Web Security Demystified Justin C. Klein Keane Sr. InfoSec Specialist University of Pennsylvania School of Arts and Sciences Information Security and Unix.

Slides:



Advertisements
Similar presentations
Nick Feamster CS 6262 Spring 2009
Advertisements

What is code injection? Code injection is the exploitation of a computer bug that is caused by processing invalid data. Code injection can be used by.
Creating Stronger, Safer, Web Facing Code JPL IT Security Mary Rivera June 17, 2011.
©2009 Justin C. Klein Keane PHP Code Auditing Session 3 – Tools of the Trade & Crafting Malicious Input Justin C. Klein Keane
©2009 Justin C. Klein Keane PHP Code Auditing Session 5 XSS & XSRF Justin C. Klein Keane
©2009 Justin C. Klein Keane PHP Code Auditing Session 4.3 – Information Disclosure & Authentication Bypass Justin C. Klein Keane
Hackers, Crackers, and Network Intruders: Heroes, villains, or delinquents? Tim McLaren Thursday, September 28, 2000 McMaster University.
-Ajay Babu.D y5cs022.. Contents Who is hacker? History of hacking Types of hacking Do You Know? What do hackers do? - Some Examples on Web application.
Lecture 2 Page 1 CS 236, Spring 2008 Security Principles and Policies CS 236 On-Line MS Program Networks and Systems Security Peter Reiher Spring, 2008.
Copyright Justin C. Klein Keane InfoSec Training Introduction to Information Security Concepts.
Server-Side vs. Client-Side Scripting Languages
Spotting Web Vulnerabilities (from the eyes of an Script Kiddie)
©2009 Justin C. Klein Keane PHP Code Auditing Session 6 Auditing Strategies & Demonstration Justin C. Klein Keane
Copyright 2010 Justin C. Klein Keane Using Kojoney Open Source Low Interaction Honeypot to Develop Defensive Strategies and Fingerprint Post-Compromise.
Presented by Paul Gilzow Web Communications University of Missouri #hew08xss.
Lecture 16 Page 1 CS 236 Online Cross-Site Scripting XSS Many sites allow users to upload information –Blogs, photo sharing, Facebook, etc. –Which gets.
CROSS SITE SCRIPTING..! (XSS). Overview What is XSS? Types of XSS Real world Example Impact of XSS How to protect against XSS?
Handling Security Threats in Kentico CMS Karol Jarkovsky Sr. Solution Architect Kentico Software
Presenter Deddie Tjahjono.  Introduction  Website Application Layer  Why Web Application Security  Web Apps Security Scanner  About  Feature  How.
Web Application Vulnerabilities Checklist. EC-Council Parameter Checklist  URL request  URL encoding  Query string  Header  Cookie  Form field 
Web-based Document Management System By Group 3 Xinyi Dong Matthew Downs Joshua Ferguson Sriram Gopinath Sayan Kole.
Security and Risk Management. Who Am I Matthew Strahan from Content Security Principal Security Consultant I look young, but I’ve been doing this for.
Botnets An Introduction Into the World of Botnets Tyler Hudak
Speaker : YUN–KUAN,CHANG Date : 2009/10/13 Working the botnet: how dynamic DNS is revitalising the zombie army.
Copyright Justin C. Klein HECTOR Security Intelligence Platform Developed for: University of Pennsylvania School of Arts & Science.
Drupal Security Securing your Configuration Justin C. Klein Keane University of Pennsylvania School of Arts and Sciences Information Security and Unix.
Demystifying Backdoor Shells and IRC Bots: The Risk … By : Jonathan.
Prepared By, Mahadir Ahmad. StopBadware makes the Web safer through the prevention, mitigation, and remediation of badware websites. partners include.
CSCI 6962: Server-side Design and Programming Secure Web Programming.
© All rights reserved. Zend Technologies, Inc. PHP Security Kevin Schroeder Zend Technologies.
Business Computing 550 Lesson 6. 2 Security Threats on Web Sites Issues and vulnerabilities 1.Illegal Access and Use (Hacking the system or users exposing.
November 13, 2008 Ohio Information Security Forum Attack Surface of Web Applications James Walden Northern Kentucky University
Copyright Justin C. Klein Keane Drupal Threat Landscape.
Discussion Panelists: Justin C. Klein Keane Sr. Information Security Specialist University of Pennsylvania Jonathan Hanny Application Security Specialist.
CMS Security Justin Klein Keane CMS Working Group March 3, 2010.
Copyright 2007 © The OWASP Foundation Permission is granted to copy, distribute and/or modify this document under the terms of the OWASP License. The OWASP.
Attacking Applications: SQL Injection & Buffer Overflows.
© Copyright 2013 Hewlett-Packard Development Company, L.P. The information contained herein is subject to change without notice. 1 RubyJax Brent Morris/
Click to edit Master title style Click to edit Master text styles –Second level Third level –Fourth level »Fifth level June 10 th, 2009Event details (title,
1 Vulnerability Assessment of Grid Software James A. Kupsch Computer Sciences Department University of Wisconsin Condor Week 2007 May 2, 2007.
Security - Why Bother? Your projects in this class are not likely to be used for some critical infrastructure or real-world sensitive data. Why should.
October 3, 2008IMI Security Symposium Application Security through a Hacker’s Eyes James Walden Northern Kentucky University
Web Applications Testing By Jamie Rougvie Supported by.
Security (Keep your site secure at extension level) Sergey Gorstka Fastw3b.
Crash Course in Web Hacking
Web Application Vulnerabilities ECE 4112 Internetwork Security, Spring 2005 Chris Kelly Chris Lewis April 28, 2005 ECE 4112 Internetwork Security, Spring.
Lecture 16 Page 1 CS 236 Online Web Security CS 236 On-Line MS Program Networks and Systems Security Peter Reiher.
Web Security Group 5 Adam Swett Brian Marco. Why Web Security? Web sites and web applications constantly growing Complex business applications are now.
Lecture 13 Page 1 CS 236 Online Principles for Secure Software Following these doesn’t guarantee security But they touch on the most commonly seen security.
Presented By: Chandra Kollipara. Cross-Site Scripting: Cross-Site Scripting attacks are a type of injection problem, in which malicious scripts are injected.
PHP Error Handling & Reporting. Error Handling Never allow a default error message or error number returned by the mysql_error() and mysql_errno() functions.
Computer Security By Duncan Hall.
Week 7 - Wednesday.  Web security – user side.
Session 11: Cookies, Sessions ans Security iNET Academy Open Source Web Development.
Lecture 19 Page 1 CS 236 Online 6. Application Software Security Why it’s important: –Security flaws in applications are increasingly the attacker’s entry.
Javascript worms By Benjamin Mossé SecPro
Internet Self Defense 101 Rex Booth.
Chapter 7: Identifying Advanced Attacks
TOPIC: Web Security (Part-4)
Cross-Site Scripting Travis Deyarmin.
Copyright Justin C. Klein Keane
Jon Peppler, Menlo Security Channels
Riding Someone Else’s Wave with CSRF
CSC 495/583 Topics of Software Security Intro to Web Security
Information Security Awareness
Web Security Advanced Network Security Peter Reiher August, 2014
Engineering Secure Software
Security Principles and Policies CS 236 On-Line MS Program Networks and Systems Security Peter Reiher.
6. Application Software Security
Presentation transcript:

Web Security Demystified Justin C. Klein Keane Sr. InfoSec Specialist University of Pennsylvania School of Arts and Sciences Information Security and Unix Systems Twitter: MadIrish2600

Overview About your site, from evil eyes Attacker objective Means of attack Motive Why this stuff works What you can do

Erroneous Assumptions “I'm running a small site, who would want to hack it?” “I back everything up nightly, at most I'll only lose a days worth of stuff.” “I'm the only one with admin rights, so it's not an issue.” “It doesn't matter if the site goes down from time to time.” Your data isn't necessarily what an attacker wants!

Risk Analysis Risk is often calculated as:  Threat x Impact x Likelihood Unfortunately quantifying “threat” is almost impossible Likelihood is also tough to gauge Impact we can do though (maybe)

Objectives First the obvious ones:  p0wn your box3n  Deface your website  Abuse your e-commerce  Steal your data  Account access

Objectives (cont.) Less obvious:  Black hat SEO  Bandwidth (botnets) Spam Phishing Fast flux DNS  Hosting Drive by download RFI  Click fraud

Objectives (cont.) Ultimately you can never predict!

Means Script injection (user trust exploitation)  Stored and reflected XSRF (application trust exploitation) SQL Injection Account compromise  Brute force  Session flaws  Social engineering

Means (cont.) Privilege escalation Social engineering  Trust exploitation (content) Information disclosure Code execution Application exploitation  When features become flaws Access control bypass

Means (cont.) 10 years ago XSS wasn't a threat New means emerge regularly

Motive Prestige Money Political The world may never know...

Why hacking works Security is a specialization Security is an evolving, moving target No easy way to automate vulnerability detection Web app attacks don't require proximity Your site is always on You have to be right 100% of the time, the bad guys not so much

Unfortunately Software security flaws are inevitable Studies show a certain number of bugs per X lines of code A percentage of bugs will be security related

A Word... Open source vs. closed source  No matter what anyone tells you, neither is more secure Check out Verscode's analysis:  html html Closed source does put more onus on the vendor though

Roots of the Problem Mixing data with code  HTML is inherently flawed in this respect  Where does display stop and execution begin? Input validation Output validation It's usually easier to do things in an unsafe way

Emerging Sources of Vulnerability The web is evolving! Flash or other animation AJAX Remote data sources, API's and interoperability New platforms, code, and technology New programmers

Learn to Commit to an application lifecycle  Security is an ongoing process  Plan for vulnerabilities, and patches! Be sure your code evolves as threats do Keep your components up to date Use all the security tools of the stack  Database, filesystem, operating system, etc.

Learn to Protect, detect, react  If you can't prevent, log!  Segregate your detection mechanisms KISS  Complexity is the enemy of security Enforce permissions  You are using permissions right?  Privilege separations and privilege enforcement

Extend your Security Bake security in (from the start) Add security on  Use additions like: IDS Web application firewall IPS Encryption Code review and penetration testing etc.

Questions Thanks!