Hacker Halted Miami , USA 2010

1,323 views

Published on

Published in: Technology
0 Comments
1 Like
Statistics
Notes
  • Be the first to comment

No Downloads
Views
Total views
1,323
On SlideShare
0
From Embeds
0
Number of Embeds
298
Actions
Shares
0
Downloads
0
Comments
0
Likes
1
Embeds 0
No embeds

No notes for slide

Hacker Halted Miami , USA 2010

  1. 1. Web Maniac <br />Hacking Trust<br />Aditya K Sood [adi_ks [at] secniche.org]<br /> SecNiche Security<br />
  2. 2. Disclaimer<br />Web Maniac - Hacking Trust<br />Pentesting web applications in a hacker’s way. Attack surface varies from application to application. How to think below the surface? That’s the aim!<br />All contents of this presentation represent my own beliefs and views and do not, unless explicitly stated otherwise, represent the beliefs of my current, or any of my previous in that effect, employers.<br />Screenshots have been shared from various resources. This is done to show the comparative model of various methodologies.<br />
  3. 3. About Me<br /><ul><li>Founder , SECNICHE Security Labs.</li></ul>http://www.secniche.org<br /><ul><li> PhD Candidate at Michigan State University
  4. 4. Worked previously for Armorize as Senior Security Practitioner , COSEINC as Senior </li></ul> Security Researcher and Security Consultant for KPMG<br /><ul><li>Written content Author for HITB E-Zine, Hakin9 ,ELSEVIER, USENIX Journals.
  5. 5. Like to do Bug Hunting and Malware dissection.
  6. 6. Released Advisories to Forefront Companies.
  7. 7. Active Speaker at Security Conferences including RSA etc.
  8. 8. Blog: http://secniche.blogspot.com| http://zeroknock.blogspot.com</li></li></ul><li> Agenda<br /><ul><li> Web Application Security Standards
  9. 9. Web Application Security- A view of Reality
  10. 10. Web Application – Testing and Development Methodologies
  11. 11. Facets of Web Application Pen Testing (WAPT)
  12. 12. Demonstrations – Live Targets </li></li></ul><li> Web Application Security Standards – Really<br />
  13. 13.  Web Application Security Standards - ?? ! Answers !<br /><ul><li> Standards provide specific classification of vulnerabilities
  14. 14. Do they comprise of all types of vulnerabilities ?
  15. 15. Are all types of web attacks predefined in them?
  16. 16. Do you think the design of web application matters? [to what extent ]
  17. 17. A view of web application and a website under testing.
  18. 18. Do platforms and web servers matter while web application assessment?
  19. 19. Do you think penetration testing of web applications is beyond these </li></ul> standards ?<br />
  20. 20.  Web Application State and Risks<br />© OWASP<br />
  21. 21.  Web Application Architecture - Development<br />
  22. 22.  Web Application Testing - Methodologies<br />
  23. 23.  Why Security Testing ?<br />Defacement Statistics<br />© Zone H<br />
  24. 24.  Web Application Security ! Reality - Broken<br />
  25. 25.  Is that Ethical?<br />
  26. 26.  Existence and Reality – Web Penetration Test<br /><ul><li> Is this all about compliance (PCI) ?
  27. 27. Is this all about reporting generic issues and using reports for cert’s?
  28. 28. Do you think organizational teams patch all the reported issues?
  29. 29. White box or Black box – Changed definitions.
  30. 30. Security Assessment ! = Penetration Testing [ Mismatch ]
  31. 31. Time dependency – A big factor in determining the effectiveness
  32. 32. Penetration Tests – Does not provide security / That’s the Truth
  33. 33. Applied security comes out of the actions taken to remove those vulnerabilities which are exploited during </li></ul> the course of penetration testing.<br /><ul><li> Vulnerability assessment provides a glimpse of security to some degree
  34. 34. Penetration tests emulate real world attacks to exploit the network and web infrastructure
  35. 35. Effective penetration tests provide a degree to which systems can be exploited. It can be more.</li></li></ul><li> Pentesting Stringency in Real World<br />
  36. 36.  Is that True ?<br /># Then what about Human Ignorance ?<br /> # A critical component in every sphere. Hard to beat it.<br />
  37. 37.  Thinking in the Wild – Web Penetration Testing.<br />Is it all about shooting what we see ?<br />Do we need to take care of the hidden or shadowed?<br />
  38. 38.  Web Penetration Test – The Refined Art<br /><ul><li> Turning the Black Box Testing into White box Testing
  39. 39. Expertise – Hacking in a controlled manner
  40. 40. Meeting the expectations</li></li></ul><li> The One – Murphy’s Law (Variation)<br /><ul><li> Pen Tester – The Word of Advice </li></ul>“Everything that goes wrong on the target host, network, or on the Internet from two weeks before you plug in to two weeks after you submit the report will be your fault.”<br />
  41. 41.  Demonstration<br /><ul><li> Attacking Web Apps through Content Rendering – 4: 15 M
  42. 42. SQLXSSI – XSS through SQL Injections : Yahoo – 5:30 M
  43. 43. Persistent Redirection Attacks and Malware - 4:00 M
  44. 44. Content Delivery Networks – Infection Behavior - 4:09 M
  45. 45. Widget Redirection Attacks – Outbrain – 3:20 M</li></li></ul><li> Demo 1: Document Content Rendering Attacks<br />
  46. 46.  Demo 2 : SQLXSSI – Using SQLI to conduct XSS<br />
  47. 47.  Demo 3 : Persistent Logout Redirection Attacks<br />
  48. 48.  Demo 4 : Third Party Content Delivery Infections<br />
  49. 49.  Demo 5 : Widget Redirection Attacks<br />
  50. 50.  Questions and Queries<br />
  51. 51.  Thanks<br />SecNiche Security : http://www.secniche.org<br />Hacker Halted – http://www.hackerhalted.com<br />

×