The Web Hacking Incident Database (WHID) Report for 2010 Ryan Barnett WASC WHID Project Leader Senior Security Researcher.

Slides:



Advertisements
Similar presentations
Webgoat.
Advertisements

Incident Handling & Log Analysis in a Web Driven World Manindra Kishore.
Hands-on SQL Injection Attack and Defense HI-TEC July 21, 2013.
Don’t get Stung (An introduction to the OWASP Top Ten Project) Barry Dorrans Microsoft Information Security Tools NEW AND IMPROVED!
Copyright © The OWASP Foundation Permission is granted to copy, distribute and/or modify this document under the terms of the OWASP License. The OWASP.
Security on Web 2.0 Krasznay Csaba. Google Search Trends.
It’s always better live. MSDN Events Security Best Practices Part 2 of 2 Reducing Vulnerabilities using Visual Studio 2008.
Information Networking Security and Assurance Lab National Chung Cheng University The Ten Most Critical Web Application Security Vulnerabilities Ryan J.W.
It’s always better live. MSDN Events Securing Web Applications Part 1 of 2 Understanding Threats and Attacks.
Information Networking Security and Assurance Lab National Chung Cheng University 1 Top Vulnerabilities in Web Applications (I) Unvalidated Input:  Information.
Introduction to Web Application Security
Injection Attacks by Example SQL Injection and XSS Adam Forsythe Thomas Hollingsworth.
SiteLock Internet Security: Big Threats for Small Business.
Presenter Deddie Tjahjono.  Introduction  Website Application Layer  Why Web Application Security  Web Apps Security Scanner  About  Feature  How.
Copyright © The OWASP Foundation Permission is granted to copy, distribute and/or modify this document under the terms of the OWASP License. The OWASP.
The Difficult Road To Cybersecurity Steve Katz, CISSP Security Risk Solutions Steve Katz, CISSP Security.
By: Razieh Rezaei Saleh.  Security Evaluation The examination of a system to determine its degree of compliance with a stated security model, security.
Web Security Demystified Justin C. Klein Keane Sr. InfoSec Specialist University of Pennsylvania School of Arts and Sciences Information Security and Unix.
Evolving Threats. Application Security - Understanding the Problem DesktopTransportNetworkWeb Applications Antivirus Protection Encryption (SSL) Firewalls.
Securing Information Systems
OWASP Zed Attack Proxy Project Lead
Brad Baker CS526 May 7 th, /7/ Project goals 2. Test Environment 3. The Problem 4. Some Solutions 5. ModSecurity Overview 6. ModSecurity.
PCI: As complicated as it sounds? Gerry Lawrence CTO
Prepared By, Mahadir Ahmad. StopBadware makes the Web safer through the prevention, mitigation, and remediation of badware websites. partners include.
Security Management prepared by Dean Hipwell, CISSP
A Framework for Automated Web Application Security Evaluation
Ladd Van Tol Senior Software Engineer Security on the Web Part One - Vulnerabilities.
Copyright © The OWASP Foundation Permission is granted to copy, distribute and/or modify this document under the terms of the GNU Free Documentation.
Ryan Dewhurst - 20th March 2012 Web Application (PHP) Security.
November 13, 2008 Ohio Information Security Forum Attack Surface of Web Applications James Walden Northern Kentucky University
Configuring Electronic Health Records Privacy and Security in the US Lecture f This material (Comp11_Unit7f) was developed by Oregon Health & Science University,
Web Application Firewall (WAF) RSA ® Conference 2013.
Copyright 2007 © The OWASP Foundation Permission is granted to copy, distribute and/or modify this document under the terms of the OWASP License. The OWASP.
Web Application Security Testing Automation.. Copyright © 2008 Deloitte Touche Tohmatsu. All rights reserved.1 What types of automated testing are there?
Security Testing Case Study 360logica Software Testing Services.
Internet of Things Top Ten. Agenda -Introduction -Misconception -Considerations -The OWASP Internet of Things Top 10 Project -The Top 10 Walkthrough.
Copyright © The OWASP Foundation Permission is granted to copy, distribute and/or modify this document under the terms of the OWASP License. The OWASP.
Overview Abstract Vulnerability: An Overview Cloud Computing Cloud-Specific Vulnerabilities Architectural Components and Vulnerabilities Conclusion.
Web Application Security ECE ECE Internetwork Security What is a Web Application? An application generally comprised of a collection of scripts.
Copyright © The OWASP Foundation Permission is granted to copy, distribute and/or modify this document under the terms of the OWASP License. The OWASP.
Data Security Assessment and Prevention AD660 – Databases, Security, and Web Technologies Marcus Goncalves Spring 2013.
October 3, 2008IMI Security Symposium Application Security through a Hacker’s Eyes James Walden Northern Kentucky University
Copyright © The OWASP Foundation Permission is granted to copy, distribute and/or modify this document under the terms of the OWASP License. The OWASP.
Web Applications Testing By Jamie Rougvie Supported by.
OWASP OWASP top 10 - Agenda  Background  Risk based  Top 10 items 1 – 6  Live demo  Top 10 items 7 – 10  OWASP resources.
Copyright © The OWASP Foundation Permission is granted to copy, distribute and/or modify this document under the terms of the GNU Free Documentation.
Deconstructing API Security
Securing Java Applications
COMP9321 Web Application Engineering Semester 2, 2015 Dr. Amin Beheshti Service Oriented Computing Group, CSE, UNSW Australia Week 9 1COMP9321, 15s2, Week.
CS526Topic 12: Web Security (2)1 Information Security CS 526 Topic 9 Web Security Part 2.
Mr. Justin “JET” Turner CSCI 3000 – Fall 2015 CRN Section A – TR 9:30-10:45 CRN – Section B – TR 5:30-6:45.
//ALPHA.1 OWASP Knoxville Application Security Then and Now. Make a Difference Now 2015 June 11 Phil Agcaoili.
Copyright © The OWASP Foundation This work is available under the Creative Commons SA 2.5 license The OWASP Foundation OWASP Denver February 2012.
The OWASP Foundation Copyright © The OWASP Foundation Permission is granted to copy, distribute and/or modify this document under.
The Payment Card Industry Data Security Standard (PCI DSS) is a proprietary information security standard for organizations that handle branded credit.
Vulnerability Analysis Dr. X. Computer system Design Implementation Maintenance Operation.
Page 1 Ethical Hacking by Douglas Williams. Page 2 Intro Attackers can potentially use many different paths through your application to do harm to your.
SECURE DEVELOPMENT. SEI CERT TOP 10 SECURE CODING PRACTICES Validate input Use strict compiler settings and resolve warnings Architect and design for.
Web Application Vulnerabilities
Web Application Vulnerabilities, Detection Mechanisms, and Defenses
Securing Your Web Application in Azure with a WAF
TOPIC: Web Security (Part-4)
Secure Software Confidentiality Integrity Data Security Authentication
Risk Assessment = Risky Business
امنیت نرم‌افزارهای وب تقديم به پيشگاه مقدس امام عصر (عج) عباس نادری
WWW安全 國立暨南國際大學 資訊管理學系 陳彥錚.
Presentation transcript:

The Web Hacking Incident Database (WHID) Report for 2010 Ryan Barnett WASC WHID Project Leader Senior Security Researcher

Ryan Barnett - Background Trustwave SpiderLabs Research Team Web application firewall research/development ModSecurity Community Manager Interface with the community on public mail-list Steer the internal development of ModSecurity Author “Preventing Web Attacks with Apache”

Community Projects Open Web Application Security Project (OWASP) Project Leader, ModSecurity Core Rule Set Project Contributor, OWASP Top 10 Project Contributor, AppSensor Web Application Security Consortium (WASC) Project Leader, Web Hacking Incident Database Project Leader, Distributed Web Honeypots Project Contributor, Web Application Firewall Evaluation Criteria Project Contributor, Threat Classification The SANS Institute Courseware Developer/Certified Instructor Project Contributor, CWE/SANS Top 25 Worst Programming Errors

Session Outline OWASP Risk Rating Methodology The Challenge of Risk Analysis for Web Applications WASC Web Hacking Incident Database (WHID) Overview 2010 Status Report Top Trends Comparing the OWASP Top 10 vs. the WHID Top 10

OWASP Risk Rating Methodology #Step 1: Identifying a Risk #Step 2: Factors for Estimating Likelihood #Step 3: Factors for Estimating Impact #Step 4: Determining Severity of the Risk #Step 5: Deciding What to Fix #Step 6: Customizing Your Risk Rating Model

OWASP Risk Rating Methodology

The Challenge of Risk Analysis for Web Applications: Analyzing Public Incidents

Risk Rating Problem Instead of being concerned about what CAN happen (theoretical scenarios), perhaps we should first be dealing with what IS happening (analysis of real-world web compromises)…

Publicly Quantifying Web Incidents is Challenging Incidents are not detected ~156 day lapse between compromise and detection* Vast majority of cases the merchant did not identify the intrusion – a 3rd party did based on fraud detection (card brands and banks)* Logging Issues - poor logging and/or no one reviewing them for signs of compromise

Publicly Quantifying Web Incidents is Challenging Victims hide breaches Defacement (visible) and information leakage (regulated) are publicized more than other breaches Example - Banks are not forced to disclose when individual customer funds are stolen

Web Hacking Incident Database (WHID)

WASC Web Hacking Incident Database (WHID)

Tracking Public Web Compromises

WHID Goals Raise awareness of real-world, web application security incidents Provide data for the following Risk Rating steps: #Step 2: Factors for Estimating Likelihood What application weaknesses are actively being targeted? #Step 3: Factors for Estimating Impact What outcome are you worried about? #Step 5: Deciding What to Fix Prioritized listing of remediation issues #Step 6: Customizing Your Risk Rating Model Customized view based on your vertical-market

WHID Data Data Samples (statistically insignificant) Focus on % rather than raw numbers Inclusion Criteria Only publicly disclosed, web related incidents Incidents of interest Defacements of “High Profile” sites are included Ensure quality and correctness of incidents Severely limits the number of incidents that get in

WHID Data: Community Submittal Form Community incident submission leverages crowdsourcing Project team validation ensures quality

WHID Database Content ~216 incidents for 2010 Incidents since 1999 Each incident is classified Attack type Application Weakness Outcome Country of organization attacked Industry segment of organization attacked Country of origin of the attack (if known) Vulnerable Software Additional information: A unique identifier: WHID 200x-yy Dates of occurrence and reporting Description Internet references

Real-Time Statistics Browse real-time data Drill down in to incident details Pivot on key variables (year/vertical market)

Real-time, Searchable DB WHID data is available year-round Useful for application developers and researchers Search by Attack method Outcome Source geography and many more…

Geographic Views

Monitoring WHID Updates

WHID 2010 Status Report

What Vertical Markets are Attacked Most Often?

What are the Goals for Web Hacking?

What Attack Methods do Hackers Use?

Which Application Weaknesses are Exploited?

Top Trends

Denial of Service

Banking Trojans

#Step 5: Deciding What to Fix Prioritized listing of remediation issues

OWASP vs. WHID Top 10 OWASP Top 10WHID Top 10 1InjectionInsufficient Anti-Automation (Brute Force and DoS) 2Cross-site Scripting (XSS) Improper Output Handling (XSS and Planting of Malware) 3 Broken Authentication and Session Management Improper Input Handling (SQL Injection) 4Insecure Direct Object Reference Insufficient Authentication (Stolen Credentials/Banking Trojans) 5CSRF Application Misconfiguration (Detailed error messages) 6Security Misconfiguration Insufficient Process Validation (CSRF and DNS Hijacking) 7Insecure Cryptographic Storage Insufficient Authorization (Predictable Resource Location/Forceful Browsing) 8Failure to Restrict URL AccessAbuse of Functionality (CSRF/Click-Fraud) 9Insecure Transport Layer ProtectionInsufficient Password Recovery (Brute Force) 1010 Unvalidated Redirects and ForwardsImproper Filesystem Permissions (info Leakages)

Questions? WASC WHID Project Site eb-Hacking-Incident-Database – Twitter