DevFu! The Inner Ninja in Every Application Developer.

Slides:



Advertisements
Similar presentations
Approaches to meeting the PCI Vulnerability Management and Penetration Testing Requirements Clay Keller.
Advertisements

Public Facing Mobile App Development and Testing Jacob Parcell Manager, Mobile Programs Digital Services Innovation Center Office of Citizen Services &
PENETRATION TESTING Presenters:Chakrit Sanbuapoh Sr. Information Security MFEC.
Hands-On Ethical Hacking and Network Defense Second Edition Chapter 5 Port Scanning.
The OWASP Foundation How Do I Approach Application Security? San Francisco 2014.
Ethical Hacking Introduction.  What is Ethical Hacking?  Types of Ethical Hacking  Responsibilities of a ethical hacker  Customer Expectations  Skills.
Hands-On Ethical Hacking and Network Defense
CSCI 530L Vulnerability Assessment. Process of identifying vulnerabilities that exist in a computer system Has many similarities to risk assessment Four.
Browser Exploitation Framework (BeEF) Lab
The Business of Penetration Testing
Hacking Windows Vista Security Dan Griffin JW Secure, Inc.
Penetration Testing Edmund Whitehead Rayce West. Introduction - Definition of Penetration Testing - Who needs Penetration Testing? - Penetration Testing.
Security Scanning OWASP Education Nishi Kumar Computer based training
Team BAM! Scott Amack, Everett Bloch, Maxine Major.
W3af LUCA ALEXANDRA ADELA – MISS 1. w3af  Web Application Attack and Audit Framework  Secures web applications by finding and exploiting web application.
 Computer Information System Club focused on the understanding and applied learning of web development.  The club was founded in April 5,  We.
Cross-Site Scripting Vulnerabilities Adam Doupé 11/24/2014.
Approaches to Application Security – DSM
Network Security Testing— Are There Really Different Types of Testing? July 28, 2015 Start Time: 9 am US Pacific / 12 noon US Eastern / 5 pm London Time.
A Security Review Process for Existing Software Applications
Security Testing Case Study 360logica Software Testing Services.
Nata Raju Gurrapu Agenda What is Information and Security. Industry Standards Job Profiles Certifications Tips.
The benefits of externalizing Web DMZ-as-a-Service in the Cloud James Smith, Sr. Security Sentrix
OWASP Top Ten #1 Unvalidated Input. Agenda What is the OWASP Top 10? Where can I find it? What is Unvalidated Input? What environments are effected? How.
Application Security Testing A practitioner’s rambling advice & musings.
Chapter 1 Ethical Hacking Overview. Objectives After reading this chapter and completing the exercises, you will be able to: Describe the role of an ethical.
Ethical Hacking and Network Defense NCTT Winter Workshop January 11, 2006.
# Ethical Hacking. 2 # Ethical Hacking - ? Why – Ethical Hacking ? Ethical Hacking - Process Ethical Hacking – Commandments Reporting.
CANVAS REPORT/rvispute 16/4/2016 CANVAS Report for CTF Event at USAFA on 4/25/2007 Subject :Penetration Tools for Front Range Pen Test Exercise By Rajshri.
Web Applications Testing By Jamie Rougvie Supported by.
Copyright © The OWASP Foundation Permission is granted to copy, distribute and/or modify this document under the terms of the Creative Commons Attribution-ShareAlike.
Copyright © The OWASP Foundation Permission is granted to copy, distribute and/or modify this document under the terms of the OWASP License. The OWASP.
New Techniques in Application Intrusion Detection Al Huizenga, Mykonos Product Manager May 2010.
OWASP-Knoxville June 2015 Enjoy the free appetizers and non-alcoholic drinks Cash bar is open for alcoholic drinks.
Presents Ethical Hacking For Inplant Training / Internship, please download the "Inplant training registration form" from our website.
MVHS Career Night 2015 Information Security. Agenda What is Information and Security. Industry Standards Job Profiles Certifications Tips.
Mantra – Security Framework Free and Open Source Browser based Security Framework.
Automated Security Testing Using The ZAP API. About Me My name is Michael Haselhurst. I work for Sage as a Test Analyst. This is the first OWASP meeting.
Copyright © The OWASP Foundation Permission is granted to copy, distribute and/or modify this document under the terms of the OWASP License. The OWASP.
EECS 354: Network Security Group Members: Patrick Wong Eric Chan Shira Schneidman Web Attacks Project: Detecting XSS and SQL Injection Vulnerabilities.
Presents Ethical Hacking 1 For Inplant Training / Internship, please download the "Inplant training registration form" from our.
Soroush Dalili 9 Dec Computer Security MSc. of Birmingham University.
The Front Range’s Largest AppSec Conference is BACK February 18, 2016 Details & registration at Keynote by Jeremiah Grossman.
Ethical Hacking and Network Defense. Contact Information Sam Bowne Sam Bowne Website: samsclass.info Website:
Rapidsoft Technologies has been engaged in Android applications development since Google introduced its mobile OS,. Today Android is world’s leading.
Wharton Computer Consulting, Inc. PowerShell Basics for SQL Server One Tool to Manage All SQL Servers Michael Wharton
360logica a Software Testing Company
10 Best Technologies to Learn at Eduonix in 2016 The tech field is progressing rapidly, with newer software applications and development tools being released.
Hacker Games By Wenonah Abadilla. What is a Hacker Game? Learn and practice security concepts Fun-filled games.
CITA 352 Chapter 1 Ethical Hacking Overview. Introduction to Ethical Hacking Ethical hackers –Hired by companies to perform penetration tests Penetration.
Copyright 2007 © The OWASP Foundation Permission is granted to copy, distribute and/or modify this document under the terms of the OWASP License. The OWASP.
Andrés Riancho ariancho cybsec.com w3af – A framework to own the Web CanSecWest 2008 Vancouver, Canada.
OWASP Broken Web Application Project Bad Web Apps are Good.
Ethical Hacking By: Erin Noonan.
Web Design II PHP & MySQL or ASP.NET
Web Application Security
A Security Review Process for Existing Software Applications
NEED OF JAILBREAKING IN IOS PENETRATION TESTING
Summer Training in Noida
A Military Perspective
CANVAS Report for CTF Event at USAFA on 4/25/2007
Joaquin Fuentes MBA, CEH, CPT, CISSP, CISA, NACA
Security of web applications.
Mobile Pen Testing w/ drozer
Partner Logo Reblaze Utilizes Microsoft Azure Cloud Technology to Provide Web Assets with a Comprehensive, Robust, Protective Shield Against Internet Threats.
WEBINAR: Robotic Process Automation (RPA) of Dynamics NAV with Rapise
Virtual Patching “A security policy enforcement layer which prevents the exploitation of a known vulnerability”
Hacking web applications
BVM Web Solutions is a Leading Website and Mobile App Development Company Offering best Ecommerce website and app development services for Android and.
Penetration Testing Market Research Report By Forecast to 2023 Industry Survey, Growth, Competitive Landscape and Forecasts to 2023 PREPARED BY Market.
Presentation transcript:

DevFu! The Inner Ninja in Every Application Developer

About Me Danny Chrastil Security Consultant BT Assure Ethical Hacking Center of Excellence { “Penetration Testing":[ "Web Applications", "iOS / Android Mobile Apps", "Internal / External Networks" ], “Certifications”:[ “GIAC GWAPT”, “GIAC GWEB” }

About Me DisK0nn3cT [root] # cat hobbies.txt Twitter Fan CTF Team Member – 0x5bd DC303 Robot Mafia - Team Member [root] # cat contributions.txt OWASP CTF Contributor SnowFROC CTF Contributor Zen Cart (PHP) Security Contributor CookieCatcher Project [in progress]

About Me

Hackers Developer Arrogant Ignorant

Hackers Developers

DevFu! Scripting Application Development Ins & Outs of Programming Knowing the Lingo

Scripting Network / Firewall / WebApp Automate Processes – Assist Tools – Scraping Websites – Manipulating Data Examples!

Scripting - Example 1

Scripting - Example 2

t Scripting - Example 3 Jordan from RaiderSec Blog

Application Programing Tools / Frameworks – Metasploit, w3af, sqlmap … Contribute or Plugin! Need for Developers

Application Programing Metasploit – Exploit Skeleton (Ruby+git)

Application Programing w3af – Example Plugin (Python+svn)

Application Programing CookieCatcher (In progress)

Ins/Outs of Programming Intimate knowledge of a language – Common pitfalls / limitations Global variables, null bytes, open source Core vulnerabilities: SQLi, remote code injection Loose programming practices You’re using ColdFusion …

Ins/Outs of Programming Anticipate shortcuts during Development Only as strong as its weakest link – Parameter sanitization – Business logic – Information Leakage

Speaking the Language Need to be able to “talk the talk” Great interviewing skill Explain security in business terms Bridge the gap to the development team

Summary & =

Questions

Contact Information