Web Site Security Andrew Cormack JANET-CERT ©The JNT Association, 1999.

Slides:



Advertisements
Similar presentations
ForceHTTPS: Protecting High-Security Web Sites from Network Attacks Collin Jackson and Adam Barth.
Advertisements

Michelle J. Gosselin, Jennifer Schommer Guanzhong Wang.
1 Web Servers / Deployment Alastair Dawes Original by Bhupinder Reehal.
Building a Home Web Server Grant Root
19.1 Silberschatz, Galvin and Gagne ©2003 Operating System Concepts with Java Chapter 19: Security The Security Problem Authentication Program Threats.
Lesson 14-Desktop Protection. Overview Protect against malicious code. Use the Internet. Protect against physical tampering.
1 Network Security Derived from original slides by Henric Johnson Blekinge Institute of Technology, Sweden From the book by William Stallings.
Information Networking Security and Assurance Lab National Chung Cheng University 1 Top Vulnerabilities in Web Applications (I) Unvalidated Input:  Information.
Using Internet Information Server And Microsoft ® Internet Explorer To Implement Security On The Intranet HTTP.
Silberschatz, Galvin and Gagne  Operating System Concepts Module 19: Security The Security Problem Authentication Program Threats System Threats.
How Clients and Servers Work Together. Objectives Learn about the interaction of clients and servers Explore the features and functions of Web servers.
Web server security Dr Jim Briggs WEBP security1.
Computer Security and Penetration Testing
© De Montfort University, Web Servers Chris Hand And Howell Istance De Montfort University.
Chapter 6: Hostile Code Guide to Computer Network Security.
Security and Risk Management. Who Am I Matthew Strahan from Content Security Principal Security Consultant I look young, but I’ve been doing this for.
Cosc 4765 Server side Web security. Web security issues From Cenzic Vulnerability report
PRACTICAL STEPS IN SECURING WINDOWS NT Copyright, 1996 © Dale Carnegie & Associates, Inc. TIP For additional advice see Dale Carnegie Training® Presentation.
Chapter 5 Security Threats to Electronic Commerce
Website on Computer Security By: Brittany Freeman.
What is IIS? IIS (Internet Information Server) is a group of Internet servers (including a Web or Hypertext Transfer Protocol server and a File Transfer.
Csci5233 Computer Security1 Bishop: Chapter 27 System Security.
Lesson 15 Client Side Vulnerabilities and you. Active Server Pages MS’s answer to the scripting world of PERL and CGI on Unix Usually Written In Visual.
Some Practical Security AfNOG 2004 Workshop Hervey Allen May 2004 Liberal borrowing from Brian Candler.
NASRULLAH KHAN.  Lecturer : Nasrullah   Website :
Lecture 16 Page 1 CS 236 Online SQL Injection Attacks Many web servers have backing databases –Much of their information stored in a database Web pages.
Microsoft Internet Explorer and the Internet Using Microsoft Explorer 5.
 A viruses is a program that can harm or track your computer. E.g. browser hijacker.  When a viruses accesses the computer it can accesses the HDD and.
18-jan-962. ETH-W4 (ra)1 security on the Web l security l authentication l privacy.
Phishing scams Phishing is the fraudulent practice of sending s purporting to be from reputable companies in order to induce individuals to reveal.
Top Five Web Application Vulnerabilities Vebjørn Moen Selmersenteret/NoWires.org Norsk Kryptoseminar Trondheim
Interception and Analysis Framework for Win32 Scripts (not for public release) Tim Hollebeek, Ph.D.
ColdFusion Security Michael Smith President TeraTech, Inc ColdFusion, Database & VB custom development
Apache Security Travis Jeffries. Introduction Authentication and Authorization Strict Access Methods Defending against Attacks Bad CGI Programs Apache.
Understanding Computer Viruses: What They Can Do, Why People Write Them and How to Defend Against Them Computer Hardware and Software Maintenance.
Web Development Web development never ends: 1.Find out what the stakeholders need (sponsors, users, etc.) 2.Investigate available technology 3.Plan the.
Module 2 – User Safety Privacy Attacks on end users Browser vulnerabilities.
Day12 Network OS. What is an OS? Provides resource management and conflict resolution. –This includes Memory CPU Network Cards.
UNIT-3 1.Web server software and Tools 1IT2031 UNIT-3.
Security Issues with PHP  PHP installation  PHP programming Willa Zhu & Eugene Burger.
Computer Security Status Update FOCUS Meeting, 28 March 2002 Denise Heagerty, CERN Computer Security Officer.
1 Chapter Overview Creating Web Sites and FTP Sites Creating Virtual Directories Managing Site Security Troubleshooting IIS.
NASRULLAH KHAN.  Lecturer : Nasrullah   Website :
ASP. ASP is a powerful tool for making dynamic and interactive Web pages An ASP file can contain text, HTML tags and scripts. Scripts in an ASP file are.
General Concerns on WWW Security Name: Huaying Chen ID# Instructor: Dr Mort Anvari.
Install, configure and test ICT Networks
Website Design:. Once you have created a website on your hard drive you need to get it up on to the Web. This is called "uploading“ or “publishing” or.
Virus Assignment JESS D. How viruses affect people and businesses  What is a virus? A computer virus is a code or a program that is loaded onto your.
Client-Server applications Introduction to Java Applets Client-server architectures Why do Applets exist? What can an Applet do?
(ITI310) By Eng. BASSEM ALSAID SESSIONS 10: Internet Information Services (IIS)
Day 15 Apache. Being a web server Once your system is correctly connected to the network, you could be a web server. –When you go to a web site such as.
Web Server Security: Protecting Your Pages NOAA OAR WebShop 2001 August 2 nd, 2001 Jeremy Warren.
Active X and Signed Applets Chad Bollard. Overview ActiveX  Security Features  Hidden Problems Signed Applets  Security Features  Security Problems.
Securing a Host Computer BY STEPHEN GOSNER. Definition of a Host  Host  In networking, a host is any device that has an IP address.  Hosts include.
Security on the Internet Norman White ©2001. Security What is it? Confidentiality – Can my information be stolen? Integrity – Can it be changed? Availability.
Computer & Network Security
Tonga Institute of Higher Education IT 141: Information Systems
Web Development Web development never ends:
Chapter 6 Application Hardening
Common Methods Used to Commit Computer Crimes
Chapter 27: System Security
Tonga Institute of Higher Education IT 141: Information Systems
Web Servers / Deployment
Tonga Institute of Higher Education IT 141: Information Systems
Security.
Security+ All-In-One Edition Chapter 15 – Web Components
Chapter 7 – and 8 pp 155 – 202 of Web security by Lincoln D. Stein
Operating System Concepts
Test 3 review FTP & Cybersecurity
6. Application Software Security
Presentation transcript:

Web Site Security Andrew Cormack JANET-CERT ©The JNT Association, 1999

Web Site Security, Andrew Cormack Where’s the problem? Number of CIAC bulletins since October 1997: Apache0 IIS5 Solaris8 Windows NT8 (Internet Explorer3 ) See especially CIAC bulletin J-042 on web security

©The JNT Association, 1999Web Site Security, Andrew Cormack First fix your host Minimal configuration don’t run things you don’t need Up to date with patches Keep it that way new bugs every month Pay attention to logs you may only get one warning

©The JNT Association, 1999Web Site Security, Andrew Cormack Limit the scope for errors Minimal access restricted users restricted hosts (e.g. use TCP wrappers) Single function others will compete with web serving and make operation much more complicated

©The JNT Association, 1999Web Site Security, Andrew Cormack What can go wrong Denial of service (availability) Information leakage (privacy) Loss of control (integrity) unauthorised modification or worse

©The JNT Association, 1999Web Site Security, Andrew Cormack Denial of service Not much you can do to prevent it! when does popularity become DoS? Precautions have more performance than likely attacker have different servers for different readers be ready with a "sorry" backup

©The JNT Association, 1999Web Site Security, Andrew Cormack Information leakage (web stuff) Web is designed for publishing Protection mechanisms are weak files have many names addresses can be faked passwords can be sniffed Shared authentication puts other systems at risk! Use offline encryption if you must

©The JNT Association, 1999Web Site Security, Andrew Cormack Information leakage (system stuff) Caused by badly configured servers badly written scripts misguided scripts (finger, last, etc.) Can lose script source code password or other configuration files

©The JNT Association, 1999Web Site Security, Andrew Cormack Loss of control (severe) Beware of uploads replacing graphics or your home page who can publish? how do you know who they are? Unexpected interactions uploads of scripts java applets on multi-purpose server

©The JNT Association, 1999Web Site Security, Andrew Cormack Loss of control (fatal) Allowing readers to run commands Never run server as root hackers have to work harder Never put test scripts on live server and check, check and re-check production scripts Compromised system probably a write-off

©The JNT Association, 1999Web Site Security, Andrew Cormack The worst cgi script w $1 What if $1 is ”andrew;cat /etc/passwd”... Use perl -wT to trap errors better a 500 error than a lost system Even commercial scripts have errors!

©The JNT Association, 1999Web Site Security, Andrew Cormack Conclusion Don't build on sand Think carefully about "ease of use” Plan for the worst Talk with CERT Never stop!

©The JNT Association, 1999Web Site Security, Andrew Cormack Don’t forget the browser Browsers sometimes run untrusted code ActiveX - can run any Windows application JavaScript - limited but powerful functions Java - runs in a sandbox, but this may leak Added “viewers”, e.g. word, excel Beware!

©The JNT Association, 1999Web Site Security, Andrew Cormack Applet capabilities Such programs can do anything the user can read or write files on local disk or network make calls on the network Browser control is a hard problem but not unique: mail and office apps are the same Technical fixes are draconian User education (like viruses) is the best bet

©The JNT Association, 1999Web Site Security, Andrew Cormack