Security Testing for Developers using OWASP ZAP



Similar documents
Bust a cap in a web app with OWASP ZAP

HackPra. Burp Pro: Real-life tips & tricks

HP WebInspect Tutorial

Adobe Systems Incorporated

Creating Stronger, Safer, Web Facing Code. JPL IT Security Mary Rivera June 17, 2011

Detecting Web Application Vulnerabilities Using Open Source Means. OWASP 3rd Free / Libre / Open Source Software (FLOSS) Conference 27/5/2008

HackMiami Web Application Scanner 2013 PwnOff

! Resident of Kauai, Hawaii

QualysGuard WAS. Getting Started Guide Version 4.1. April 24, 2015

Application Code Development Standards

How To Protect Your Data From Attack

Check list for web developers

Bug Report. Date: March 19, 2011 Reporter: Chris Jarabek

Traitware Authentication Service Integration Document

Building & Measuring Security in Web Applications. Fabio Cerullo Cycubix Limited 30 May Belfast

Detecting and Exploiting XSS with Xenotix XSS Exploit Framework

(WAPT) Web Application Penetration Testing

Turning the Battleship: How to Build Secure Software in Large Organizations. Dan Cornell May 11 th, 2006

Using Foundstone CookieDigger to Analyze Web Session Management

THE OPEN UNIVERSITY OF TANZANIA

Arrow ECS University 2015 Radware Hybrid Cloud WAF Service. 9 Ottobre 2015

Entrust Managed Services PKI Administrator Guide

Detecting and Defending Against Security Vulnerabilities for Web 2.0 Applications

Application Security Testing

Building and Deploying Web Applications

INTRUSION DECEPTION CZYLI BAW SIĘ W CIUCIUBABKĘ Z NAMI

Acunetix Web Vulnerability Scanner. Getting Started. By Acunetix Ltd.

ACORD. Lync 2013 Web-app Install Guide

WordPress Security Scan Configuration

ASL IT SECURITY BEGINNERS WEB HACKING AND EXPLOITATION

Cyber Security Challenge Australia 2014

Performing a Web Application Security Assessment

Web Application Penetration Testing

JVA-122. Secure Java Web Development

Security Testing. Vulnerability Assessment vs Penetration Testing. Gabriel Mihai Tanase, Director KPMG Romania. 29 October 2014

Advanced Web Technology 10) XSS, CSRF and SQL Injection 2

Mean Time to Fix (MTTF) IT Risk s Dirty Little Secret Joe Krull, CPP, CISSP, IAM, CISA, A.Inst.ISP, CRISC, CIPP

QualysGuard WAS. Getting Started Guide Version 3.3. March 21, 2014

The purpose of this report is to educate our prospective clients about capabilities of Hackers Locked.

Online Vulnerability Scanner Quick Start Guide

WebGoat for testing your Application Security tools

Hybrid Analysis Mapping: Making Security and Development Tools Play Nice Together. Dan Cornell. CTO, Denim

Security Certification of Third- Parties Applications

BASELINE SECURITY TEST PLAN FOR EDUCATIONAL WEB AND MOBILE APPLICATIONS

BDD FOR AUTOMATING WEB APPLICATION TESTING. Stephen de Vries

Integrating Security into the Application Development Process. Jerod Brennen, CISSP CTO & Principal Security Consultant, Jacadis

METHODS TO TEST WEB APPLICATION SCANNERS

OWASP TOP 10 ILIA

Web application security: Testing for vulnerabilities

BusinessObjects Enterprise XI Release 2

Sichere Webanwendungen mit Java

Amadeus Shaping the future of travel

SYWorks Vulnerable Web Applications Compilation For Penetration Testing Installation Guide

Acunetix Website Audit. 5 November, Developer Report. Generated by Acunetix WVS Reporter (v8.0 Build )

OpenSAMM Software Assurance Maturity Model

Sabre Red Apps. Developer Toolkit Overview. October 2014

Web Application Vulnerability Testing with Nessus

Ethical Hacking as a Professional Penetration Testing Technique

Finding and Preventing Cross- Site Request Forgery. Tom Gallagher Security Test Lead, Microsoft

How to break in. Tecniche avanzate di pen testing in ambito Web Application, Internal Network and Social Engineering

Managing Qualys Scanners

Recon and Mapping Tools and Exploitation Tools in SamuraiWTF Report section Nick Robbins

Security Testing For RESTful Applications

Securing Your Web Application against security vulnerabilities. Ong Khai Wei, IT Specialist, Development Tools (Rational) IBM Software Group

Security Evaluation CLX.Sentinel

AAI for Mobile Apps How mobile Apps can use SAML Authentication and Attributes. Lukas Hämmerle

Using Sprajax to Test AJAX. OWASP AppSec Seattle Oct The OWASP Foundation

Introduction to Web Application Security. Microsoft CSO Roundtable Houston, TX. September 13 th, 2006

Getting Started with the iscan Online Data Breach Risk Intelligence Platform

Testing the OWASP Top 10 Security Issues

STABLE & SECURE BANK lab writeup. Page 1 of 21

Conducting Web Application Pentests. From Scoping to Report For Education Purposes Only

AdRadionet to IBM Bluemix Connectivity Quickstart User Guide

Network Security Exercise #8

Pentesting With Burp Suite Taking the web back from automated scanners

WEB SECURITY CONCERNS THAT WEB VULNERABILITY SCANNING CAN IDENTIFY

A Server and Browser-Transparent CSRF Defense for Web 2.0 Applications. Slides by Connor Schnaith

ArcGIS Server Security Threats & Best Practices David Cordes Michael Young

OWASP Application Security Building and Breaking Applications

State of The Art: Automated Black Box Web Application Vulnerability Testing. Jason Bau, Elie Bursztein, Divij Gupta, John Mitchell

Using Internet or Windows Explorer to Upload Your Site

Still Aren't Doing. Frank Kim

Portal Recipient Guide

Mobile development with Apache OFBiz. Ean Schuessler, Brainfood

Web Application Security

CSE598i - Web 2.0 Security OWASP Top 10: The Ten Most Critical Web Application Security Vulnerabilities

Login with Amazon. Getting Started Guide for Websites. Version 1.0

Development. Resilient Software. Secure and. Mark S. Merkow Lakshmikanth Raghavan. CRC Press. Taylor& Francis Croup. Taylor St Francis Group,

Contents Using Jive Anywhere

PaperStream Connect. Setup Guide. Version Copyright Fujitsu

mitmproxy.org How MITMproxy has been slaying SSL Dragons OWASP The OWASP Foundation

Automatic vs. Manual Code Analysis

Transcription:

JavaOne San Fransisco 2014 The OWASP Foundation http://www.owasp.org Security Testing for Developers using OWASP ZAP Simon Bennetts OWASP ZAP Project Lead Mozilla Security Team psiinon@gmail.com Copyright The OWASP Foundation Permission is granted to copy, distribute and/or modify this document under the terms of the OWASP License.

Overview Why you should be using ZAP Introduction to ZAP ZAP Use cases ZAP API ZAP Scripting Wrap up 2

My questions for you :) Who's heard of OWASP? Who's heard of ZAP? Who's used ZAP? Who does any security testing in development? Who thinks they do enough security testing in development? 3

You cannot build secure web applications unless you know how they will be attacked Thanks to Royston Robertson www.roystonrobertson.co.uk for permission to use his cartoon! 4

The problems Most devs know little about security Most companies have too few appsec folk External appsec people cost $$$ Security testing is done late in the development lifecycle (if at all) 5

Part of the Solution Use a security tool like ZAP in development :) In addition to a security training, secure development lifecycle, threat modeling, static source code analysis, core reviews, professional pentesting... 6

What is ZAP? An easy to use webapp pentest tool Completely free and open source Ideal for beginners But also used by professionals Ideal for devs, esp. for automated security tests Becoming a framework for advanced testing Included in all major security distributions ToolsWatch.org Top Security Tool of 2013 Not a silver bullet! 7

ZAP Principles Free, Open source Involvement actively encouraged Cross platform Easy to use Easy to install Internationalized Fully documented Work well with other tools Reuse well regarded components 8

Statistics Released September 2010, fork of Paros V 2.3.1 released in May 2014 V 2.3.1 downloaded > 70K times Translated into 20+ languages Over 100 translators Mostly used by Professional Pentesters? Paros code: ~20% ZAP Code: ~80% 9

Ohloh Statistics Very High Activity The most active OWASP Project 27 active contributors 329 years of effort Source: http://www.ohloh.net/p/zaproxy 10

Typical ZAP use 1. Explore your application 2. Configure ZAP for your application 3. Passive scanning runs automatically 4. Run active scanner 5. Fine tuning? 6. Perform manual testing? 11

What to configure? Pages to ignore (logout, duplicates) Anti CSRF tokens Session handling Authentication Users Structure (single page apps) 'Non standard' separators e.g. aaa:bbb;ccc:ddd 12

Some ZAP use cases Point and shoot the Quick Start tab Proxying via ZAP, and then scanning Manual pentesting Automated security regression tests Debugging Part of a larger security program 13

Quick Start Attack 14

Proxying via ZAP Options: Plug-n-Hack Configure your browser's proxy manually 15

Right click everywhere!

Fine tuning

More fine tuning

Security Regression Tests http://code.google.com/p/zaproxy/wiki/secregtests 19

ZAP Embedded ThreadFix Denim Group Software vulnerability aggregation and management system Minion Mozilla Security automation platform 20

The ZAP API

The ZAP API Direct access via: http://zap/ (if proxying through ZAP) http://<ip address>:<port> API Clients: Java Python Node.js PHP https://code.google.com/p/zaproxy/wiki/apidetails

Scripting Full access to ZAP internals Support all JSR 223 languages, inc JavaScript Jython JRuby Zest :)

Scripting Different types of scripts Stand alone Run when you say Targeted Specify URLs to run against Active Run in Active scanner Passive Run in Passive scanner Proxy Run 'inline' Authentication Complex logins Input Vector Define what to attack

Zest - Overview An experimental scripting language Developed by Mozilla Security Team Free and open source (of course) Format: JSON designed to be represented visually in security tools Tool independent can be used in open and closed, free or commercial software Essentially ZAP's macro language Supports all ZAP default script types

Zest Scripts

The Source Code Currently on Google Code Will probably move to GitHub when time allows Hacking ZAP blog series: https://code.google.com/p/zaproxy/wiki/development ZAP Internals: https://code.google.com/p/zaproxy/wiki/internaldetails ZAP Dev Group: http://groups.google.com/group/zaproxy-develop

Conclusion You need to consider security in all stages of development ZAP is an ideal tool for automating security tests Its also a great way to learn about security Its a community based tool get involved!

Questions? http://www.owasp.org/index.php/zap