Web Applications The Hacker s New Target



Similar documents
Rational AppScan & Ounce Products

New IBM Security Scanning Software Protects Businesses From Hackers

The Top Web Application Attacks: Are you vulnerable?

Securing Your Web Application against security vulnerabilities. Ong Khai Wei, IT Specialist, Development Tools (Rational) IBM Software Group

WEB APPLICATION SECURITY

National Information Security Group The Top Web Application Hack Attacks. Danny Allan Director, Security Research

Attacks from the Inside

Database Auditing & Security. Brian Flasck - IBM Louise Joosse - BPSolutions

Web Application Report

Penetration Testing Service. By Comsec Information Security Consulting

Application Security Testing

Why Web Applications are making a hackers life easy. Presented by Jon Grew BT SBS

The McAfee SECURE TM Standard

Mingyu Web Application Firewall (DAS- WAF) All transparent deployment for Web application gateway

Information Technology Policy

MatriXay WEB Application Vulnerability Scanner V Overview. (DAS- WEBScan ) The best WEB application assessment tool

Web Application Penetration Testing

Web App Security Audit Services

A Network Administrator s Guide to Web App Security

Web Application Threats and Vulnerabilities Web Server Hacking and Web Application Vulnerability

Bank Hacking Live! Ofer Maor CTO, Hacktics Ltd. ATC-4, 12 Jun 2006, 4:30PM

CYBERTRON NETWORK SOLUTIONS

Ethical Hacking Course Layout

PTSv2 in pills: The Best First for Beginners who want to become Penetration Testers. Self-paced, online, flexible access

Web Application Security. Radovan Gibala Senior Field Systems Engineer F5 Networks

If you know the enemy and know yourself, you need not fear the result of a hundred battles.

RMAR Technologies Pvt. Ltd.

Certified Ethical Hacker Exam Version Comparison. Version Comparison

CEH Version8 Course Outline

WEB SECURITY. Oriana Kondakciu Software Engineering 4C03 Project

ITEC441- IS Security. Chapter 15 Performing a Penetration Test

Barracuda Web Site Firewall Ensures PCI DSS Compliance

The Weakest Link: Mitigating Web Application Vulnerabilities. webscurity White Paper. webscurity Inc. Minneapolis, Minnesota USA

Course Content: Session 1. Ethics & Hacking

THE SMARTEST WAY TO PROTECT WEBSITES AND WEB APPS FROM ATTACKS

Web Application Security

Keyword: Cloud computing, service model, deployment model, network layer security.

FortiWeb 5.0, Web Application Firewall Course #251

A Systems Engineering Approach to Developing Cyber Security Professionals

Passing PCI Compliance How to Address the Application Security Mandates

COURSE NAME: INFORMATION SECURITY INTERNSHIP PROGRAM

CSUSB Web Application Security Standard CSUSB, Information Security & Emerging Technologies Office

Basic & Advanced Administration for Citrix NetScaler 9.2

STOPPING LAYER 7 ATTACKS with F5 ASM. Sven Müller Security Solution Architect

Top Ten Web Attacks. Saumil Shah Net-Square. BlackHat Asia 2002, Singapore

Reducing Application Vulnerabilities by Security Engineering

Advanced Administration for Citrix NetScaler 9.0 Platinum Edition

When a student leaves this intensive 5 day class they will have hands on understanding and experience in Ethical Hacking.

[CEH]: Ethical Hacking and Countermeasures

Using Free Tools To Test Web Application Security

Web application security Executive brief Managing a growing threat: an executive s guide to Web application security.

CRYPTUS DIPLOMA IN IT SECURITY

Application Security: What Does it Take to Build and Test a Trusted App? John Dickson, CISSP Denim Group

Web application security: automated scanning versus manual penetration testing.

The purpose of this report is to educate our prospective clients about capabilities of Hackers Locked.

Certified Ethical Hacker (CEH)

SERENA SOFTWARE Serena Service Manager Security

WHITE PAPER. FortiWeb and the OWASP Top 10 Mitigating the most dangerous application security threats

How to Build a Trusted Application. John Dickson, CISSP

Learn Ethical Hacking, Become a Pentester

Web Application Attacks and Countermeasures: Case Studies from Financial Systems

F5 ASM i DB Monitoring w ofercie NASK

How Your Current IT Security System Might Be Leaving You Exposed TAKEAWAYS CHALLENGES WHITE PAPER

Chapter 4 Application, Data and Host Security

What is Penetration Testing?

Complete Web Application Security. Phase1-Building Web Application Security into Your Development Process

Secure Web Applications. The front line defense

Black Box Penetration Testing For GPEN.KM V1.0 Month dd "#$!%&'(#)*)&'+!,!-./0!.-12!1.03!0045!.567!5895!.467!:;83!-/;0!383;!

Detailed Description about course module wise:

Secure Web Application Coding Team Introductory Meeting December 1, :00 2:00PM Bits & Pieces Room, Sansom West Room 306 Agenda

STATE OF WASHINGTON DEPARTMENT OF SOCIAL AND HEALTH SERVICES P.O. Box 45810, Olympia, Washington October 21, 2013

Application Code Development Standards

Client logo placeholder XXX REPORT. Page 1 of 37

KEN VAN WYK. Fundamentals of Secure Coding and how to break Software MARCH 19-23, 2007 RESIDENZA DI RIPETTA - VIA DI RIPETTA, 231 ROME (ITALY)

Recon and Mapping Tools and Exploitation Tools in SamuraiWTF Report section Nick Robbins

OWASP and OWASP Top 10 (2007 Update) OWASP. The OWASP Foundation. Dave Wichers. The OWASP Foundation. OWASP Conferences Chair

MANAGED SECURITY TESTING

FORBIDDEN - Ethical Hacking Workshop Duration

Creating Stronger, Safer, Web Facing Code. JPL IT Security Mary Rivera June 17, 2011

CORE IMPACT AND THE CONSENSUS AUDIT GUIDELINES (CAG)

Hack Proof Your Webapps

Implementing Database Security and Auditing

What s Wrong with Information Security Today? You are looking in the wrong places for the wrong things.

ETHICAL HACKING APPLICATIO WIRELESS110 00NETWORK APPLICATION MOBILE MOBILE0001

WEB APPLICATION FIREWALLS: DO WE NEED THEM?

Venue. Dates. Certified Ethical Hacker (CEH) boot camp. Inovatec College. Nairobi Kenya (exact hotel name to be confirmed

Transcription:

Web Applications The Hacker s New Target Ross Tang IBM Rational Software An IBM Proof of Technology Hacking 102: Integrating Web Application Security Testing into Development 1

Are you phished? http://www.myfoxny.com/dpp/your_money/consumer/090304_facebook_security_breaches 2

Facebook Worm 3

Hacking 102: Integrating Web Application Security Testing into Development 4

Hacking 102: Integrating Web Application Security Testing into Development 5

http://www.marketwatch.com/investing/stock/stan?countrycode=uk 6

http://www.marketwatch.com/tools/quotes/lookup.asp?lookup=_funny_behaviour_&country=us 7

http://www.marketwatch.com/investing/stock/uk:stan?countrycode= UK 8

Hacking 102: Integrating Web Application Security Testing into Development 9

The Myth: Our Site Is Safe Security We Have Firewalls in Place Port 80 & 443 are open for the right reasons We Audit It Once a Quarter with Pen Testers Applications are constantly changing We Use Network Vulnerability Scanners Neglect the security of the software on the network/web server We Use SSL Encryption Only protects data between site and user not the web application itself 10

The WEAKEST Link: Web Application last layer of defense Desktop Firewall IDS/IPS Web Applications Cross Site Scripting DoS Antispoofing Web Server Known Vulnerabilities Parameter Tampering Port Scanning Patternbased Attack Cookie Poisoning SQL Injection Manual Patching and Code Review 11

The Reality: Security and Spending Are Unbalanced Security Spending Buffer Overflow Cookie Poisoning Hidden Fields Cross Site Scripting Stealth Commanding Parameter Tampering Forceful Browsing SQL Injection Etc % of Attacks % of Dollars 75% 25% Web Applications Network Server 10% 90% 75% 2/3 of All Attacks on Information Security Are Directed to the Web Application Layer of All Web Applications Are Vulnerable Sources: Gartner, Watchfire 12

Black-box (Discovering SQL Injection) ****** SELECT * from tusers where userid= AND password= foobar 13

Example : Cross Site Scripting The Exploit Process Evil.org 1) Link to bank.com sent to user via E-mail or HTTP User 4) Script sends user s cookie and session information without the user s consent or knowledge 5) Evil.org uses stolen session information to impersonate user 2) User sends script embedded as data 3) Script/data returned, executed by browser bank.com 14

IBM Rational AppScan End-to-End Application Security REQUIREMENTS CODE BUILD QA SECURITY PRODUCTION Security Requirements Definition AppScan Source AppScan Tester AppScan Standard AppScan ondemand (SaaS) AppScan Enterprise / Reporting Console (enterprise-wide scanning and reporting) Security requirements defined before design & implementation Build security testing into the IDE Automate Security / Compliance testing in the Build Process Security / compliance testing incorporated into testing & remediation workflows Security & Compliance Testing, oversight, control, policy, audits Outsourced testing for security audits & production site monitoring Application Security Best Practices

How Internet Banking is secure Hacking 102: Integrating Web Application Security Testing into Development 16

Nearly 1000 Companies Depend On Watchfire 9 of the Top 10 8 of the Top 10 Largest U.S. Retail Technology Banks Brands 7 of the Top 10 Pharma / Clinical Companies Multiple Large Government Agencies Veteran s Affairs Army Navy Air Force Marines Large, Complex Web Sites Highly Regulated High User Volume Extensive Customer Data 17

Security Industry Leaders Use and/or work with Watchfire solutions in their work Technology Companies Consultants and Researchers More EDS 18

Trojan Software cost $99 Constructor/Turko jan V.4 New features Remote Desktop Webcam Streaming Audio Streaming Remote passwords MSN Sniffer Remote Shell Advanced File Manager Online & Offline keylogger Information about remote computer Etc..