Ethical Hacking Penetrating Web 2.0 Security



Similar documents
Application Denial of Service Is it Really That Easy?

Common Security Vulnerabilities in Online Payment Systems

1. Introduction. 2. Web Application. 3. Components. 4. Common Vulnerabilities. 5. Improving security in Web applications

Detailed Description about course module wise:

ASP.NET MVC Secure Coding 4-Day hands on Course. Course Syllabus

Application Security Testing. Generic Test Strategy

Hack Proof Your Webapps

SECURITY ADVISORY. December 2008 Barracuda Load Balancer admin login Cross-site Scripting

Creating Stronger, Safer, Web Facing Code. JPL IT Security Mary Rivera June 17, 2011

What about MongoDB? can req.body.input 0; var date = new Date(); do {curdate = new Date();} while(curdate-date<10000)

Introduction. Two levels of security vulnerabilities:

Web Application Security

Web Application Attacks and Countermeasures: Case Studies from Financial Systems

Hacking Web Apps. Detecting and Preventing Web Application Security Problems. Jorge Blanco Alcover. Mike Shema. Technical Editor SYNGRESS

EVALUATING COMMERCIAL WEB APPLICATION SECURITY. By Aaron Parke

External Vulnerability Assessment. -Technical Summary- ABC ORGANIZATION

Check list for web developers

Magento Security and Vulnerabilities. Roman Stepanov

Bank Hacking Live! Ofer Maor CTO, Hacktics Ltd. ATC-4, 12 Jun 2006, 4:30PM

(WAPT) Web Application Penetration Testing

What is Web Security? Motivation

Where every interaction matters.

Barracuda Web Site Firewall Ensures PCI DSS Compliance

Web Application Hacking (Penetration Testing) 5-day Hands-On Course

Cracking the Perimeter via Web Application Hacking. Zach Grace, CISSP, CEH January 17, Mega Conference

EC-Council CAST CENTER FOR ADVANCED SECURITY TRAINING. CAST 619 Advanced SQLi Attacks and Countermeasures. Make The Difference CAST.

Web Application Report

Project 2: Web Security Pitfalls

Last update: February 23, 2004

Sample Report. Security Test Plan. Prepared by Security Innovation

FINAL DoIT v.8 APPLICATION SECURITY PROCEDURE

Are you fighting new threats with old weapons? Secure your Web applications with Web Application Firewalls.

WEB SECURITY CONCERNS THAT WEB VULNERABILITY SCANNING CAN IDENTIFY

Course Duration: 80Hrs. Course Fee: INR (Certification Lab Exam Cost 2 Attempts)

A Decision Maker s Guide to Securing an IT Infrastructure

Acunetix Website Audit. 5 November, Developer Report. Generated by Acunetix WVS Reporter (v8.0 Build )

A Network Administrator s Guide to Web App Security

CSE 3482 Introduction to Computer Security. Denial of Service (DoS) Attacks

CYBERTRON NETWORK SOLUTIONS

How to break in. Tecniche avanzate di pen testing in ambito Web Application, Internal Network and Social Engineering

Cyber Security Workshop Ethical Web Hacking

Web Application Security

Certified Ethical Hacker (CEH)

Denial of Service Attacks

Web Application Security

CEH Version8 Course Outline

Sitefinity Security and Best Practices

WHITE PAPER. FortiWeb and the OWASP Top 10 Mitigating the most dangerous application security threats

National Information Security Group The Top Web Application Hack Attacks. Danny Allan Director, Security Research

Passing PCI Compliance How to Address the Application Security Mandates

FINAL DoIT v.4 PAYMENT CARD INDUSTRY DATA SECURITY STANDARDS APPLICATION DEVELOPMENT AND MAINTENANCE PROCEDURES

Attack and Penetration Testing 101

Annual Web Application Security Report 2011

The Top Web Application Attacks: Are you vulnerable?

Enterprise level security, the Huddle way.

Testing the OWASP Top 10 Security Issues

Detecting Web Application Vulnerabilities Using Open Source Means. OWASP 3rd Free / Libre / Open Source Software (FLOSS) Conference 27/5/2008

APPLICATION SECURITY AND ITS IMPORTANCE

CSE598i - Web 2.0 Security OWASP Top 10: The Ten Most Critical Web Application Security Vulnerabilities

Are AJAX Applications Vulnerable to Hack Attacks?

Detecting and Exploiting XSS with Xenotix XSS Exploit Framework

WEB SITE SECURITY. Jeff Aliber Verizon Digital Media Services

Security Awareness For Website Administrators. State of Illinois Central Management Services Security and Compliance Solutions

Hacking for Fun and Profit

Proxies. Chapter 4. Network & Security Gildas Avoine

TECHNICAL AUDITS FOR CERTIFYING EUROPEAN CITIZEN COLLECTION SYSTEMS

Chapter 4 Application, Data and Host Security

University of Wisconsin Platteville SE411. Senior Seminar. Web System Attacks. Maxwell Friederichs. April 18, 2013

Top Ten Web Application Vulnerabilities in J2EE. Vincent Partington and Eelco Klaver Xebia

Arrow ECS University 2015 Radware Hybrid Cloud WAF Service. 9 Ottobre 2015

InfoSec Academy Pen Testing & Hacking Track

Live Hacking. Threats & Countermeasures in Action (SEC411) Ofer Maor CTO Hacktics Ltd.

Web Application Security

Kenna Platform Security. A technical overview of the comprehensive security measures Kenna uses to protect your data

A Server and Browser-Transparent CSRF Defense for Web 2.0 Applications. Slides by Connor Schnaith

3 Network and Web security

Application Security Best Practices. Wally LEE Principal Consultant

Enterprise Application Security Workshop Series

Demystifying Penetration Testing for the Enterprise. Presented by Pravesh Gaonjur

Adobe Systems Incorporated

Client logo placeholder XXX REPORT. Page 1 of 37

SESSION IDENTIFIER ARE FOR NOW, PASSWORDS ARE FOREVER

Högskoleexamen. Web application Security. Sektionen för informationsvetenskap, data- och elektroteknik. Rapport för Högskoleexamen, January 2013

Integrating Security Testing into Quality Control

REAL-TIME WEB APPLICATION PROTECTION. AWF SERIES DATASHEET WEB APPLICATION FIREWALL

PCI Compliance Updates

Using Foundstone CookieDigger to Analyze Web Session Management

Application Security Testing

Client Side Filter Enhancement using Web Proxy

Is Drupal secure? A high-level perspective on web vulnerabilities, Drupal s solutions, and how to maintain site security

Protecting against DoS/DDoS Attacks with FortiWeb Web Application Firewall

A Survey on Threats and Vulnerabilities of Web Services

Transcription:

Ethical Hacking Penetrating Web 2.0 Security

Contact Sam Bowne Computer Networking and Information Technology City College San Francisco Email: sbowne@ccsf.edu Web: samsclass.info 2

Two Hacking Classes CNIT 123: Ethical Hacking and Network Defense Has been taught since Spring 2007 (four times) Face-to to-face and Online sections available Fall 2008 CNIT 124: Advanced Ethical Hacking Taught for the first time in Spring 2008 3

Supplemental Materials Projects from recent research Students get extra credit by attending conferences 4

Certified Ethical Hacker Those two classes prepare students for CEH Certification 5

Certificate in Network Security 6

Associate of Science Degree 7

SQL Injection Four Vulnerabilities 16% of Web sites vulnerable Cross-Site Scripting 65% of major sites vulnerable Cross-Site Request Forgery Almost every Web site with a login is vulnerable Layer 7 Denial of Service Every site with active content is vulnerable 8

SQL Injection

E-Commerce Web Site Web Server Database (SQL) Server Customer Sends name, password, order requests, etc. 10

E-Commerce Login HTML Form collects name and password It's processed at the SQL server with code like this: SELECT * FROM customer WHERE username = name' AND password = pw' 11

SQL Injection If a hacker enters a name of OR 1=1 The SQL becomes: OR 1=1 -- SELECT * FROM customer WHERE username = OR 1=1 --' ' AND password = pw The -- ends the statement, making the rest of the line a comment 1=1 is always true, so this makes the condition true 12

Demonstration 13

SQL Injection Effects This can cause the user to be authenticated as administrator, dump the entire database, or have other drastic effects Comic from xkcd.org 14

Sanitize your Inputs All user input should be checked, and special characters like ' or '' or < or > discarded That will reduce vulnerability to SQL injection The typical SQL Injection vulnerability takes more than four months to locate and fix 15

Cross-Site Scripting (XSS)

Web Message Board Web server Clients posting and reading comments 17

Cross-Site Scripting (XSS) One client posts active content, with <script> tags or other programming content When another client reads the messages, the scripts are executed in his or her browser One user attacks another user, using the vulnerable Web application as a weapon 18

Demonstration <script>alert("xss vulnerability!")</script> <script>alert(document.cookie alert(document.cookie)</script> <script>window.location window.location="http:// ="http://www.ccsf.edu"</script> 19

XSS Scripting Effects Steal another user's authentication cookie Hijack session Harvest stored passwords from the target's browser Take over machine through browser vulnerability Redirect Webpage Many, many other evil things 20

Cross-Site Request Forgery (XSRF)

To Internet Web-based based Email Router Target Using Email Attacker Sniffing Traffic 22

Cross-Site Request Forgery (XSRF) Gmail sends the password through a secure HTTPS connection That cannot be captured by the attacker But the cookie identifying the user is sent in the clear with HTTP That can easily be captured by the attacker The attacker gets into your account without learning your password 23

Demonstration 24

XSRF Countermeasure Use https://mail.google.com instead of http://gmail.com No other mail service has this option at all, as far as I know 25

Application-Layer Denial of Service

Application-Layer DoS Find small requests that consume a lot of server resources Application Crashing Data Destruction Resource Depletion Memory CPU Bandwidth Disk Space 27

Resource Depletion Example CPU Consumption On a large forum Create a complicated regular expression search Use a script to launch the search over and over 28

Real-World Test Hacktics,, a security company, brought down a large corporate network with just three laptops in an authorized test Global company with branches in Israel, Europe and the USA Internet Connectivity 3x50Mbps lines with load balancing. ISPs provide Cisco (Riverhead) based Anti DDoS solutions High security network, 30+ Web servers, backend servers, Mail Relay, databases 29

Hacktics Results DoS was successful to all systems but one Two applications crashed completely after a few dozen requests only Most other applications stopped responding after 5-15 minutes of script execution from up to three laptops (though with most a single laptop was sufficient) Main cause of DoS was CPU exhaustion 30

References Where the Web is Weak Application-Layer DDoS Attacks http://www.forbes.com/2008/05/14/web- hacking-google google-tech-security08- cx_ag_0514webhack.html networks.rice.edu/papers/2006-04 04-Infocom- final.ppt 31