Host and Application Security Lesson 9: Vulnerabilities, part 1.

Slides:



Advertisements
Similar presentations
Communications of the ACM (CACM), Vol. 32, No. 6, June 1989
Advertisements

The Hacker Mindset CSE 591 – Security and Vulnerability Analysis Spring 2015 Adam Doupé Arizona State University
INDEX  Ethical Hacking Terminology.  What is Ethical hacking?  Who are Ethical hacker?  How many types of hackers?  White Hats (Ethical hackers)
1 Steve Chenoweth Friday, 10/21/11 Week 7, Day 4 Right – Good or bad policy? – Asking the user what to do next! From malware.net/how-to-remove-protection-system-
Remote Access Network Management Kelly Given Allison Traina.
© 2003 School of Computing, University of Leeds SY32 Secure Computing, Lecture 15 Implementation Flaws Part 3: Randomness and Timing Issues.
Embedded Network Controller with Web Interface Bradley University Department of Electrical & Computer Engineering By: Ed Siok Advisor: Dr. Malinowski.
Building Secure Software Chapter 9 Race Conditions.
How Clients and Servers Work Together. Objectives Learn about the interaction of clients and servers Explore the features and functions of Web servers.
1 Security and Software Engineering Steven M. Bellovin AT&T Labs – Research
In a not gate, if the input is on(1) the output is off (0) and vice versa.
SilkPerformer 2009 SilkPerformer.NET Explorer Samples.
Web Application Vulnerabilities Checklist. EC-Council Parameter Checklist  URL request  URL encoding  Query string  Header  Cookie  Form field 
Web Security Demystified Justin C. Klein Keane Sr. InfoSec Specialist University of Pennsylvania School of Arts and Sciences Information Security and Unix.
Chapter 15: Security (Part 1). The Security Problem Security must consider external environment of the system, and protect the system resources Intruders.
Software Security CS461/ECE422 Spring Reading Material Chapter 12 of the text.
Lesson 15 Client Side Vulnerabilities and you. Active Server Pages MS’s answer to the scripting world of PERL and CGI on Unix Usually Written In Visual.
IST 210 Web Application Security. IST 210 Introduction Security is a process of authenticating users and controlling what a user can see or do.
CMSC 414 Computer (and Network) Security Lecture 14 Jonathan Katz.
Security Testing Case Study 360logica Software Testing Services.
OSI and TCP/IP Models And Some Vulnerabilities AfNOG th May 2011 – 10 th June 2011 Tanzania By Marcus K. G. Adomey.
Internet and Intranet Fundamentals Class 9 Session A.
Intrusion Detection Prepared by: Mohammed Hussein Supervised by: Dr. Lo’ai Tawalbeh NYIT- winter 2007.
Bugs SATAN scans for It is interesting to look at the bugs SATAN scans for. They are easily detected by the scanners and therefore do not pose a threat.
1 CHAPTER 3 CLASSES OF ATTACK. 2 Denial of Service (DoS) Takes place when availability to resource is intentionally blocked or degraded Takes place when.
1 Application Security: Electronic Commerce and Chapter 9 Copyright 2003 Prentice-Hall.
CHAPTER 3 Classes of Attack. INTRODUCTION Network attacks come from both inside and outside firewall. Kinds of attacks: 1. Denial-of-service 2. Information.
Lecture 16 Page 1 CS 236 Online Secure Programming, Continued CS 236 On-Line MS Program Networks and Systems Security Peter Reiher.
APPLICATION PENETRATION TESTING Author: Herbert H. Thompson Presentation by: Nancy Cohen.
Crash Course in Web Hacking
©Ian Sommerville 2004Software Engineering Case Studies Slide 1 The Internet Worm Compromising the availability and reliability of systems through security.
Lecture 14 Page 1 CS 236 Online Race Conditions A common cause of security bugs Usually involve multiprogramming or multithreaded programs Caused by different.
IT Security. What is Information Security? Information security describes efforts to protect computer and non computer equipment, facilities, data, and.
Hands-On Microsoft Windows Server 2008 Chapter 4-Part 1 Introduction to Active Directory and Account Manager.
Security Architecture and Design Chapter 4 Part 1 Pages 297 to 319.
4061 Session 26 (4/19). Today Network security Sockets: building a server.
Doug Haigh, SAS Institute Inc.
Viruses a piece of self-replicating code attached to some other code – cf biological virus both propagates itself & carries a payload – carries code to.
TCOM Information Assurance Management Software Hacking.
Database Security David Nguyen. Dangers of Internet  Web based applications open up new threats to a corporation security  Protection of information.
Mr. Justin “JET” Turner CSCI 3000 – Fall 2015 CRN Section A – TR 9:30-10:45 CRN – Section B – TR 5:30-6:45.
Purpose Present Drivers and Context for Firewalls Define Firewall Technology Present examples of Firewall Technology Discuss Design Issues Discuss Service.
General Concerns on WWW Security Name: Huaying Chen ID# Instructor: Dr Mort Anvari.
Application of the Internet 1998/12/09 KEIO University, JAPAN Mikiyo
JavaScript Introduction and Background. 2 Web languages Three formal languages HTML JavaScript CSS Three different tasks Document description Client-side.
AND Gate Inputs Output Input A (Switch) Input B (Switch) Output Y (Lamp) 0 (Open) 0 (OFF) A B Lamp.
Naming CSCI 6900/4900. Names & Naming System Names have unique importance –Resource sharing –Identifying entities –Location reference Name can be resolved.
CHAPTER 3 COMPLETING THE PROBLEM- SOLVING PROCESS AND GETTING STARTED WITH C++ An Introduction to Programming with C++ Fifth Edition.
Multi-Domain Hosting CPTE 212 “Missing Slides” for 1/22/2015 John Beckett.
1 Chapter 12: Design Principles Overview –There are principles for many kinds of design Generally, a design should consider: Balance, Rhythm, Proportion,
Multiply By 2-Digit Numbers (B) Unit 2 Lesson 6. Objectives:
Multiplication Find the missing value x __ = 32.
SECURE DEVELOPMENT. SEI CERT TOP 10 SECURE CODING PRACTICES Validate input Use strict compiler settings and resolve warnings Architect and design for.
Lecture 14 Page 1 CS 236 Online Secure Programming CS 236 On-Line MS Program Networks and Systems Security Peter Reiher.
Content Coverity Static Analysis Use cases of Coverity Examples
Protecting Memory What is there to protect in memory?
Protecting Memory What is there to protect in memory?
Protecting Memory What is there to protect in memory?
Chapter 2: System Structures
Async or Parallel? No they aren’t the same thing!
Viruses and Other Malicious Content
A Security Review Process for Existing Software Applications
Module 1: Getting Started
ISMS Information Security Management System
Kerberos.
Function Notation Transformations.
Introduction to Static Analyzer
Chapter 5 멀티스레드 u-Network Design Lab 4.
Set-UID Privileged Programs
Presentation transcript:

Host and Application Security Lesson 9: Vulnerabilities, part 1

We now have a background…  … in how things are supposed to work

Escalation of Privilege  Now we know about authentication and access control, what is this about?  Right!  Two kinds: Horizontal Vertical

 Get access to something that has more privilege than you  Example: passwd bugs in Unix  In this case, this violates TOCTOU

Horizontal  User A gets to read User B’s files  An example might be predictable session IDs or user IDs in a web application  User A doesn’t escalate, but they do get more…

Race Conditions  A race condition is where the output of a system depends upon the timing of the input  This can occur at all kinds of levels – even a logic gate!  A race condition can occur when multiple threads access a global variable without locking

Misconfigurations  A web server which allows remote users to access things they should not  A sendmail server that allows relay  Smurf: missing no ip directed-broadcast

Design Flaws  A design flaw is perhaps the worst kind of vulnerability to fix  Case study: Microsoft Word Macro Viruses  Simple example: sendmail debug vulnerability

Questions?