OWASP Periodic Table of Vulnerabilities James Landis

Slides:



Advertisements
Similar presentations
OWASP’s Ten Most Critical Web Application Security Vulnerabilities
Advertisements

Vulnerability Analysis. Formal verification Formally (mathematically) prove certain characteristics Proves the absence of flaws in a program or design.
Security in By: Abdulelah Algosaibi Supervised by: Prof. Michael Rothstein Summer II 2010: CS 6/79995 Operating System Security.
Information Networking Security and Assurance Lab National Chung Cheng University 1 Top Vulnerabilities in Web Applications (I) Unvalidated Input:  Information.
Security Engineering II. Problem Sources 1.Requirements definitions, omissions, and mistakes 2.System design flaws 3.Hardware implementation flaws, such.
Aaron Blankstein and Michael J. Freedman Princeton University Tuan Tran.
“Today over 70% of attacks against a company’s network come at the ‘Application Layer’ not the Network or System layer.” - Gartner Is Your Web Application.
BUILDING A SECURE STANDARD LIBRARY Information Assurance Project I MN Tajuddin hj. Tappe Supervisor Mdm. Rasimah Che Mohd Yusoff ASP.NET TECHNOLOGY.
This is a work of the U.S. Government and is not subject to copyright protection in the United States. The OWASP Foundation OWASP AppSec DC October 2005.
 Proxy Servers are software that act as intermediaries between client and servers on the Internet.  They help users on private networks get information.
Software Security Course Course Outline Course Overview Introduction to Software Security Common Attacks and Vulnerabilities Overview of Security.
Web Application Vulnerabilities Checklist. EC-Council Parameter Checklist  URL request  URL encoding  Query string  Header  Cookie  Form field 
Security Scanning OWASP Education Nishi Kumar Computer based training
OWASP Mobile Top 10 Why They Matter and What We Can Do
Security and Risk Management. Who Am I Matthew Strahan from Content Security Principal Security Consultant I look young, but I’ve been doing this for.
W3af LUCA ALEXANDRA ADELA – MISS 1. w3af  Web Application Attack and Audit Framework  Secures web applications by finding and exploiting web application.
Securing Legacy Software SoBeNet User group meeting 25/06/2004.
Web Security Demystified Justin C. Klein Keane Sr. InfoSec Specialist University of Pennsylvania School of Arts and Sciences Information Security and Unix.
Introduction to Application Penetration Testing
1 Infrastructure Hardening. 2 Objectives Why hardening infrastructure is important? Hardening Operating Systems, Network and Applications.
1 Internet Security Threat Report X Internet Security Threat Report VI Figure 1.Distribution Of Attacks Targeting Web Browsers.
Origins, Cookies and Security – Oh My! John Kemp, Nokia Mobile Solutions.
A Framework for Automated Web Application Security Evaluation
Ladd Van Tol Senior Software Engineer Security on the Web Part One - Vulnerabilities.
A Security Review Process for Existing Software Applications
November 13, 2008 Ohio Information Security Forum Attack Surface of Web Applications James Walden Northern Kentucky University
Patch Management Only part of the solution….. Bob Isaak Mar 04, 2004.
Security Professional Services. Security Assessments Vulnerability Assessment IT Security Assessment Firewall Migration Custom Professional Security Services.
Copyright 2007 © The OWASP Foundation Permission is granted to copy, distribute and/or modify this document under the terms of the OWASP License. The OWASP.
Copyright © The OWASP Foundation Permission is granted to copy, distribute and/or modify this document under the terms of the OWASP License. The OWASP.
The benefits of externalizing Web DMZ-as-a-Service in the Cloud James Smith, Sr. Security Sentrix
 Chapter 14 – Security Engineering 1 Chapter 12 Dependability and Security Specification 1.
Chapter 1 Overview The NIST Computer Security Handbook defines the term Computer Security as:
Fundamentals of Proxying. Proxy Server Fundamentals  Proxy simply means acting on someone other’s behalf  A Proxy acts on behalf of the client or user.
Copyright © The OWASP Foundation Permission is granted to copy, distribute and/or modify this document under the terms of the OWASP License. The OWASP.
October 3, 2008IMI Security Symposium Application Security through a Hacker’s Eyes James Walden Northern Kentucky University
CSCE 548 Secure Software Development Taxonomy of Coding Errors.
Building Secure Web Applications With ASP.Net MVC.
Protecting Browsers from DNS Rebinding Attacks Collin Jackson, Adam Barth, Andrew Bortz ACM CCS Systems Modeling & Simulation Lab. Kim.
Lecture slides prepared for “Computer Security: Principles and Practice”, 3/e, by William Stallings and Lawrie Brown, Chapter 1 “Overview”. © 2016 Pearson.
Chapter 10 XML and Web Services. Topics Why a standards-compliant XML parser Why a standard (off the shelf) XML parser Validation. External references.
1 OFF SYMB - 12/7/2015 Firewalls Basics. 2 OFF SYMB - 12/7/2015 Overview Why we have firewalls What a firewall does Why is the firewall configured the.
University of Central Florida The Postman Always Rings Twice: Attacking & Defending postMessage in HTML5 Websites Ankur Verma University of Central Florida,
Deconstructing API Security
Security fundamentals Topic 10 Securing the network perimeter.
Getting Started with OWASP The Top 10, ASVS, and the Guides Dave Wichers COO, Aspect Security OWASP Board Member OWASP Top 10 and ASVS Projects Lead.
Cross-site request forgery Collin Jackson CS 142 Winter 2009.
Copyright © The OWASP Foundation Permission is granted to copy, distribute and/or modify this document under the terms of the OWASP License. The OWASP.
Copyright © The OWASP Foundation This work is available under the Creative Commons SA 2.5 license The OWASP Foundation OWASP Denver February 2012.
OWASP ASVS Levels1234 Tools Manual Test and Review Manual Design Review At higher levels in ASVS,the use of tools is encouraged. But to be effective,the.
What problems are we trying to solve? Hannes Tschofenig.
Lecture 19 Page 1 CS 236 Online 6. Application Software Security Why it’s important: –Security flaws in applications are increasingly the attacker’s entry.
Security fundamentals
Web Application Vulnerabilities, Detection Mechanisms, and Defenses
Critical Security Controls
TOPIC: Web Security (Part-4)
A Security Review Process for Existing Software Applications
HTML Level II (CyberAdvantage)
Myths About Web Application Security That You Need To Ignore.
Web Application Security
WEB API.
Riding Someone Else’s Wave with CSRF
CSC 495/583 Topics of Software Security Intro to Web Security
Tour of OWASP’s projects
Virtual Patching “A security policy enforcement layer which prevents the exploitation of a known vulnerability”
Cross Site Request Forgery New Attacks and Defenses
6. Application Software Security
Presentation transcript:

OWASP Periodic Table of Vulnerabilities James Landis

The AppSec Profession ~1980-????

GOAL Project Goal

Existing ‘Taxonomies’ OWASP Top Ten (2013) Focuses on just the riskiest issue categories Measures DREAD attributes Recommends high-level solutions, and secure libraries like ESAPI WASC Threat Classification (v2) Attempts to enumerate, but not classify, all web application attacks and weaknesses Includes a view (Development Phase View) which shows SDLC mapping Officially avoids recommending solutions SANS Common Weakness Enumeration (CWE-25) Focuses on riskiest issues (just more of them) Measures DREAD attributes Recommends solutions, categorized by SDL phase

Failed Approaches Developer Training “Enumerating Badness”, “Penetrate and Patch” (h/t Marcus Ranum) – Some vulnerability classes, automated tests – Yes! – Other classes (e.g. Logic flaws), manual tests – No! Firewalls Root cause analysis (XSS == SQLi, XSS != SQLi) Everything else we’ve been doing

Solutions? Accepting Reality – HTTP not stateless – People might try to hurt us Platform Security Continuum Make it impossible to make mistakes Economies of Scale Vulnerable by DefaultSecure by Design

Divide and Conquer Browsers and Standards User agents, plugins, HTTP protocol, SSL/TLS, Content Security Policy (CSP), Same Origin Policy (SOP), IETF RFC, etc. Perimeter and Platform Application proxies, content distribution networks (CDNs), application firewalls, web servers, database servers, application servers, operating systems, etc. Generic Frameworks Web application runtime environments Custom Frameworks Development platforms unique to individual businesses/verticals Custom CodeBusiness logic unique to each application

Economies of Scale Browsers and Standards Perimeter and Platform Generic Frameworks Custom Frameworks Custom Code WebDev Mistakes Impact Code Changes

Scope Avoid reproducing existing documentation – Describe just enough of the solution to show how it’s distributed between targets – References, references, references! Minimize original research – Most solutions enforce old ideas in frameworks – Browser/standards require some new thought Mobile, thick client vulnerabilities excluded

Metaphor

Results!

Selected Examples Vulnerability Browser /Standards Perimeter /Infrastructur e Generic Framework Custom Framework Custom Code Clickjacking Browser vendor standardization on safe framing Automatically set X-Frame-Options header Configurable XFO policy CSRF Change default for cross-domain writes Automatic nonce checking, configurable Improper Input Handling Provide APIs for positive validation of common types Provide APIs for positive validation of custom types Never use primitives Abuse of Functionality Define abuse cases for all features

Case Study - XSS Decouple presentation and data – easy with AJAX, not with Web 1.0 What if content IS markup? Secure framework might have steep learning curve / difficult adoption path Browser sandboxing CSP, Caja, IFRAME seamless / sandbox

Developer Training XSS SQLi CSRF HTTPRS Clickjacking Application DDoS Improper Input Handling Redirector Abuse Logical Flaws Remote File Include OS Commanding XML External Entities BEFORE AFTER Logical Flaws Function Abuse Input Validation Secure Framework

Drawbacks and Benefits DOESN’T help us with legacy/current applications DOES help drive remediation planning / gap analysis in existing applications DOES focus remediation toward areas with greatest force multiplier (e.g. Top Ten Defenses) DOES allow objective evaluation of firewalls and frameworks

Q & A