Web Application Firewalls: What the vendors do NOT want you to know. The OWASP Foundation http://www.owasp.org



Similar documents
Web Application Firewalls: What the vendors do NOT want you to know SHAKACON III

Playing with Web Application Firewalls

Playing with Web Application Firewalls

Web Application Firewall Profiling and Evasion. Michael Ritter Cyber Risk Services Deloitte

Implementation of Web Application Firewall

WHITE PAPER. FortiWeb and the OWASP Top 10 Mitigating the most dangerous application security threats

Semantic based Web Application Firewall (SWAF V 1.6) Operations and User Manual. Document Version 1.0

WEB APPLICATION FIREWALLS: DO WE NEED THEM?

FortiWeb 5.0, Web Application Firewall Course #251

Contemporary Web Application Attacks. Ivan Pang Senior Consultant Edvance Limited

NSFOCUS Web Application Firewall White Paper

Information Supplement: Requirement 6.6 Code Reviews and Application Firewalls Clarified

How To Protect A Web Application From Attack From A Trusted Environment

Where every interaction matters.

Web Application Firewalls: When Are They Useful? OWASP AppSec Europe May The OWASP Foundation

Check list for web developers

Firewalls P+S Linux Router & Firewall 2013

Barracuda Web Application Firewall vs. Intrusion Prevention Systems (IPS) Whitepaper

Web Application Firewall on SonicWALL SSL VPN

Basic & Advanced Administration for Citrix NetScaler 9.2

Introduction to Web Application Firewalls. Dustin Anders

(WAPT) Web Application Penetration Testing

REAL-TIME WEB APPLICATION PROTECTION. AWF SERIES DATASHEET WEB APPLICATION FIREWALL

Creating Stronger, Safer, Web Facing Code. JPL IT Security Mary Rivera June 17, 2011

Guidelines for Web applications protection with dedicated Web Application Firewall

Imperva s Response to Information Supplement to PCI DSS Requirement Section 6.6

2013 MONITORAPP Co., Ltd.

Web Application Firewall (WAF) Guide. Web Application Firewall を 理 解 するための 手 引 き A Handbook to Understand Web Application Firewall

Importance of Web Application Firewall Technology for Protecting Web-based Resources

Information Technology Policy

Application Layer Encryption: Protecting against Application Logic and Session Theft Attacks. Whitepaper

Powered by. Incapsula Cloud WAF

Web Application Firewall Policy File Specification

F5 Silverline Web Application Firewall Onboarding: Technical Note

Barracuda Web Site Firewall Ensures PCI DSS Compliance

Out of the Fire - Adding Layers of Protection When Deploying Oracle EBS to the Internet

The Wide World of WAFs

Advanced Administration for Citrix NetScaler 9.0 Platinum Edition

Intrusion detection for web applications

Some Notes on Web Application Firewalls

HTTPParameter Pollution. ChrysostomosDaniel

STOPPING LAYER 7 ATTACKS with F5 ASM. Sven Müller Security Solution Architect

Application Security Best Practices. Wally LEE Principal Consultant

Web Application Vulnerability Testing with Nessus

MANAGED SECURITY TESTING

Web Application Firewall

Web Application Attacks And WAF Evasion

Mingyu Web Application Firewall (DAS- WAF) All transparent deployment for Web application gateway

Hayri Tarhan, Sr. Manager, Public Sector Security, Oracle Ron Carovano, Manager, Business Development, F5 Networks

Web Application Security. Radovan Gibala Senior Field Systems Engineer F5 Networks

Application Security Testing

Blackbox Reversing of XSS Filters

WHITE PAPER FORTIWEB WEB APPLICATION FIREWALL. Ensuring Compliance for PCI DSS 6.5 and 6.6

The New PCI Requirement: Application Firewall vs. Code Review

Web Application Firewall Technology Insight OWASP 22/ The OWASP Foundation. Joakim Sandström Role: OWASP Prospect.

We protect you applications! No, you don t. Digicomp Hacking Day 2013 May 16 th 2013

FortiWeb for ISP. Web Application Firewall. Copyright Fortinet Inc. All rights reserved.

Web Application Hacking (Penetration Testing) 5-day Hands-On Course

Web Application Firewall on SonicWALL SRA

Security features of ZK Framework

EVADING ALL WEB-APPLICATION FIREWALLS XSS FILTERS

What is Web Security? Motivation

WHITE PAPER. FortiWeb Web Application Firewall Ensuring Compliance for PCI DSS 6.5 and 6.6

FINAL DoIT v.4 PAYMENT CARD INDUSTRY DATA SECURITY STANDARDS APPLICATION DEVELOPMENT AND MAINTENANCE PROCEDURES

FINAL DoIT v.8 APPLICATION SECURITY PROCEDURE

Application security testing: Protecting your application and data

F5 and Microsoft Exchange Security Solutions

Arrow ECS University 2015 Radware Hybrid Cloud WAF Service. 9 Ottobre 2015

Detecting and Exploiting XSS with Xenotix XSS Exploit Framework

Secure Web Application Coding Team Introductory Meeting December 1, :00 2:00PM Bits & Pieces Room, Sansom West Room 306 Agenda

Global Web Application Firewall Market


1. Introduction. 2. DoS/DDoS. MilsVPN DoS/DDoS and ISP. 2.1 What is DoS/DDoS? 2.2 What is SYN Flooding?

Cracking the Perimeter via Web Application Hacking. Zach Grace, CISSP, CEH January 17, Mega Conference

CS 356 Lecture 19 and 20 Firewalls and Intrusion Prevention. Spring 2013

Chapter 8 Security Pt 2

OWASP Top Ten Tools and Tactics

UNCLASSIFIED CPA SECURITY CHARACTERISTIC WEB APPLICATION FIREWALLS. Version 1.3. Crown Copyright 2011 All Rights Reserved

Administration Manual. Web Security Manager 4.4

Web Application Security

Penetration Testing with Kali Linux

Attack and Penetration Testing 101

Are you fighting new threats with old weapons? Secure your Web applications with Web Application Firewalls.

Firewall Introduction Several Types of Firewall. Cisco PIX Firewall

Security+ Guide to Network Security Fundamentals, Fourth Edition. Chapter 6 Network Security

Penta Security 3rd Generation Web Application Firewall No Signature Required.

Administration Manual. Web Security Manager 4.2

NSFOCUS Web Application Firewall

Firewalls. Test your Firewall knowledge. Test your Firewall knowledge (cont) (March 4, 2015)

Web Application Firewall Bypassing

TEST METHODOLOGY. Web Application Firewall. v6.2

Web Application Level Approach against the HTTP Flood Attacks IOSEC HTTP Anti Flood/DoS Security Gateway Module

Network Security. Chapter 3. Cornelius Diekmann. Version: October 21, Lehrstuhl für Netzarchitekturen und Netzdienste Institut für Informatik

Transcription:

Web Application Firewalls: What the vendors do NOT want you to know Sandro Gauci EnableSecurity sandro@enablesecurity.com nd Wendel G. Henrique Trustwave whenrique@trustwave.com Copyright The OWASP Foundation Permission is granted to copy, distribute and/or modify this document under the terms of the OWASP License. The OWASP Foundation http://www.owasp.org

$ whois WendelGHenrique PT Consultant at Trustwave's SpiderLabs. Over 7 years in the security industry. Vulnerability discovery Webmails, AP, Citrix, etc. Spoke in YSTS 2.0, Defcon 16, H2HC and others. Affiliated to Hackaholic team. 2

$ whois SandroGauci Founder and CSO EnableSecurity. VOIPPACK (CANVAS addon). Security research papers. SIPVicious and SurfJack. Over 9 years in the security industry. 3

Introduction WAF - Web Application Firewall. Can be identified, detected. Security software is not necessarily secure. 4

What is WAF WAFs are often called 'Deep Packet Inspection Firewall'. Some WAFs look for attack signatures while others look for abnormal behavior. WAFs products: software or hardware appliance. 5

What is WAF WAFs can be installed as a reverse proxy, embedded or connected in a switch (SPAN or RAP). Nowadays many WAF products detect both inbound and outbound attacks. 6

Who uses WAF? Many banks around the world. Companies which need high protection. Many companies in compliance with PCI DSS (Payment Card Industry - Data Security Standard). 7

Operation Modes: Negative model (blacklist based). Positive model (whitelist based). Mixed / Hybrid (mix negative and positive model protection). 8

Operation Mode: Negative A negative security model recognize attacks by relying on a database of expected attack signatures. Example: Do not allow in any page, any argument value (user input) which match potential XSS strings like <script>, </script>, String.fromCharCode, etc. 9

Operation Mode: Positive A positive security model enforces positive behavior by learning the application logic and then building a security policy of valid know good requests. Example: Page news.jsp, the field "id" only accept numbers [0-9] and starting at 0 until 65535. 10

Common Weaknesses Bad design. Bad implementation. Vulnerable to the same flaws they intend to protect. 11

Detection Cookies: Some WAF products add their own cookie in the HTTP communication. 12

demo 13

Detection Header Rewrite: Some WAF products allow the rewriting of HTTP headers. The most common field is "Server", this is used to try to deceive the attackers (server cloaking). Example: Connection might be changed to Cneonction or nncoection. 14

demo 15

Detection Different 404 error codes for hostile and non existent pages. Different error codes (404, 400, 401, 403, 501, etc) for hostile parameters (even non existent ones) in valid pages. 16

demo 17

Detection WAF systems leave several signs which permit us to detect them, one of them are Drop Connection: Example: Drop Action: Immediately initiate a "connection close" action to tear down the TCP connection by sending a FIN packet. 18

Detection WAF systems leave several signs which permit us to detect them, one of them are Pre Built-in Rules: Pre Built-in Rules: All (at least all that we know) WAF systems have a built-in group of rules in negative mode, these rules are different in each products, this can help us to detect them. 20

Detection You should be thinking It s so boring. We have to know a lot of products to identify them correctly. What about create a tool for that? 22

WAFW00F That s our answer for your prays: Detect over 20 different WAF products. Do not stop at the first WAF system found. Follow HTTP redirects to identify more systems. Much more coming soon. 23

24

demo 25

Bypassing WAF systems can be bypassed by changing the attack to do not match the rules: Detect allowed / denied strings. Detect sequences of good and bad strings together. Modify your attack to match the good rules. 26

Bypassing WAF systems allow us to bypass them in different ways, one of them are using old tricks like encoding and language support: Spaces, comments, case sensitive mutation, Unicode, etc. The web server can parse, decode and interpret and HTTP request differently from the WAF. 28

Bypassing WAF systems allow us to bypass them in different ways, one of them are using the flexibility of the web languages: HTML and JS is very flexible. Example: XSS Case. 30

demo 31

Bypassing WAIT! What about positive model? They are really secure? If we find a positive model we should give up? 32

demo 33

Bypassing You should be thinking It s time consuming. The are so much different techniques to remember. There are so many specific techniques product dependent. What about a tool for that? 34

WAFFUN That s our answer for your prays: Test the target and point weakness in the WAF system. Use with WAFW00F for better results. Working in Windows and Unix. Beta version! We need the community help. 35

demo 36

Other Vulnerabilities XSS (in the own WAF system?) Overflows DoS 37

demo 38

Thank you! Do you have ideas / resources to improve our tools? Do you just don t have with who talk? wsguglielmetti [em] gmail [ponto] com sandro [em] enablesecurity [ponto] com 39