Successfully reported this slideshow.

ekoparty 2010 - Web Application Security Payloads


Published on

Last week, the most important security conference of latin america was held in Buenos Aires where security specialists from all over the world had the chance to get involved with state-of-art techniques, vulnerabilities and tools in a relaxed environment. The sixth edition of ekoparty brought together over 750 security specialists from around the world in the most deep-knowledge technical conference of the region.

Among the lectures, Bonsai Information Security presented “Web Application Security Payloads”. This research led by Andres Riancho and Lucas Apa, exploits a new concept in a theorical and practical environment. Part of this research explores how to distinguish the system calls involved in a web application vulnerability and then leverage it’s power to get sensitive information in an automated way.
The “Web Application Security Payloads” implementation was developed as a part of the w3af framework, an Open Source Web application attack and audit framework developed by contributors around the world since 2007 and directed by Andrés Riancho.

Between some other long waited talks, Juliano Rizzo & Thai Duong presented “Padding Oracles Everywhere” where they easely exposed a 0day advanced technique to decrypt and tamper ASP.NET sensitive data.

Published in: Technology
  • Be the first to comment

  • Be the first to like this

ekoparty 2010 - Web Application Security Payloads

  1. 1. Web ApplicationSecurity Payloads<br />Andrés Riancho – Lucas Apa<br />Ekoparty 2010<br /><br />
  2. 2.$ whoami<br />Consultant@ BonsaiInformation Security<br />PenetrationTesting y VulnerabilityResearch<br />Web Application Security enthusiast<br />
  3. 3.$ whoami<br />Founder@ BonsaiInformation Security<br />Director of Web Security @ Rapid7<br />Programmer(python!)<br />Open SourceEvangelist<br />Deepknowledge in networking, design and IPS evasion.<br />Project leader: open sourcew3af<br />
  4. 4. w3af<br />w3af is a Web ApplicationAttack and AuditFramework<br />Open Sourcetool(GPLv2.0) todetect and exploitWeb vulnerabilities.<br />Pluginbasedarchitecture, easely extensible.<br />Developmentstarted late 2006 on my spare time, and growingtillpresent, moment in whichwehavemultiplecontributors round theglobe and a full time developeronour office.<br />
  5. 5.
  6. 6. Actual Situation<br />ExploitationframeworkslikeMetasploitprovidesmainly “payloads” to use speciallyonthebest case, in otherwords, whenthereiscontrol ontheexecutionflow. (“exploitforbuffer overflow”).<br />Web applicationsallowsus, dependingonthevulnerability, tointeractwiththesystem in a particular way:<br />Local fileread<br />Filewrite<br />SQL Commandsexecution<br />OS Commandsexecution<br />Tillnow, Whichsteps of post-exploitation can wemake in anautomatizedway in anenvironmentwherewecan´texecute OS systemcommands?<br />
  7. 7. Actual Situation<br />Additionally, Web vulnerabilities are mutating every time faster making their post exploitation leading to have no starting or final objective defined.<br />Manydifferentautomatizedtools are focusing in the particular, in exploiting a vulnerabilityemphasizingonthehow. <br />Notdefinedwhichinformationisgoingtobecompromised. Thevulnerabilities expires orchanges.<br />
  8. 8. Web Application Security Payloads<br />
  9. 9. Small pieces of coderunning in w3af afterexploitingoneor more knownvulnerabilities. <br />Everypayloadisindependent of thediscoveredvulnerabilities. Bythemeanstheexploitexports “SystemCalls”, that are thenusedbypayloads:<br />Design<br />
  10. 10. Design<br />Payloads are in general 100 lines of codethat uses somesystemcalls, likeforexample“running_vm”:<br />
  11. 11. ~53Payloadsdeveloped<br />
  12. 12. Demo #1:“users”<br />
  13. 13. Sinergy between payloads<br />
  14. 14. Demo #2:Sinergy between payloads: “users_config_files”<br />
  15. 15. Demo #3:Integration with w3af:“get_source_code”<br />
  16. 16. Conclusions and pendingwork<br />Conceptualizethis idea as anstandar in automatizedpost-explotación over Web Applications.<br />Develop more payloadsforWindows environments. <br />Research about syscall hooking and remote syscall delivery by Web Applications Payloads.<br />SyscallHierachyPriority: whenexists more thanonesyscall, whichonewe use tocommunicatewiththeremotesystem? Faster? More privileged?<br />Contributewiththe global communitydiscovering new attacktechniquesthroughminimalistic post-exploitationapproaches, expandingtheinformationtheygather.<br />
  17. 17. ¿Doubts?¿Questions?<br />
  18. 18. Thankyou!<br />