Download presentation
Published byJayson Horn Modified over 9 years ago
1
Security Scanning OWASP Education Nishi Kumar Computer based training
IT Architect Specialist Chair, Software Security Forum FIS OWASP CBT Project Lead OWASP Global Industry Committee Contributor and Reviewer Keith Turpin
2
Objectives Understand different offerings available to find vulnerabilities Learn pros and cons of those offerings Know about some open source and commercial scanning tools An Intrusion prevention system (IPS) is a network security device that monitors network and/or system activities for malicious or unwanted behavior and can react, in real-time, to block or prevent those activities. Network-based IPS, for example, will operate in-line to monitor all network traffic for malicious code or attacks . When an attack is detected, it can drop the offending packets while still allowing all other traffic to pass. Intrusion prevention technology is considered by some to be an extension of intrusion detection (IDS) technology
3
Industry Application Security Offerings
Automated Dynamic web application interface scanning Static code scanning Web app firewalls Intrusion Prevention Systems (IPS) Manual Application penetration test Code review An Intrusion prevention system (IPS) is a network security device that monitors network and/or system activities for malicious or unwanted behavior and can react, in real-time, to block or prevent those activities. Network-based IPS, for example, will operate in-line to monitor all network traffic for malicious code or attacks . When an attack is detected, it can drop the offending packets while still allowing all other traffic to pass. Intrusion prevention technology is considered by some to be an extension of intrusion detection (IDS) technology
4
Automated vs. Manual: Advantages
Advantages of automated solutions Low incremental cost Minimal training Potentially 24/7 protection Advantages of manual solutions No false positives Guaranteed code coverage Ability to identify complex vulnerabilities Understand business logic Acts like a determined attacker Can combine vulnerabilities
5
What Automated Solutions Miss
Theoretical Logic flaws (business and application) Design flaws Practical Difficulty interacting with Rich Internet Applications Complex variants of common attacks (SQL Injection, XSS, etc) Cross-Site Request Forgery (CSRF) Uncommon or custom infrastructure Abstract information leakage
6
Conducting the Assessment
If you are using automated scanning tools, beware of false positives and negatives Pattern recognition has limitations Combine various testing methods Automated scanning Code review Manual testing Learn what tools do and do not do well Validate every finding Keep detailed notes
7
Commercial Dynamic Scanning Tools
Web Inspect – by HP Rational AppScan – by IBM Acunetix WVS – by Acunetix Hailstorm – by Cenzic NTOSpider – by NT OBJECTives
8
Open Source and Low Cost Scanners
W3af - Burp Suite - Grendel Scan - Wapiti - Arachni - Skipfish - Paros - (Free version no longer maintained)
9
Code Scanning Tools Fortify – by HP
Rational AppScan Source Edition – by IBM Coverity Static Analysis – by Coverity CxSuite – by Checkmarx Yasca – by OWASP Veracode binary analysis – Veracode (Veracode uses a different methodology than other scanners) C and C++ code scanning tool
10
Client Side Web Proxies
Paros - (Free version no longer maintained) Burp Suite - WebScarab NG - Charles Proxy - Browser Plugins: Internet Explorer: Fiddler Firefox: Tamper Data C and C++ code scanning tool
11
Paros Proxy Paros Proxy is a security scanning tool. Through Paros's proxy all HTTP and HTTPS data between server and client, including cookies and form fields, can be intercepted and modified.
12
Paros Proxy- Interface
13
Paros Proxy- Options Dialog
14
Paros Proxy- Reporting
15
Web application attack and audit framework
W3AF by OWASP Web application attack and audit framework
16
W3af - Web application attack and audit framework
17
W3af - Web application attack and audit framework
18
W3af - Exploit
19
Commercial Scanning Tool
IBM Rational App Scan Commercial Scanning Tool
20
IBM Rational App Scan Interface
Online Risk Mitigation and Compliance Solutions
21
Scan Configuration – URL and server
22
Scan Configuration – Login Management
23
Scan Configuration – Test Policy
24
Scan Configuration – Complete
25
Reporting Industry Standard
26
Reporting Industry Standard
27
Commercial Scanning Tool
Web Inspect Commercial Scanning Tool
28
Scan mode
29
Audit Policy
30
Requester Thread
31
Http Parsing
32
Report Type
33
Summary Over 90% of ecommerce PCI breaches are from application flaws
Application security is not a percentage game. One missed flaw is all it takes Vulnerabilities can come from more than one avenue: Acquisitions Old or dead code Third-party libraries
Similar presentations
© 2025 SlidePlayer.com. Inc.
All rights reserved.