Information Security Trend, Threats & Challenges Dr. Mohsen Kahani APA Lab, Ferdowsi Univ. of Mashhad

Slides:



Advertisements
Similar presentations
Copyright © The OWASP Foundation Permission is granted to copy, distribute and/or modify this document under the terms of the OWASP License. The OWASP.
Advertisements

Copyright © The OWASP Foundation Permission is granted to copy, distribute and/or modify this document under the terms of the OWASP License. The OWASP.
OWASP Web Vulnerabilities and Auditing
SEC835 OWASP Top Ten Project.
OWASP Top 10 for 2010 OWASP Education Nishi Kumar
The OWASP Foundation OWASP Top Kuai Hinojosa Software Security Consultant at Cigital OWASP Global Education Committee OWASP.
The OWASP Foundation Why hackers don’t care about your firewall Seba Deleersnyder
Hands on Demonstration for Testing Security in Web Applications
Security Issues and Challenges in Cloud Computing
Barracuda Web Application Firewall
IDAsec copyright - all rights reserved1 Web Vulnerabilities in the real world.
It’s always better live. MSDN Events Security Best Practices Part 2 of 2 Reducing Vulnerabilities using Visual Studio 2008.
Securing MVC.NET Web Applications Andrew Wilson. 오 안녕하세요 !!!! Senior Software Consultant Obsessed security guy OWASP co-lead Long walks on the beach desert.
Chapter 9 Web Applications. Web Applications are public and available to the entire world. Easy access to the application means also easy access for malicious.
Information Networking Security and Assurance Lab National Chung Cheng University The Ten Most Critical Web Application Security Vulnerabilities Ryan J.W.
It’s always better live. MSDN Events Securing Web Applications Part 1 of 2 Understanding Threats and Attacks.
Information Networking Security and Assurance Lab National Chung Cheng University 1 Top Vulnerabilities in Web Applications (I) Unvalidated Input:  Information.
Lecture 16 Page 1 CS 236 Online Cross-Site Scripting XSS Many sites allow users to upload information –Blogs, photo sharing, Facebook, etc. –Which gets.
Tobias Gondrom (OWASP Project Leader)
Web Application Vulnerabilities Checklist. EC-Council Parameter Checklist  URL request  URL encoding  Query string  Header  Cookie  Form field 
Security and Risk Management. Who Am I Matthew Strahan from Content Security Principal Security Consultant I look young, but I’ve been doing this for.
Evolving Threats. Application Security - Understanding the Problem DesktopTransportNetworkWeb Applications Antivirus Protection Encryption (SSL) Firewalls.
1 Infrastructure Hardening. 2 Objectives Why hardening infrastructure is important? Hardening Operating Systems, Network and Applications.
Web Security Overview Lohika ASC team 2009
OWASP Zed Attack Proxy Project Lead
OWASP Top 10 – 2010 The Top 10 Most Critical Web Application Security Risks Dave Wichers COO, Aspect Security OWASP Board Member
WEB SECURITY WEEK 3 Computer Security Group University of Texas at Dallas.
The OWASP Way Understanding the OWASP Vision and the Top Ten.
Ladd Van Tol Senior Software Engineer Security on the Web Part One - Vulnerabilities.
Chapter 9 Web Applications. Web Applications are public and available to the entire world. Easy access to the application means also easy access for malicious.
© All rights reserved. Zend Technologies, Inc. PHP Security Kevin Schroeder Zend Technologies.
November 13, 2008 Ohio Information Security Forum Attack Surface of Web Applications James Walden Northern Kentucky University
Copyright 2007 © The OWASP Foundation Permission is granted to copy, distribute and/or modify this document under the terms of the OWASP License. The OWASP.
Copyright 2007 © The OWASP Foundation Permission is granted to copy, distribute and/or modify this document under the terms of the OWASP License. The OWASP.
Web Application Security ECE ECE Internetwork Security What is a Web Application? An application generally comprised of a collection of scripts.
Security Scanners Mark Shtern. Popular attack targets Web – Web platform – Web application Windows OS Mac OS Linux OS Smartphone.
October 3, 2008IMI Security Symposium Application Security through a Hacker’s Eyes James Walden Northern Kentucky University
Copyright © The OWASP Foundation Permission is granted to copy, distribute and/or modify this document under the terms of the OWASP License. The OWASP.
Web Applications Testing By Jamie Rougvie Supported by.
Building Secure Web Applications With ASP.Net MVC.
Copyright © The OWASP Foundation Permission is granted to copy, distribute and/or modify this document under the terms of the OWASP License. The OWASP.
CS526Topic 12: Web Security (2)1 Information Security CS 526 Topic 9 Web Security Part 2.
Chapter 12: How Private are Web Interactions?. Why we care? How much of your personal info was released to the Internet each time you view a Web page?
Copyright © The OWASP Foundation This work is available under the Creative Commons SA 2.5 license The OWASP Foundation OWASP Denver February 2012.
Web Application (In)security Note: Unless noted differently, all scanned figures were from the textbook, Stuttard & Pinto, 2011.
The OWASP Foundation Copyright © The OWASP Foundation Permission is granted to copy, distribute and/or modify this document under.
Do not try any of the techniques discussed in this presentation on a system you do not own. It is illegal and you will get caught.
Page 1 Ethical Hacking by Douglas Williams. Page 2 Intro Attackers can potentially use many different paths through your application to do harm to your.
OWASP Top 10 – 2010 The Top 10 Most Critical Web Application Security Risks Dave Wichers COO, Aspect Security OWASP Board Member
Web Application Vulnerabilities
Intro to Web Application Security
Web Application Protection Against Hackers and Vulnerabilities
Web Application Vulnerabilities, Detection Mechanisms, and Defenses
Chapter 7: Identifying Advanced Attacks
TOPIC: Web Security (Part-4)
Secure Software Confidentiality Integrity Data Security Authentication
Penetration Testing following OWASP
OWASP Top by Dave Wichers OWASP Top 10 Project Lead
E-commerce Application Security
CSC 495/583 Topics of Software Security Intro to Web Security
Web Security Advanced Network Security Peter Reiher August, 2014
Lecture 2 - SQL Injection
Exploring DOM-Based Cross Site Attacks
Presentation transcript:

Information Security Trend, Threats & Challenges Dr. Mohsen Kahani APA Lab, Ferdowsi Univ. of Mashhad

Contents Security Trends 2011 Security Threats 2011 Web Application top 10 vulnerabilities Problems Observed Locally

2011 Security Trends More threats like Stuxnet More granular and refined web security policies Botnets resort to steganography Attacks will find ways to automate the research Targeted attacks to hit a wider range of organizations Non-English-language spams increase Businesses will work harder to manage security for their distributed workforces. Criminals will continue to use SEO poisoning Security services will continue to migrate to the cloud Extension of attacks into online currencies used in social networking and online marketplaces Criminalware as a Service (CaaS)

Top 10 Internet Security Threats for Increase in Malware creation – a total of over 60 million classified threats. 2. Cyber war. – stuxnet 3. Cyber-protests. 4. Social engineering. 5. Windows 7 influencing malware development.

Top 10 Internet Security Threats for Cell phones. – for Android 7. Tablets? 8. Malware for Mac 9. HTML Highly dynamic and encrypted threats.

Why Application Security is a High Priority Web applications are the #1 focus of hackers: – 75% of attacks at Application layer – XSS and SQL Injection are #1 and #2 reported vulnerabilities Most sites are vulnerable: – 90% of sites are vulnerable to application attacks – 78% percent of easily exploitable vulnerabilities affected Web applications Web applications are high value targets for hackers: – Customer data, credit cards, ID theft, fraud, site defacement, etc Compliance requirements: – Payment Card Industry (PCI) Standards, GLBA, HIPPA, FISMA,

Root Cause: – Developers are not trained to write or test for secure code – Network security (firewall, IDS, etc) does not protect the Web Application Layer Current State: – Organizations test tactically at a late & costly stage in the SDLC – A communication gap exists between security and development as such vulnerabilities are not fixed – Testing coverage is incomplete Goal: – To build better and more secure Web Applications/websites Why Application Security Problems Exist

High Level Web Application Architecture Review (Presentation) App Server (Business Logic) Database Client Tier (Browser) Middle Tier Data Tier Firewall Sensitive data is stored here SSL Protects Transport Protects Network Customer App is deployed here Internet

Top 10 Comparison = = =

A1 – Injection Tricking an application into including unintended commands in the data sent to an interpreter Injection means… Take strings and interpret them as commands SQL, OS Shell, LDAP, XPath, Hibernate, etc… Interpreters… Many applications still susceptible (really don’t know why) Even though it’s usually very simple to avoid SQL injection is still quite common Usually severe. Entire database can usually be read or modified May also allow full database schema, or account access, or even OS level access Typical Impact

SQL Injection – Illustrated Firewall Hardened OS Web Server App Server Firewall Databases Legacy Systems Web Services Directories Human Resrcs Billing Custom Code APPLICATION ATTACK Network Layer Application Layer Accounts Finance Administration Transactions Communication Knowledge Mgmt E-Commerce Bus. Functions HTTP request  SQL query  DB Table   HTTP response   "SELECT * FROM accounts WHERE acct=‘’ OR 1=1-- ’" 1. Application presents a form to the attacker 2. Attacker sends an attack in the form data 3. Application forwards attack to the database in a SQL query Account Summary Acct: Acct: Acct: Acct: Database runs query containing attack and sends encrypted results back to application 5. Application decrypts data as normal and sends results to the user Account: SKU: Account: SKU:

A2 – Cross-Site Scripting (XSS) Raw data from attacker is sent to an innocent user’s browser Occurs any time… Stored in database Reflected from web input (form field, hidden field, URL, etc…) Sent directly into rich JavaScript client Raw data… Try this in your browser – javascript:alert(document.cookie) Virtually every web application has this problem Steal user’s session, steal sensitive data, rewrite web page, redirect user to phishing or malware site Most Severe: Install XSS proxy which allows attacker to observe and direct all user’s behavior on vulnerable site and force user to other sites Typical Impact

Cross-Site Scripting Illustrated Application with stored XSS vulnerability 3 2 Attacker sets the trap – update my profile Attacker enters a malicious script into a web page that stores the data on the server 1 Victim views page – sees attacker profile Script silently sends attacker Victim’s session cookie Script runs inside victim’s browser with full access to the DOM and cookies Custom Code Accounts Finance Administration Transactions Communication Knowledge Mgmt E-Commerce Bus. Functions

A3 – Broken Authentication and Session Management Means credentials have to go with every request Should use SSL for everything requiring authentication HTTP is a “stateless” protocol SESSION ID used to track state since HTTP doesn’t and it is just as good as credentials to an attacker SESSION ID is typically exposed on the network, in browser, in logs, … Session management flaws Change my password, remember my password, forgot my password, secret question, logout, address, etc… Beware the side-doors User accounts compromised or user sessions hijacked Typical Impact

Broken Authentication Illustrated Custom Code Accounts Finance Administration Transactions Communication Knowledge Mgmt E-Commerce Bus. Functions 1 User sends credentials 2 Site uses URL rewriting (i.e., put session in URL) 3 User clicks on a link to in a forumhttp:// 4 Hacker checks referer logs on and finds user’s JSESSIONID 5 Hacker uses JSESSIONID and takes over victim’s account

A4 – Insecure Direct Object References This is part of enforcing proper “Authorization”, along with A7 – Failure to Restrict URL Access How do you protect access to your data? Only listing the ‘authorized’ objects for the current user, or Hiding the object references in hidden fields … and then not enforcing these restrictions on the server side This is called presentation layer access control, and doesn’t work Attacker simply tampers with parameter value A common mistake … Users are able to access unauthorized files or data Typical Impact

Insecure Direct Object References Illustrated Attacker notices his acct parameter is 6065 ?acct=6065 He modifies it to a nearby number ?acct=6066 Attacker views the victim’s account information

A5 – Cross Site Request Forgery (CSRF) An attack where the victim’s browser is tricked into issuing a command to a vulnerable web application Vulnerability is caused by browsers automatically including user authentication data (session ID, IP address, Windows domain credentials, …) with each request Cross Site Request Forgery What if a hacker could steer your mouse and get you to click on links in your online banking application? What could they make you do? Imagine… Initiate transactions (transfer funds, logout user, close account) Access sensitive data Change account details Typical Impact

CSRF Vulnerability Pattern The Problem – Web browsers automatically include most credentials with each request – Even for requests caused by a form, script, or image on another site All sites relying solely on automatic credentials are vulnerable! – (almost all sites are this way) Automatically Provided Credentials – Session cookie – Basic authentication header – IP address – Client side SSL certificates – Windows domain authentication

CSRF Illustrated 3 2 Attacker sets the trap on some website on the internet (or simply via an ) 1 While logged into vulnerable site, victim views attacker site Vulnerable site sees legitimate request from victim and performs the action requested tag loaded by browser – sends GET request (including credentials) to vulnerable site Custom Code Accounts Finance Administration Transactions Communication Knowledge Mgmt E-Commerce Bus. Functions Hidden tag contains attack against vulnerable site Application with CSRF vulnerability

A6 – Security Misconfiguration Everywhere from the OS up through the App Server Don’t forget all the libraries you are using!! Web applications rely on a secure foundation Think of all the places your source code goes Security should not require secret source code Is your source code a secret? All credentials should change in production CM must extend to all parts of the application Install backdoor through missing OS or server patch XSS flaw exploits due to missing application framework patches Unauthorized access to default accounts, application functionality or data, or unused but accessible functionality due to poor server configuration Typical Impact

Hardened OS Web Server App Server Framework Security Misconfiguration Illustrated App Configuration Custom Code Accounts Finance Administration Transactions Communication Knowledge Mgmt E-Commerce Bus. Functions Test Servers QA Servers Source Control Development Database Insider

A7 – Insecure Cryptographic Storage Failure to identify all sensitive data Failure to identify all the places that this sensitive data gets stored Databases, files, directories, log files, backups, etc. Failure to properly protect this data in every location Storing sensitive data insecurely Attackers access or modify confidential or private information e.g, credit cards, health care records, financial data (yours or your customers) Attackers extract secrets to use in additional attacks Company embarrassment, customer dissatisfaction, and loss of trust Expense of cleaning up the incident, such as forensics, sending apology letters, reissuing thousands of credit cards, providing identity theft insurance Business gets sued and/or fined Typical Impact

Insecure Cryptographic Storage Illustrated Custom Code Accounts Finance Administration Transactions Communication Knowledge Mgmt E-Commerce Bus. Functions 1 Victim enters credit card number in form 2 Error handler logs CC details because merchant gateway is unavailable 4 Malicious insider steals 4 million credit card numbers Log files 3 Logs are accessible to all members of IT staff for debugging purposes

A8 – Failure to Restrict URL Access This is part of enforcing proper “authorization”, along with A4 – Insecure Direct Object References How do you protect access to URLs (pages)? Displaying only authorized links and menu choices This is called presentation layer access control, and doesn’t work Attacker simply forges direct access to ‘unauthorized’ pages A common mistake … Attackers invoke functions and services they’re not authorized for Access other user’s accounts and data Perform privileged actions Typical Impact

Failure to Restrict URL Access Illustrated Attacker notices the URL indicates his role /user/getAccounts He modifies it to another directory (role) /admin/getAccounts, or /manager/getAccounts Attacker views more accounts than just their own

A9 – Insufficient Transport Layer Protection Failure to identify all sensitive data Failure to identify all the places that this sensitive data is sent On the web, to backend databases, to business partners, internal communications Failure to properly protect this data in every location Transmitting sensitive data insecurely Attackers access or modify confidential or private information e.g, credit cards, health care records, financial data (yours or your customers) Attackers extract secrets to use in additional attacks Company embarrassment, customer dissatisfaction, and loss of trust Expense of cleaning up the incident Business gets sued and/or fined Typical Impact

Insufficient Transport Layer Protection Illustrated Custom Code Employees Business Partners External Victim Backend Systems External Attacker 1 External attacker steals credentials and data off network 2 Internal attacker steals credentials and data from internal network Internal Attacker

A10 – Unvalidated Redirects and Forwards And frequently include user supplied parameters in the destination URL If they aren’t validated, attacker can send victim to a site of their choice Web application redirects are very common They internally send the request to a new page in the same application Sometimes parameters define the target page If not validated, attacker may be able to use unvalidated forward to bypass authentication or authorization checks Forwards ( aka Transfer in.NET ) are common too Redirect victim to phishing or malware site Attacker’s request is forwarded past security checks, allowing unauthorized function or data access Typical Impact

Unvalidated Redirect Illustrated 3 2 Attacker sends attack to victim via or webpage From: Internal Revenue Service Subject: Your Unclaimed Tax Refund Our records show you have an unclaimed federal tax refund. Please click here to initiate your claim. 1 Application redirects victim to attacker’s site Request sent to vulnerable site, including attacker’s destination site as parameter. Redirect sends victim to attacker site Custom Code Accounts Finance Administration Transactions Communication Knowledge Mgmt E-Commerce Bus. Functions 4 Evil site installs malware on victim, or phish’s for private information Victim clicks link containing unvalidated parameter Evil Site & & … &dest= &dest=

Unvalidated Forward Illustrated 2 Attacker sends attack to vulnerable page they have access to 1 Application authorizes request, which continues to vulnerable page Request sent to vulnerable page which user does have access to. Redirect sends user directly to private page, bypassing access control. 3 Forwarding page fails to validate parameter, sending attacker to unauthorized page, bypassing access control public void doPost( HttpServletRequest request, HttpServletResponse response) { try { String target = request.getParameter( "dest" ) );... request.getRequestDispatcher( target ).forward(request, response); } catch (... Filter public void sensitiveMethod( HttpServletRequest request, HttpServletResponse response) { try { // Do sensitive stuff here.... } catch (...

Problems Observed Locally Flat network structure Update & patches not up-to-date Misconfiguration of equipment Using insecure protocols (http, telnet, …) Open WIFI zones Security awareness

Flat network structure No hierarchy Attackers have the same access as Admins! Possible to intercept all traffic

Update & patches not up-to-date Clients and/or server are not update Important patches not installed No WSUS server in the organization Easy to attack via automatic tools

Misconfiguration of equipment Switches and other devices are installed without configuration Wrong configuration (sometimes worst than factory setting)

Using insecure protocols Using plain text protocols (http, telnet, …) for access to the important devices Can be easily intercepted

Open WIFI zones Open access wireless networks Using WEP for authentication

Security awareness Information Security is “Organizational Problem” rather than “IT Problem” More than 70% of Threats are Internal More than 60% culprits are First Time fraudsters Biggest Risk : People Biggest Asset : People Social Engineering is major threat More than 2/3 rd express their inability to determine “Whether my systems are currently compromised?”

Conclusion More rely on the IT services Security is becoming more important Attacks are becoming more complicated Educating IT professional is very important Security awareness should be considered seriously

End APA FUM