Using Free Tools To Test Web Application Security



Similar documents
Web Application Penetration Testing

(WAPT) Web Application Penetration Testing

Where every interaction matters.

WEB SECURITY CONCERNS THAT WEB VULNERABILITY SCANNING CAN IDENTIFY

Essential IT Security Testing

Black Box versus White Box: Different App Testing Strategies John B. Dickson, CISSP

Magento Security and Vulnerabilities. Roman Stepanov

Learning objectives for today s session

OWASP Top Ten Tools and Tactics

Integrating Security Testing into Quality Control

WHITE PAPER. FortiWeb and the OWASP Top 10 Mitigating the most dangerous application security threats

Guidelines for Web applications protection with dedicated Web Application Firewall

FINAL DoIT v.4 PAYMENT CARD INDUSTRY DATA SECURITY STANDARDS APPLICATION DEVELOPMENT AND MAINTENANCE PROCEDURES

The Top Web Application Attacks: Are you vulnerable?

WHITE PAPER FORTIWEB WEB APPLICATION FIREWALL. Ensuring Compliance for PCI DSS 6.5 and 6.6

WHITE PAPER. FortiWeb Web Application Firewall Ensuring Compliance for PCI DSS 6.5 and 6.6

05.0 Application Development

How to break in. Tecniche avanzate di pen testing in ambito Web Application, Internal Network and Social Engineering

Overview of the Penetration Test Implementation and Service. Peter Kanters

Securing Your Web Application against security vulnerabilities. Ong Khai Wei, IT Specialist, Development Tools (Rational) IBM Software Group

Cracking the Perimeter via Web Application Hacking. Zach Grace, CISSP, CEH January 17, Mega Conference

Mean Time to Fix (MTTF) IT Risk s Dirty Little Secret Joe Krull, CPP, CISSP, IAM, CISA, A.Inst.ISP, CRISC, CIPP

Application Code Development Standards

Rational AppScan & Ounce Products

Testing the OWASP Top 10 Security Issues

Creating Stronger, Safer, Web Facing Code. JPL IT Security Mary Rivera June 17, 2011

Web Application Vulnerability Testing with Nessus

SQuAD: Application Security Testing

Detecting Web Application Vulnerabilities Using Open Source Means. OWASP 3rd Free / Libre / Open Source Software (FLOSS) Conference 27/5/2008

Six Essential Elements of Web Application Security. Cost Effective Strategies for Defending Your Business

ArcGIS Server Security Threats & Best Practices David Cordes Michael Young

Adobe Systems Incorporated

Sitefinity Security and Best Practices

Application Security Testing. Erez Metula (CISSP), Founder Application Security Expert

METHODS TO TEST WEB APPLICATION SCANNERS

Introduction:... 1 Security in SDLC:... 2 Penetration Testing Methodology: Case Study... 3

Web Application Report

FortiWeb Web Application Firewall. Ensuring Compliance for PCI DSS requirement 6.6 SOLUTION GUIDE

How to complete the Secure Internet Site Declaration (SISD) form

Ethical Hacking as a Professional Penetration Testing Technique

3. Broken Account and Session Management. 4. Cross-Site Scripting (XSS) Flaws. Web browsers execute code sent from websites. Account Management

Application security testing: Protecting your application and data

Is Drupal secure? A high-level perspective on web vulnerabilities, Drupal s solutions, and how to maintain site security

Nuclear Regulatory Commission Computer Security Office Computer Security Standard

How to achieve PCI DSS Compliance with Checkmarx Source Code Analysis

Web Application Security

Mingyu Web Application Firewall (DAS- WAF) All transparent deployment for Web application gateway

Cloud Security:Threats & Mitgations

Members of the UK cyber security forum. Soteria Health Check. A Cyber Security Health Check for SAP systems

Web Application Security. Vulnerabilities, Weakness and Countermeasures. Massimo Cotelli CISSP. Secure

Web applications. Web security: web basics. HTTP requests. URLs. GET request. Myrto Arapinis School of Informatics University of Edinburgh

PCI-DSS and Application Security Achieving PCI DSS Compliance with Seeker

Web Application Security

Testnet Summerschool. Web Application Security Testing. Dave van Stein

Security Testing Tools

Web Application Security Assessment and Vulnerability Mitigation Tests

Web Application Attacks and Countermeasures: Case Studies from Financial Systems

Introduction to Web Application Security. Microsoft CSO Roundtable Houston, TX. September 13 th, 2006

DFW INTERNATIONAL AIRPORT STANDARD OPERATING PROCEDURE (SOP)

Passing PCI Compliance How to Address the Application Security Mandates

Conducting Web Application Pentests. From Scoping to Report For Education Purposes Only

OWASP and OWASP Top 10 (2007 Update) OWASP. The OWASP Foundation. Dave Wichers. The OWASP Foundation. OWASP Conferences Chair

ETHICAL HACKING APPLICATIO WIRELESS110 00NETWORK APPLICATION MOBILE MOBILE0001

Detecting and Defending Against Security Vulnerabilities for Web 2.0 Applications

Effectiveness of Automated Application Penetration Testing Tools

Web Application Attacks And WAF Evasion

How To Ensure That Your Computer System Is Safe

Web Application Report

Bust a cap in a web app with OWASP ZAP

Web Application Security and the OWASP Top 10. Web Application Security and the OWASP Top 10

OWASP AND APPLICATION SECURITY

HackMiami Web Application Scanner 2013 PwnOff

Out of the Fire - Adding Layers of Protection When Deploying Oracle EBS to the Internet

Excellence Doesn t Need a Certificate. Be an. Believe in You AMIGOSEC Consulting Private Limited

Kenna Platform Security. A technical overview of the comprehensive security measures Kenna uses to protect your data

List of Scanner Features (3 of 3)

elearning for Secure Application Development

HTTPParameter Pollution. ChrysostomosDaniel

Network Test Labs (NTL) Software Testing Services for igaming

Are you fighting new threats with old weapons? Secure your Web applications with Web Application Firewalls.

Integrating Security into the Application Development Process. Jerod Brennen, CISSP CTO & Principal Security Consultant, Jacadis

Turning the Battleship: How to Build Secure Software in Large Organizations. Dan Cornell May 11 th, 2006

Web application security Executive brief Managing a growing threat: an executive s guide to Web application security.

Evaluation of Penetration Testing Software. Research

Barracuda Web Site Firewall Ensures PCI DSS Compliance

Implementation of Web Application Security Solution using Open Source Gaurav Gupta 1, B. K. Murthy 2, P. N. Barwal 3

Cloud Security Framework (CSF): Gap Analysis & Roadmap

Chapter 1 Web Application (In)security 1

Web Vulnerability Assessment Report

The purpose of this report is to educate our prospective clients about capabilities of Hackers Locked.

EVALUATING COMMERCIAL WEB APPLICATION SECURITY. By Aaron Parke

Web Engineering Web Application Security Issues

Web Application Firewall on SonicWALL SSL VPN

MatriXay WEB Application Vulnerability Scanner V Overview. (DAS- WEBScan ) The best WEB application assessment tool

Transcription:

Using Free Tools To Test Web Application Security

Speaker Biography Matt Neely, CISSP, CTGA, GCIH, and GCWN Manager of the Profiling Team at SecureState Areas of expertise: wireless, penetration testing, physical security, security convergence, and incident response Over 10 years of security experience Outside of work: Co-host of the Security Justice podcast

SecureState Overview A Management Consulting Firm Specializing in Information Security Founded in September 2001 Payment Card Industry (PCI) Certified Qualified Security Assessor (QSA) Approved Scanning Vendor (ASV) Qualified Payment Application Security Company Largest dedicated security company in the Great Lakes Region Number of Employees: 47 3

The Company We The Company Keep We Keep Key Industries: Retail, Financial Services, Healthcare, Critical Infrastructure, Professional Services, Service Providers, Education, Food Service, Entertainment, and Government

SecureState Overview Audit and Compliance PCI (Payment Card Industry) ISO 27001/SAS 70 SOX, GLBA, HIPAA, TG-3, NERC/CIP etc. INFOSEC (Information System Security Risk Assessment) Profiling and Attack Web Application Security (WAS) Attack and Penetration Services (internal, external, client, physical, wireless) Wireless Audits Training Risk Management Security Program Manager (SPM) StateScan SecureTime Architecture Reviews Business Preservation Services Data Forensics/Incident Response Business Impact Analysis Advisory Services CISO Advisement Risk Management Special Projects

Importance of Assessing Web Applications Insecure web applications are the most common way attackers penetrate companies from the Internet and gain access to sensitive information As companies harden their perimeter attackers are moving to attacking web applications Vulnerabilities in web applications are the fastest growing type of vulnerability

PCI DSS 1.2 Requirement 6.6 Compliance Two options to meeting requirement 6.6 Option 1: Verify that public-facing web applications are reviewed (using either manual or automated vulnerability security assessment tools or methods), as follows: At least annually After any changes By an organization that specializes in application security Assessments may be performed by a qualified internal resource or a qualified third party So all vulnerabilities are corrected So the application is re-evaluated after the corrections Option 2: Verify that a web-application firewall is in place in front of public-facing web applications to detect and prevent web-based attacks.

Web Application Security Assessments Black Box Scanning a site with an automated tool Automated tools are prone to false positives and will not find flaws in business logic Grey Box Manually testing a site for vulnerability 80% manual 20% automated Assessor should review use case documentation to understand the business logic of the site and tailor attacks to the specific site Quality of the test relies on the experience of the tester White Box Source code review Very thorough Very resource intensive

Where Assessments Fit in SDLC

OWASP Top 10-2010 A1 Injection A2 Cross-Site Scripting (XSS) A3 Broken Authentication and Session Management A4 Insecure Direct Object References A5 Cross-Site Request Forgery (CSRF) A6 Security Misconfiguration A7 Insecure Cryptographic Storage A8 Failure to Restrict URL Access A9 Insufficient Transport Layer Protection A10 Unvalidated Redirects and Forwards

Free Web Vulnerability Scanners Grendel Scan Nikto Paros Skipfish W3AF

Commercial Web Vulnerability Scanners Acunetix Burp-Pro Cenzic Hailstorm HP WebInspect IBM Rational AppScan

Web Proxies Burp Paros WebScarab

Warning: Testing with the Newest Versions of IE and Firefox Newest versions of Firefox and IE implement client side controls to block certain attacks such as crosssite scripting Complicates testing and leads to validation problems Disable controls if possible or test with an older browser Do not use older browsers or browser with security features disabled for general web surfing

Web Application Scanning Process Set up the scanner Crawl and spider the site Run scan Validate results

Lab Setup

Connecting to the Network Connect to the wireless network SSID: SecureState Password: gobrowns

Install Paros Browse to: http://192.168.1.102/paros/ Download the version of Paros for your OS Run installer

Setting Up Paros as a Proxy: Determine Proxy Port Used by Paros Tools Options Local Proxy Note address and port Note: Default may need to be changed in using multiple proxies

Setting Up Paros as a Proxy: Configure IE to Use a Proxy Step 1

Setting Up Paros as a Proxy: Configure IE to Use a Proxy Step 2

Setting Up Paros as a Proxy: Configure IE to Use a Proxy Step 3

Setting Up Paros as a Proxy: Configure Firefox to Use a Proxy Step 1

Setting Up Paros as a Proxy: Configure Firefox to Use a Proxy Step 2

Setting Up Paros as a Proxy: Configure Firefox to Use a Proxy Step 3

Tour of Paros

Intercepting and Manipulating Data

Spidering and Crawling a Site Spidering is an automated process in which Paros follows links on a page to generate a site map By default Paros ignores links to external sites Paros uses the site map to determine which pages will be tested Very important to also manually crawl the site to ensure every page is mapped and scanned Automated spiders often miss links in JavaScript

Using Paros to Spider and Crawl

Scanning for Vulnerabilities

Reviewing the Results

Validating the Results Even the best scanner will produce false positives Very important to manually validate all scan results

A2 - Cross-Site Scripting (XSS) Cross-Site Scripting (XSS) Occurs when attacker sends malicious link, code, email to victim Allows for execution of JavaScript in victim s browser context Allows for cross-site communications Cause No input validation of headers, cookies, query strings, form fields (visible or hidden) Possible Outcomes Session Hijacking Site Defacement Phishing through URL redirection Worms

Useful Firefox Extensions SwitchProxy NoScript Firebug Hackbar SQL Inject ME XSS ME User Agent Switcher Web Developer Toolbar

Other Useful Tools DirBuster JBroFuzz SwfScan

Where to Learn More Web Hackers Handbook OWASP: Numerous free projects, programs, and educational resources OWASP Podcast http://www.owasp.org Practice web applications: OWASP Broken Web Applications Project Collection of practice web applications in a single virtual machine http://code.google.com/p/owaspbwa/

Thank you for your time! Matthew Neely mneely@securestate.com @matthewneely Q&A

A1 Injection Flaws Injection Flaws SQL Injection is the most common injection flaw Occurs when user-supplied data is sent to interpreter as part of a command or query Attacker tricks interpreter into executing unintended commands via specially crafted input Cause User input is not properly sanitized Possible Outcomes Create, Read, Update, and/or Delete Data Command Execution Full Host Compromise