Your SlideShare is downloading. ×
0
Hacker Halted Miami , USA 2010
Hacker Halted Miami , USA 2010
Hacker Halted Miami , USA 2010
Hacker Halted Miami , USA 2010
Hacker Halted Miami , USA 2010
Hacker Halted Miami , USA 2010
Hacker Halted Miami , USA 2010
Hacker Halted Miami , USA 2010
Hacker Halted Miami , USA 2010
Hacker Halted Miami , USA 2010
Hacker Halted Miami , USA 2010
Hacker Halted Miami , USA 2010
Hacker Halted Miami , USA 2010
Hacker Halted Miami , USA 2010
Hacker Halted Miami , USA 2010
Hacker Halted Miami , USA 2010
Hacker Halted Miami , USA 2010
Hacker Halted Miami , USA 2010
Hacker Halted Miami , USA 2010
Hacker Halted Miami , USA 2010
Hacker Halted Miami , USA 2010
Hacker Halted Miami , USA 2010
Hacker Halted Miami , USA 2010
Hacker Halted Miami , USA 2010
Hacker Halted Miami , USA 2010
Hacker Halted Miami , USA 2010
Upcoming SlideShare
Loading in...5
×

Thanks for flagging this SlideShare!

Oops! An error has occurred.

×
Saving this for later? Get the SlideShare app to save on your phone or tablet. Read anywhere, anytime – even offline.
Text the download link to your phone
Standard text messaging rates apply

Hacker Halted Miami , USA 2010

1,022

Published on

Published in: Technology
0 Comments
1 Like
Statistics
Notes
  • Be the first to comment

No Downloads
Views
Total Views
1,022
On Slideshare
0
From Embeds
0
Number of Embeds
14
Actions
Shares
0
Downloads
0
Comments
0
Likes
1
Embeds 0
No embeds

Report content
Flagged as inappropriate Flag as inappropriate
Flag as inappropriate

Select your reason for flagging this presentation as inappropriate.

Cancel
No notes for slide

Transcript

  • 1. Web Maniac <br />Hacking Trust<br />Aditya K Sood [adi_ks [at] secniche.org]<br /> SecNiche Security<br />
  • 2. Disclaimer<br />Web Maniac - Hacking Trust<br />Pentesting web applications in a hacker’s way. Attack surface varies from application to application. How to think below the surface? That’s the aim!<br />All contents of this presentation represent my own beliefs and views and do not, unless explicitly stated otherwise, represent the beliefs of my current, or any of my previous in that effect, employers.<br />Screenshots have been shared from various resources. This is done to show the comparative model of various methodologies.<br />
  • 3. About Me<br /><ul><li>Founder , SECNICHE Security Labs.</li></ul>http://www.secniche.org<br /><ul><li> PhD Candidate at Michigan State University
  • 4. Worked previously for Armorize as Senior Security Practitioner , COSEINC as Senior </li></ul> Security Researcher and Security Consultant for KPMG<br /><ul><li>Written content Author for HITB E-Zine, Hakin9 ,ELSEVIER, USENIX Journals.
  • 5. Like to do Bug Hunting and Malware dissection.
  • 6. Released Advisories to Forefront Companies.
  • 7. Active Speaker at Security Conferences including RSA etc.
  • 8. Blog: http://secniche.blogspot.com| http://zeroknock.blogspot.com</li></li></ul><li> Agenda<br /><ul><li> Web Application Security Standards
  • 9. Web Application Security- A view of Reality
  • 10. Web Application – Testing and Development Methodologies
  • 11. Facets of Web Application Pen Testing (WAPT)
  • 12. Demonstrations – Live Targets </li></li></ul><li> Web Application Security Standards – Really<br />
  • 13.  Web Application Security Standards - ?? ! Answers !<br /><ul><li> Standards provide specific classification of vulnerabilities
  • 14. Do they comprise of all types of vulnerabilities ?
  • 15. Are all types of web attacks predefined in them?
  • 16. Do you think the design of web application matters? [to what extent ]
  • 17. A view of web application and a website under testing.
  • 18. Do platforms and web servers matter while web application assessment?
  • 19. Do you think penetration testing of web applications is beyond these </li></ul> standards ?<br />
  • 20.  Web Application State and Risks<br />© OWASP<br />
  • 21.  Web Application Architecture - Development<br />
  • 22.  Web Application Testing - Methodologies<br />
  • 23.  Why Security Testing ?<br />Defacement Statistics<br />© Zone H<br />
  • 24.  Web Application Security ! Reality - Broken<br />
  • 25.  Is that Ethical?<br />
  • 26.  Existence and Reality – Web Penetration Test<br /><ul><li> Is this all about compliance (PCI) ?
  • 27. Is this all about reporting generic issues and using reports for cert’s?
  • 28. Do you think organizational teams patch all the reported issues?
  • 29. White box or Black box – Changed definitions.
  • 30. Security Assessment ! = Penetration Testing [ Mismatch ]
  • 31. Time dependency – A big factor in determining the effectiveness
  • 32. Penetration Tests – Does not provide security / That’s the Truth
  • 33. Applied security comes out of the actions taken to remove those vulnerabilities which are exploited during </li></ul> the course of penetration testing.<br /><ul><li> Vulnerability assessment provides a glimpse of security to some degree
  • 34. Penetration tests emulate real world attacks to exploit the network and web infrastructure
  • 35. Effective penetration tests provide a degree to which systems can be exploited. It can be more.</li></li></ul><li> Pentesting Stringency in Real World<br />
  • 36.  Is that True ?<br /># Then what about Human Ignorance ?<br /> # A critical component in every sphere. Hard to beat it.<br />
  • 37.  Thinking in the Wild – Web Penetration Testing.<br />Is it all about shooting what we see ?<br />Do we need to take care of the hidden or shadowed?<br />
  • 38.  Web Penetration Test – The Refined Art<br /><ul><li> Turning the Black Box Testing into White box Testing
  • 39. Expertise – Hacking in a controlled manner
  • 40. Meeting the expectations</li></li></ul><li> The One – Murphy’s Law (Variation)<br /><ul><li> Pen Tester – The Word of Advice </li></ul>“Everything that goes wrong on the target host, network, or on the Internet from two weeks before you plug in to two weeks after you submit the report will be your fault.”<br />
  • 41.  Demonstration<br /><ul><li> Attacking Web Apps through Content Rendering – 4: 15 M
  • 42. SQLXSSI – XSS through SQL Injections : Yahoo – 5:30 M
  • 43. Persistent Redirection Attacks and Malware - 4:00 M
  • 44. Content Delivery Networks – Infection Behavior - 4:09 M
  • 45. Widget Redirection Attacks – Outbrain – 3:20 M</li></li></ul><li> Demo 1: Document Content Rendering Attacks<br />
  • 46.  Demo 2 : SQLXSSI – Using SQLI to conduct XSS<br />
  • 47.  Demo 3 : Persistent Logout Redirection Attacks<br />
  • 48.  Demo 4 : Third Party Content Delivery Infections<br />
  • 49.  Demo 5 : Widget Redirection Attacks<br />
  • 50.  Questions and Queries<br />
  • 51.  Thanks<br />SecNiche Security : http://www.secniche.org<br />Hacker Halted – http://www.hackerhalted.com<br />

×