Testing the OWASP Top 10 Security Issues



Similar documents
Magento Security and Vulnerabilities. Roman Stepanov

Web Application Penetration Testing

Where every interaction matters.

WEB SECURITY CONCERNS THAT WEB VULNERABILITY SCANNING CAN IDENTIFY

OWASP Top Ten Tools and Tactics

How to break in. Tecniche avanzate di pen testing in ambito Web Application, Internal Network and Social Engineering

WHITE PAPER. FortiWeb and the OWASP Top 10 Mitigating the most dangerous application security threats

Essential IT Security Testing

Is Drupal secure? A high-level perspective on web vulnerabilities, Drupal s solutions, and how to maintain site security

The Top Web Application Attacks: Are you vulnerable?

FINAL DoIT v.4 PAYMENT CARD INDUSTRY DATA SECURITY STANDARDS APPLICATION DEVELOPMENT AND MAINTENANCE PROCEDURES

Web application security

Criteria for web application security check. Version

Using Free Tools To Test Web Application Security

ArcGIS Server Security Threats & Best Practices David Cordes Michael Young

CSE598i - Web 2.0 Security OWASP Top 10: The Ten Most Critical Web Application Security Vulnerabilities

Nuclear Regulatory Commission Computer Security Office Computer Security Standard

Integrating Security Testing into Quality Control

Securing Your Web Application against security vulnerabilities. Ong Khai Wei, IT Specialist, Development Tools (Rational) IBM Software Group

WHITE PAPER FORTIWEB WEB APPLICATION FIREWALL. Ensuring Compliance for PCI DSS 6.5 and 6.6

(WAPT) Web Application Penetration Testing

Application Security Vulnerabilities, Mitigation, and Consequences

Passing PCI Compliance How to Address the Application Security Mandates

Rational AppScan & Ounce Products

Six Essential Elements of Web Application Security. Cost Effective Strategies for Defending Your Business

Out of the Fire - Adding Layers of Protection When Deploying Oracle EBS to the Internet

Web Application Security

OWASP and OWASP Top 10 (2007 Update) OWASP. The OWASP Foundation. Dave Wichers. The OWASP Foundation. OWASP Conferences Chair

Overview of the Penetration Test Implementation and Service. Peter Kanters

Sitefinity Security and Best Practices

Introduction:... 1 Security in SDLC:... 2 Penetration Testing Methodology: Case Study... 3

WHITE PAPER. FortiWeb Web Application Firewall Ensuring Compliance for PCI DSS 6.5 and 6.6

Chapter 1 Web Application (In)security 1

Hack Proof Your Webapps

Web Application Report

Web applications. Web security: web basics. HTTP requests. URLs. GET request. Myrto Arapinis School of Informatics University of Edinburgh

OWASP TOP 10 ILIA

Web Application Attacks and Countermeasures: Case Studies from Financial Systems

Detecting Web Application Vulnerabilities Using Open Source Means. OWASP 3rd Free / Libre / Open Source Software (FLOSS) Conference 27/5/2008

Data Breaches and Web Servers: The Giant Sucking Sound

Web Application Security. Vulnerabilities, Weakness and Countermeasures. Massimo Cotelli CISSP. Secure

What is Web Security? Motivation

APPLICATION SECURITY AND ITS IMPORTANCE

Columbia University Web Security Standards and Practices. Objective and Scope

Adobe Systems Incorporated

elearning for Secure Application Development

Ethical Hacking as a Professional Penetration Testing Technique

Web Application Guidelines

Auditing Web Applications

National Information Security Group The Top Web Application Hack Attacks. Danny Allan Director, Security Research

Web Application Vulnerability Testing with Nessus

Web Application Security Assessment and Vulnerability Mitigation Tests

PCI-DSS and Application Security Achieving PCI DSS Compliance with Seeker

EVALUATING COMMERCIAL WEB APPLICATION SECURITY. By Aaron Parke

Sichere Software- Entwicklung für Java Entwickler

Certified Secure Web Application Security Test Checklist

OWASP AND APPLICATION SECURITY

Securing your Web application

Last update: February 23, 2004

Web Application Security What You Need to Know

Secure development and the SDLC. Presented By Jerry

SQuAD: Application Security Testing

Advanced Web Technology 10) XSS, CSRF and SQL Injection 2

Web Application Security Guidelines for Hosting Dynamic Websites on NIC Servers

05.0 Application Development

Kenna Platform Security. A technical overview of the comprehensive security measures Kenna uses to protect your data

JVA-122. Secure Java Web Development

3. Broken Account and Session Management. 4. Cross-Site Scripting (XSS) Flaws. Web browsers execute code sent from websites. Account Management

EXECUTIVE BRIEF. IT and Business Professionals Say Website Attacks are Persistent and Varied. In this Paper

Application security testing: Protecting your application and data

How To Fix A Web Application Security Vulnerability

Cracking the Perimeter via Web Application Hacking. Zach Grace, CISSP, CEH January 17, Mega Conference

An Introduction to Application Security in J2EE Environments

Members of the UK cyber security forum. Soteria Health Check. A Cyber Security Health Check for SAP systems

Network Security Exercise #8

Web Application Report

Excellence Doesn t Need a Certificate. Be an. Believe in You AMIGOSEC Consulting Private Limited

Application Security Testing. Generic Test Strategy

Cloud Security:Threats & Mitgations

Web Application Firewall on SonicWALL SSL VPN

Cyber Security Workshop Ethical Web Hacking

A Server and Browser-Transparent CSRF Defense for Web 2.0 Applications. Slides by Connor Schnaith

Table of Contents. Page 2/13

OWASP Application Security Building and Breaking Applications

FINAL DoIT v.8 APPLICATION SECURITY PROCEDURE

Application Layer Encryption: Protecting against Application Logic and Session Theft Attacks. Whitepaper

DFW INTERNATIONAL AIRPORT STANDARD OPERATING PROCEDURE (SOP)

Top Ten Web Application Vulnerabilities in J2EE. Vincent Partington and Eelco Klaver Xebia

Web Application Security

ASP.NET MVC Secure Coding 4-Day hands on Course. Course Syllabus

A6- Sensitive Data Exposure

Web Application Security

Application Security. Petr Křemen.

Transcription:

Testing the OWASP Top 10 Security Issues Andy Tinkham & Zach Bergman, Magenic Technologies Contact Us 1600 Utica Avenue South, Suite 800 St. Louis Park, MN 55416 1 (877)-277-1044 info@magenic.com

Who Are We?» Magenic: Leading consultancy providing custom application development, testing and QA services» Andy» 17 years of testing experience, focusing on automation, performance & other technical testing» Principal Consultant at Magenic, leading all our technical testing activities» Zach» 3 years of testing experience, focusing on security & test automation» Consultant at Magenic, driving internal security growth & initiatives

Security Testing» Testing focused on 3 aspects of a system» Authentication determining an entity is who they claim to be» Authorization determining whether an entity is allowed to use a requested action or resource» Accounting documenting what occurs in the system Authentication Authorization Accounting

Today» Talk about the most prevalent security vulnerabilities» Structure that talk using the OWASP Top 10 list» Andy will describe issue» Zach will demonstrate issue and talk about techniques to identify it» Cover some very basic testing techniques to find these» Only begin to scratch the surface of security testing

What is OWASP?» Open Web Application Security Project» Non-profit organization focused on improving the security of software» Around since 2001» Not affiliated with any technology company» Provide a variety of free tools, education, and information around application security» Local chapter: https://www.owasp.org/index.php/minneapolis_st_paul Next meeting: 1/21/2013, Gunnar Peterson, Mobile AppSec How ios and Android Apps fail and what to do to protect them

What is the OWASP Top 10? Most critical web application security flaws Occur frequently Easy to find Easy to exploit 10. Unvalidated Redirects and Forwards 9. Insufficient Transport Layer Protection 8. Failure to Restrict URL Access 7. Insecure Cryptographic Storage 6. Security Misconfiguration 5. Cross-Site Request Forgery 4. Insecure Direct Object References 3. Broken Authentication & Session Management 2. Cross-Site Scripting 1. Injection

Why should you care about these issues?» Security is a big deal» 77 million user accounts compromised on Sony PlayStation network» $1 trillion dollars worth of intellectual property stolen in 2008 (McAfee)» Symantec estimates the global price tag of consumer cybercrime to be $110 billion with 18 victims every second» 90% of businesses suffered some sort of hack in last 12 months (Research Ponemon/Juniper Networks, June 2011)» 83% of websites have had a high, critical or urgent issue (WhiteHat Security, 2009)» Poor security can lead to» Unwanted information disclosure» Compromised data» Financial and Reputational Costs» Legal Issues (HIPAA, other industry information security governance)

What Tools Will We Use?» Burp Suite (http://www.portswigger.net/burp/)» Awesome Cookie Manager (Chrome App Store)» BodgeIt Store (http://code.google.com/p/bodgeit/)» REST Console (Chrome App Store)

10. Unvalidated Redirects & Forwards» Use of an app s built-in redirect to access an unintended location» http://yoursite.com/redirect.php?url=http://yoursite.com/admin.php» http://yoursite.com/redirect.php?url=http://badsite.com» Users can be convinced to give information thinking they re giving it to you» Example Exploitability: Average Prevalence: Uncommon Detectability: Easy Impact: Moderate Testing Technique: Look for redirect functions throughout application in URL or request parameters

9. Insufficient Transport Layer Protection» Unencrypted data traversing networks can be seen, manipulated, and used without user knowledge» The session information from browser» User personally-identifiable information Exploitability: Difficult Prevalence: Common Detectability: Easy Impact: Moderate Testing Technique: See if HTTPS and TLS 1.1+ is being used on appropriate secure pages

9. Insufficient Transport Layer Protection Request over HTTP Request over HTTPS (SSL)

8. Failure to Restrict URL Access» Typically happens when assumptions are made regarding users knowledge of the app s layout/functionality security by obscurity» http://www.mysite.com/mysecretadminconsole.php» http://www.mysite.com/managerreports» Hidden or Unlisted resources» Only show the user functionality they can use Exploitability: Easy Prevalence: Uncommon Detectability: Average Impact: Moderate Testing Technique: Look for exposed URLs. If unlisted, check if URLs may be accessed with wrong authentication

7. Insecure Cryptographic Storage» Apps may not secure sensitive data with appropriate cryptography or may not store the artifacts around the cryptography securely» Inside or Outside of the physical data storage» Stored plaintext» Weak algorithm used» Unrestricted access to decrypt function» Private keys accessible Exploitability: Difficult Prevalence: Uncommon Detectability: Difficult Impact: Severe Testing Technique: Look for sensitive data in plaintext. Look for encryption in transit. (#9)

6. Security Misconfiguration» Default settings of platform being used» Configuration» Default usernames/passwords» Default error messages» Debugger sessions open» Lack of updates being applied Exploitability: Easy Prevalence: Common Detectability: Easy Impact: Moderate Testing Technique: Look for custom error messages. Look for debugger session being allowed.

6. Security Misconfiguration

6. Security Misconfiguration

6. Security Misconfiguration» 200 - OK» 401 - Unauthorized» 403 - Forbidden

5. Cross-Site Request Forgery (CSRF)» Targets user s session information in order to act as the user» http://www.store.com/addtocart.aspx?itemid=1234» http://www.blog.com/changepassword.php?newpass=password» Attacker takes advantage of user s currently stored sessions» In other tabs of browser» In browser if cookies haven t been cleared after closing Exploitability: Average Prevalence: Widespread Detectability: Easy Impact: Moderate Testing Technique: Look for actions, which can be completed by visiting a URL.

5. Cross-Site Request Forgery (CSRF)

5. Cross-Site Request Forgery (CSRF)» The image is right here:» <img src= http://10.30.46.15/bodgeit/basket.jsp?productid=17&price=4.1&qu antity=1 >

4. Insecure Direct Object Reference» Some application resources are accessible without going through access control» http://www.mysite.com/report00032» http://www.mysite.com/files/bugstofix.pdf» Manipulate requests to access resources» http://www.mysite.com/report00032 http://www.mysite.com/report00033» http://www.mysite.com/myaccount.php?user=bob http://www.mysite.com/myaccount.php?user=joan Exploitability: Easy Prevalence: Common Detectability: Easy Impact: Moderate Testing Technique: Look for references to objects, and attempt to access other similar objects.

3. Broken Authentication & Session Management» Poorly implemented protections can still be insecure, leading to additional vulnerabilities» Sessions should expire» Logout should revoke the user s session» Login should revoke any active sessions for same user» User shouldn t be able to manipulate or guess session» Key actions should revoke certain session permissions» Session fixation Exploitability: Average Prevalence: Common Detectability: Average Impact: Severe Testing Technique: Verify that sessions are actually revoked following key actions.

2. Cross-Site Scripting (XSS)» Untrusted input is not cleaned prior to being passed back to the browser» Can involve rendered HTML, JavaScript or any other web content Exploitability: Average Prevalence: Very Widespread Detectability: Easy Impact: Moderate Testing Technique: Verify that input is being validated or escaped so that it does not execute.

2. Cross-Site Scripting (XSS)

1. Injection» Untrusted input is not cleaned prior to being used by the application» Users may inject their own code into» The App» SQL Queries» XPath Queries» Operating System» Browser/DOM» Anywhere data is combined into executable statements Exploitability: Easy Prevalence: Common Detectability: Average Impact: Severe Testing Technique: Verify that input is being validated so that it is not executed server-side.

1. Injection

1. Injection

1. Injection» SELECT Username FROM Users WHERE Password = our input here» SELECT Username FROM Users WHERE Password = a or b = b

Summary» Security is a big deal» As testers, we can begin to look for obvious issues in the course of our normal work» OWASP Top 10 lists 10 most prevalent web security issues & is a good starting point» All of these security issues require deeper analysis beyond these techniques

Further Reading» OWASP Top 10 document (http://owasptop10.googlecode.com/files/owasp%20top%2010%20-%202010.pdf)» Troy Hunt s OWASP Top 10 for.net Developers ebook (https://asafaweb.com/owasp%20top%2010%20for%20.net%20developers.pdf)» The Web Application Hacker s Handbook, 2 nd Ed. Dafydd Stuttard and Marcus Pinto

Questions Contact us: AndyT@magenic.com ZachB@magenic.com