Web-Technology Lecture 11.

Slides:



Advertisements
Similar presentations
Security by Design A Prequel for COMPSCI 702. Perspective “Any fool can know. The point is to understand.” - Albert Einstein “Sometimes it's not enough.
Advertisements

SEC835 OWASP Top Ten Project.
COMP 321 Week 12. Overview Web Application Security  Authentication  Authorization  Confidentiality Cross-Site Scripting Lab 12-1 Introduction.
System and Network Security Practices COEN 351 E-Commerce Security.
Information Networking Security and Assurance Lab National Chung Cheng University The Ten Most Critical Web Application Security Vulnerabilities Ryan J.W.
It’s always better live. MSDN Events Securing Web Applications Part 1 of 2 Understanding Threats and Attacks.
Information Networking Security and Assurance Lab National Chung Cheng University 1 Top Vulnerabilities in Web Applications (I) Unvalidated Input:  Information.
Installing and Configuring a Secure Web Server COEN 351 David Papay.
The 10 Most Critical Web Application Security Vulnerabilities
Security Guidelines and Management
Designing Security In Web Applications Andrew Tomkowiak 10/8/2013 UW-Platteville Software Engineering Department
Web Application Vulnerabilities Checklist. EC-Council Parameter Checklist  URL request  URL encoding  Query string  Header  Cookie  Form field 
Website Hardening HUIT IT Security | Sep
Security and Risk Management. Who Am I Matthew Strahan from Content Security Principal Security Consultant I look young, but I’ve been doing this for.
Copyright © 2002 ProsoftTraining. All rights reserved. Operating System Security.
1 Infrastructure Hardening. 2 Objectives Why hardening infrastructure is important? Hardening Operating Systems, Network and Applications.
OWASP Zed Attack Proxy Project Lead
Samuvel Johnson nd MCA B. Contents  Introduction to Real-time systems  Two main types of system  Testing real-time software  Difficulties.
Security.NET Chapter 1. How Do Attacks Occur? Stages of attack Examples of attacker actions 1. FootprintRuns a port scan on the firewall 2. PenetrationExploits.
The OWASP Way Understanding the OWASP Vision and the Top Ten.
Security Management prepared by Dean Hipwell, CISSP
CSC 2720 Building Web Applications Web Application Security.
November 13, 2008 Ohio Information Security Forum Attack Surface of Web Applications James Walden Northern Kentucky University
Common Cyber Defenses Tom Chothia Computer Security, Lecture 18.
Internet of Things Top Ten. Agenda -Introduction -Misconception -Considerations -The OWASP Internet of Things Top 10 Project -The Top 10 Walkthrough.
October 3, 2008IMI Security Symposium Application Security through a Hacker’s Eyes James Walden Northern Kentucky University
Web Applications Testing By Jamie Rougvie Supported by.
Building Secure Web Applications With ASP.Net MVC.
Module 14: Securing Windows Server Overview Introduction to Securing Servers Implementing Core Server Security Hardening Servers Microsoft Baseline.
Deconstructing API Security
Security fundamentals Topic 2 Establishing and maintaining baseline security.
CS526Topic 12: Web Security (2)1 Information Security CS 526 Topic 9 Web Security Part 2.
Module 12: Responding to Security Incidents. Overview Introduction to Auditing and Incident Response Designing an Audit Policy Designing an Incident Response.
Engineering Secure Software. Agenda  What is IoT?  Security implications of IoT  IoT Attack Surface Areas  IoT Testing Guidelines  Top IoT Vulnerabilities.
Mr. Justin “JET” Turner CSCI 3000 – Fall 2015 CRN Section A – TR 9:30-10:45 CRN – Section B – TR 5:30-6:45.
Copyright © The OWASP Foundation This work is available under the Creative Commons SA 2.5 license The OWASP Foundation OWASP Denver February 2012.
Role Of Network IDS in Network Perimeter Defense.
ASP.NET 2.0 Security Alex Mackman CM Group Ltd
Unit 2 Personal Cyber Security and Social Engineering Part 2.
Information Systems Design and Development Security Precautions Computing Science.
SemiCorp Inc. Presented by Danu Hunskunatai GGU ID #
SECURE DEVELOPMENT. SEI CERT TOP 10 SECURE CODING PRACTICES Validate input Use strict compiler settings and resolve warnings Architect and design for.
Lecture 19 Page 1 CS 236 Online 6. Application Software Security Why it’s important: –Security flaws in applications are increasingly the attacker’s entry.
ArcGIS for Server Security: Advanced
Web Application Vulnerabilities
Web Application Vulnerabilities, Detection Mechanisms, and Defenses
Critical Security Controls
Chapter 7: Identifying Advanced Attacks
TOPIC: Web Security (Part-4)
Web-Technology Exam preparation.
API Security Auditing Be Aware,Be Safe
Configuring and Troubleshooting Routing and Remote Access
Penetration Testing following OWASP
What is REST API ? A REST (Representational State Transfer) Server simply provides access to resources and the REST client accesses and presents the.
A Security Review Process for Existing Software Applications
Security mechanisms and vulnerabilities in .NET
Marking Scheme for Semantic-aware Web Application Security
Relevance of the OWASP Top 10
Intro to Ethical Hacking
Research for Cyber Security Warwick University Industry Day 2018
Website Security for Developers
Riding Someone Else’s Wave with CSRF
Lecture 2 - SQL Injection
Operating System Security
WWW安全 國立暨南國際大學 資訊管理學系 陳彥錚.
Lecture 27 Security I April 4, 2018 Open news web sites.
Designing IIS Security (IIS – Internet Information Service)
6. Application Software Security
Presentation transcript:

Web-Technology Lecture 11

Household issues Midterm Assignment 3 Course evaluation on Caracal Has been graded If you have a question about your grade / want to review your answer E-mail to me Assignment 3 Deadline has been slightly extended Last time Course evaluation on Caracal https://caracal.uu.nl  Between 3-4-2018 and 29-4-2018

Exam When: 13-4-2018 at 8.30-10.30; EDUC-BETA Where: EDUC-BETA Retake: EDUC-ALFA The exam is closed-book Closed-slides Closed-notes Closed-laptop Closed-phone Closed-neighbour You can use scratch paper, of course Paper and pens/pencils will not be provided Grading 30% of the course grade

More deadlines 15/04/2017: Assignment 3 submission 23/04/2017: Assignment 3 grades are posted 23/04/2017: Final Exam grades are e-mailed to you 25/04/2017: Deadline for grades to be disputed 27/04/2017: Course grades are entered into Osiris

Materials for exam preparation Lecture Slides Reading page

Topics: a look back (..and a bit forward) Lecture 7 Web app architecture; Intro to Node.js Lecture 8 Stateful Web Cookies Lecture 9 Express.js, Web Databases Lecture 10 AJAX Lecture 11 Security Lecture 12 Adaptive Web Lecture 13 Semantic Web Lecture 14 Social Web Lecture 15 Security - II

WebApp Security

OWASP Top Ten 2017 1: Injection 2004 2007 2013 2017 OWASP Top Ten 2017 https://www.owasp.org/index.php/Top_10-2017_Top_10 1: Injection 2: Broken Authentication and Session Management 3: Sensitive Data Exposure 4: XML External Entities (XXE) 5: Broken Access Control 6: Security Misconfiguration 7: Cross-Site Scripting (XSS) 8: Insecure deserialization 9: Using Components with Known Vulnerabilities 10: Insufficient logging and monitoring

A3-2017: Sensitive Data Exposure

A3-2017: General info Sensitive data must be protected financial info health info Identity info Passwords If your app collects such data it must be protected, you are liable (General Data Protection Regulation – GDPR) Data can be exposed when Stored Transferred Exposed means It exists in plain text or It is encrypted using old/weak technology

A3-2017: Examples of attack Initial target - user Initial target - app

A3-2017: Protection

A4-2017: XML External Entities (XXE)

A4-2017: XML External Entities (XXE) XML standard allows the use of DTDs (Document Type Definitions) DTDs are meant to define expected structure of XML documents One interesting feature of DTDs is the ability to define Entities as shortcuts for strings <!ENTITY YN ‘”YES”’ > <!ENTITY WhatHasSaid “He said &YN; “ > Would resolve to He said “Yes” <!ENTITY f “foo” > <!ENTITY foobar “&f;bar” > <element>&foobar;</element> Would put foobar in the element “element”

A4-2017: Classic XXE Other flavors: Port scanning Directory listing …

A4-2017: Denial of service XXE Works based on the expansion property of XML entities For example, this simple 1 Kb file expand into 3Gb of memory on the server:

A4-2017: How to protect When possible, use less complex data formats such as JSON Patch or upgrade all XML processors and libraries in use by the application or on the underlying operating system Disable XML external entity and DTD processing in all XML parsers in the application Implement positive ("whitelisting") server-side input validation, filtering, or sanitization to prevent hostile data within XML documents, headers, or nodes

A6-2017: Security misconfiguration Missing appropriate security hardening across any part of the application stack: unnecessary features enabled (e.g. unnecessary ports, services, pages, accounts, or privileges), using default credentials, leaving files unprotected on public servers, error handling reveals stack traces, software is unpatched… The infamous Mirai botnet of 2016 relied on unchanged default credentials (such as a login of “admin” and a password of “1234”) of about 60 specific IoT devices. When exploited, it eventually infected nearly 400,000 units of just those 60 unprotected devices.

A8-2017: Insecure deserialization Serialization - transformed of an object into a binary form often done before storying/caching/exchanging objects Deserialization - reassembling a series of bits back into an object The source and content of object needs to be verified before deserialization Otherwise, attackers can modified serialized data and build illegitimate objects that execute commands within an infected application Prevention: integrity checks such as digital signatures on serialized objects strict type constraints during deserialization before object creation running code that reserializes in low privilege environments Monitoring deserialization exceptions Monitoring incoming and outgoing network connectivity from sources of serialized data

A9-2017: Components with Vulnerabilities When vulnerabilities become known, vendors generally fix them with a patch or update OSs, web servers, DBMSs, applications, frameworks, APIs, runtime environments, and libraries If a vulnerability exists, assume, everyone knows about it and knows how to exploit it Scan subscribe, update and patch IoT is especially problematic in this regard (patching might be irregular for some devices) The former CEO of Equifax, while testifying to Congress regarding their infamous 2017 breach, blamed it on someone in IT, stating “The human error was that the individual who’s responsible for communicating in the organization to apply the patch, did not.”

A10-2017: Insufficient logging and monitoring If you’re not looking for attackers or suspicious activities, you’re not going to find them Software and systems have monitoring abilities to analyze (failed) logins (peaks in) traffic (incomplete or high-value) transactions Attackers rely on the lack of monitoring to exploit vulnerabilities before they’re detected Logging isn’t just important for identifying attacks in progress; it can assist with the forensic analysis after an attack has succeeded Make sure: Important and irregular events are logged Logs are in an effective format and are kept long enough High-value transactions have an audit trail with integrity controls to prevent tampering or deletion Effective monitoring and alerting is established