Creating Stronger, Safer, Web Facing Code. JPL IT Security Mary Rivera June 17, 2011



Similar documents
Check list for web developers

The Top Web Application Attacks: Are you vulnerable?

Acunetix Website Audit. 5 November, Developer Report. Generated by Acunetix WVS Reporter (v8.0 Build )

The purpose of this report is to educate our prospective clients about capabilities of Hackers Locked.

Adobe Systems Incorporated

What is Web Security? Motivation

(WAPT) Web Application Penetration Testing

1. Introduction. 2. Web Application. 3. Components. 4. Common Vulnerabilities. 5. Improving security in Web applications

External Vulnerability Assessment. -Technical Summary- ABC ORGANIZATION

Secure Web Application Coding Team Introductory Meeting December 1, :00 2:00PM Bits & Pieces Room, Sansom West Room 306 Agenda

Web Application Threats and Vulnerabilities Web Server Hacking and Web Application Vulnerability

Cracking the Perimeter via Web Application Hacking. Zach Grace, CISSP, CEH January 17, Mega Conference

ArcGIS Server Security Threats & Best Practices David Cordes Michael Young

Out of the Fire - Adding Layers of Protection When Deploying Oracle EBS to the Internet

FINAL DoIT v.8 APPLICATION SECURITY PROCEDURE

Detecting and Defending Against Security Vulnerabilities for Web 2.0 Applications

FINAL DoIT v.4 PAYMENT CARD INDUSTRY DATA SECURITY STANDARDS APPLICATION DEVELOPMENT AND MAINTENANCE PROCEDURES

Web Application Report

Cross-Site Scripting

OWASP Top Ten Tools and Tactics

Threat Modeling. Categorizing the nature and severity of system vulnerabilities. John B. Dickson, CISSP

Using Free Tools To Test Web Application Security

Application Security Testing. Erez Metula (CISSP), Founder Application Security Expert

Web Application Security

Application Security Best Practices. Wally LEE Principal Consultant

WHITE PAPER. FortiWeb and the OWASP Top 10 Mitigating the most dangerous application security threats

SECURITY ADVISORY. December 2008 Barracuda Load Balancer admin login Cross-site Scripting

Strategic Information Security. Attacking and Defending Web Services

OWASP and OWASP Top 10 (2007 Update) OWASP. The OWASP Foundation. Dave Wichers. The OWASP Foundation. OWASP Conferences Chair

Threat Modeling/ Security Testing. Tarun Banga, Adobe 1. Agenda

Client vs. Server Implementations of Mitigating XSS Security Threats on Web Applications

ASP.NET MVC Secure Coding 4-Day hands on Course. Course Syllabus

Rational AppScan & Ounce Products

Web Application Penetration Testing

WEB SECURITY CONCERNS THAT WEB VULNERABILITY SCANNING CAN IDENTIFY

Implementation of Web Application Security Solution using Open Source Gaurav Gupta 1, B. K. Murthy 2, P. N. Barwal 3

Secure Web Development Teaching Modules 1. Threat Assessment

DFW INTERNATIONAL AIRPORT STANDARD OPERATING PROCEDURE (SOP)

Bank Hacking Live! Ofer Maor CTO, Hacktics Ltd. ATC-4, 12 Jun 2006, 4:30PM

How To Fix A Web Application Security Vulnerability

Application Security Testing

External Network & Web Application Assessment. For The XXX Group LLC October 2012

BLIND SQL INJECTION (UBC)

Last update: February 23, 2004

elearning for Secure Application Development

IJMIE Volume 2, Issue 9 ISSN:

Contemporary Web Application Attacks. Ivan Pang Senior Consultant Edvance Limited

Secure Web Applications. The front line defense

Web Engineering Web Application Security Issues

The Weakest Link: Mitigating Web Application Vulnerabilities. webscurity White Paper. webscurity Inc. Minneapolis, Minnesota USA

Integrated Network Vulnerability Scanning & Penetration Testing SAINTcorporation.com

Securing Your Web Application against security vulnerabilities. Ong Khai Wei, IT Specialist, Development Tools (Rational) IBM Software Group

Application security testing: Protecting your application and data

Detecting and Exploiting XSS with Xenotix XSS Exploit Framework

Sitefinity Security and Best Practices

Where every interaction matters.

Detecting Web Application Vulnerabilities Using Open Source Means. OWASP 3rd Free / Libre / Open Source Software (FLOSS) Conference 27/5/2008

Common Security Vulnerabilities in Online Payment Systems

How to break in. Tecniche avanzate di pen testing in ambito Web Application, Internal Network and Social Engineering

Web application security

Still Aren't Doing. Frank Kim

Top 10 Web Application Security Vulnerabilities - with focus on PHP

Top Ten Web Application Vulnerabilities in J2EE. Vincent Partington and Eelco Klaver Xebia

Essential IT Security Testing

National Information Security Group The Top Web Application Hack Attacks. Danny Allan Director, Security Research

Turning the Battleship: How to Build Secure Software in Large Organizations. Dan Cornell May 11 th, 2006

How to achieve PCI DSS Compliance with Checkmarx Source Code Analysis

Introduction to Web Application Security. Microsoft CSO Roundtable Houston, TX. September 13 th, 2006

Passing PCI Compliance How to Address the Application Security Mandates

Web application security: Testing for vulnerabilities

Columbia University Web Application Security Standards and Practices. Objective and Scope

Magento Security and Vulnerabilities. Roman Stepanov

Columbia University Web Security Standards and Practices. Objective and Scope

Thick Client Application Security

REAL-TIME WEB APPLICATION PROTECTION. AWF SERIES DATASHEET WEB APPLICATION FIREWALL

Input Validation Vulnerabilities, Encoded Attack Vectors and Mitigations OWASP. The OWASP Foundation. Marco Morana & Scott Nusbaum

Finding Your Way in Testing Jungle. A Learning Approach to Web Security Testing.

Application Code Development Standards

Java Web Application Security

EVALUATING COMMERCIAL WEB APPLICATION SECURITY. By Aaron Parke

MatriXay WEB Application Vulnerability Scanner V Overview. (DAS- WEBScan ) The best WEB application assessment tool

Web Security Testing Cookbook*

Web Application Security. Vulnerabilities, Weakness and Countermeasures. Massimo Cotelli CISSP. Secure

Improving Web Application Security by Eliminating CWEs Weijie Chen, China INFSY 6891 Software Assurance Professor Dr. Maurice Dawson 15 December 2015

Hack-proof Your Drupal App. Key Habits of Secure Drupal Coding

Why Web Applications are making a hackers life easy. Presented by Jon Grew BT SBS

Criteria for web application security check. Version

Web Application Guidelines

Introduction to Computer Security

3. Broken Account and Session Management. 4. Cross-Site Scripting (XSS) Flaws. Web browsers execute code sent from websites. Account Management

Six Essential Elements of Web Application Security. Cost Effective Strategies for Defending Your Business

ASL IT SECURITY BEGINNERS WEB HACKING AND EXPLOITATION

A Survey on Security and Vulnerabilities of Web Application

WEB ATTACKS AND COUNTERMEASURES

Testnet Summerschool. Web Application Security Testing. Dave van Stein

ASL IT Security Advanced Web Exploitation Kung Fu V2.0

Transcription:

Creating Stronger, Safer, Web Facing Code JPL IT Security Mary Rivera June 17, 2011

Agenda Evolving Threats Operating System Application User Generated Content JPL s Application Security Program Securing Web applications - Common vulnerabilities - Prevention techniques - Security testing tools Summary 2

10 Years ago Operating System Attacks Direct attacks Buffer Overflow Denial of Service Mitigation System administrators got quicker at patch management Vendors started releasing fixes quicker Firewalls had better protection 3

3 years ago Application Threats Hackers moved up a level from OS to Application Directed attacks against SSH Apache web servers SQL database servers Mitigation SA s got quicker at patch management Vendors started releasing fixes quicker Firewalls had better protection IT Sec started scanning applications not just operating systems 4

Today User Content Threats Hackers moved up one more level from application itself to content within the application Attacking User Content User generated code SQL injection, Cross Site Scripting Neither SA s nor vendors know how to fix user code Mitigation Help user become security aware Security in the Lifecycle Scan code 5

Half of the Security Incidents involved Applications Problem: In 2008, 49% of the JPL security incidents involved application vulnerabilities (shown in red). Web Site Unauthenticated Upload Web Server 3% Vulnerability 3% SQL Injection 11% SSH Brute Force 6% Malware 45% Cross-Site Scripting 32% 6

Agenda Evolving Threats Operating System Application User Generated Content JPL s Application Security Program << Securing Web Applications - Common vulnerabilities - Prevention techniques - Security testing tools Summary 7

JPL s Application Security Program App Security Registry Scanning Tools Security in Lifecycle Training & Awareness Security Guidelines 8

JPL Application Security Program Security Guidelines Programming languages PERL, ColdFusion, Java Security checklists Training & Awareness Developer training courses Web Application Security Online AppSec Training tutorials Quarterly Application Security Newsletter 9

Application Security Program Security in Lifecycle IT Security checklist Security process Security Scanning tools AppScan Web application testing Static source code analysis 10

Application Security Program Application Security Registry Inventory of applications Technical information about applications for security purposes Identifies responsible personnel for each application in the inventory 11

Agenda Evolving Threats Operating System Application User Generated Content JPL s Application Security Program Securing Web Applications << - Common vulnerabilities - Prevention techniques - Security testing tools Summary 12

Common Web Vulnerabilities Open Web Application Security Project (OWASP) Top 10 list Identifies the most common vulnerabilities Top Vulnerability categories Injection flaws Cross site scripting flaws 13

Injection Flaws Allows attackers to execute malicious code through a web application or other system Access to OS via shell commands Access to backend Database through SQL SQL Injection 14

Injection Flaws SQL Injection Application receives input from a user Input is sent as part of a database query Allows malicious users to execute commands on the database Occurs due to: - Improper input validation - Over privileged database logins 15

Potential Effects of SQL Injection Complete access to database Bypass authentication controls Potential command line access from database machine 16

SQL Injection Example Vulnerable Query: SELECT user FROM Users where loginname = $User and LoginPassword = $Password Injected Query: Attacker Input: $Password = OR 1 = 1 -- SELECT user FROM Users where loginname = jsmith and LoginPassword = Demo1234 OR 1 = 1 -- 17

SQL Injection Example Injected Query: Attacker s extra input to password: OR 1 = 1 -- 18

SQL Injection Example Application vulnerable to SQL injection 19

Preventing SQL Injection Use parameterized queries Use input validation Use low privileged accounts Limit error messages OWASP SQL Injection Prevention Cheat Sheet 20

Testing Tools for SQL Injection SQL Inject Me Firefox add on Other tools Absinthe Paros 21

Testing tool for SQL Injection Absinthe 22

Cross-site scripting (XSS) Tricks the browser into executing code JavaScript, VBScript, ActiveX, HTML, or Flash can be injected into a vulnerable application Application receives input from the user Input is returned back to the user without being sanitized 23

Potential Effects of XSS Redirection Web page contents modified Scripting commands Cookies compromised 24

XSS Example Input String: <SCRIPT>alert( XSS )<SCRIPT> 25

Preventing XSS Filter meta characters, scripting, object tags <script> and <object> Use encoding - HTML encode or URL encode Detailed information on XSS prevention - OWASP XSS Prevention Cheat Sheet 26

Testing Tool for XSS Paros Proxy 27

Summary Changes in threats require keeping pace with changes Secure web applications by Fixing common web vulnerabilities Using prevention techniques Using security testing tools 28

Resources Open Source Web Application Security Project (OWASP) http://www.owasp.org SQL Injection Cheat Sheet https://www.owasp.org/index.php/sql_injection_prevention_cheat_sheet XSS Cheat Sheet https://www.owasp.org/index.php/xss_%28cross_site_scripting %29_Prevention_Cheat_Sheet Tools Paros http://www.parosproxy.org/download.shtml SQL Injectme https://addons.mozilla.org/en-us/firefox/addon/sql-inject-me/ Absinthe http://www.0x90.org/releases/absinthe/ 29

QUESTIONS? 30