Copyright © 2004 - The OWASP Foundation Permission is granted to copy, distribute and/or modify this document under the terms of the GNU Free Documentation.

Slides:



Advertisements
Similar presentations
Privacy & Other Issues. Acceptable Use Policies When you sign up for an account at school or from an Internet Service Provider, you agree to their rules.
Advertisements

Security Protocols Sathish Vadhiyar Sources / Credits: Kerberos web pages and documents contained / pointed.
METALOGIC s o f t w a r e © Metalogic Software Corporation DACS Developer Overview DACS – the Distributed Access Control System.
Copyright © The OWASP Foundation Permission is granted to copy, distribute and/or modify this document under the terms of the OWASP License. The OWASP.
Session Hijacking Why web security depends on communications security and how TLS everywhere is the only solution. Scott Helme - 6th Aug scotthel.me.
©2009 Justin C. Klein Keane PHP Code Auditing Session 4.3 – Information Disclosure & Authentication Bypass Justin C. Klein Keane
Two-Factor Authentication & Tools for Password Management August 29, 2014 Pang Chamreth, IT Development Innovations 1.
Copyright © The OWASP Foundation Permission is granted to copy, distribute and/or modify this document under the terms of the GNU Free Documentation.
Copyright © The OWASP Foundation Permission is granted to copy, distribute and/or modify this document under the terms of the OWASP License. The OWASP.
Copyright © The OWASP Foundation Permission is granted to copy, distribute and/or modify this document under the terms of the OWASP License. The OWASP.
Web Application Security SSE USTC Qing Ding. Agenda General security issues Web-tier security requirements and schemes HTTP basic authentication based.
Security Issues and Challenges in Cloud Computing
Information Networking Security and Assurance Lab National Chung Cheng University The Ten Most Critical Web Application Security Vulnerabilities Ryan J.W.
ASP.NET 2.0 Chapter 6 Securing the ASP.NET Application.
The OWASP Foundation Copyright © The OWASP Foundation Permission is granted to copy, distribute and/or modify this document under.
Cookies COEN 351 E-commerce Security. Client / Session Identification HTTP does not maintain state. State Information can be passed using: HTTP Headers.
Designing Security In Web Applications Andrew Tomkowiak 10/8/2013 UW-Platteville Software Engineering Department
Copyright © The OWASP Foundation Permission is granted to copy, distribute and/or modify this document under the terms of the OWASP License. The OWASP.
Web-based Document Management System By Group 3 Xinyi Dong Matthew Downs Joshua Ferguson Sriram Gopinath Sayan Kole.
Introduction to Application Penetration Testing
Copyright © The OWASP Foundation Permission is granted to copy, distribute and/or modify this document under the terms of the OWASP License. The OWASP.
Session 11: Security with ASP.NET
The OWASP Way Understanding the OWASP Vision and the Top Ten.
Chapter 9 Web Applications. Web Applications are public and available to the entire world. Easy access to the application means also easy access for malicious.
Copyright 2007 © The OWASP Foundation Permission is granted to copy, distribute and/or modify this document under the terms of the OWASP License. The OWASP.
Lecture 16 Page 1 CS 236 Online SQL Injection Attacks Many web servers have backing databases –Much of their information stored in a database Web pages.
Copyright 2007 © The OWASP Foundation Permission is granted to copy, distribute and/or modify this document under the terms of the OWASP License. The OWASP.
Copyright © The OWASP Foundation Permission is granted to copy, distribute and/or modify this document under the terms of the GNU Free Documentation.
1 Web services and security ---discuss different ways to enforce security Presenter: Han, Xue.
Copyright © The OWASP Foundation Permission is granted to copy, distribute and/or modify this document under the terms of the OWASP License. The OWASP.
Module 5 Configuring Authentication. Module Overview Lesson 1: Understanding Classic SharePoint Authentication Providers Lesson 2: Understanding Federated.
Copyright © The OWASP Foundation Permission is granted to copy, distribute and/or modify this document under the terms of the GNU Free Documentation.
OWASP Top Ten #1 Unvalidated Input. Agenda What is the OWASP Top 10? Where can I find it? What is Unvalidated Input? What environments are effected? How.
Cookies Web Browser and Server use HTTP protocol to communicate and HTTP is a stateless protocol. But for a commercial website it is required to maintain.
SEC835 Runtime authentication Secure session management Secure use of cryptomaterials.
Copyright © The OWASP Foundation Permission is granted to copy, distribute and/or modify this document under the terms of the GNU Free Documentation.
Copyright © The OWASP Foundation Permission is granted to copy, distribute and/or modify this document under the terms of the OWASP License. The OWASP.
Broken Authentication & Session Management. What is it ? Bad implementation of authentication and session management. If an attacker can get your session.
Module 11: Securing a Microsoft ASP.NET Web Application.
Copyright © The OWASP Foundation Permission is granted to copy, distribute and/or modify this document under the terms of the OWASP License. The OWASP.
Copyright © The OWASP Foundation Permission is granted to copy, distribute and/or modify this document under the terms of the GNU Free Documentation.
nd Joint Workshop between Security Research Labs in JAPAN and KOREA Marking Scheme for Semantic- aware Web Application Security HPC.
Web Applications Testing By Jamie Rougvie Supported by.
Copyright © The OWASP Foundation Permission is granted to copy, distribute and/or modify this document under the terms of the OWASP License. The OWASP.
Copyright © The OWASP Foundation Permission is granted to copy, distribute and/or modify this document under the terms of the GNU Free Documentation.
UMBC’s WebAuth Robert Banz – UMBC
Copyright © The OWASP Foundation Permission is granted to copy, distribute and/or modify this document under the terms of the OWASP License. The OWASP.
Copyright © The OWASP Foundation Permission is granted to copy, distribute and/or modify this document under the terms of the OWASP License. The OWASP.
Copyright © The OWASP Foundation Permission is granted to copy, distribute and/or modify this document under the terms of the Creative Commons Attribution-ShareAlike.
Mr. Justin “JET” Turner CSCI 3000 – Fall 2015 CRN Section A – TR 9:30-10:45 CRN – Section B – TR 5:30-6:45.
Computer Security By Duncan Hall.
Copyright © The OWASP Foundation This work is available under the Creative Commons SA 2.5 license The OWASP Foundation OWASP Denver February 2012.
Role Of Network IDS in Network Perimeter Defense.
Copyright © The OWASP Foundation Permission is granted to copy, distribute and/or modify this document under the terms of the OWASP License. The OWASP.
Lecture 15 Page 1 CS 236 Online Evaluating Running Systems Evaluating system security requires knowing what’s going on Many steps are necessary for a full.
Web Login, Cookies Web Login | Old way HTML
Persistence Maintaining state: Queries. State is the Problem What is state? facebook status logins (which user are you?) conversations talking about what?
Copyright 2007 © The OWASP Foundation Permission is granted to copy, distribute and/or modify this document under the terms of the OWASP License. The OWASP.
ASP.NET 2.0 Security Alex Mackman CM Group Ltd
Page 1 Ethical Hacking by Douglas Williams. Page 2 Intro Attackers can potentially use many different paths through your application to do harm to your.
Copyright © The OWASP Foundation Permission is granted to copy, distribute and/or modify this document under the terms of the OWASP License. The OWASP.
Copyright 2007 © The OWASP Foundation Permission is granted to copy, distribute and/or modify this document under the terms of the OWASP License. The OWASP.
Penetration Testing Social Engineering Attack and Web-based Exploitation CIS 6395, Incident Response Technologies Fall.
Web Applications Security Cryptography 1
TOPIC: Web Security (Part-4)
Evaluating Existing Systems
Evaluating Existing Systems
Security in Web Applications
Lesson 16-Windows NT Security Issues
Presentation transcript:

Copyright © The OWASP Foundation Permission is granted to copy, distribute and/or modify this document under the terms of the GNU Free Documentation License. The OWASP Foundation OWASP OWASP Rochester Investigating: Web Site Access Control, Authentication, and Session Management Problems by Steve Buck

OWASP Web Site Access Control  What is Access Control?  When is Access Control Used?  How can Access Control Break?  How can Access Control Problems be fixed?

OWASP What is Access Control?  Mechanism used to govern what valid users can do on a website.  Users should only be able to access the information that they are supposed to be allowed to access.  Unauthenticated users should not be allowed to access areas meant only for authenticated users.  Users must be authenticated.  Is sometimes called authorization.

OWASP When is Access Control Used?  Whenever a web site has information that needs to be protected.  To protect company sensative information.  Can also be used to protect external APIs

OWASP How Can Access Control Break?  Many, many ways.  It is a simple problem to think about, but not necessarily a simple solution.  Sometimes developers will implement that authentication scheme and forget to implement a good access control mechanism.  Sometimes the rules for the access control mechanism are too complex and just do not work.

OWASP How to Fix Access Control Problems  Evaluate your needs, break your access down to:  Users  Label users by type.  Assets  Access Rules  Once this breakdown has taken place, capture the rules in one central rules router.

OWASP How to Fix...part 2  “If you can't easily explain your access control mechanism...it's probably broken.”  When the rules are captured, there needs to be a mechanism that will that will allow these rules to be implemented:  AccessController + security.policy as part of J2SE  Custom built ACL's and capability lists.

OWASP How to Test Access Control  No one “right” way to test access control.  There are some tools:  WebGoat  WebScarab  None of these are really comprehensive.  Have someone that knows the business rules and the technology try to break it.

OWASP Authentication and Session Management  What is the purpose of Authentication and Session Management?  What are some important issues to be aware of in reguard to session management and authentication?  How are these session management and authentication problems detected?  How are these session management and authentication problems resolved?

OWASP Purpose of Authentication and Session Management  The purpose of Authentication is to make sure that a person signing into the site is who they say they are.  Session management is used to maintain information about the user in a container accessible programatically by the webapp.

OWASP Issues with Authentication and Session Management  Plain text authentication.  Authentication done with a “GET” method.  Session Hijacking.  Session Fixation.

OWASP Plain Text Authentication  Authentication is usually done with a textual username and password login.  If there is no encryption of this login between the browser and client, the authentication mechanism leaves itself vulnerable to snooping.

OWASP “GET” method Authentication  The authentication becomes vulnerable because when the “GET” method is used, it will leave all of the page parameters in the URL.  This means if the user happens to copy or bookmark that URL they will store their username and password in the copied/bookmarketed URL.

OWASP Session Hijacking  There are many ways in which session hijacking can occur.  This can happen from everything from an intentional targeted attack to even something accidental.  The important thing is that even though there may not be any specifically sensative material passed, the attacker can possibly get to sesative material through hijacking the session.

OWASP Session Fixation  There is nothing accidental with session fixation.  The attacker will start a legitimate session on the app server.  The attacker with then force the victim into taking that session and attaching their authorized account to the session.  Once that has occurred, the attacker has access to the victim's account.

OWASP How are these problems detected?  Can detected through scanning tools, such as nessus, nmap, etc.  Can be detected by security minded QA divisions.  Unfortunatly these problems usually slip out to production at one point or another in an app's production lifetime.  So sometimes they are detected by the application users.

OWASP How are these problems solved?  There are many different things that can be done in order to solve these problems:  Make sure that all authentication happens in an SSL environment with good certificates.  Make sure that authentication is done some other way than with a post.  Use cookies for session maintenance.  Require re-authentication whenever important activities take place.  Be very careful with sesative information.

OWASP Solving Problems Part 2  A lot of the problems are solved for us depending upon what sort of environment we are working in. For example:  Most web application servers will maintain sessions for us now, we just have to configure them properly.  There are some cases where application frameworks are purchased (i.e. “portal” apps) that will take care of the authentication for us.