Computer Security and Penetration Testing

Slides:



Advertisements
Similar presentations
Chapter 17: WEB COMPONENTS
Advertisements

Internet Security Protocols
DT228/3 Web Development WWW and Client server model.
Understand Web Page Development Software Development Fundamentals LESSON 4.1.
Building Applications using ASP.NET and C# / Session 1 / 1 of 21 Session 1.
Server-Side vs. Client-Side Scripting Languages
1 Chapter 12 Working With Access 2000 on the Internet.
Chapter Concepts Review Markup Languages
15 Chapter 15 Web Database Development Database Systems: Design, Implementation, and Management, Fifth Edition, Rob and Coronel.
ACTIVE X By Ethan Huang. OUTLINE What is ActiveX? Component of ActiveX Why ActiveX? ActiveX and Java Security Issue.
INTERNET DATABASE Chapter 9. u Basics of Internet, Web, HTTP, HTML, URLs. u Advantages and disadvantages of Web as a database platform. u Approaches for.
Introduction to Web Database Processing
Introduction to Web Application Architectures Web Application Architectures 18 th March 2005 Bogdan L. Vrusias
Security Awareness: Applying Practical Security in Your World, Second Edition Chapter 3 Internet Security.
INTERNET DATABASE. Internet and E-commerce Internet – a worldwide collection of interconnected computer network Internet – a worldwide collection of interconnected.
Active X Microsoft’s Answer to Dynamic Content Reference: Using Active X by Brian Farrar QUE
Introduction to Web Interface Technology (CSE2030)
Security+ Guide to Network Security Fundamentals, Third Edition
Mobile Code and Worms By Mitun Sinha Pandurang Kamat 04/16/2003.
Introduction to Web Interface Technology (CSE2030)
Mgt 240 Lecture Website Construction: Software and Language Alternatives March 29, 2005.
COMPUTER TERMS PART 1. COOKIE A cookie is a small amount of data generated by a website and saved by your web browser. Its purpose is to remember information.
Web Programming Language Dr. Ken Cosh Week 1 (Introduction)
1 Introduction to Web Development. Web Basics The Web consists of computers on the Internet connected to each other in a specific way Used in all levels.
11 SECURING INTERNET MESSAGING Chapter 9. Chapter 9: SECURING INTERNET MESSAGING2 CHAPTER OBJECTIVES  Explain basic concepts of Internet messaging. 
INTRODUCTION TO WEB DATABASE PROGRAMMING
Computer Concepts 2014 Chapter 7 The Web and .
FALL 2005CSI 4118 – UNIVERSITY OF OTTAWA1 Part 4 Web technologies: HTTP, CGI, PHP,Java applets)
1 Modular Software/ Component Software 2 Modular Software Code developed in modules. Modules can then be linked together to produce finished product/program.
Introduction to ASP.NET. Prehistory of ASP.NET Original Internet – text based WWW – static graphical content  HTML (client-side) Need for interactive.
Principles of Computer Security: CompTIA Security + ® and Beyond, Third Edition © 2012 Principles of Computer Security: CompTIA Security+ ® and Beyond,
Principles of Computer Security: CompTIA Security + ® and Beyond, Second Edition © 2010 Web Components Chapter 17.
Chapter 16 The World Wide Web Chapter Goals Compare and contrast the Internet and the World Wide Web Describe general Web processing Describe several.
Web Browser Security Prepared By Mohammed EL-Batta Mohammed Soubih Supervised By Eng. Eman alajrami Explain Date 10. may University of Palestine.
Web Security Chapter 6. Learning Objectives Understand SSL/TLS protocols and their implementation on the Internet Understand HTTPS protocol as it relates.
5 Chapter Five Web Servers. 5 Chapter Objectives Learn about the Microsoft Personal Web Server Software Learn how to improve Web site performance Learn.
Chapter 17 - Deploying Java Applications on the Web1 Chapter 17 Deploying Java Applications on the Web.
Computer Security and Penetration Testing
10/5/2015CS346 PHP1 Module 1 Introduction to PHP.
3-Protecting Systems Dr. John P. Abraham Professor UTPA.
Security Awareness: Applying Practical Security in Your World Chapter 4: Chapter 4: Internet Security.
1 Internet Browsing Vulnerabilities and Security ECE4112 Final Lab Ye Yan Frank Park Scott Kim Neil Joshi.
Microsoft Internet Explorer and the Internet Using Microsoft Explorer 5.
Protecting Internet Communications: Encryption  Encryption: Process of transforming plain text or data into cipher text that cannot be read by anyone.
Chapter 34 Java Technology for Active Web Documents methods used to provide continuous Web updates to browser – Server push – Active documents.
CSCE 201 Web Browser Security Fall CSCE Farkas2 Web Evolution Web Evolution Past: Human usage – HTTP – Static Web pages (HTML) Current: Human.
Web Pages with Features. Features on Web Pages Interactive Pages –Shows current date, get server’s IP, interactive quizzes Processing Forms –Serach a.
Active Server Pages  In this chapter, you will learn:  How browsers and servers interacted on the Internet when the Internet first became popular 
Database Systems: Design, Implementation, and Management Eighth Edition Chapter 14 Database Connectivity and Web Technologies.
1 MSCS 237 Overview of web technologies (A specific type of distributed systems)
Web Pages with Features. Features on Web Pages Interactive Pages –Shows current date, get server’s IP, interactive quizzes Processing Forms –Serach a.
Principles of Computer Security: CompTIA Security + ® and Beyond, Third Edition © 2012 Principles of Computer Security: CompTIA Security+ ® and Beyond,
1 Mobile Code l Java Review –Java code is platform independent and runs within a “sandbox”, or a set of restrictions that keep downloaded applets from.
14 1 Chapter 14 Web Database Development Database Systems: Design, Implementation, and Management, Sixth Edition, Rob and Coronel.
Chapter 12: How Private are Web Interactions?. Why we care? How much of your personal info was released to the Internet each time you view a Web page?
Scripting Languages Client Side and Server Side. Examples of client side/server side Examples of client-side side include: JavaScript Jquery (uses a JavaScript.
NASRULLAH KHAN.  Lecturer : Nasrullah   Website :
ASP-2-1 SERVER AND CLIENT SIDE SCRITPING Colorado Technical University IT420 Tim Peterson.
Database Systems: Design, Implementation, and Management Eighth Edition Chapter 14 Database Connectivity and Web Technologies.
1 CSC160 Chapter 1: Introduction to JavaScript Chapter 2: Placing JavaScript in an HTML File.
© 2007 Cisco Systems, Inc. All rights reserved.Cisco Public ITE PC v4.0 Chapter 1 1 Basic Security Networking for Home and Small Businesses – Chapter 8.
Active X and Signed Applets Chad Bollard. Overview ActiveX  Security Features  Hidden Problems Signed Applets  Security Features  Security Problems.
Vulnerabilities in Operating Systems Michael Gaydeski COSC December 2008.
Your Interactive Guide to the Digital World Discovering Computers 2012 Chapter 13 Computer Programs and Programming Languages.
1 Chapter 1 INTRODUCTION TO WEB. 2 Objectives In this chapter, you will: Become familiar with the architecture of the World Wide Web Learn about communication.
Applications Active Web Documents Active Web Documents.
Tonga Institute of Higher Education IT 141: Information Systems
Tonga Institute of Higher Education IT 141: Information Systems
Tonga Institute of Higher Education IT 141: Information Systems
Chapters 5 & 6 of Web security. pp
Presentation transcript:

Computer Security and Penetration Testing Chapter 13 Programming Exploits

Objectives Describe the evolution of programming exploits Recognize vulnerabilities in ActiveX controls Identify steps to counter vulnerabilities in ActiveX controls Recognize vulnerabilities in VBScript Identify steps to counter vulnerabilities in VBScript Computer Security and Penetration Testing

Objectives (continued) Recognize vulnerabilities in HTML Identify steps to counter vulnerabilities in HTML Recognize vulnerabilities in Java and JavaScript Identify steps to counter vulnerabilities in Java and JavaScript Computer Security and Penetration Testing

C and C++ Vulnerabilities in the C and C++ Programming Languages. - Buffer over-runs - Failure to handle errors - Improper file access C and C++ Security Measures Computer Security and Penetration Testing

C and C++ Computer Security and Penetration Testing

.NET Framework Vulnerabilities in the .NET Framework - Cross-site scripting - Integer overflow Countering .NET Framework Vulnerabilities Computer Security and Penetration Testing

HTML5 Hypertext Markup Language (HTML) HTML is not a dynamic language Most basic script used to develop Web pages Uses a set of markup tags to define the structure of Web pages Browsers represent pages by interpreting these tags HTML is not a dynamic language Cannot be executed successfully except within a Web browser Computer Security and Penetration Testing

HTML5 (continued) HTML is essentially bulletproof and benign as long as it is used to display static text Arbitrary requirements for more finished and sophisticated pages Have required the development of many more tags and formatting conventions With increased complexity came increased opportunities for hackers to discover vulnerabilities Computer Security and Penetration Testing

Countering HTML5 Vulnerabilities Make sure patches are up to date Pay attention when new exploits are reported Activate the automated patch management software Turn off services and features that you Know to be vulnerable to attack Do not understand Do not use Avoid known dangerous sites by installing and updating security software Computer Security and Penetration Testing

Countering HTML5 Vulnerabilities (continued) Secure transfer of data has been made available by protocols such as Secure Sockets Layer (SSL) The way Internet Explorer handled SSL was discovered to be susceptible to a man-in-the-middle exploit Generating random encryption keys of 40 or 128 bits in length has solved this problem Computer Security and Penetration Testing

Java and JavaScript Java is a programming language that is compiled into applications or applets Java applications are stand-alone applications Run on the server or are downloaded to the client JavaScript is a scripting language that runs between <script> tags in a Web page A JavaScript cannot operate on its own, and is not compiled to run Computer Security and Penetration Testing

Java Object-oriented programming language (OOP) developed by Sun Microsystems Designed to run in a platform-independent manner using Java Runtime Environment (JRE) Installed on the client computer as its sandbox In Java, each function is modularized With this low-level modularization There is less of a chance that updating one piece of the application will break other parts Computer Security and Penetration Testing

Java (continued) Java was intended to be developed quickly with pretested parts Java applets provide functionality on the Internet Require Java-enabled browsers Java is machine-safe Can only act upon other objects within the JRE Java has no access to write, modify, or delete files on the hard drive or to modify the operating system Computer Security and Penetration Testing

JavaScript Scripting language developed by Netscape Communications Corporation Similar to VBScript in terms of implementation Almost every browser on almost every platform is JavaScript-enabled Like Java, requires a runtime environment As a script, the network bandwidth and client-side memory resource use is less than that required for the larger and more robust Java Computer Security and Penetration Testing

Security Vulnerabilities in Java Vulnerabilities of Java: Client-side malevolent applets Server-side cross-scripting Server-side address spoofing A substantial percentage of vulnerabilities are related to vulnerabilities in the JRE Which can result in applets arbitrarily giving themselves elevated privileges Computer Security and Penetration Testing

Security Vulnerabilities in Java (continued) Computer Security and Penetration Testing

Security Vulnerabilities in Java (continued) Because Java is a platform-independent technology Issues such as malevolent applets can be used against any platform that has the JRE installed Client-side attacks include: Attacks on file integrity Buffer overflow Storm attacks Denial-of-service attacks Disclosure attacks Annoyance attacks Computer Security and Penetration Testing

Vulnerabilities in JavaScript Vulnerabilities are similar to those in VBScript JavaScript vulnerabilities allow: Sending e-mail messages with information about the target computer to a client Opening and closing applications on the target computer Modifying files on the victim’s computer Main threat posed by JavaScript May be used to download components on a user’s computer without his or her knowledge Computer Security and Penetration Testing

Countering Java and JavaScript Vulnerabilities Best preventative measure for an end user Perform all updates as soon as they are available Keep virus definitions in their antivirus or security program updated Set the Internet Options Control Panel To ask for permission before running JavaScripts or downloading Java applets Check the authenticity of the validation signatures attached to applets and scripts Computer Security and Penetration Testing

Countering Java and JavaScript Vulnerabilities (continued) Check for security of links available on the signed scripts Programmers should develop and adhere to secure programming guidelines And sign their scripts Computer Security and Penetration Testing

Summary Programming exploits are the defects in various programming languages that are used to develop server-side and client-side applications ActiveX controls are stand-alone compiled applications that make it possible to link and allow interactions between various applications The design flaw in ActiveX is that it can do anything the user can do Attackers can use ActiveX to modify resources on an implementation of Windows Computer Security and Penetration Testing

Summary (continued) To safeguard against attacks, end users should install the most recent and stable version of Internet Explorer available VBScript can be used within HTML tags to produce a dynamic HTML page One of the most common exploits used on the Internet is a buffer overflow If you are administering a network, do not allow use of IE or Outlook Computer Security and Penetration Testing

Summary (continued) If you are the administrator of a Web site, run an antivirus application on your Web server to search for known bad ActiveX controls Hypertext Markup Language (HTML) is the most basic script used to develop Web pages The most effective way to counter HTML-related exploits is to keep up with the latest patches Java and JavaScript languages The best preventive measure for end users is to perform all updates as soon as they are available Computer Security and Penetration Testing