12
TOPIC TO BE DECLARED LATER Ilari Mäkelä Automation Engineer Verkkokauppa.com

DevOps & CyberSec 9/2016

Embed Size (px)

Citation preview

Page 1: DevOps & CyberSec 9/2016

TOPIC TO BE DECLARED LATERIlari Mäkelä

Automation Engineer

Verkkokauppa.com

Page 2: DevOps & CyberSec 9/2016
Page 3: DevOps & CyberSec 9/2016
Page 4: DevOps & CyberSec 9/2016

A1 Injection

A2 Broken Authentication and Session Management

A3 Cross-Site Scripting (XSS)

A4 Insecure Direct Object References

A5 Security Misconfiguration

A6 Sensitive Data Exposure

A7 Missing Function Level Access Control

A8 Cross-Site Request Forgery (CSRF)

A9 Using Components with Known Vulnerabilities

A10 Unvalidated Redirects and Forwards

www.owasp.org

The OWASP Top 10

Page 5: DevOps & CyberSec 9/2016

● Improper Neutralization of Special Elements used in

an SQL Command ('SQL Injection')

● Improper Neutralization of Special Elements used in

an OS Command ('OS Command Injection')

● Buffer Copy without Checking Size of Input ('Classic

Buffer Overflow')

● Improper Neutralization of Input During Web Page

Generation ('Cross-site Scripting')

● Missing Authentication for Critical Function

● Missing Authorization

● Use of Hard-coded Credentials

● Missing Encryption of Sensitive Data

● Unrestricted Upload of File with Dangerous Type

● Reliance on Untrusted Inputs in a Security Decision

● Execution with Unnecessary Privileges

● Cross-Site Request Forgery (CSRF)

http://cwe.mitre.org/top25/

CWE/SANS Top 25● Improper Limitation of a Pathname to a Restricted

Directory ('Path Traversal')

● Download of Code Without Integrity Check

● Incorrect Authorization

● Inclusion of Functionality from Untrusted Control

Sphere

● Incorrect Permission Assignment for Critical

Resource

● Use of Potentially Dangerous Function

● Use of a Broken or Risky Cryptographic Algorithm

● Incorrect Calculation of Buffer Size

● Improper Restriction of Excessive Authentication

Attempts

● URL Redirection to Untrusted Site ('Open Redirect')

● Uncontrolled Format String

● Integer Overflow or Wraparound

● Use of a One-Way Hash without a Salt

Page 6: DevOps & CyberSec 9/2016
Page 7: DevOps & CyberSec 9/2016

youtube.com/user/WiseOwlTutorials

Page 8: DevOps & CyberSec 9/2016
Page 9: DevOps & CyberSec 9/2016
Page 10: DevOps & CyberSec 9/2016

https://hackathon.guide/

Page 11: DevOps & CyberSec 9/2016
Page 12: DevOps & CyberSec 9/2016

github.com/facebook/fbctf

verkkokauppa.com

github.com/WebGoat/WebGoat

hackathon.guide