IDENTIFYING SECURITY ISSUES IN A HIGHER INSTITUTE CMS LAB SITE Panagiotis Loumpardias Konstantinos Chimos.

Slides:



Advertisements
Similar presentations
WordPress Installation for Beginners Sheila Bergman
Advertisements

Introduction to Web Design, HTML & WordPress. What is Web Design? Web Design encompasses many different skills and disciplines in the building and maintenance.
Cross-Site Scripting Issues and Defenses Ed Skoudis Predictive Systems © 2002, Predictive Systems.
PowerPoint presentation of first 25 pages of instructional manual Edith Fabiyi Essentials of Internet Access.
OWASP Web Vulnerabilities and Auditing
©2009 Justin C. Klein Keane PHP Code Auditing Session 3 – Tools of the Trade & Crafting Malicious Input Justin C. Klein Keane
WebGoat & WebScarab “What is computer security for $1000 Alex?”
ITP 457 Network Security Network Hacking 101. Hacking Methodology (review) 1. Gather target information 2. Identify services and ports open on the target.
Information Networking Security and Assurance Lab National Chung Cheng University The Ten Most Critical Web Application Security Vulnerabilities Ryan J.W.
Input Validation For Free Text Fields Project Members: Hagar Offer &Ran Mor Academic Advisor: Dr Gera Weiss Technical Advisors: Raffi Lipkin & Nadav Attias.
How Clients and Servers Work Together. Objectives Learn about the interaction of clients and servers Explore the features and functions of Web servers.
Fall 2011 Nassau Community College ITE153 – Operating Systems Session 24 NTFS Permissions and Sharing Printers 1.
Computer Security and Penetration Testing
Penetration testing – W3AF Tool
Chapter 4 Application Security Knowledge and Test Prep
Microsoft Baseline Security Analyzer INLS 187 Security Software Presentation by Hinár György Polczer
Lecture 16 Page 1 CS 236 Online Cross-Site Scripting XSS Many sites allow users to upload information –Blogs, photo sharing, Facebook, etc. –Which gets.
Virtual Machine Management
Norman SecureSurf Protect your users when surfing the Internet.
Nikto LUCA ALEXANDRA ADELA. Nikto  Web server assessment tool  Written by Chris Solo and David Lodge  Released on December 27, 2001  Stable release:
Introduction to InfoSec – Recitation 10 Nir Krakowski (nirkrako at post.tau.ac.il) Itamar Gilad (itamargi at post.tau.ac.il)
Website Administration Information Systems 337 Prof. Harry Plantinga.
1 Web Developer & Design Foundations with XHTML Chapter 6 Key Concepts.
Fundamentals of Networking Discovery 1, Chapter 2 Operating Systems.
Prevent Cross-Site Scripting (XSS) attack
WEB SECURITY WEEK 3 Computer Security Group University of Texas at Dallas.
CSCI 6962: Server-side Design and Programming Secure Web Programming.
Lecture 14 – Web Security SFDV3011 – Advanced Web Development 1.
INTERNET APPLICATION DEVELOPMENT For More visit:
XHTML Introductory1 Linking and Publishing Basic Web Pages Chapter 3.
Copyright 2007 © The OWASP Foundation Permission is granted to copy, distribute and/or modify this document under the terms of the OWASP License. The OWASP.
1 Internet Browsing Vulnerabilities and Security ECE4112 Final Lab Ye Yan Frank Park Scott Kim Neil Joshi.
Client – Server Application Can you create a client server application: The server will be running as a service: does not have a GUI The server will run.
Done by: Hanadi Muhsen1 Tutorial 1.  Learn the history of JavaScript  Create a script element  Write text to a Web page with JavaScript  Understand.
Linux/Windows File Sharing Othman Almazrooa CEN Student, Eastern Kentucky University.
Web Application Security ECE ECE Internetwork Security What is a Web Application? An application generally comprised of a collection of scripts.
Top Five Web Application Vulnerabilities Vebjørn Moen Selmersenteret/NoWires.org Norsk Kryptoseminar Trondheim
Interception and Analysis Framework for Win32 Scripts (not for public release) Tim Hollebeek, Ph.D.
ITCS373: Internet Technology Lecture 5: More HTML.
Copyright © The OWASP Foundation Permission is granted to copy, distribute and/or modify this document under the terms of the OWASP License. The OWASP.
Security Attacks CS 795. Buffer Overflow Problem Buffer overflows can be triggered by inputs that are designed to execute code, or alter the way the program.
Understanding Computer Viruses: What They Can Do, Why People Write Them and How to Defend Against Them Computer Hardware and Software Maintenance.
1 Security Penetration Testing Angela Davis Mrinmoy Ghosh ECE4112 – Internetwork Security Georgia Institute of Technology.
Web Applications Testing By Jamie Rougvie Supported by.
Cross Site Scripting and its Issues By Odion Oisamoje.
Website Administration Information Systems 337 Prof. Harry Plantinga.
Living Online Lesson 3 Using the Internet IC3 Basics Internet and Computing Core Certification Ambrose, Bergerud, Buscge, Morrison, Wells-Pusins.
Web Security Lesson Summary ●Overview of Web and security vulnerabilities ●Cross Site Scripting ●Cross Site Request Forgery ●SQL Injection.
Mr. Justin “JET” Turner CSCI 3000 – Fall 2015 CRN Section A – TR 9:30-10:45 CRN – Section B – TR 5:30-6:45.
Web Application (In)security Note: Unless noted differently, all scanned figures were from the textbook, Stuttard & Pinto, 2011.
Session Management Tyler Moore CS7403 University of Tulsa Slides adapted in part or whole from Dan Boneh, Stanford CS155 1.
+ Publishing Your First Post USING WORDPRESS. + A CMS (content management system) is an application that allows you to publish, edit, modify, organize,
Introduction: Introduction: As technology advances, we have cheaper and easier ways to stay connected to the world around us. We are able to order almost.
ASP.NET WEB Applications. ASP.NET  Web application framework developed by Microsoft  Build dynamic data driven web applications and web services  Subset.
Mac OS X backdoor Trojan, now in beta? 報告人:劉旭哲. Introduction It targets users of Mac OS X As even the malware itself admits, it is not yet finished. It.
By Collin Donaldson. Hacking is only legal under the following circumstances: 1.You hack (penetration test) a device/network you own. 2.You gain explicit,
CMS Showdown What Is A Content Management System (CMS)? CMS Website Content Outside Content Social Media Connections with CRM Programs Statistics and.
Joomla Awdhesh Kumar Singsys Pte Ltd. What is Joomla? Joomla is an award-winning content management system (CMS), which enables you to build Web sites.
Windows Vista Configuration MCTS : Internet Explorer 7.0.
7 Tips To Improve Your Website Security. Introduction Use of Content management systems like WordPress, Joomla & Drupal, utilization of various tools,
SlideSet #20: Input Validation and Cross-site Scripting Attacks (XSS) SY306 Web and Databases for Cyber Operations.
Javascript worms By Benjamin Mossé SecPro
Google’s Gruyere1 : An XSS Example Presented by: Terry Gregory
World Wide Web policy.
Cross-Site Request Forgeries: Exploitation and Prevention
Cyber Operation and Penetration Testing Social Engineering Attack and Web-based Exploitation Cliff Zou University of Central Florida.
Module 3 Using Linux.
Designing a Web Site.
Presentation transcript:

IDENTIFYING SECURITY ISSUES IN A HIGHER INSTITUTE CMS LAB SITE Panagiotis Loumpardias Konstantinos Chimos

INTRODUCTION  Websites number rises constantly  Websites are easy to build  There are step by step guides for everything  Many users are turning to CMSs like (Drupal, Joomla, etc.)  Universities also use them

ARE WEBSITES SAFE?  The answer should be “No one can really tell for sure!”  Searching for “Hack a website” returns 74 million results in Google  Website attacks in 2013 were 75% more than 2012

SECURING A WEBSITE 1. Design and deploy on a test server 2. Look for known vulnerabilities of the software you use 3. Check your site with security auditing tools 4. Fix vulnerabilities 5. Check again

AUDITING TOOLS  Lots of options  Commercial  Open Source  Windows  Linux  With GUI  Command line

TOOL 1 - ARACHNI  Open Source  Runs on Mac & Linux  Scalable resource usage combining more than one machines  User collaboration friendly  Can run on remote computer and access it from web with browser

ARACHNI RESULTS TitleFindingsSeverity Cross-Site Request Forgery85High A backdoor file exists on the server32High Unencrypted password form2Medium Backup file81Medium Common sensitive file14Low Password field with auto-complete41Low Interesting response50Informational address disclosure2Informational

RESULTS EVALUATION  Cross Site Request Forgery could only be exploited when posting full HTML as administrator  Server backdoors where false results  Unencrypted password forms can lead to password interception  Backup files were also false results  Some common sensitive files existed but without sensitive information  Auto completed password fields could lead to password loss especially when there is physical access to user’s computer  Interesting responses were mostly the server denying access  addresses were public

TOOL 2 – OWASP ZAP  Open Source  Cross Platform (Windows – Linux)  Proposes solution for most results  User can rate and comment on results for help in troubleshooting

OWASP ZED RESULTS TitleFindingsSeverity Cross-domain JavaScript source file inclusion 366Low Password Autocomplete in browser 364Low X-Content-Type-Options header missing 417Low X-Frame-Options header not set394Informational

RESULTS EVALUATION  Cross-domain JavaScript source file inclusion is true but all the files are coming from trusted sources  Password Autocomplete in browser can lead to password theft  X-Content-Type-Options header is missing and specific browsers can be tricked into treating malicious but cleverly named files to be executed  X-Frame-Options header is not set and can result to click jacking attacks

TOOL 3 - W3AF  Open Source  Runs Best on Linux  Can directly exploit some of the vulnerabilities it discovers  Does not display the result multiple times if found in all pages  It only exports the results in various formats but does not save the program session

W3AF – RESULTS TitleFindingsSeverity Server-header2Informational Php_eggs2Informational Dns_wildcard1Informational Strange_http_codes1Informational Click_jacking1High Allowed_methods2Informational Find_vhosts1Medium hmap1Informational

RESULTS EVALUATION  Click Jacking was the only valid result  Discovery of virtual hosts may prove to be problematic if they are vulnerable

JSKY  Commercial  Runs on Windows  The only commercial program with a fully working and not limited trial  Describes the impact of vulnerabilities found  Gives recommendations for troubleshooting

JSKY - RESULTS VulnerabilityTotal foundSeverity DELETE Method enabled1Informational Instal.php1Low Robots text file found1Informational Possible sensitive directiories6Informational

RESULTS EVALUATION  None of them proved to be threatening in our case

CONCLUSION  Auditing with only one program may not be enough  If on a budget, open source tools seem to give decent results  Using SSL should be the first thing to do if possible  Chose a CMS with strong community support for more help in troubleshooting  Run your own and try to find even more results if possible