Why Web Applications are making a hackers life easy. Presented by Jon Grew BT SBS



Similar documents
Web Application Report

The Top Web Application Attacks: Are you vulnerable?

Web Application Security

WHITE PAPER. FortiWeb and the OWASP Top 10 Mitigating the most dangerous application security threats

Creating Stronger, Safer, Web Facing Code. JPL IT Security Mary Rivera June 17, 2011

Check list for web developers

Web Applications The Hacker s New Target

Web Application Security. Radovan Gibala Senior Field Systems Engineer F5 Networks

Advanced Administration for Citrix NetScaler 9.0 Platinum Edition

Information Technology Policy

3. Broken Account and Session Management. 4. Cross-Site Scripting (XSS) Flaws. Web browsers execute code sent from websites. Account Management

Web Application Threats and Vulnerabilities Web Server Hacking and Web Application Vulnerability

Adobe Systems Incorporated

What is Web Security? Motivation

Application Security: What Does it Take to Build and Test a Trusted App? John Dickson, CISSP Denim Group

WEB SECURITY CONCERNS THAT WEB VULNERABILITY SCANNING CAN IDENTIFY

WEB SECURITY. Oriana Kondakciu Software Engineering 4C03 Project

Web App Security Audit Services

Last update: February 23, 2004

Magento Security and Vulnerabilities. Roman Stepanov

ArcGIS Server Security Threats & Best Practices David Cordes Michael Young

Web Application Security

Are you fighting new threats with old weapons? Secure your Web applications with Web Application Firewalls.

A Decision Maker s Guide to Securing an IT Infrastructure

Network Security Audit. Vulnerability Assessment (VA)

Penetration Testing Service. By Comsec Information Security Consulting

Chapter 1 Web Application (In)security 1

White Paper Secure Reverse Proxy Server and Web Application Firewall

Columbia University Web Security Standards and Practices. Objective and Scope

Web Application Security Assessment and Vulnerability Mitigation Tests

Penetration Test Report

Secure Web Application Coding Team Introductory Meeting December 1, :00 2:00PM Bits & Pieces Room, Sansom West Room 306 Agenda

Web Application Attacks and Countermeasures: Case Studies from Financial Systems

Attack Vector Detail Report Atlassian

The New PCI Requirement: Application Firewall vs. Code Review

WEB APPLICATION FIREWALLS: DO WE NEED THEM?

SECURITY TRENDS & VULNERABILITIES REVIEW 2015

How To Perform An External Security Vulnerability Assessment Of An External Computer System

Criteria for web application security check. Version

National Information Security Group The Top Web Application Hack Attacks. Danny Allan Director, Security Research

Bank Hacking Live! Ofer Maor CTO, Hacktics Ltd. ATC-4, 12 Jun 2006, 4:30PM

The purpose of this report is to educate our prospective clients about capabilities of Hackers Locked.

F5 ASM i DB Monitoring w ofercie NASK

Application Firewall Overview. Published: February 2007 For the latest information, please see

Rational AppScan & Ounce Products

Web Application Vulnerability Testing with Nessus

The Weakest Link: Mitigating Web Application Vulnerabilities. webscurity White Paper. webscurity Inc. Minneapolis, Minnesota USA

Global Partner Management Notice

Basic & Advanced Administration for Citrix NetScaler 9.2

Barracuda Web Site Firewall Ensures PCI DSS Compliance

Web Application Penetration Testing

Lotus Domino Security

MWR InfoSecurity Security Advisory. BT Home Hub SSID Script Injection Vulnerability. 10 th May Contents

Web Application Vulnerabilities and Avoiding Application Exposure

Web Application Security. Vulnerabilities, Weakness and Countermeasures. Massimo Cotelli CISSP. Secure

New IBM Security Scanning Software Protects Businesses From Hackers

FINAL DoIT v.8 APPLICATION SECURITY PROCEDURE

WEB ATTACKS AND COUNTERMEASURES

Application Security Testing. Erez Metula (CISSP), Founder Application Security Expert

Where every interaction matters.

Using Free Tools To Test Web Application Security

JOOMLA SECURITY. ireland website design. by Oliver Hummel. ADDRESS Unit 12D, Six Cross Roads Business Park, Waterford City

(WAPT) Web Application Penetration Testing

Web Application Hacking (Penetration Testing) 5-day Hands-On Course

Web Application Security 101

Contemporary Web Application Attacks. Ivan Pang Senior Consultant Edvance Limited

STOPPING LAYER 7 ATTACKS with F5 ASM. Sven Müller Security Solution Architect

Client logo placeholder XXX REPORT. Page 1 of 37

How to Build a Trusted Application. John Dickson, CISSP

Sitefinity Security and Best Practices

Secure Web Applications. The front line defense

External Network & Web Application Assessment. For The XXX Group LLC October 2012

10 Things Every Web Application Firewall Should Provide Share this ebook

Six Common Factors to Consider When selecting a CMS

CNS-301-3I ~ Citrix NetScaler 11 Advanced Implementation

Guidelines for Web applications protection with dedicated Web Application Firewall

External Vulnerability Assessment. -Technical Summary- ABC ORGANIZATION

Passing PCI Compliance How to Address the Application Security Mandates

Protect Your IT Infrastructure from Zero-Day Attacks and New Vulnerabilities

Evolutionism of Intrusion Detection

Web Vulnerability Assessment Report

Members of the UK cyber security forum. Soteria Health Check. A Cyber Security Health Check for SAP systems

Common Security Vulnerabilities in Online Payment Systems

WEB 2.0 AND SECURITY

How To Protect A Web Application From Attack From A Trusted Environment

modules 1 & 2. Section: Information Security Effective: December 2005 Standard: Server Security Standard Revised: Policy Ref:

Visa U.S.A Cardholder Information Security Program (CISP) Payment Application Best Practices

Application Code Development Standards

Penetration Testing Report Client: Business Solutions June 15 th 2015

Cyber Security Workshop Ethical Web Hacking

The Roles of Software Testing & QA in Security Testing

Application Security Testing. Generic Test Strategy

Transcription:

Why Web Applications are making a hackers life easy. Presented by Jon Grew BT SBS

Acknowledgements Ed Barlow Technical Director EMEA Ed sends his apologies. The following presentation is based on the talk he was meant to give today. Ed originally gave a version of this presentation at Infosec this year.

Attacking the Enterprise Intranet Internet Enterprise Extranet

Is it a real risk? Unprotected Websites are attacked an average of 2,000 times a week, a new study has revealed. Security firm PanSec International and Internet service provider PSINet Europe set up two fake banking sites and monitored the number of times they were attacked over an eight-week period. One site was protected with a standard firewall the other was left unprotected. The firewall prevented 90 per cent of attacks, but the protected site was still attacked more than 200 times a week. The unprotected site was attacked a total of 19,128 times over the eight-week period more than once every five minutes.

Source Code has Errors. One Security Vulnerability 1,500 lines of code IBM Watson Research Lab Lines of code Windows 2000 Linux 35 million Over 30 million

Protecting the Enterprise FTP Server Database Internet Firewall Intrusion Detection Anti-Virus PKI VPN Access Control Identity Management Web Server Mail Server

Attackers Move With The Times Application Level Attacks Application Forms Database Browser Enterprise application Back-end systems Database Network Protocol Device Operating system Network Level Attacks Too Well Protected Application server Web server Operating system

Attackers Move With The Times Application Forms Database Browser Network Protocol Device Operating system Application Level Attacks SQL SQL Injection Injection Parameter Parameter Tampering Tampering Cookie Cookie Poisoning Poisoning Vulnerability Vulnerability Patterns Patterns HTTP HTTP Methods Methods Exploitation Exploitation Application Application Language Language Mismatch Mismatch 3rd 3rd Party Party Mis-configuration Mis-configuration SOAP SOAP & Web Web Services Services Message Message Exploitation Exploitation Files Files Upload Upload Protocol Protocol Piggyback Piggyback Buffer Buffer Overflow Overflow Attack Attack Data Data Encoding Encoding Too Well Protected Enterprise application Back-end systems Database Application server Web server Operating system

SQL Injection Attack Threat description Information from Web requests is not validated before being used by a Web application to access data in an SQL database. Intruders can use these flaws to get the database to perform requests that where not intended. E.g bypassing password controls Example The application expects a user to submit a parameter which will be used as part of a select statement to validate a login and password. Expected value: The intruder sent: 1=1 Impact http://www.myweb.com/find.asp?login=admin&password=123456 http://www.myweb.com/find.asp? Login=Admin&password= 123456 OR Forces the application to change the SQL submitted to the database and bypasses logic controls as 1=1 is all ways true. The user is logged in no matter what the password.

Example PetCo target of FTC Investigation

Parameter Manipulation Attack Ranked as #1 threat in Web applications Threat description Information from Web requests is not validated before being used by a Web application. Intruders can use these flaws to get information from a database. Example (a real world example) The application expects a user to submit a parameter value with a length of 8 bytes (numbers & characters) Expected value: The intruder sent: Impact http://www.myweb.com/find.asp?articleid=34abc67y http://www.myweb.com/find.asp?articleid=34 The intruder was able to get ALL document numbers starting with 34xxxxxx, which included confidential information

Example Victoria s Secret Pursued by New York Attorney General

Cross Site Scripting Attack Threat description A script is embedded in a field contained in the URL. When executed the script add s, replaces or overlays fields onto the original page to capture information and post it to a rouge site. Example The application expects a user to submit a parameter value, which it presents back on the returned page. By embedding HTML in the parameter, it is HTML which is embedded in the returning page. Expected value: The intruder sent: Impact http://www.myweb.com/find.asp?searchstr=hacking Articles http://www.myweb.com/find.asp?searchstr=<script>alert("you Have Been Hacked")</script> By getting a user to click a crafted link on a web page or email, this results in a change to the way the original pages is intended to behave.

Example Plaxo plugs phishing vulnerability Munir Kotadia ZDNet UK March 16, 2004, 13:25 BST Plaxo has plugged a gaping security hole in its Web site that could have exposed its members' online address books. a script added an additional layer over the username and password box. With this layer in place, if a user typed in their access details, the information would first be sent to the attacker's Web site and then to Plaxo to log the user in. Users would have had no idea their details had been taken. Hotmail http://www.whitehatsec.com/labs/advisories/wh-security_advisory-08152001.html Many of the phishing scams http://www.antiphishing.org

Tools required A Web Browser Unlike vulnerability assessment, no exploit code or Network scanners are required. This means that an attacker does not need to be able to write in C or wait for an exploit to be released.

Problem Resolution Do nothing Re-engineer the application Other methods

Do Nothing No immediate cost Existing legislation being strengthened Data protection New regulation Corporate governance Loss of credibility Damages value built in corporate & product branding Financial penalties PetCo; Victoria s Secret; Current & future revenues due to attacks Application level attacks are now well known If attacks succeed and there were no precautions Ignorance is no excuse for inaction

Fix the Application New Applications Security reviews Incorporate extensive input checking Existing Applications Regular security reviews Update code to prevent new attacks Third Party Components Security patch & update programme Given Given the the multitude multitude of of possible possible attack attack methods, methods, any any data data from from the the user user even even a a simple simple HTTP HTTP request request should should not not be be implicitly implicitly trusted trusted Butler Butler Group Group

Development Considerations New Applications Input checking example: Character encoding Delays application delivery to market Increased cost of application development Single quote character commonly used in SQL injection attacks Can be encoded in 6 ways Each is valid within SQL Could also be valid user input <SCRIPT> alone represents a total of 8 6 possible combinations. Existing Applications Take offline to fix major problems Can only fix problems you know about Code change risk Third Party Components Patch development delay Cost & time to install patches O/S & application vendors have security reviews in place 90 90 percent percent of of cyberattacks cyberattacks by by 2005 2005 will will exploit exploit security security flaws flaws for for which which a a patch patch is is available available or or a a solution solution known known Gartner Gartner

The Real Challenge - Complexity Web Technologies HTTP 1.1 HTML 4.1 XML 1.1 Flash Objects SOAP Applets WebServices Future Technologies Web Application Attacks SQL Injection Parameters Tampering SOAP & WebServices Cookie Poisoning Cross-Site Scripting Web Environments Single server simple Multi servers cluster Single server / Multi applications Virtual hosting Multi servers / Single application Large deployment Multi servers / Multi applications Farms High performance Known Vulnerabilities HTTP Exploits Default Configurations Application Flow Buffer Overflow Files Upload Data Encoding Backdoor & Debug High availability

Alternatives Application Level Protection Application Firewall Internet Application Level Attacks Network Level Attacks Application Level Vulnerabilities According According to to Butler Butler Group Group Any Any organisation organisation delivering delivering services services or or products products through through a web-based web-based solution solution should should now now consider consider the the web web application application firewall firewall a must must have have piece piece of of IT IT infrastructure. infrastructure. Network Level Vulnerabilities Network Level Protection Firewall Intrusion Detection VPN Identity Management

Alternatives Application Firewall No application changes Reduced cost & time to market Protects against known and unknown attacks No time offline waiting for patch No exposure during patch development Protects third party components Minimise pressure to install patches Relieves commercial pressures No application downtime No risky production system changes

Resources Application scanners Scando http://www.kavado.com Appscan http://www.sanctuminc.com Webinspect http://www.spidynamics.com Application Firewalls Interdo http://www.kavado.com Appshield http://www.sanctuminc.com Codeseeker http://www.owasp.org