- Action against cyber crime
Presented by:-
Nilesh Sapariya
Security Researcher | CEH v8 | Blogger
This talk is NOT about #Hacking
This talk is about
How to kick start your career in to Information Security
How to protect organizations from cyber criminals
Understanding Difference between:-
Ever green - OWASP Top 10 Attack Methodology
Before We Start :- Disclaimer
 My posts have nothing to do with my company of organization I’m working. Its
strictly educational purpose only.
 All the knowledge provided on this slides area unit for academic functions solely.
The positioning is not any approach to blame for any misuse of the knowledge.
 This slides is completely meant for providing data on “Computer Security”,
“Computer Programming” and different connected topics and is not any
approach connected towards the terms “CRACKING” or “HACKING” (Unethical).
 The word “Hack” or “Hacking” that's used on this slides shall be considered
“Ethical Hack” or “Ethical Hacking” severally.
 We tend to believe solely in White Hat Hacking. On the opposite hand we tend to
condemn Black Hat Hacking.
Who Am I ?
 A researcher in Web Application Security
 A Bug Hunter Enthusiast
 3+ years of Experience in Information Security
 Listed in top sites hall of fame
 Speaker @Null Mumbai Chapter
 Blogging at http://shield4you.blogspot.in/
 A Twitter lover @nilesh_loganx
etc...
HOF + $$$ - Coming soon
Agenda
 The Importance of Cyber Security
 Different domains in Cyber Security
 Black Hat vs. White Hat vs. Grey Hat
 OWASP Top 10 Attack Methodology
 Deep Dive into XSS,CSRF and IDOR
 Practical Session on various attacks
Why Security In Demand ?
#Reason1 : Apple
https://zerodium.com/ios9.html
#Reason2 : Facebook
http://www.tripwire.com/state-of-security/latest-security-
news/facebook-awards-security-researches-100000/#.VcyB2X6GD-
U.twitter
#Reason3: Microsoft
http://blog.hackersonlineclub.com/2015/08/microsoft-
announced-to-increase-bug.html
#Reason4 : Ashley Madison
http://thehackernews.com/2015/08/ashley-madison-
hack_24.html
#Reason5 :
 http://www.computerworld.com/article/2496599/malware-
vulnerabilities/google-pays-record--31k-bounty-for-chrome-bugs.html
Why they pay this much for security ?
 http://thehackernews.com/2015/09/ashley-madison-password-cracked.html
 http://thehackernews.com/2015/09/hacking-satellite.html
 http://thehackernews.com/2015/07/united-airlines-hacked.html
Many more……
Primary Domains in Information Security
1. Web Application Security / Mobile Application security
2. Network Security
3. Digital forensics
4. Secure Code review
5. Compliance :- ISO/COBIT implementation
6. Fuzzing / Exploitation
Must for Info Sec guy:-
https://twitter.com/nilesh_loganx
Follow me + my followers ;)
http://null.co.in/
Subscribe to null mailing list + attend
free trainings
Take Away :-
Black Hat Hackers
White Hat Hackers
Grey Hat Hackers
OWASP Top 10 – Stick to the basic
 https://www.owasp.org/index.php/Top_10_2013-Top_10
Deep dive into different attacks
XSS
CSRF
IDOR
Why XSS, CSRF and IDOR ?
Easy to find
High impact
Account takeover
Misunderstood by many
Why XSS ?
#Reason 1
#Reason 2 : $$$
Highest paid XSS Reward
 http://www.paulosyibelo.com/2014/07/the-unseen-facebook-bug-
bounty-2014-x.html
Why you should care about XSS ?
 So XSS is involved in two recent big HACKS i.e. Apple Developer +
Ubuntu Forums
 Story on :- How I Secured Dating Site- Stored XSS
 http://mytechblog.com/other/apple/apple-developer-website-hacked-what-happened/
 http://blog.canonical.com/2013/07/30/ubuntu-forums-are-back-up-and-a-post-mortem/
A Story Of How I Landed On Dating Site and
Secured it- Stored XSS
 http://shield4you.blogspot.in/2015/08/a-story-of-how-i-landed-on-dating-site.html
What is XSS ?
According to OWASP:-
 Cross-Site Scripting (XSS) attacks are a type of injection, in which
malicious scripts are injected into otherwise benign and trusted web
sites
 https://www.owasp.org/index.php/Cross-site_Scripting_(XSS)
#3rd Position @OWASP
https://twitter.com/brutelogic/status/640141613134692352
 Credit : Brute Logic
Types of XSS
1. Stored XSS (Persistent)
2. Reflected XSS (Non-Persistent)
3. DOM XSS
4. TRACE XSS
5. Self XSS
1. Stored XSS
2. Reflected XSS
3. DOM based XSS
 Basically all HTML documents have an associated DOM, consisting of
objects representing the document properties from the point of view
of the browse
 Whenever a script is executed client-side, the browser provides the
code with the DOM of the HTML page where the script runs, thus,
offering access to various properties of the page and their values,
populated by the browser from its perspective.
 The script code never gets to the server
E.g. Marktplaats- Bug Bounty – DOM based XSS - Fixed
Self XSS – Microsoft – NA
How they fixed it?
Demo:
bWAPP – Windows / VM machine
Burp suite-pro
Download link:-
http://sourceforge.net/projects/bwapp/
Set up:-
Attacker - Windows 8 Victim - Kali Linux
Internet
Consider this as public forum which is vulnerable to XSS
XSS Bug – Video
What is CSRF ?
 Wiki Says :-
http://en.wikipedia.org/wiki/Cross-site_request_forgery
Description
“Cross-site Request Forgery is a vulnerability in a
website that allows attackers to force victims to
perform security-sensitive actions on that site
without their knowledge.”
#8th Position @OWASP
Why CSRF so important ?
Highest paid bounty for CSRF: 10,000$
 http://yasserali.com/hacking-paypal-accounts-with-one-click/
Latest | News
 Pay pal Defaced by CSRF
Latest | News
 Facebook Hacked #CSRF
Link: http://pyx.io/blog/facebook-csrf-leading-to-full-account-takeover
Latest | News Blogger hacked # CSRF
 Blogger hacked # CSRF
Latest | News
 Blackberry CSRF leading to takeover user profile information
 http://shield4you.blogspot.in/2015/08/how-i-hacked-blackberrycom-to-update.html
 https://twitter.com/nilesh_loganx/status/630357485262663681
How this works ?
Anatomy of CSRF Attack
 Step 1: Attacker hosts web pages with pre-populated HTML form data.
 Step 2: Victim browses to attacker’s HTML form.
 Step 3: Page automatically submits pre-populated form data to a site
where victim has access (No verification done by server as browser is
performing request by checking cookies)
 Step 4: Site Authenticates request (with attacker’s form data) as coming
from victim
Result : Attacker’s form data is accepted by server since it was sent from
legitimate user.
For more details about CSRF
Its all about CSRF - null Mumbai Meet 10 January 2015 Null/OWASP
Chapter
http://www.slideshare.net/Nilesh_logan/null-its-all-about-csrf
Cross Site Request Forgery - Anti-CSRF token bypass
http://shield4you.blogspot.in/2015/03/cross-site-request-forger-anti-
csrf.html
CSRF Bug – Video
Practical time 
bWAPP – Windows / VM machine
Burp suite-pro
Download link:-
http://sourceforge.net/projects/bwapp/
IDOR
I Insecure
D Direct
O Object
R Reference
#4th Position @OWASP
Highest paid bounty for IDOR - $20,000
 https://fin1te.net/articles/hijacking-a-facebook-account-with-sms/
Example 1:- As simple as that
 https://hackerone.com/reports/49356
Example 2 :- Delete Credit Cards from any
Twitter Account
 https://hackerone.com/reports/27404
Business Impact :-
 Sensitive information retrieval via parameters
 Deleting another user’s information
 Change delivery address of an order.
 View someone's else profile on behalf of authorised user
 Reclaiming other user’s data
Problem ?
1. No Secure Access model.
2. Numeric IDs.
3. Error message show and tell
4. Inconsistent ID sources
E.g. /abcd/test/123
/abcd/?test=123
Practical time 
bWAPP – Windows / VM machine
Burp suite-pro
Download link:-
http://sourceforge.net/projects/bwapp/
IDOR Bug – Video
Lets have Challenge
Before we start :- Final Takeaway
 https://twitter.com/brutelogic/status/649247337190137857
Hold on !!!
The First reporter will get gift vouchers ;)
Online testing site – Test without going jail
TARGET 1
http://testasp.vulnweb.com (Forum - ASP)
Bug to find
1. Open redirection
2. Reflected XSS
3. Stored XSS
PS:
 This presentation is purely to give idea about one of information
security domain (web application) inside view.
 Its up to you to decide right carrier path according to your choice /
likes / dislikes
Questions ?
Thank you 
Comments | Feedback | Suggestions
 Twitter : https://twitter.com/nilesh_loganx
 Email: nilesh.s.sapariya@gmail.com
 Blog: http://shield4you.blogspot.in/
 LinkedIn: https://www.linkedin.com/pub/nilesh-sapariya/39/33/735
 Slide share: http://www.slideshare.net/Nilesh_logan

Cyber Security Workshop @SPIT- 3rd October 2015