The OWASP Foundation

Where every interaction matters.

05.0 Application Development

ensuring security the way how we do it

Ethical Hacking as a Professional Penetration Testing Technique

Pentests more than just using the proper tools

State of Web Application Security. Ralph Durkee Durkee Consulting, Inc. Rochester ISSA & OWASP Chapters rd@rd1.net

Pentests more than just using the proper tools

Testing the OWASP Top 10 Security Issues

Security and Vulnerability Testing How critical it is?

TECHNICAL AUDITS FOR CERTIFYING EUROPEAN CITIZEN COLLECTION SYSTEMS

WHITE PAPER. FortiWeb and the OWASP Top 10 Mitigating the most dangerous application security threats

LEADING CYBER SECURITY AND PENETRATION TESTING COMPANY

Introduction to Penetration Testing Graham Weston

ASL IT Security Advanced Web Exploitation Kung Fu V2.0

Magento Security and Vulnerabilities. Roman Stepanov

Expert Services Group (Security Testing) Nilesh Dasharathi Sadaf Kazi Aztecsoft Limited

Technical Testing. Application, Network and Red Team Testing DATA SHEET. Test your security defenses. Expert Testing, Analysis and Assessments

WEB SECURITY CONCERNS THAT WEB VULNERABILITY SCANNING CAN IDENTIFY

The Top Web Application Attacks: Are you vulnerable?

Pentests: Exposing real world attacks

Common Criteria Web Application Security Scoring CCWAPSS

white SECURITY TESTING WHITE PAPER

Integrating Security Testing into Quality Control

Integrating Security into the Application Development Process. Jerod Brennen, CISSP CTO & Principal Security Consultant, Jacadis

Web Application Penetration Testing

Rational AppScan & Ounce Products

ArcGIS Server Security Threats & Best Practices David Cordes Michael Young

Reducing Application Vulnerabilities by Security Engineering

EC-Council CAST CENTER FOR ADVANCED SECURITY TRAINING. CAST 619 Advanced SQLi Attacks and Countermeasures. Make The Difference CAST.

Penetration Testing: Lessons from the Field

How To Ensure That Your Computer System Is Safe

Contemporary Web Application Attacks. Ivan Pang Senior Consultant Edvance Limited

HackMiami Web Application Scanner 2013 PwnOff

Spigit, Inc. Web Application Vulnerability Assessment/Penetration Test. Prepared By: Accuvant LABS

Penetration Testing and Its Methodologies

Advanced ANDROID & ios Hands-on Exploitation

Adobe Systems Incorporated

Penetration Testing Scope Factors

ITEC441- IS Security. Chapter 15 Performing a Penetration Test

SECURITY B-SIDES: ATLANTA STRATEGIC PENETRATION TESTING. Presented by: Dave Kennedy Eric Smith

The Web AppSec How-to: The Defenders Toolbox

Recon and Mapping Tools and Exploitation Tools in SamuraiWTF Report section Nick Robbins

Using Free Tools To Test Web Application Security

"Practical Security Testing for Web Applications"

Mean Time to Fix (MTTF) IT Risk s Dirty Little Secret Joe Krull, CPP, CISSP, IAM, CISA, A.Inst.ISP, CRISC, CIPP

Development Processes (Lecture outline)

Application Security Audit Fault Injection Model, Fuzz Generators & Static Code Analysis. Training Brochure

Cloud Security Through Threat Modeling. Robert M. Zigweid Director of Services for IOActive

How to break in. Tecniche avanzate di pen testing in ambito Web Application, Internal Network and Social Engineering

Six Essential Elements of Web Application Security. Cost Effective Strategies for Defending Your Business

Managing Vulnerabilities for PCI Compliance White Paper. Christopher S. Harper Managing Director, Agio Security Services

Presented by Evan Sylvester, CISSP

Application Security Testing. Erez Metula (CISSP), Founder Application Security Expert

Passing PCI Compliance How to Address the Application Security Mandates

Learning objectives for today s session

North Dakota 2013 IT Security Audit Vulnerability Assessment & Penetration Test Project Briefing

Implementation of Web Application Security Solution using Open Source Gaurav Gupta 1, B. K. Murthy 2, P. N. Barwal 3

Demystifying Penetration Testing for the Enterprise. Presented by Pravesh Gaonjur

CORE Security and the Payment Card Industry Data Security Standard (PCI DSS)

How to achieve PCI DSS Compliance with Checkmarx Source Code Analysis

The Penetration Testing Execution Standard (PTES) Dave Kennedy (ReL1K) Twitter: Dave_ReL1K

Creating Stronger, Safer, Web Facing Code. JPL IT Security Mary Rivera June 17, 2011

Protect the data that drives our customers business. Data Security. Imperva s mission is simple:

WEB APPLICATION VULNERABILITY STATISTICS (2013)

Web application testing

Strategic Information Security. Attacking and Defending Web Services

Using Nessus In Web Application Vulnerability Assessments

Essential IT Security Testing

Effective Software Security Management

How to Rob an Online Bank (and get away with it)

Mobile Application Hacking for Android and iphone. 4-Day Hands-On Course. Syllabus

Network Security Audit. Vulnerability Assessment (VA)

Secure Programming Lecture 12: Web Application Security III

Transcription:

An approach to Web Application Penetration Testing By: Whiskah

#whiskah Security enthusiast NOT a CI$$P, CIS*, GIAC, MCS*, CCN* NOT Lulzsec or Anonymous :)

Don t be confused Vulnerability assessment identify, verify and rank vulnerabilities Penetration testing identify, analyze and exploit vulnerabilities to prove that systems can be compromised. (Result: Fail or Succeed)

Agenda An approach to web application penetration testing NOT a technical discussion about webappsec f00 Buy me a beer later to discuss webapp kungfu

So? You are tasked to pentest a webapp? What do you do? Where do you begin?

Common Approach Immediately bang a web app scanner against the target and generate a report Use checklists only without exploiting issues identified

Issues: Web App Scanners Are good at finding technical vulnerabilities (sqli, xss, LFI, RFI etc ) but they don t understand business context or logic flaws In short...they lack the human creativity of an experienced pentester

Issues: Checklists Can be used as baseline for checking for missing controls but it cannot simulate a real attacker or adversary Missing controls (e.g Lack of encryption, lack of session timeout etc )

Recommended Approach Create a threat profile for the target application Create a test plan Perform the test Prepare the report

I. Threat Profiling Think of what an adversary want to achieve by attacking the application (Think in terms of C.I.A.) As the owner of the application, what are you worried about A threat profile is the set of all threats the application should protect against

Why Threat Profile? Allows the tester to design test cases that achieve the adversary s goals Allows the tester to focus on interesting variables quickly E.g. file.php?lang=en

Sample Threat Profile/Attacker Goals: Online Banking Unauthorized fund transfers Unauthorized bills payment Unauthorized access to SOA Gain access to customer data Etc

II. Create a test plan Map the threat profile to the relevant pages in the application. Determine what attacks to perform to realize the threat profile (hacker creativity) Web app attacks (logic flaws, xss, sqli, lfi, rfi, csrf etc..)

Sample Test Plan: Online Banking Unauthorized fund transfer maps to the funds transfer page(s) Example attack: Parameter manipulation manipulate the source or target accounts fundtransfer.php?src=acnta&target=acntb Attempt to transfer funds even if the source accounts have zero balance Attempt negative values

Sample Test Plan: Online Banking Unauthorized bills payment maps to the bills payment page(s) Example attack: Parameter manipulation manipulate the source or target accounts Attempt to pay bills even if the source accounts have zero balance Use negative values

Sample Test Plan: Online Banking Gain access to customer data identify page(s) that can be SQL injected Example attack: - SQL Injection

III. Perform the Test Execute the approved test plan New ideas may come up during this phase. Update the test plan as needed Combine both automated scanners with manual tests When a vulnerability is found, take a step-by-step screen capture of the attack

IV. Prepare the report Include an Executive Summary for top management & a more detailed Technical Report for I.T. Personnel/Staff (*Prepare a DRAFT report and send to the client for review ) Why?

Reporting: Executive Summary A high level overview of the test. Who?, What? When?, Scope, Purpose, Methodology, Limitations. A summary of key findings that would affect business along with recommendations Use non-technical language. Relate how the findings can affect busine$$

Reporting: Executive Summary Which do you think would have more impact to a CEO? Pentest Co. was able to identify xss,sqli in ACME Bank application or Pentest Co. was able to transfer $100000 from CEO s account to a dummy account

Reporting: Technical Report More Detailed findings suitable for IT managers/staff Include references to web application research papers or OWASP Step-by-step of the attack even my grandma can reproduce :-D educate developers into developing secure code educate client

Recommended Approach Create a threat profile for the target application Create a test plan Perform the test Prepare the report

KTnxBye!

Questions?

Credits: www.ivizsecurity.com www.plynt.com