The OWASP Foundation How Do I Approach Application Security? San Francisco 2014.

Slides:



Advertisements
Similar presentations
Approaches to meeting the PCI Vulnerability Management and Penetration Testing Requirements Clay Keller.
Advertisements

Past, Present and Future By Eoin Keary and Jim Manico
What is code injection? Code injection is the exploitation of a computer bug that is caused by processing invalid data. Code injection can be used by.
Closing the Gap: Analyzing the Limitations of Web Application Vulnerability Scanners David Shelly Randy Marchany Joseph Tront Virginia Polytechnic Institute.
OWASP Periodic Table of Vulnerabilities James Landis
Copyright © The OWASP Foundation Permission is granted to copy, distribute and/or modify this document under the terms of the OWASP License. The OWASP.
IDAsec copyright - all rights reserved1 Web Vulnerabilities in the real world.
The OWASP Foundation Copyright © The OWASP Foundation Permission is granted to copy, distribute and/or modify this document under.
Injection Attacks by Example SQL Injection and XSS Adam Forsythe Thomas Hollingsworth.
Handling Security Threats in Kentico CMS Karol Jarkovsky Sr. Solution Architect Kentico Software
Presenter Deddie Tjahjono.  Introduction  Website Application Layer  Why Web Application Security  Web Apps Security Scanner  About  Feature  How.
Security Scanning OWASP Education Nishi Kumar Computer based training
Web Application Testing with AppScan Terry Labach.
The Difficult Road To Cybersecurity Steve Katz, CISSP Security Risk Solutions Steve Katz, CISSP Security.
OWASP Mobile Top 10 Why They Matter and What We Can Do
Security and Risk Management. Who Am I Matthew Strahan from Content Security Principal Security Consultant I look young, but I’ve been doing this for.
Web Security Demystified Justin C. Klein Keane Sr. InfoSec Specialist University of Pennsylvania School of Arts and Sciences Information Security and Unix.
Cross-Site Scripting Vulnerabilities Adam Doupé 11/24/2014.
A Framework for Automated Web Application Security Evaluation
Copyright © The OWASP Foundation Permission is granted to copy, distribute and/or modify this document under the terms of the GNU Free Documentation.
FIVE STEPS TO REDUCE THE RISK OF CYBERCRIME TO YOUR BUSINESS.
A Security Review Process for Existing Software Applications
Business Computing 550 Lesson 6. 2 Security Threats on Web Sites Issues and vulnerabilities 1.Illegal Access and Use (Hacking the system or users exposing.
November 13, 2008 Ohio Information Security Forum Attack Surface of Web Applications James Walden Northern Kentucky University
Web 2.0 Security James Walden Northern Kentucky University.
Security Trifecta – Overview of Vulnerabilities in the Racing Industry Gus Fritschie December 11, 2013.
Copyright 2007 © The OWASP Foundation Permission is granted to copy, distribute and/or modify this document under the terms of the OWASP License. The OWASP.
3-Protecting Systems Dr. John P. Abraham Professor UTPA.
Software Security Testing Vinay Srinivasan cell:
Web Application Security ECE ECE Internetwork Security What is a Web Application? An application generally comprised of a collection of scripts.
Watching Software Run Brian ChessNov 18, Success is foreseeing failure. – Henry Petroski.
SIGITE 2008: Oct Integrating Web Application Security into the IT Curriculum James Walden Northern Kentucky University.
OWASP Top Ten #1 Unvalidated Input. Agenda What is the OWASP Top 10? Where can I find it? What is Unvalidated Input? What environments are effected? How.
October 3, 2008IMI Security Symposium Application Security through a Hacker’s Eyes James Walden Northern Kentucky University
CSCE 548 Secure Software Development Taxonomy of Coding Errors.
Alert Logic Provides a Fully Managed Security and Compliance Solution Based in the Cloud, Powered by the Robust Microsoft Azure Platform MICROSOFT AZURE.
Copyright © The OWASP Foundation Permission is granted to copy, distribute and/or modify this document under the terms of the OWASP License. The OWASP.
Web Applications Testing By Jamie Rougvie Supported by.
Building Secure Web Applications With ASP.Net MVC.
Cross Site Scripting and its Issues By Odion Oisamoje.
Crash Course in Web Hacking
Copyright © The OWASP Foundation Permission is granted to copy, distribute and/or modify this document under the terms of the GNU Free Documentation.
Cyber Insecurity Under Attack Cyber Security Past, present and future Patricia Titus Chief Information Security Officer Unisys Corporation.
New Techniques in Application Intrusion Detection Al Huizenga, Mykonos Product Manager May 2010.
Deconstructing API Security
Copyright © The OWASP Foundation Permission is granted to copy, distribute and/or modify this document under the terms of the OWASP License. The OWASP.
Copyright © The OWASP Foundation This work is available under the Creative Commons SA 2.5 license The OWASP Foundation OWASP Denver February 2012.
EECS 354: Network Security Group Members: Patrick Wong Eric Chan Shira Schneidman Web Attacks Project: Detecting XSS and SQL Injection Vulnerabilities.
Carrie Estes Collin Donaldson.  Zero day attacks  “zero day”  Web application attacks  Signing up for a class  Hardening the web server  Enhancing.
James F. Fox MENA Cyber Security Practice Lead Presenters Cyber Security in a Mobile and “Always-on” World Booz | Allen | Hamilton.
Page 1 Ethical Hacking by Douglas Williams. Page 2 Intro Attackers can potentially use many different paths through your application to do harm to your.
Javascript worms By Benjamin Mossé SecPro
3 Do you monitor for unauthorized intrusion activity?
Web Application Vulnerabilities, Detection Mechanisms, and Defenses
Securing Your Web Application in Azure with a WAF
Real-time protection for web sites and web apps against ATTACKS
^ About the.
E-commerce Application Security
A Security Review Process for Existing Software Applications
Relevance of the OWASP Top 10
Li Yang, Carson Woods (University of Tennessee at Chattanooga
Oklahoma City.
AppExchange Security Certification
Protecting Against Common Web Application Vulnerabilities
Lecture 34: Testing II April 24, 2017 Selenium testing script 7/7/2019
Exploring DOM-Based Cross Site Attacks
Enterprise Class Security Scanner
Presentation transcript:

The OWASP Foundation How Do I Approach Application Security? San Francisco 2014

The OWASP Foundation Eoin Keary CTO BCC Risk Advisory / edgescan.com OWASP GLOBAL BOARD MEMBER Michael Coates Director Shape Security OWASP GLOBAL BOARD MEMBER Jim Manico OWASP GLOBAL BOARD MEMBER OWASP Cheat-Sheet Project Lead

The OWASP Foundation The Numbers Cyber Crime: “Second cause of economic crime experienced by the financial services sector” – PwC “Globally, every second, 18 adults become victims of cybercrime” - Norton US - $20.7 billion – (direct losses) Globally $110,000,000,000 – direct losses “556 million adults across the world have first-hand experience of cybercrime -- more than the entire population of the European Union.”

The OWASP Foundation Target's December 19 disclosure 100+ million payment cards LoyaltyBuild November disclosure 1.5 million + records Snapchat: 4.6 million user records

The OWASP Foundation Pentesting? A penetration test is a method of evaluating computer and network security by simulating an attack on a computer system or network from external and internal threats. This is a component of an overall security assessment.

The OWASP Foundation Its (not) the $$$$ Information security spend Security incidents (business impact)

The OWASP Foundation But we are approaching this problem completely wrong and have been for years…..

The OWASP Foundation Asymmetric Arms Race

The OWASP Foundation A traditional end of cycle / Annual pentest only gives minimal security….. There are too many variables and too little time to ensure “real security”.

The OWASP Foundation Two weeks of ethical hacking Ten man-years of development An inconvenient truth

The OWASP Foundation Make this more difficult: Lets change the application code once a month.

The OWASP Foundation HTTP Manipulation – Scanning – Is Not Enough Dumb tools and Smart Apps Problem has moved (back) to the client. Some “Client Side” vulnerabilities can’t be tested via HTTP parameter testing. AJAX Flex/Flash/Air Native Mobile Web Apps – Data Storage, leakage, malware. DOM XSS – Sinks & Sources in client script -> no HTTP required Scanning in not enough anymore. We need DOM security assessment. Javascript parsing/Taint analysis/String analysis/Manual Validation window.location = jQuery.globalEval( userContent ):

The OWASP Foundation Business Logic – Finite State Machines Automated scanners are dumb No idea of business state or state transitions No clue about horizontal or vertical authorization / roles No clue about business context We test applications for security issues without knowing the business process We cant “break” logic (in a meaningful way) we don’t understand Running a $30,000 scanning tool against your mission critical application? Will this find flaws in your business logic or state machine? We need human intelligence & verification We can’t test what we don’t understand

The OWASP Foundation “Onions” SDL Design review Threat Modeling Code review/SAST/CI Negative use/abuse cases/Fuzzing/DAST Live/ Continuous/Frequent monitoring / Testing Ongoing Manual Validation Vulnerability management & Priority Dependency Management …. “Robots are good at detecting known unknowns” “Humans are good at detecting unknown unknowns”

The OWASP Foundation Application Code COTS (Commercial off the shelf Outsourced development Sub- Contractors Bespoke outsourced development Bespoke Internal development Third Party API’s Third Party Components & Systems Degrees of trust You may not let some of the people who have developed your code into your offices!! MoreLESS

The OWASP Foundation /13 Study of 31 popular open source libraries million (26%) of the library downloads have known vulnerabilities -Today's applications may use up to 30 or more libraries - 80% of the codebase Dependencies

The OWASP Foundation Spring application development framework : Downloaded 18 million times by over 43,000 organizations in the last year – Vulnerability: Information leakage CVE In Apache CXF application framework: 4.2 million downloads. - Vulnerability: Auth bypass CVE & CVE Dependencies

The OWASP Foundation Do we test for "dependency" issues? NO Does your patch management policy cover application dependencies? Check out:

The OWASP Foundation Information flooding (Melting a developers brain, white noise and "compliance")

The OWASP Foundation Doing things right != Doing the right things “Not all bugs/vulnerabilities are equal” (is HttpOnly important if there is no XSS?) Contextualize Risk (is XSS /SQLi always High Risk?) Do developers need to fix everything? Limited time Finite Resources Task Priority Pass internal audit? White Noise Where do we go now? Context is important! Dick Tracy

The OWASP Foundation Problem Explain issues in “Developer speak” (AKA English)

The OWASP Foundation Is Cross-Site Scripting the same as SQL injection? Both are injection attacks code and data being confused by system Cross Site Scripting is primarily JavaScript injection LDAP Injection, Command Injection, Log Injection, XSS, SQLI etc etc Think old phone systems, Captain Crunch (John Draper) Signaling data and voice data on same logical connection – Phone Phreaking

The OWASP Foundation XSS causes the browser to execute user supplied input as code. The input breaks out of the [data context] and becomes [execution context]. SQLI causes the database or source code calling the database to confuse [data context] and ANSI SQL [ execution context]. Command injection mixes up [data context] and the [execution context]. Out of context

The OWASP Foundation So…. Building secure applications.