Rapid Security Framework (RSF) Taxonomie, Bewertungsparameter und Marktanalyse zur Auswahl von Fuzzing-Tools



Similar documents
Automated Testing With Commercial Fuzzing Tools

Development. Resilient Software. Secure and. Mark S. Merkow Lakshmikanth Raghavan. CRC Press. Taylor& Francis Croup. Taylor St Francis Group,

Web application testing

Adobe Systems Incorporated

FINAL DoIT v.4 PAYMENT CARD INDUSTRY DATA SECURITY STANDARDS APPLICATION DEVELOPMENT AND MAINTENANCE PROCEDURES

Promoting Application Security within Federal Government. AppSec DC November 13, The OWASP Foundation

Passing PCI Compliance How to Address the Application Security Mandates

Columbia University Web Security Standards and Practices. Objective and Scope

How To Ensure That Your Computer System Is Safe

Promoting Application Security within Federal Government. AppSec DC November 13, The OWASP Foundation

Detecting Web Application Vulnerabilities Using Open Source Means. OWASP 3rd Free / Libre / Open Source Software (FLOSS) Conference 27/5/2008

Attack Vector Detail Report Atlassian

Threat Modeling. Categorizing the nature and severity of system vulnerabilities. John B. Dickson, CISSP

Web App Security Audit Services

Open Web Application Security Project Open source advocacy group > web security Projects dedicated to security on the web

Web Application Report

Adobe ColdFusion. Secure Profile Web Application Penetration Test. July 31, Neohapsis 217 North Jefferson Street, Suite 200 Chicago, IL 60661

Application Security Testing. Erez Metula (CISSP), Founder Application Security Expert

Standard: Web Application Development

Application Security Testing. Generic Test Strategy

Magento Security and Vulnerabilities. Roman Stepanov

Application Security Testing

90% of data breaches are caused by software vulnerabilities.

DFW INTERNATIONAL AIRPORT STANDARD OPERATING PROCEDURE (SOP)

Threat Modeling/ Security Testing. Tarun Banga, Adobe 1. Agenda

Penetration testing: exposure of fallacies 1-14

SAST, DAST and Vulnerability Assessments, = 4

The monsters under the bed are real World Tour

More Repeatable Vulnerability Assessment An introduction

Penetration Testing: Lessons from the Field

OWASP and OWASP Top 10 (2007 Update) OWASP. The OWASP Foundation. Dave Wichers. The OWASP Foundation. OWASP Conferences Chair

Threat Modeling. Frank Piessens ) KATHOLIEKE UNIVERSITEIT LEUVEN

Securing Your Web Application against security vulnerabilities. Ong Khai Wei, IT Specialist, Development Tools (Rational) IBM Software Group

Zero-Day and Less-Than-Zero-Day Vulnerabilities and Exploits in Networked Infrastructures 1

Creating Stronger, Safer, Web Facing Code. JPL IT Security Mary Rivera June 17, 2011

Template for PFI Final Incident Report for Remote Investigations

External Supplier Control Requirements

ensuring security the way how we do it

State of The Art: Automated Black Box Web Application Vulnerability Testing. Jason Bau, Elie Bursztein, Divij Gupta, John Mitchell

Successful Strategies for QA- Based Security Testing

North Dakota 2013 IT Security Audit Vulnerability Assessment & Penetration Test Project Briefing

Testing for Security

How the CC Harmonizes with Secure Software Development Lifecycle

Secure in 2010? Broken in 2011! Matias Madou, PhD Principal Security Researcher

Payment Card Industry (PCI) Data Security Standard PFI Final Incident Report. Template for PFI Final Incident Report. Version 1.0.

CS 356 Lecture 23 and 24 Software Security. Spring 2013

The Electronic Arms Race of Cyber Security 4.2 Lecture 7

elearning for Secure Application Development

Protect Your Organization With the Certification That Maps to a Master s-level Education in Software Assurance

WEB APPLICATION VULNERABILITY STATISTICS (2013)

DISCOVERY OF WEB-APPLICATION VULNERABILITIES USING FUZZING TECHNIQUES

Bridging the Gap - Security and Software Testing. Roberto Suggi Liverani ANZTB Test Conference - March 2011

Case Study: Treating Challenges in Software Trustability

Mobile Security Framework

WhiteHat Security White Paper. Top 11 PCI DSS 3.0 Changes That Will Affect Your Application Security Program

Security Testing & Load Testing for Online Document Management system

Columbia University Web Application Security Standards and Practices. Objective and Scope

(WAPT) Web Application Penetration Testing

Payment Card Industry (PCI) Data Security Standard PFI Final Incident Report. Template for PFI Final Incident Report. Version 1.1.

Out of the Fire - Adding Layers of Protection When Deploying Oracle EBS to the Internet

Software Security Touchpoint: Architectural Risk Analysis

How to achieve PCI DSS Compliance with Checkmarx Source Code Analysis

Intrusion detection for web applications

A Strategic Approach to Web Application Security The importance of a secure software development lifecycle

Application Intrusion Detection

05.0 Application Development

Black Box versus White Box: Different App Testing Strategies John B. Dickson, CISSP

Payment Card Industry (PCI) Terminal Software Security. Best Practices

Using Nessus In Web Application Vulnerability Assessments

WHITEPAPER. Nessus Exploit Integration

Professional Penetration Testing Techniques and Vulnerability Assessment ...

MANAGED SECURITY TESTING

Arrow ECS University 2015 Radware Hybrid Cloud WAF Service. 9 Ottobre 2015

CYBER TRENDS & INDUSTRY PENETRATION TESTING. Technology Risk Supervision Division Monetary Authority of Singapore

Using Web Security Scanners to Detect Vulnerabilities in Web Services

Information Security. Training

The Top Web Application Attacks: Are you vulnerable?

KASPERSKY SECURITY INTELLIGENCE SERVICES. EXPERT SERVICES.

Industrie Security 0.1?

Juniper Networks Secure

Learn Ethical Hacking, Become a Pentester

FINAL DoIT v.8 APPLICATION SECURITY PROCEDURE

Criteria for web application security check. Version

Penetration from application down to OS

External Vulnerability Assessment. -Technical Summary- ABC ORGANIZATION

Learning security through insecurity

Security Whitepaper: ivvy Products

Rational AppScan & Ounce Products

A Network Administrator s Guide to Web App Security

SECURITY TRENDS & VULNERABILITIES REVIEW 2015

What is Web Security? Motivation

PCI-DSS and Application Security Achieving PCI DSS Compliance with Seeker

Learning objectives for today s session

Web Application Hacking (Penetration Testing) 5-day Hands-On Course

Lecture 11 Web Application Security (part 1)

Programming Flaws and How to Fix Them

Detailed Description about course module wise:

ArcGIS Server Security Threats & Best Practices David Cordes Michael Young

How to start a software security initiative within your organization: a maturity based and metrics driven approach OWASP

Transcription:

Rapid Security Framework (RSF) Taxonomie, Bewertungsparameter und Marktanalyse zur Auswahl von Fuzzing-Tools Prof. Dr. Hartmut Pohl Peter Sakal, B.Sc. M.Sc.

Motivation Attacks Industrial espionage Sabotage Data privacy problems Software is unsecure bugs: especially security related bugs! Detected and undetected (less-than-) Zero Day Vulnerabilities Vulnerability detection := Secure Software + Costreduction

Known and unknown vulnerabilities Intended application Actual application Vulnerabilities Functional errors Known Unknown

Methodical Penetration Testing: RiDA Reactive (Network) Forensics Damage Potential White Risks (known) creative methodical Penetration Testing Rapid in-depth Analysis (RiDA) Threat Modeling Static Analysis Proactive Fuzzing Black Risks (unknown)

Standard software development Requirements Design Implementation Verification Functional Error Correction Zero-Day Vulnerabilities Design Code Runtime

Secure software development Requirements Design Implementation Verification Functional Error Correction Zero-Day Vulnerabilities Design Code Runtime Threat Modeling Static Analysis Fuzzing Continious Tool Identification & Evaluation >100 Evaluation Criteria >300 Tools (> 200k EUR)

Costs Benefit: cost of bug elimination 100 x 15 x 1 x 6 x Phase Design Implementation Verification Release [NIST 2002]

Threat Modeling process Understand the Adversary s View Characterize the Security of the System Determine Threats Entry Points Use Scenarios Identify Threats Assets Trust Levels Assumptions & Dependencies Model the System Analyse Threats/ determine Vulnerabilities

Threat Modeling techniques Data Flow Diagrams Attack Trees

Data Flow Diagrams Data Files User Request Service Requested File(s) Audit Data Audit Write Audit Read Audit Engine Authn Engine Audit Requests Audit Info Get Creds Admin Credentials Set/Get Creds Mnmgt Tool [Baier 2006]

Data Flow Diagrams Data Files User Request Decrypt Company Secrets Service Requested File(s) Audit Data Audit Write Audit Read Audit Engine Authn Engine Audit Requests Audit Info Get Creds Admin Credentials Set/Get Creds Mnmgt Tool [Baier 2006]

Attack Trees Threat #1 Decrypt Company Secrets and 1.1 Obtain Encrypted File 1.2 Obtain Password/Key 1.1.1 Bribe the Sysadmin 1.1.2 Hack the Database 1.2.1 Brute Force Password/Key 1.2.2 Use Keylogger

Static Analysis Process Establish Goals Run Tools Review Code Make Fixes Reporting Enhance Code Understanding Static Analyser Generate Report Find Bugs Find Vulnerabilities Target Applications Source Code Identify distinctions to specification

Fuzzing process Identify Input Interfaces Generate Fuzz Send Fuzz Monitoring: Recognize Failures Reporting Vulnerabilities Analysis e.g. Sniffer Fuzzer Monitor Generate Report Identification & Analysis Target Application State: {Fail, Working}

> 300 Fuzzer Which are the right for your application(s)?

Rapid in-depth Security Framework (RSF) activities 1. Tool identification: search strategy- keywords 2. Screening: Taxonomies 3. Tool evaluation: objective, customisable evaluation criteria

Fuzzer taxonomy classified by purpose

Fuzzer taxonomy classified by local interface

Fuzzer taxonomy classified by remote interface

Market analysis Fuzzer: protocol specific Supported interfaces Command-Line Database In-Memory Environment-Variable Web-Browser API 10% 7% 1% 34% Network-Protocol 15% File-Format 25% Web-Application

One-off Tools: Protocol Specific Fuzzer 90 80 70 60 50 40 30 20 10 0 One-Off Sonstige

Evaluation criteria & description parameter Product description Product name Version Release date Developer Distribution Source Available languages Supported Operating Systems Protocol modeling Fuzz-data generation Intended use Interfaces Target interpretation Costs and license License type and name Costs for license Costs for Updates Costs for support Additional paid features Costs for purchase of additional components Feature comprehensiveness Target monitoring Resetting of the target Exception analysis Reporting Ability to parameterize Error reproduction Scheduled tasks Support for parallel fuzzing Ability to interrupt fuzzing Software ergonomics Effectively Efficiency Functional criteria Dialog criteria In- and output criteria Documentation User manual Technical documentation Quality of integrated help system Quality of the FAQ Quality of video documentation Quality of Tutorials and How-to s Quality of public support forum or similar system Quality of customer support Volume of 3 rd party documentation Case studies and Whitepapers Webinars / Training Development Development status Development activity Interfaces for further development Developer tools Used programming language

Tool-composition: 1 Tool Casestudy: Fuzzing Frameworks General 100% 90% 80% Costs and License F 70% 60% A Fuzzing Framework criteria 50% 40% 30% Features B 20% 10% Model-Inference and Dynamic Generation-Based fuzzing criteria 0% Software ergonomics E C Generation-Based fuzzing criteria Documentation D Mutation-Based and Model- Inference fuzzing criteria Extendibility

Tool-composition: many Tools Casestudy: Fuzzing Frameworks General 100% 90% 80% Costs and License A 70% 60% B Fuzzing Framework criteria 50% 40% Features 30% 20% E 10% Model-Inference and Dynamic Generation-Based fuzzing criteria 0% Software ergonomics C D Generation-Based fuzzing criteria Documentation F Mutation-Based and Model- Inference fuzzing criteria Extendibility

Test automation SANS TOP 25 Vulnerabilities 1. Cross-Site Scripting (XSS) 2. SQL Injection 3. Buffer Overflow 7. Path Traversal 8. Unrestricted Upload of Dangerous File Type 9. OS Command Injection 11. Hardcoded Credentials 12. Buffer Access with Incorrect Length Value 13. PHP File Inclusion 14. Improper Validation of Array Index 15. Improper Check for Unusual or Exceptional Conditions 18. Incorrect Calculation of Buffer Size (AW) 19. Missing Authentication for Critical Function 21. Incorrect Permission Assignment for Critical Response 22. Allocation of Resources Without Limits or Throttling 23. Open Redirect 24. Use of a Broken or Risky Cryptographic Algorithm 25. Race Conditions 80% automated identifiable: Blackbox + Whitebox! 20% manuel identifiable: e.g. 10. Missing Encryption of Sensitive Data

Finding all the vulnerabilities: RiDA Technology- and tool-composition # Tools 30 Fuzzing 20 Static Analysis 10 Threat Modeling 1 5 10 20 30 40 50 # identified vulnerabilities

Future prospects Rapid in-depth Analysis Security Suite (RIASS) Technology integration: Threat Modeling, Static Analysis, Fuzzing Tool integration: up to 300 Tools People integration: whole development & product lifecycle Software development industry Consulting industry: QA, (security)testing industry, Compliance

Prof. Dr. Hartmut Pohl Hartmut.Pohl@softScheck.com +49 (2241) 9558-881 Peter Sakal, B.Sc. M.Sc. Peter.Sakal@softScheck.com +49 (2241) 9558-882 www.softscheck.com