Security Testing & The Depth Behind OWASP Top 10

Slides:



Advertisements
Similar presentations
January 30, 2014 Copyright Jim Farley Beyond JDBC: Java Object- Relational Mappings Jim Farley e-Commerce Program Manager GE Research and Development
Advertisements

DIGIDOC A web based tool to Manage Documents. System Overview DigiDoc is a web-based customizable, integrated solution for Business Process Management.
OWASP Mobile Top 10 Beau Woods
The OWASP Foundation Web Application Security Host Apps Firewall Host Apps Database Host Web serverApp serverDB server Securing the.
Copyright © The OWASP Foundation Permission is granted to copy, distribute and/or modify this document under the terms of the OWASP License. The OWASP.
Copyright © The OWASP Foundation Permission is granted to copy, distribute and/or modify this document under the terms of the OWASP License. The OWASP.
Infosec 2012 | 25/4/12 Application Performance Monitoring Ofer MAOR CTO Infosec 2012.
Chapter 13 Review Questions
OWASP Web Vulnerabilities and Auditing
OWASP Top Dave Wichers OWASP Top 10 Project Lead OWASP Board Member Cofounder, Aspect Security & Contrast Security.
PENETRATION TESTING Presenters:Chakrit Sanbuapoh Sr. Information Security MFEC.
Don’t get Stung (An introduction to the OWASP Top Ten Project) Barry Dorrans Microsoft Information Security Tools NEW AND IMPROVED!
SEC835 OWASP Top Ten Project.
Copyright © The OWASP Foundation Permission is granted to copy, distribute and/or modify this document under the terms of the OWASP License. The OWASP.
PRIMO AT THE ROYAL LIBRARY OF DENMARK Integrated search – Google of the library? Helsinki, October
A Demo of and Preventing XSS in.NET Applications.
Security Issues and Challenges in Cloud Computing
Hands-On Ethical Hacking and Network Defense
Barracuda Web Application Firewall
It’s always better live. MSDN Events Security Best Practices Part 2 of 2 Reducing Vulnerabilities using Visual Studio 2008.
Information Networking Security and Assurance Lab National Chung Cheng University 1 Top Vulnerabilities in Web Applications (I) Unvalidated Input:  Information.
Chapter 8 Security Transparencies © Pearson Education Limited 1995, 2005.
“Today over 70% of attacks against a company’s network come at the ‘Application Layer’ not the Network or System layer.” - Gartner Is Your Web Application.
Software Security Course Course Outline Course Overview Introduction to Software Security Common Attacks and Vulnerabilities Overview of Security.
Security Architecture Dr. Gabriel. Security Database security: –degree to which data is fully protected from tampering or unauthorized acts –Full understanding.
Glass Box Testing: Thinking Inside the Box Omri Weisman Manager, Security Research Group IBM Rational.
OWASP Mobile Top 10 Why They Matter and What We Can Do
NUAGA May 22,  IT Specialist, Utah Department of Technology Services (DTS)  Assigned to Department of Alcoholic Beverage Control  PCI Professional.
Workshop 3 Web Application Security Li Weichao March
Testing Tools. Categories of testing tools Black box testing, or functional testing Testing performed via GUI. The tool helps in emulating end-user actions.
Lessons Learned in Smart Grid Cyber Security
Security testing of study information system Security team: Matis Alliksoo Alo Konno Urmo Lihten Taavi Podzuks Sander Saarm.
Ryan Dewhurst - 20th March 2012 Web Application (PHP) Security.
Copyright 2007 © The OWASP Foundation Permission is granted to copy, distribute and/or modify this document under the terms of the OWASP License. The OWASP.
1 22 August 2001 The Security Architecture of the M&M Mobile Agent Framework P. Marques, N. Santos, L. Silva, J. Silva CISUC, University of Coimbra, Portugal.
International Telecommunication Union Geneva, 9(pm)-10 February 2009 ITU-T Security Standardization on Mobile Web Services Lee, Jae Seung Special Fellow,
Industry SDLCs and Business Climate. Justin Kalicharan Credentials Director and Senior Technology Officer Over 14 years of coding experience in various.
Copyright © The OWASP Foundation Permission is granted to copy, distribute and/or modify this document under the terms of the OWASP License. The OWASP.
Copyright © The OWASP Foundation Permission is granted to copy, distribute and/or modify this document under the terms of the OWASP License. The OWASP.
1 Geospatial and Business Intelligence Jean-Sébastien Turcotte Executive VP San Francisco - April 2007 Streamlining web mapping applications.
12 Steps to Cloud Security A guide to securing your Cloud Deployment Vishnu Vettrivel Principal Engineering Lead,
Web Applications Testing By Jamie Rougvie Supported by.
Copyright © The OWASP Foundation Permission is granted to copy, distribute and/or modify this document under the terms of the OWASP License. The OWASP.
Lesson 19-E-Commerce Security Needs. Overview Understand e-commerce services. Understand the importance of availability. Implement client-side security.
CSCE 548 Secure Software Development Security Operations.
Deconstructing API Security
Copyright © The OWASP Foundation Permission is granted to copy, distribute and/or modify this document under the terms of the OWASP License. The OWASP.
Engineering Secure Software. Agenda  What is IoT?  Security implications of IoT  IoT Attack Surface Areas  IoT Testing Guidelines  Top IoT Vulnerabilities.
//ALPHA.1 OWASP Knoxville Application Security Then and Now. Make a Difference Now 2015 June 11 Phil Agcaoili.
Ken De Souza KWSQA, April 2016 V. 1.0
Building Preservation Environments with Data Grid Technology Reagan W. Moore Presenter: Praveen Namburi.
Lecturer: Eng. Mohamed Adam Isak PH.D Researcher in CS M.Sc. and B.Sc. of Information Technology Engineering, Lecturer in University of Somalia and Mogadishu.
SECURE DEVELOPMENT. SEI CERT TOP 10 SECURE CODING PRACTICES Validate input Use strict compiler settings and resolve warnings Architect and design for.
The Fallacy Behind “There’s Nothing to Hide” Why End-to-End Encryption Is a Must in Today’s World.
Security Autodesk DevDays rEvolution
Web Application Protection Against Hackers and Vulnerabilities
Web Application Vulnerabilities, Detection Mechanisms, and Defenses
Securing Your Web Application in Azure with a WAF
Vulnerability Chaining Every Low Issue Has its big impact
Finding and Fighting the Causes of Insecure Applications
1. ASSOCILATE DEGREE PROGRAM Application Attacks SUBMITTED TO: Fatima Ashiq SUBMITTED By: University Of Central Punjab Farooq Sardar (V1F16ASOC0012) Adnan.
BOMGAR REMOTE SUPPORT Karl Lankford
Research for Cyber Security Warwick University Industry Day 2018
The University of Adelaide, School of Computer Science
Finding and Fighting the Causes of Insecure Applications
IT Management Services Infrastructure Services
Presentation transcript:

Security Testing & The Depth Behind OWASP Top 10 Yaniv Simsolo, CISSP Image: Hubble Telescope: The cat’s eye nebula

OWASP Top 10 2013 OWASP Top 10 – 2013 has evolved: 2013-A1 – Injection 2013-A2 – Broken Authentication and Session Management 2013-A3 – Cross Site Scripting (XSS) 2013-A4 – Insecure Direct Object References 2013-A5 – Security Misconfiguration 2013-A6 – Sensitive Data Exposure 2013-A7 – Missing Function Level Access Control 2013-A8 – Cross-Site Request Forgery (CSRF) 2013-A9 – Using Known Vulnerable Components (NEW) 2013-A10 – Unvalidated Redirects and Forwards

OWASP Top 10 2013 OWASP Top 10 – 2013 Resources: https://www.owasp.org/index.php/Top_10_2013-Top_10 OWASP Top 10 2013 presentation by Dave Wichers, on the OWASP web site

Mapping Top 10: From 2010 to 2013 Source: OWASP Top 10 2013 presentation by Dave Wichers

Assumptions In Information Security – several top 10 exist OWASP Top 10 is dominant “Top 3”: we all know about XSS’s Injections, CSRF’s etc. Most organizations are well aware of these issues

Assumptions OK. What now? “Top 6” = (“Top 3”) + (“we test what we can”): Broken authentication and session management Unvalidated redirects and forwards Insecure direct object references Most organizations are aware of these issues OK, What now?

What did we miss? Security misconfiguration – A5. Missing Function Level access control – A7. Using known vulnerable components – A9 A6 – sensitive data exposure now includes a merge of: Insufficient transport layer protection (2010 – A9) Insecure cryptographic storage (2010-A7)

What did we miss? Security misconfiguration – A5. (almost) not Web Application but: Application/system Missing Function Level access control – A7. Partial Web Application, Partial Application/system Using known vulnerable components – A9 (almost) not Web Application but: Application/syste

What did we miss? A6 – sensitive data exposure now includes a merge of: Insufficient transport layer protection (2010 – A9) Insecure cryptographic storage (2010-A7) Is this just Web Application? Is the problem more severe once we look below the Web Layer?

What did we miss? Example Security misconfiguration – A5 + Using known vulnerable components – A9 = Perimeter is not working

The Problem  Image: Hubble Telescope: The cat’s eye nebula

Over Complexity Too much data Endless attack possibilities Too many security solutions, vendors, products No homogenous approach

The Attack Vectors Any (communication) channel Any system Any infrastructure Any interface Any communication Any encryption Any language Any environment Any architecture Any site (including DR) Any component Any transaction Any information, any data Any log and audit trail Any archive Any physical layer Any process (operations, ongoing, development) Any logical layer Any storage device / facility

The Attack Types Any (communication) channel Any system Takeover Data theft Data tampering System integrity disruption Business Logic manipulation Eavesdropping Backdoors – built in by design Backdoors – creation by attackers Unintentional attacks Intentional by authorized entities Attacks by non-human entities Denial of Service De Facto Denial of Service Authorization bypass Access bypass Smuggling, Splitting and evasion-type attacks Any (communication) channel Any system Any infrastructure Any interface Any communication Any encryption Any language Any environment Any architecture Any site (including DR) Any component Any transaction Any information, any data Any log and audit trail Any archive Any physical layer Any process (operations, ongoing, development) Any logical layer Any storage device / facility

The Problem Even the simplified security areas present a demanding challenge. For example - XSS: Very difficult to detect all variants in modern systems Almost impossible to retain high security level once achieved

Common Solutions Superficial security tests. Many “good reasons”: Budget Time constraints Lack of understanding Over complexity

Common Solutions Impacts of superficial security tests in the long run? Partial to no security Poor security practices These organizations effect the security market, pulling downwards! Loss or partial integrity of security professionals Worse still: false sense of security

Where Did That Got Us? Ludicrous security warnings: January 2013: Department of Homeland Security: Do not use Java. Remove the JRE. April 2014: Department of Homeland Security: Versions 6 – 11 of IE are not to be used. April 2014: OpenSSL is insecure

Where Did That Got Us? Poor security in design and architecture (Almost) no security in Agile/Continuous Delivery developed code

Modern Systems Common Pitfall Modern systems are more secured. ???

Where Did That Got Us? Challenging security presentations: In-Depth Security is dead (RSA conference 2011) Security is dead (Rugged coding - RSA conference 2012) Ignorance is bliss….

Security Testing  Image: Hubble Telescope: The cat’s eye nebula

How to Test? This is messy. VERY messy. There are shortcuts

How to Test? Actually – most is quiet easy to test. Go back to theory. Forget about the payloads.

The Fallback Common Option Test the GUI Black Box testing methodology Exclude the difficult stuff from scope This is a “good” solution: it fits organizations and security professionals

The Fallback Common Option “The greatest enemy of knowledge is not ignorance, it is the illusion of knowledge.” ― Stephen Hawking Testing just the GUI illusion of knowledge Testing just the FE illusion of security Increasingly often we are requested to test much less than the actual scope. Consider carefully prior to testing – what should be the actual testing scope

How to test? “Supreme excellence consists in breaking the enemy's resistance without fighting.” Sun Tzu Common Mobile WCF architecture Where is the presentation layer? Which entities are granted access to business logic? “Supreme excellence consists in breaking the enemy's resistance without fighting.” Sun Tzu Common Mobile WCF architecture Where is the presentation layer? Which entities are granted access to business logic?

How to test? OWASP top 10 – mobile: Source: OWASP Top 10 Mobile project

The Oracle Exadata Example Oracle Exadata simplified: Data Warehouse platform Consolidation/Grid platform Storage platform Exadata security best practices consist of: The “regular stuff” Database standard security Data Warehouse specialized security Consolidation/Grid specialized security

The Oracle Exadata Example Oracle Exadata (as a database platform) Security Testing Benchmark: Organization A tested: The databases The environments The Data Warehouse specialized security The Exadata itself Organization B tested: Just some deployed databases Partial security testing for each database Worse still: Exadata not to be tested as a policy Who said: 2013-A5 Security Misconfiguration?

Testing A5, A7, A9 “If you know the enemy and know yourself you need not fear the results of a hundred battles”, Sun Tzu Do we really know ourselves? Where are A5, A7 and A9 implemented? Not testing the BE  illusion of knowing

The Windows XP Example Organization C, defines and enforces strict development and deployment security standards towards all its suppliers/customers. Over 60 pages of procedures and instructions. Insisting on supporting Windows XP based systems. Who said: 2013-A9 Using Known Vulnerable Components?

2013-A9 Using known Vulnerable Components A vendor offers DBAAS Excellent: beat the market offering *AAS something... How can the organization trust the security of DBAAS? Will separation be enforced? Will compartmentalization be enforced? Did we really tested and can trust the Cloud on which the DBAAS is based?

Declarative Security What? One of the foundations of modern languages run-time security. Mostly ignored or bypassed. Who said: Security misconfiguration – A5, Missing Function Level access control – A7?

Declarative Security “Deployment descriptors must provide certain structural information for each component if this information has not been provided in annotations or is not to be defaulted.” (Oracle docs.)

Declarative Security “Engage people with what they expect; it is what they are able to discern and confirms their projections. It settles them into predictable patterns of response, occupying their minds while you wait for the extraordinary moment — that which they cannot anticipate.” Sun Tzu Lack or weak declarative security: Once code access achieved – the extraordinary will be feasible.

Declarative Security Poor design due to no design Cancelling off declarative security or ignoring declarative security  revoking language security fundamentals. Common real life deployment descriptors:  Killing my own code! // Do what you will. Totally permissive policy file. grant { permission java.security.AllPermission; };

Reverse Engineering (A5, A6, A9) What for? Why for Mobile security testing ONLY? From Wikipedia: Reverse engineering is the process of discovering the technological principles of a device, object, or system through analysis of its structure, function, and operation.

Testing A2, A5, A6 2013 A6 – Sensitive data exposure 2013 A5 – Security misconfiguration 2013 A2 – Broken authentication Too much use of “third singulars” The actual minute details of the tested object dissolve

2013-A5 Security Misconfiguration There is no external access! The intended users will only perform intended actions… Virtualization  Separation

2013-A5 Security Misconfiguration How do organizations secure legacy unsecured systems? Install terminals (e.g. Citrix) as the presentation layer / access control layer. Challenge: manage multiple users across multiple systems. Result: the terminals are partially secure. Too many terminals to manage over long periods Some insecure The insecure terminals are the attacker entry points.

Critical Thinking Any (communication) channel Any system Takeover Data theft Data tampering System integrity disruption Business Logic manipulation Eavesdropping Backdoors – built in by design Backdoors – creation by attackers Unintentional attacks Intentional by authorized entities Attacks by non-human entities Denial of Service De Facto Denial of Service Authorization bypass Access bypass Smuggling, Splitting and evasion-type attacks Any (communication) channel Any system Any infrastructure Any interface Any communication Any encryption Any language Any environment Any architecture Any site (including DR) Any component Any transaction Any information, any data Any log and audit trail Any archive Any physical layer Any process (operations, ongoing, development) Any logical layer Any storage device / facility

Critical Thinking Critical thinking is the ability to think clearly and rationally. This requires reflective and independent thinking. (Philosophy field) For organization security is too difficult: over complexity, too much to orchestrate, etc. Increasingly often we are requested to test much less than the actual scope. Some organizations will not be educated. Push the industry back up with those organizations that can be educated.

Critical Thinking For the security professionals, security is a challenge. Hence, always employ critical thinking and review the process of testing itself. Flexibility under varying technologies Use automated testing tools to the max AND be always aware of their limitations Scoping accurately is mandatory

Qustions? Yaniv Simsolo, CISSP Image: Hubble Telescope: The cat’s eye nebula