A Scanner Sparkly Web Application Proxy Editors and Scanners.

Slides:



Advertisements
Similar presentations
Approaches to meeting the PCI Vulnerability Management and Penetration Testing Requirements Clay Keller.
Advertisements

Copyright © The OWASP Foundation Permission is granted to copy, distribute and/or modify this document under the terms of the GNU Free Documentation.
Copyright © The OWASP Foundation Permission is granted to copy, distribute and/or modify this document under the terms of the Creative Commons Attribution-ShareAlike.
By Skyler Onken.  Who am I?  What is Fuzzing?  Usual Targets  Techniques  Results  Limitations  Why Fuzz?  “Fuzzing the Web”?  Desired Solution.
The OWASP Foundation Copyright © The OWASP Foundation Permission is granted to copy, distribute and/or modify this document under.
OWASP Periodic Table of Vulnerabilities James Landis
Web Vulnerability Assessments
Principles of Computer Security: CompTIA Security + ® and Beyond, Third Edition © 2012 Principles of Computer Security: CompTIA Security+ ® and Beyond,
Copyright © The OWASP Foundation Permission is granted to copy, distribute and/or modify this document under the terms of the OWASP License. The OWASP.
OWASP Xenotix XSS Exploit Framework
Introduction to InfoSec – Recitation 6 Nir Krakowski (nirkrako at post.tau.ac.il) Itamar Gilad (itamargi at post.tau.ac.il)
August 1, 2006 Software Security. August 1, 2006 Essential Facts Software Security != Security Features –Cryptography will not make you secure. –Application.
SOFTWARE SECURITY TESTING IS IMPORTANT, DIFFERENT AND DIFFICULT Review by Rayna Burgess 4/21/2011.
©2009 Justin C. Klein Keane PHP Code Auditing Session 6 Auditing Strategies & Demonstration Justin C. Klein Keane
Leveraging User Interactions for In-Depth Testing of Web Applications Sean McAllister, Engin Kirda, and Christopher Kruegel RAID ’08 1 Seoyeon Kang November.
The OWASP Foundation Copyright © The OWASP Foundation Permission is granted to copy, distribute and/or modify this document under.
Static Analysis for Dynamic Assessments Greg Patton | September 2014.
“Today over 70% of attacks against a company’s network come at the ‘Application Layer’ not the Network or System layer.” - Gartner Is Your Web Application.
1 Testing Web Application Scanner Tools Elizabeth Fong and Romain Gaucher NIST Verify Conference – Washington, DC, October 30, 2007 Disclaimer: Any commercial.
This is a work of the U.S. Government and is not subject to copyright protection in the United States. The OWASP Foundation OWASP AppSec DC October 2005.
Leveraging User Interactions for In-Depth Testing of Web Application Sean McAllister Secure System Lab, Technical University Vienna, Austria Engin Kirda.
Web Application Security Assessment and Vulnerability Assessment.
Erik Cabetas An Overview of Interpreted Language Vulns.
Security Scanning OWASP Education Nishi Kumar Computer based training
By: Razieh Rezaei Saleh.  Security Evaluation The examination of a system to determine its degree of compliance with a stated security model, security.
Copyright © The OWASP Foundation Permission is granted to copy, distribute and/or modify this document under the terms of the Creative Commons Attribution-ShareAlike.
CTF Mike Gerschefske Justin Gray. What is it? Came from Defcon Came from Defcon UCSB sp0nsorz – won last years Defcon UCSB sp0nsorz – won last years Defcon.
W3af LUCA ALEXANDRA ADELA – MISS 1. w3af  Web Application Attack and Audit Framework  Secures web applications by finding and exploiting web application.
OWASP ASVS Project Discussion & Reflection 1. The case study This is a real open source CMS system, albeit an older release from 2012 The only intentional.
Vulnerability-Specific Execution Filtering (VSEF) for Exploit Prevention on Commodity Software Authors: James Newsome, James Newsome, David Brumley, David.
Presented by Heorot.net.  Understand abilities and limitations of code reviews  Identify potentially “bad” code  Identify and use code review tools.
Brad Baker CS526 May 7 th, /7/ Project goals 2. Test Environment 3. The Problem 4. Some Solutions 5. ModSecurity Overview 6. ModSecurity.
April 14, 2008 Secure Coding Faculty Workshop Web Application Security: Exercise Development Approaches James Walden
A Framework for Automated Web Application Security Evaluation
Web Application Access to Databases. Logistics Test 2: May 1 st (24 hours) Extra office hours: Friday 2:30 – 4:00 pm Tuesday May 5 th – you can review.
Ladd Van Tol Senior Software Engineer Security on the Web Part One - Vulnerabilities.
Adam L. Jacobs, CISSP Principal Program Manager, Oracle 15/16 November 2005 Why is Commercial Software So Vulnerable (and How Can We Fix It)?
Copyright 2007 © The OWASP Foundation Permission is granted to copy, distribute and/or modify this document under the terms of the OWASP License. The OWASP.
Web Application Security Testing Automation.. Copyright © 2008 Deloitte Touche Tohmatsu. All rights reserved.1 What types of automated testing are there?
Version 02U-1 Computer Security: Art and Science1 Penetration Testing by Brad Arkin Scott Stender and Gary McGraw.
Internet of Things Top Ten. Agenda -Introduction -Misconception -Considerations -The OWASP Internet of Things Top 10 Project -The Top 10 Walkthrough.
Copyright © The OWASP Foundation Permission is granted to copy, distribute and/or modify this document under the terms of the OWASP License. The OWASP.
SIGITE 2008: Oct Integrating Web Application Security into the IT Curriculum James Walden Northern Kentucky University.
CAPTURE THE FLAG Introductions beer brew man dutchrowboat.
OWASP Top Ten #1 Unvalidated Input. Agenda What is the OWASP Top 10? Where can I find it? What is Unvalidated Input? What environments are effected? How.
Copyright © The OWASP Foundation Permission is granted to copy, distribute and/or modify this document under the terms of the OWASP License. The OWASP.
AppSec USA 2014 Denver, Colorado CMS Hacking 101 Hacking and Securing Popular Open Source Content Management Systems.
1 ITGD 2202 Supervision:- Assistant Professor Dr. Sana’a Wafa Al-Sayegh Dr. Sana’a Wafa Al-SayeghStudent: Anwaar Ahmed Abu-AlQumboz.
nd Joint Workshop between Security Research Labs in JAPAN and KOREA Marking Scheme for Semantic- aware Web Application Security HPC.
Copyright © The OWASP Foundation Permission is granted to copy, distribute and/or modify this document under the terms of the OWASP License. The OWASP.
Static Analysis James Walden Northern Kentucky University.
Software Security Without The Source Code By Matt Hargett.
Copyright © The OWASP Foundation Permission is granted to copy, distribute and/or modify this document under the terms of the Creative Commons Attribution-ShareAlike.
FROM CONTINUOUS INTEGRATION TO VIRTUAL PATCHING BUILDING APPSEC ALL ALONG THE WEB APPLICATION LIFECYCLE.
Copyright © The OWASP Foundation Permission is granted to copy, distribute and/or modify this document under the terms of the OWASP License. The OWASP.
Software Testing Training Online. Software testing is ruling the software business in current scenario. It provides an objective, independent view of.
Web Application Vulnerabilities, Detection Mechanisms, and Defenses
Security Testing Methods
Software Security ITGD 2202 Supervision:- Assistant Professor
SE604: Software Testing and QA Secure SW Development for QA Lecture#3
^ About the.
Secure Software Development: Theory and Practice
Introduction to Information Security
Marking Scheme for Semantic-aware Web Application Security
PHP / MySQL Introduction
Web Application Penetration Testing
HTML Level II (CyberAdvantage)
Myths About Web Application Security That You Need To Ignore.
Download the Containers!
Tour of OWASP’s projects
Presentation transcript:

A Scanner Sparkly Web Application Proxy Editors and Scanners

Vulnerability Finders What is a scanner? –A tool used by security professionals to locate vulnerabilities present in IT infrastructure What skills are required to use or interpret a scanner? –Depends on many factors (i.e. your brain) What else do I need to know? –A lot about HTTP, HTML, JS, Ajax, and XSS (i.e. RTFM. Also see: “your brain”)

Ways to find vulns Static analysis –Requires source code Source code isn’t that hard to get these days –Generates a lot of false positives More false positives usually also means less false negatives Dynamic analysis –Can find things that static analysis can’t –Also generates a lot of false positives

False what? False negative –Failure of a tool to report a weakness, where in fact there is one present in the code False positive –Reporting of a vulnerability by a tool, when there is none Vulnerability –A property of system security requirements, design implementation, or operation that could be accidentally triggered or intentionally exploited and result in a security failure * Taken from the WASC Glossary (

What method / what tool? Static analysis done with Fortify SCA (or similar tool) by experienced engineers that wrote, helped write, or are re-architecting an application or set of applications Dynamic analysis done by an internal or external vulnerability assessment team using custom-written tools that are written to expose the largest number of vulnerabilities against a web application

COTS Scanners / Fuzzers Strong code coverage via static analysis can be automated by a test harness “driven by a fuzzer” –For C/Java: jCUTE, concolic unit tester + smart fuzz –For.NET: Compuware SecurityChecker, fuzz tests Weak code coverage via dynamic analysis –Commercial tools often do OWASP 2007 Top Ten: A1, A2, A3, A4, A6, and mostly A10 (Unrestricted URL Access). What about A5, A7, A8, A9? –Some tools do targeted fault-injection, and usually only for basic JS, metacharacter, SQL, LDAP, XML –Fuzz testing is almost always random / cheap / poor

Test everything OWASP 2007 Top Ten, MITRE CWE, and WASC Threat Classifications NIST SAMATE Functional Specifications –Suggests reporting on defense levels as well as on literature-defined vulnerabilities –Defense levels are like Good Findings (also see Jaquith: Happy Metrics), but show how positive (aka good) findings are really more like good / better / best

Custom fuzz testing Justin Clarke, Network Security Tools –burpproxy (fast proxy editor that logs) + Perl Perl handles log parsing and LWP fault-injection Could be Python, Ruby, Unix Shell (e.g. cURL) Johnathan Wilkins, Blackhat / CanSecWest –WebScarab (popular editor from OWASP) –ProxMon (tool he wrote at iSecPartners) Written in Python, extensible (plugins, other proxies, etc) Rules from OWASP Testing Guide v2

Burp / WebScarab demo

Missing issues Overflows (buffer, integer, heap, format string) –Static analysis covers this. A new dynamic analysis method in additional demonstration Denial-of-Service (DoS) –Sorry, no demonstration today. But I will address this in the buffer overflow demonstration slightly Incorrect configurations –CISecurity.org (Apache Benchmark by Jeremiah Grossman), Month of PHP Bugs (and fixes!)

MSF-XB Demo

Thank you