SlideShare a Scribd company logo
1 of 28
Download to read offline
WEB VULNERABILITIES
OVERVIEW
BASICS
TOP 10 OWSP
PRACTICAL EXAMPLE
WEB VULNERABILITIES : BASIC
 Web application vulnerabilities involve a system flaw or
weakness in a web-based application
 Due to not validating or sanitizing form inputs,
misconfigured web servers, and application design flaws
 They can be exploited to compromise the application's
security
 These vulnerabilities are not the same as other common
types of vulnerabilities, such as network or asset.
 They arise because web applications need to interact
with multiple users across multiple networks
WEB VULNERABILITIES : BASIC
Why Web Security Matters:
Data Breaches Impact: Severe consequences of data
breaches, including financial losses, reputational damage,
and legal repercussions.
User Trust: Users trust organizations to safeguard their
information, and a breach can erode this trust, affecting
customer loyalty and brand reputation.
Regulatory Compliance: Growing importance of
compliance with data protection regulations and failure to
comply can result in significant penalties.
OWSP
• OWASP : is a nonprofit foundation that works to improve the security of
software. OWASP is an open platform that security professionals from around
the world use to share information, tools, and events that are focused on
securing the web
• Top 10 : One of OWASP’s most valuable resources is the OWASP Top 10.
• The organization has published this list since 2003 as a way to spread
awareness of the web’s most targeted vulnerabilities.
• The Top 10 mainly applies to new or custom made software.
• Importance : Many of the world's largest organizations reference the OWASP
Top 10 during application development to help ensure their programs address
common security mistakes.
• Community-Driven: Highlight that the OWASP Top 10 is a result of collective
expertise and contributions from security professionals globally, making it a
comprehensive and reliable resource.
OWSP
BROKEN ACCESS CONTROL
Definition : class of vulnerabilities where attackers exploit weaknesses in
the mechanisms responsible for user authentication and session
management.
Common Weaknesses: Common issues such as weak password policies,
session fixation, and insufficiently protected authentication credentials.
Risks of Broken Authentication:
Unauthorized Access: Emphasize that successful attacks can lead to
unauthorized access to user accounts, administrative interfaces, or sensitive
information.
Data Exposure: Potential for exposure of sensitive data if authentication
credentials or session tokens are compromised.
BROKEN ACCESS CONTROL
BROKEN ACCESS CONTROL
Common Attack Scenarios:
Credential Stuffing: Explain how attackers use username and password
combinations obtained from previous data breaches to gain unauthorized access to
other accounts where users reuse credentials.
Session Hijacking: Discuss the risk of attackers intercepting or stealing session
tokens to impersonate legitimate users.
Mitigation Strategies:
Multi-Factor Authentication (MFA): Highlight the importance of implementing MFA
to add an extra layer of security beyond passwords.
Secure Session Management: Emphasize the need for secure session
management practices, including the use of secure cookies, session timeouts, and
token rotation.
Password Policies: Advocate for strong password policies, regular password
updates, and the use of password hashing to protect stored credentials.
BROKEN ACCESS CONTROL
Yahoo (2013-2014):
Incident: Yahoo experienced two major data breaches affecting over
one billion user accounts.
Cause: The breaches were attributed to stolen session cookies and
weak encryption methods.
Impact: The compromised information included names, email
addresses, telephone numbers, and hashed passwords. The
incidents had a profound impact on Yahoo's reputation, leading to a
decrease in its acquisition value by Verizon.
CRYPTOGRAPHIC FAILURES/SENSATIVE DATA EXPOSURE
Overview: Sensitive Data Exposure occurs when an application fails to
adequately protect sensitive information, such as credit card numbers,
passwords, or personal details, putting user privacy and security at risk.
Nature of Data: Clarify that sensitive data can include personally
identifiable information (PII), financial details, and any information that, if
exposed, could lead to identity theft or financial loss.
Common Scenarios and Causes:
Insecure Transmission: Data transmitted over unencrypted channels
can be intercepted by attackers during transit, emphasizing the
importance of using secure protocols like HTTPS.
Weak Data Storage: Risk of storing sensitive data in an insecure
manner, such as plain text or using weak encryption algorithms, making
it susceptible to unauthorized access.
CRYPTOGRAPHIC FAILURES/SENSATIVE DATA EXPOSURE
Consequences of Sensitive Data Exposure:
Identity Theft: Potential for attackers to use exposed personal information for
identity theft and fraudulent activities.
Financial Loss: Financial risks associated with the exposure of credit card
information or banking details.
Prevention and Mitigation:
Data Encryption: Importance of encrypting sensitive data both in transit (using
protocols like TLS) and at rest (using strong encryption algorithms).
Secure Key Management: Significance of secure key management practices to
protect encryption keys and prevent unauthorized access.
Data Masking: Concept of data masking, where sensitive information is partially or
fully obscured to limit exposure, especially in non-production environments.
INJECTIONS
Definition: Injection vulnerabilities as a type of security risk
where untrusted data is introduced into a program or query,
leading to unintended consequences.
Common Types: Common injection types such as SQL
injection, NoSQL injection, OS command injection, etc.
Examples of Injection Vulnerabilities:
•SQL Injection Example
•OS Command Injection Example
INJECTIONS
SQL Injection Example:
Scenario:
Consider a simple web application with a login page where
users enter their credentials.
Vulnerable Code (Before Mitigation):
// SQL query construction in the backend
const query = "SELECT * FROM users WHERE
username='" + enteredUsername + "' AND password='" +
enteredPassword + "'";
SQL INJECTIONS
Exploitation:
1. Normal Login Attempt:
•User enters valid credentials like username: user123 and password:
pass123.
•The SQL query becomes: SELECT * FROM users WHERE
username='user123' AND password='pass123'.
2. SQL Injection Attempt:
•Malicious user enters: username: ' OR '1'='1' -- and any password.
•The manipulated query becomes: SELECT * FROM users WHERE
username='' OR '1'='1' --' AND password='anyPassword'.
•The double hyphen (--) signifies a comment in SQL, effectively
ignoring the rest of the original query.
3.Outcome:
•The query always evaluates to true (1=1), allowing the attacker to
bypass authentication and potentially gain unauthorized access.
SQL INJECTIONS
Mitigation:
// Using parameterized queries to prevent SQL injection const query
"SELECT * FROM users WHERE username=? AND password=?";
Parameterized queries ensure that user input is treated as data, not
executable code.
SECURITY MISCONFIGURATION
Overview: Security misconfigurations occur when an application, server,
database, or any component of a system is not securely configured. This
provides potential attackers with unnecessary access or information,
making it easier for them to exploit vulnerabilities.
Common Misconfigurations:
Default Settings: Leaving default configurations unchanged, which
may include default passwords or settings that are not suitable for a
production environment.
Unnecessary Services: Running unnecessary services or features
that increase the attack surface without providing any benefit.
Excessive Permissions: Granting excessive permissions to users,
applications, or services.
SECURITY MISCONFIGURATION
SECURITY MISCONFIGURATION
Prevention and Mitigation:
Regular Audits and Reviews: Stress the importance of regular security
audits and reviews to identify and correct misconfigurations.
Least Privilege Principle: Emphasize the principle of least privilege,
where users and systems should only have the minimum level of access
required to perform their tasks.
Automation of Security Configurations: Advocate for the use of
automation tools to enforce and monitor security configurations
consistently.
IDENTIFICATION AND AUTHENTICATION FLAWS
Identification and Authentication Relevance:
IDOR vulnerabilities can be linked to authentication flaws.
Weak or insufficient access controls can allow attackers to
manipulate object references and access unauthorized
data.
Mitigation:
Implement proper access controls to ensure that
authenticated users can only access their own data.
Validate and authorize user actions on the server side.
VULNERABLE AND OUTDATE COMPONENTS
Vulnerability occurs when a web application uses third-party
libraries, frameworks, or components that have known
security vulnerabilities. Attackers can exploit these
vulnerabilities to compromise the application.
Common Causes:
Outdated Libraries: Using outdated versions of libraries
or components that have known security patches or
updates.
Lack of Monitoring: Not actively monitoring and updating
third-party components after they are initially integrated
into the application.
VULNERABLE AND OUTDATE COMPONENTS
Risks and Consequences:
Exploitation of Weaknesses: Attackers actively search for and exploit known
vulnerabilities in widely used components.
Data Breaches: Potential for data breaches and unauthorized access resulting
from exploiting vulnerabilities in third-party components.
Prevention and Mitigation:
Regular Updates: Importance of regularly updating all third-party libraries and
components to their latest secure versions.
Automated Dependency Scanning: Use of automated tools for dependency
scanning that can identify and alert developers about outdated or vulnerable
components.
Monitoring Security Bulletins: Staying informed about security bulletins and
updates related to third-party components.
SOFTWARE AND DATA INTEGRITY FAILURE
Software and data integrity failures are vulnerabilities in software or
infrastructure that allow an attacker to modify or delete data in an unauthorized
manner. Attackers can exploit these vulnerabilities to gain access to sensitive
information or cause damage to the system.
Some examples of software and data integrity failures include:
Insufficient Verification of Data Authenticity: This occurs when the software
does not properly verify the data source before it is processed. This can allow an
attacker to inject malicious data into the system.
Missing Support for Integrity Checks: This occurs when the software cannot
verify data integrity. This can make it easier for an attacker to modify or delete data
without being detected.
Untrusted Search Path: This occurs when the software allows an attacker to
control the search path for libraries or modules. This can allow an attacker to inject
malicious code into the system.
SOFTWARE AND DATA INTEGRITY FAILURE
Real-Life Example of Software and Integrity Failures: WannaCry
In 2017, a ransomware attack called WannaCry infected over 230,000 computers in over 150
countries. The attack used a vulnerability in the Windows operating system to spread. Once
infected, the ransomware encrypted the victim's files and demanded a ransom payment to
decrypt them.
Mitigation :
The key to preventing software and integrity failures is to monitor third-party software and
ensure the implementation of all security updates and patches promptly to ensure the
software's and data's reliability throughout the software development life cycle.
Compile a Software Bill of Materials (SBOM); this allows for a better understanding of the
application's structure and makes it easier to identify which components need updating.
Regularly monitor for updates and security patches for all components and apply these
updates swiftly to help minimize potential risks associated with vulnerabilities.
Replace components that are no longer supported or have known security vulnerabilities to
ensure that the application only uses up-to-date and secure components.
SECURITY LOGGING AND MONITORING FLAWS
Security logging and monitoring failures are security vulnerabilities that can occur
when a system or application fails to log or monitor security events properly. This
can allow attackers to gain unauthorized access to systems and data without
detection.
Some of the most common security logging and monitoring failures include:
Not Logging Important Security Events: This can include failed login attempts,
unauthorized access to sensitive data, or changes to system configurations.
Not Monitoring Logs for Suspicious Activity: This can include repeated failed
login attempts, unusual traffic patterns, or changes to system configurations.
Not Storing Logs for Long Enough: This can make it challenging to investigate
security incidents that occurred in the past.
Not Having a Process for Reviewing and Responding to Security Logs: This
can allow security incidents to go undetected and unaddressed.
Insecure Logging and Monitoring Systems: This can allow attackers to access or
modify logs, making tracking their activities difficult.
SECURITY LOGGING AND MONITORING FLAWS
Mitigation :
The key to protecting against security logging and monitoring failures is to
log all critical security events and monitor them for suspicious activity. Let’s
dive into what that means:
Ensure comprehensive logs are generated
Securely store and protect log files to ensure their integrity and
confidentiality
Implement a process to regularly review and analyze logs with both
automated tools and manual inspection
Set up real-time monitoring and alerting systems to detect and respond
to security events
Create a comprehensive incident response plan that clearly outlines
roles, responsibilities, and procedures
SERVER-SIDE REQUEST FORGERY (SSRF)
A Server-Side Request Forgery (SSRF) attack involves an attacker
abusing server functionality to access or modify resources. The attacker
targets an application that supports data imports from URLs or allows
them to read data from URLs. URLs can be manipulated, either by
replacing them with new ones or by tampering with URL path traversal.
Mitigation :
Whitelist IPs to be allowed access to server URL
Disable unused URLs
2.1 Web Vulnerabilities.pptx

More Related Content

Similar to 2.1 Web Vulnerabilities.pptx

Network security, seriously?
Network security, seriously?Network security, seriously?
Network security, seriously?Peter Wood
 
Solvit identity is the new perimeter
Solvit   identity is the new perimeterSolvit   identity is the new perimeter
Solvit identity is the new perimeterS.E. CTS CERT-GOV-MD
 
Security For Application Development
Security For Application DevelopmentSecurity For Application Development
Security For Application Development6502programmer
 
Owasp Top 10 2017
Owasp Top 10 2017Owasp Top 10 2017
Owasp Top 10 2017SamsonMuoki
 
Engineering Software Products: 7. security and privacy
Engineering Software Products: 7. security and privacyEngineering Software Products: 7. security and privacy
Engineering Software Products: 7. security and privacysoftware-engineering-book
 
Fighting The Top 7 Threats to Cloud Cybersecurity
Fighting The Top 7 Threats to Cloud CybersecurityFighting The Top 7 Threats to Cloud Cybersecurity
Fighting The Top 7 Threats to Cloud CybersecurityDavid Zaizar
 
Owasp top 10 vulnerabilities
Owasp top 10 vulnerabilitiesOwasp top 10 vulnerabilities
Owasp top 10 vulnerabilitiesOWASP Delhi
 
The 5 Layers of Security Testing by Alan Koch
The 5 Layers of Security Testing by Alan KochThe 5 Layers of Security Testing by Alan Koch
The 5 Layers of Security Testing by Alan KochQA or the Highway
 
The 5 Layers of Security Testing by Alan Koch
The 5 Layers of Security Testing by Alan KochThe 5 Layers of Security Testing by Alan Koch
The 5 Layers of Security Testing by Alan KochQA or the Highway
 
Identifying and Eradicating Web Application Vulnerabilities : Cyber Security ...
Identifying and Eradicating Web Application Vulnerabilities : Cyber Security ...Identifying and Eradicating Web Application Vulnerabilities : Cyber Security ...
Identifying and Eradicating Web Application Vulnerabilities : Cyber Security ...Boston Institute of Analytics
 
Secure code practices
Secure code practicesSecure code practices
Secure code practicesHina Rawal
 
owasp features in secure coding techniques
owasp  features in secure coding techniquesowasp  features in secure coding techniques
owasp features in secure coding techniquesSri Latha
 
Avoiding Application Attacks: A Guide to Preventing the OWASP Top 10 from Hap...
Avoiding Application Attacks: A Guide to Preventing the OWASP Top 10 from Hap...Avoiding Application Attacks: A Guide to Preventing the OWASP Top 10 from Hap...
Avoiding Application Attacks: A Guide to Preventing the OWASP Top 10 from Hap...IBM Security
 
Building a Secure Software Application: Your Ultimate Guide
Building a Secure Software Application: Your Ultimate Guide Building a Secure Software Application: Your Ultimate Guide
Building a Secure Software Application: Your Ultimate Guide JamesParker406701
 

Similar to 2.1 Web Vulnerabilities.pptx (20)

A talk on OWASP Top 10 by Mukunda Tamly
A talk on  OWASP Top 10 by Mukunda TamlyA talk on  OWASP Top 10 by Mukunda Tamly
A talk on OWASP Top 10 by Mukunda Tamly
 
C01461422
C01461422C01461422
C01461422
 
Network security, seriously?
Network security, seriously?Network security, seriously?
Network security, seriously?
 
Solvit identity is the new perimeter
Solvit   identity is the new perimeterSolvit   identity is the new perimeter
Solvit identity is the new perimeter
 
Security For Application Development
Security For Application DevelopmentSecurity For Application Development
Security For Application Development
 
Nii sample pt_report
Nii sample pt_reportNii sample pt_report
Nii sample pt_report
 
Owasp Top 10 2017
Owasp Top 10 2017Owasp Top 10 2017
Owasp Top 10 2017
 
Owasp web security
Owasp web securityOwasp web security
Owasp web security
 
Engineering Software Products: 7. security and privacy
Engineering Software Products: 7. security and privacyEngineering Software Products: 7. security and privacy
Engineering Software Products: 7. security and privacy
 
Fighting The Top 7 Threats to Cloud Cybersecurity
Fighting The Top 7 Threats to Cloud CybersecurityFighting The Top 7 Threats to Cloud Cybersecurity
Fighting The Top 7 Threats to Cloud Cybersecurity
 
Owasp top 10 vulnerabilities
Owasp top 10 vulnerabilitiesOwasp top 10 vulnerabilities
Owasp top 10 vulnerabilities
 
The 5 Layers of Security Testing by Alan Koch
The 5 Layers of Security Testing by Alan KochThe 5 Layers of Security Testing by Alan Koch
The 5 Layers of Security Testing by Alan Koch
 
The 5 Layers of Security Testing by Alan Koch
The 5 Layers of Security Testing by Alan KochThe 5 Layers of Security Testing by Alan Koch
The 5 Layers of Security Testing by Alan Koch
 
Identifying and Eradicating Web Application Vulnerabilities : Cyber Security ...
Identifying and Eradicating Web Application Vulnerabilities : Cyber Security ...Identifying and Eradicating Web Application Vulnerabilities : Cyber Security ...
Identifying and Eradicating Web Application Vulnerabilities : Cyber Security ...
 
OWASP Top 10 Project
OWASP Top 10 ProjectOWASP Top 10 Project
OWASP Top 10 Project
 
Secure code practices
Secure code practicesSecure code practices
Secure code practices
 
owasp features in secure coding techniques
owasp  features in secure coding techniquesowasp  features in secure coding techniques
owasp features in secure coding techniques
 
Ethical hacking
Ethical hacking Ethical hacking
Ethical hacking
 
Avoiding Application Attacks: A Guide to Preventing the OWASP Top 10 from Hap...
Avoiding Application Attacks: A Guide to Preventing the OWASP Top 10 from Hap...Avoiding Application Attacks: A Guide to Preventing the OWASP Top 10 from Hap...
Avoiding Application Attacks: A Guide to Preventing the OWASP Top 10 from Hap...
 
Building a Secure Software Application: Your Ultimate Guide
Building a Secure Software Application: Your Ultimate Guide Building a Secure Software Application: Your Ultimate Guide
Building a Secure Software Application: Your Ultimate Guide
 

Recently uploaded

Pigging Solutions Piggable Sweeping Elbows
Pigging Solutions Piggable Sweeping ElbowsPigging Solutions Piggable Sweeping Elbows
Pigging Solutions Piggable Sweeping ElbowsPigging Solutions
 
Bluetooth Controlled Car with Arduino.pdf
Bluetooth Controlled Car with Arduino.pdfBluetooth Controlled Car with Arduino.pdf
Bluetooth Controlled Car with Arduino.pdfngoud9212
 
Build your next Gen AI Breakthrough - April 2024
Build your next Gen AI Breakthrough - April 2024Build your next Gen AI Breakthrough - April 2024
Build your next Gen AI Breakthrough - April 2024Neo4j
 
Kotlin Multiplatform & Compose Multiplatform - Starter kit for pragmatics
Kotlin Multiplatform & Compose Multiplatform - Starter kit for pragmaticsKotlin Multiplatform & Compose Multiplatform - Starter kit for pragmatics
Kotlin Multiplatform & Compose Multiplatform - Starter kit for pragmaticscarlostorres15106
 
APIForce Zurich 5 April Automation LPDG
APIForce Zurich 5 April  Automation LPDGAPIForce Zurich 5 April  Automation LPDG
APIForce Zurich 5 April Automation LPDGMarianaLemus7
 
Making_way_through_DLL_hollowing_inspite_of_CFG_by_Debjeet Banerjee.pptx
Making_way_through_DLL_hollowing_inspite_of_CFG_by_Debjeet Banerjee.pptxMaking_way_through_DLL_hollowing_inspite_of_CFG_by_Debjeet Banerjee.pptx
Making_way_through_DLL_hollowing_inspite_of_CFG_by_Debjeet Banerjee.pptxnull - The Open Security Community
 
Are Multi-Cloud and Serverless Good or Bad?
Are Multi-Cloud and Serverless Good or Bad?Are Multi-Cloud and Serverless Good or Bad?
Are Multi-Cloud and Serverless Good or Bad?Mattias Andersson
 
Integration and Automation in Practice: CI/CD in Mule Integration and Automat...
Integration and Automation in Practice: CI/CD in Mule Integration and Automat...Integration and Automation in Practice: CI/CD in Mule Integration and Automat...
Integration and Automation in Practice: CI/CD in Mule Integration and Automat...Patryk Bandurski
 
Bun (KitWorks Team Study 노별마루 발표 2024.4.22)
Bun (KitWorks Team Study 노별마루 발표 2024.4.22)Bun (KitWorks Team Study 노별마루 발표 2024.4.22)
Bun (KitWorks Team Study 노별마루 발표 2024.4.22)Wonjun Hwang
 
Human Factors of XR: Using Human Factors to Design XR Systems
Human Factors of XR: Using Human Factors to Design XR SystemsHuman Factors of XR: Using Human Factors to Design XR Systems
Human Factors of XR: Using Human Factors to Design XR SystemsMark Billinghurst
 
Understanding the Laravel MVC Architecture
Understanding the Laravel MVC ArchitectureUnderstanding the Laravel MVC Architecture
Understanding the Laravel MVC ArchitecturePixlogix Infotech
 
"LLMs for Python Engineers: Advanced Data Analysis and Semantic Kernel",Oleks...
"LLMs for Python Engineers: Advanced Data Analysis and Semantic Kernel",Oleks..."LLMs for Python Engineers: Advanced Data Analysis and Semantic Kernel",Oleks...
"LLMs for Python Engineers: Advanced Data Analysis and Semantic Kernel",Oleks...Fwdays
 
Swan(sea) Song – personal research during my six years at Swansea ... and bey...
Swan(sea) Song – personal research during my six years at Swansea ... and bey...Swan(sea) Song – personal research during my six years at Swansea ... and bey...
Swan(sea) Song – personal research during my six years at Swansea ... and bey...Alan Dix
 
Benefits Of Flutter Compared To Other Frameworks
Benefits Of Flutter Compared To Other FrameworksBenefits Of Flutter Compared To Other Frameworks
Benefits Of Flutter Compared To Other FrameworksSoftradix Technologies
 
costume and set research powerpoint presentation
costume and set research powerpoint presentationcostume and set research powerpoint presentation
costume and set research powerpoint presentationphoebematthew05
 
"Federated learning: out of reach no matter how close",Oleksandr Lapshyn
"Federated learning: out of reach no matter how close",Oleksandr Lapshyn"Federated learning: out of reach no matter how close",Oleksandr Lapshyn
"Federated learning: out of reach no matter how close",Oleksandr LapshynFwdays
 

Recently uploaded (20)

Pigging Solutions Piggable Sweeping Elbows
Pigging Solutions Piggable Sweeping ElbowsPigging Solutions Piggable Sweeping Elbows
Pigging Solutions Piggable Sweeping Elbows
 
Bluetooth Controlled Car with Arduino.pdf
Bluetooth Controlled Car with Arduino.pdfBluetooth Controlled Car with Arduino.pdf
Bluetooth Controlled Car with Arduino.pdf
 
Build your next Gen AI Breakthrough - April 2024
Build your next Gen AI Breakthrough - April 2024Build your next Gen AI Breakthrough - April 2024
Build your next Gen AI Breakthrough - April 2024
 
Kotlin Multiplatform & Compose Multiplatform - Starter kit for pragmatics
Kotlin Multiplatform & Compose Multiplatform - Starter kit for pragmaticsKotlin Multiplatform & Compose Multiplatform - Starter kit for pragmatics
Kotlin Multiplatform & Compose Multiplatform - Starter kit for pragmatics
 
APIForce Zurich 5 April Automation LPDG
APIForce Zurich 5 April  Automation LPDGAPIForce Zurich 5 April  Automation LPDG
APIForce Zurich 5 April Automation LPDG
 
Making_way_through_DLL_hollowing_inspite_of_CFG_by_Debjeet Banerjee.pptx
Making_way_through_DLL_hollowing_inspite_of_CFG_by_Debjeet Banerjee.pptxMaking_way_through_DLL_hollowing_inspite_of_CFG_by_Debjeet Banerjee.pptx
Making_way_through_DLL_hollowing_inspite_of_CFG_by_Debjeet Banerjee.pptx
 
Are Multi-Cloud and Serverless Good or Bad?
Are Multi-Cloud and Serverless Good or Bad?Are Multi-Cloud and Serverless Good or Bad?
Are Multi-Cloud and Serverless Good or Bad?
 
Integration and Automation in Practice: CI/CD in Mule Integration and Automat...
Integration and Automation in Practice: CI/CD in Mule Integration and Automat...Integration and Automation in Practice: CI/CD in Mule Integration and Automat...
Integration and Automation in Practice: CI/CD in Mule Integration and Automat...
 
E-Vehicle_Hacking_by_Parul Sharma_null_owasp.pptx
E-Vehicle_Hacking_by_Parul Sharma_null_owasp.pptxE-Vehicle_Hacking_by_Parul Sharma_null_owasp.pptx
E-Vehicle_Hacking_by_Parul Sharma_null_owasp.pptx
 
Bun (KitWorks Team Study 노별마루 발표 2024.4.22)
Bun (KitWorks Team Study 노별마루 발표 2024.4.22)Bun (KitWorks Team Study 노별마루 발표 2024.4.22)
Bun (KitWorks Team Study 노별마루 발표 2024.4.22)
 
Human Factors of XR: Using Human Factors to Design XR Systems
Human Factors of XR: Using Human Factors to Design XR SystemsHuman Factors of XR: Using Human Factors to Design XR Systems
Human Factors of XR: Using Human Factors to Design XR Systems
 
Vulnerability_Management_GRC_by Sohang Sengupta.pptx
Vulnerability_Management_GRC_by Sohang Sengupta.pptxVulnerability_Management_GRC_by Sohang Sengupta.pptx
Vulnerability_Management_GRC_by Sohang Sengupta.pptx
 
Understanding the Laravel MVC Architecture
Understanding the Laravel MVC ArchitectureUnderstanding the Laravel MVC Architecture
Understanding the Laravel MVC Architecture
 
DMCC Future of Trade Web3 - Special Edition
DMCC Future of Trade Web3 - Special EditionDMCC Future of Trade Web3 - Special Edition
DMCC Future of Trade Web3 - Special Edition
 
"LLMs for Python Engineers: Advanced Data Analysis and Semantic Kernel",Oleks...
"LLMs for Python Engineers: Advanced Data Analysis and Semantic Kernel",Oleks..."LLMs for Python Engineers: Advanced Data Analysis and Semantic Kernel",Oleks...
"LLMs for Python Engineers: Advanced Data Analysis and Semantic Kernel",Oleks...
 
Swan(sea) Song – personal research during my six years at Swansea ... and bey...
Swan(sea) Song – personal research during my six years at Swansea ... and bey...Swan(sea) Song – personal research during my six years at Swansea ... and bey...
Swan(sea) Song – personal research during my six years at Swansea ... and bey...
 
Benefits Of Flutter Compared To Other Frameworks
Benefits Of Flutter Compared To Other FrameworksBenefits Of Flutter Compared To Other Frameworks
Benefits Of Flutter Compared To Other Frameworks
 
costume and set research powerpoint presentation
costume and set research powerpoint presentationcostume and set research powerpoint presentation
costume and set research powerpoint presentation
 
"Federated learning: out of reach no matter how close",Oleksandr Lapshyn
"Federated learning: out of reach no matter how close",Oleksandr Lapshyn"Federated learning: out of reach no matter how close",Oleksandr Lapshyn
"Federated learning: out of reach no matter how close",Oleksandr Lapshyn
 
The transition to renewables in India.pdf
The transition to renewables in India.pdfThe transition to renewables in India.pdf
The transition to renewables in India.pdf
 

2.1 Web Vulnerabilities.pptx

  • 3. WEB VULNERABILITIES : BASIC  Web application vulnerabilities involve a system flaw or weakness in a web-based application  Due to not validating or sanitizing form inputs, misconfigured web servers, and application design flaws  They can be exploited to compromise the application's security  These vulnerabilities are not the same as other common types of vulnerabilities, such as network or asset.  They arise because web applications need to interact with multiple users across multiple networks
  • 4. WEB VULNERABILITIES : BASIC Why Web Security Matters: Data Breaches Impact: Severe consequences of data breaches, including financial losses, reputational damage, and legal repercussions. User Trust: Users trust organizations to safeguard their information, and a breach can erode this trust, affecting customer loyalty and brand reputation. Regulatory Compliance: Growing importance of compliance with data protection regulations and failure to comply can result in significant penalties.
  • 5. OWSP • OWASP : is a nonprofit foundation that works to improve the security of software. OWASP is an open platform that security professionals from around the world use to share information, tools, and events that are focused on securing the web • Top 10 : One of OWASP’s most valuable resources is the OWASP Top 10. • The organization has published this list since 2003 as a way to spread awareness of the web’s most targeted vulnerabilities. • The Top 10 mainly applies to new or custom made software. • Importance : Many of the world's largest organizations reference the OWASP Top 10 during application development to help ensure their programs address common security mistakes. • Community-Driven: Highlight that the OWASP Top 10 is a result of collective expertise and contributions from security professionals globally, making it a comprehensive and reliable resource.
  • 7. BROKEN ACCESS CONTROL Definition : class of vulnerabilities where attackers exploit weaknesses in the mechanisms responsible for user authentication and session management. Common Weaknesses: Common issues such as weak password policies, session fixation, and insufficiently protected authentication credentials. Risks of Broken Authentication: Unauthorized Access: Emphasize that successful attacks can lead to unauthorized access to user accounts, administrative interfaces, or sensitive information. Data Exposure: Potential for exposure of sensitive data if authentication credentials or session tokens are compromised.
  • 9. BROKEN ACCESS CONTROL Common Attack Scenarios: Credential Stuffing: Explain how attackers use username and password combinations obtained from previous data breaches to gain unauthorized access to other accounts where users reuse credentials. Session Hijacking: Discuss the risk of attackers intercepting or stealing session tokens to impersonate legitimate users. Mitigation Strategies: Multi-Factor Authentication (MFA): Highlight the importance of implementing MFA to add an extra layer of security beyond passwords. Secure Session Management: Emphasize the need for secure session management practices, including the use of secure cookies, session timeouts, and token rotation. Password Policies: Advocate for strong password policies, regular password updates, and the use of password hashing to protect stored credentials.
  • 10. BROKEN ACCESS CONTROL Yahoo (2013-2014): Incident: Yahoo experienced two major data breaches affecting over one billion user accounts. Cause: The breaches were attributed to stolen session cookies and weak encryption methods. Impact: The compromised information included names, email addresses, telephone numbers, and hashed passwords. The incidents had a profound impact on Yahoo's reputation, leading to a decrease in its acquisition value by Verizon.
  • 11. CRYPTOGRAPHIC FAILURES/SENSATIVE DATA EXPOSURE Overview: Sensitive Data Exposure occurs when an application fails to adequately protect sensitive information, such as credit card numbers, passwords, or personal details, putting user privacy and security at risk. Nature of Data: Clarify that sensitive data can include personally identifiable information (PII), financial details, and any information that, if exposed, could lead to identity theft or financial loss. Common Scenarios and Causes: Insecure Transmission: Data transmitted over unencrypted channels can be intercepted by attackers during transit, emphasizing the importance of using secure protocols like HTTPS. Weak Data Storage: Risk of storing sensitive data in an insecure manner, such as plain text or using weak encryption algorithms, making it susceptible to unauthorized access.
  • 12. CRYPTOGRAPHIC FAILURES/SENSATIVE DATA EXPOSURE Consequences of Sensitive Data Exposure: Identity Theft: Potential for attackers to use exposed personal information for identity theft and fraudulent activities. Financial Loss: Financial risks associated with the exposure of credit card information or banking details. Prevention and Mitigation: Data Encryption: Importance of encrypting sensitive data both in transit (using protocols like TLS) and at rest (using strong encryption algorithms). Secure Key Management: Significance of secure key management practices to protect encryption keys and prevent unauthorized access. Data Masking: Concept of data masking, where sensitive information is partially or fully obscured to limit exposure, especially in non-production environments.
  • 13. INJECTIONS Definition: Injection vulnerabilities as a type of security risk where untrusted data is introduced into a program or query, leading to unintended consequences. Common Types: Common injection types such as SQL injection, NoSQL injection, OS command injection, etc. Examples of Injection Vulnerabilities: •SQL Injection Example •OS Command Injection Example
  • 14. INJECTIONS SQL Injection Example: Scenario: Consider a simple web application with a login page where users enter their credentials. Vulnerable Code (Before Mitigation): // SQL query construction in the backend const query = "SELECT * FROM users WHERE username='" + enteredUsername + "' AND password='" + enteredPassword + "'";
  • 15. SQL INJECTIONS Exploitation: 1. Normal Login Attempt: •User enters valid credentials like username: user123 and password: pass123. •The SQL query becomes: SELECT * FROM users WHERE username='user123' AND password='pass123'. 2. SQL Injection Attempt: •Malicious user enters: username: ' OR '1'='1' -- and any password. •The manipulated query becomes: SELECT * FROM users WHERE username='' OR '1'='1' --' AND password='anyPassword'. •The double hyphen (--) signifies a comment in SQL, effectively ignoring the rest of the original query. 3.Outcome: •The query always evaluates to true (1=1), allowing the attacker to bypass authentication and potentially gain unauthorized access.
  • 16. SQL INJECTIONS Mitigation: // Using parameterized queries to prevent SQL injection const query "SELECT * FROM users WHERE username=? AND password=?"; Parameterized queries ensure that user input is treated as data, not executable code.
  • 17. SECURITY MISCONFIGURATION Overview: Security misconfigurations occur when an application, server, database, or any component of a system is not securely configured. This provides potential attackers with unnecessary access or information, making it easier for them to exploit vulnerabilities. Common Misconfigurations: Default Settings: Leaving default configurations unchanged, which may include default passwords or settings that are not suitable for a production environment. Unnecessary Services: Running unnecessary services or features that increase the attack surface without providing any benefit. Excessive Permissions: Granting excessive permissions to users, applications, or services.
  • 19. SECURITY MISCONFIGURATION Prevention and Mitigation: Regular Audits and Reviews: Stress the importance of regular security audits and reviews to identify and correct misconfigurations. Least Privilege Principle: Emphasize the principle of least privilege, where users and systems should only have the minimum level of access required to perform their tasks. Automation of Security Configurations: Advocate for the use of automation tools to enforce and monitor security configurations consistently.
  • 20. IDENTIFICATION AND AUTHENTICATION FLAWS Identification and Authentication Relevance: IDOR vulnerabilities can be linked to authentication flaws. Weak or insufficient access controls can allow attackers to manipulate object references and access unauthorized data. Mitigation: Implement proper access controls to ensure that authenticated users can only access their own data. Validate and authorize user actions on the server side.
  • 21. VULNERABLE AND OUTDATE COMPONENTS Vulnerability occurs when a web application uses third-party libraries, frameworks, or components that have known security vulnerabilities. Attackers can exploit these vulnerabilities to compromise the application. Common Causes: Outdated Libraries: Using outdated versions of libraries or components that have known security patches or updates. Lack of Monitoring: Not actively monitoring and updating third-party components after they are initially integrated into the application.
  • 22. VULNERABLE AND OUTDATE COMPONENTS Risks and Consequences: Exploitation of Weaknesses: Attackers actively search for and exploit known vulnerabilities in widely used components. Data Breaches: Potential for data breaches and unauthorized access resulting from exploiting vulnerabilities in third-party components. Prevention and Mitigation: Regular Updates: Importance of regularly updating all third-party libraries and components to their latest secure versions. Automated Dependency Scanning: Use of automated tools for dependency scanning that can identify and alert developers about outdated or vulnerable components. Monitoring Security Bulletins: Staying informed about security bulletins and updates related to third-party components.
  • 23. SOFTWARE AND DATA INTEGRITY FAILURE Software and data integrity failures are vulnerabilities in software or infrastructure that allow an attacker to modify or delete data in an unauthorized manner. Attackers can exploit these vulnerabilities to gain access to sensitive information or cause damage to the system. Some examples of software and data integrity failures include: Insufficient Verification of Data Authenticity: This occurs when the software does not properly verify the data source before it is processed. This can allow an attacker to inject malicious data into the system. Missing Support for Integrity Checks: This occurs when the software cannot verify data integrity. This can make it easier for an attacker to modify or delete data without being detected. Untrusted Search Path: This occurs when the software allows an attacker to control the search path for libraries or modules. This can allow an attacker to inject malicious code into the system.
  • 24. SOFTWARE AND DATA INTEGRITY FAILURE Real-Life Example of Software and Integrity Failures: WannaCry In 2017, a ransomware attack called WannaCry infected over 230,000 computers in over 150 countries. The attack used a vulnerability in the Windows operating system to spread. Once infected, the ransomware encrypted the victim's files and demanded a ransom payment to decrypt them. Mitigation : The key to preventing software and integrity failures is to monitor third-party software and ensure the implementation of all security updates and patches promptly to ensure the software's and data's reliability throughout the software development life cycle. Compile a Software Bill of Materials (SBOM); this allows for a better understanding of the application's structure and makes it easier to identify which components need updating. Regularly monitor for updates and security patches for all components and apply these updates swiftly to help minimize potential risks associated with vulnerabilities. Replace components that are no longer supported or have known security vulnerabilities to ensure that the application only uses up-to-date and secure components.
  • 25. SECURITY LOGGING AND MONITORING FLAWS Security logging and monitoring failures are security vulnerabilities that can occur when a system or application fails to log or monitor security events properly. This can allow attackers to gain unauthorized access to systems and data without detection. Some of the most common security logging and monitoring failures include: Not Logging Important Security Events: This can include failed login attempts, unauthorized access to sensitive data, or changes to system configurations. Not Monitoring Logs for Suspicious Activity: This can include repeated failed login attempts, unusual traffic patterns, or changes to system configurations. Not Storing Logs for Long Enough: This can make it challenging to investigate security incidents that occurred in the past. Not Having a Process for Reviewing and Responding to Security Logs: This can allow security incidents to go undetected and unaddressed. Insecure Logging and Monitoring Systems: This can allow attackers to access or modify logs, making tracking their activities difficult.
  • 26. SECURITY LOGGING AND MONITORING FLAWS Mitigation : The key to protecting against security logging and monitoring failures is to log all critical security events and monitor them for suspicious activity. Let’s dive into what that means: Ensure comprehensive logs are generated Securely store and protect log files to ensure their integrity and confidentiality Implement a process to regularly review and analyze logs with both automated tools and manual inspection Set up real-time monitoring and alerting systems to detect and respond to security events Create a comprehensive incident response plan that clearly outlines roles, responsibilities, and procedures
  • 27. SERVER-SIDE REQUEST FORGERY (SSRF) A Server-Side Request Forgery (SSRF) attack involves an attacker abusing server functionality to access or modify resources. The attacker targets an application that supports data imports from URLs or allows them to read data from URLs. URLs can be manipulated, either by replacing them with new ones or by tampering with URL path traversal. Mitigation : Whitelist IPs to be allowed access to server URL Disable unused URLs