SlideShare a Scribd company logo
Ali Hussein
                                      Ali.hussein@owasp.org


                                                           Copyright © The OWASP Foundation
                     Permission is granted to copy, distribute and/or modify this document under the terms of the OWASP License.


owasp.org/index.php/Khartoum
New to the OWASP Top 10.

    Was there in 2004. On OWASP list in 2007.

    System admins, DBAs and developers leave security
    holes in the configuration of computer systems.




                                                           Copyright © The OWASP Foundation
                     Permission is granted to copy, distribute and/or modify this document under the terms of the OWASP License.


owasp.org/index.php/Khartoum                                                                                                       2
Good security requires having a secure configuration
      defined and deployed for the application, frameworks,
      application server, web server, database server, and
      platform. All these settings should be defined,
      implemented, and maintained as many are not shipped
      with secure defaults. This includes keeping all software
      up to date, including all code libraries used by the
      application.




                                                           Copyright © The OWASP Foundation
                     Permission is granted to copy, distribute and/or modify this document under the terms of the OWASP License.


owasp.org/index.php/Khartoum                                                                                                       3
Threat         Attack                            Security Weakness                                              Technical     Business
       Agents         Vectors                                                                                           Impacts       Impact
                        Exploitability
                           EASY   Prevalence      Detectability     Impact
                                  COMMON              EASY       MODERATE
    Consider       Attacker     Security misconfiguration can Such flaws        The system
    anonymous      accesses     happen at any level of an       frequently give could be
    external       default      application stack, including    attackers       completely
    attackers as accounts,      the platform, web server,       unauthorized compromised
    well as users unused pages, application server, framework, access to        without you
    with their own unpatched    and custom code. Developers some system knowing it. All
    accounts that flaws,        and network administrators data or              your data
    may attempt unprotected need to work together to            functionality. could be stolen
    to compromise files and     ensure that the entire stack is Occasionally, or modified
    the system.    directories, configured properly.            such flaws      slowly over
    Also consider etc. to gain  Automated scanners are          result in a     time.
    insiders       unauthorized useful for detecting missing complete
    wanting to     access to or patches, misconfigurations,     system          Recovery costs
    disguise their knowledge of use of default accounts,        compromise. could be
    actions.       the system.  unnecessary services, etc.                      expensive
                                                             Copyright © The OWASP Foundation
                       Permission is granted to copy, distribute and/or modify this document under the terms of the OWASP License.


owasp.org/index.php/Khartoum                                                                                                                    4
Security misconfiguration can happen at any level of
      an application stack, including:

      the platform
      web server
      application server
      framework
      and custom code



                                                           Copyright © The OWASP Foundation
                     Permission is granted to copy, distribute and/or modify this document under the terms of the OWASP License.


owasp.org/index.php/Khartoum                                                                                                       5
Copyright © The OWASP Foundation
                     Permission is granted to copy, distribute and/or modify this document under the terms of the OWASP License.


owasp.org/index.php/Khartoum                                                                                                       6
Collecting info about the targeted system's stack
        OS and version number , Web server type (Apache, IIS, etc.)
        Web development language.

    Check their data sources for all known exploits against any
    part of that stack.
        There are known vulnerabilities for each level of the stack.

    Begin hacking away.




                                                           Copyright © The OWASP Foundation
                     Permission is granted to copy, distribute and/or modify this document under the terms of the OWASP License.


owasp.org/index.php/Khartoum                                                                                                       7
Scenario #1:

   • Your application relies on a powerful framework like
   Struts or Spring.
   • XSS flaws are found in these framework components
      you rely on.
   • An update is released to fix these flaws but you don’t
      update your libraries.
   • Until you do, attackers can easily find and exploit these
      flaws in your app.


                                                           Copyright © The OWASP Foundation
                     Permission is granted to copy, distribute and/or modify this document under the terms of the OWASP License.


owasp.org/index.php/Khartoum                                                                                                       8
Copyright © The OWASP Foundation
                     Permission is granted to copy, distribute and/or modify this document under the terms of the OWASP License.


owasp.org/index.php/Khartoum                                                                                                       9
Scenario #2:
   • The app server admin console is automatically
     installed and not removed.
   • Default accounts aren’t changed.
   • Attacker discovers the standard admin pages are on
     your server, logs in with default passwords and takes
     over.




                                                           Copyright © The OWASP Foundation
                     Permission is granted to copy, distribute and/or modify this document under the terms of the OWASP License.


owasp.org/index.php/Khartoum                                                                                                       10
Copyright © The OWASP Foundation
                     Permission is granted to copy, distribute and/or modify this document under the terms of the OWASP License.


owasp.org/index.php/Khartoum                                                                                                       11
<customErrors mode="On" redirectMode="ResponseRewrite" defaultRedirect="~/Error.aspx" />
                                                                      Copyright © The OWASP Foundation
                                Permission is granted to copy, distribute and/or modify this document under the terms of the OWASP License.


owasp.org/index.php/Khartoum                                                                                                                  12
• Change default user accounts.
   • Delete unused pages and user accounts.
   • Turn off unused services     .
   • Disable directory listings if they are not necessary, or set
     access controls to deny all requests.  
   • Stay up-to date on patches.
   • Consider internal attackers as well as external. 
   • Use automated scanners.




                                                           Copyright © The OWASP Foundation
                     Permission is granted to copy, distribute and/or modify this document under the terms of the OWASP License.


owasp.org/index.php/Khartoum                                                                                                       13
When you install an OS or server tool ,it has a default
     root account with a default password. Examples:

        Windows - "Administrator"&"Administrator“
        SQL Server - “ sa “ & no password 
        Oracle "MASTER"&"PASSWORD“
        Apache "root"&“ change this“

              Make sure you change these passwords!
            Completely delete the accounts when possible

                                                           Copyright © The OWASP Foundation
                     Permission is granted to copy, distribute and/or modify this document under the terms of the OWASP License.


owasp.org/index.php/Khartoum                                                                                                       14
 As soon as an employee or contractor leaves, change his
    password.
   Change his username. 
   Move files and delete the account 
   Look for old client accounts and delete them.




                                                           Copyright © The OWASP Foundation
                     Permission is granted to copy, distribute and/or modify this document under the terms of the OWASP License.


owasp.org/index.php/Khartoum                                                                                                       15
Look through all running services, If they're not being used,
      turn them off.
   Disable them upon system start up 
   Pay particular attention to: 
      Services enabled upon install
      ―    Remote debugging
      ―    Remote registry
           ―    Content management
   In side IIS, too 
       -- Directory browsing 
       -- Ability to run scripts and executables

                                                           Copyright © The OWASP Foundation
                     Permission is granted to copy, distribute and/or modify this document under the terms of the OWASP License.


owasp.org/index.php/Khartoum                                                                                                       16
Serve only pages that are allowed. 
   Intercept requests for pages and disallow any request
   for something other than...
          *.html
          *.jsp
          *.js
          *.css
          etc.




                                                           Copyright © The OWASP Foundation
                     Permission is granted to copy, distribute and/or modify this document under the terms of the OWASP License.


owasp.org/index.php/Khartoum                                                                                                       17
Patch Tuesday is the most overlooked defense 
   Day-one vulnerabilities 

   Subscribe to vendors‘ alert lists 
   http://www.microsoft.com/security/pc-security/default.aspx#Security-Updates


   RSS feed
   http://www.novell.com/company/rss/patches.html




                                                           Copyright © The OWASP Foundation
                     Permission is granted to copy, distribute and/or modify this document under the terms of the OWASP License.


owasp.org/index.php/Khartoum                                                                                                       18
Copyright © The OWASP Foundation
                     Permission is granted to copy, distribute and/or modify this document under the terms of the OWASP License.


owasp.org/index.php/Khartoum                                                                                                       19
Safeguarding your website from malicious users and
    attacks is important, regardless of what type of site
    you have or how many visitors your site receives.
  Security misconfiguration or poorly configured security
    controls, could allow malicious users to change your
    website, obtain unauthorized access, compromise
    files, or perform other unintended actions.
  While there is no one-size-fits-all security configuration,
    you can use these points to develop a plan that works
    for your situation, I hope that this presentation help
    you to create such a plan.
                                                           Copyright © The OWASP Foundation
                     Permission is granted to copy, distribute and/or modify this document under the terms of the OWASP License.


owasp.org/index.php/Khartoum                                                                                                       20
OWASP Development Guide: Chapter on Configuration

     OWASP Code Review Guide: Chapter on Error Handling

     OWASP Testing Guide: Configuration Management OWASP

     Testing Guide: Testing for Error Codes OWASP Top 102004 – Insecure
     Configuration Management

     CIS Security Configuration Guides/Benchmarks

     http://www.spiralsecurity.com/blog/?p=190




                                                           Copyright © The OWASP Foundation
                     Permission is granted to copy, distribute and/or modify this document under the terms of the OWASP License.


owasp.org/index.php/Khartoum                                                                                                       21
Copyright © The OWASP Foundation
                     Permission is granted to copy, distribute and/or modify this document under the terms of the OWASP License.


owasp.org/index.php/Khartoum

More Related Content

What's hot

A7 Missing Function Level Access Control
A7   Missing Function Level Access ControlA7   Missing Function Level Access Control
A7 Missing Function Level Access Control
stevil1224
 
Owasp
Owasp Owasp
OWASP Top 10 Vulnerabilities 2017- AppTrana
OWASP Top 10 Vulnerabilities 2017- AppTranaOWASP Top 10 Vulnerabilities 2017- AppTrana
OWASP Top 10 Vulnerabilities 2017- AppTrana
Ishan Mathur
 
Security-testing presentation
Security-testing presentationSecurity-testing presentation
Security-testing presentation
Ezhilan Elangovan (Eril)
 
OWASP Top 10 2017 - New Vulnerabilities
OWASP Top 10 2017 - New VulnerabilitiesOWASP Top 10 2017 - New Vulnerabilities
OWASP Top 10 2017 - New Vulnerabilities
Dilum Bandara
 
Web Application Security 101
Web Application Security 101Web Application Security 101
Web Application Security 101
Cybersecurity Education and Research Centre
 
Introduction to security testing raj
Introduction to security testing rajIntroduction to security testing raj
The Complete Web Application Security Testing Checklist
The Complete Web Application Security Testing ChecklistThe Complete Web Application Security Testing Checklist
The Complete Web Application Security Testing Checklist
Cigital
 
Security workshop - Lets get our hands dirty!!
Security workshop - Lets get our hands dirty!!Security workshop - Lets get our hands dirty!!
Security workshop - Lets get our hands dirty!!
Manjyot Singh
 
Owasp top 10 security threats
Owasp top 10 security threatsOwasp top 10 security threats
Owasp top 10 security threats
Vishal Kumar
 
OWASP Top Ten in Practice
OWASP Top Ten in PracticeOWASP Top Ten in Practice
OWASP Top Ten in Practice
Security Innovation
 
OWASP Top 10 - The Ten Most Critical Web Application Security Risks
OWASP Top 10 - The Ten Most Critical Web Application Security RisksOWASP Top 10 - The Ten Most Critical Web Application Security Risks
OWASP Top 10 - The Ten Most Critical Web Application Security Risks
All Things Open
 
Web Application Security and Awareness
Web Application Security and AwarenessWeb Application Security and Awareness
Web Application Security and Awareness
Abdul Rahman Sherzad
 
Mobile security services 2012
Mobile security services 2012Mobile security services 2012
Mobile security services 2012Tjylen Veselyj
 
InsecureDirectObjectReferences
InsecureDirectObjectReferencesInsecureDirectObjectReferences
InsecureDirectObjectReferences
macanazon
 
Vulnerability manager v1.0
Vulnerability manager v1.0Vulnerability manager v1.0
Owasp Top 10-2013
Owasp Top 10-2013Owasp Top 10-2013
A10 - Unvalidated Redirects and Forwards
A10 - Unvalidated Redirects and ForwardsA10 - Unvalidated Redirects and Forwards
A10 - Unvalidated Redirects and Forwards
Shane Stanley
 
Security hole #5 application security science or quality assurance
Security hole #5 application security   science or quality assuranceSecurity hole #5 application security   science or quality assurance
Security hole #5 application security science or quality assuranceTjylen Veselyj
 
Security testing presentation
Security testing presentationSecurity testing presentation
Security testing presentationConfiz
 

What's hot (20)

A7 Missing Function Level Access Control
A7   Missing Function Level Access ControlA7   Missing Function Level Access Control
A7 Missing Function Level Access Control
 
Owasp
Owasp Owasp
Owasp
 
OWASP Top 10 Vulnerabilities 2017- AppTrana
OWASP Top 10 Vulnerabilities 2017- AppTranaOWASP Top 10 Vulnerabilities 2017- AppTrana
OWASP Top 10 Vulnerabilities 2017- AppTrana
 
Security-testing presentation
Security-testing presentationSecurity-testing presentation
Security-testing presentation
 
OWASP Top 10 2017 - New Vulnerabilities
OWASP Top 10 2017 - New VulnerabilitiesOWASP Top 10 2017 - New Vulnerabilities
OWASP Top 10 2017 - New Vulnerabilities
 
Web Application Security 101
Web Application Security 101Web Application Security 101
Web Application Security 101
 
Introduction to security testing raj
Introduction to security testing rajIntroduction to security testing raj
Introduction to security testing raj
 
The Complete Web Application Security Testing Checklist
The Complete Web Application Security Testing ChecklistThe Complete Web Application Security Testing Checklist
The Complete Web Application Security Testing Checklist
 
Security workshop - Lets get our hands dirty!!
Security workshop - Lets get our hands dirty!!Security workshop - Lets get our hands dirty!!
Security workshop - Lets get our hands dirty!!
 
Owasp top 10 security threats
Owasp top 10 security threatsOwasp top 10 security threats
Owasp top 10 security threats
 
OWASP Top Ten in Practice
OWASP Top Ten in PracticeOWASP Top Ten in Practice
OWASP Top Ten in Practice
 
OWASP Top 10 - The Ten Most Critical Web Application Security Risks
OWASP Top 10 - The Ten Most Critical Web Application Security RisksOWASP Top 10 - The Ten Most Critical Web Application Security Risks
OWASP Top 10 - The Ten Most Critical Web Application Security Risks
 
Web Application Security and Awareness
Web Application Security and AwarenessWeb Application Security and Awareness
Web Application Security and Awareness
 
Mobile security services 2012
Mobile security services 2012Mobile security services 2012
Mobile security services 2012
 
InsecureDirectObjectReferences
InsecureDirectObjectReferencesInsecureDirectObjectReferences
InsecureDirectObjectReferences
 
Vulnerability manager v1.0
Vulnerability manager v1.0Vulnerability manager v1.0
Vulnerability manager v1.0
 
Owasp Top 10-2013
Owasp Top 10-2013Owasp Top 10-2013
Owasp Top 10-2013
 
A10 - Unvalidated Redirects and Forwards
A10 - Unvalidated Redirects and ForwardsA10 - Unvalidated Redirects and Forwards
A10 - Unvalidated Redirects and Forwards
 
Security hole #5 application security science or quality assurance
Security hole #5 application security   science or quality assuranceSecurity hole #5 application security   science or quality assurance
Security hole #5 application security science or quality assurance
 
Security testing presentation
Security testing presentationSecurity testing presentation
Security testing presentation
 

Similar to OWASP Khartoum - Top 10 A6 - 8th meeting - Security Misconfiguration

OWASP Khartoum Top 10 A3 - 6th meeting
OWASP Khartoum   Top 10 A3 - 6th meetingOWASP Khartoum   Top 10 A3 - 6th meeting
OWASP Khartoum Top 10 A3 - 6th meetingOWASP Khartoum
 
OWASP App Sec US - 2010
OWASP App Sec US - 2010OWASP App Sec US - 2010
OWASP App Sec US - 2010
Aditya K Sood
 
OWASP Top 10 Proactive Controls 2016 - PHP Québec August 2017
OWASP Top 10 Proactive Controls 2016 - PHP Québec August 2017OWASP Top 10 Proactive Controls 2016 - PHP Québec August 2017
OWASP Top 10 Proactive Controls 2016 - PHP Québec August 2017
Philippe Gamache
 
OWASP Top 10 Proactive Controls 2016 - NorthEast PHP 2017
OWASP Top 10 Proactive Controls 2016 - NorthEast PHP 2017 OWASP Top 10 Proactive Controls 2016 - NorthEast PHP 2017
OWASP Top 10 Proactive Controls 2016 - NorthEast PHP 2017
Philippe Gamache
 
OWASP_Top_10_Introduction_and_Remedies_2017.ppt
OWASP_Top_10_Introduction_and_Remedies_2017.pptOWASP_Top_10_Introduction_and_Remedies_2017.ppt
OWASP_Top_10_Introduction_and_Remedies_2017.ppt
jangomanso
 
Ofer Maor - OWASP Top 10
Ofer Maor -  OWASP Top 10Ofer Maor -  OWASP Top 10
Ofer Maor - OWASP Top 10CSAIsrael
 
OWASP Top10 2010
OWASP Top10 2010OWASP Top10 2010
OWASP Top10 2010
Tommy Tracx Xaypanya
 
Shake Hooves With BeEF - OWASP AppSec APAC 2012
Shake Hooves With BeEF - OWASP AppSec APAC 2012Shake Hooves With BeEF - OWASP AppSec APAC 2012
Shake Hooves With BeEF - OWASP AppSec APAC 2012Christian Frichot
 
Module 4 qui parle de la sécurisation des applications
Module 4 qui parle de la sécurisation des applicationsModule 4 qui parle de la sécurisation des applications
Module 4 qui parle de la sécurisation des applications
EwenBenana
 
Apache mesos
Apache mesosApache mesos
Apache mesos
Mahesh Gadhwal
 
OWASP Top 10 2007 for JavaEE
OWASP Top 10 2007 for JavaEE OWASP Top 10 2007 for JavaEE
OWASP Top 10 2007 for JavaEE
Magno Logan
 
Csrf protector
Csrf protectorCsrf protector
Csrf protector
Minhaz A V
 
OWASP Khartoum Top 10 A4 - 7th meeting
OWASP Khartoum   Top 10 A4 - 7th meetingOWASP Khartoum   Top 10 A4 - 7th meeting
OWASP Khartoum Top 10 A4 - 7th meetingOWASP Khartoum
 
OWASP Khartoum - Top 10 A5 - 7th meeting - Cross Site Request Forgery
OWASP Khartoum - Top 10 A5 - 7th meeting - Cross Site Request ForgeryOWASP Khartoum - Top 10 A5 - 7th meeting - Cross Site Request Forgery
OWASP Khartoum - Top 10 A5 - 7th meeting - Cross Site Request ForgeryOWASP Khartoum
 
Running an app sec program with OWASP projects_ Defcon AppSec Village
Running an app sec program with OWASP projects_ Defcon AppSec VillageRunning an app sec program with OWASP projects_ Defcon AppSec Village
Running an app sec program with OWASP projects_ Defcon AppSec Village
Vandana Verma
 
How to use AWS WAF to Mitigate OWASP Top 10 attacks - AWS Online Tech Talks
How to use AWS WAF to Mitigate OWASP Top 10 attacks - AWS Online Tech TalksHow to use AWS WAF to Mitigate OWASP Top 10 attacks - AWS Online Tech Talks
How to use AWS WAF to Mitigate OWASP Top 10 attacks - AWS Online Tech Talks
Amazon Web Services
 
World Usability Day 2012 ARIA
World Usability Day 2012 ARIA World Usability Day 2012 ARIA
World Usability Day 2012 ARIA Ted Gies
 
Cyber ppt
Cyber pptCyber ppt
Cyber ppt
karthik menon
 
Sergey Kochergan - OWASP Top 10 Web Application Vulnerabilities
Sergey Kochergan - OWASP Top 10 Web Application Vulnerabilities Sergey Kochergan - OWASP Top 10 Web Application Vulnerabilities
Sergey Kochergan - OWASP Top 10 Web Application Vulnerabilities
Braindev Kyiv
 

Similar to OWASP Khartoum - Top 10 A6 - 8th meeting - Security Misconfiguration (20)

OWASP Khartoum Top 10 A3 - 6th meeting
OWASP Khartoum   Top 10 A3 - 6th meetingOWASP Khartoum   Top 10 A3 - 6th meeting
OWASP Khartoum Top 10 A3 - 6th meeting
 
OWASP App Sec US - 2010
OWASP App Sec US - 2010OWASP App Sec US - 2010
OWASP App Sec US - 2010
 
OWASP Top 10 Proactive Controls 2016 - PHP Québec August 2017
OWASP Top 10 Proactive Controls 2016 - PHP Québec August 2017OWASP Top 10 Proactive Controls 2016 - PHP Québec August 2017
OWASP Top 10 Proactive Controls 2016 - PHP Québec August 2017
 
OWASP Top 10 Proactive Controls 2016 - NorthEast PHP 2017
OWASP Top 10 Proactive Controls 2016 - NorthEast PHP 2017 OWASP Top 10 Proactive Controls 2016 - NorthEast PHP 2017
OWASP Top 10 Proactive Controls 2016 - NorthEast PHP 2017
 
OWASP_Top_10_Introduction_and_Remedies_2017.ppt
OWASP_Top_10_Introduction_and_Remedies_2017.pptOWASP_Top_10_Introduction_and_Remedies_2017.ppt
OWASP_Top_10_Introduction_and_Remedies_2017.ppt
 
Ofer Maor - OWASP Top 10
Ofer Maor -  OWASP Top 10Ofer Maor -  OWASP Top 10
Ofer Maor - OWASP Top 10
 
OWASP Top10 2010
OWASP Top10 2010OWASP Top10 2010
OWASP Top10 2010
 
Shake Hooves With BeEF - OWASP AppSec APAC 2012
Shake Hooves With BeEF - OWASP AppSec APAC 2012Shake Hooves With BeEF - OWASP AppSec APAC 2012
Shake Hooves With BeEF - OWASP AppSec APAC 2012
 
Module 4 qui parle de la sécurisation des applications
Module 4 qui parle de la sécurisation des applicationsModule 4 qui parle de la sécurisation des applications
Module 4 qui parle de la sécurisation des applications
 
Apache mesos
Apache mesosApache mesos
Apache mesos
 
OWASP Top 10 2007 for JavaEE
OWASP Top 10 2007 for JavaEE OWASP Top 10 2007 for JavaEE
OWASP Top 10 2007 for JavaEE
 
Csrf protector
Csrf protectorCsrf protector
Csrf protector
 
OWASP Khartoum Top 10 A4 - 7th meeting
OWASP Khartoum   Top 10 A4 - 7th meetingOWASP Khartoum   Top 10 A4 - 7th meeting
OWASP Khartoum Top 10 A4 - 7th meeting
 
OWASP Khartoum - Top 10 A5 - 7th meeting - Cross Site Request Forgery
OWASP Khartoum - Top 10 A5 - 7th meeting - Cross Site Request ForgeryOWASP Khartoum - Top 10 A5 - 7th meeting - Cross Site Request Forgery
OWASP Khartoum - Top 10 A5 - 7th meeting - Cross Site Request Forgery
 
Running an app sec program with OWASP projects_ Defcon AppSec Village
Running an app sec program with OWASP projects_ Defcon AppSec VillageRunning an app sec program with OWASP projects_ Defcon AppSec Village
Running an app sec program with OWASP projects_ Defcon AppSec Village
 
t r
t rt r
t r
 
How to use AWS WAF to Mitigate OWASP Top 10 attacks - AWS Online Tech Talks
How to use AWS WAF to Mitigate OWASP Top 10 attacks - AWS Online Tech TalksHow to use AWS WAF to Mitigate OWASP Top 10 attacks - AWS Online Tech Talks
How to use AWS WAF to Mitigate OWASP Top 10 attacks - AWS Online Tech Talks
 
World Usability Day 2012 ARIA
World Usability Day 2012 ARIA World Usability Day 2012 ARIA
World Usability Day 2012 ARIA
 
Cyber ppt
Cyber pptCyber ppt
Cyber ppt
 
Sergey Kochergan - OWASP Top 10 Web Application Vulnerabilities
Sergey Kochergan - OWASP Top 10 Web Application Vulnerabilities Sergey Kochergan - OWASP Top 10 Web Application Vulnerabilities
Sergey Kochergan - OWASP Top 10 Web Application Vulnerabilities
 

More from OWASP Khartoum

Cryptocurrency, a deep dive
Cryptocurrency, a deep diveCryptocurrency, a deep dive
Cryptocurrency, a deep dive
OWASP Khartoum
 
Usable Security: Tips for Daily Life
Usable Security: Tips for Daily LifeUsable Security: Tips for Daily Life
Usable Security: Tips for Daily Life
OWASP Khartoum
 
API IN(SECURITY)
API IN(SECURITY)API IN(SECURITY)
API IN(SECURITY)
OWASP Khartoum
 
SSH - From Zero to Hero
SSH - From Zero to HeroSSH - From Zero to Hero
SSH - From Zero to Hero
OWASP Khartoum
 
OWASP Khartoum Cyber Security Session
OWASP Khartoum Cyber Security SessionOWASP Khartoum Cyber Security Session
OWASP Khartoum Cyber Security Session
OWASP Khartoum
 
Computer forensic 101 - OWASP Khartoum
Computer forensic 101 - OWASP KhartoumComputer forensic 101 - OWASP Khartoum
Computer forensic 101 - OWASP Khartoum
OWASP Khartoum
 
Welcome to OWASP World
Welcome to OWASP WorldWelcome to OWASP World
Welcome to OWASP WorldOWASP Khartoum
 
Cross Site Scripting (XSS)
Cross Site Scripting (XSS)Cross Site Scripting (XSS)
Cross Site Scripting (XSS)OWASP Khartoum
 

More from OWASP Khartoum (8)

Cryptocurrency, a deep dive
Cryptocurrency, a deep diveCryptocurrency, a deep dive
Cryptocurrency, a deep dive
 
Usable Security: Tips for Daily Life
Usable Security: Tips for Daily LifeUsable Security: Tips for Daily Life
Usable Security: Tips for Daily Life
 
API IN(SECURITY)
API IN(SECURITY)API IN(SECURITY)
API IN(SECURITY)
 
SSH - From Zero to Hero
SSH - From Zero to HeroSSH - From Zero to Hero
SSH - From Zero to Hero
 
OWASP Khartoum Cyber Security Session
OWASP Khartoum Cyber Security SessionOWASP Khartoum Cyber Security Session
OWASP Khartoum Cyber Security Session
 
Computer forensic 101 - OWASP Khartoum
Computer forensic 101 - OWASP KhartoumComputer forensic 101 - OWASP Khartoum
Computer forensic 101 - OWASP Khartoum
 
Welcome to OWASP World
Welcome to OWASP WorldWelcome to OWASP World
Welcome to OWASP World
 
Cross Site Scripting (XSS)
Cross Site Scripting (XSS)Cross Site Scripting (XSS)
Cross Site Scripting (XSS)
 

OWASP Khartoum - Top 10 A6 - 8th meeting - Security Misconfiguration

  • 1. Ali Hussein Ali.hussein@owasp.org Copyright © The OWASP Foundation Permission is granted to copy, distribute and/or modify this document under the terms of the OWASP License. owasp.org/index.php/Khartoum
  • 2. New to the OWASP Top 10. Was there in 2004. On OWASP list in 2007. System admins, DBAs and developers leave security holes in the configuration of computer systems. Copyright © The OWASP Foundation Permission is granted to copy, distribute and/or modify this document under the terms of the OWASP License. owasp.org/index.php/Khartoum 2
  • 3. Good security requires having a secure configuration defined and deployed for the application, frameworks, application server, web server, database server, and platform. All these settings should be defined, implemented, and maintained as many are not shipped with secure defaults. This includes keeping all software up to date, including all code libraries used by the application. Copyright © The OWASP Foundation Permission is granted to copy, distribute and/or modify this document under the terms of the OWASP License. owasp.org/index.php/Khartoum 3
  • 4. Threat Attack Security Weakness Technical Business Agents Vectors Impacts Impact Exploitability EASY Prevalence Detectability Impact COMMON EASY MODERATE Consider Attacker Security misconfiguration can Such flaws The system anonymous accesses happen at any level of an frequently give could be external default application stack, including attackers completely attackers as accounts, the platform, web server, unauthorized compromised well as users unused pages, application server, framework, access to without you with their own unpatched and custom code. Developers some system knowing it. All accounts that flaws, and network administrators data or your data may attempt unprotected need to work together to functionality. could be stolen to compromise files and ensure that the entire stack is Occasionally, or modified the system. directories, configured properly. such flaws slowly over Also consider etc. to gain Automated scanners are result in a time. insiders unauthorized useful for detecting missing complete wanting to access to or patches, misconfigurations, system Recovery costs disguise their knowledge of use of default accounts, compromise. could be actions. the system. unnecessary services, etc. expensive Copyright © The OWASP Foundation Permission is granted to copy, distribute and/or modify this document under the terms of the OWASP License. owasp.org/index.php/Khartoum 4
  • 5. Security misconfiguration can happen at any level of an application stack, including: the platform web server application server framework and custom code Copyright © The OWASP Foundation Permission is granted to copy, distribute and/or modify this document under the terms of the OWASP License. owasp.org/index.php/Khartoum 5
  • 6. Copyright © The OWASP Foundation Permission is granted to copy, distribute and/or modify this document under the terms of the OWASP License. owasp.org/index.php/Khartoum 6
  • 7. Collecting info about the targeted system's stack  OS and version number , Web server type (Apache, IIS, etc.)  Web development language. Check their data sources for all known exploits against any part of that stack.  There are known vulnerabilities for each level of the stack. Begin hacking away. Copyright © The OWASP Foundation Permission is granted to copy, distribute and/or modify this document under the terms of the OWASP License. owasp.org/index.php/Khartoum 7
  • 8. Scenario #1: • Your application relies on a powerful framework like Struts or Spring. • XSS flaws are found in these framework components you rely on. • An update is released to fix these flaws but you don’t update your libraries. • Until you do, attackers can easily find and exploit these flaws in your app. Copyright © The OWASP Foundation Permission is granted to copy, distribute and/or modify this document under the terms of the OWASP License. owasp.org/index.php/Khartoum 8
  • 9. Copyright © The OWASP Foundation Permission is granted to copy, distribute and/or modify this document under the terms of the OWASP License. owasp.org/index.php/Khartoum 9
  • 10. Scenario #2: • The app server admin console is automatically installed and not removed. • Default accounts aren’t changed. • Attacker discovers the standard admin pages are on your server, logs in with default passwords and takes over. Copyright © The OWASP Foundation Permission is granted to copy, distribute and/or modify this document under the terms of the OWASP License. owasp.org/index.php/Khartoum 10
  • 11. Copyright © The OWASP Foundation Permission is granted to copy, distribute and/or modify this document under the terms of the OWASP License. owasp.org/index.php/Khartoum 11
  • 12. <customErrors mode="On" redirectMode="ResponseRewrite" defaultRedirect="~/Error.aspx" /> Copyright © The OWASP Foundation Permission is granted to copy, distribute and/or modify this document under the terms of the OWASP License. owasp.org/index.php/Khartoum 12
  • 13. • Change default user accounts. • Delete unused pages and user accounts. • Turn off unused services  . • Disable directory listings if they are not necessary, or set access controls to deny all requests.   • Stay up-to date on patches. • Consider internal attackers as well as external.  • Use automated scanners. Copyright © The OWASP Foundation Permission is granted to copy, distribute and/or modify this document under the terms of the OWASP License. owasp.org/index.php/Khartoum 13
  • 14. When you install an OS or server tool ,it has a default root account with a default password. Examples:  Windows - "Administrator"&"Administrator“  SQL Server - “ sa “ & no password   Oracle "MASTER"&"PASSWORD“  Apache "root"&“ change this“ Make sure you change these passwords! Completely delete the accounts when possible Copyright © The OWASP Foundation Permission is granted to copy, distribute and/or modify this document under the terms of the OWASP License. owasp.org/index.php/Khartoum 14
  • 15.  As soon as an employee or contractor leaves, change his password.  Change his username.   Move files and delete the account   Look for old client accounts and delete them. Copyright © The OWASP Foundation Permission is granted to copy, distribute and/or modify this document under the terms of the OWASP License. owasp.org/index.php/Khartoum 15
  • 16. Look through all running services, If they're not being used, turn them off. Disable them upon system start up  Pay particular attention to:  Services enabled upon install ―  Remote debugging ―  Remote registry ―  Content management In side IIS, too  -- Directory browsing  -- Ability to run scripts and executables Copyright © The OWASP Foundation Permission is granted to copy, distribute and/or modify this document under the terms of the OWASP License. owasp.org/index.php/Khartoum 16
  • 17. Serve only pages that are allowed.  Intercept requests for pages and disallow any request for something other than... *.html *.jsp *.js *.css etc. Copyright © The OWASP Foundation Permission is granted to copy, distribute and/or modify this document under the terms of the OWASP License. owasp.org/index.php/Khartoum 17
  • 18. Patch Tuesday is the most overlooked defense  Day-one vulnerabilities  Subscribe to vendors‘ alert lists  http://www.microsoft.com/security/pc-security/default.aspx#Security-Updates RSS feed http://www.novell.com/company/rss/patches.html Copyright © The OWASP Foundation Permission is granted to copy, distribute and/or modify this document under the terms of the OWASP License. owasp.org/index.php/Khartoum 18
  • 19. Copyright © The OWASP Foundation Permission is granted to copy, distribute and/or modify this document under the terms of the OWASP License. owasp.org/index.php/Khartoum 19
  • 20. Safeguarding your website from malicious users and attacks is important, regardless of what type of site you have or how many visitors your site receives. Security misconfiguration or poorly configured security controls, could allow malicious users to change your website, obtain unauthorized access, compromise files, or perform other unintended actions. While there is no one-size-fits-all security configuration, you can use these points to develop a plan that works for your situation, I hope that this presentation help you to create such a plan. Copyright © The OWASP Foundation Permission is granted to copy, distribute and/or modify this document under the terms of the OWASP License. owasp.org/index.php/Khartoum 20
  • 21. OWASP Development Guide: Chapter on Configuration OWASP Code Review Guide: Chapter on Error Handling OWASP Testing Guide: Configuration Management OWASP Testing Guide: Testing for Error Codes OWASP Top 102004 – Insecure Configuration Management CIS Security Configuration Guides/Benchmarks http://www.spiralsecurity.com/blog/?p=190 Copyright © The OWASP Foundation Permission is granted to copy, distribute and/or modify this document under the terms of the OWASP License. owasp.org/index.php/Khartoum 21
  • 22. Copyright © The OWASP Foundation Permission is granted to copy, distribute and/or modify this document under the terms of the OWASP License. owasp.org/index.php/Khartoum