OWASP and Friends
(DDoS included)
Mažvydas Skuodas @ Helis LT
Top Attack Methods
Top Application Weaknesses
Top Impacts/Outcomes
Application Security Verification Levels
Level 1: Opportunistic
An application achieves Level 1 (or Opportunistic)
certification if it adequately defends against
application security vulnerabilities that are easy to
discover.
OWASP Top 10
OWASP Top 10 2013
https://github.com/OWASP/Top10/tree/master/2017
OWASP Top 10 2017 - Whats new?
InjectionA1
InjectionA1
Broken Authentication and Session
ManagementA2
Broken Authentication and Session
ManagementA2
Cross-Site Scripting (XSS)A3
Cross-Site Scripting (XSS)A3
Broken Access ControlA4
Broken Access ControlA4
Security MisconfigurationA5
Security MisconfigurationA5
Sensitive Data ExposureA6
Sensitive Data ExposureA6
Insufficient Attack ProtectionA7
Insufficient Attack ProtectionA7
Cross-Site Request Forgery

(CSRF)A8
Cross-Site Request Forgery

(CSRF)A8
Using Components with Known
VulnerabilitiesA9
Using Components with Known
VulnerabilitiesA9
Underprotected APIsA10
Underprotected APIsA10
Application Denial of Service
• Once an attacker can consume all of some
required resource, they can prevent legitimate
users from using the system.
• Some resources that are limited include
bandwidth, database connections, disk storage,
CPU, memory, threads, or application specific
resources. All of these resources can be
consumed by attacks that target them.
Application Denial of Service
• Defending against denial of service attacks is
difficult, as there is no way to protect against
these attacks perfectly.
• As a general rule, you should limit the resources
allocated to any user to a bare minimum.
In Short:
• Filter input
• Escape output
• Be paranoid!
Owasp and friends

Owasp and friends