Binary and Protocol Security Assurance

Slides:



Advertisements
Similar presentations
Presented by: Benefits Systems Support. Getting Started ê Open Powerpoint, create a blank presentation. ê Select a style for your first slide from the.
Advertisements

1 ADVANCED MICROSOFT POWERPOINT Lesson 5 – Using Advanced Text Features Microsoft Office 2003: Advanced.
Information Networking Security and Assurance Lab National Chung Cheng University The Ten Most Critical Web Application Security Vulnerabilities Ryan J.W.
Information Networking Security and Assurance Lab National Chung Cheng University 1 Top Vulnerabilities in Web Applications (I) Unvalidated Input:  Information.
How Clients and Servers Work Together. Objectives Learn about the interaction of clients and servers Explore the features and functions of Web servers.
Operating System Security Chapter 9. Operating System Security Terms and Concepts An operating system manages and controls access to hardware components.
With Alex Conger – President of Webmajik.com FrontPage 2002 Level I (Intro & Training) FrontPage 2002 Level I (Intro & Training)
11 CONFIGURE INTERNET EXPLORER Chapter 5. Chapter 5: Configure Internet Explorer2 CHAPTER OVERVIEW AND OBJECTIVES  Configuring Accessibility and Language.
1 CA203 Presentation Application Customizing PowerPoint Lecture # 15.
Free Icons! Provided by Andrew Sellon
Introduction to PowerPoint 2003 Learning And Research Technical Unit (LARTU)
A Security Review Process for Existing Software Applications
CSE 4481 Computer Security Lab Mark Shtern. INTRODUCTION.
Troubleshooting Windows Vista Security Chapter 4.
Software Security Testing Vinay Srinivasan cell:
OSI and TCP/IP Models And Some Vulnerabilities AfNOG th May 2011 – 10 th June 2011 Tanzania By Marcus K. G. Adomey.
Operating System Security. OS manages and controls access to hardware components Older OSs focused on ensuring data confidentiality Modern operating systems.
Top Five Web Application Vulnerabilities Vebjørn Moen Selmersenteret/NoWires.org Norsk Kryptoseminar Trondheim
COMPUTER SECURITY MIDTERM REVIEW CS161 University of California BerkeleyApril 4, 2012.
CSE 4481 Computer Security Lab Mark Shtern. INTRODUCTION.
APPLICATION PENETRATION TESTING Author: Herbert H. Thompson Presentation by: Nancy Cohen.
CIS 450 – Network Security Chapter 14 – Specific Exploits for UNIX.
By: Gia Vuong Riyad Mahmud Narsimha Kalthy.  What is Mahara?  Logging into the ACS Portfolio  Using Mahara to Manage: ◦ Files ◦ Blogs ◦ External Feeds.
Foundation year Practical Lec. 4:Practical Lec. 4: Presentation Software Using Microsoft Office 2007 Practical Lec. 4:Practical Lec. 4: Presentation Software.
HTML Concepts and Techniques Fifth Edition Chapter 3 Creating Web Pages with Links, Images, and Formatted Text.
Mark Shtern.  Our life depends on computer systems  Traffic control  Banking  Medical equipment  Internet  Social networks  Growing number of.
Interactions & Automations
Creating Web Pages with Links, Images, and Embedded Style Sheets
Enhancing a Presentation with Pictures, Shapes, and WordArt
Chapter 11 Enhancing an Online Form and Using Macros Microsoft Word 2013.
Teaching Security of Internet of Things in Using RaspberryPi Oliver Nichols, Li Yang University of Tennessee at Chattanooga Xiaohong Yuan North Carolina.
Introduction to Word XP
Web Application Vulnerabilities
OpenStorage MetaData OST MetaData.
Computer Literacy BASICS
Working with Data Blocks and Frames
Operating System Security
Welcome: Hands-On Lab Plug in to the network.
Web Application Vulnerabilities, Detection Mechanisms, and Defenses
Security: Exploits & Countermeasures
Security: Exploits & Countermeasures
K. K. Mookhey Network Intelligence India Pvt. Ltd.
How to Use this PowerPoint Template
Module Overview Installing and Configuring a Network Policy Server
API Security Auditing Be Aware,Be Safe
Configuring and Troubleshooting Routing and Remote Access
What is REST API ? A REST (Representational State Transfer) Server simply provides access to resources and the REST client accesses and presents the.
A Security Review Process for Existing Software Applications
Secure Software Development: Theory and Practice
Shelly Cashman: Microsoft PowerPoint 2016
Bomgar Remote support software
Marketing Automation for the Fortune 5,000,000
Microsoft Publisher 2010.
Windows Internet Explorer 7-Illustrated Essentials
PowerPoint Quick Tips Bad Ischl, Nov
A Discerning Approach to 3rd Party Testing Overview of 3rd Party Testing, including latest Symantec Endpoint Protection Results from the Tolly Group September.
Operating System Security
How to Break Web Application Security
Lesson 4: Formatting Cells
Presenter’s Name, Title May 26, 2009
Microsoft Publisher 2010.
Security: Exploits & Countermeasures
Security: Exploits & Countermeasures
Software Security Slide Set #10 Textbook Chapter 11 Clicker Questions
Security: Exploits & Countermeasures
Operating System Concepts
Designing IIS Security (IIS – Internet Information Service)
Security: Attacks & Countermeasures
Welcome To Microsoft Word 2016
Presentation transcript:

Binary and Protocol Security Assurance Mahesh Saptarshi, Technical Director Symantec software India Pvt Ltd

Agenda 1 Disclaimers, requests, etc 2 Security Bugs – what, how, and their classification 3 Security assurance of Binary – 3rd party modules This is a sample “Agenda/Preview” slide. This slide is ideal for “setting the scene” at the beginning of your presentation by providing a “big picture” overview of what you plan to cover. To Change Slide Title: In Normal View (View > Normal), triple click on the title placeholder to select the title text and begin typing desired text. To Change Titles in Shapes (i.e.: “Text here”): Place cursor on top of text in Shape and triple click to select text. Begin typing desired text. To Change Font Color/Size: Place cursor on top of text and triple click to select it. right-click and select “Font” from the drop-down menu. Select desired attributes to change font, size, boldness, color, etc. Note: many of the same commands can also be accessed from the “Font" group of the “Home” tab or from the “Mini” toolbar that appears when text is selected. To Change a Shape’s Fill Color: double-click along edge of Shape to activate the “Drawing Tools Format” tab. Click the “Shape Fill” button within the “Shape Styles” group to select a color or desired effect. To choose a custom color, click on the “More Fill Colors” option. Choose “Picture,” “Gradient” or “Texture” to set a gradient, texture, pattern and/or picture fill. To Delete a Shape: Select the edge of the desired object by clicking once. Press the “Delete” key from your computer keypad. To Copy a Shape: Select the edge of the desired object by clicking once (making certain the selection border appears around the object to be copied). Type “Ctrl C” (copy), click outside object, then type “Ctrl V” (paste) to place the object. Click and drag the pasted object to desired location. 4 Security assurance of network protocols 5 Tools and techniques for discovering security bugs 6 Summary and Q/A

Disclaimers, Requests, etc Not Symantec company position, statement or policy Focus on the technical details Cell phones - Please activate vibrate/quiet mode Ask a question any time Q&A time also at the end Much of the material is learned by practice 3

Security Bugs – What Assets, threats, Software bugs aka vulnerabilities Threats always exist – probabilities vary Vulnerabilities make exploits possible Threats can be mitigated – reduced probability Threats != attacks Vulnerabilities != attacks Attacks – attempts by malicious entity to actuate a threat Our aim – Eliminate or mitigate vulnerabilities To foil attacks So that probability of a threat is reduced So that the asset is secure 4

So that the asset is secure Our Goal Eliminate or mitigate vulnerabilities To foil attacks So that probability of a threat is reduced So that the asset is secure 5

Causes of Security bugs Security Bugs – Causes Causes of Security bugs Insecure design Insecure Coding Insecure environment Lack of proper data validation Lack of Security Assurance 6

Security Bugs –Examples Buffer overflow Cross site scripting Authentication bypass Escalation of privilege Arbitrary code execution SQL injection Arbitrary file modification/overwrite/truncation 7

Most prevalent security issues Input validation buffer overflow Cross site scripting SQL injection File path redirection Authentication bypass Session issues session hijack, session replay insufficient randomization Configuration security 9

Practical approach to finding security bugs Brute Force Fuzzing Feeding the application lots of different values of the data Values of data are derived by systematic or random changes to a valid value Network fuzzing, file fuzzing, API parameter fuzzing. Web request fuzzing Automation required – too many variations Intelligent Security assurance Targetted fuzzing Integer values at byte boundaries Size value and buffer size mismatch SQL query and cross domain scripting verification Path variation related attacks 10

Practical approach to hunting for security bugs – cont. Authentication related verification Session re-establishment protocol Frequent session or form reload testing Fake client instantiation Fake server instantiation Proxy and session break up Defaults verification by denying authentication protocol completion 11

Practical approach to hunting for security bugs – cont. Session issues Session hijack using a proxy MITM attack Session key management verification Encryption key management verification Session key exchange protocol verification Session timeout testing 12

Practical approach to hunting for security bugs – cont. Configuration Security File permissions File name generation and temporary file location Configuration file fuzzing and unreasonable values Locale related verification Registry entry permissions – DACLs Log file permissions – log analyzers and report generators Event viewers File overwrite attack using “log truncate” or “cleanup” action File upload/download and overwrite action Arbitrary file access action 13

Tools for hunting down security bugs Static source code analysis – Coverity, RATS, Findbugs, FxCOP Nessus – Port scanner and vulnerability verification NMAP – network mapper, services and OS security Wireshark – Sniffing network traffic SPIKE – network fuzzing Filemon/Regmon – monitoring file access,registry PEexplorer – exploring running processes IDA – debugger for analysing crash dumps WebInspect, AppScan, Cenzic hailstorm – web security attack tools 14

So that the asset is secure Summary Software Security bugs Eliminate or mitigate vulnerabilities To foil attacks So that probability of a threat is reduced So that the asset is secure 15

Mahesh Saptarshi Mahesh_saptarshi@symantec.com