Technical Proposal. In collaboration with Main Contractor. 24 th April 2012 (VER. 1.0) E-SPIN SDN BHD



Similar documents
Web Application Security

Using Nessus In Web Application Vulnerability Assessments

Acunetix Web Vulnerability Scanner. Getting Started. By Acunetix Ltd.

Interactive Application Security Testing (IAST)

IT Security & Compliance. On Time. On Budget. On Demand.

WHITEPAPER. Nessus Exploit Integration

CORE Security and the Payment Card Industry Data Security Standard (PCI DSS)

April 11, (Revision 2)

Adobe Systems Incorporated

WEB SECURITY CONCERNS THAT WEB VULNERABILITY SCANNING CAN IDENTIFY

Web Vulnerability Scanner v9 User Manual

HackMiami Web Application Scanner 2013 PwnOff

Using the Tenable Solution to Audit and Protect Firewalls, Routers, and Other Network Devices May 14, 2013 (Revision 1)

WHITE PAPER. FortiWeb and the OWASP Top 10 Mitigating the most dangerous application security threats

Online Vulnerability Scanner User Manual

Web Vulnerability Scanner v8 User Manual

Web Application Vulnerability Testing with Nessus

SAST, DAST and Vulnerability Assessments, = 4

ANNEXURE-1 TO THE TENDER ENQUIRY NO.: DPS/AMPU/MIC/1896. Network Security Software Nessus- Technical Details

Client logo placeholder XXX REPORT. Page 1 of 37

05.0 Application Development

3. Broken Account and Session Management. 4. Cross-Site Scripting (XSS) Flaws. Web browsers execute code sent from websites. Account Management

IBM. Vulnerability scanning and best practices

Online Vulnerability Scanner Quick Start Guide

Integrated Threat & Security Management.

Mingyu Web Application Firewall (DAS- WAF) All transparent deployment for Web application gateway

Application Code Development Standards

Acunetix Web Vulnerability Scanner. Manual V6.5. By Acunetix Ltd.

Web Application Penetration Testing

Where every interaction matters.

CORE INSIGHT ENTERPRISE: CSO USE CASES FOR ENTERPRISE SECURITY TESTING AND MEASUREMENT

Network Test Labs (NTL) Software Testing Services for igaming

(WAPT) Web Application Penetration Testing

Detecting Web Application Vulnerabilities Using Open Source Means. OWASP 3rd Free / Libre / Open Source Software (FLOSS) Conference 27/5/2008

Passing PCI Compliance How to Address the Application Security Mandates

Security and Vulnerability Testing How critical it is?

The Top Web Application Attacks: Are you vulnerable?

Cautela Labs Cloud Agile. Secured. Threat Management Security Solutions at Work

Website Security. End-to-End Application Security from the Cloud. Cloud-Based, Big Data Security Approach. Datasheet: What You Get. Why Incapsula?

REAL-TIME WEB APPLICATION PROTECTION. AWF SERIES DATASHEET WEB APPLICATION FIREWALL

KASPERSKY SECURITY INTELLIGENCE SERVICES. EXPERT SERVICES.

Penetration Testing in Romania

Guidelines for Web applications protection with dedicated Web Application Firewall

Mavituna Security Ltd. Finance House, 522A Uxbridge Rd. Pinner. HA5 3PU / UK

Privileged. Account Management. Accounts Discovery, Password Protection & Management. Overview. Privileged. Accounts Discovery

DISCOVERY OF WEB-APPLICATION VULNERABILITIES USING FUZZING TECHNIQUES

What Do You Mean My Cloud Data Isn t Secure?

2015 Vulnerability Statistics Report

ETHICAL HACKING APPLICATIO WIRELESS110 00NETWORK APPLICATION MOBILE MOBILE0001

FINAL DoIT v.8 APPLICATION SECURITY PROCEDURE

Secure Web Development Teaching Modules 1. Security Testing. 1.1 Security Practices for Software Verification

Is Drupal secure? A high-level perspective on web vulnerabilities, Drupal s solutions, and how to maintain site security

Web Vulnerability Scanner v10 Product Manual

State of The Art: Automated Black Box Web Application Vulnerability Testing. Jason Bau, Elie Bursztein, Divij Gupta, John Mitchell

How to break in. Tecniche avanzate di pen testing in ambito Web Application, Internal Network and Social Engineering

2011 Forrester Research, Inc. Reproduction Prohibited

CORE IMPACT AND THE CONSENSUS AUDIT GUIDELINES (CAG)

HTTPParameter Pollution. ChrysostomosDaniel

Essential IT Security Testing

Check list for web developers

HP WebInspect Tutorial

PCI-DSS and Application Security Achieving PCI DSS Compliance with Seeker

End-to-End Application Security from the Cloud

Performing a Web Application Security Assessment

MatriXay WEB Application Vulnerability Scanner V Overview. (DAS- WEBScan ) The best WEB application assessment tool

Kenna Platform Security. A technical overview of the comprehensive security measures Kenna uses to protect your data

Redhawk Network Security, LLC Layton Ave., Suite One, Bend, OR

Introduction:... 1 Security in SDLC:... 2 Penetration Testing Methodology: Case Study... 3

Real-Time Auditing for SANS Consensus Audit Guidelines

Continuous Network Monitoring

Acunetix Web Vulnerability Scanner. User Manual. By Acunetix Ltd.

Using Free Tools To Test Web Application Security

Web Vulnerability Assessment Report

Conducting Web Application Pentests. From Scoping to Report For Education Purposes Only

THE SMARTEST WAY TO PROTECT WEBSITES AND WEB APPS FROM ATTACKS

STOPPING LAYER 7 ATTACKS with F5 ASM. Sven Müller Security Solution Architect

National Endowment for the Arts Evaluation Report. Table of Contents. Results of Evaluation Areas for Improvement Exit Conference...

Securing Your Web Application against security vulnerabilities. Ong Khai Wei, IT Specialist, Development Tools (Rational) IBM Software Group

Cyber Security RFP Template

Acunetix Web Vulnerability Scanner

HP Application Security Center

AIRDEFENSE SOLUTIONS PROTECT YOUR WIRELESS NETWORK AND YOUR CRITICAL DATA SECURITY AND COMPLIANCE

VULNERABILITY MANAGEMENT

SYSTEM DEPLOYMENT & SECURITY AUDITING WITH RHN SATELLITE & NESSUS

IBM Security QRadar SIEM Version MR1. Vulnerability Assessment Configuration Guide

PCI DSS Reporting WHITEPAPER

SANS Top 20 Critical Controls for Effective Cyber Defense

THE BLIND SPOT IN THREAT INTELLIGENCE THE BLIND SPOT IN THREAT INTELLIGENCE

Web application testing

QuickBooks Online: Security & Infrastructure

Network Security and Vulnerability Assessment Solutions

How To Manage Web Content Management System (Wcm)

Rational AppScan & Ounce Products

TRIPWIRE PURECLOUD. TRIPWIRE PureCloud USER GUIDE

Transcription:

Technical Proposal 24 th April 2012 (VER. 1.0) In collaboration with Main Contractor E-SPIN SDN BHD Since 2005 E-SPIN SDN BHD. All Right Reserved. www.e-spincorp.com

Product Overview & Features Nessus Professional Feed The proposed Nessus vulnerability scanner is the world's most widelydeployed vulnerability and configuration assessment product, with over five million downloads to date. Nessus is rated among the top vulnerability scanners throughout the security industry and is endorsed by professional security organizations. Nessus is supported by a world-renowned research team and has an extensive vulnerability knowledge base that is continually updated. Nessus features include: Agent less auditing Compliance checks Content audits Customized reporting High-speed vulnerability discovery In-depth assessments Patch management integration Scan policy design & execution Nessus vulnerability scanners can be distributed throughout an entire enterprise, inside DMZs and across physically separate networks.

Product Overview & Features Nessus Professional Feed Nessus ProfessionalFeed enables user to scan their network, obtain support, updates to their database of vulnerability checks and compliance auditing. Users will be able to receive immediate access to: The newest Tenable Nessus plugins as soon as they are released Manage scheduled scans from the Tenable Nessus web interface for daily, weekly, monthly and other types of audits Perform an unlimited amount of complete PCI DSS compliance audits Perform web application audits of custom and embedded applications to test for cross site scripting, SQL injection and much more Conduct application, router and SQL database configuration audits against CERT, CIS, DISA STIGs, GLBA, HIPAA, NIST SCAP FDCC, NSA and PCI standards Conduct content audits such as adult content, personally identifiable information (credit cards, SSN, etc.) corporate spreadsheets, and much more SCADA vulnerability checks to detect and audit Control System devices Virtual Appliance - access to a download of a Nessus 5 VMware Virtual Appliance, which works with VMware ESX, Server, Workstation and Fusion Support - Access to operational and technical assistance from Tenable's experienced support staff with regards to the deployment and use of their scanners, as well as the writing of audit policies for the compliance checks or content checks

Product Overview & Features CoreImpact Pro The proposed CORE Impact Pro is the most comprehensive software solution for assessing and testing security vulnerabilities throughout your organization. In terms of the product itself, Core Impact Pro enables user to conduct exploitation or penetration test on these following things 1. endpoint systems & email users 2. mobile devices 3. network devices 4. network systems 5. web applications 6. wireless networks With 15+ years of leading-edge security research and commercial grade development, Core Impact allows users to evaluate your security posture using the same techniques employed by today s cyber-criminals. CORE IMPACT Features 1. Multi-Threat Surface Investigation CORE Impact Pro is the only solution that empowers you to replicate multi-staged attacks that pivot across systems, devices and applications, revealing how chains of exploitable vulnerabilities open paths to your organization s mission-critical systems and data. 2. What-If Attack Analysis Impact Pro empowers you to demonstrate the severity of exposures by not only replicating how an attacker would compromise and interact with vulnerable systems, but also revealing exactly which data would be at risk. 3. Commercial-Grade Exploits Only CORE Impact Pro offers a stable, up-to-date library of commercialgrade exploits and real-world testing capabilities. CORE routinely delivers 30+ new exploits and other updates each month all professionally built and tested by in-house researchers and developers. 4. Actionable Results and Reports Impact offers the industry s most comprehensive vulnerability reports. Confirm exploitable vulnerabilities to plan remediation efforts Gain metrics that illustrate the efficacy of layered defenses Validate compliance with government and industry regulations

Product Overview & Features CoreImpact Pro

Product Overview & Features CoreImpact Pro

Product Overview & Features Acunetix Web Vunerability Scanner The Proposed Web Vulnerability Scanner come with all the features requested by end client, and thus enable end client to perform comprehensive web vulnerability assessment on unlimited websites owned by the end client. 1. Web Vulnerability Scanner ( For vulnerability scanning and penetration testing) The proposed Web Vulnerability Scanner is Acunetix Web Vulnerability Scanner and it comes with the followings functionality in high level for the purpose of Vulnerability Assessment, Penetration Testing, and even as a Hacking Tool. Spider- Crawls your entire website to list the whole website structure and able to provide detailed information on each pages found Scanning- Any vulnerabilities found will be alerted in the Alert Node where it gives information on the vulnerabilities found and recommendation on how to fix the vulnerabilities In-depth checking for SQL Injection, Cross Site Scripting (XSS) and other Vulnerabilities with the innovative AcuSensor Technology (defined as white box scanner/dynamic source code scanner where end user able to detect the stack trace, source code line number, affected SQL query and etc) at lesser false positive. Scan AJAX and Web 2.0 Technologies for Vulnerabilities Port Scanning and Network Alerts Detailed reports enable you to meet Legal and Regulatory Compliance. Few examples of available compliances are PCI, HIPPA, VISA and etc. Analyzes your site against the Google Hacking Database Test password protected areas and web forms with Automatic web form filler Advanced penetration testing tools(designed for web applications) included HTTP Editor - Construct HTTP/HTTPS requests and analyze the web server response. HTTP Sniffer - Intercept, log and modify all HTTP/HTTPS traffic and reveal all data sent by a web application. HTTP Fuzzer - Perform sophisticated fuzzing tests to test web applications input validation and handling of unexpected and invalid random data. Test thousands of input parameters with the easy to use rule builder of the HTTP Fuzzer. Tests that would have taken days to perform manually can now be done in minutes. Script your own custom web vulnerability attacks with the WVS Scripting tool. A scripting SDK documentation is available from the Acunetix website. Blind SQL Injector - An automated database data extraction tool that is ideal for penetration testers who wish to make further tests manually.

Product Overview & Features Acunetix Web Vunerability Scanner Figure shows Acusensor Functionality Figure shows SQL Injection reported by Acusensor Technology

Product Overview & Features Acunetix Web Vunerability Scanner Figure on the left shows the website structure after the spider crawls the website Figure on the right shows the Alert Node and information about the Vulnerability Figure on the left shows the SQL Injection vulnerability

Product Overview & Features Acunetix Web Vunerability Scanner Figure above shows the Penetration Tools available for advanced hacking

Product Overview & Features Netsparkeer Web App The proposed Netsparker is a web application security scanner, notably the only False-positive-free web application security scanner. With a simple and easy usage, a user just run a scan at the website and it will automatically discover the flaws that could make the website dangerously exposed. Besides that, the proposed Netsparker has an intuitive user interface and a quick-start scanning procedure that will enable user to test the web app in seconds. The friendly interface is a notable kind to ease the usage for users. Netsparker Features 1. Full support for AJAX and JavaScript-based applications User can rely on comprehensive security scanning, regardless of the choice of technology 2. False-Positive Free This means that user do not need a PHD in security testing to verify any vulnerabilities that it finds. 3. Build-in Exploitation Engine To positively confirm vulnerabilities, hence user is free to spend time eliminating threats, not proving them. 4. Post Exploitation Feature Takes automated exploitation to the next level, revealing additional insight into the security infrastructure 5. Integrated Exploitation Feature Can manually exploit identified vulnerabilities directly from within Netsparker, Able to see the real impact of an attack just by clicking a button.

Product Overview & Features Netsparkeer Web App Netsparker now uses a built-in HTTP macro recorder to faithfully capture every step of even the most complex login sequence. And, for sign-on sequences that require some special runtime action, like CAPTCHA input or the assignment of dynamic token values, we ve added a user scripting interface that promises a solution to even the most complex challenge. Whilst developing our scripting support for authentication, we realized that there are many other aspects of Netsparker s operation that could also benefit from userdefined customization. So, we implemented extensibility in the most open and flexible way possible, enabling Netsparker to expose a scriptable interface to virtually any aspect of the scanning process. Netsparker now provides detailed real-time feedback about the scan in progress and even lets you modify its runtime settings in mid-session. The scan summary dashboard provides at-a-glance information about the active scan session, including a graphical summary of the detected issues and details of the current action in progress on each of Netsparker s active threads. During a scan, you may also modify key scan session settings, including the number of concurrent HTTP connections, the selection of security tests that will be used for attacking and the use of custom request cookies. Changes entered via the dashboard take effect immediately

Product Overview & Features Acunetix Web Vunerability Scanner Netsparker s report template suite has been extended to include a powerful new analysis capability: comparison reporting. This allows the current scan session to be compared against one or more historic scan sessions, enabling a graphical summary of the evolution of an application s security status. It also includes a detailed vulnerability list, showing how the status of individual issues has progressed over time. Expression Language Injection MyFaces Stack Trace Disclosure. Mongrel Server Version Disclosure. Password over GET. WebLogic Detection. Elmah.axd Detection. OpenSSL vulnerabilities. PHP vulnerabilities. Netsparker now attacks more injection points, such as HTTP headers, paths and unusual injection points in the URL. This was previously available only for Cross-site Scripting Security Tests. Now coverage has been increased and new injection points added for all required security tests. Boolean SQL Injection performance improved by decreasing the number of required requests. More edge cases for MySQL in Boolean SQL Injections is now covered. HTTP Header Injection checks improved, now bypasses more blacklists. Local File Inclusion (LFI) checks improved for FreeBSD / OSX systems. Added new checks for MySQL Error Based SQL Injections. Extra blacklist bypass checks added to Frame Injection / Open Redirection checks. Windows Internal Path Leakage checks improved. LFI engine improved to cover more edge cases. Protocol based XSS attacks significantly improved.

Product Overview & Features Acunetix Web Vunerability Scanner Improved Search: The search feature in Netsparker s HTTP response pane now includes a preemptive look-up feature (incremental search), enabling search results to be highlighted as you type. Improved Encoding Panel: Netsparker s built-in encoding tool has been revamped, enhancing its usability with a new intuitive layout and the addition of buttons for quick copy / paste operations. Netsparker s runtime data files are now stored in a more structured directory tree within the user s Documents directory, enabling easier access to user-customizable files and more coherent storage of scan results. Netsparker now stores its scan session data in a single compact file, enabling it to be safely archived and allowing scan results to be easily passed between coworkers. Netsparker s application settings dialog now allows the definition of custom rules for applying arbitrary values to form parameters or excluding specific named HTTP parameters from being attacked. For maximum flexibility, parameters may be identified using Regex / wildcard patterns and ignored parameters may be applied selectively, according to the HTTP request method.

Technical Details Maintenance and Support E-SPIN Local Vendor Support offers 24x7 support for end customer. This package includes unlimited phone calls, emails, remote assistance, and SMS. In addition to that, it has on-site coverage for end customer as well(up to 6 times per subscription year) Training E-SPIN training in an important element to equipped users with the relevant product knowledge and technical know how. Therefore E-SPIN offers customized training up to 5 Man Days course, catered for 5 pax. For more information regarding the training, please refer to the training handout attached.