TOPIC: Web Security (Part-4)

Slides:



Advertisements
Similar presentations
Webgoat.
Advertisements

What is code injection? Code injection is the exploitation of a computer bug that is caused by processing invalid data. Code injection can be used by.
Hands-on SQL Injection Attack and Defense HI-TEC July 21, 2013.
SEC835 OWASP Top Ten Project.
IT Security: Threats, Vulnerabilities and Countermeasures # 3
IT Security: Threats, Vulnerabilities and Countermeasures
It’s always better live. MSDN Events Security Best Practices Part 2 of 2 Reducing Vulnerabilities using Visual Studio 2008.
Chapter 9 Web Applications. Web Applications are public and available to the entire world. Easy access to the application means also easy access for malicious.
Information Networking Security and Assurance Lab National Chung Cheng University The Ten Most Critical Web Application Security Vulnerabilities Ryan J.W.
It’s always better live. MSDN Events Securing Web Applications Part 1 of 2 Understanding Threats and Attacks.
Information Networking Security and Assurance Lab National Chung Cheng University 1 Top Vulnerabilities in Web Applications (I) Unvalidated Input:  Information.
CS 290C: Formal Models for Web Software Lecture 1: Introduction Instructor: Tevfik Bultan.
Lecture 16 Page 1 CS 236 Online Cross-Site Scripting XSS Many sites allow users to upload information –Blogs, photo sharing, Facebook, etc. –Which gets.
Injection Attacks by Example SQL Injection and XSS Adam Forsythe Thomas Hollingsworth.
The 10 Most Critical Web Application Security Vulnerabilities
Web Application Attacks ECE 4112 Fall 2007 Group 9 Zafeer Khan & Simmon Yau.
Web Application Security
OWASP Mobile Top 10 Why They Matter and What We Can Do
Evolving Threats. Application Security - Understanding the Problem DesktopTransportNetworkWeb Applications Antivirus Protection Encryption (SSL) Firewalls.
Introduction to Application Penetration Testing
Web Security Overview Lohika ASC team 2009
OWASP Zed Attack Proxy Project Lead
Cosc 4765 Server side Web security. Web security issues From Cenzic Vulnerability report
HTTP and Server Security James Walden Northern Kentucky University.
Cross-Site Scripting Vulnerabilities Adam Doupé 11/24/2014.
+ Websites Vulnerabilities. + Content Expand of The Internet Use of the Internet Examples Importance of the Internet How to find Security Vulnerabilities.
The OWASP Way Understanding the OWASP Vision and the Top Ten.
CSCI 6962: Server-side Design and Programming Secure Web Programming.
Ladd Van Tol Senior Software Engineer Security on the Web Part One - Vulnerabilities.
Chapter 9 Web Applications. Web Applications are public and available to the entire world. Easy access to the application means also easy access for malicious.
© All rights reserved. Zend Technologies, Inc. PHP Security Kevin Schroeder Zend Technologies.
November 13, 2008 Ohio Information Security Forum Attack Surface of Web Applications James Walden Northern Kentucky University
Copyright 2007 © The OWASP Foundation Permission is granted to copy, distribute and/or modify this document under the terms of the OWASP License. The OWASP.
Web Application Security ECE ECE Internetwork Security What is a Web Application? An application generally comprised of a collection of scripts.
Security Scanners Mark Shtern. Popular attack targets Web – Web platform – Web application Windows OS Mac OS Linux OS Smartphone.
Top Five Web Application Vulnerabilities Vebjørn Moen Selmersenteret/NoWires.org Norsk Kryptoseminar Trondheim
Copyright © The OWASP Foundation Permission is granted to copy, distribute and/or modify this document under the terms of the OWASP License. The OWASP.
October 3, 2008IMI Security Symposium Application Security through a Hacker’s Eyes James Walden Northern Kentucky University
Web Applications Testing By Jamie Rougvie Supported by.
Building Secure Web Applications With ASP.Net MVC.
By Sean Rose and Erik Hazzard.  SQL Injection is a technique that exploits security weaknesses of the database layer of an application in order to gain.
CS526Topic 12: Web Security (2)1 Information Security CS 526 Topic 9 Web Security Part 2.
Web Security Lesson Summary ●Overview of Web and security vulnerabilities ●Cross Site Scripting ●Cross Site Request Forgery ●SQL Injection.
Copyright © The OWASP Foundation This work is available under the Creative Commons SA 2.5 license The OWASP Foundation OWASP Denver February 2012.
Module: Software Engineering of Web Applications Chapter 3 (Cont.): user-input-validation testing of web applications 1.
INFO 344 Web Tools And Development CK Wang University of Washington Spring 2014.
Session 11: Cookies, Sessions ans Security iNET Academy Open Source Web Development.
Do not try any of the techniques discussed in this presentation on a system you do not own. It is illegal and you will get caught.
Page 1 Ethical Hacking by Douglas Williams. Page 2 Intro Attackers can potentially use many different paths through your application to do harm to your.
Copyright © The OWASP Foundation Permission is granted to copy, distribute and/or modify this document under the terms of the OWASP License. The OWASP.
Module: Software Engineering of Web Applications
Building Secure ColdFusion Applications
Web Application Vulnerabilities
Intro to Web Application Security
Module: Software Engineering of Web Applications
Web Application Vulnerabilities, Detection Mechanisms, and Defenses
World Wide Web policy.
Secure Software Confidentiality Integrity Data Security Authentication
What is REST API ? A REST (Representational State Transfer) Server simply provides access to resources and the REST client accesses and presents the.
Cross-Site Forgery
امنیت نرم‌افزارهای وب تقديم به پيشگاه مقدس امام عصر (عج) عباس نادری
Web Security Advanced Network Security Peter Reiher August, 2014
Lecture 2 - SQL Injection
WWW安全 國立暨南國際大學 資訊管理學系 陳彥錚.
Exploring DOM-Based Cross Site Attacks
Presentation transcript:

TOPIC: Web Security (Part-4) Course : WEB ENGINEERING Paper Code: ETCS-308 TOPIC: Web Security (Part-4)

OWASP Top 10 Security Vulnerabilities (Open Web Application Security Project) 1 - Cross Site Scripting (XSS) XSS flaws occur whenever an application takes user supplied data and sends it to a web browser without first validating or encoding that content. XSS allows attackers to execute script in the victim's browser which can hijack user sessions, deface web sites, possibly introduce worms, etc. 2 - Injection Flaws Injection flaws, particularly SQL injection, are common in web applications. Injection occurs when user-supplied data is sent to an interpreter as part of a command or query. The attacker's hostile data tricks the interpreter into executing unintended commands or changing data. 3 - Malicious File Execution Code vulnerable to remote file inclusion (RFI) allows attackers to include hostile code and data, resulting in devastating attacks, such as total server compromise. Malicious file execution attacks affect PHP, XML and any framework which accepts filenames or files from users.

OWASP Top 10 Security Vulnerabilities (Open Web Application Security Project) 4 - Insecure Direct Object Reference A direct object reference occurs when a developer exposes a reference to an internal implementation object, such as a file, directory, database record, or key, as a URL or form parameter. Attackers can manipulate those references to access other objects without authorization. 5 - Cross Site Request Forgery (CSRF) A CSRF attack forces an authenticated user(victim) to send a forged HTTP request, including the victim's session cookie to a vulnerable web application which allows the attacker to force the victim's browser to generate request such that the vulnerable app perceives as legitimate requests from the victim. 6 - Information Leakage and Improper Error Handling Applications can unintentionally leak information about their configuration, internal workings, or violate privacy through a variety of application problems. Attackers use this weakness to steal sensitive data, or conduct more serious attacks.

OWASP Top 10 Security Vulnerabilities (Open Web Application Security Project) 7 - Broken Authentication and Session Management Account credentials and session tokens are often not properly protected. Attackers compromise passwords, keys, or authentication tokens to assume other users' identities. 8 - Insecure Cryptographic Storage Web applications rarely use cryptographic functions properly to protect data and credentials. Attackers use weakly protected data to conduct identity theft and other crimes, such as credit card fraud. 9 - Insecure Communications Applications frequently fail to encrypt network traffic when it is necessary to protect sensitive communications. 10 - Failure to Restrict URL Access Frequently, an application only protects sensitive functionality by preventing the display of links or URLs to unauthorized users. Attackers can use this weakness to access and perform unauthorized operations by accessing those URLs directly.

OWASP Top 1: Cross Site Scripting What is Cross Site Scripting? In it’s simplest form, it’s a process that can occur anywhere. A web application uses input from a malicious user to generate output without validating or encoding the input. During a Cross Site Scripting attack, a malicious source sends a script that is executed by the end user’s browser. It allows attackers to embed code from one webpage into another webpage by changing its HTML code. It’s been used to deface web sites, conduct phishing attacks, or it can take over a user’s browser and force them to execute commands they’re unaware of. Cross Site Scripting attacks usually come in the form of JavaScript. However, any active content poses a potential danger. Prevention Validate the users input against what is expected. Encode user supplied output. After you believe you’ve done the right things during code development, inspect your code with a scan.

OWASP Top 2: Injection Flaws (SQL Injection) What is SQL Injection SQL injection is the actual injection of SQL commands into web applications through user input fields. When an application uses internal SQL commands and you also have user input capabilities (like a login screen), SQL commands can be injected that can create, read, update, or delete any data available to the application. Prevention You can put tight constraints on user inputs. But the best method of preventing SQL injection is to avoid the use of dynamically generated SQL in your code. Instead use stored procedures. And then again, run a scan to make sure your application is not vulnerable to SQL injections.

OWASP Top 3: Malicious File Execution What is Malicious File Execution ? When Developers program application is such that it uses input files provided by the user and the bad guy is the one entering the file, a malicious file is executed unknowingly, thus we have malicious file execution. Malicious file execution attacks can occur anytime the application accepts filenames or files from a users. When these files are executed, they can be used to do just about anything from stealing data to taking over the entire system. Prevention Strongly validate user input using "accept known good" as a strategy, or isolate incoming files and check the legitimacy before executing them. Disable certain commands: visit the OWASP website to see what commands to disable.

OWASP Vulnerabilities: A Common Thread From looking at OWASP vulnerabilities, it appears that there is a common theme. Applications with Dynamic code or user inputs have the most vulnerabilities – and that seems to be the current trend in application development. So if you’re building applications of that nature, make sure you test them carefully.

SANS Top 20 Security Vulnerabilities SANS Top 20 Security Vulnerabilities (IT Security and Research Organization) SANS is the most trusted and by far the largest source for information security training and security certification in the world.

SANS Top 20 Security Vulnerabilities SANS Top 20 Security Vulnerabilities (IT Security and Research Organization) SANS is the most trusted and by far the largest source for information security training and security certification in the world.

National Vulnerability Database

National Vulnerability Database

National Vulnerability Database

Other Vulnerabilities Code Mistakes Prevention Implement Prevention in Code Thoroughly Test Use Tools Untrained Users Security ignorance compromises data Provide the training Rules of Behavior Annual refresher training Insecure Configuration Settings Follow proper rules and procedures

Items of Special Interest Keyloggers What’s a Keylogger and how does it exploit a Web Application? Downloaded unknowingly Resident on Personal Computers Captures User Activity Usually part of a malicious Network or BOTNET

Keylogger Preventions Train users Implement effective Anti-Spyware, Anti-Virus Keep patches and current versions Firewall Automatic form filler programs Cut and paste One-time passwords Smartcards Virtual keyboards

Virtual Keyboard .

Virtual Keyboard Some of the features of Virtual Keyboard Include: Highly effective in evading true “Key Logging” Widely used by many financial institutions Low cost technology to deploy (even for 50 million users) Does not require any new hardware or software on client machines Can work in conjunction with the existing keyboard Keys can be entered by mouse click or by leaving mouse on the key for 2 seconds Virtual keyboard randomly shifts on the screen

THANK YOU