Web Application Attacks And WAF Evasion



Similar documents
Magento Security and Vulnerabilities. Roman Stepanov

Where every interaction matters.

External Vulnerability Assessment. -Technical Summary- ABC ORGANIZATION

(WAPT) Web Application Penetration Testing

Web Application Firewalls Evaluation and Analysis. University of Amsterdam System & Network Engineering MSc

How to break in. Tecniche avanzate di pen testing in ambito Web Application, Internal Network and Social Engineering

ASL IT SECURITY BEGINNERS WEB HACKING AND EXPLOITATION

FINAL DoIT v.4 PAYMENT CARD INDUSTRY DATA SECURITY STANDARDS APPLICATION DEVELOPMENT AND MAINTENANCE PROCEDURES

Web applications. Web security: web basics. HTTP requests. URLs. GET request. Myrto Arapinis School of Informatics University of Edinburgh

Playing with Web Application Firewalls

ArcGIS Server Security Threats & Best Practices David Cordes Michael Young

Essential IT Security Testing

Cracking the Perimeter via Web Application Hacking. Zach Grace, CISSP, CEH January 17, Mega Conference

How To Fix A Web Application Security Vulnerability

Guidelines for Web applications protection with dedicated Web Application Firewall

OWASP TOP 10 ILIA

Implementation of Web Application Firewall

Intrusion detection for web applications

Conducting Web Application Pentests. From Scoping to Report For Education Purposes Only

Web Application Vulnerability Testing with Nessus

Secure Web Application Coding Team Introductory Meeting December 1, :00 2:00PM Bits & Pieces Room, Sansom West Room 306 Agenda

Using Free Tools To Test Web Application Security

Web Application Hacking (Penetration Testing) 5-day Hands-On Course

Executive Summary On IronWASP

Attack and Penetration Testing 101

ASL IT Security Advanced Web Exploitation Kung Fu V2.0

Adobe Systems Incorporated

Vulnerability Assessment and Penetration Testing

What is Web Security? Motivation

Detecting Web Application Vulnerabilities Using Open Source Means. OWASP 3rd Free / Libre / Open Source Software (FLOSS) Conference 27/5/2008

Testing Web Applications for SQL Injection Sam Shober

Webapps Vulnerability Report

Acunetix Website Audit. 5 November, Developer Report. Generated by Acunetix WVS Reporter (v8.0 Build )

EC-Council CAST CENTER FOR ADVANCED SECURITY TRAINING. CAST 619 Advanced SQLi Attacks and Countermeasures. Make The Difference CAST.

Using Nessus In Web Application Vulnerability Assessments

Check list for web developers

Cyber Security Challenge Australia 2014

Creating Stronger, Safer, Web Facing Code. JPL IT Security Mary Rivera June 17, 2011

Criteria for web application security check. Version

Detecting and Exploiting XSS with Xenotix XSS Exploit Framework

Web Application Firewall Bypassing

External Network & Web Application Assessment. For The XXX Group LLC October 2012

Web Application Security

CS 558 Internet Systems and Technologies

EVALUATING COMMERCIAL WEB APPLICATION SECURITY. By Aaron Parke

Secure development and the SDLC. Presented By Jerry

OWASP and OWASP Top 10 (2007 Update) OWASP. The OWASP Foundation. Dave Wichers. The OWASP Foundation. OWASP Conferences Chair

WEB SECURITY CONCERNS THAT WEB VULNERABILITY SCANNING CAN IDENTIFY

Nuclear Regulatory Commission Computer Security Office Computer Security Standard

Thick Client Application Security

Chapter 1 Web Application (In)security 1

1. Building Testing Environment

Web Application Report

3. Broken Account and Session Management. 4. Cross-Site Scripting (XSS) Flaws. Web browsers execute code sent from websites. Account Management

Out of the Fire - Adding Layers of Protection When Deploying Oracle EBS to the Internet

Web Application Penetration Testing

How to hack a website with Metasploit

Web Application Security. Vulnerabilities, Weakness and Countermeasures. Massimo Cotelli CISSP. Secure

Web Vulnerability Assessment Report

Web Application Security Assessment and Vulnerability Mitigation Tests

Attack Vector Detail Report Atlassian

VIDEO intypedia007en LESSON 7: WEB APPLICATION SECURITY - INTRODUCTION TO SQL INJECTION TECHNIQUES. AUTHOR: Chema Alonso

Penta Security 3rd Generation Web Application Firewall No Signature Required.

The purpose of this report is to educate our prospective clients about capabilities of Hackers Locked.

The Top Web Application Attacks: Are you vulnerable?

Web Application Attacks and Countermeasures: Case Studies from Financial Systems

Hacking de aplicaciones Web

How to complete the Secure Internet Site Declaration (SISD) form

JOOMLA SECURITY. ireland website design. by Oliver Hummel. ADDRESS Unit 12D, Six Cross Roads Business Park, Waterford City

Penetration Testing with Kali Linux

WHITE PAPER. FortiWeb and the OWASP Top 10 Mitigating the most dangerous application security threats

Sitefinity Security and Best Practices

Web Application Security

Web Application Security

Web Application Guidelines

Introduction:... 1 Security in SDLC:... 2 Penetration Testing Methodology: Case Study... 3

Protection, Usability and Improvements in Reflected XSS Filters

Vulnerability Scans Remote Support 15.1

Revisiting SQL Injection Will we ever get it right? Michael Sutton, Security Evangelist

Six Essential Elements of Web Application Security. Cost Effective Strategies for Defending Your Business

Is Drupal secure? A high-level perspective on web vulnerabilities, Drupal s solutions, and how to maintain site security

FortiWeb 5.0, Web Application Firewall Course #251

Pentests more than just using the proper tools

MatriXay WEB Application Vulnerability Scanner V Overview. (DAS- WEBScan ) The best WEB application assessment tool

Practical Identification of SQL Injection Vulnerabilities

How To Understand And Understand The Security Of A Web Browser (For Web Users)

Web Application Report

ABC LTD EXTERNAL WEBSITE AND INFRASTRUCTURE IT HEALTH CHECK (ITHC) / PENETRATION TEST

CSE598i - Web 2.0 Security OWASP Top 10: The Ten Most Critical Web Application Security Vulnerabilities

Web Application Threats and Vulnerabilities Web Server Hacking and Web Application Vulnerability

Data Breaches and Web Servers: The Giant Sucking Sound

State of The Art: Automated Black Box Web Application Vulnerability Testing. Jason Bau, Elie Bursztein, Divij Gupta, John Mitchell

HTTPParameter Pollution. ChrysostomosDaniel

Sichere Software- Entwicklung für Java Entwickler

CTF Web Security Training. Engin Kirda

1. Introduction. 2. Web Application. 3. Components. 4. Common Vulnerabilities. 5. Improving security in Web applications

Top 10 Web Application Security Vulnerabilities - with focus on PHP

Transcription:

Web Application Attacks And WAF Evasion Ahmed ALaa (EG-CERT) 19 March 2013

What Are We Going To Talk About? - introduction to web attacks - OWASP organization - OWASP frameworks - Crawling & info. gathering - Vulnerability Assesment - WAF Evading

Introduction To Web Application Attacks

Server Side Attacks

OWASP The Open Web Application Security Project

OWASP Oraganization The Open Web Application Security Project (OWASP) is a worldwide not-for-profit charitable organization focused on improving the security of software. Our mission is to make software security visible, so that individuals and organizations worldwide can make informed decisions about true software security risks.

OWASP Frameworks it s a vulnerable open source framework for testing vulnerabilites and educational purpose with many level of security to be test. - DVWA (Damn Vulnerable Web Application) - Mutillidae - Web Goat

OWASP Top 10 Web App. Vuln. 2013 1. Injection 2. Broken Authentication and Session Management 3. Cross Site Scripting (XSS) 4. Insecure Direct Object References 5. Security Misconfiguration 6. Sensitive Data Expouse 7. Missing Function Level Access Control 8. Cross Site Request Forgery (CSRF) 9. Using Known Vulnerable Components 10. Unvalidated Redirects and Forwards

Web Attacks Methods

Info Gathering Via Firefox Addons Wappalyzer: a browser extension that uncovers the technologies used on websites. It detects content management systems, web shops, web servers, JavaScript frameworks, analytics tools and many more. Domain Details : Displays Server Type, Headers, IP Address, Location Flag, and links to Whois Reports. Shows links to check server status and cache when page fails to load.

Web Crawling By Burpsuite

Directory Enumeration By DirBuster

Brute Forcing Basic Authentication & Forms Via Firefox Addon Firefoce

Local File Inclusion (DVWA)

PHP Wrappers A wrapper is additional code which tells the stream how to handle specific protocols/encodings. For example, the http wrapper knows how to translate a URL into an HTTP/1.0 request for a file on a remote server. There are many wrappers built into PHP by default Php://filter/convert.base64-encode/resource=include.php Data://text/plain;base64,SSBsb3ZlIFBIUAo= Php://input

SQL Injection Attacks A poorly validated input field in a Web input form may allow an attacker to insert additional SQL instructions which may then be passed directly into the backend database. Attacker sends simple text-based attacks that exploit the syntax of The target interpreter.

SQL Injection Authintication Bypass

SQL Injection Authintication Bypass Due to no input validation in the code then we can inject our query to gain admin authentication. admin -- - admin and 1=1 -- - admin or 1 = 1 admin or 1=1 Limit 0,1 # or 1=1 -- - or 1=1 Limit 0,1 /* AND 1=0 UNION ALL SELECT 1,2,3 -- -

SQL Injection Types - Union Based injection - Blind Based injection - Time Based injection - Error Based injection - Blind Time Based injection

Detecting SQL Injection Vulnerability MySQL Error Warning: mysql_fetch_array(): supplied argument is not a valid MySQL result resource in /var/www/myawesomestore.com/buystuff.php on line 12 Error: You have an error in your SQL syntax: check the manual that corresponds to your MySQL server version for the right syntax to use near at line 12 MSSQL Error Server Error in / Application. Unclosed quotation mark before the character string ;. Description: An unhanded exception occurred during the execution of the current web request. Please review the stack trace for more information about the error where it originated in the code. Exception Details: System.Data.SqlClient.SqlException: Unclosed quotation mark before the character string ;.

SQL Injection Exploitation (prepare your lab) - Order By Clause - Union Statement - user(), DataBase(), Version() - Information_schema - Data Base Structure - Substring & ascii

WAF Evasion (Web Application Firewall) Web application firewalls are designed to protect web applications from known attacks, such as SQL injection attacks, that are commonly used to compromise websites. They do this by intercepting requests sent by clients and enforcing strict rules about their formatting and payload. However, there are various methods for sneaking malicious requests that violate these rules past WAFs by modifying certain parts of their headers or the paths of requested URLs. These are known as protocol-level evasion techniques, and WAFs are not properly equipped to deal with them at the moment because the techniques are not very well documented.

WAF Evasion (Web Application Firewall) - Detect WAF systems. - Fingerprint WAF systems. - Generic evasion techniques.

WAF Evasion Techniques SQL comments in parameters to try to defeat some SQL Injection rules. Words in random case to try to defeat some SQL Injection rules. SQL query encoding (for example: hex encoding via database features). URI encoding (for example: Unicode forward slash).

WAF Evasion Techniques (SQL inj.) Comment: /*!*/ /*!order*//**//*!by*/ 1 /*!union*//**//*!select*/ 1,2,3,4,5 Case sensitive /*!order*//**//*!by*/ 1 /*!union*//**//*!select*/ 1,2,3,4,5 Encoding %2F*!uNiOn*%2F%2F**%2F%2F*!sEleCt*%2F%201%2C2%E2%80 table_name=0xhex to bypass forbidden single quote

Questions??!!!

Contact: En_3Laa@live.com Thank you