Application Security Chapter 8 Copyright Pearson Prentice Hall 2013.

Slides:



Advertisements
Similar presentations
Copyright © 2007 Telcordia Technologies Challenges in Securing Converged Networks Prepared for : Telcordia Contact: John F. Kimmins Executive Director.
Advertisements

Chapter 17: WEB COMPONENTS
COMPUTER BASICS METC 106. The Internet Global group of interconnected networks Originated in 1969 – Department of Defense ARPANet Only text, no graphics.
Information Security 1 Information Security: Security Tools Jeffy Mwakalinga.
System and Network Security Practices COEN 351 E-Commerce Security.
Chapter 7 HARDENING SERVERS.
Server-Side vs. Client-Side Scripting Languages
Information Networking Security and Assurance Lab National Chung Cheng University The Ten Most Critical Web Application Security Vulnerabilities Ryan J.W.
Security Awareness: Applying Practical Security in Your World, Second Edition Chapter 3 Internet Security.
Security+ Guide to Network Security Fundamentals, Third Edition
ASP.NET 2.0 Chapter 6 Securing the ASP.NET Application.
How Clients and Servers Work Together. Objectives Learn about the interaction of clients and servers Explore the features and functions of Web servers.
Computer Security and Penetration Testing
Application Security Chapter 8 Copyright Pearson Prentice Hall 2013.
Review for Exam 4 School of Business Eastern Illinois University © Abdou Illia, Spring 2006.
Lesson 46: Using Information From the Web copy and paste information from a Web site print a Web page download information from a Web site customize Web.
Lesson 46: Using Information From the Web copy and paste information from a Web site print a Web page download information from a Web site customize Web.
SHASHANK MASHETTY security. Introduction Electronic mail most commonly referred to as or e- mail. Electronic mail is one of the most commonly.
Microsoft Windows 2003 Server. Client/Server Environment Many client computers connect to a server.
11 SECURING INTERNET MESSAGING Chapter 9. Chapter 9: SECURING INTERNET MESSAGING2 CHAPTER OBJECTIVES  Explain basic concepts of Internet messaging. 
INTRODUCTION TO WEB DATABASE PROGRAMMING
Web Servers Web server software is a product that works with the operating system The server computer can run more than one software product such as .
1 Application Security: Electronic Commerce and Chapter 9 Copyright 2003 Prentice-Hall.
Data Security.
Detrick Robinson & Amris Treadwell.  Computer viruses- are pieces of programs that are purposely made up to infect your computer.  Examples: › Internet.
Security.NET Chapter 1. How Do Attacks Occur? Stages of attack Examples of attacker actions 1. FootprintRuns a port scan on the firewall 2. PenetrationExploits.
Security Awareness Chapter 3 Internet Security. Security Awareness, 3 rd Edition2 Objectives After completing this chapter, you should be able to do the.
Application Security: General apps &Web service (April 11, 2012) © Abdou Illia – Spring 2012.
Chapter 8. Copyright Pearson Prentice-Hall 2010  Some attacks inevitably get through network protections and reach individual hosts  In Chapter 7, we.
14 Publishing a Web Site Section 14.1 Identify the technical needs of a Web server Evaluate Web hosts Compare and contrast internal and external Web hosting.
Chapter 8.  Some attacks inevitably get through network protections and reach individual hosts  In Chapter 7, we looked at operating system and data.
1 Application Security: Electronic Commerce and Chapter 9 Panko, Corporate Computer and Network Security Copyright 2004 Prentice-Hall.
CIM6400 CTNW (04/05) 1 CIM6400 CTNW Lesson 6 – More on Windows 2000.
IT security By Tilly Gerlack.
1 Chapter Overview Using the New Connection Wizard to configure network and Internet connections Using the New Connection Wizard to configure outbound.
3-Protecting Systems Dr. John P. Abraham Professor UTPA.
Software Security Testing Vinay Srinivasan cell:
1 Figure 4-16: Malicious Software (Malware) Malware: Malicious software Essentially an automated attack robot capable of doing much damage Usually target-of-opportunity.
GOLD UNIT 4 - IT SECURITY FOR USERS (2 CREDITS) Rebecca Pritchard.
CSCE 201 Web Browser Security Fall CSCE Farkas2 Web Evolution Web Evolution Past: Human usage – HTTP – Static Web pages (HTML) Current: Human.
1 Application Security: Electronic Commerce and Chapter 9 Copyright 2003 Prentice-Hall.
Computer Networking From LANs to WANs: Hardware, Software, and Security Chapter 13 FTP and Telnet.
October 3, 2008IMI Security Symposium Application Security through a Hacker’s Eyes James Walden Northern Kentucky University
Security Attacks CS 795. Buffer Overflow Problem Buffer overflows can be triggered by inputs that are designed to execute code, or alter the way the program.
By Sean Rose and Erik Hazzard.  SQL Injection is a technique that exploits security weaknesses of the database layer of an application in order to gain.
Security Technology Clients and Mail Servers
1 Figure 9-6: Security Technology  Clients and Mail Servers (Figure 9-7) Mail server software: Sendmail on UNIX, Microsoft Exchange,
1 Figure 9-3: Webserver and E-Commerce Security Importance of Webservice and E-Commerce Security  Cost of disruptions  The cost of loss of reputation.
Chapter 12: How Private are Web Interactions?. Why we care? How much of your personal info was released to the Internet each time you view a Web page?
Database Security Cmpe 226 Fall 2015 By Akanksha Jain Jerry Mengyuan Zheng.
WHAT IS E-COMMERCE? E-COMMERCE is a online service that helps the seller/buyer complete their transaction through a secure server. Throughout the past.
ASP-2-1 SERVER AND CLIENT SIDE SCRITPING Colorado Technical University IT420 Tim Peterson.
1 Figure 9-3: Webserver and E-Commerce Security Browser Attacks  Take over a client via the browser Interesting information on the client Can use browser.
© 2015 Pearson Education Ltd. Chapter 8 Chapter 8.
Securing a Host Computer BY STEPHEN GOSNER. Definition of a Host  Host  In networking, a host is any device that has an IP address.  Hosts include.
Carrie Estes Collin Donaldson.  Zero day attacks  “zero day”  Web application attacks  Signing up for a class  Hardening the web server  Enhancing.
NETWORK SECURITY LAB 1170 REHAB ALFALLAJ CT1406. Introduction There are a number of technologies that exist for the sole purpose of ensuring that the.
Chapter 11 Panko and Panko Business Data Networks and Security, 11 th Edition Copyright © 2016 Pearson Finally, Layer 5!
Chapter 7: Using Network Clients The Complete Guide To Linux System Administration.
Lecture 19 Page 1 CS 236 Online 6. Application Software Security Why it’s important: –Security flaws in applications are increasingly the attacker’s entry.
Tonga Institute of Higher Education IT 141: Information Systems
Instructor Materials Chapter 5 Providing Network Services
Chapter 7: Identifying Advanced Attacks
World Wide Web policy.
Lesson #8 MCTS Cert Guide Microsoft Windows 7, Configuring Chapter 8 Configuring Applications and Internet Explorer.
Tonga Institute of Higher Education IT 141: Information Systems
Tonga Institute of Higher Education IT 141: Information Systems
Designing IIS Security (IIS – Internet Information Service)
6. Application Software Security
Presentation transcript:

Application Security Chapter 8 Copyright Pearson Prentice Hall 2013

 Explain why attackers increasingly focus on applications.  List the main steps in securing applications.  Know how to secure WWW services and e-commerce services.  Describe vulnerabilities in web browsers.  Explain the process of securing .  Explain how to secure voice over IP (VoIP).  Describe threats from Skype VoIP service.  Describe how to secure other user applications.  Know how to secure TCP/IP supervisory applications. 2 Copyright Pearson Prentice Hall 2013

3

 Some attacks inevitably get through network protections and reach individual hosts  In Chapter 7, we looked at host hardening  In Chapter 8, we look at application hardening  In Chapter 9, we will look at data protection 4 Copyright Pearson Prentice Hall 2013

8.1 Application Security and Hardening 8.2 WWW and E-Commerce Security 8.3 Web Browser Attacks 8.4 Security 8.5 Voice over IP (VoIP) Security 8.6 Other User Applications 5 Copyright Pearson Prentice Hall 2013

 Executing Commands with the Privileges of a Compromised Application ◦ If an attacker takes over an application, the attacker can execute commands with the privileges of that application ◦ Many applications run with super user (root) privileges 6 Copyright Pearson Prentice Hall 2013

 Buffer Overflow Attacks ◦ From Chapter 7: Vulnerabilities, exploits, fixes (patches, manual work-arounds or upgrades) ◦ Buffers are places where data is stored temporarily ◦ If an attacker sends too much data, a buffer might overflow, overwriting an adjacent section of RAM 7 Copyright Pearson Prentice Hall 2013

8

 Few Operating Systems but Many Applications ◦ Application hardening is more total work than operating system hardening  Understanding the Server’s Role and Threat Environment ◦ If it runs only one or a few services, easy to disallow irrelevant things 9 Copyright Pearson Prentice Hall 2013

 Basics ◦ Physical Security ◦ Backup ◦ Harden the Operating System ◦ Etc.  Minimize Applications ◦ Main applications ◦ Subsidiary applications ◦ Be guided by security baselines 10 Copyright Pearson Prentice Hall 2013

11 Copyright Pearson Prentice Hall 2013

12 Copyright Pearson Prentice Hall 2013

 Create Secure Application Program Configurations ◦ Use baselines to go beyond default installation configurations for high-value targets ◦ Avoid blank passwords or well-known default passwords  Install Patches for All Applications  Minimize the Permissions of Applications ◦ If an attack compromises an application with low permissions, will not own the computer 13 Copyright Pearson Prentice Hall 2013

 Add Application Layer Authentication, Authorizations, and Auditing ◦ More specific to the needs of the application than general operating system logins ◦ Can lead to different permissions for different users  Implement Cryptographic Systems ◦ For communication with users 14 Copyright Pearson Prentice Hall 2013

 Custom Applications ◦ Written by a firm’s programmers ◦ Not likely to be well trained in secure coding  The Key Principle ◦ Never trust user input ◦ Filter user input for inappropriate content 15 Copyright Pearson Prentice Hall 2013

 Buffer Overflow Attacks ◦ In some languages, specific actions are needed ◦ In other languages, not a major problem  Login Screen Bypass Attacks ◦ Website user gets to a login screen ◦ Instead of logging in, enters a URL for a page that should only be accessible to authorized users 16 Copyright Pearson Prentice Hall 2013

 Cross-Site Scripting (XSS) Attacks ◦ One user’s input can go to another user’s webpage ◦ Usually caused if a website sends back information sent to it without checking for data type, scripts, etc. ◦ Example, If you type your username, it may include something like, “Hello username” in the webpage it sends you 17 Copyright Pearson Prentice Hall 2013

 Example ◦ Attacker sends the intended victim an message with a link to a legitimate site ◦ However, the link includes a script that is not visible in the browser window because it is beyond the end of the window ◦ The intended victim clicks on the link and is taken to the legitimate webpage ◦ The URL’s script is sent to the webserver with the HTTP GET command to retrieve the legitimate webpage 18 Copyright Pearson Prentice Hall 2013

 Example ◦ The webserver sends back a webpage including the script ◦ The script is invisible to the user (browsers do not display scripts) ◦ But the script executes ◦ The script may exploit a vulnerability in the browser or another part of the user’s software 19 Copyright Pearson Prentice Hall 2013

 SQL Injection Attacks ◦ For database access ◦ Programmer expects an input value—a text string, number, etc.  May use it as part of an SQL query or operation against the database  Say, to accept a last name as input and return the person’s telephone number 20 Copyright Pearson Prentice Hall 2013

 SQL Injection Attacks ◦ Attacker enters an unexpected string  For example: a last name followed by a full SQL query string  The program may execute both the telephone number look up command and the extra SQL query  This may look up information that should not be available to the attacker  It may even delete an entire table 21 Copyright Pearson Prentice Hall 2013

22 Copyright Pearson Prentice Hall 2013

23 Copyright Pearson Prentice Hall 2013

 Must Require Strong Secure Programming Training ◦ General principles ◦ Programming-language-specific information ◦ Application-specific threats and countermeasures 24 Copyright Pearson Prentice Hall 2013

8.1 Application Security and Hardening 8.2 WWW and E-Commerce Security 8.3 Web Browser Attacks 8.4 Security 8.5 Voice over IP (VoIP) Security 8.6 Other User Applications 25 Copyright Pearson Prentice Hall 2013

 Importance of WWW Service and E-Commerce Security ◦ Cost of disruptions, harm to reputation, and market capitalization ◦ Customer fraud ◦ Exposure of sensitive private information 26 Copyright Pearson Prentice Hall 2013

 Webservice versus E-Commerce Service ◦ WWW service provides basic user interactions  Microsoft Internet Information Server (IIS), Apache on UNIX, other webserver programs ◦ E-commerce servers add functionality: order entry, shopping cart, payment, etc.  Links to internal corporate databases and external services (such as credit card checking)  Custom programs written for special purposes 27 Copyright Pearson Prentice Hall 2013

28 Copyright Pearson Prentice Hall 2013

29 Copyright Pearson Prentice Hall 2013

 Website Defacement  Numerous IIS buffer overflow attacks ◦ Many of which take over the computer  IIS directory traversal attacks 30 Copyright Pearson Prentice Hall 2013

31 Users should only be able to reach files below the WWW root, which is below the true system root Copyright Pearson Prentice Hall 2013

32 In URLs,.. means move up one level. If allowed, user can get outside the WWW root box, into other directories In URLs,.. means move up one level. If allowed, user can get outside the WWW root box, into other directories Copyright Pearson Prentice Hall 2013

 IIS directory traversal attacks (Figure 8-11) ◦ Companies filter out “..” ◦ Attackers respond with hexadecimal and UNICODE representations for “..” and “..” ◦ Typical of the constant “arms race” between attackers and defenders 33 Copyright Pearson Prentice Hall 2013

 Patching the WWW and E-Commerce Software and Their Components ◦ Patching the webserver software is not enough ◦ Also must patch e-commerce software ◦ E-commerce software might use third-party component software that must be patched 34 Copyright Pearson Prentice Hall 2013

 Other Website Protections ◦ Website vulnerability assessment tools, such as Whisker ◦ Reading website error logs ◦ Placing a webserver-specific application proxy server in front of the webserver 35 Copyright Pearson Prentice Hall 2013

36 An internal employee ( ) may be blindly searching for confidential directories (bolded) on an internal webserver ( ) Copyright Pearson Prentice Hall 2013

37 Copyright Pearson Prentice Hall 2013

8.1 Application Security and Hardening 8.2 WWW and E-Commerce Security 8.3 Web Browser Attacks 8.4 Security 8.5 Voice over IP (VoIP) Security 8.6 Other User Applications 38 Copyright Pearson Prentice Hall 2013

 PCs Are Major Targets ◦ Have interesting information and can be attacked through the browser  Client-Side Scripting (Mobile Code) ◦ Java applets: small Java programs  Usually run in a “sandbox” that limits their access to most of the system ◦ Active-X from Microsoft; highly dangerous because it can do almost everything 39 Copyright Pearson Prentice Hall 2013

 Client-Side Scripting (Mobile Code) ◦ Scripting languages (not full programming languages)  A script is a series of commands in a scripting language  JavaScript (not scripted form of Java)  VBScript (Visual Basic scripting from Microsoft)  A script usually is invisible to users 40 Copyright Pearson Prentice Hall 2013

41 Copyright Pearson Prentice Hall 2013

 Malicious Links ◦ User usually must click on them to execute (but not always) ◦ Tricking users to visit attacker websites  Social engineering to persuade the victim to click on a link  Choose domain names that are common misspellings of popular domain names 42 You like beef? click here. You like beef? click here. Copyright Pearson Prentice Hall 2013

 Other Client-Side Attacks ◦ File reading: turn the computer into an unintended file server ◦ Executing a single command  The single command may open a command shell on the user’s computer  The attacker can now enter many commands 43 C:> Copyright Pearson Prentice Hall 2013

 Other Client-Side Attacks ◦ Automatic redirection to unwanted webpage ◦ On compromised systems, the user may be automatically directed to a specific malicious website if they later make any typing error 44 Copyright Pearson Prentice Hall 2013

 Other Client-Side Attacks ◦ Cookies  Cookies are placed on user computer; can be retrieved by website  Can be used to track users at a website  Can contain private information  Accepting cookies is necessary to use many websites 45 Copyright Pearson Prentice Hall 2013

46 Copyright Pearson Prentice Hall 2013

 Enhancing Browser Security ◦ Patches and updates ◦ Set strong security configuration options for Microsoft Internet Explorer ◦ Set strong privacy configuration options for Microsoft Internet Explorer 47 Copyright Pearson Prentice Hall 2013

48 Copyright Pearson Prentice Hall 2013

49 Copyright Pearson Prentice Hall 2013

8.1 Application Security and Hardening 8.2 WWW and E-Commerce Security 8.3 Web Browser Attacks 8.4 Security 8.5 Voice over IP (VoIP) Security 8.6 Other User Applications 50 Copyright Pearson Prentice Hall 2013

 Content Filtering ◦ Malicious code in attachments and HTML bodies (scripts) ◦ Spam: unsolicited commercial ◦ Volume is growing rapidly: slowing PCs and annoying users (porno and fraud) ◦ Filtering for spam also rejects some legitimate messages 51 Copyright Pearson Prentice Hall 2013

 Inappropriate Content ◦ Companies often filter for sexually or racially harassing messages ◦ Could be sued for not doing so  Extrusion Prevention for Intellectual Property (IP)  Stopping the Transmission of Sensitive Personally Identifiable Information (PII) 52 Copyright Pearson Prentice Hall 2013

53 Copyright Pearson Prentice Hall 2013

 Employee training ◦ is not private; company has right to read ◦ Your messages may be forwarded without permission ◦ Never put anything in a message the sender would not want to see in court, printed in the newspapers, or read by his or her boss ◦ Never forward messages without permission 54 Copyright Pearson Prentice Hall 2013

55 Copyright Pearson Prentice Hall 2013

56 Copyright Pearson Prentice Hall 2013

57 Copyright Pearson Prentice Hall 2013

8.1 Application Security and Hardening 8.2 WWW and E-Commerce Security 8.3 Web Browser Attacks 8.4 Security 8.5 Voice over IP (VoIP) Security 8.6 Other User Applications 58 Copyright Pearson Prentice Hall 2013

59 Copyright Pearson Prentice Hall 2013

60 ConceptMeaning TransportThe carriage of voice between the two parties SignalingCommunication to manage the network Call setup Call teardown Accounting Etc. Copyright Pearson Prentice Hall 2013

 Eavesdropping  Denial-of-Service Attacks ◦ Even small increases in latency and jitter can be highly disruptive  Caller Impersonation ◦ Useful in social engineering ◦ Attacker can appear to be the president based on a falsified source address 61 Copyright Pearson Prentice Hall 2013

 Hacking and Malware Attacks ◦ Compromised clients can send attacks ◦ Compromised servers can do disruptive signaling  Toll Fraud ◦ Attacker uses corporate VoIP network to place free calls  Spam over IP Telephony (SPIT) ◦ Especially disruptive because it interrupts the called party in real time 62 Copyright Pearson Prentice Hall 2013

 Basic Corporate Security Must Be Strong  Authentication ◦ SIP Identity (RFC 4474) provides strong authentication assurance between second-level domains  Encryption for Confidentiality ◦ Can add to latency 63 Copyright Pearson Prentice Hall 2013

 Firewalls ◦ Many short packets ◦ Firewall must prioritize VoIP traffic ◦ Must handle ports for signaling  SIP uses Port 5060  H.323 uses Ports 1719 and 1720  Must create an exception for each conversation, which is assigned a specific port  Must close the transport port immediately after conversation ends 64 Copyright Pearson Prentice Hall 2013

 NAT Problems ◦ NAT firewall must handle VoIP NAT traversal ◦ NAT adds a small amount of latency  Separation: Anticonvergence ◦ The convergence goal for data and voice ◦ Virtual LANs (VLANs)  Separate voice and data traffic on different VLANs  Separate VoIP servers from VoIP phones on different VLANs 65 Copyright Pearson Prentice Hall 2013

 Widely Used Public VoIP Service  Uses Proprietary Protocols and Code ◦ Vulnerabilities? Backdoors? Etc. ◦ Firewalls have a difficult time even recognizing Skype traffic  Encryption for Confidentiality ◦ Skype reportedly uses strong security ◦ However, Skype keep encryption keys, allowing it to do eavesdropping 66 Copyright Pearson Prentice Hall 2013

 Inadequate Authentication ◦ Uncontrolled user registration; can use someone else’s name and so appear to be them  Peer-to-Peer (P2P) Service ◦ Uses this architecture and its proprietary (and rapidly changing) protocol to get through corporate firewalls ◦ Bad for corporate security control  Skype File Sharing ◦ Does not work with antivirus programs 67 Copyright Pearson Prentice Hall 2013

8.1 Application Security and Hardening 8.2 WWW and E-Commerce Security 8.3 Web Browser Attacks 8.4 Security 8.5 Voice over IP (VoIP) Security 8.6 Other User Applications 68 Copyright Pearson Prentice Hall 2013

69 Presence servers merely tell the clients that others exist and what their IP addresses are Copyright Pearson Prentice Hall 2013

70 All transmissions go through relay servers when relay servers are used. Copyright Pearson Prentice Hall 2013

 TCP/IP Supervisory Protocols ◦ Many supervisory protocols in TCP/IP  ARP, ICMP, DNS, DHCP, LDAP, RIP, OSPF, BGP, SNMP, etc. ◦ The targets of many attacks ◦ The IETF has a program to improve security in all (the Danvers Doctrine) 71 Copyright Pearson Prentice Hall 2013

 Example ◦ Simple Network Management Protocol (SNMP) ◦ Messages  GET messages to get information from a managed object  SET messages to change the configuration of a managed object  SET is often turned off because it is dangerous 72 Copyright Pearson Prentice Hall 2013

 Example ◦ SNMP versions and security  Version 1: no security  Version 2: weak authentication with a community string shared by the manager and managed devices  Version 3: pair-shared secrets, optional confidentiality, message integrity, and anti-replay protection  Still needed: public key authentication 73 Copyright Pearson Prentice Hall 2013

 IT Security People Must Work with the Networking Staff ◦ To ensure that appropriate security is being applied to supervisory protocols ◦ Not a traditional area for IT security in most firms 74 Copyright Pearson Prentice Hall 2013

75

Copyright © 2013 Pearson Education, Inc. Copyright © 2013 Pearson Education, Inc. Publishing as Prentice Hall