Security Solutions & Training. Exploit-Me. Open Source Firefox Plug-Ins for Penetration Testing



Similar documents
Threat Modeling. A workshop on how to create threat models by creating a hands-on example

Creating Stronger, Safer, Web Facing Code. JPL IT Security Mary Rivera June 17, 2011

WEB SERVICES VULNERABILITIES

Web Application Security

Bug Report. Date: March 19, 2011 Reporter: Chris Jarabek

Application Security Testing. Erez Metula (CISSP), Founder Application Security Expert

Web Application Worms & Browser Insecurity

Still Aren't Doing. Frank Kim

MatriXay WEB Application Vulnerability Scanner V Overview. (DAS- WEBScan ) The best WEB application assessment tool

ArcGIS Server Security Threats & Best Practices David Cordes Michael Young

(WAPT) Web Application Penetration Testing

The purpose of this report is to educate our prospective clients about capabilities of Hackers Locked.

Web Application Attacks And WAF Evasion

Web Application Security. Vulnerabilities, Weakness and Countermeasures. Massimo Cotelli CISSP. Secure

Web Application Security

Hacking Web Apps. Detecting and Preventing Web Application Security Problems. Jorge Blanco Alcover. Mike Shema. Technical Editor SYNGRESS

The Top Web Application Attacks: Are you vulnerable?

Recon and Mapping Tools and Exploitation Tools in SamuraiWTF Report section Nick Robbins

How to break in. Tecniche avanzate di pen testing in ambito Web Application, Internal Network and Social Engineering

Security Products Development. Leon Juranic

Smashing Web Apps Applying Fuzzing to Web Applications and Web Services. Michael Sutton, Security Evangelist

FINAL DoIT v.4 PAYMENT CARD INDUSTRY DATA SECURITY STANDARDS APPLICATION DEVELOPMENT AND MAINTENANCE PROCEDURES

WEB SECURITY CONCERNS THAT WEB VULNERABILITY SCANNING CAN IDENTIFY

Web Application Security

A Server and Browser-Transparent CSRF Defense for Web 2.0 Applications. Slides by Connor Schnaith

EVALUATING COMMERCIAL WEB APPLICATION SECURITY. By Aaron Parke

Web Application Security

Out of the Fire - Adding Layers of Protection When Deploying Oracle EBS to the Internet

Security vulnerabilities in new web applications. Ing. Pavol Lupták, CISSP, CEH Lead Security Consultant

Web Application Hacking (Penetration Testing) 5-day Hands-On Course

Security features of ZK Framework

Conducting Web Application Pentests. From Scoping to Report For Education Purposes Only

Attack and Penetration Testing 101

Web Application Security: Exercise Development Approaches

Application Code Development Standards

Introduction to Web Application Security. Microsoft CSO Roundtable Houston, TX. September 13 th, 2006

Web App Security Audit Services

Detecting Web Application Vulnerabilities Using Open Source Means. OWASP 3rd Free / Libre / Open Source Software (FLOSS) Conference 27/5/2008

External Network & Web Application Assessment. For The XXX Group LLC October 2012

Passing PCI Compliance How to Address the Application Security Mandates

WHITE PAPER. FortiWeb and the OWASP Top 10 Mitigating the most dangerous application security threats

Finding Your Way in Testing Jungle. A Learning Approach to Web Security Testing.

Check list for web developers

A Tale of the Weaknesses of Current Client-Side XSS Filtering

HTTPParameter Pollution. ChrysostomosDaniel

Web Application Security Considerations

Detecting and Exploiting XSS with Xenotix XSS Exploit Framework

Web Application Threats and Vulnerabilities Web Server Hacking and Web Application Vulnerability

Web Application Penetration Testing

Application Security Testing

CSE598i - Web 2.0 Security OWASP Top 10: The Ten Most Critical Web Application Security Vulnerabilities

Common Criteria Web Application Security Scoring CCWAPSS

Attack Vector Detail Report Atlassian

Cross-Site Scripting

OWASP and OWASP Top 10 (2007 Update) OWASP. The OWASP Foundation. Dave Wichers. The OWASP Foundation. OWASP Conferences Chair

Learn Ethical Hacking, Become a Pentester

Real World Web Service Testing For Web Hackers

Server-Side JavaScript Injection Bryan Sullivan, Senior Security Researcher, Adobe Secure Software Engineering Team July 2011

List of Scanner Features (3 of 3)

Hacking for Fun and Profit

1. Introduction. 2. Web Application. 3. Components. 4. Common Vulnerabilities. 5. Improving security in Web applications

Adobe Systems Incorporated

Penetration Test Report

Using Free Tools To Test Web Application Security

Criteria for web application security check. Version

Threat Modeling. Categorizing the nature and severity of system vulnerabilities. John B. Dickson, CISSP

elearning for Secure Application Development

Secure development and the SDLC. Presented By Jerry

Magento Security and Vulnerabilities. Roman Stepanov

Newsletter - September T o o l s W a t c h T e a m NJ OUCHN & MJ SOLER

Secure Web Application Coding Team Introductory Meeting December 1, :00 2:00PM Bits & Pieces Room, Sansom West Room 306 Agenda

Acunetix Website Audit. 5 November, Developer Report. Generated by Acunetix WVS Reporter (v8.0 Build )

Detecting SQL Injection Vulnerabilities in Web Services

Testing the OWASP Top 10 Security Issues

Input Validation Vulnerabilities, Encoded Attack Vectors and Mitigations OWASP. The OWASP Foundation. Marco Morana & Scott Nusbaum

Bank Hacking Live! Ofer Maor CTO, Hacktics Ltd. ATC-4, 12 Jun 2006, 4:30PM

SECURITY ADVISORY. December 2008 Barracuda Load Balancer admin login Cross-site Scripting

Chapter 1 Web Application (In)security 1

Blackbox Reversing of XSS Filters

Threat Modeling/ Security Testing. Tarun Banga, Adobe 1. Agenda

Web Security Testing Cookbook*

Preparing for the Cross Site Request Forgery Defense

Using Sprajax to Test AJAX. OWASP AppSec Seattle Oct The OWASP Foundation

Exploiting Web 2.0 Next Generation Vulnerabilities

How To Protect A Web Application From Attack From A Trusted Environment

Application Security Testing. Generic Test Strategy

FortiWeb 5.0, Web Application Firewall Course #251

3. Broken Account and Session Management. 4. Cross-Site Scripting (XSS) Flaws. Web browsers execute code sent from websites. Account Management

New Methods in Automated XSS Detection & Dynamic Exploit Creation. A Multi-deck Presentation. Kenneth F. Belva, CISSP, CEH. xsswarrior.

SAST, DAST and Vulnerability Assessments, = 4

What is Web Security? Motivation

Revisiting SQL Injection Will we ever get it right? Michael Sutton, Security Evangelist

SESSION IDENTIFIER ARE FOR NOW, PASSWORDS ARE FOREVER

Transcription:

Security Solutions & Training Exploit-Me Open Source Firefox Plug-Ins for Penetration Testing

Introduction 2

Introduction 3

Agenda State of web application security XSS Really a Danger? Introducing XSS-Me Applying XSS-Me in Applications SQL Inject Me Public Release and Future of App 4

Web Application Security Despite advances in knowledge, web apps are still very dangerous Web app vulnerabilities now out-number buffer overflows in CVE 5

Testing Tools A variety of testing tools exist OWASP tools, commercial tools, other open source Some are very powerful Problem: many are proxy-based 6

The Missing Piece Most tools not made for developers, QA Many apps do not benefit from security testing WITHIN SDLC Need light-weight tools that can test quickly 7

But First Do we really need to care about XSS vulns Aren t they just annoying pop-up boxes? 8

XSS The Real Danger AJAX+CSRF+XSS = Major problem One single XSS in an online banking app can allow malicious users to transfer funds 9

XSS Who has them?

Repercussion of AJAX XMLHTTPRequest Object in JavaScript Allows attackers to: Send Receive Parse data as if it were coming from the victim Used to evade most anti-csrf 11

XSS-Me Firefox plug-in testing tool to the rescue! 12

XSS-Me Choose which fields to test on the fly 13

Options Import new XSS attack strings Ships with RSnake s cheat sheet 14

How it Works Set document.vulnerable DOM property to true via JavaScript If document property is set, XSS worked Also checks for literal presence of string 15

Inner Workings of Exploit-Me Rendered Request Response Raw Request 16

Report Successful XSS if (document.wrappedjsobject.vulnerable && document.wrappedjsobject.vulnerable == true) { rv = new Result(RESULT_TYPE_ERROR, 100, "Was able to add property to DOM, this page is very vulnerable");// ('"+attackrunner.testvalue.string+"')"); } 17

Report Possible XSS (document.wrappedjsobject.vulnerable) { } rv = new Result(RESULT_TYPE_WARNING, 100, "Seemed to add property but not value. This should be investigated further");//('"+attackrunner.testvalue.string+"') "); 18

Report Not vulnerable to XSS { } rv = new Result(RESULT_TYPE_PASS, 100, "document did not get property");//('"+attackrunner.testvalue.string+" ')"); 19

Where to Use It? Multiple phases of the SDLC 20

SQL-Inject Me Similar interface to XSS-Me 21

SQL-Inject Me To be released in public Beta along with XSS-Me Works by checking for presence of error messages or result strings in HTTP response 22

SQL Inject Me

Next Steps Both XSS-Me and SQL Inject-Me to be released publicly on Nov. 26 th, 2007 Check http://www.securitycompass.com for updates Open Source under GPL 3 Contribute to make safer web apps! New tools such as Web Service Exploit-Me to be created early next year 24

What is Next For these plug-ins Auto Encoding Error management (Error Enumeration) Stored XSS Crawling a site for stored attacks (to look for results on multiple pages either through user input or automatic) URL Parameters 25

Other Exploit-Me Plug-in Web Service-Me Auto-generated form on the basis of the WSDL Overflow-Me Field Overflow/underflow Access-Me Toggle transmission of session cookies for each request Enumerate-Me User and Password Enumeration through forgotten password functionality BruteForce Me Brute force/dictionary attacks against authentication 26

Questions / Profile Our consultants have serviced large (Fortune 500) and medium sized companies across most major industries We have worked for major security players, including Foundstone and Deloitte We have co-authored or contributed to several security books, including: Hacking Exposed: Web Applications, 2nd Edition HackNotes: Network Security Buffer Overflow Attacks: Detect, Exploit & Prevent Windows XP Professional Security Writing Security Tools and Exploits We have presented at and continue to present at security conferences, including: Blackhat Amsterdam; Reverse Engineering Conference 2005 in Montreal; HackInTheBox 2005 in Malaysia; ISC2's Infosec Conferences in Las Vegas, NYC, Toronto & DC; CSI NetSec; DallasCon; ToorCon; and Freenix. We present and contribute to open source projects: Chair at OWASP Toronto, Presented at OWASP Toronto, Contributed to YASSP Project (Lead by SANS and Xerox).