Pentests more than just using the proper tools



Similar documents
Pentests more than just using the proper tools

Overview of the Penetration Test Implementation and Service. Peter Kanters

The purpose of this report is to educate our prospective clients about capabilities of Hackers Locked.

Adobe Systems Incorporated

ArcGIS Server Security Threats & Best Practices David Cordes Michael Young

ETHICAL HACKING APPLICATIO WIRELESS110 00NETWORK APPLICATION MOBILE MOBILE0001

Web Application Penetration Testing

Where every interaction matters.

Magento Security and Vulnerabilities. Roman Stepanov

Penetration Testing in Romania

OWASP Top Ten Tools and Tactics

The Top Web Application Attacks: Are you vulnerable?

Security Testing. Vulnerability Assessment vs Penetration Testing. Gabriel Mihai Tanase, Director KPMG Romania. 29 October 2014

Penta Security 3rd Generation Web Application Firewall No Signature Required.

How to break in. Tecniche avanzate di pen testing in ambito Web Application, Internal Network and Social Engineering

Securing Your Web Application against security vulnerabilities. Ong Khai Wei, IT Specialist, Development Tools (Rational) IBM Software Group

Out of the Fire - Adding Layers of Protection When Deploying Oracle EBS to the Internet

Web Application Report

Cloud Security:Threats & Mitgations

WEB SECURITY CONCERNS THAT WEB VULNERABILITY SCANNING CAN IDENTIFY

Reducing Application Vulnerabilities by Security Engineering

05.0 Application Development

ISSECO Syllabus Public Version v1.0

Integrated Network Vulnerability Scanning & Penetration Testing SAINTcorporation.com

WEB APPLICATION VULNERABILITY STATISTICS (2013)

Web Application security testing: who tests the test?

Development Processes (Lecture outline)

Detecting Web Application Vulnerabilities Using Open Source Means. OWASP 3rd Free / Libre / Open Source Software (FLOSS) Conference 27/5/2008

Cracking the Perimeter via Web Application Hacking. Zach Grace, CISSP, CEH January 17, Mega Conference

Web Application Security

Web Application Vulnerability Testing with Nessus

Integrating Security into the Application Development Process. Jerod Brennen, CISSP CTO & Principal Security Consultant, Jacadis

KASPERSKY SECURITY INTELLIGENCE SERVICES. EXPERT SERVICES.

Web App Security Audit Services

WHITE PAPER. FortiWeb and the OWASP Top 10 Mitigating the most dangerous application security threats

How to start a software security initiative within your organization: a maturity based and metrics driven approach OWASP

Intrusion detection for web applications

Introduction to Web Application Security. Microsoft CSO Roundtable Houston, TX. September 13 th, 2006

Penetration Testing Guidelines For the Financial Industry in Singapore. 31 July 2015

Web Application Security. Vulnerabilities, Weakness and Countermeasures. Massimo Cotelli CISSP. Secure

Attack Vector Detail Report Atlassian

SAST, DAST and Vulnerability Assessments, = 4

White Paper. Guide to PCI Application Security Compliance for Merchants and Service Providers

Testing the OWASP Top 10 Security Issues

OWASP TOP 10 ILIA

Contemporary Web Application Attacks. Ivan Pang Senior Consultant Edvance Limited

How To Fix A Web Application Security Vulnerability

Threat Modeling. Categorizing the nature and severity of system vulnerabilities. John B. Dickson, CISSP

Criteria for web application security check. Version

Hardening Moodle. Concept and Realization of a Security Component in Moodle. a project by

WEB Penetration Testing

SECURITY ADVISORY. December 2008 Barracuda Load Balancer admin login Cross-site Scripting

SQuAD: Application Security Testing

MANAGED SECURITY TESTING

Strategic Information Security. Attacking and Defending Web Services

Finding and Preventing Cross- Site Request Forgery. Tom Gallagher Security Test Lead, Microsoft

Using Free Tools To Test Web Application Security

Rational AppScan & Ounce Products

Development. Resilient Software. Secure and. Mark S. Merkow Lakshmikanth Raghavan. CRC Press. Taylor& Francis Croup. Taylor St Francis Group,

Model-Based Vulnerability Testing for Web Applications

Conducting Web Application Pentests. From Scoping to Report For Education Purposes Only

National Endowment for the Arts Evaluation Report. Table of Contents. Results of Evaluation Areas for Improvement Exit Conference...

Is Drupal secure? A high-level perspective on web vulnerabilities, Drupal s solutions, and how to maintain site security

Introduction to Penetration Testing Graham Weston

Web application testing

SWAT PRODUCT BROCHURE

FINAL DoIT v.4 PAYMENT CARD INDUSTRY DATA SECURITY STANDARDS APPLICATION DEVELOPMENT AND MAINTENANCE PROCEDURES

Essential IT Security Testing

(WAPT) Web Application Penetration Testing

Information Security Office

elearning for Secure Application Development

Data Breaches and Web Servers: The Giant Sucking Sound

DISA's Application Security and Development STIG: How OWASP Can Help You. AppSec DC November 12, The OWASP Foundation

HTExploit: Bypassing htaccess Restrictions

METHODS TO TEST WEB APPLICATION SCANNERS

Enterprise Application Security Program

Demystifying Penetration Testing for the Enterprise. Presented by Pravesh Gaonjur

How To Write A Web Application Vulnerability Scanner And Security Auditor

Web Application Report

VIDEO intypedia007en LESSON 7: WEB APPLICATION SECURITY - INTRODUCTION TO SQL INJECTION TECHNIQUES. AUTHOR: Chema Alonso

Security Testing and Vulnerability Management Process. e-governance

Web Application Security

How to complete the Secure Internet Site Declaration (SISD) form

Web Vulnerability Assessment Report

Executive Summary On IronWASP

Guidelines for Web applications protection with dedicated Web Application Firewall

TECHNICAL AUDITS FOR CERTIFYING EUROPEAN CITIZEN COLLECTION SYSTEMS

How To Understand And Understand The Security Of A Web Browser (For Web Users)

Trustwave MANAGED SECURITY TESTING

How To Ensure That Your Computer System Is Safe

Integrating Security Testing into Quality Control

WEB SITE SECURITY. Jeff Aliber Verizon Digital Media Services

CORE Security and the Payment Card Industry Data Security Standard (PCI DSS)

Transcription:

Pentests more than just using the proper tools

Agenda 1. Information Security @ TÜV Rheinland 2. Penetration testing Introduction Evaluation scheme Security Analyses of web applications Internal Security Analyses (optional) 2/3/2015 Pentests more than just using the proper tools

Information security @TÜV Rheinland. Providing information security services worldwide (Europe, North America, Asia, Middle East) Germany s leading vendor independent service provider for information security Köln Frankfurt Over 500 security experts worldwide 150 in Germany and growing Saarbrücken For the 7 th time: München

What about you? Economical vs. technical studies? Basic knowledge of web applications (HTML, Script languages, SQL)? Knowledge of penetration testing? What does OWASP stand for? Any questions so far?

Agenda 1. Information Security @ TÜV Rheinland 2. Penetration testing Introduction Evaluation scheme Security Analyses of web applications Internal Security Analyses (optional) 2/3/2015 Pentests more than just using the proper tools

Penetration Tests. Definition. Variations. Goals. Definition an attack on a computer system with the intention of finding security weaknesses, potentially gaining access to it, its functionality and data. (Wikipedia) Goals Detection of security vulnerabilites Demonstrate vulnerability of systems Identify the potential damage caused by real attacks Increase overall security level Variations Black Box White Box any other color in between Vulnerability scans

Penetration Tests. Targets. Evaluation Targets Applications Web Client-Server Mainframe Mobile Infrastructure Server DMZ Intranet Special purpose hardware

Penetration Tests. Pros and Cons. Pros + Verification of the security of complex systems including multiple security layers + Dynamical testing including tester s creativity, e.g. combination of low impact vulnerabilities + Using up-to-date attack vectors + Verify attack detection Cons Security Snap-shot - Results valid for a limited time Quality of results depend upon tester s quality Very high complexity of finding previously unknown vulnerabilities Penetration testing is one important mechanism for security quality assurance

Penetration Test. Workflow. 1. Kick-Off / Preparation 2. Information gathering and -analysis (manually and automated) Online search engines Scanning Tools (port-, vulnerability-scanner, etc.) 3. Information evaluation / risk analysis Based on results of phase 1 and information of phase 2 Identification of vulnerabilities 4. Active Intrusion Exploitation of vulnerabilities (mostly manually) Use of exploit code 5. Finalization Result evaluation Report generation

Agenda 1. Information Security @ TÜV Rheinland 2. Penetration testing Introduction Evaluation scheme Security Analyses of web applications Internal Security Analyses (optional) 2/3/2015 Pentests more than just using the proper tools

DREAD Risk assessment model DREAD risk evaluation model Damage - how bad would an attack be? Reproducibility - how easy is it to reproduce the attack? Exploitability - how much work is it to launch the attack? Affected users - how many people will be impacted? Discoverability - how easy is it to discover the threat?

Common Vulnerability Scoring System (CVSS) Common Vulnerability Scoring System (CVSS) Common standard Description of vulnerability s severity Evaluation based on Metrics Base (Access Vector, Access Complexity, Authentication, Confidentiality, Integrity, Availability) Environmental (Confidentiality Requirement, Integrity Requirement, Availability Requirement, Collateral Damage Potential, Target Distribution) Temporal (Exploitability, Remediation Level, Report Confidence) Allows to compare vulnerabilities CVSS-calculator: http://nvd.nist.gov/cvss.cfm?calculator&version=2

Common Vulnerability Scoring System (CVSS)

TÜV Rheinland evaluation and risk classification. Risk classification is performed from an IT security perspective in relation to infrastructure, systems, services and processes in the area of observation Risk Rating for the business processes is done by the internal risk management of our customer. Recommendation Low Risk Medium Risk High Risk Suggestions to improve the overall security situation, though a concrete threat is not present. Includes i.e. out-of-scope-observations. The implemented security mechanisms to ensure confidentiality and integrity of sensible data availability of necessary systems has a minor deficit. The implemented security mechanisms to ensure confidentiality and integrity of sensible data availability of necessary systems has a deficit. The implemented security mechanisms to ensure confidentiality and integrity of sensible data availability of necessary systems has a severe deficit.

Agenda 1. Information Security @ TÜV Rheinland 2. Penetration testing Introduction Evaluation scheme Security Analyses of web applications Internal Security Analyses (optional) 2/3/2015 Pentests more than just using the proper tools

Open Web Application Security Project (OWASP) Top 10 1. Injection 2. Cross Site Scripting 3. Broken Authentication and Session Management 4. Insecure Direct Object References 5. Cross Site Request Forgery 6. Security Misconfiguration 7. Insecure Cryptographic Storage 8. Failure to Restrict URL Access 9. Insufficient Transport Layer Protection 10. Unvalidated Redirects and Forwards

Top 1. Injection. 1. Injection 2. Cross Site Scripting 3. Broken Authentication and Session Management 4. Insecure Direct Object References 5. Cross Site Request Forgery 6. Security Misconfiguration 7. Insecure Cryptographic Storage 8. Failure to Restrict URL Access 9. Insufficient Transport Layer Protection 10. Unvalidated Redirects and Forwards

Injections. Basics. Fundamental Trouble Input is not completely validated Data provided by the user is interpreted: Data base (SQL-Injection) Operation system calls (Command Injection) XML-Tags and Entities (XML Injection) Scriptcode (i.e. Ruby, PHP) gets executed (Code-Injection)

SQL-Injection. Description. Issue Data provided by the user is not validated completely User can execute SQL queries Consequences An Attacker can execute almost arbitrary SQL queries Login without password Attacker can extract data from the database

SQL-Injection. Demo.

Thank you for your attention and questions! Dr. Daniel Hamburg Head of Security Engineering T: +49 221 56783 220 E-Mail: daniel.hamburg@i-sec.tuv.com