ModSecurity as Universal Cross- pla6orm Web Protec;on Tool. Ryan Barne? Greg Wroblewski

Similar documents
ModSecurity as Universal Cross-platform Web Protection Tool

Defending Against Web App A0acks Using ModSecurity. Jason Wood Principal Security Consultant Secure Ideas

The Web Hacking Incident Database Semiannual Report July to December 2010

WEB APPLICATION FIREWALLS: DO WE NEED THEM?

Guidelines for Website Security and Security Counter Measures for e-e Governance Project

Leveraging SANS and NIST to Evaluate New Security Tools

Out of the Fire - Adding Layers of Protection When Deploying Oracle EBS to the Internet

Powerful, customizable protection for web applications and websites running ModSecurity on Apache/Linux based web-servers

Reducing Application Vulnerabilities by Security Engineering

Web Application Firewall (WAF) Guide. Web Application Firewall を 理 解 するための 手 引 き A Handbook to Understand Web Application Firewall

Comodo Web Application Firewall Software Version 2.0

Table of Contents. Page 2/13

NSFOCUS Web Application Firewall White Paper

Protecting Your Organisation from Targeted Cyber Intrusion

Web Application Security. Radovan Gibala Senior Field Systems Engineer F5 Networks

Adobe Systems Incorporated

Penta Security 3rd Generation Web Application Firewall No Signature Required.

AppDefend Application Firewall Overview

Guidelines for Web applications protection with dedicated Web Application Firewall

Web Application Firewall Technology Insight OWASP 22/ The OWASP Foundation. Joakim Sandström Role: OWASP Prospect.

Newsletter - September T o o l s W a t c h T e a m NJ OUCHN & MJ SOLER

Protect Web Sites from Cyber Attacks

SQL Injection 2.0: Bigger, Badder, Faster and More Dangerous Than Ever. Dana Tamir, Product Marketing Manager, Imperva

Introduction to Penetration Testing Graham Weston

Promoting Network Security (A Service Provider Perspective)

CCM 4350 Week 11. Security Architecture and Engineering. Guest Lecturer: Mr Louis Slabbert School of Science and Technology.

We protect you applications! No, you don t. Digicomp Hacking Day 2013 May 16 th 2013

Cyber- Attacks: The New Frontier for Fraudsters. Daniel Wanjohi, Technology Security Specialist

Web Application Firewalls: What the vendors do NOT want you to know. The OWASP Foundation

WEB APPLICATION VULNERABILITY STATISTICS (2013)

Cloud Security:Threats & Mitgations

Threat Mitigation for VoIP

Where every interaction matters.

Mingyu Web Application Firewall (DAS- WAF) All transparent deployment for Web application gateway

Certification Programs

IronBee Open Source Web Application Firewall

Web Engineering Web Application Security Issues

WHITE PAPER FORTIWEB WEB APPLICATION FIREWALL. Ensuring Compliance for PCI DSS 6.5 and 6.6

Barracuda Web Site Firewall Ensures PCI DSS Compliance

Integrating Web Application Security into the IT Curriculum

THREAT VISIBILITY & VULNERABILITY ASSESSMENT

Importance of Web Application Firewall Technology for Protecting Web-based Resources

Introduction: 1. Daily 360 Website Scanning for Malware

Cybercrime myths, challenges and how to protect our business. Vladimir Kantchev Managing Partner Service Centrix

WHITE PAPER. FortiWeb Web Application Firewall Ensuring Compliance for PCI DSS 6.5 and 6.6

Securing SharePoint 101. Rob Rachwald Imperva

Viewfinity Privilege Management Integration with Microsoft System Center Configuration Manager. By Dwain Kinghorn

From Rivals to BFF: WAF & VA Unite OWASP The OWASP Foundation

COURSE NAME: INFORMATION SECURITY INTERNSHIP PROGRAM

Web App Security Audit Services

Web Application Security

Comodo Web Application Firewall Software Version 2.11

WEB APPLICATION SECURITY

Thick Client Application Security

Bypassing Web Application Firewalls (WAFs) Ing. Pavol Lupták, CISSP, CEH Lead Security Consultant

STOPPING LAYER 7 ATTACKS with F5 ASM. Sven Müller Security Solution Architect

Web application testing

ModSecurity The Open Source Web Application Firewall

FBLA Cyber Security aligned with Common Core FBLA: Cyber Security RST RST RST RST WHST WHST

Practical Steps To Securing Process Control Networks

OPEN SOURCE SECURITY

Mean Time to Fix (MTTF) IT Risk s Dirty Little Secret Joe Krull, CPP, CISSP, IAM, CISA, A.Inst.ISP, CRISC, CIPP

Advanced Web Security, Lab

Analysis of Slow Read DoS Attack and Countermeasures

UNCLASSIFIED. General Enquiries. Incidents Incidents

Network Incident Report

ASP.NET MVC Secure Coding 4-Day hands on Course. Course Syllabus

Web Application Hacking (Penetration Testing) 5-day Hands-On Course

Information Security Office

Cyber Security Trend - Annual Review 2012

CRYPTUS DIPLOMA IN IT SECURITY

AUTOMATING THE 20 CRITICAL SECURITY CONTROLS

Intrusion detection for web applications

EVADING ALL WEB-APPLICATION FIREWALLS XSS FILTERS

Enterprise-Grade Security from the Cloud

Implementation of Web Application Firewall

Uncover security risks on your enterprise network

How To Perform An External Security Vulnerability Assessment Of An External Computer System

Main Research Gaps in Cyber Security

Information Technology Services Information Security Incident Response Plan

Fundamentals of Information Systems Security Unit 1 Information Systems Security Fundamentals

Radware Attack Mitigation Solution (AMS) Protect Online Businesses and Data Centers Against Emerging Application & Network Threats - Whitepaper

10 Potential Risk Facing Your IT Department: Multi-layered Security & Network Protection. September 2011

Web Application Firewalls Evaluation and Analysis. University of Amsterdam System & Network Engineering MSc

Effective Software Security Management

Introduction to Web Application Firewalls. Dustin Anders

The Top Web Application Attacks: Are you vulnerable?

Ovation Security Center Data Sheet

Attacks from the Inside

Some Notes on Web Application Firewalls

Comodo Web Application Firewall Software Version 2.11

How to Secure TYPO3 Installations

Transcription:

ModSecurity as Universal Cross- pla6orm Web Protec;on Tool Ryan Barne? Greg Wroblewski

WEB APPLICATIONS ARE HIGHLY TARGETED

Source Code Fix Challenges 10% Lack of Resources 11% 27% 3rd Party Code 13% Outsourced Code Insufficient Technical Skill 16% 23% Insufficient Contract Scope Cost is Too High Source: OWASP Web Applica2on Virtual Patching Survey

Account Takeover 6% Spam 5% Profit Fraud 2% Hacktivism Planting of Malware 13% Monetary Loss 15% Leakage of Information 59% Defacement 27% Leakage of Information 27% Downtime 46% Source: WASC Web Hacking Incident Database Q1 2012

WHY MODSECURITY?

Virtual Patching Defini;on: A security policy enforcement layer which prevents the exploita2on of a known vulnerability.

ModSecurity as Virtual Patching Tool Mature, well tested WAF module Project is 10 years old Protec;ng millions of websites >275k source code downloads Rich feature set, spanning both mi;ga;on and audit Significant community support Non- viral open source license OWASP Core Rule Set providing general protec;on

MODSECURITY: BEYOND APACHE

Web Server Pla6orm Marketshare nginx 11% Other 13% IIS 15% Apache 61% Source: NetcraL: July 2012 Web Server Survey

One Config to Rule Them All

MODSECURITY IIS EXPERIENCE

MODSECURITY NGINX EXPERIENCE

Build It ~/mod_security#./configure ~/mod_security# cd standalone ~/mod_security/standalone# make ~/nginx- 1.2.0#./configure - add- module=../mod_security/nginx/ modsecurity ~/nginx- 1.2.0# make ~/nginx- 1.2.0# make install

VIRTUAL PATCHING: EXAMPLES

CVE- 2011-3414 Collisions in HashTable May Cause DoS Vulnerability A denial of service vulnerability exists in the way that ASP.NET Framework handles specially crafted requests, causing a hash collision. An attacker who successfully exploited this vulnerability could send a small number of specially crafted requests to an ASP.NET server, causing performance to degrade significantly enough to cause a denial of service condition.

Mi;ga;ons Restrict the request body size Restrict the number of ARGS Iden;fy repe;;ve payloads Check ARGS names against PoC data ü There are ModSecurity rules for all four mi;ga;ons

CVE- 2012-1859 A classic case of cross- site scrip;ng vulnerability h?p://sharepoint/_layouts/scriptresx.ashx?culture=en- us&name=sp.jsgrid.res&rev=laygpe0lqaosnkb4iqx6m A%3D %3D&sec;ons=All z

CVE- 2012-1859 Blacklist approach: SecRule REQUEST_FILENAME "@contains /_layouts/ scriptresx.ashx" "chain,phase:1,block,msg:'xss Attempt Against SharePoint" SecRule ARGS:sections "@pm < > ( ) ; : Whitelist approach: SecRule REQUEST_FILENAME "@contains /_layouts/ scriptresx.ashx" "chain,phase:1,block,msg:'sharepoint Sections Param Violation - Illegal Chars" SecRule ARGS:sections "!@rx ^\w+$"

MODSECURITY 2.7.0: FIRST MULTI- PLATFORM RELEASE

Download RC2 Now h?p://sourceforge.net/projects/mod- security/files/modsecurity- apache/2.7.0- rc2/ h?p://sourceforge.net/projects/mod- security/files/modsecurity- iis/2.7.0- rc2/ ModSecurityIIS_2.7.0- rc2.msi

New Protec;ons Coming Microsoh Security Response Center will start publishing ModSecurity rules for vulnerabili;es in Microsoh products IIS/ASP/ASP.NET specific ModSecurity rule sets will be created by community effort

SUMMARY

Resources ModSecurity home page h?p://www.modsecurity.org/ OWASP Core Rule Set for ModSecurity h?ps://www.owasp.org/index.php/ Category:OWASP_ModSecurity_Core_Rule_Set_Project MSRC blog h?p://blogs.technet.com/b/srd/ Trustwave SpiderLabs blog h?p://blog.spiderlabs.com/ Trustwave Commercial Rule Set for ModSecurity h?ps://www.trustwave.com/modsecurity- rules- support.php

Contributors Microsoh ModSecurity Port for IIS Greg Wroblewski Senior Security Developer Suha Can Security Researcher / Developer Trustwave - ModSecurity Ziv Mador Director of Security Research Ryan Barne? Security Researcher Lead Breno Pinto ModSecurity Researcher & Developer Open community - Security Port for Nginx Alan Silva - Sohware Engineer at Alcatel- Lucent

BLACK HAT ARSENAL SESSIONS WEDNESDAY, 3:30PM, POD 2 THURSDAY, 10:15AM, POD 2

THANK YOU FEEDBACK: RBARNETT@MODSECURITY.ORG