SlideShare a Scribd company logo
1 of 18
Web ApplicationSecurity Payloads Andrés Riancho – Lucas Apa Ekoparty 2010 http://www.bonsai-sec.com/
lucas@bonsai-sec.com$ whoami Consultant@ BonsaiInformation Security PenetrationTesting y VulnerabilityResearch Web Application Security enthusiast
andres@bonsai-sec.com$ whoami Founder@ BonsaiInformation Security Director of Web Security @ Rapid7 Programmer(python!) Open SourceEvangelist Deepknowledge in networking, design and IPS evasion. Project leader: open sourcew3af
w3af w3af is a Web ApplicationAttack and AuditFramework Open Sourcetool(GPLv2.0) todetect and exploitWeb vulnerabilities. Pluginbasedarchitecture, easely extensible. Developmentstarted late 2006 on my spare time, and growingtillpresent, moment in whichwehavemultiplecontributors round theglobe and a full time developeronour office.
Actual Situation ExploitationframeworkslikeMetasploitprovidesmainly “payloads” to use speciallyonthebest case, in otherwords, whenthereiscontrol ontheexecutionflow. (“exploitforbuffer overflow”). Web applicationsallowsus, dependingonthevulnerability, tointeractwiththesystem in a particular way: Local fileread Filewrite SQL Commandsexecution OS Commandsexecution Tillnow, Whichsteps of post-exploitation can wemake in anautomatizedway in anenvironmentwherewecan´texecute OS systemcommands?
Actual Situation Additionally, Web vulnerabilities are mutating every time faster making their post exploitation leading to have no starting or final objective defined. Manydifferentautomatizedtools are focusing in the particular, in exploiting a vulnerabilityemphasizingonthehow.  Notdefinedwhichinformationisgoingtobecompromised. Thevulnerabilities expires orchanges.
Web Application Security Payloads
Small pieces of coderunning in w3af afterexploitingoneor more knownvulnerabilities.  Everypayloadisindependent of thediscoveredvulnerabilities. Bythemeanstheexploitexports “SystemCalls”, that are thenusedbypayloads: Design
Design Payloads are in general 100 lines of codethat uses somesystemcalls, likeforexample“running_vm”:
~53Payloadsdeveloped
Demo #1:“users”
Sinergy between payloads
Demo #2:Sinergy between payloads: “users_config_files”
Demo #3:Integration with w3af:“get_source_code”
Conclusions and pendingwork Conceptualizethis idea as anstandar in automatizedpost-explotación over Web Applications. Develop more payloadsforWindows environments.  Research about syscall hooking and remote syscall delivery by Web Applications Payloads. SyscallHierachyPriority: whenexists more thanonesyscall, whichonewe use tocommunicatewiththeremotesystem? Faster? More privileged? Contributewiththe global communitydiscovering new attacktechniquesthroughminimalistic post-exploitationapproaches, expandingtheinformationtheygather.
¿Doubts?¿Questions?
Thankyou!

More Related Content

Viewers also liked

Rhealth Indigenous Health Workshop
Rhealth Indigenous Health WorkshopRhealth Indigenous Health Workshop
Rhealth Indigenous Health WorkshopTwoCents Group
 
エコーワークス【a-blogcms in KANAZAWA】
エコーワークス【a-blogcms in KANAZAWA】エコーワークス【a-blogcms in KANAZAWA】
エコーワークス【a-blogcms in KANAZAWA】Akira Nozaki
 
Facebook for Business - BoQ
Facebook for Business - BoQFacebook for Business - BoQ
Facebook for Business - BoQTwoCents Group
 
I miss my best friends !
I miss my best friends !I miss my best friends !
I miss my best friends !miistyxoxo
 
Gems para colocar seus testes no trilho
Gems para colocar seus testes no trilho Gems para colocar seus testes no trilho
Gems para colocar seus testes no trilho Webgoal
 
Facebook Pages, Places & Deals: An Overview
Facebook Pages, Places & Deals: An OverviewFacebook Pages, Places & Deals: An Overview
Facebook Pages, Places & Deals: An OverviewTwoCents Group
 

Viewers also liked (7)

Rhealth Indigenous Health Workshop
Rhealth Indigenous Health WorkshopRhealth Indigenous Health Workshop
Rhealth Indigenous Health Workshop
 
エコーワークス【a-blogcms in KANAZAWA】
エコーワークス【a-blogcms in KANAZAWA】エコーワークス【a-blogcms in KANAZAWA】
エコーワークス【a-blogcms in KANAZAWA】
 
Flett Consulting
Flett ConsultingFlett Consulting
Flett Consulting
 
Facebook for Business - BoQ
Facebook for Business - BoQFacebook for Business - BoQ
Facebook for Business - BoQ
 
I miss my best friends !
I miss my best friends !I miss my best friends !
I miss my best friends !
 
Gems para colocar seus testes no trilho
Gems para colocar seus testes no trilho Gems para colocar seus testes no trilho
Gems para colocar seus testes no trilho
 
Facebook Pages, Places & Deals: An Overview
Facebook Pages, Places & Deals: An OverviewFacebook Pages, Places & Deals: An Overview
Facebook Pages, Places & Deals: An Overview
 

Recently uploaded

Factors to Consider When Choosing Accounts Payable Services Providers.pptx
Factors to Consider When Choosing Accounts Payable Services Providers.pptxFactors to Consider When Choosing Accounts Payable Services Providers.pptx
Factors to Consider When Choosing Accounts Payable Services Providers.pptxKatpro Technologies
 
🐬 The future of MySQL is Postgres 🐘
🐬  The future of MySQL is Postgres   🐘🐬  The future of MySQL is Postgres   🐘
🐬 The future of MySQL is Postgres 🐘RTylerCroy
 
[2024]Digital Global Overview Report 2024 Meltwater.pdf
[2024]Digital Global Overview Report 2024 Meltwater.pdf[2024]Digital Global Overview Report 2024 Meltwater.pdf
[2024]Digital Global Overview Report 2024 Meltwater.pdfhans926745
 
Presentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreterPresentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreternaman860154
 
IAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI SolutionsIAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI SolutionsEnterprise Knowledge
 
CNv6 Instructor Chapter 6 Quality of Service
CNv6 Instructor Chapter 6 Quality of ServiceCNv6 Instructor Chapter 6 Quality of Service
CNv6 Instructor Chapter 6 Quality of Servicegiselly40
 
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...Miguel Araújo
 
Automating Google Workspace (GWS) & more with Apps Script
Automating Google Workspace (GWS) & more with Apps ScriptAutomating Google Workspace (GWS) & more with Apps Script
Automating Google Workspace (GWS) & more with Apps Scriptwesley chun
 
How to convert PDF to text with Nanonets
How to convert PDF to text with NanonetsHow to convert PDF to text with Nanonets
How to convert PDF to text with Nanonetsnaman860154
 
A Call to Action for Generative AI in 2024
A Call to Action for Generative AI in 2024A Call to Action for Generative AI in 2024
A Call to Action for Generative AI in 2024Results
 
Boost PC performance: How more available memory can improve productivity
Boost PC performance: How more available memory can improve productivityBoost PC performance: How more available memory can improve productivity
Boost PC performance: How more available memory can improve productivityPrincipled Technologies
 
TrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
TrustArc Webinar - Stay Ahead of US State Data Privacy Law DevelopmentsTrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
TrustArc Webinar - Stay Ahead of US State Data Privacy Law DevelopmentsTrustArc
 
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
04-2024-HHUG-Sales-and-Marketing-Alignment.pptxHampshireHUG
 
Data Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt RobisonData Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt RobisonAnna Loughnan Colquhoun
 
Handwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed textsHandwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed textsMaria Levchenko
 
2024: Domino Containers - The Next Step. News from the Domino Container commu...
2024: Domino Containers - The Next Step. News from the Domino Container commu...2024: Domino Containers - The Next Step. News from the Domino Container commu...
2024: Domino Containers - The Next Step. News from the Domino Container commu...Martijn de Jong
 
What Are The Drone Anti-jamming Systems Technology?
What Are The Drone Anti-jamming Systems Technology?What Are The Drone Anti-jamming Systems Technology?
What Are The Drone Anti-jamming Systems Technology?Antenna Manufacturer Coco
 
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdfThe Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdfEnterprise Knowledge
 
From Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time AutomationFrom Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time AutomationSafe Software
 
Histor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slideHistor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slidevu2urc
 

Recently uploaded (20)

Factors to Consider When Choosing Accounts Payable Services Providers.pptx
Factors to Consider When Choosing Accounts Payable Services Providers.pptxFactors to Consider When Choosing Accounts Payable Services Providers.pptx
Factors to Consider When Choosing Accounts Payable Services Providers.pptx
 
🐬 The future of MySQL is Postgres 🐘
🐬  The future of MySQL is Postgres   🐘🐬  The future of MySQL is Postgres   🐘
🐬 The future of MySQL is Postgres 🐘
 
[2024]Digital Global Overview Report 2024 Meltwater.pdf
[2024]Digital Global Overview Report 2024 Meltwater.pdf[2024]Digital Global Overview Report 2024 Meltwater.pdf
[2024]Digital Global Overview Report 2024 Meltwater.pdf
 
Presentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreterPresentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreter
 
IAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI SolutionsIAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI Solutions
 
CNv6 Instructor Chapter 6 Quality of Service
CNv6 Instructor Chapter 6 Quality of ServiceCNv6 Instructor Chapter 6 Quality of Service
CNv6 Instructor Chapter 6 Quality of Service
 
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
 
Automating Google Workspace (GWS) & more with Apps Script
Automating Google Workspace (GWS) & more with Apps ScriptAutomating Google Workspace (GWS) & more with Apps Script
Automating Google Workspace (GWS) & more with Apps Script
 
How to convert PDF to text with Nanonets
How to convert PDF to text with NanonetsHow to convert PDF to text with Nanonets
How to convert PDF to text with Nanonets
 
A Call to Action for Generative AI in 2024
A Call to Action for Generative AI in 2024A Call to Action for Generative AI in 2024
A Call to Action for Generative AI in 2024
 
Boost PC performance: How more available memory can improve productivity
Boost PC performance: How more available memory can improve productivityBoost PC performance: How more available memory can improve productivity
Boost PC performance: How more available memory can improve productivity
 
TrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
TrustArc Webinar - Stay Ahead of US State Data Privacy Law DevelopmentsTrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
TrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
 
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
 
Data Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt RobisonData Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt Robison
 
Handwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed textsHandwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed texts
 
2024: Domino Containers - The Next Step. News from the Domino Container commu...
2024: Domino Containers - The Next Step. News from the Domino Container commu...2024: Domino Containers - The Next Step. News from the Domino Container commu...
2024: Domino Containers - The Next Step. News from the Domino Container commu...
 
What Are The Drone Anti-jamming Systems Technology?
What Are The Drone Anti-jamming Systems Technology?What Are The Drone Anti-jamming Systems Technology?
What Are The Drone Anti-jamming Systems Technology?
 
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdfThe Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
 
From Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time AutomationFrom Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time Automation
 
Histor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slideHistor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slide
 

ekoparty 2010 - Web Application Security Payloads

  • 1. Web ApplicationSecurity Payloads Andrés Riancho – Lucas Apa Ekoparty 2010 http://www.bonsai-sec.com/
  • 2. lucas@bonsai-sec.com$ whoami Consultant@ BonsaiInformation Security PenetrationTesting y VulnerabilityResearch Web Application Security enthusiast
  • 3. andres@bonsai-sec.com$ whoami Founder@ BonsaiInformation Security Director of Web Security @ Rapid7 Programmer(python!) Open SourceEvangelist Deepknowledge in networking, design and IPS evasion. Project leader: open sourcew3af
  • 4. w3af w3af is a Web ApplicationAttack and AuditFramework Open Sourcetool(GPLv2.0) todetect and exploitWeb vulnerabilities. Pluginbasedarchitecture, easely extensible. Developmentstarted late 2006 on my spare time, and growingtillpresent, moment in whichwehavemultiplecontributors round theglobe and a full time developeronour office.
  • 5.
  • 6. Actual Situation ExploitationframeworkslikeMetasploitprovidesmainly “payloads” to use speciallyonthebest case, in otherwords, whenthereiscontrol ontheexecutionflow. (“exploitforbuffer overflow”). Web applicationsallowsus, dependingonthevulnerability, tointeractwiththesystem in a particular way: Local fileread Filewrite SQL Commandsexecution OS Commandsexecution Tillnow, Whichsteps of post-exploitation can wemake in anautomatizedway in anenvironmentwherewecan´texecute OS systemcommands?
  • 7. Actual Situation Additionally, Web vulnerabilities are mutating every time faster making their post exploitation leading to have no starting or final objective defined. Manydifferentautomatizedtools are focusing in the particular, in exploiting a vulnerabilityemphasizingonthehow. Notdefinedwhichinformationisgoingtobecompromised. Thevulnerabilities expires orchanges.
  • 9. Small pieces of coderunning in w3af afterexploitingoneor more knownvulnerabilities. Everypayloadisindependent of thediscoveredvulnerabilities. Bythemeanstheexploitexports “SystemCalls”, that are thenusedbypayloads: Design
  • 10. Design Payloads are in general 100 lines of codethat uses somesystemcalls, likeforexample“running_vm”:
  • 14. Demo #2:Sinergy between payloads: “users_config_files”
  • 15. Demo #3:Integration with w3af:“get_source_code”
  • 16. Conclusions and pendingwork Conceptualizethis idea as anstandar in automatizedpost-explotación over Web Applications. Develop more payloadsforWindows environments. Research about syscall hooking and remote syscall delivery by Web Applications Payloads. SyscallHierachyPriority: whenexists more thanonesyscall, whichonewe use tocommunicatewiththeremotesystem? Faster? More privileged? Contributewiththe global communitydiscovering new attacktechniquesthroughminimalistic post-exploitationapproaches, expandingtheinformationtheygather.