74
Web Attacks and How to Stop Them John Rogers Senior Application Security Engineer Lincoln Financial Group

Web Attacks and How to Stop Them - NEbraskaCERT · 2010-06-17 · #1 on OWASP Top Ten Attack against the client (initially) ... community focused on improving the security of application

  • Upload
    others

  • View
    0

  • Download
    0

Embed Size (px)

Citation preview

Page 1: Web Attacks and How to Stop Them - NEbraskaCERT · 2010-06-17 · #1 on OWASP Top Ten Attack against the client (initially) ... community focused on improving the security of application

Web Attacks and How to Stop Them

John RogersSenior Application Security EngineerLincoln Financial Group

Page 2: Web Attacks and How to Stop Them - NEbraskaCERT · 2010-06-17 · #1 on OWASP Top Ten Attack against the client (initially) ... community focused on improving the security of application

2 Wednesday, April 14, 2010

Objectives

OverviewThreatsVulnerabilitiesRemediationEducation & Awareness

Invite DiscussionPlease ask questions

Short ones duringLong ones after

Page 3: Web Attacks and How to Stop Them - NEbraskaCERT · 2010-06-17 · #1 on OWASP Top Ten Attack against the client (initially) ... community focused on improving the security of application

3 Wednesday, April 14, 2010

Warning – Get out of Jail card

Always Get Written Permission!

******************** Warning *********************Information, programs, and techniques contained in this presentation should not be used on corporate equipment or systems unless you have explicit written permission of the system owner, your management team and your Information Security department.

There are cases of well intentioned individuals having their employment terminated because they utilized penetration tools or techniques on company hardware or systems without written permission.*********************** Warning *******************

Page 4: Web Attacks and How to Stop Them - NEbraskaCERT · 2010-06-17 · #1 on OWASP Top Ten Attack against the client (initially) ... community focused on improving the security of application

4 Wednesday, April 14, 2010

Introduction

John Rogers (JR)Senior Application Security Engineer

Certified Information Systems Security Professional (CISSP)

InfraGard Nebraska Board Member

Application and User Interface developer

Email: [email protected]

Page 5: Web Attacks and How to Stop Them - NEbraskaCERT · 2010-06-17 · #1 on OWASP Top Ten Attack against the client (initially) ... community focused on improving the security of application

5 Wednesday, April 14, 2010

Outline

Page 6: Web Attacks and How to Stop Them - NEbraskaCERT · 2010-06-17 · #1 on OWASP Top Ten Attack against the client (initially) ... community focused on improving the security of application

6 Wednesday, April 14, 2010

Checkpoint

Page 7: Web Attacks and How to Stop Them - NEbraskaCERT · 2010-06-17 · #1 on OWASP Top Ten Attack against the client (initially) ... community focused on improving the security of application

7 Wednesday, April 14, 2010

Web Application Threats

The Top Cyber Security RisksSANS Report – September 2009http://www.sans.org/top-cyber-security-risks/

>60% of all Internet attacks

>80% of the vulnerabilities being discovered

Cross-Site ScriptingSQL Injection

Page 8: Web Attacks and How to Stop Them - NEbraskaCERT · 2010-06-17 · #1 on OWASP Top Ten Attack against the client (initially) ... community focused on improving the security of application

8 Wednesday, April 14, 2010

Web Application Threats

Immature Security Awareness

In-House Development

Deceptive Simplicity

Rapidly Evolving Threat Profile

Resource and Time Constraints

Overextended Technologies

Page 9: Web Attacks and How to Stop Them - NEbraskaCERT · 2010-06-17 · #1 on OWASP Top Ten Attack against the client (initially) ... community focused on improving the security of application

9 Wednesday, April 14, 2010

Web Application Threats

Users can submit Arbitrary Input!Never, ever, trust the client, no control.

Users can interfere with any piece of data transmitted.

Client side validation is considered a vulnerability.

Don’t Trust Client Demo.

Page 10: Web Attacks and How to Stop Them - NEbraskaCERT · 2010-06-17 · #1 on OWASP Top Ten Attack against the client (initially) ... community focused on improving the security of application

10 Wednesday, April 14, 2010

Web Application Threats

Don’t Trust Client DemoFirefox

Burp SuiteIntegrated platform for analyzing web applications.

Intercepting Proxy, Spider, Decoder, etc.

Combine manual and automated techniques to enumerate, analyze, attack and exploit web applications.

Page 11: Web Attacks and How to Stop Them - NEbraskaCERT · 2010-06-17 · #1 on OWASP Top Ten Attack against the client (initially) ... community focused on improving the security of application

11 Wednesday, April 14, 2010

Web Application Threats

Don’t Trust the Client Demo

Page 12: Web Attacks and How to Stop Them - NEbraskaCERT · 2010-06-17 · #1 on OWASP Top Ten Attack against the client (initially) ... community focused on improving the security of application

12 Wednesday, April 14, 2010

Web Application Threats

Don’t Trust the Client DemoURL: http://demo.testfire.net

Sign InUsername: jsmithPassword: Demo1234

Modify Account DetailsAdd Select element

Page 13: Web Attacks and How to Stop Them - NEbraskaCERT · 2010-06-17 · #1 on OWASP Top Ten Attack against the client (initially) ... community focused on improving the security of application

13 Wednesday, April 14, 2010

Web Application Threats

Don’t Trust the Client Demo

Page 14: Web Attacks and How to Stop Them - NEbraskaCERT · 2010-06-17 · #1 on OWASP Top Ten Attack against the client (initially) ... community focused on improving the security of application

14 Wednesday, April 14, 2010

Outline

Page 15: Web Attacks and How to Stop Them - NEbraskaCERT · 2010-06-17 · #1 on OWASP Top Ten Attack against the client (initially) ... community focused on improving the security of application

15 Wednesday, April 14, 2010

Web Application Vulnerabilities

Firewall

Cross-Site Scripting (XSS)

SQL Injection

Malicious File Execution

Top Web Application Attacks 2008/2009

Page 16: Web Attacks and How to Stop Them - NEbraskaCERT · 2010-06-17 · #1 on OWASP Top Ten Attack against the client (initially) ... community focused on improving the security of application

16 Wednesday, April 14, 2010

Web Application Vulnerabilities

FirewallFalse sense of security

Firewall = No Application Security

Port 80/443 are wide open

Firewall only = “Crunchy Outside, Soft Chewy Inside”

Page 17: Web Attacks and How to Stop Them - NEbraskaCERT · 2010-06-17 · #1 on OWASP Top Ten Attack against the client (initially) ... community focused on improving the security of application

17 Wednesday, April 14, 2010

Web Application Vulnerabilities

Cross-Site Scripting (XSS)OWASP Rank/Description

#1 on OWASP Top Ten

Attack against the client (initially)

Application does not first validate data sent from client.

Allows attackers to execute script in the victim's browser.

Page 18: Web Attacks and How to Stop Them - NEbraskaCERT · 2010-06-17 · #1 on OWASP Top Ten Attack against the client (initially) ... community focused on improving the security of application

18 Wednesday, April 14, 2010

Web Application Vulnerabilities

Cross-Site Scripting (XSS)

Page 19: Web Attacks and How to Stop Them - NEbraskaCERT · 2010-06-17 · #1 on OWASP Top Ten Attack against the client (initially) ... community focused on improving the security of application

19 Wednesday, April 14, 2010

Web Application Vulnerabilities

Cross-Site Scripting (XSS)Types

ReflectiveStoredDOM Injection

DemoAltoroMutual Search – Reflective XSSWebGoat XSS Lesson – Stored XSS

Page 20: Web Attacks and How to Stop Them - NEbraskaCERT · 2010-06-17 · #1 on OWASP Top Ten Attack against the client (initially) ... community focused on improving the security of application

20 Wednesday, April 14, 2010

Web Application Vulnerabilities

Cross-Site Scripting (XSS)Demo – AltoroMutual Search – Reflective XSS

http://demo.testfire.net

Unauthenticated vulnerability

Test<script>alert('hi mom');</script><iframe src=http://ha.ckers.org/scriptlet.html <

RSnake XSS Cheatsheethttp://ha.ckers.org/xss.html

Page 21: Web Attacks and How to Stop Them - NEbraskaCERT · 2010-06-17 · #1 on OWASP Top Ten Attack against the client (initially) ... community focused on improving the security of application

21 Wednesday, April 14, 2010

Web Application Vulnerabilities

Cross-Site Scripting (XSS)Demo – AltoroMutual Search – Reflective XSS

Page 22: Web Attacks and How to Stop Them - NEbraskaCERT · 2010-06-17 · #1 on OWASP Top Ten Attack against the client (initially) ... community focused on improving the security of application

22 Wednesday, April 14, 2010

Web Application Vulnerabilities

Cross-Site Scripting (XSS)Demo – WebGoat XSS Lesson – Stored XSS

Start WebGoat – WebGoat 5.3http://127.0.0.1:8080/webgoat/attackuser = guest, password = guestRestart XSS Lesson

Page 23: Web Attacks and How to Stop Them - NEbraskaCERT · 2010-06-17 · #1 on OWASP Top Ten Attack against the client (initially) ... community focused on improving the security of application

23 Wednesday, April 14, 2010

Web Application Vulnerabilities

Cross-Site Scripting (XSS)Demo – WebGoat XSS Lesson – Stored XSS

Page 24: Web Attacks and How to Stop Them - NEbraskaCERT · 2010-06-17 · #1 on OWASP Top Ten Attack against the client (initially) ... community focused on improving the security of application

24 Wednesday, April 14, 2010

Web Application Vulnerabilities

Cross-Site Scripting (XSS)Attack Vectors

Steal CookiesKey LoggingPort Scanning internal networkSteal Clipboard contentsBrowser ExploitsRedirect to other malicious contentAge of JavaScript attacks

JINX – JavaScript Malware FrameworkBrowser Exploitation Framework (BeEF)

Page 25: Web Attacks and How to Stop Them - NEbraskaCERT · 2010-06-17 · #1 on OWASP Top Ten Attack against the client (initially) ... community focused on improving the security of application

25 Wednesday, April 14, 2010

Web Application Vulnerabilities

Cross-Site Scripting (XSS)Defenses – Input Validation

Use Standard input validation mechanism.

Validate all input data for length, type, syntax, and business rules before trusting data.

Worry about non-user entered input data.

Page 26: Web Attacks and How to Stop Them - NEbraskaCERT · 2010-06-17 · #1 on OWASP Top Ten Attack against the client (initially) ... community focused on improving the security of application

26 Wednesday, April 14, 2010

Web Application Vulnerabilities

Cross-Site Scripting (XSS)Defenses – Input Validation.

OWASP Input Validation StrategiesAccept Known Good

Reject Known Bad

Sanitize

No Action – Best way to make the news.

Maybe a combination of first three.

Page 27: Web Attacks and How to Stop Them - NEbraskaCERT · 2010-06-17 · #1 on OWASP Top Ten Attack against the client (initially) ... community focused on improving the security of application

27 Wednesday, April 14, 2010

Web Application Vulnerabilities

Cross-Site Scripting (XSS)Defenses – Output Encoding

Ensure that all user-supplied data is appropriately entity encoded (either HTML or XML depending on the output mechanism) before rendering to client.

“<“ and “>” = “&lt” and “&gt”

Specify the output encoding (such as ISO 8859-1 or UTF 8). Do not allow the attacker to choose this for your users.

Page 28: Web Attacks and How to Stop Them - NEbraskaCERT · 2010-06-17 · #1 on OWASP Top Ten Attack against the client (initially) ... community focused on improving the security of application

28 Wednesday, April 14, 2010

Web Application Vulnerabilities

Cross-Site Scripting (XSS)Defenses – Issues

Use Input Validation and Output Encoding together.

Don’t allow hostile content to live in DB.

Perform Input Validation Close to “Front Door”

Need to handle error processing.

Blend Input Validation StrategiesAccept Known Good for everything but free form text fields. Use Reject Known Bad these fields.

Page 29: Web Attacks and How to Stop Them - NEbraskaCERT · 2010-06-17 · #1 on OWASP Top Ten Attack against the client (initially) ... community focused on improving the security of application

29 Wednesday, April 14, 2010

Web Application Vulnerabilities

SQL InjectionOWASP Rank/Description

#2 OWASP Top Ten

Attack against server

Common vulnerability

Occurs when user-supplied data is sent to an command/query interpreter.

Hostile data tricks the interpreter into executing unintended commands.

Page 30: Web Attacks and How to Stop Them - NEbraskaCERT · 2010-06-17 · #1 on OWASP Top Ten Attack against the client (initially) ... community focused on improving the security of application

30 Wednesday, April 14, 2010

Web Application Vulnerabilities

SQL InjectionDemo – AltoroMutual Authentication Bypass

Bypass AuthenticationSingle Quote Test

Talk directly to InterpreterLots of Information LeakageYum!

Page 31: Web Attacks and How to Stop Them - NEbraskaCERT · 2010-06-17 · #1 on OWASP Top Ten Attack against the client (initially) ... community focused on improving the security of application

31 Wednesday, April 14, 2010

Web Application Vulnerabilities

SQL InjectionDemo – AltoroMutual Authentication Bypass

Information Leakage

Page 32: Web Attacks and How to Stop Them - NEbraskaCERT · 2010-06-17 · #1 on OWASP Top Ten Attack against the client (initially) ... community focused on improving the security of application

32 Wednesday, April 14, 2010

Web Application Vulnerabilities

SQL InjectionDemo – AltoroMutual Authentication Bypass

Bypass AuthenticationExploit Steps

Username: adminPassword: abc’ or 1=1;--Result: Hello Admin User

Page 33: Web Attacks and How to Stop Them - NEbraskaCERT · 2010-06-17 · #1 on OWASP Top Ten Attack against the client (initially) ... community focused on improving the security of application

33 Wednesday, April 14, 2010

Web Application Vulnerabilities

SQL InjectionDemo – AltoroMutual Authentication Bypass

Page 34: Web Attacks and How to Stop Them - NEbraskaCERT · 2010-06-17 · #1 on OWASP Top Ten Attack against the client (initially) ... community focused on improving the security of application

34 Wednesday, April 14, 2010

Web Application Vulnerabilities

SQL InjectionLittle Bobby Tables

Courtesy of XKCD – http://xkcd.com/327/

Page 35: Web Attacks and How to Stop Them - NEbraskaCERT · 2010-06-17 · #1 on OWASP Top Ten Attack against the client (initially) ... community focused on improving the security of application

35 Wednesday, April 14, 2010

Web Application Vulnerabilities

SQL InjectionAttack Vectors

Unauthorized Data AccessUnauthorized Data ModificationDatabase DestructionOS Command Execution

Yee Haw!

Page 36: Web Attacks and How to Stop Them - NEbraskaCERT · 2010-06-17 · #1 on OWASP Top Ten Attack against the client (initially) ... community focused on improving the security of application

36 Wednesday, April 14, 2010

Web Application Vulnerabilities

SQL InjectionDefenses

BestSQL Prepared Statements

Placeholder Substitution MarkersUser Input is Strongly Typed.

Page 37: Web Attacks and How to Stop Them - NEbraskaCERT · 2010-06-17 · #1 on OWASP Top Ten Attack against the client (initially) ... community focused on improving the security of application

37 Wednesday, April 14, 2010

Web Application Vulnerabilities

SQL InjectionDefenses

Next BestEscape Data. If possible, escape data before it is sent to the database query engine.

Escaping is bad for the Irish.O’Malley -> OMalley

Input ValidationSame as Cross-Site Scripting.

Page 38: Web Attacks and How to Stop Them - NEbraskaCERT · 2010-06-17 · #1 on OWASP Top Ten Attack against the client (initially) ... community focused on improving the security of application

38 Wednesday, April 14, 2010

Web Application Vulnerabilities

SQL InjectionDefenses

Enforce least privilege when connecting to databases and other backend systems.

Avoid detailed error messages that are useful to an attacker.

Stored procedures can also be injected.

Page 39: Web Attacks and How to Stop Them - NEbraskaCERT · 2010-06-17 · #1 on OWASP Top Ten Attack against the client (initially) ... community focused on improving the security of application

39 Wednesday, April 14, 2010

Web Application Vulnerabilities

Vulnerabilities – Malicious File Execution

GIFAR – Code Smuggling

Uploaded User Generated Content

Billy Rios/Nathan McFeters at BlackHat

GIF Image file combined with Java Archive file (JAR) = GIFAR

GIF stores ident/control at front of file

JAR (ZIP) stores ident/control at end of file

Page 40: Web Attacks and How to Stop Them - NEbraskaCERT · 2010-06-17 · #1 on OWASP Top Ten Attack against the client (initially) ... community focused on improving the security of application

40 Wednesday, April 14, 2010

Web Application Vulnerabilities

Top Web Application AttacksTop Web Application Attacks 2008/2009

2008http://jeremiahgrossman.blogspot.com/2009/02/top-ten-web-hacking-techniques-of-2008.html

2009http://jeremiahgrossman.blogspot.com/2010/01/top-ten-web-hacking-techniques-of-2009.html

Page 41: Web Attacks and How to Stop Them - NEbraskaCERT · 2010-06-17 · #1 on OWASP Top Ten Attack against the client (initially) ... community focused on improving the security of application

41 Wednesday, April 14, 2010

Checkpoint

Page 42: Web Attacks and How to Stop Them - NEbraskaCERT · 2010-06-17 · #1 on OWASP Top Ten Attack against the client (initially) ... community focused on improving the security of application

42 Wednesday, April 14, 2010

Remediation Techniques

No Silver Bullet

Security & Software Development Lifecycle (SDLC)

Static Source Scanning

Dynamic Scanning

Vulnerability Tracking

Developer Training & Awareness

Infrastructure

Page 43: Web Attacks and How to Stop Them - NEbraskaCERT · 2010-06-17 · #1 on OWASP Top Ten Attack against the client (initially) ... community focused on improving the security of application

43 Wednesday, April 14, 2010

Remediation Techniques

No Silver BulletPlan

ResourcesHardwareSoftwareHuman

Hard WorkYou will see results

Page 44: Web Attacks and How to Stop Them - NEbraskaCERT · 2010-06-17 · #1 on OWASP Top Ten Attack against the client (initially) ... community focused on improving the security of application

44 Wednesday, April 14, 2010

Remediation Techniques

Security & Software Development Lifecycle (SDLC)

Security Tasks in the SDLC

Developer Training for Security Tasks in the SDLC

Less than 10% (empirical evidence)

Page 45: Web Attacks and How to Stop Them - NEbraskaCERT · 2010-06-17 · #1 on OWASP Top Ten Attack against the client (initially) ... community focused on improving the security of application

45 Wednesday, April 14, 2010

Remediation Techniques

SDLC - Security TasksPlanning

Security Task DurationsPlan to address outstanding security issues

RequirementsReference Security PolicyAuthenticationCryptographyProtect Sensitive Data in transitProtect Sensitive Data at rest

Page 46: Web Attacks and How to Stop Them - NEbraskaCERT · 2010-06-17 · #1 on OWASP Top Ten Attack against the client (initially) ... community focused on improving the security of application

46 Wednesday, April 14, 2010

Remediation Techniques

SDLC – Security TasksDesign

Security Reviews Design Documents

DevelopmentStatic Scanning – Developer, Build, Ad-Hoc

QA/UATDynamic Scanning – Manual and Automated

Implementation/Deployment/OperationalSystem Object Security

Page 47: Web Attacks and How to Stop Them - NEbraskaCERT · 2010-06-17 · #1 on OWASP Top Ten Attack against the client (initially) ... community focused on improving the security of application

47 Wednesday, April 14, 2010

Remediation Techniques

Static Source ScanningOverview

Developer vs Build vs Ad Hoc Scans

Issue Management Strategy

Hard part is Enterprise Implementation

Page 48: Web Attacks and How to Stop Them - NEbraskaCERT · 2010-06-17 · #1 on OWASP Top Ten Attack against the client (initially) ... community focused on improving the security of application

48 Wednesday, April 14, 2010

Remediation Techniques

Static Source ScanningIssue Management Strategy

Turn on all checkers

Initial Scan = 50K+ Issues

Fix top Critical and High

Defer all others until next version

No new issues during development

Page 49: Web Attacks and How to Stop Them - NEbraskaCERT · 2010-06-17 · #1 on OWASP Top Ten Attack against the client (initially) ... community focused on improving the security of application

49 Wednesday, April 14, 2010

Remediation Techniques

Static Source ScanningFortify 360 Demo

Page 50: Web Attacks and How to Stop Them - NEbraskaCERT · 2010-06-17 · #1 on OWASP Top Ten Attack against the client (initially) ... community focused on improving the security of application

50 Wednesday, April 14, 2010

Remediation Techniques

Dynamic ScanningManual

Intercepting Proxy - Burp

AutomatedIBM Rational AppScanSkipfish – New, Google

404 Generator

"Give a man an audit and he will be secure for a day. Teach a man to audit and he will be secure for the rest of his life." David Rhoades (SANS)

Page 51: Web Attacks and How to Stop Them - NEbraskaCERT · 2010-06-17 · #1 on OWASP Top Ten Attack against the client (initially) ... community focused on improving the security of application

51 Wednesday, April 14, 2010

Remediation Techniques

Dynamic ScanningAutomated - IBM Rational AppScan

Page 52: Web Attacks and How to Stop Them - NEbraskaCERT · 2010-06-17 · #1 on OWASP Top Ten Attack against the client (initially) ... community focused on improving the security of application

52 Wednesday, April 14, 2010

Remediation Techniques

Vulnerability TrackingOpen Source Vulnerability Database

http://osvdb.org/NIST National Vulnerability Data

http://nvd.nist.gov/Secunia

http://secunia.com/advisories/search/IBM Internet Security Systems (ISS) X-Force

http://xforce.iss.net/Symantec Deep Sight Threat Management

https://tms.symantec.com/Default.aspx

Page 53: Web Attacks and How to Stop Them - NEbraskaCERT · 2010-06-17 · #1 on OWASP Top Ten Attack against the client (initially) ... community focused on improving the security of application

53 Wednesday, April 14, 2010

Remediation Techniques

Vulnerability TrackingNIST National Vulnerability Database (NVD)

Page 54: Web Attacks and How to Stop Them - NEbraskaCERT · 2010-06-17 · #1 on OWASP Top Ten Attack against the client (initially) ... community focused on improving the security of application

54 Wednesday, April 14, 2010

Remediation Techniques

Training & AwarenessOWASP

SANS/Mitre top 25 Security Errors report http://www.sans.org/top25-programming-errors/

CERT Secure Coding https://www.securecoding.cert.org/confluence/display/seccode/CERT+Secure+Coding+Standards

Google Browser Security Handbook - Part 1 http://code.google.com/p/browsersec/wiki/Part1

Google Browser Security Handbook - Part 2http://code.google.com/p/browsersec/wiki/Part2

Page 55: Web Attacks and How to Stop Them - NEbraskaCERT · 2010-06-17 · #1 on OWASP Top Ten Attack against the client (initially) ... community focused on improving the security of application

55 Wednesday, April 14, 2010

Remediation Techniques

Training & AwarenessCreate Training & Awareness Courses

Present to Developers and ArchitectsIn personContent

What Security Engineering/Assurance doesRegulatoryWeb ApplicationDefensive CodingEtc.

Page 56: Web Attacks and How to Stop Them - NEbraskaCERT · 2010-06-17 · #1 on OWASP Top Ten Attack against the client (initially) ... community focused on improving the security of application

56 Wednesday, April 14, 2010

Remediation Techniques

InfrastructureSystem Object Security

File AccessJ2EE Container Security

Web Application FirewallsQuick and Easy = 1 week purchase to deploymentNeed to tune for each Web Application Nice defense in depth posturePCI Approved

Page 57: Web Attacks and How to Stop Them - NEbraskaCERT · 2010-06-17 · #1 on OWASP Top Ten Attack against the client (initially) ... community focused on improving the security of application

57 Wednesday, April 14, 2010

Checkpoint

Page 58: Web Attacks and How to Stop Them - NEbraskaCERT · 2010-06-17 · #1 on OWASP Top Ten Attack against the client (initially) ... community focused on improving the security of application

58 Wednesday, April 14, 2010

OWASP

Open Web Application Security Project (OWASP) - http://www.owasp.org

Description

ProjectsGuides – Development/Testing

Tools – WebScarab

Education – WebGoat

Awareness - Top Ten

Page 59: Web Attacks and How to Stop Them - NEbraskaCERT · 2010-06-17 · #1 on OWASP Top Ten Attack against the client (initially) ... community focused on improving the security of application

59 Wednesday, April 14, 2010

OWASP

DescriptionThe Open Web Application Security Project (OWASP) is a worldwide free and open community focused on improving the security of application software.

Make application security "visible“

All materials and software are open source.

Page 60: Web Attacks and How to Stop Them - NEbraskaCERT · 2010-06-17 · #1 on OWASP Top Ten Attack against the client (initially) ... community focused on improving the security of application

60 Wednesday, April 14, 2010

OWASP

ProjectsGuides - Development

Architects, developers, consultants and auditors

Comprehensive manual for designing, developing and deploying secure web applications.

Page 61: Web Attacks and How to Stop Them - NEbraskaCERT · 2010-06-17 · #1 on OWASP Top Ten Attack against the client (initially) ... community focused on improving the security of application

61 Wednesday, April 14, 2010

OWASP

ProjectsGuides - Testing

“Best Practices" penetration testing framework

URL:http://www.owasp.org/index.php/Category:OWASP_Testing_Project

Page 62: Web Attacks and How to Stop Them - NEbraskaCERT · 2010-06-17 · #1 on OWASP Top Ten Attack against the client (initially) ... community focused on improving the security of application

62 Wednesday, April 14, 2010

OWASP

ProjectsTools - WebScarab

Framework for analyzing applications that communicate using HTTP and HTTPS protocols.

Includes intercepting proxy, spider, fuzzer, etc. Written in Java, portable to many platforms.

URL:http://www.owasp.org/index.php/Category:OWASP_WebScarab_Project

Page 63: Web Attacks and How to Stop Them - NEbraskaCERT · 2010-06-17 · #1 on OWASP Top Ten Attack against the client (initially) ... community focused on improving the security of application

63 Wednesday, April 14, 2010

OWASP

ProjectsEducation - WebGoat

Deliberately insecure J2EE web application maintained by OWASP

Web Application security lessons

URL:http://www.owasp.org/index.php/Category:OWASP_WebGoat_Project

Page 64: Web Attacks and How to Stop Them - NEbraskaCERT · 2010-06-17 · #1 on OWASP Top Ten Attack against the client (initially) ... community focused on improving the security of application

64 Wednesday, April 14, 2010

OWASP

ProjectsAwareness - Top Ten (2007 & 2010)

Powerful awareness document

Broad consensus about most critical web application security flaws

Project members include a variety of security experts from around the world

http://www.owasp.org/index.php/Top_10_2007

Page 65: Web Attacks and How to Stop Them - NEbraskaCERT · 2010-06-17 · #1 on OWASP Top Ten Attack against the client (initially) ... community focused on improving the security of application

65 Wednesday, April 14, 2010

Presentation Message

Don’t trust the client

Scary and Dangerous Out There

No Silver Bullet, Hard Work

Page 66: Web Attacks and How to Stop Them - NEbraskaCERT · 2010-06-17 · #1 on OWASP Top Ten Attack against the client (initially) ... community focused on improving the security of application

66 Wednesday, April 14, 2010

Question and Answers

Questions?

Page 67: Web Attacks and How to Stop Them - NEbraskaCERT · 2010-06-17 · #1 on OWASP Top Ten Attack against the client (initially) ... community focused on improving the security of application

67 Wednesday, April 14, 2010

References

OWASPMain

http://www.owasp.orgTop Ten

http://www.owasp.org/index.php/Top_10_2007

Cross-Site Scripting http://www.owasp.org/index.php/Data_Validation http://www.owasp.org/index.php/XSS_%28Cross_Site_Scripting%29_Prevention_Cheat_Sheet

Page 68: Web Attacks and How to Stop Them - NEbraskaCERT · 2010-06-17 · #1 on OWASP Top Ten Attack against the client (initially) ... community focused on improving the security of application

68 Wednesday, April 14, 2010

References

OWASPOutput Encoding

http://www.owasp.org/index.php/How_to_perform_HTML_entity_encoding_in_JavaSQL Injection

http://www.owasp.org/index.php/SQL_Injection

WebGoatURL:http://www.owasp.org/index.php/Category:OWASP_WebGoat_Project

Phoenix Toolshttp://www.owasp.org/index.php/Phoenix/Tools

Page 69: Web Attacks and How to Stop Them - NEbraskaCERT · 2010-06-17 · #1 on OWASP Top Ten Attack against the client (initially) ... community focused on improving the security of application

69 Wednesday, April 14, 2010

References

OWASPDevelopment Guide

http://www.owasp.org/index.php/Category:OWASP_Guide_ProjectTesting Guide

URL:http://www.owasp.org/index.php/Category:OWASP_Testing_Project

WebScarabURL:http://www.owasp.org/index.php/Category:OWASP_WebScarab_Project

Page 70: Web Attacks and How to Stop Them - NEbraskaCERT · 2010-06-17 · #1 on OWASP Top Ten Attack against the client (initially) ... community focused on improving the security of application

70 Wednesday, April 14, 2010

References

SANSMain

http://www.sans.orgSANS Report – September 2009

http://www.sans.org/top-cyber-security-risks/

AltoroMutual Test Sitehttp://demo.testfire.net

RSnake XSS Cheatsheethttp://ha.ckers.org/xss.html

Page 71: Web Attacks and How to Stop Them - NEbraskaCERT · 2010-06-17 · #1 on OWASP Top Ten Attack against the client (initially) ... community focused on improving the security of application

71 Wednesday, April 14, 2010

References

XKCDXKCD – http://xkcd.com/327/

GIFARBilly Rios

http://xs-sniper.com/blog/2008/12/17/sun-fixes-gifars/

How to create a GIFARhttp://riosec.com/how-to-create-a-gifar

More on GIFARs and Other Java Smugglinghttp://riosec.com/more-on-gifars-and-other-java-smuggling-fun

Page 72: Web Attacks and How to Stop Them - NEbraskaCERT · 2010-06-17 · #1 on OWASP Top Ten Attack against the client (initially) ... community focused on improving the security of application

72 Wednesday, April 14, 2010

References

SQL Attacks By Examplehttp://www.unixwiz.net/techtips/sql-injection.html

Top Web Application Attacks 2008/20092008

http://jeremiahgrossman.blogspot.com/2009/02/top-ten-web-hacking-techniques-of-2008.html2009

http://jeremiahgrossman.blogspot.com/2010/01/top-ten-web-hacking-techniques-of-2009.html

Page 73: Web Attacks and How to Stop Them - NEbraskaCERT · 2010-06-17 · #1 on OWASP Top Ten Attack against the client (initially) ... community focused on improving the security of application

73 Wednesday, April 14, 2010

References

Vulnerability TrackingOpen Source Vulnerability Database

http://osvdb.org/NIST National Vulnerability Data

http://nvd.nist.gov/Secunia

http://secunia.com/advisories/search/IBM Internet Security Systems (ISS) X-Force

http://xforce.iss.net/Symantec Deep Sight Threat Management

https://tms.symantec.com/Default.aspx

Page 74: Web Attacks and How to Stop Them - NEbraskaCERT · 2010-06-17 · #1 on OWASP Top Ten Attack against the client (initially) ... community focused on improving the security of application

74 Wednesday, April 14, 2010

Thank You

Thank You!