28
Web Security

Web security: concepts and tools used by attackers

Embed Size (px)

DESCRIPTION

Today, with prominent Web attacks taking place seemingly every week is time to consider security a fundamental part of the development of web applications. This talk presents some basic concepts and demo some tools used by attackers targetting common web vulnerabilities.

Citation preview

Page 1: Web security: concepts and tools used by attackers

Web Security

Page 2: Web security: concepts and tools used by attackers

Why?

2.7B worldwide Internet usersProtect user’s privacy is criticalLost of trust: If we leak, users will leave

Page 3: Web security: concepts and tools used by attackers

Prominent web attacks every week

Page 4: Web security: concepts and tools used by attackers
Page 5: Web security: concepts and tools used by attackers

Why Security is difficult

“A system is secure if it behaves precisely in the manner intended and does nothing more”

Page 6: Web security: concepts and tools used by attackers

Why Security is difficult

1. Software is complex● Difficult to analyze in complex real world scenarios

Page 7: Web security: concepts and tools used by attackers

Why Security is difficult

2. The web was not designed to be secure● Targeted originally to provide unlimited access● Its speed of ascent brought design flaws that remained

until present days

Page 8: Web security: concepts and tools used by attackers

Know who (really) are your users

“The most striking property of web browsers is that most people who use them are overwhelmingly unskilled”

Page 9: Web security: concepts and tools used by attackers

Know who (really) are your users

Research #1● Casual users are oblivious to signals that make perfect

sense to a developer.● Good phishing websites fooled 90% of participants

Page 10: Web security: concepts and tools used by attackers

Know who (really) are your users

Research #2● The ‘green URL bar’ security indicator

Page 11: Web security: concepts and tools used by attackers

Who’s responsible for security

Avoid the “Security Department” excuseWe are the first line of defenseKeep maintainable Security strategies

Page 12: Web security: concepts and tools used by attackers

Maintainable Security strategies

Consider Security during the whole lifecycle● For each new release, the potential for new security

issues increases.

Page 13: Web security: concepts and tools used by attackers

User Stories?

“As an employee, I can search for other employees by their last name”

Page 14: Web security: concepts and tools used by attackers

Add EVIL User Stories

Page 15: Web security: concepts and tools used by attackers

Add EVIL User Stories

“As a hacker I can send bad data in HTTP headers, so I can access data and functions for which I’m not authorized.”

Page 16: Web security: concepts and tools used by attackers

OWASP List

Page 17: Web security: concepts and tools used by attackers

OWASP 2013 ListA1 - InjectionA2 - Broken Authentication and Session ManagementA3 - Cross-Site ScriptingA4 - Insecure Object ReferenceA5 - Security MisconfigurationA6 - Sensitive Data ExposureA7 - Missing Function Level Access ControlA8 - Cross-Site Request ForgeryA9 - Using Components with Known VulnerabilitiesA10 - Unvalidated Redirects and Forwards

Page 18: Web security: concepts and tools used by attackers

Automated attacks

Unlike the tedious hours spent hacking a network’s perimeter, attacks against Web applications can be easily automated

Page 19: Web security: concepts and tools used by attackers

Prevention

Don’t write your own security controls! Reinventing the wheel leads to wasted time and massive security holes.Understand and use the tools that the attackers use

Page 20: Web security: concepts and tools used by attackers

Demo timehttps://github.com/tomasperezv/web-security-tools

Page 21: Web security: concepts and tools used by attackers

Demo time: WebGoat

Page 22: Web security: concepts and tools used by attackers

Demo time: THC-Hydra

Page 23: Web security: concepts and tools used by attackers

Demo time: webscarab

Page 24: Web security: concepts and tools used by attackers

Demo time: Nessus

Page 25: Web security: concepts and tools used by attackers

Demo time: w3af

Page 26: Web security: concepts and tools used by attackers

Demo time: xsssniper

Page 27: Web security: concepts and tools used by attackers

Conclusion

● We are responsible of the security of our web applications

● Include the EVIL user stories● Is easy to perform attacks using automated tools● Don’t write your own security controls!

Page 28: Web security: concepts and tools used by attackers

Questions

https://github.com/tomasperezv/web-security-tools