Chapter 2. Core Defense Mechanisms. Fundamental security problem All user input is untrusted.

Slides:



Advertisements
Similar presentations
Authenticating Users. Objectives Explain why authentication is a critical aspect of network security Explain why firewalls authenticate and how they identify.
Advertisements

Parameter Tampering. Attacking the Ecommerce Shopping Cart In the above image we see that a user who wants to purchase a Television visits an online Store.
ATTACKING AUTHENTICATION The Web Application Hacker’s Handbook, Ch. 6 Presenter: Jie Huang 10/31/2012.
Software Security Lecture 1 Fang Yu Dept. of MIS, National Chengchi University Spring 2011.
Exploiting Information Disclosure Vincent CH14. Introduction In this chapter, we will try to extract further information from an application during an.
Attacking Session Management Juliette Lessing
Automating Bespoke Attack Ruei-Jiun Chapter 13. Outline Uses of bespoke automation ◦ Enumerating identifiers ◦ Harvesting data ◦ Web application fuzzing.
Online Banking Fraud Prevention Recommendations and Best Practices This document provides you with fraud prevention best practices that every employee.
Information Security Policies and Standards
It’s always better live. MSDN Events Security Best Practices Part 2 of 2 Reducing Vulnerabilities using Visual Studio 2008.
Information Networking Security and Assurance Lab National Chung Cheng University The Ten Most Critical Web Application Security Vulnerabilities Ryan J.W.
It’s always better live. MSDN Events Securing Web Applications Part 1 of 2 Understanding Threats and Attacks.
Information Networking Security and Assurance Lab National Chung Cheng University 1 Top Vulnerabilities in Web Applications (I) Unvalidated Input:  Information.
ASP.NET 2.0 Chapter 6 Securing the ASP.NET Application.
FIREWALLS & NETWORK SECURITY with Intrusion Detection and VPNs, 2 nd ed. 10 Authenticating Users By Whitman, Mattord, & Austin© 2008 Course Technology.
 Proxy Servers are software that act as intermediaries between client and servers on the Internet.  They help users on private networks get information.
Department Of Computer Engineering
Network Security1 – Chapter 3 – Device Security (B) Security of major devices: How to protect the device against attacks aimed at compromising the device.
The 10 Most Critical Web Application Security Vulnerabilities
Alter – Information Systems 4th ed. © 2002 Prentice Hall 1 E-Business Security.
Designing Security In Web Applications Andrew Tomkowiak 10/8/2013 UW-Platteville Software Engineering Department
Web Application Vulnerabilities Checklist. EC-Council Parameter Checklist  URL request  URL encoding  Query string  Header  Cookie  Form field 
W3af LUCA ALEXANDRA ADELA – MISS 1. w3af  Web Application Attack and Audit Framework  Secures web applications by finding and exploiting web application.
CS426Fall 2010/Lecture 361 Computer Security CS 426 Lecture 36 Perimeter Defense and Firewalls.
Session 11: Security with ASP.NET
Security.NET Chapter 1. How Do Attacks Occur? Stages of attack Examples of attacker actions 1. FootprintRuns a port scan on the firewall 2. PenetrationExploits.
+ Websites Vulnerabilities. + Content Expand of The Internet Use of the Internet Examples Importance of the Internet How to find Security Vulnerabilities.
1-Vulnerabilities 2-Hackers 3-Categories of attacks 4-What a malicious hacker do? 5-Security mechanisms 6-HTTP Web Servers 7-Web applications attacks.
Penetration Testing James Walden Northern Kentucky University.
Robust Defenses for Cross-Site Request Forgery CS6V Presented by Saravana M Subramanian.
Session and cookie management in.Net Justin Brunelle CS795 6/18/2009.
Lecture slides prepared for “Computer Security: Principles and Practice”, 3/e, by William Stallings and Lawrie Brown, Chapter 5 “Database and Cloud Security”.
FIREWALLS Vivek Srinivasan. Contents Introduction Need for firewalls Different types of firewalls Conclusion.
COMP3121 E-Commerce Technologies Richard Henson University of Worcester November 2011.
Web Application Security ECE ECE Internetwork Security What is a Web Application? An application generally comprised of a collection of scripts.
Top Five Web Application Vulnerabilities Vebjørn Moen Selmersenteret/NoWires.org Norsk Kryptoseminar Trondheim
 Chapter 14 – Security Engineering 1 Chapter 12 Dependability and Security Specification 1.
HIPS Host-Based Intrusion Prevention System By Ali Adlavaran & Mahdi Mohamad Pour (M.A. Team) Life’s Live in Code Life.
SEC835 Runtime authentication Secure session management Secure use of cryptomaterials.
© 2006 Cisco Systems, Inc. All rights reserved. Cisco IOS Threat Defense Features.
APPLICATION PENETRATION TESTING Author: Herbert H. Thompson Presentation by: Nancy Cohen.
Module 11: Securing a Microsoft ASP.NET Web Application.
October 3, 2008IMI Security Symposium Application Security through a Hacker’s Eyes James Walden Northern Kentucky University
SQL INJECTIONS Presented By: Eloy Viteri. What is SQL Injection An SQL injection attack is executed when a web page allows users to enter text into a.
Building Secure Web Applications With ASP.Net MVC.
MEMBERSHIP AND IDENTITY Active server pages (ASP.NET) 1 Chapter-4.
Ch. 7 -Attacking Session Management Latasha A. Gibbs CSCE 813 – Internet Security, Fall 2012 College of Engineering and Computing University of South Carolina.
Security and Firewalls Ref: Keeping Your Site Comfortably Secure: An Introduction to Firewalls John P. Wack and Lisa J. Carnahan NIST Special Publication.
IT Security. What is Information Security? Information security describes efforts to protect computer and non computer equipment, facilities, data, and.
Protecting Browsers from Extension Vulnerabilities Paper by: Adam Barth, Adrienne Porter Felt, Prateek Saxena at University of California, Berkeley and.
Database Security Cmpe 226 Fall 2015 By Akanksha Jain Jerry Mengyuan Zheng.
OWASP Building Secure Web Applications And the OWASP top 10 vulnerabilities.
CHAPTER 7 Unexpected Input. INTRODUCTION What is Unexpected Input? Something (normally user-supplied data) that is unexpected happen to an application.
Role Of Network IDS in Network Perimeter Defense.
Securing Web Applications Lesson 4B / Slide 1 of 34 J2EE Web Components Pre-assessment Questions 1. Identify the correct return type returned by the doStartTag()
Intro to Web Application Security. iHostCodex Web Services - CEO Project-AG – CoFounder OWASP Panay -Chapter Leader -Web Application Pentester -Ethical.
ASP.NET 2.0 Security Alex Mackman CM Group Ltd
ASHRAY PATEL Securing Public Web Servers. Roadmap Web server security problems Steps to secure public web servers Securing web servers and contents Implementing.
Unit 2 Personal Cyber Security and Social Engineering Part 2.
RADIUS By: Nicole Cappella. Overview  Central Authentication Services  Definition of RADIUS  “AAA Transaction”  Roaming  Security Issues and How.
Database and Cloud Security
Web Application Vulnerabilities, Detection Mechanisms, and Defenses
Design for Security Pepper.
TOPIC: Web Security (Part-4)
Secure Software Confidentiality Integrity Data Security Authentication
– Chapter 3 – Device Security (B)
Lecture 2 - SQL Injection
K!M SAA LOGICAL SECURITY Strong Adaptive Authentication
WWW安全 國立暨南國際大學 資訊管理學系 陳彥錚.
Preventing Privilege Escalation
Presentation transcript:

Chapter 2. Core Defense Mechanisms

Fundamental security problem All user input is untrusted.

Defense mechanisms Handling user access –To prevent users from gaining unauthorized access Handling user input –To prevent malformed input from causing undesirable behavior Handling attackers –To frustrate the attacker Managing application itself –Enable to monitor and configure

Handling User Access Categories of user –Anonymous users –Ordinary authenticated users –Administrative users Related security mechanisms –Authentication –Session management –Access control

Authentication Conventional authentication model –Username and password Supplemented by –Additional credentials –Multistate login process Examples –Client certificates, smartcards, or challenge- response tokens Defects enable to gain unauthorized access to sensitive data and functionality.

Session Management Session : a set of data structures –Used to track the state of the users Token identifying the session –Unique string mapping to the session –Browser automatically submits this back. –HTTP cookies, hidden form fields, URL query string for this purpose –Expired after a given period Dependent on security of its tokens

Access Control Correct decision –whether each request should be permitted or denied

Handling User Input Submitting unexpected input, crafted to cause behavior that was not intended Must handle user input in a safe manner Input-based vulnerabilities can arise anywhere.

Varieties of Input

Approaches to Input Handling “Reject Known Bad” “Accept Known Good” Sanitization Safe Data Handling Semantic Checks

Boundary Validation

Multistep Validation and Canonicalization ipt> %27 %2727

Diffcult To perform sanitization steps recursively

Handling Attackers To handle and react to attacks Measures –Handling errors –Maintaining audit logs –Alerting administrators –Reacting to attacks

Handling Errors

Maintaining Audit Logs Key events –All events relating to the authentication functionality –Key transactions –Access attempts –Any request containing known attack strings In online banks, logged in full For effectiveness, record time, IP address, session token, user account

Figure 2-7. Poorly protected application logs containing sensitive information submitted by other users

Altering Administrators Anomalous events monitored by alerting mechanism –Usage anomalies –Business anomalies –Requests containing known attack strings –Requests where data that is hidden from ordinary users has been modified Firewall, Intrusion Detection Product –Signature-based and anomaly-based rules

Reacting to Attacks By responding increasingly slowly to the attacker’s requests By terminating the attacker’s session By requiring him to log in or perform other steps before continuing the attack Effective defense-in-depth measure can reduce the likelihood.

Managing the Application Administrative functions are implemented within the application itself through the same web interface as its core non- security functionality.

Chapter Summary Defects in the security mechanism often lead to complete compromise of the application, enabling you to access data belonging to other users, perform unauthorized actions, and inject arbitrary code and commands.

Thank you