Error Message Handling

Slides:



Advertisements
Similar presentations
Chapter 6 Server-side Programming: Java Servlets
Advertisements

P5, M1, D1.
ITIS 1210 Introduction to Web-Based Information Systems Chapter 44 How Firewalls Work How Firewalls Work.
ATTACKING AUTHENTICATION The Web Application Hacker’s Handbook, Ch. 6 Presenter: Jie Huang 10/31/2012.
Exploiting Information Disclosure Vincent CH14. Introduction In this chapter, we will try to extract further information from an application during an.
1 Configuring Internet- related services (April 22, 2015) © Abdou Illia, Spring 2015.
It’s always better live. MSDN Events Security Best Practices Part 2 of 2 Reducing Vulnerabilities using Visual Studio 2008.
Server-Side vs. Client-Side Scripting Languages
1 Configuring Web services (Week 15, Monday 4/17/2006) © Abdou Illia, Spring 2006.
Information Networking Security and Assurance Lab National Chung Cheng University The Ten Most Critical Web Application Security Vulnerabilities Ryan J.W.
Information Networking Security and Assurance Lab National Chung Cheng University 1 Top Vulnerabilities in Web Applications (I) Unvalidated Input:  Information.
Social Engineering Jero-Jewo. Case study Social engineering is the act of manipulating people into performing actions or divulging confidential information.
Web server security Dr Jim Briggs WEBP security1.
CUWebAuth Technical Presentation Pete Bosanko Identity Management Team.
Maintaining and Updating Windows Server 2008
 Proxy Servers are software that act as intermediaries between client and servers on the Internet.  They help users on private networks get information.
Web Proxy Server Anagh Pathak Jesus Cervantes Henry Tjhen Luis Luna.
.NET Health Monitoring Jonathan Franco ITD Application Services.
Varun Sharma Security Engineer | ACE Team | Microsoft Information Security
Designing Security In Web Applications Andrew Tomkowiak 10/8/2013 UW-Platteville Software Engineering Department
CONTENTS:-  What is Event Log Service ?  Types of event logs and their purpose.  How and when the Event Log is useful?  What is Event Viewer?  Briefing.
Incident Response Updated 03/20/2015
Web-based Document Management System By Group 3 Xinyi Dong Matthew Downs Joshua Ferguson Sriram Gopinath Sayan Kole.
IT533 Lectures Configuring, Deploying, Tracing and Error Handling.
Electronically approve and create Suppliers in Oracle Financials using a combination of APEX and Oracle Workflow. NZOUG Conference 2010 Brad Sayer Team.
JavaScript & jQuery the missing manual Chapter 11
T U T O R I A L  2009 Pearson Education, Inc. All rights reserved Bookstore Web Application Introducing Visual Web Developer 2008 Express and the.
Chapter 9 Web Applications. Web Applications are public and available to the entire world. Easy access to the application means also easy access for malicious.
Copyright 2000 eMation SECURITY - Controlling Data Access with
Malicious Attack Corporate Awareness and Walk through Date 29 September 2011.
Module 10: Monitoring ISA Server Overview Monitoring Overview Configuring Alerts Configuring Session Monitoring Configuring Logging Configuring.
Software Project Documentation. Types of Project Documents  Project Charter  Requirements  Mockups and Prototypes  Test Cases  Architecture / Design.
DEMO - 8/14/2007. R2 Feature List ReceiveDocumentBatch Web Service SendPESCAcknowledgment Web Service Validate Acknowledgment Upload Acknowledgment Transcript.
Top Five Web Application Vulnerabilities Vebjørn Moen Selmersenteret/NoWires.org Norsk Kryptoseminar Trondheim
FLOOR CANDY.
10 Reasons to Choose the Yii Framework. The development of Yii framework began on January 1, 2008.Yii framework It is an open source application that.
OCTAVE-S on TradeSolution Inc.. Introduction Phase 1: Critical Assets and threats Phase 2: Critical IT Components Phase 3: Changes Required in current.
Building Secure Web Applications With ASP.Net MVC.
Chapter 4: Working with ASP.NET Server Controls OUTLINE  What ASP.NET Server Controls are  How the ASP.NET run time processes the server controls on.
WWW: an Internet application Bill Chu. © Bei-Tseng Chu Aug 2000 WWW Web and HTTP WWW web is an interconnected information servers each server maintains.
The Software Development Process
Vinay Paul. CONTENTS:- What is Event Log Service ? Types of event logs and their purpose. How and when the Event Log is useful? What is Event Viewer?
Configuring and Troubleshooting Identity and Access Solutions with Windows Server® 2008 Active Directory®
PHP Error Handling & Reporting. Error Handling Never allow a default error message or error number returned by the mysql_error() and mysql_errno() functions.
ASSIGNMENT 2 Salim Malakouti. Ticketing Website  User submits tickets  Admins answer tickets or take appropriate actions.
1111 Creating HTML Programatically Objectives You will be able to Invoke C# code on the server from an ASP.NET page. Write C# code to create HTML.
Text INTRODUCTION TO ASP.NET. InterComm Campaign Guidelines CONFIDENTIAL Simply Server side language Simplified page development model Modular, well-factored,
: Information Retrieval อาจารย์ ธีภากรณ์ นฤมาณนลิณี
Securing Web Applications Lesson 4B / Slide 1 of 34 J2EE Web Components Pre-assessment Questions 1. Identify the correct return type returned by the doStartTag()
S ECURE PROGRAMMING NOTES 05 Access Control Flaws 1.
ASP.NET 2.0 Security Alex Mackman CM Group Ltd
Northwest Arkansas.Net User Group Jay Smith Tyson Foods, Inc. Unit Testing nUnit, nUnitAsp, nUnitForms.
By Collin Donaldson. Hacking is only legal under the following circumstances: 1.You hack (penetration test) a device/network you own. 2.You gain explicit,
How to fix Error code 0x80072ee2 in Windows 8.1? Fix%20%20Update%20Error%200x80072EE2%20in%20Windows%20 8.1,%20Windows%2010!%20-%20Fix%20PC%20Errors.htm.
Chapter 1 Getting Started with ASP.NET Objectives Why ASP? To get familiar with our IDE (Integrated Development Environment ), Visual Studio. Understand.
WEB TESTING
Architecture Review 10/11/2004
Web Development Web Servers.
Data Virtualization Tutorial… CORS and CIS
Chapter 2: System Structures
Server Concepts Dr. Charles W. Kann.
Security mechanisms and vulnerabilities in .NET
Haritha Dasari Josue Balandrano Coronel -
BASICS OF SOFTWARE TESTING Chapter 1. Topics to be covered 1. Humans and errors, 2. Testing and Debugging, 3. Software Quality- Correctness Reliability.
What The Right Steps To Check RR Mail If It Is Hacked?
MIS Professor Sandvig MIS 324 Professor Sandvig
Exception Handling .NET MVC
Lesson 16-Windows NT Security Issues
About us Gmail is a famous service which we use on a daily basis for sending s, getting promotional messages of certain products, receiving.
Lecture 34: Testing II April 24, 2017 Selenium testing script 7/7/2019
Presentation transcript:

Error Message Handling

Improper handling of errors can introduce a variety of security problems for a web site. The most common problem is when detailed internal error messages such as stack traces, database dumps, and error codes are displayed to the user (hacker). These messages reveal implementation details that should never be revealed. These errors must be handled according to a well thought out scheme that will: provide a meaningful error message to the user diagnostic information to the site maintainers no useful information to an attacker Such details can provide hackers important clues on potential flaws in the site and such messages are also disturbing to normal users.

Example Even when error messages don’t provide a lot of detail, inconsistencies in such messages can still reveal important clues on how a site works, and what information is present under the covers. For example, when a user tries to access a file that does not exist, the error message typically indicates, “file not found”. When accessing a file that the user is not authorized for, it indicates, “access denied”. The user is not supposed to know the file even exists, but such inconsistencies will readily reveal the presence or absence of inaccessible files or the site’s directory structure.

Good error handling practices Good error handling mechanisms should be able to handle: any feasible set of inputs while enforcing proper security Simple error messages should be: produced and logged so that their cause, whether an error in the site or a hacking attempt, can be reviewed.

How to determine vulnerability Thorough testing Code review

How to protect? Errors should be documented including: the types of errors to be handled and for each, what information is going to be reported back to the user  what information is going to be logged  When errors occur, the site should respond with a specifically designed result that is helpful to the user without revealing unnecessary internal details The ability to detect/track failures

Server log Viewing Guidelines A good approach to keep up to dated with the server error logs is to keep periodically checking on the Log Viewer for server errors. As QA, we should check the log viewer at the end of every sprint, and share the number and type of errors logged via a generic ticket with the development team.  Another good exercise would be to lookup the error logs before starting to test a new feature/task. When you are done with testing the feature/task, check the error logs again, if there are any error logs that appeared during the testing of that feature, share the findings with development team within that particular task's comments section. This can help us pinpoint the change that set off the error logs.

Another good practice would be 'Set an Alarm' on daily basis, so that the error log reports can be sent to our email on hourly/daily/weekly basis. Ideally, the number of error logs should reduce with every sprint. If not, then we can bring this point into notice to our team and TAG. The URL is as follows: http://logviewer.togethersupport.co.uk/ 

Screens of death A Yellow Screen of Death (also called YSoD) occurs when an ASP.NET web application encounters a problem and crashes.[4] It also appears on the browser Mozilla Firefox when there are errors in reading the .xml web format.  It can be caused by unhandled exceptions in your code, by making requests to resources that do not exist, etc. 

References https://mvcdeveloper.wordpress.com/2013/06/26/preventing-or- minimizing-yellow-screen-of-death-in-asp-net-mvc/ https://www.owasp.org/index.php/Improper_Error_Handling https://www.owasp.org/index.php/Testing_for_Error_Code_%28OTG- ERR-001%29