How To Write A Web Application Vulnerability Scanner And Security Auditor



Similar documents
Intrusion detection for web applications

Creating Stronger, Safer, Web Facing Code. JPL IT Security Mary Rivera June 17, 2011

05.0 Application Development

Securing Your Web Application against security vulnerabilities. Ong Khai Wei, IT Specialist, Development Tools (Rational) IBM Software Group

Essential IT Security Testing

Adobe Systems Incorporated

ArcGIS Server Security Threats & Best Practices David Cordes Michael Young

CSE598i - Web 2.0 Security OWASP Top 10: The Ten Most Critical Web Application Security Vulnerabilities

Detecting Web Application Vulnerabilities Using Open Source Means. OWASP 3rd Free / Libre / Open Source Software (FLOSS) Conference 27/5/2008

Web Application Security. Vulnerabilities, Weakness and Countermeasures. Massimo Cotelli CISSP. Secure

Rational AppScan & Ounce Products

WEB SECURITY CONCERNS THAT WEB VULNERABILITY SCANNING CAN IDENTIFY

Web Application Vulnerability Testing with Nessus

FINAL DoIT v.4 PAYMENT CARD INDUSTRY DATA SECURITY STANDARDS APPLICATION DEVELOPMENT AND MAINTENANCE PROCEDURES

Where every interaction matters.

The Top Web Application Attacks: Are you vulnerable?

Pentests more than just using the proper tools

Pentests more than just using the proper tools

Magento Security and Vulnerabilities. Roman Stepanov

(WAPT) Web Application Penetration Testing

VIDEO intypedia007en LESSON 7: WEB APPLICATION SECURITY - INTRODUCTION TO SQL INJECTION TECHNIQUES. AUTHOR: Chema Alonso

WebCruiser User Guide

1. Introduction. 2. Web Application. 3. Components. 4. Common Vulnerabilities. 5. Improving security in Web applications

Web Application Report

State of The Art: Automated Black Box Web Application Vulnerability Testing. Jason Bau, Elie Bursztein, Divij Gupta, John Mitchell

WHITE PAPER. FortiWeb and the OWASP Top 10 Mitigating the most dangerous application security threats

Cracking the Perimeter via Web Application Hacking. Zach Grace, CISSP, CEH January 17, Mega Conference

Web application testing

Turning the Battleship: How to Build Secure Software in Large Organizations. Dan Cornell May 11 th, 2006

How to break in. Tecniche avanzate di pen testing in ambito Web Application, Internal Network and Social Engineering

Conducting Web Application Pentests. From Scoping to Report For Education Purposes Only

Overview of the Penetration Test Implementation and Service. Peter Kanters

Web Application Penetration Testing

Web Application Security

Reducing Application Vulnerabilities by Security Engineering

Cross-Site Scripting

OWASP Top Ten Tools and Tactics

DISA's Application Security and Development STIG: How OWASP Can Help You. AppSec DC November 12, The OWASP Foundation

Web Application Hacking (Penetration Testing) 5-day Hands-On Course

What is Web Security? Motivation

Web application security

Contemporary Web Application Attacks. Ivan Pang Senior Consultant Edvance Limited

Secure Web Application Coding Team Introductory Meeting December 1, :00 2:00PM Bits & Pieces Room, Sansom West Room 306 Agenda

Acunetix Web Vulnerability Scanner. Getting Started. By Acunetix Ltd.

Institutionen för datavetenskap

How To Understand And Understand The Security Of A Web Browser (For Web Users)

Penetration Testing Lessons Learned. Security Research

APPLICATION SECURITY: FROM WEB TO MOBILE. DIFFERENT VECTORS AND NEW ATTACK

Attack and Penetration Testing 101

OWASP TOP 10 ILIA

Learning objectives for today s session

Using Free Tools To Test Web Application Security

Hack Proof Your Webapps

Chapter 1 Web Application (In)security 1

Application Code Development Standards

How To Fix A Web Application Security Vulnerability

Attack Vector Detail Report Atlassian

MatriXay WEB Application Vulnerability Scanner V Overview. (DAS- WEBScan ) The best WEB application assessment tool

Black Box versus White Box: Different App Testing Strategies John B. Dickson, CISSP

OWASP and OWASP Top 10 (2007 Update) OWASP. The OWASP Foundation. Dave Wichers. The OWASP Foundation. OWASP Conferences Chair

SECURITY ADVISORY. December 2008 Barracuda Load Balancer admin login Cross-site Scripting

Hardening Moodle. Concept and Realization of a Security Component in Moodle. a project by

Nuclear Regulatory Commission Computer Security Office Computer Security Standard

Web Application Security

Introduction to Web Application Security. Microsoft CSO Roundtable Houston, TX. September 13 th, 2006

National Information Security Group The Top Web Application Hack Attacks. Danny Allan Director, Security Research

Security Testing with Selenium

ASL IT Security Advanced Web Exploitation Kung Fu V2.0

MANAGED SECURITY TESTING

WHITE PAPER FORTIWEB WEB APPLICATION FIREWALL. Ensuring Compliance for PCI DSS 6.5 and 6.6

Bank Hacking Live! Ofer Maor CTO, Hacktics Ltd. ATC-4, 12 Jun 2006, 4:30PM

EVALUATING COMMERCIAL WEB APPLICATION SECURITY. By Aaron Parke

Web Application Firewall on SonicWALL SSL VPN

SERENA SOFTWARE Serena Service Manager Security

Detecting and Defending Against Security Vulnerabilities for Web 2.0 Applications

Web-Application Security

Promoting Application Security within Federal Government. AppSec DC November 13, The OWASP Foundation

Table of Contents. Page 2/13

Web Engineering Web Application Security Issues

ASL IT SECURITY BEGINNERS WEB HACKING AND EXPLOITATION

Web Application Security Considerations

Security Products Development. Leon Juranic

Recon and Mapping Tools and Exploitation Tools in SamuraiWTF Report section Nick Robbins

Model-Based Vulnerability Testing for Web Applications

Security Evaluation of Web Application. Using Custom Web Application

Secure Coding in Node.js

WebCruiser Web Vulnerability Scanner User Guide

Early Vulnerability Detection for Supporting Secure Programming

Software Assurance Tools: Web Application Security Scanner Functional Specification Version 1.0

Check list for web developers

NoSQL, But Even Less Security Bryan Sullivan, Senior Security Researcher, Adobe Secure Software Engineering Team

DFW INTERNATIONAL AIRPORT STANDARD OPERATING PROCEDURE (SOP)

Is Drupal secure? A high-level perspective on web vulnerabilities, Drupal s solutions, and how to maintain site security

Web Application Firewall on SonicWALL SRA

3. Broken Account and Session Management. 4. Cross-Site Scripting (XSS) Flaws. Web browsers execute code sent from websites. Account Management

IJMIE Volume 2, Issue 9 ISSN:

Transcription:

ARGENTINA CHILE COLOMBIA MEXICO PANAMA PERU SPAIN USA VENEZUELA WAPITI Web application vulnerability scanner and Security auditor March 2010 www.gesfor.es www.grupogesfor.com1

Agenda Why is security necessary? Why do things happen? Types of Security OWASP Top 10 Vulnerability detection Wapiti About Gesfor 2

Why is security necessary? Data is a valuable asset for a company. An attack could cause the loss of several thousands (or millions) of Euros. An attack could damage the corporate image of a company. 3

Why do things happen? Bad things happen to other people Lazy system administrators Fast developments focused on functionality Ignorance in security 4

Types of Security Physical security Network security Server security Application security 5

Common Security Vulnerabilities (OWASP Top 10) 1. Cross Site Scripting (XSS) 2. Injection Flaws (SQL Injection included) 3. Malicious File Execution 4. Insecure Direct Object Reference 5. Cross Site Request Forgery (CSRF) 6. Information Leakage and Improper Error Handling 7. Broken Authentication and Session Management 8. Insecure Cryptographic Storage 9. Insecure Communications 10. Failure to Restrict URL Access 6

XSS Inject client-side code into web pages Typically Javascript code Types of XSS attacks: Non-persistent Persistent Examples: http://page.com?foo_var=<script>alert( Cookie +document.co okie)</script> <SCRIPT>alert( Cookie +document.cookie)</script> 7

SQL Injection Inject code from the client-side that is executed in the database layer. Example: Query: SELECT * FROM Users WHERE Username='$username' AND Password='$password' Input: $username = 1' or '1' = '1 $password = 1' or '1' = '1 Result: SELECT * FROM Users WHERE Username= '1' OR '1' = '1' AND Password= '1' OR '1' = '1' 8

Vulnerability detection Three types of techniques: Black-box Testing External attacker approach White-box Testing Dynamic and Static Analysis code Grey box Testing Mixed approach 9

Wapiti Web application vulnerability scanner and Security auditor 10

Wapiti: Content and Characteristics Project created in 2006 by Nicolas Surribas Contributions from Gesfor from 2008 Written in Python Black-box testing approach Technique used: Fuzz testing Vulnerabilities that are detected: XSS (persistent and non-persistent) SQL Injection (and Blind SQL Injection) CRLF Injection Command Execution detection 11

Wapiti Fuzz Testing (Steps) 1: Attack vectors detection Links Forms 2: Attack Injection of malicious chains in order to discover existing vulnerabilities (optimized) 3: Response analysis Errors, injected chains... 12

Wapiti: First step (Web Crawler) Goal: discover attack vectors Forms and links Using httplib2 library (instead of urllib2 ) More efficient http://code.google.com/p/httplib2 13

Wapiti: First step (Web Crawler) Found issues I: HTTP Authentication: Solution: Auth option: -a <login%password> Session Cookies: Solution: Cookie option: -c <cookie_file> Wapiti includes a tool that is able to create Cookie files 14

Wapiti: First step (Web Crawler) Found issues II: Infinite link navigation ( Calendar problem) Solution: Nice option: -n <limit> http://www.server.com/p?a=x&b=1&c=x http://www.server.com/p?a=x&b=2&c=x http://www.server.com/p?a=x&b=2&c=y 15

Wapiti: First step (Web Crawler) Limitations: Javascript links (Wapiti does not execute Javascript code => these links are not followed) Pages with the same URL without parameters (Interpreted as the same page) It is not able to discover the Deep Web Inherent limitations of the Web Crawler approach 16

Wapiti: Second step (Fuzzing Testing) Attacks on the vectors identified in the first step. Injection of malicious chains in order to discover existing vulnerabilities (optimized) 17

Wapiti: Third step (Response analysis) Discovering of existing vulnerabilities from analysis of the obtained errors and responses to the injected chains 18

Wapiti: Disadvantages and Advantages Disadvantages: Wapiti is not able to find all the vulnerabilities Advantages of this technique: Fast testing User does not need security knowledge Wapiti discovers the most common vulnerabilities (according to the OWASP Top Ten) New attacks can be added in an easy way 19

Wapiti: Results More than 30.000 downloads from sourceforge.net Positionated 1,588 in sourceforge ranking (162,419 total projects) Included as OWASP project Included in the most important Security Linux distributions. BackTrack, OWASP Live CD... 20

Wapiti: Results 21

Wapiti: Results 22

Wapiti: Contributions from Gesfor Version Contributions 2.0 2.1 2.2 Generation of reports Refactoring to an Object Oriented approach Extensibility of payloads Nice option Extensive documentation New Wapiti portal J2EE version Online demo XSS improvements More efficient (using httplib2 library) Blind SQL Injection attacks Create cookies files tool XSS improvements Scope option Temporal files Internationalization (English, Spanish and French) Compatibility with Segovia 23

Wapiti: Website Features of each version Download Wiki Introduction Getting started User guides FAQ Roadmap Videos... 24

Wapiti: Future Roadmap 2009/2010 25

Wapiti: Future Version 2.3 (in progress). Improvements: SQL injection Threading attacks Cookies management 26

A Group with 25 years experience Spanish Multinational Capital. In IT and HR sectors Technological Consulting, Integration Systems, Outsourcing, HR Consulting and Training. Over 2,000 professionals. Wide presence in 20 countries. More than 300 large customers from all sectors. More than 25 projects a year in R & D at European, national and local levels.. Commitment towards Quality and Excellence. Leading company in the field of Information Technology recognized in the market for high sustained commitment to its customers, employees and partners. 27

GRUPO GESFOR HH.RR. & IT Global Provider www.gesfor.es http://innovacion.grupogesfor.com WAPITI: http://www.ict-romulus.eu/web/wapiti A group without boundaries 28