Download presentation
Presentation is loading. Please wait.
Published byRalf Gaines Modified over 6 years ago
1
Vulnerability Chaining Every Low Issue Has its big impact
Chandrakant Nial Security Analyst
2
BIO Chandrakant Nial is a security analyst and a practicing developer and a security bug hunter in Bhubaneswar. His career span over 3 years including TCS and as an independent bounty hunter. His education includes Bachelor in Computer Sc. from BPUT, Orissa.
3
Agenda OWASP TOP 10 2013 Some low issue that we come across
Typical mistake by developers Chaining Process Analyzing the response and understanding behavior of application Using multiple vulnerability Knowledge on various technology Impacts Defacing website Account take over Delete codebase, DataBases, etc… Best practices/References Conclusion
4
Top 10 List A1-Injection A2-Broken Authentication and Session Management A3-Cross-Site Scripting (XSS) A4-Insecure Direct Object References A5-Security Misconfiguration A6-Sensitive Data Exposure A7-Missing Function Level Access Control A8-Cross-Site Request Forgery (CSRF) A9-Using Components with Known Vulnerabilities A10-Unvalidated Redirects and Forwards
5
Low Issues Unwanted Methods (PUT,DELETE,HEAD) Cookie Low flag
Encryption (URL,Base64) Directory traversal Banner grabbing Url Redirection Information Disclose ,Mixed Content
6
Typical Mistakes Ignorance Unaware Of security things
They don’t care security but functionality is all they want
7
Chaining Process Low bug
8
Chaining Process Chained BUG Versoix, Switzerland
9
Chaining Process Example – 1
10
Chaining Process Examples
11
Chaining Process Examples
12
Chaining Process Examples
13
Chaining Process Examples
14
Chaining Process Examples
15
Chaining Process Examples
16
Chaining Process Examples
17
Chaining Process By passing authentication Consider two user
Attackers Login ID: attackerloginid md5 hash value: db9e21c958a4df44eea4 Victims Login ID: victimloginid md5 hash value: e9fc2abd9060fde1a67e3367b7d64bd0
18
Authentication Bypass
Original Server Response Using Attackers Account with Wrong Password HTTP/ OK Date: Wed, 7 May :17:27 GMT Server: Apache Expires: Thu, 19 Nov :52:00 GMT Cache-Control: no-store, no-cache, must-revalidate, post-check=0, pre-check=0 Pragma: no-cache Set-Cookie: pstoken=; expires=Tue, 25-Mar :32:27 GMT; path=/ Content-Length: 16 Connection: close Content-Type: text/html; charset=UTF-8 {"failed":false}
19
Authentication Bypass…
Original Response Using Attackers Account with Right Password: HTTP/ Found Date: Wed, 7 May :17:27 GMT Server: Apache Expires: Thu, 19 Nov :52:00 GMT Cache-Control: no-store, no-cache, must-revalidate, post-check=0, pre-check=0 Pragma: no-cache Set-Cookie: pstoken= db9e21c958a4df44eea4; expires=Tue, 25-Mar :32:27 GMT; path=/ Set-Cookie: pstoken= db9e21c958a4df44eea4; expires=Tue, 25-Mar :32:27 GMT; path=/ Content-Length: 16 Connection: close Content-Type: text/html; charset=UTF-8 {"success":true}
20
Authentication Bypass…
Modified Response in which the attacker modified the Response Code, Set-Cookies & there Values, Status Code Values and Sent it as a Request: HTTP/ Found Date: Wed, 7 May :17:27 GMT Server: Apache Expires: Thu, 19 Nov :52:00 GMT Cache-Control: no-store, no-cache, must-revalidate, post-check=0, pre-check=0 Pragma: no-cache Set-Cookie: pstoken=e9fc2abd9060fde1a67e3367b7d64bd0; expires=Tue, 25-Mar :32:27 GMT; path=/ Set-Cookie: pstoken=e9fc2abd9060fde1a67e3367b7d64bd0; expires=Tue, 25-Mar :32:27 GMT; path=/ Content-Length: 16 Connection: close Content-Type: text/html; charset=UTF-8 {"success":true}
21
Moral How to Start Chaining? Find Vulnerability Analyze bugs
Research on customer’s business
22
Moral How to Start Chaining? Find Vulnerability Analyze bugs
Research on customer’s business
23
Demo DEMO
24
Moral Questions Please
Vulnerable code + weak Configuration = Dangerous Exploitation Every Vulnerability need to patch irrespective of severity Questions Please
Similar presentations
© 2024 SlidePlayer.com. Inc.
All rights reserved.