Copyright © 2007 - The OWASP Foundation Permission is granted to copy, distribute and/or modify this document under the terms of the Creative Commons Attribution-ShareAlike.

Slides:



Advertisements
Similar presentations
Copyright 2010 © The OWASP Foundation Permission is granted to copy, distribute and/or modify this document under the terms of the OWASP License. The OWASP.
Advertisements

Copyright © The OWASP Foundation Permission is granted to copy, distribute and/or modify this document under the terms of the Creative Commons Attribution-ShareAlike.
The OWASP Foundation Copyright © The OWASP Foundation Permission is granted to copy, distribute and/or modify this document under.
Copyright © The OWASP Foundation Permission is granted to copy, distribute and/or modify this document under the terms of the Creative Commons Attribution-ShareAlike.
Copyright © The OWASP Foundation Permission is granted to copy, distribute and/or modify this document under the terms of the GNU Free Documentation.
Copyright © The OWASP Foundation Permission is granted to copy, distribute and/or modify this document under the terms of the OWASP License. The OWASP.
Copyright © The OWASP Foundation Permission is granted to copy, distribute and/or modify this document under the terms of the GNU Free Documentation.
By Philipp Vogt, Florian Nentwich, Nenad Jovanovic, Engin Kirda, Christopher Kruegel, and Giovanni Vigna Network and Distributed System Security(NDSS ‘07)
Copyright © The OWASP Foundation Permission is granted to copy, distribute and/or modify this document under the terms of the OWASP License. The OWASP.
WebGoat & WebScarab “What is computer security for $1000 Alex?”
OWASP Xenotix XSS Exploit Framework
Copyright © The OWASP Foundation Permission is granted to copy, distribute and/or modify this document under the terms of the Creative Commons Attribution-ShareAlike.
By Ben Pratt and Clint Forseth.  Ben Pratt ◦ Primary Role: Course Mgmt. Sys. Admin ◦ Secondary Roles: Printer Server Admin, Web Application Firewall.
The OWASP Foundation Copyright © The OWASP Foundation Permission is granted to copy, distribute and/or modify this document under.
Vulnerability Assessment & Penetration Testing By: Michael Lassiter Jr.
“Today over 70% of attacks against a company’s network come at the ‘Application Layer’ not the Network or System layer.” - Gartner Is Your Web Application.
Copyright © The OWASP Foundation Permission is granted to copy, distribute and/or modify this document under the terms of the OWASP License. The OWASP.
Copyright © The OWASP Foundation Permission is granted to copy, distribute and/or modify this document under the terms of the Creative Commons Attribution-ShareAlike.
Copyright © The OWASP Foundation Permission is granted to copy, distribute and/or modify this document under the terms of the OWASP License. The OWASP.
Handling Security Threats in Kentico CMS Karol Jarkovsky Sr. Solution Architect Kentico Software
Copyright © The OWASP Foundation Permission is granted to copy, distribute and/or modify this document under the terms of the OWASP License. The OWASP.
Copyright © The OWASP Foundation Permission is granted to copy, distribute and/or modify this document under the terms of the OWASP License. The OWASP.
Copyright © The OWASP Foundation Permission is granted to copy, distribute and/or modify this document under the terms of the Creative Commons Attribution-ShareAlike.
Copyright © The OWASP Foundation Permission is granted to copy, distribute and/or modify this document under the terms of the Creative Commons Attribution-ShareAlike.
Copyright © The OWASP Foundation Permission is granted to copy, distribute and/or modify this document under the terms of the Creative Commons Attribution-ShareAlike.
A Scanner Sparkly Web Application Proxy Editors and Scanners.
Copyright © The OWASP Foundation Permission is granted to copy, distribute and/or modify this document under the terms of the Creative Commons Attribution-ShareAlike.
Introduction to Application Penetration Testing
Is Your Website Hackable? Check with Acunetix Web Vulnerability Scanner. Acunetix Web Vulnerability Scanner V9.
Copyright © The OWASP Foundation Permission is granted to copy, distribute and/or modify this document under the terms of the OWASP License. The OWASP.
Copyright © The OWASP Foundation Permission is granted to copy, distribute and/or modify this document under the terms of the GNU Free Documentation.
November 13, 2008 Ohio Information Security Forum Attack Surface of Web Applications James Walden Northern Kentucky University
Copyright 2007 © The OWASP Foundation Permission is granted to copy, distribute and/or modify this document under the terms of the OWASP License. The OWASP.
Copyright © The OWASP Foundation Permission is granted to copy, distribute and/or modify this document under the terms of the GNU Free Documentation.
Web Application with AJAX CS 526 advanced interned and Web system Presenters Faris Kateb Mohammed AbdulAziz Omar Alzahrani.
Copyright 2007 © The OWASP Foundation Permission is granted to copy, distribute and/or modify this document under the terms of the OWASP License. The OWASP.
Copyright © The OWASP Foundation Permission is granted to copy, distribute and/or modify this document under the terms of the OWASP License. The OWASP.
Copyright © The OWASP Foundation Permission is granted to copy, distribute and/or modify this document under the terms of the OWASP License. The OWASP.
Copyright © The OWASP Foundation Permission is granted to copy, distribute and/or modify this document under the terms of the OWASP License. The OWASP.
Copyright © The OWASP Foundation Permission is granted to copy, distribute and/or modify this document under the terms of the Creative Commons Attribution-ShareAlike.
Copyright © The OWASP Foundation Permission is granted to copy, distribute and/or modify this document under the terms of the GNU Free Documentation.
Introduction To Web Application Security in PHP. Security is Big And Often Difficult PHP doesn’t make it any easier.
Defending Browsers against Drive-by Downloads:Mitigating Heap-Spraying Code Injection Attacks Authors:Manuel Egele, Peter Wurzinger, Christopher Kruegel,
Copyright © The OWASP Foundation Permission is granted to copy, distribute and/or modify this document under the terms of the OWASP License. The OWASP.
Copyright © The OWASP Foundation Permission is granted to copy, distribute and/or modify this document under the terms of the OWASP License. The OWASP.
Copyright © The OWASP Foundation Permission is granted to copy, distribute and/or modify this document under the terms of the GNU Free Documentation.
Copyright © The OWASP Foundation Permission is granted to copy, distribute and/or modify this document under the terms of the OWASP License. The OWASP.
Copyright © The OWASP Foundation Permission is granted to copy, distribute and/or modify this document under the terms of the OWASP License. The OWASP.
Web Applications Testing By Jamie Rougvie Supported by.
Copyright © The OWASP Foundation Permission is granted to copy, distribute and/or modify this document under the terms of the GNU Free Documentation.
Copyright © The OWASP Foundation Permission is granted to copy, distribute and/or modify this document under the terms of the OWASP License. The OWASP.
Copyright © The OWASP Foundation Permission is granted to copy, distribute and/or modify this document under the terms of the OWASP License. The OWASP.
Copyright © The OWASP Foundation Permission is granted to copy, distribute and/or modify this document under the terms of the OWASP License. The OWASP.
Copyright © The OWASP Foundation Permission is granted to copy, distribute and/or modify this document under the terms of the GNU Free Documentation.
Copyright © The OWASP Foundation Permission is granted to copy, distribute and/or modify this document under the terms of the Creative Commons Attribution-ShareAlike.
Copyright © The OWASP Foundation Permission is granted to copy, distribute and/or modify this document under the terms of the OWASP License. The OWASP.
Copyright © The OWASP Foundation Permission is granted to copy, distribute and/or modify this document under the terms of the OWASP License. The OWASP.
Copyright © The OWASP Foundation Permission is granted to copy, distribute and/or modify this document under the terms of the OWASP License. The OWASP.
Copyright © The OWASP Foundation Permission is granted to copy, distribute and/or modify this document under the terms of the Creative Commons Attribution-ShareAlike.
Copyright © The OWASP Foundation Permission is granted to copy, distribute and/or modify this document under the terms of the OWASP License. The OWASP.
Copyright © The OWASP Foundation Permission is granted to copy, distribute and/or modify this document under the terms of the OWASP License. The OWASP.
Copyright 2007 © The OWASP Foundation Permission is granted to copy, distribute and/or modify this document under the terms of the OWASP License. The OWASP.
By Collin Donaldson. Hacking is only legal under the following circumstances: 1.You hack (penetration test) a device/network you own. 2.You gain explicit,
General Information: This document was created for use in the "Bridges to Computing" project of Brooklyn College. You are invited and encouraged to use.
Copyright © The OWASP Foundation Permission is granted to copy, distribute and/or modify this document under the terms of the OWASP License. The OWASP.
Database and Cloud Security
Javascript worms By Benjamin Mossé SecPro
HTML Level II (CyberAdvantage)
Exploring DOM-Based Cross Site Attacks
Presentation transcript:

Copyright © The OWASP Foundation Permission is granted to copy, distribute and/or modify this document under the terms of the Creative Commons Attribution-ShareAlike 2.5 License. To view this license, visit The OWASP Foundation OWASP Day Belgium 6 Sep Automated Web Foo or FUD? David Kierznowski IT Security Analyst

OWASP Day – Belgium – 6 Sep Powered by...

OWASP Day – Belgium – 6 Sep About DK  Check Team Leader with UK’s CESG Scheme  Senior Security Analyst for a leading penetration testing company in the UK  Works in both government and commercial sectors  Core member of GNUCITIZEN group  Developed a number of open source security tools (i.e. ASP-Auditor, TSF)  Founder of BlogSecurity, michaeldaw.org and primary developer of wp-scanner  Credited on several major web application vulnerability findings  Research featured on Slashdot, eWeek, SecurityFocus and others

OWASP Day – Belgium – 6 Sep Review  Current Threats and the Attack Renaissance.  Insight into the effectiveness of automated tools.  Test less vs test all debate.  Hybrid testing with the Technika Security Framework.

OWASP Day – Belgium – 6 Sep Goals 1.Basic understanding of how automated security testing tools are constructed. 2.A greater awareness of the challenges that lie ahead with automated web application tools. 3.An introduction into browser scripting and the Technika Security Framework. 4.A better understanding of how security testing companies approach web application testing. 5.Some suggestions to improve the quality of web application tests.

OWASP Day – Belgium – 6 Sep 2007 Current Threats  Gartner Group says 90% of web applications have serious vulnerabilities.  Symantec says 78% of attacks are at the web application level.  Mitre last year stated that application-level attacks, such as XSS and SQLI, are replacing buffer overflows as the favourite hacker initiative. OSI Network Suite

OWASP Day – Belgium – 6 Sep 2007 Attack Renaissance  Traditional vulnerabilities target the server  New age attacks target the client - XSS as the catalyst

OWASP Day – Belgium – 6 Sep 2007 Find Less vs Find All Find all approach  Try locate and report all vulnerabilities Find less approach  Locate less and report the cause of the problem

OWASP Day – Belgium – 6 Sep Simple Automation Target & Virtual Hosts > Spider & Locate > Sort &Unique > Identify > Test > Result > Report

OWASP Day – Belgium – 6 Sep 2007 Auto Limitations “find all”  Script Parsing  Business and/or application logic  False Negatives/Positives  Non-RFC applications  State or flow  Challenge-Response  Cost  Custom URLs  Training  Denial of Service risks

OWASP Day – Belgium – 6 Sep 2007 Manual Limitations "Find less approach"  Time  Emotional stability  Skill level  Find less approach

OWASP Day – Belgium – 6 Sep 2007 The Auto-Worth Model (F + BA + T) * R = AW Flow (state) Business/Application Logic Technology (i.e. Flash) Role of web application

OWASP Day – Belgium – 6 Sep 2007 A Couple Suggestions  Define clearly the purpose and role of the application to be tested  Use the Auto-Worth Model as a base  Manual security testers should follow a testing procedure  A hybrid approach may be best

OWASP Day – Belgium – 6 Sep 2007 Technika Automated Browser Exploitation Tool and Browser Scripting Tool

OWASP Day – Belgium – 6 Sep 2007 Technika – Write Script  Snippet from tech.store for persistent storage tech.store.pop = function(_sarray, key) { var _l = _sarray.length; for (i=0; i<_l; i++) { var _key = key + i; sessionStorage.removeItem(_key, _sarray[i]); } console.log(_sarray.length + " records removed."); };

OWASP Day – Belgium – 6 Sep 2007 Technika – Save as bookmarklet

OWASP Day – Belgium – 6 Sep 2007 Technika Security Framework tech.dspider - DOM link spider; because we utilize the DOM, the results are instant. tech.forms - GET/POST form parser. tech.mutate - By specifying a payload and regex, we can mutate our target arrays and build tests. tech.scan - tech.scan is our actual engine that will handle our GET and POST requests. tech.mNikto - Mini-Nikto was named after the popular web application tool Nikto if you haven’t already guessed. We called it mini-nikto as it currently only contains a very small database. tech.explorer - This is one of my favorite tools in the TS framework. It uses Yahoo! AJAX API (JSON) to fetch links and perform other Google hacking type queries outside of our current DOM. This is really useful even when it is not security related. tech.store - Utilizes the Firefox sessionStorage to allow us to persistently store arrays. And much MORE!!

OWASP Day – Belgium – 6 Sep 2007 Technika Security Framework Technika demo video placeholder and tool introduction.

OWASP Day – Belgium – 6 Sep Summary 1.The application layer is enemy number 1! 2.Increased attacks in the future due to the Attack Renaissance 3.Remember the Auto-Worth model in planning and even during the web application testing process. 4.The hybrid approach will almost always present the best results. 5.We hope to start developing Technika to a semi-stable state, but its definitely a project to start getting involved in.

OWASP Day – Belgium – 6 Sep 2007 Credits and Refs Credits: GNUCITIZEN GROUP – NTA-Monitor – Refs: Robert Auger - Technika - Technika Security Framework - security-framework/ security-framework/ Jeremiah Grossman – Challenges of Web Application Testing