Presentation is loading. Please wait.

Presentation is loading. Please wait.

“Today over 70% of attacks against a company’s network come at the ‘Application Layer’ not the Network or System layer.” - Gartner Is Your Web Application.

Similar presentations


Presentation on theme: "“Today over 70% of attacks against a company’s network come at the ‘Application Layer’ not the Network or System layer.” - Gartner Is Your Web Application."— Presentation transcript:

1 “Today over 70% of attacks against a company’s network come at the ‘Application Layer’ not the Network or System layer.” - Gartner Is Your Web Application Security Cleared? Dr. Ravi Kiran Raju Yerra Vice President – Security Testing Arsin Corporation

2 Documents> Security Services > Web Application Snap Shot of the Presentation About Me Web Applications – The Challenge Why Web Applications are Vulnerable Top 10 Vulnerabilities Is Application Security a Tool Business ? Methodology Suggested Tools Whats Next ?

3 Documents> Security Services > Web Application Holds Doctor of Science in Internet Security Management Have 15 years of experience in Information Technology & Information Security solutions Vice President – QA (Security Testing) at Arsin Corporation Actively involved in 10 different innovative information threat management projects with various universities across the globe. About Me

4 Documents> Security Services > Web Application Web Applications – The challenge Web Server Database Server Application Server Web Application The World Wide Web has evolved into a global environment delivering applications such as reservation systems, online shopping or auction sites, games, multimedia applications, calendars, maps, chat applications or data entry/display systems, and many more Web applications are characterized by multiculturalism, continuous change, fast pace and competitiveness, high demands on user adaptivity, Thus, the complexity of securing such Web applications has increased significantly

5 Documents> Security Services > Web Application Why is this important?

6 Documents> Security Services > Web Application Why Web Applications are Vulnerable Application attacks are the latest trend when it comes to hacking. On average, 90% of all dynamic content sites have vulnerabilities associated with them. No single web server and database server combination has been found to be immune! Current security solutions do not offer adequate protection Attacks pass through perimeter firewall security over port 80 (or 443 for SSL). Exploiting bugs and poor security programming practices in the software.

7 Documents> Security Services > Web Application 7 What is Web Application Security? Web Application Security is not: Traditional LayersTraditional Security Controls Network Protocols Firewalls, Routers, Operating System IP Stack Configuration and Filtering, VPNs, and Vulnerability Scanners Operating System Operating System Patches and OS Configuration, Authentication, Authorization, Encryption, and Vulnerability Scanners Commercial and Open Source Applications Minimize Services, Application configuration, Patches, Application level Authentication Authorization, and Vulnerability Scanners

8 Documents> Security Services > Web Application 8 What is Web Application Security? Web Application Security is: Traditional LayersTraditional Security Controls Network Protocols Firewalls, Routers, Operating System IP Stack Configuration and Filtering, VPNs, and Vulnerability Scanners Operating System Operating System Patches and OS Configuration, Authentication, Authorization, Encryption, and Vulnerability Scanners Commercial and Open Source Applications Minimize Services, Application configuration, Patches, Application level Authentication Authorization, and Vulnerability Scanners Custom Web Applications Architecture, Design and Code Reviews, Application Scanners, Testing with Malicious Input

9 Documents> Security Services > Web Application Data Flow example

10 Documents> Security Services > Web Application 10 How Bad Is It? – Vulnerability Reports Vulnerability reports consistent report Web Applications with highest # of vulnerabilities. For example SANS @RISK Aug 2007 SANS @RISK Aug 2007 8/78/138/208/27 Total Microsoft Products0515020 Mac10124 Linux451515 Unix, Solaris, etc626317 Network Device123511 Web Applications50352322130

11 Documents> Security Services > Web Application Story A Successful Hack

12 What are the Top 10 Vulnerabilities ?

13 13 OWASP 2007 Top Ten List A1.Cross-Site Scripting (XSS) A2.Injections Flaws A3.Malicious File Execution A4.Insecure Direct Object Reference A5.Cross Site Request Forgery (CSRF) A6.Information Leakage & Improper Error Handling A7.Broken Authentication & Session Management A8.Insecure Cryptographic Storage A9.Insecure Communications A10. Failure to Restrict URL Access www.owasp.org

14 Documents> Security Services > Web Application Is Application Security A Tool Business??? Web applications can be tested in combination of tools. Typical Web Application Testing believes 30% Tool and 70 % Manual Effort Often tools throw false positive results Evaluation of the results of scanner and Analyzing Statement Of Applicability is a Key Tools may not have the “ Risk Based Approach” The Answer is NO.

15 Documents> Security Services > Web Application Story A Great Damage

16 Methodology

17 Methodology – Web Application Penetration Testing Test Against OWASP 2004 Test Against OWASP 2007 Deliver Final Reports Test Protocol Security Issues Recommend / Implement Solutions Re Test the Application Mapping of Technical vulnerabilities to Business Risks

18 Documents> Security Services > Web Application Testing Against OWASP 2004: Understand the Applications in detail. Test against OWASP 2004 (Intrusive / Non Intrusive Methods) Authorized User Test & Black Box Testing Testing Against OWASP 2007 & Protocol Security Testing : Test against OWASP 2007 (Intrusive / Non Intrusive Methods) & Implement fuzzing techniques for Protocol analysis External Code Posture Analysis Recommend or Implement Solutions: Recommend appropriate solutions include CODE Snippet Design If required, Arsin COE Security also helps in Implementing solutions. Re Test the fixed Applications Re Test the entire applications against OWASP 2004 & 2007 and Protocol issues. Retesting process will continue till the bugs reduced to < 5% (Non Severe). Deliver Report On successful completion of testing Arsin delivers the an Executive, Technical report with appropriate applicable Recommendations Methodology – Contd

19 Documents> Security Services > Web Application Is there any suggested tools… There are couple of industry standard commercial and open source tools like. Rational Appscan from IBM Web Scrap from OWASP HP – Web Inspect etc.

20 Documents> Security Services > Web Application What’s Next ?

21 Next ! Generally web applications are tested against the “Application” only. Web Applications must also undergo respective protocol security testing i.e HTTP HTTPS etc It means, a security testing must upgrade to “Application Layer” to “Network Layer” Web Services security testing will also plays an important role.

22 Documents> Security Services > Web Application Queries Dr. Ravi Kiran Raju Yerra ryerra@arsin.com IM – Yahoo : brightvaio Image References: Black Hat Briefings – & www.owasp.org

23 Documents> Security Services > Web Application Thank You For More Details Jonathan McClean jmcclean@arsin.com


Download ppt "“Today over 70% of attacks against a company’s network come at the ‘Application Layer’ not the Network or System layer.” - Gartner Is Your Web Application."

Similar presentations


Ads by Google