OWASP ESAPI SwingSet An introduction by Fabio Cerullo.

Slides:



Advertisements
Similar presentations
OWASP Secure Coding Practices Quick Reference Guide
Advertisements

Copyright © The OWASP Foundation Permission is granted to copy, distribute and/or modify this document under the terms of the Creative Commons Attribution-ShareAlike.
Creating Stronger, Safer, Web Facing Code JPL IT Security Mary Rivera June 17, 2011.
Copyright © The OWASP Foundation Permission is granted to copy, distribute and/or modify this document under the terms of the OWASP License. The OWASP.
BASIC CRYPTOGRAPHY CONCEPT. Secure Socket Layer (SSL)  SSL was first used by Netscape.  To ensure security of data sent through HTTP, LDAP or POP3.
OWASP. To ensure that strong simple security controls are available to every developer in every environment ESAPI Mission.
Automation Domination Application Security with Continuous Integration (CI)
© 2007 IBM Corporation IBM Emerging Technologies Enabling an Accessible Web 2.0 Becky Gibson Web Accessibility Architect.
CS 290C: Formal Models for Web Software Lecture 1: Introduction Instructor: Tevfik Bultan.
Introduction to eValid Presentation Outline What is eValid? About eValid, Inc. eValid Features System Architecture eValid Functional Design Script Log.
Small Business Security By Donatas Sumyla. Content Introduction Tools Symantec Corp. Company Overview Symantec.com Microsoft Company Overview Small Business.
BUILDING A SECURE STANDARD LIBRARY Information Assurance Project I MN Tajuddin hj. Tappe Supervisor Mdm. Rasimah Che Mohd Yusoff ASP.NET TECHNOLOGY.
Slide 1 of 9 Presenting 24x7 Scheduler The art of computer automation Press PageDown key or click to advance.
10 Steps To Agile Development Without Compromising Enterprise Security
W3af LUCA ALEXANDRA ADELA – MISS 1. w3af  Web Application Attack and Audit Framework  Secures web applications by finding and exploiting web application.
Introduction to Application Penetration Testing
IOTA Improved Design and Implementation of a Modular and Extensible Website Framework Andrew Hamilton – TJHSST Computer Systems Lab Abstract.
FINAL DEMO Apollo Crew, group 3 T SW Development Project.
MU Bulletin Board Member: Carol Lim Yi Wang Lei Wen Mentor: John Boyer Programmer/Analyst of MSA/ Student Life.
Eclipse Overview Introduction to Web Programming Kirkwood Continuing Education Fred McClurg © Copyright 2015, Fred McClurg, All Rights Reserved.
Liang, Introduction to Java Programming, Sixth Edition, (c) 2007 Pearson Education, Inc. All rights reserved Chapter 12 Object-Oriented.
Ladd Van Tol Senior Software Engineer Security on the Web Part One - Vulnerabilities.
A Security Review Process for Existing Software Applications
Copyright 2007 © The OWASP Foundation Permission is granted to copy, distribute and/or modify this document under the terms of the OWASP License. The OWASP.
Copyright © The OWASP Foundation Permission is granted to copy, distribute and/or modify this document under the terms of the OWASP License. The OWASP.
Copyright 2007 © The OWASP Foundation Permission is granted to copy, distribute and/or modify this document under the terms of the OWASP License. The OWASP.
T Iteration Demo Team WiseGUI I2 Iteration
Copyright © The OWASP Foundation Permission is granted to copy, distribute and/or modify this document under the terms of the OWASP License. The OWASP.
Copyright © The OWASP Foundation Permission is granted to copy, distribute and/or modify this document under the terms of the OWASP License. The OWASP.
Feedback #2 (under assignments) Lecture Code:
Copyright © The OWASP Foundation Permission is granted to copy, distribute and/or modify this document under the terms of the OWASP License. The OWASP.
OWASP Top Ten #1 Unvalidated Input. Agenda What is the OWASP Top 10? Where can I find it? What is Unvalidated Input? What environments are effected? How.
An Ad Hoc Writable Rule Language for White-Box Security Scanners Author:Sebastian Schinzel Referent:Prof. Dr. Alexander del Pino Korreferent:Prof. Dr.
Copyright © The OWASP Foundation Permission is granted to copy, distribute and/or modify this document under the terms of the OWASP License. The OWASP.
Copyright © The OWASP Foundation Permission is granted to copy, distribute and/or modify this document under the terms of the OWASP License. The OWASP.
ArcGIS Server for Administrators
Copyright © The OWASP Foundation Permission is granted to copy, distribute and/or modify this document under the terms of the OWASP License. The OWASP.
The OWASP Foundation Where we are Where we are going Seba DeleersnyderEoin Keary OWASP Foundation Board.
Copyright © The OWASP Foundation Permission is granted to copy, distribute and/or modify this document under the terms of the OWASP License. The OWASP.
Copyright © The OWASP Foundation Permission is granted to copy, distribute and/or modify this document under the terms of the OWASP License. The OWASP.
GOAL User Interactive Web Interface Update Pages by Club Officers Two Level of Authentication.
Copyright © The OWASP Foundation Permission is granted to copy, distribute and/or modify this document under the terms of the OWASP License. The OWASP.
WEEK INTRODUCTION CSC426 SOFTWARE ENGINEERING.
New Techniques in Application Intrusion Detection Al Huizenga, Mykonos Product Manager May 2010.
Copyright © The OWASP Foundation Permission is granted to copy, distribute and/or modify this document under the terms of the OWASP License. The OWASP.
Copyright © The OWASP Foundation Permission is granted to copy, distribute and/or modify this document under the terms of the OWASP License. The OWASP.
OWASP Building Secure Web Applications And the OWASP top 10 vulnerabilities.
Getting Started with OWASP The Top 10, ASVS, and the Guides Dave Wichers COO, Aspect Security OWASP Board Member OWASP Top 10 and ASVS Projects Lead.
Copyright © The OWASP Foundation Permission is granted to copy, distribute and/or modify this document under the terms of the OWASP License. The OWASP.
Copyright © The OWASP Foundation Permission is granted to copy, distribute and/or modify this document under the terms of the OWASP License. The OWASP.
Copyright © The OWASP Foundation Permission is granted to copy, distribute and/or modify this document under the terms of the OWASP License. The OWASP.
ARCH-5: Service Interfaces in Practice Christian Stiller Technical Architect.
The OWASP Foundation OWASP Global Update Seba Deleersnyder OWASP Foundation Board Member.
EFFECTIVE QA PROCESS FOR PVC Prepared by:PVC QA Team.
Introduction to ITIL and ITIS. CONFIDENTIAL Agenda ITIL Introduction  What is ITIL?  ITIL History  ITIL Phases  ITIL Certification Introduction to.
OWASP ASVS Levels1234 Tools Manual Test and Review Manual Design Review At higher levels in ASVS,the use of tools is encouraged. But to be effective,the.
Vulnerability Analysis Dr. X. Computer system Design Implementation Maintenance Operation.
James F. Fox MENA Cyber Security Practice Lead Presenters Cyber Security in a Mobile and “Always-on” World Booz | Allen | Hamilton.
ArcGIS Workflow Manager: Advanced Workflows and Concepts
Canberra OWASP Chapter meeting
API Security Auditing Be Aware,Be Safe
^ About the.
A Security Review Process for Existing Software Applications
Unit 6-Chapter 2 Struts.
Web Applications Security INTRO
OWASP WebGoat v5 16 April 2010.
Continuous Integration
What is Software Testing?
ESAPI Design Patterns November 2009 Mike Boberski Booz Allen Hamilton
Presentation transcript:

OWASP ESAPI SwingSet An introduction by Fabio Cerullo

About me Information Security Specialist at AIB OWASP Global Education Committee OWASP Ireland Chapter Leader

Agenda Introduction to OWASP ESAPI Security Areas Covered by ESAPI Mapping ESAPI > ASVS > Swingset SwingSet Demo Q&A

Introduction to ESAPI What is the main problem with majority security controls/frameworks?

Introduction to ESAPI NOT Intuitive, Integrated nor Dev Friendly.

Introduction to ESAPI RISK is a path from Threat Agent to Business Impact

Introduction to ESAPI Every vulnerability originates from: Missing Control ➡ Lack of input validation ➡ Failure to perform access control Broken Control ➡ Improper Session Handling ➡ Fail Open Ignored Control ➡ Failure to implement encryption ➡ Forgot to use output encoding } ESAPI helps you here

Introduction to ESAPI OWASP ESAPI (Enterprise Security API) aims to provide developers with all the security controls they need: Standarized Centralized Organized Integrated High Quality Intuitive Tested

What is ESAPI? OWASP Enterprise Security API Toolkits helps software developers guard against security-related design and implementation flaws. Collection of classes that encapsulate the key security operations most applications need. There are Java EE,.Net, Javascript, Classic ASP ColdFusion/CFML, PHP and Python language versions. The ESAPI for JAVA EE version includes a Web Application Firewall (WAF) that can be used to give development teams breathing room while making fixes. All language versions of ESAPI Toolkits are licensed under the BSD license. You can use or modify ESAPI however you want, even include it in commercial products.

How does ESAPI work? Just extract ESAPI distribution package to an appropriate location. The ESAPI security control interfaces include an “ESAPI” class that is commonly referred to as a “locator” class. The ESAPI locator class is called in order to retrieve instances of individual security controls, which are then called in order to perform security checks.

Security Areas Covered by ESAPI There are 120+ methods organized in different interfaces.

Mapping ESAPI to ASVS ASVS can be used to establish a level of confidence in the security of Web applications. Authentication Session Management Access Control Input Validation Output Encoding Cryptography Error Handling & Logging Data Protection HTTP Security

Mapping ESAPI to ASVS - An example - ASVS Session Management ESAPI Implementation ESAPI.httpUtilities().changeSessionIde ntifier() changes the session id in the login process BTW: prevents session fixation.

Mapping ESAPI to ASVS

Swingset Originally designed as a Web Application which demonstrates the many uses of ESAPI. One issue... lacked interactivity with devs.

Swingset v1.0 Customized version of Swingset Aligned with OWASP GEC mission Aimed to train developers on ESAPI ➡ Each lab presents a vulnerability ➡ Developer needs to fix it using ESAPI Labs organized around ASVS

Swingset v1.0 Installation Requirements: JDK or JRE Eclipse ESAPI for Java Swingset

Swingset Demo Let’s go for a swing!

Swingset Demo ESAPI provides a “positive” set of security controls ESAPI could be used to improve the security of your applications in alignment with ASVS Swingset is a great tool to train developers on how to achieve this.

Swingset - Future Plans Automate installation as much as possible Better GUI (side menu/graphics) More lessons (eg. beginners/advanced) Virtual Lab Interested? Drop me an ! SWINGSET

Q&A Want to contribute or provide feedback? Thank you!

Additional Resources ESAPI Swingset v1.0 ESAPI Javadocs java.googlecode.com/svn/trunk_doc/latest/index. html java.googlecode.com/svn/trunk_doc/latest/index. html ESAPI book (needs update)