Advanced Penetration testing

Slides:



Advertisements
Similar presentations
Webgoat.
Advertisements

Hands-on SQL Injection Attack and Defense HI-TEC July 21, 2013.
© Leaf Solutions, LLC. All Rights Reserved What’s New in Everett Microsoft.Net V1.1.
Network Security Attack Analysis. cs490ns - cotter2 Outline Types of Attacks Vulnerabilities Exploited Network Attack Phases Attack Detection Tools.
Creating Stronger, Safer, Web Facing Code JPL IT Security Mary Rivera June 17, 2011.
WebGoat & WebScarab “What is computer security for $1000 Alex?”
Security Issues and Challenges in Cloud Computing
1 Project Part II Double Deuce Jibran Ilyas, Frank LaSota, Paul Lowder, Juan Mendez.
Information Networking Security and Assurance Lab National Chung Cheng University The Ten Most Critical Web Application Security Vulnerabilities Ryan J.W.
It’s always better live. MSDN Events Securing Web Applications Part 1 of 2 Understanding Threats and Attacks.
Advanced Security Center Overview Northern Illinois University.
Information Networking Security and Assurance Lab National Chung Cheng University 1 Top Vulnerabilities in Web Applications (I) Unvalidated Input:  Information.
Information Networking Security and Assurance Lab National Chung Cheng University WebGoat.
Presenter Deddie Tjahjono.  Introduction  Website Application Layer  Why Web Application Security  Web Apps Security Scanner  About  Feature  How.
Web Application Security
Copyright © The OWASP Foundation Permission is granted to copy, distribute and/or modify this document under the terms of the Creative Commons Attribution-ShareAlike.
External Threats to Healthcare Data Joshua Spencer, CPHIMS, C | EH.
HTTP and Server Security James Walden Northern Kentucky University.
Copyright © 2008, CIBER Norge AS 1 Web Application Security Nina Ingvaldsen 22 nd October 2008.
November 13, 2008 Ohio Information Security Forum Attack Surface of Web Applications James Walden Northern Kentucky University
MIS Week 9 Site:
August 1, The Software Security Problem August 1, 2006.
Copyright 2007 © The OWASP Foundation Permission is granted to copy, distribute and/or modify this document under the terms of the OWASP License. The OWASP.
Copyright © The OWASP Foundation Permission is granted to copy, distribute and/or modify this document under the terms of the GNU Free Documentation.
Web Application Security ECE ECE Internetwork Security What is a Web Application? An application generally comprised of a collection of scripts.
MIS Week 7 Site:
October 3, 2008IMI Security Symposium Application Security through a Hacker’s Eyes James Walden Northern Kentucky University
Security Attacks CS 795. Buffer Overflow Problem Buffer overflows can be triggered by inputs that are designed to execute code, or alter the way the program.
Input Validation – common associated risks  ______________ user input controls SQL statements ultimately executed by a database server
Web Applications Testing By Jamie Rougvie Supported by.
1 The current lesson plans provided for in Webgoatv2 include Http Basics How to Perform Database Cross Site Scripting (XSS) How to Spoof an Authentication.
Building Secure Web Applications With ASP.Net MVC.
Cloud = Web, Web = Hacked! Fabio Viggiani. Why Web Apps? Every organization exposes web apps Most common entry point Image source:
Copyright Security-Assessment.com 2004 Security-Assessment.com Advances in Web Application Hacking by Nick von Dadelszen.
Network Security. Announcements Review Assignment - Assessment 3 (due Tuesday, before class) Assessment 3 – Next Thursday Reminders: Network Design Project.
Network Security. Announcements Review Assignment - Assessment 3 (due Tuesday, before class) Assessment 3 – Next Thursday Reminders: Network Design Project.
OWASP Building Secure Web Applications And the OWASP top 10 vulnerabilities.
Copyright © The OWASP Foundation Permission is granted to copy, distribute and/or modify this document under the terms of the Creative Commons Attribution-ShareAlike.
Example – SQL Injection MySQL & PHP code: // The next instruction prompts the user is to supply an ID $personID = getIDstringFromUser(); $sqlQuery = "SELECT.
Defending Applications Against Command Insertion Attacks Penn State Web Conference 2003 Arthur C. Jones June 18, 2003.
MIS Week 5 Site:
MIS Week 9 Site:
10 Tips for Building a Secure PHP Application. Tip 1: Use Proper Error Reporting/Handling  The development process of the application can become very.
Lecture 19 Page 1 CS 236 Online 6. Application Software Security Why it’s important: –Security flaws in applications are increasingly the attacker’s entry.
Web Application Vulnerabilities
Chapter 7: Identifying Advanced Attacks
TOPIC: Web Security (Part-4)
World Wide Web policy.
Example – SQL Injection
Daniel Kouril Sven Gabriel
Conquering all phases of the attack lifecycle
How Seculert Discovered the Shamoon Malware
Human Factors in Security Phishing, Scam, Leaked Credentials
MIS Professor Sandvig MIS 324 Professor Sandvig
Application Security Namuo – CIS 160
Myths About Web Application Security That You Need To Ignore.
Advanced Penetration testing
Double Deuce Jibran Ilyas, Frank LaSota, Paul Lowder, Juan Mendez
امنیت نرم‌افزارهای وب تقديم به پيشگاه مقدس امام عصر (عج) عباس نادری
Advanced Penetration testing
Double Deuce Jibran Ilyas, Frank LaSota, Paul Lowder, Juan Mendez
Lecture 2 - SQL Injection
WEBGOAT REPORT 이름: 무하마드 간자르 학과: 사이버 경찰.
Security at the Source.
WWW安全 國立暨南國際大學 資訊管理學系 陳彥錚.
Unit 32 Every class minute counts! 2 assignments 3 tasks/assignment
Advanced Penetration testing
6. Application Software Security
Advanced Penetration testing
Presentation transcript:

Advanced Penetration testing MIS 5212.001 Week 8 Site: http://community.mis.temple.edu/mis5212sec001s15/

Tonight's Plan In the news Presentations (1) More Walk Through of WebGoat Next Week MIS 5212.001

In The News Submitted http://www.csoonline.com/article/2131323/data-protection/134543-7-security-mistakes-people-make-with-their-mobile-device.html#slide1 http://www.darkreading.com/endpoint/startup-focuses-on-stopping-data-exfiltration/d/d-id/1319387 http://www.usatoday.com/story/money/cars/2015/02/09/markey-cars-hacking-regulations-cybersecurity/23118365/ http://networksecurityreport.siteblogs.net/2015/02/28/car-thieves-can-easily-hack-remote-keyless-systems/ MIS 5212.001

In The News Submitted http://mashable.com/2015/03/10/cia-targets-apple/ http://www.infosecurity-magazine.com/news/cia-spy-campaign-against-apple/ http://www.pandasecurity.com/mediacenter/panda-security/information-regarding-issue-with-the-signature-file-pcop-retail-2015/ http://www.theregister.co.uk/2015/03/11/panda_antivirus_update_self_pwn/ http://gizmodo.com/why-people-keep-trying-to-erase-the-hollywood-sign-from-1658084644 MIS 5212.001

In The News What I noted http://www.computerworld.com/article/2895057/lawsuit-seeks-damages-against-automakers-and-their-hackable-cars.html http://www.theguardian.com/technology/2015/mar/10/cia-tried-to-crack-security-of-apple-devices https://threatpost.com/patched-windows-machines-exposed-to-stuxnet-lnk-flaw-all-along/111558 http://krebsonsecurity.com/2015/03/point-of-sale-vendor-nextep-probes-breach/ http://krebsonsecurity.com/all-about-skimmers/ MIS 5212.001

Presentation MIS 5212.001

WebGoat Access Control Flaws Authentication Flaws Cross-Site Scripting Stage 1 Stage 2 Authentication Flaws Cross-Site Scripting Phishing Stage 5 Reflected XSS Attacks Improper Error Handling Fail Open Authentication Scheme MIS 5212.001

WebGoat Injection Flaws: Command Injection: " & netstat -ant & ifconfig“ Numerical SQL Injection: or 1=1 Log Spoofing XPATH Injection String SQL Injection Modifying Data with SQL Injection Adding Data with SQL Injection Blind Numeric SQL Injection Blind String SQL Injection MIS 5212.001

Next Week In the news More Walkthrough of WebGoat MIS 5212.001

Questions ? MIS 5212.001