Web Maniac Hacking TrustAditya K Sood [adi_ks [at] secniche.org] SecNiche Security
DisclaimerWeb Maniac - Hacking TrustPentesting web applications in a hacker’s way. Attack surface varies from application to application. How to think below the surface? That’s the aim!All contents of this presentation represent my own beliefs and views and do not, unless explicitly stated otherwise, represent the beliefs of my current, or any of my previous in that effect, employers.Screenshots  have been shared from various resources. This is done to show the comparative model of various methodologies.
About MeFounder , SECNICHE Security Labs.http://www.secniche.org  PhD Candidate at Michigan State University
Worked previously for Armorize as Senior Security Practitioner , COSEINC as Senior     Security Researcher and Security Consultant for KPMGWritten content  Author for HITB E-Zine, Hakin9 ,ELSEVIER, USENIX Journals.
  Like to do Bug Hunting and Malware dissection.
  Released Advisories to Forefront  Companies.
  Active Speaker at Security Conferences including RSA etc.
 Blog: http://secniche.blogspot.com| http://zeroknock.blogspot.com Agenda  Web Application Security Standards
  Web Application Security- A view of Reality
  Web Application – Testing and Development Methodologies
  Facets of Web Application Pen Testing (WAPT)
  Demonstrations – Live Targets  Web Application Security Standards – Really
 Web Application Security Standards - ??  ! Answers ! Standards provide specific classification of vulnerabilities
 Do they comprise of all types of vulnerabilities ?
 Are all types of web attacks  predefined in them?
 Do you think the design of web application matters? [to what extent ]
 A view of web application and a website under testing.
 Do platforms and web servers matter while web application assessment?
 Do you think penetration testing of web applications is beyond these    standards ?
 Web Application State and Risks© OWASP
 Web Application Architecture - Development
 Web Application Testing - Methodologies
 Why Security Testing ?Defacement Statistics© Zone H
 Web Application Security ! Reality - Broken
 Is that Ethical?
 Existence and Reality – Web Penetration Test Is this all about compliance (PCI) ?

Hacker Halted Miami , USA 2010

  • 1.
    Web Maniac HackingTrustAditya K Sood [adi_ks [at] secniche.org] SecNiche Security
  • 2.
    DisclaimerWeb Maniac -Hacking TrustPentesting web applications in a hacker’s way. Attack surface varies from application to application. How to think below the surface? That’s the aim!All contents of this presentation represent my own beliefs and views and do not, unless explicitly stated otherwise, represent the beliefs of my current, or any of my previous in that effect, employers.Screenshots have been shared from various resources. This is done to show the comparative model of various methodologies.
  • 3.
    About MeFounder ,SECNICHE Security Labs.http://www.secniche.org PhD Candidate at Michigan State University
  • 4.
    Worked previously forArmorize as Senior Security Practitioner , COSEINC as Senior Security Researcher and Security Consultant for KPMGWritten content Author for HITB E-Zine, Hakin9 ,ELSEVIER, USENIX Journals.
  • 5.
    Liketo do Bug Hunting and Malware dissection.
  • 6.
    ReleasedAdvisories to Forefront Companies.
  • 7.
    ActiveSpeaker at Security Conferences including RSA etc.
  • 8.
    Blog: http://secniche.blogspot.com|http://zeroknock.blogspot.com Agenda Web Application Security Standards
  • 9.
    WebApplication Security- A view of Reality
  • 10.
    WebApplication – Testing and Development Methodologies
  • 11.
    Facetsof Web Application Pen Testing (WAPT)
  • 12.
    Demonstrations– Live Targets  Web Application Security Standards – Really
  • 13.
     Web ApplicationSecurity Standards - ?? ! Answers ! Standards provide specific classification of vulnerabilities
  • 14.
    Do theycomprise of all types of vulnerabilities ?
  • 15.
    Are alltypes of web attacks predefined in them?
  • 16.
    Do youthink the design of web application matters? [to what extent ]
  • 17.
    A viewof web application and a website under testing.
  • 18.
    Do platformsand web servers matter while web application assessment?
  • 19.
    Do youthink penetration testing of web applications is beyond these standards ?
  • 20.
     Web ApplicationState and Risks© OWASP
  • 21.
     Web ApplicationArchitecture - Development
  • 22.
     Web ApplicationTesting - Methodologies
  • 23.
     Why SecurityTesting ?Defacement Statistics© Zone H
  • 24.
     Web ApplicationSecurity ! Reality - Broken
  • 25.
     Is thatEthical?
  • 26.
     Existence andReality – Web Penetration Test Is this all about compliance (PCI) ?
  • 27.
    Is thisall about reporting generic issues and using reports for cert’s?
  • 28.
    Do youthink organizational teams patch all the reported issues?
  • 29.
    White boxor Black box – Changed definitions.
  • 30.
    Security Assessment! = Penetration Testing [ Mismatch ]
  • 31.
    Time dependency– A big factor in determining the effectiveness
  • 32.
    Penetration Tests– Does not provide security / That’s the Truth
  • 33.
    Applied security comesout of the actions taken to remove those vulnerabilities which are exploited during the course of penetration testing. Vulnerability assessment provides a glimpse of security to some degree
  • 34.
    Penetration tests emulate real world attacks to exploit the network and web infrastructure
  • 35.
    Effective penetration tests provide a degree to which systems can be exploited. It can be more. Pentesting Stringency in Real World
  • 36.
     Is thatTrue ?# Then what about Human Ignorance ? # A critical component in every sphere. Hard to beat it.
  • 37.
     Thinking inthe Wild – Web Penetration Testing.Is it all about shooting what we see ?Do we need to take care of the hidden or shadowed?
  • 38.
     Web PenetrationTest – The Refined Art Turning the Black Box Testing into White box Testing
  • 39.
    Expertise –Hacking in a controlled manner
  • 40.
    Meeting theexpectations The One – Murphy’s Law (Variation) Pen Tester – The Word of Advice “Everything that goes wrong on the target host, network, or on the Internet from two weeks before you plug in to two weeks after you submit the report will be your fault.”
  • 41.
     Demonstration AttackingWeb Apps through Content Rendering – 4: 15 M
  • 42.
    SQLXSSI –XSS through SQL Injections : Yahoo – 5:30 M
  • 43.
    Persistent RedirectionAttacks and Malware - 4:00 M
  • 44.
    Content DeliveryNetworks – Infection Behavior - 4:09 M
  • 45.
    Widget RedirectionAttacks – Outbrain – 3:20 M Demo 1: Document Content Rendering Attacks
  • 46.
     Demo 2: SQLXSSI – Using SQLI to conduct XSS
  • 47.
     Demo 3: Persistent Logout Redirection Attacks
  • 48.
     Demo 4: Third Party Content Delivery Infections
  • 49.
     Demo 5: Widget Redirection Attacks
  • 50.
  • 51.
     ThanksSecNiche Security: http://www.secniche.orgHacker Halted – http://www.hackerhalted.com