SlideShare a Scribd company logo
OTG-CONFIG
OWASP Thailand Chapter (26th November 2015)
OWASP Testing Guide: Configuration and Deployment Management Testing 2
Who am I
• Noppadol Songsakaew
- IT security enthusiastic
- gamer (play on smartphone)
- book reader (IT, Chinese novel)
• Work
Senior Associate at PwC (Thailand)
OWASP Testing Guide: Configuration and Deployment Management Testing 3
Who is this talk for ?
• Developers
• Software Testers
• Security Guys
• Project Managers sir!
• Anyone who interesting in IT security
OWASP Testing Guide: Configuration and Deployment Management Testing 4
Objective of this talk
To build the testing knowledge of :
• Network & Infrastructure configuration
• Web server configuration
• Sensitive data handling
• Application protocol
• Cross domain policy
OWASP Testing Guide: Configuration and Deployment Management Testing 5
and Why would you care ?
Only one broken chain link will let the malicious user compromise
your servers.
OWASP Testing Guide: Configuration and Deployment Management Testing 6
“You can’t build a secure application without
performing security testing on it. Testing is part
of a wider approach to building a secure
system.”
- Eoin Keary, OWASP Global Board
What is OWASP Testing Guide
OWASP Testing Guide: Configuration and Deployment Management Testing 7
Agenda
1. Test Network/Infrastructure Configuration (OTG-CONFIG-001)
2. Test Application Platform Configuration (OTG-CONFIG-002)
3. Test File Extensions Handling for Sensitive Information (OTG-
CONFIG-003)
4. Review Old, Backup and Unreferenced Files for Sensitive
Information (OTG-CONFIG-004)
5. Enumerate Infrastructure and Application Admin Interfaces
(OTG-CONFIG-005)
6. Test HTTP Methods (OTG-CONFIG-006)
7. Test HTTP Strict Transport Security (OTG-CONFIG-007)
8. Test RIA cross domain policy (OTG-CONFIG-008)
OWASP Testing Guide: Configuration and Deployment Management Testing 8
1. Test Network/Infrastructure Configuration
(OTG-CONFIG-001)
Test Objectives
• To map the infrastructure supporting the
application and understand how it affects
the security of the application.
OWASP Testing Guide: Configuration and Deployment Management Testing 9
1. Test Network/Infrastructure Configuration
(OTG-CONFIG-001)
How to test
• Known Server Vulnerabilities
– Not all software vendors disclose vulnerabilities in a public way.
– Beware false positive from automate scanning tool.
– Backporting patch
Tools
OpenVAS, Nessus, Core Impact, Nexpose
OWASP Testing Guide: Configuration and Deployment Management Testing 10
1. Test Network/Infrastructure Configuration
(OTG-CONFIG-001)
How to test
• Known Server Vulnerabilities
(https://exchange.xforce.ibmcloud.com)
OWASP Testing Guide: Configuration and Deployment Management Testing 11
1. Test Network/Infrastructure Configuration
(OTG-CONFIG-001)
How to test
• Known Server Vulnerabilities
(https://www.cvedetails.com)
OWASP Testing Guide: Configuration and Deployment Management Testing 12
1. Test Network/Infrastructure Configuration
(OTG-CONFIG-001)
How to test
• Review a software components
– Configuration files will tell you which modules are enable or disable
• Administrative tools
– All web server allowed administrator to manage a web server by
different ways such as plain text configuration files (in the Apache,
nginx) or use operating-system GUI tools (Microsoft’s IIS server).
– Determine the mechanisms that control access to these interfaces and
their associated susceptibilities.
OWASP Testing Guide: Configuration and Deployment Management Testing 13
2. Test Application Platform Configuration
(OTG-CONFIG-002)
Test Objectives
• To assess the default configuration of
installed web server and remove
unnecessary files (application examples files,
documentation files, test pages)
OWASP Testing Guide: Configuration and Deployment Management Testing 14
2. Test Application Platform Configuration
(OTG-CONFIG-002)
How to test
• Sample and known files and directories
• Configuration review
– Check privilege of minimized privileges in the operating system
– SSL Protocol Configuration
– Errors Pages Configuration
– Make sure the server software properly logs both legitimate access
and errors.
OWASP Testing Guide: Configuration and Deployment Management Testing 15
2. Test Application Platform Configuration
(OTG-CONFIG-002)
How to test
• Logging
– Do the logs contain sensitive information?
– Are the logs stored in a dedicated server?
– Can log usage generate a Denial of Service condition?
– How are they rotated? Are logs kept for the sufficient time?
– How are logs reviewed? Can administrators use these reviews to
detect targeted attacks?
– How are log backups preserved?
– Is the data being logged data validated (min/max length, chars etc)
prior to being logged?
OWASP Testing Guide: Configuration and Deployment Management Testing 16
3. Test File Extensions Handling for Sensitive
Information (OTG-CONFIG-003)
Test Objectives
• To test the behaviour of each extension to
assess that when users access our pages
what kind of information display to users
OWASP Testing Guide: Configuration and Deployment Management Testing 17
3. Test File Extensions Handling for Sensitive
Information (OTG-CONFIG-003)
How to test
• Forced browsing
Example:
The tester has identified the existence of a file named
connection.inc. Trying to access it directly gives back its contents,
which is
OWASP Testing Guide: Configuration and Deployment Management Testing 18
3. Test File Extensions Handling for Sensitive
Information (OTG-CONFIG-003)
How to test
• Make sure you check all below file extensions:
.zip, .tar, .gz, .tgz, .rar: (Compressed) archive files
.java: No reason to provide access to Java source files
.txt: Text files
.pdf: PDF documents
.docx, .rtf, .xls, .pptx,: Office documents
.bak, .old and other extensions indicative of backup files
OWASP Testing Guide: Configuration and Deployment Management Testing 19
3. Test File Extensions Handling for Sensitive
Information (OTG-CONFIG-003)
Example:
OWASP Testing Guide: Configuration and Deployment Management Testing 20
4. Review Old Backup and Unreferenced Files for
Sensitive Information (OTG-CONFIG-004)
Test Objectives
• To find sensitive information from files that
left on a server
OWASP Testing Guide: Configuration and Deployment Management Testing 21
4. Review Old Backup and Unreferenced Files for
Sensitive Information (OTG-CONFIG-004)
How to test
• Check from the public contents
- Comment in source-code
- Java script connected to related page
-/robots.txt
OWASP Testing Guide: Configuration and Deployment Management Testing 22
4. Review Old Backup and Unreferenced Files for
Sensitive Information (OTG-CONFIG-004)
How to test
• Blind guessing
- For example, if a page ’viewuser.asp’ is found, then look also
for ‘edituser.aspx’.
- If ‘/app/user’ is found, then an attacker will look also
for ’/app/admin’ and ‘/app/manager’.
- Using Dictionary or brute forcing a directory paths and files on a
web server
Tools
‘Wfuzz’, ‘Burp (Intruder)’, ‘ZAP’
OWASP Testing Guide: Configuration and Deployment Management Testing 23
4. Review Old Backup and Unreferenced Files for
Sensitive Information (OTG-CONFIG-004)
How to test
• Information obtained through server
vulnerabilities and misconfiguration
- Directory listing Vulnerability
OWASP Testing Guide: Configuration and Deployment Management Testing 24
5. Enumerate Infrastructure and Application
Admin Interfaces (OTG-CONFIG-005)
Test Objectives
• To discover administrator interfaces and
accessing functionalities intended for the
privileged users.
OWASP Testing Guide: Configuration and Deployment Management Testing 25
5. Enumerate Infrastructure and Application
Admin Interfaces (OTG-CONFIG-005)
How to test
- Reviewing server and application documentation
- Directory and file enumeration by searching for: /admin or
/administrator
- Publicly available information. Many applications such as
wordpress have default administrative interfaces.
- Alternative server port. Administration interfaces may be seen
on a different port on the host than the main application. For
example, Apache Tomcat's Administration interface can often be
seen on port 8080.
- Clue from cookie information:
OWASP Testing Guide: Configuration and Deployment Management Testing 26
5. Enumerate Infrastructure and Application
Admin Interfaces (OTG-CONFIG-005)
OWASP Testing Guide: Configuration and Deployment Management Testing 27
6. Test HTTP Methods (OTG-CONFIG-006)
Test Objectives
• To check that how a web server handles
different type of HTTP Methods
OWASP Testing Guide: Configuration and Deployment Management Testing 28
6. Test HTTP Methods (OTG-CONFIG-006)
What is HTTP Methods
The method that indicates the desired action to be performed on the
identified resource at the web server.
OWASP Testing Guide: Configuration and Deployment Management Testing 29
6. Test HTTP Methods (OTG-CONFIG-006)
What is HTTP Methods
to indicate the desired action to be performed on the identified resource.
There are 8 methods in HTTP /1.1
1) GET: Requests a representation of the specified resource.
2) POST: Requests that a web server accepts and stores the data enclosed
in the body of the request message.
3) HEAD : Request a resource and response identical to the one that would
correspond to a GET request, but without the response body
4) PUT : This method allows a client to upload new files on the web server.
OWASP Testing Guide: Configuration and Deployment Management Testing 30
6. Test HTTP Methods (OTG-CONFIG-006)
What is HTTP Methods
The method that indicates the desired action to be performed on the
identified resource at the web server.
There are 8 methods in HTTP /1.1 (cont..)
5) DELETE: This method allows a client to delete a file on the web server.
6) TRACE: This method simply echoes back to the client whatever string has
been sent to the server, and is used mainly for debugging purposes.
7) OPTIONS: The OPTIONS method returns the HTTP methods that the
server supports for the specified URL
8) CONNECT: This method could allow a client to use the web server as a
proxy
OWASP Testing Guide: Configuration and Deployment Management Testing 31
6. Test HTTP Methods (OTG-CONFIG-006)
How to test
- Using ‘Nmap’ to list supported methods
OWASP Testing Guide: Configuration and Deployment Management Testing 32
6. Test HTTP Methods (OTG-CONFIG-006)
How to test
- Using ‘netcat’
OWASP Testing Guide: Configuration and Deployment Management Testing 33
7. Test HTTP Strict Transport Security
(OTG-CONFIG-007)
Test Objectives
• To verify that a web server always exchange
an information with web browser over
HTTPS.
OWASP Testing Guide: Configuration and Deployment Management Testing 34
7. Test HTTP Strict Transport Security
(OTG-CONFIG-007)
How to test
• Testing for the presence of HSTS header can be done by checking for the
existence of the HSTS header in the server's response in an interception
proxy, or by using curl as follows:
curl –D https://facebook.com
• Expected result:
OWASP Testing Guide: Configuration and Deployment Management Testing 35
7. Test HTTP Strict Transport Security
(OTG-CONFIG-007)
Example
When the expiration time specified by the Strict-Transport-Security header
elapses, the next attempt to load the site via HTTP will proceed as normal
instead of automatically using HTTPS.
OWASP Testing Guide: Configuration and Deployment Management Testing 36
8. Test RIA cross domain policy
(OTG-CONFIG-008)
What is RIA?
RIA (Rich Internet Application) is a Web application that has many of the
characteristics of desktop application software, typically delivered by way
of a site-specific browser, a browser plug-in, extensive use of JavaScript.
Example of RIA:
Adobe Flash, JavaFX, and Microsoft Silverlight.
OWASP Testing Guide: Configuration and Deployment Management Testing 37
8. Test RIA cross domain policy
(OTG-CONFIG-008)
What is cross domain policy?
• A cross-domain policy file ("crossdomain.xml" in Flash and
"clientaccesspolicy.xml" in Silverlight) defines a whitelist of domains
from which a server is allowed to make cross-domain requests. When
making a cross-domain request, the Flash or Silverlight client will first
look for the policy file on the target server. If it is found, and the domain
hosting the application is explicitly allowed to make requests, the
request is made.
• The crossdomain.xml file is normally present on the root of the web
server.
OWASP Testing Guide: Configuration and Deployment Management Testing 38
8. Test RIA cross domain policy
(OTG-CONFIG-008)
How cross domain policy really works?
For example:
OWASP Testing Guide: Configuration and Deployment Management Testing 39
8. Test RIA cross domain policy
(OTG-CONFIG-008)
How to test
To test for RIA policy file weakness the tester should try to retrieve the
policy files crossdomain.xml and clientaccesspolicy.xml from the
application's root, and from every folder found.
Browse to : http://www.example.com/crossdomain.xml
OWASP OTG-configuration (OWASP Thailand chapter november 2015)

More Related Content

What's hot

Cơ bản về các loại thiết bị hấp tiệt trùng
Cơ bản về các loại thiết bị hấp tiệt trùngCơ bản về các loại thiết bị hấp tiệt trùng
Cơ bản về các loại thiết bị hấp tiệt trùng
SMBT
 
Chăm sóc bệnh nhân đặt nội khí quản
Chăm sóc bệnh nhân đặt nội khí quản Chăm sóc bệnh nhân đặt nội khí quản
Chăm sóc bệnh nhân đặt nội khí quản
nataliej4
 
Thông khí nhân tạo trong HPQ và đợt cấp COPD
Thông khí nhân tạo trong HPQ và đợt cấp COPDThông khí nhân tạo trong HPQ và đợt cấp COPD
Thông khí nhân tạo trong HPQ và đợt cấp COPD
SỨC KHỎE VÀ CUỘC SỐNG
 
NGỘ ĐỘC CẤP AMPHETAMINE VÀ CATHINONE TỔNG HỢP.pdf
NGỘ ĐỘC CẤP AMPHETAMINE VÀ CATHINONE TỔNG  HỢP.pdfNGỘ ĐỘC CẤP AMPHETAMINE VÀ CATHINONE TỔNG  HỢP.pdf
NGỘ ĐỘC CẤP AMPHETAMINE VÀ CATHINONE TỔNG HỢP.pdf
Bs. Nhữ Thu Hà
 
OXY LIỆU PHÁP, HFNC VÀ NỘI KHÍ QUẢN Ở BỆNH NHÂN COVID 19
OXY LIỆU PHÁP, HFNC VÀ NỘI KHÍ QUẢN Ở BỆNH NHÂN COVID 19OXY LIỆU PHÁP, HFNC VÀ NỘI KHÍ QUẢN Ở BỆNH NHÂN COVID 19
OXY LIỆU PHÁP, HFNC VÀ NỘI KHÍ QUẢN Ở BỆNH NHÂN COVID 19
SoM
 
XSS & SQL injection
XSS & SQL injectionXSS & SQL injection
XSS & SQL injection
Thieu Mao
 
Tim hieu ve lo hong web va cach phong chong
Tim hieu ve lo hong web va cach phong chongTim hieu ve lo hong web va cach phong chong
Tim hieu ve lo hong web va cach phong chongVu Trung Kien
 
Benh viem loet da day ta trang
Benh viem loet da day ta trangBenh viem loet da day ta trang
Benh viem loet da day ta trangkelvinannam
 
SSRF workshop
SSRF workshop SSRF workshop
SSRF workshop
Ivan Novikov
 
TÂY Y - KHÁM VÀ LÀM BỆNH ÁN TIM MẠCH
TÂY Y - KHÁM VÀ LÀM BỆNH ÁN TIM MẠCHTÂY Y - KHÁM VÀ LÀM BỆNH ÁN TIM MẠCH
TÂY Y - KHÁM VÀ LÀM BỆNH ÁN TIM MẠCH
Great Doctor
 
Sinh lý máu
Sinh lý máuSinh lý máu
Sinh lý máu
Lam Nguyen
 
CHẨN ĐOÁN VÀ XỬ TRÍ SỐC
CHẨN ĐOÁN VÀ XỬ TRÍ SỐCCHẨN ĐOÁN VÀ XỬ TRÍ SỐC
CHẨN ĐOÁN VÀ XỬ TRÍ SỐC
Pham Dzung
 
8.1.2014 chien luoc cssk nhan dan
8.1.2014 chien luoc cssk nhan dan8.1.2014 chien luoc cssk nhan dan
8.1.2014 chien luoc cssk nhan danGia Hue Dinh
 
HVQY | Sinh lý bệnh | Hô hấp
HVQY | Sinh lý bệnh | Hô hấpHVQY | Sinh lý bệnh | Hô hấp
HVQY | Sinh lý bệnh | Hô hấp
Hồng Hạnh
 
Sinh ly he noi tiet
Sinh ly he noi tietSinh ly he noi tiet
Sinh ly he noi tiet
Vũ Thanh
 
Thay doi hanh vi
Thay doi hanh viThay doi hanh vi
Thay doi hanh vi
Câu Lạc Bộ Trăng Non
 
CNIT 127: Ch 18: Source Code Auditing
CNIT 127: Ch 18: Source Code AuditingCNIT 127: Ch 18: Source Code Auditing
CNIT 127: Ch 18: Source Code Auditing
Sam Bowne
 
CẬP NHẬT NHIỄM KHUẨN HUYẾT
CẬP NHẬT NHIỄM KHUẨN HUYẾTCẬP NHẬT NHIỄM KHUẨN HUYẾT
CẬP NHẬT NHIỄM KHUẨN HUYẾT
SoM
 

What's hot (20)

Cơ bản về các loại thiết bị hấp tiệt trùng
Cơ bản về các loại thiết bị hấp tiệt trùngCơ bản về các loại thiết bị hấp tiệt trùng
Cơ bản về các loại thiết bị hấp tiệt trùng
 
Chăm sóc bệnh nhân đặt nội khí quản
Chăm sóc bệnh nhân đặt nội khí quản Chăm sóc bệnh nhân đặt nội khí quản
Chăm sóc bệnh nhân đặt nội khí quản
 
Thông khí nhân tạo trong HPQ và đợt cấp COPD
Thông khí nhân tạo trong HPQ và đợt cấp COPDThông khí nhân tạo trong HPQ và đợt cấp COPD
Thông khí nhân tạo trong HPQ và đợt cấp COPD
 
NGỘ ĐỘC CẤP AMPHETAMINE VÀ CATHINONE TỔNG HỢP.pdf
NGỘ ĐỘC CẤP AMPHETAMINE VÀ CATHINONE TỔNG  HỢP.pdfNGỘ ĐỘC CẤP AMPHETAMINE VÀ CATHINONE TỔNG  HỢP.pdf
NGỘ ĐỘC CẤP AMPHETAMINE VÀ CATHINONE TỔNG HỢP.pdf
 
Mau va bach huyet p1
Mau va bach huyet p1Mau va bach huyet p1
Mau va bach huyet p1
 
OXY LIỆU PHÁP, HFNC VÀ NỘI KHÍ QUẢN Ở BỆNH NHÂN COVID 19
OXY LIỆU PHÁP, HFNC VÀ NỘI KHÍ QUẢN Ở BỆNH NHÂN COVID 19OXY LIỆU PHÁP, HFNC VÀ NỘI KHÍ QUẢN Ở BỆNH NHÂN COVID 19
OXY LIỆU PHÁP, HFNC VÀ NỘI KHÍ QUẢN Ở BỆNH NHÂN COVID 19
 
XSS & SQL injection
XSS & SQL injectionXSS & SQL injection
XSS & SQL injection
 
Tim hieu ve lo hong web va cach phong chong
Tim hieu ve lo hong web va cach phong chongTim hieu ve lo hong web va cach phong chong
Tim hieu ve lo hong web va cach phong chong
 
Benh viem loet da day ta trang
Benh viem loet da day ta trangBenh viem loet da day ta trang
Benh viem loet da day ta trang
 
SSRF workshop
SSRF workshop SSRF workshop
SSRF workshop
 
TÂY Y - KHÁM VÀ LÀM BỆNH ÁN TIM MẠCH
TÂY Y - KHÁM VÀ LÀM BỆNH ÁN TIM MẠCHTÂY Y - KHÁM VÀ LÀM BỆNH ÁN TIM MẠCH
TÂY Y - KHÁM VÀ LÀM BỆNH ÁN TIM MẠCH
 
Sinh lý máu
Sinh lý máuSinh lý máu
Sinh lý máu
 
CHẨN ĐOÁN VÀ XỬ TRÍ SỐC
CHẨN ĐOÁN VÀ XỬ TRÍ SỐCCHẨN ĐOÁN VÀ XỬ TRÍ SỐC
CHẨN ĐOÁN VÀ XỬ TRÍ SỐC
 
8.1.2014 chien luoc cssk nhan dan
8.1.2014 chien luoc cssk nhan dan8.1.2014 chien luoc cssk nhan dan
8.1.2014 chien luoc cssk nhan dan
 
Cham soc tre so sinh sau sanh
Cham soc tre so sinh sau sanhCham soc tre so sinh sau sanh
Cham soc tre so sinh sau sanh
 
HVQY | Sinh lý bệnh | Hô hấp
HVQY | Sinh lý bệnh | Hô hấpHVQY | Sinh lý bệnh | Hô hấp
HVQY | Sinh lý bệnh | Hô hấp
 
Sinh ly he noi tiet
Sinh ly he noi tietSinh ly he noi tiet
Sinh ly he noi tiet
 
Thay doi hanh vi
Thay doi hanh viThay doi hanh vi
Thay doi hanh vi
 
CNIT 127: Ch 18: Source Code Auditing
CNIT 127: Ch 18: Source Code AuditingCNIT 127: Ch 18: Source Code Auditing
CNIT 127: Ch 18: Source Code Auditing
 
CẬP NHẬT NHIỄM KHUẨN HUYẾT
CẬP NHẬT NHIỄM KHUẨN HUYẾTCẬP NHẬT NHIỄM KHUẨN HUYẾT
CẬP NHẬT NHIỄM KHUẨN HUYẾT
 

Viewers also liked

20150314 - Functional Testing for Configuration Management @ Cascadia IT Con...
20150314  - Functional Testing for Configuration Management @ Cascadia IT Con...20150314  - Functional Testing for Configuration Management @ Cascadia IT Con...
20150314 - Functional Testing for Configuration Management @ Cascadia IT Con...
garrett honeycutt
 
Configuration testing
Configuration testingConfiguration testing
Configuration testingfarouq umar
 
A2 - broken authentication and session management(OWASP thailand chapter Apri...
A2 - broken authentication and session management(OWASP thailand chapter Apri...A2 - broken authentication and session management(OWASP thailand chapter Apri...
A2 - broken authentication and session management(OWASP thailand chapter Apri...
Noppadol Songsakaew
 
Configuration testing
Configuration testingConfiguration testing
Configuration testingRobin0590
 
Configuration testing
Configuration testingConfiguration testing
Configuration testing
Precise Testing Solution
 
Software testing ppt
Software testing pptSoftware testing ppt
Software testing ppt
Heritage Institute Of Tech,India
 

Viewers also liked (6)

20150314 - Functional Testing for Configuration Management @ Cascadia IT Con...
20150314  - Functional Testing for Configuration Management @ Cascadia IT Con...20150314  - Functional Testing for Configuration Management @ Cascadia IT Con...
20150314 - Functional Testing for Configuration Management @ Cascadia IT Con...
 
Configuration testing
Configuration testingConfiguration testing
Configuration testing
 
A2 - broken authentication and session management(OWASP thailand chapter Apri...
A2 - broken authentication and session management(OWASP thailand chapter Apri...A2 - broken authentication and session management(OWASP thailand chapter Apri...
A2 - broken authentication and session management(OWASP thailand chapter Apri...
 
Configuration testing
Configuration testingConfiguration testing
Configuration testing
 
Configuration testing
Configuration testingConfiguration testing
Configuration testing
 
Software testing ppt
Software testing pptSoftware testing ppt
Software testing ppt
 

Similar to OWASP OTG-configuration (OWASP Thailand chapter november 2015)

OWASP Testing Guide 4.0
OWASP Testing Guide 4.0OWASP Testing Guide 4.0
OWASP Testing Guide 4.0
cassandranna
 
Owasp testing guide_v4
Owasp testing guide_v4Owasp testing guide_v4
Owasp testing guide_v4
Nguyen Van Duy
 
Owasp testing guide_v4
Owasp testing guide_v4Owasp testing guide_v4
Owasp testing guide_v4
Suresh Kumar
 
VCS_QAPerformanceSlides
VCS_QAPerformanceSlidesVCS_QAPerformanceSlides
VCS_QAPerformanceSlidesMichael Cowan
 
Performance testing jmeter
Performance testing jmeterPerformance testing jmeter
Performance testing jmeterBhojan Rajan
 
security misconfigurations
security misconfigurationssecurity misconfigurations
security misconfigurations
Megha Sahu
 
[Wroclaw #5] OWASP Projects: beyond Top 10
[Wroclaw #5] OWASP Projects: beyond Top 10[Wroclaw #5] OWASP Projects: beyond Top 10
[Wroclaw #5] OWASP Projects: beyond Top 10
OWASP
 
The QA/Testing Process
The QA/Testing ProcessThe QA/Testing Process
The QA/Testing Process
Synerzip
 
Compliance as Code
Compliance as CodeCompliance as Code
Compliance as Code
Paul Czarkowski
 
Pm 6 testing
Pm 6 testingPm 6 testing
Pm 6 testing
Radiant Minds
 
Context Driven Automation Gtac 2008
Context Driven Automation Gtac 2008Context Driven Automation Gtac 2008
Context Driven Automation Gtac 2008
Pete Schneider
 
Introduction to OWASP
Introduction to OWASPIntroduction to OWASP
Introduction to OWASP
Thomas F. "T.J." Maher Jr.
 
Java EE 6 Security in practice with GlassFish
Java EE 6 Security in practice with GlassFishJava EE 6 Security in practice with GlassFish
Java EE 6 Security in practice with GlassFish
Markus Eisele
 
Web application vulnerability assessment
Web application vulnerability assessmentWeb application vulnerability assessment
Web application vulnerability assessment
Ravikumar Paghdal
 
Maximizing Oracle RAC Uptime
Maximizing Oracle RAC UptimeMaximizing Oracle RAC Uptime
Maximizing Oracle RAC Uptime
Markus Michalewicz
 
Slides for the #JavaOne Session ID: CON11881
Slides for the #JavaOne Session ID: CON11881Slides for the #JavaOne Session ID: CON11881
Slides for the #JavaOne Session ID: CON11881
Masoud Kalali
 
Wellington MuleSoft Meetup 2021-02-18
Wellington MuleSoft Meetup 2021-02-18Wellington MuleSoft Meetup 2021-02-18
Wellington MuleSoft Meetup 2021-02-18
Mary Joy Sabal
 
Testing types functional and nonfunctional - Kati Holasz
Testing types   functional and nonfunctional - Kati HolaszTesting types   functional and nonfunctional - Kati Holasz
Testing types functional and nonfunctional - Kati Holasz
Holasz Kati
 

Similar to OWASP OTG-configuration (OWASP Thailand chapter november 2015) (20)

OWASP Testing Guide 4.0
OWASP Testing Guide 4.0OWASP Testing Guide 4.0
OWASP Testing Guide 4.0
 
Owasp testing guide_v4
Owasp testing guide_v4Owasp testing guide_v4
Owasp testing guide_v4
 
Owasp testing guide_v4
Owasp testing guide_v4Owasp testing guide_v4
Owasp testing guide_v4
 
VCS_QAPerformanceSlides
VCS_QAPerformanceSlidesVCS_QAPerformanceSlides
VCS_QAPerformanceSlides
 
Performance testing jmeter
Performance testing jmeterPerformance testing jmeter
Performance testing jmeter
 
security misconfigurations
security misconfigurationssecurity misconfigurations
security misconfigurations
 
[Wroclaw #5] OWASP Projects: beyond Top 10
[Wroclaw #5] OWASP Projects: beyond Top 10[Wroclaw #5] OWASP Projects: beyond Top 10
[Wroclaw #5] OWASP Projects: beyond Top 10
 
The QA/Testing Process
The QA/Testing ProcessThe QA/Testing Process
The QA/Testing Process
 
Compliance as Code
Compliance as CodeCompliance as Code
Compliance as Code
 
Pm 6 testing
Pm 6 testingPm 6 testing
Pm 6 testing
 
Pm 6 testing
Pm 6 testingPm 6 testing
Pm 6 testing
 
Context Driven Automation Gtac 2008
Context Driven Automation Gtac 2008Context Driven Automation Gtac 2008
Context Driven Automation Gtac 2008
 
Cache Security- The Basics
Cache Security- The BasicsCache Security- The Basics
Cache Security- The Basics
 
Introduction to OWASP
Introduction to OWASPIntroduction to OWASP
Introduction to OWASP
 
Java EE 6 Security in practice with GlassFish
Java EE 6 Security in practice with GlassFishJava EE 6 Security in practice with GlassFish
Java EE 6 Security in practice with GlassFish
 
Web application vulnerability assessment
Web application vulnerability assessmentWeb application vulnerability assessment
Web application vulnerability assessment
 
Maximizing Oracle RAC Uptime
Maximizing Oracle RAC UptimeMaximizing Oracle RAC Uptime
Maximizing Oracle RAC Uptime
 
Slides for the #JavaOne Session ID: CON11881
Slides for the #JavaOne Session ID: CON11881Slides for the #JavaOne Session ID: CON11881
Slides for the #JavaOne Session ID: CON11881
 
Wellington MuleSoft Meetup 2021-02-18
Wellington MuleSoft Meetup 2021-02-18Wellington MuleSoft Meetup 2021-02-18
Wellington MuleSoft Meetup 2021-02-18
 
Testing types functional and nonfunctional - Kati Holasz
Testing types   functional and nonfunctional - Kati HolaszTesting types   functional and nonfunctional - Kati Holasz
Testing types functional and nonfunctional - Kati Holasz
 

Recently uploaded

Epistemic Interaction - tuning interfaces to provide information for AI support
Epistemic Interaction - tuning interfaces to provide information for AI supportEpistemic Interaction - tuning interfaces to provide information for AI support
Epistemic Interaction - tuning interfaces to provide information for AI support
Alan Dix
 
Encryption in Microsoft 365 - ExpertsLive Netherlands 2024
Encryption in Microsoft 365 - ExpertsLive Netherlands 2024Encryption in Microsoft 365 - ExpertsLive Netherlands 2024
Encryption in Microsoft 365 - ExpertsLive Netherlands 2024
Albert Hoitingh
 
From Daily Decisions to Bottom Line: Connecting Product Work to Revenue by VP...
From Daily Decisions to Bottom Line: Connecting Product Work to Revenue by VP...From Daily Decisions to Bottom Line: Connecting Product Work to Revenue by VP...
From Daily Decisions to Bottom Line: Connecting Product Work to Revenue by VP...
Product School
 
Securing your Kubernetes cluster_ a step-by-step guide to success !
Securing your Kubernetes cluster_ a step-by-step guide to success !Securing your Kubernetes cluster_ a step-by-step guide to success !
Securing your Kubernetes cluster_ a step-by-step guide to success !
KatiaHIMEUR1
 
The Art of the Pitch: WordPress Relationships and Sales
The Art of the Pitch: WordPress Relationships and SalesThe Art of the Pitch: WordPress Relationships and Sales
The Art of the Pitch: WordPress Relationships and Sales
Laura Byrne
 
To Graph or Not to Graph Knowledge Graph Architectures and LLMs
To Graph or Not to Graph Knowledge Graph Architectures and LLMsTo Graph or Not to Graph Knowledge Graph Architectures and LLMs
To Graph or Not to Graph Knowledge Graph Architectures and LLMs
Paul Groth
 
LF Energy Webinar: Electrical Grid Modelling and Simulation Through PowSyBl -...
LF Energy Webinar: Electrical Grid Modelling and Simulation Through PowSyBl -...LF Energy Webinar: Electrical Grid Modelling and Simulation Through PowSyBl -...
LF Energy Webinar: Electrical Grid Modelling and Simulation Through PowSyBl -...
DanBrown980551
 
State of ICS and IoT Cyber Threat Landscape Report 2024 preview
State of ICS and IoT Cyber Threat Landscape Report 2024 previewState of ICS and IoT Cyber Threat Landscape Report 2024 preview
State of ICS and IoT Cyber Threat Landscape Report 2024 preview
Prayukth K V
 
Generating a custom Ruby SDK for your web service or Rails API using Smithy
Generating a custom Ruby SDK for your web service or Rails API using SmithyGenerating a custom Ruby SDK for your web service or Rails API using Smithy
Generating a custom Ruby SDK for your web service or Rails API using Smithy
g2nightmarescribd
 
FIDO Alliance Osaka Seminar: The WebAuthn API and Discoverable Credentials.pdf
FIDO Alliance Osaka Seminar: The WebAuthn API and Discoverable Credentials.pdfFIDO Alliance Osaka Seminar: The WebAuthn API and Discoverable Credentials.pdf
FIDO Alliance Osaka Seminar: The WebAuthn API and Discoverable Credentials.pdf
FIDO Alliance
 
Connector Corner: Automate dynamic content and events by pushing a button
Connector Corner: Automate dynamic content and events by pushing a buttonConnector Corner: Automate dynamic content and events by pushing a button
Connector Corner: Automate dynamic content and events by pushing a button
DianaGray10
 
FIDO Alliance Osaka Seminar: Passkeys and the Road Ahead.pdf
FIDO Alliance Osaka Seminar: Passkeys and the Road Ahead.pdfFIDO Alliance Osaka Seminar: Passkeys and the Road Ahead.pdf
FIDO Alliance Osaka Seminar: Passkeys and the Road Ahead.pdf
FIDO Alliance
 
When stars align: studies in data quality, knowledge graphs, and machine lear...
When stars align: studies in data quality, knowledge graphs, and machine lear...When stars align: studies in data quality, knowledge graphs, and machine lear...
When stars align: studies in data quality, knowledge graphs, and machine lear...
Elena Simperl
 
Mission to Decommission: Importance of Decommissioning Products to Increase E...
Mission to Decommission: Importance of Decommissioning Products to Increase E...Mission to Decommission: Importance of Decommissioning Products to Increase E...
Mission to Decommission: Importance of Decommissioning Products to Increase E...
Product School
 
Designing Great Products: The Power of Design and Leadership by Chief Designe...
Designing Great Products: The Power of Design and Leadership by Chief Designe...Designing Great Products: The Power of Design and Leadership by Chief Designe...
Designing Great Products: The Power of Design and Leadership by Chief Designe...
Product School
 
GenAISummit 2024 May 28 Sri Ambati Keynote: AGI Belongs to The Community in O...
GenAISummit 2024 May 28 Sri Ambati Keynote: AGI Belongs to The Community in O...GenAISummit 2024 May 28 Sri Ambati Keynote: AGI Belongs to The Community in O...
GenAISummit 2024 May 28 Sri Ambati Keynote: AGI Belongs to The Community in O...
Sri Ambati
 
Essentials of Automations: Optimizing FME Workflows with Parameters
Essentials of Automations: Optimizing FME Workflows with ParametersEssentials of Automations: Optimizing FME Workflows with Parameters
Essentials of Automations: Optimizing FME Workflows with Parameters
Safe Software
 
Transcript: Selling digital books in 2024: Insights from industry leaders - T...
Transcript: Selling digital books in 2024: Insights from industry leaders - T...Transcript: Selling digital books in 2024: Insights from industry leaders - T...
Transcript: Selling digital books in 2024: Insights from industry leaders - T...
BookNet Canada
 
Empowering NextGen Mobility via Large Action Model Infrastructure (LAMI): pav...
Empowering NextGen Mobility via Large Action Model Infrastructure (LAMI): pav...Empowering NextGen Mobility via Large Action Model Infrastructure (LAMI): pav...
Empowering NextGen Mobility via Large Action Model Infrastructure (LAMI): pav...
Thierry Lestable
 
How world-class product teams are winning in the AI era by CEO and Founder, P...
How world-class product teams are winning in the AI era by CEO and Founder, P...How world-class product teams are winning in the AI era by CEO and Founder, P...
How world-class product teams are winning in the AI era by CEO and Founder, P...
Product School
 

Recently uploaded (20)

Epistemic Interaction - tuning interfaces to provide information for AI support
Epistemic Interaction - tuning interfaces to provide information for AI supportEpistemic Interaction - tuning interfaces to provide information for AI support
Epistemic Interaction - tuning interfaces to provide information for AI support
 
Encryption in Microsoft 365 - ExpertsLive Netherlands 2024
Encryption in Microsoft 365 - ExpertsLive Netherlands 2024Encryption in Microsoft 365 - ExpertsLive Netherlands 2024
Encryption in Microsoft 365 - ExpertsLive Netherlands 2024
 
From Daily Decisions to Bottom Line: Connecting Product Work to Revenue by VP...
From Daily Decisions to Bottom Line: Connecting Product Work to Revenue by VP...From Daily Decisions to Bottom Line: Connecting Product Work to Revenue by VP...
From Daily Decisions to Bottom Line: Connecting Product Work to Revenue by VP...
 
Securing your Kubernetes cluster_ a step-by-step guide to success !
Securing your Kubernetes cluster_ a step-by-step guide to success !Securing your Kubernetes cluster_ a step-by-step guide to success !
Securing your Kubernetes cluster_ a step-by-step guide to success !
 
The Art of the Pitch: WordPress Relationships and Sales
The Art of the Pitch: WordPress Relationships and SalesThe Art of the Pitch: WordPress Relationships and Sales
The Art of the Pitch: WordPress Relationships and Sales
 
To Graph or Not to Graph Knowledge Graph Architectures and LLMs
To Graph or Not to Graph Knowledge Graph Architectures and LLMsTo Graph or Not to Graph Knowledge Graph Architectures and LLMs
To Graph or Not to Graph Knowledge Graph Architectures and LLMs
 
LF Energy Webinar: Electrical Grid Modelling and Simulation Through PowSyBl -...
LF Energy Webinar: Electrical Grid Modelling and Simulation Through PowSyBl -...LF Energy Webinar: Electrical Grid Modelling and Simulation Through PowSyBl -...
LF Energy Webinar: Electrical Grid Modelling and Simulation Through PowSyBl -...
 
State of ICS and IoT Cyber Threat Landscape Report 2024 preview
State of ICS and IoT Cyber Threat Landscape Report 2024 previewState of ICS and IoT Cyber Threat Landscape Report 2024 preview
State of ICS and IoT Cyber Threat Landscape Report 2024 preview
 
Generating a custom Ruby SDK for your web service or Rails API using Smithy
Generating a custom Ruby SDK for your web service or Rails API using SmithyGenerating a custom Ruby SDK for your web service or Rails API using Smithy
Generating a custom Ruby SDK for your web service or Rails API using Smithy
 
FIDO Alliance Osaka Seminar: The WebAuthn API and Discoverable Credentials.pdf
FIDO Alliance Osaka Seminar: The WebAuthn API and Discoverable Credentials.pdfFIDO Alliance Osaka Seminar: The WebAuthn API and Discoverable Credentials.pdf
FIDO Alliance Osaka Seminar: The WebAuthn API and Discoverable Credentials.pdf
 
Connector Corner: Automate dynamic content and events by pushing a button
Connector Corner: Automate dynamic content and events by pushing a buttonConnector Corner: Automate dynamic content and events by pushing a button
Connector Corner: Automate dynamic content and events by pushing a button
 
FIDO Alliance Osaka Seminar: Passkeys and the Road Ahead.pdf
FIDO Alliance Osaka Seminar: Passkeys and the Road Ahead.pdfFIDO Alliance Osaka Seminar: Passkeys and the Road Ahead.pdf
FIDO Alliance Osaka Seminar: Passkeys and the Road Ahead.pdf
 
When stars align: studies in data quality, knowledge graphs, and machine lear...
When stars align: studies in data quality, knowledge graphs, and machine lear...When stars align: studies in data quality, knowledge graphs, and machine lear...
When stars align: studies in data quality, knowledge graphs, and machine lear...
 
Mission to Decommission: Importance of Decommissioning Products to Increase E...
Mission to Decommission: Importance of Decommissioning Products to Increase E...Mission to Decommission: Importance of Decommissioning Products to Increase E...
Mission to Decommission: Importance of Decommissioning Products to Increase E...
 
Designing Great Products: The Power of Design and Leadership by Chief Designe...
Designing Great Products: The Power of Design and Leadership by Chief Designe...Designing Great Products: The Power of Design and Leadership by Chief Designe...
Designing Great Products: The Power of Design and Leadership by Chief Designe...
 
GenAISummit 2024 May 28 Sri Ambati Keynote: AGI Belongs to The Community in O...
GenAISummit 2024 May 28 Sri Ambati Keynote: AGI Belongs to The Community in O...GenAISummit 2024 May 28 Sri Ambati Keynote: AGI Belongs to The Community in O...
GenAISummit 2024 May 28 Sri Ambati Keynote: AGI Belongs to The Community in O...
 
Essentials of Automations: Optimizing FME Workflows with Parameters
Essentials of Automations: Optimizing FME Workflows with ParametersEssentials of Automations: Optimizing FME Workflows with Parameters
Essentials of Automations: Optimizing FME Workflows with Parameters
 
Transcript: Selling digital books in 2024: Insights from industry leaders - T...
Transcript: Selling digital books in 2024: Insights from industry leaders - T...Transcript: Selling digital books in 2024: Insights from industry leaders - T...
Transcript: Selling digital books in 2024: Insights from industry leaders - T...
 
Empowering NextGen Mobility via Large Action Model Infrastructure (LAMI): pav...
Empowering NextGen Mobility via Large Action Model Infrastructure (LAMI): pav...Empowering NextGen Mobility via Large Action Model Infrastructure (LAMI): pav...
Empowering NextGen Mobility via Large Action Model Infrastructure (LAMI): pav...
 
How world-class product teams are winning in the AI era by CEO and Founder, P...
How world-class product teams are winning in the AI era by CEO and Founder, P...How world-class product teams are winning in the AI era by CEO and Founder, P...
How world-class product teams are winning in the AI era by CEO and Founder, P...
 

OWASP OTG-configuration (OWASP Thailand chapter november 2015)

  • 1. OTG-CONFIG OWASP Thailand Chapter (26th November 2015)
  • 2. OWASP Testing Guide: Configuration and Deployment Management Testing 2 Who am I • Noppadol Songsakaew - IT security enthusiastic - gamer (play on smartphone) - book reader (IT, Chinese novel) • Work Senior Associate at PwC (Thailand)
  • 3. OWASP Testing Guide: Configuration and Deployment Management Testing 3 Who is this talk for ? • Developers • Software Testers • Security Guys • Project Managers sir! • Anyone who interesting in IT security
  • 4. OWASP Testing Guide: Configuration and Deployment Management Testing 4 Objective of this talk To build the testing knowledge of : • Network & Infrastructure configuration • Web server configuration • Sensitive data handling • Application protocol • Cross domain policy
  • 5. OWASP Testing Guide: Configuration and Deployment Management Testing 5 and Why would you care ? Only one broken chain link will let the malicious user compromise your servers.
  • 6. OWASP Testing Guide: Configuration and Deployment Management Testing 6 “You can’t build a secure application without performing security testing on it. Testing is part of a wider approach to building a secure system.” - Eoin Keary, OWASP Global Board What is OWASP Testing Guide
  • 7. OWASP Testing Guide: Configuration and Deployment Management Testing 7 Agenda 1. Test Network/Infrastructure Configuration (OTG-CONFIG-001) 2. Test Application Platform Configuration (OTG-CONFIG-002) 3. Test File Extensions Handling for Sensitive Information (OTG- CONFIG-003) 4. Review Old, Backup and Unreferenced Files for Sensitive Information (OTG-CONFIG-004) 5. Enumerate Infrastructure and Application Admin Interfaces (OTG-CONFIG-005) 6. Test HTTP Methods (OTG-CONFIG-006) 7. Test HTTP Strict Transport Security (OTG-CONFIG-007) 8. Test RIA cross domain policy (OTG-CONFIG-008)
  • 8. OWASP Testing Guide: Configuration and Deployment Management Testing 8 1. Test Network/Infrastructure Configuration (OTG-CONFIG-001) Test Objectives • To map the infrastructure supporting the application and understand how it affects the security of the application.
  • 9. OWASP Testing Guide: Configuration and Deployment Management Testing 9 1. Test Network/Infrastructure Configuration (OTG-CONFIG-001) How to test • Known Server Vulnerabilities – Not all software vendors disclose vulnerabilities in a public way. – Beware false positive from automate scanning tool. – Backporting patch Tools OpenVAS, Nessus, Core Impact, Nexpose
  • 10. OWASP Testing Guide: Configuration and Deployment Management Testing 10 1. Test Network/Infrastructure Configuration (OTG-CONFIG-001) How to test • Known Server Vulnerabilities (https://exchange.xforce.ibmcloud.com)
  • 11. OWASP Testing Guide: Configuration and Deployment Management Testing 11 1. Test Network/Infrastructure Configuration (OTG-CONFIG-001) How to test • Known Server Vulnerabilities (https://www.cvedetails.com)
  • 12. OWASP Testing Guide: Configuration and Deployment Management Testing 12 1. Test Network/Infrastructure Configuration (OTG-CONFIG-001) How to test • Review a software components – Configuration files will tell you which modules are enable or disable • Administrative tools – All web server allowed administrator to manage a web server by different ways such as plain text configuration files (in the Apache, nginx) or use operating-system GUI tools (Microsoft’s IIS server). – Determine the mechanisms that control access to these interfaces and their associated susceptibilities.
  • 13. OWASP Testing Guide: Configuration and Deployment Management Testing 13 2. Test Application Platform Configuration (OTG-CONFIG-002) Test Objectives • To assess the default configuration of installed web server and remove unnecessary files (application examples files, documentation files, test pages)
  • 14. OWASP Testing Guide: Configuration and Deployment Management Testing 14 2. Test Application Platform Configuration (OTG-CONFIG-002) How to test • Sample and known files and directories • Configuration review – Check privilege of minimized privileges in the operating system – SSL Protocol Configuration – Errors Pages Configuration – Make sure the server software properly logs both legitimate access and errors.
  • 15. OWASP Testing Guide: Configuration and Deployment Management Testing 15 2. Test Application Platform Configuration (OTG-CONFIG-002) How to test • Logging – Do the logs contain sensitive information? – Are the logs stored in a dedicated server? – Can log usage generate a Denial of Service condition? – How are they rotated? Are logs kept for the sufficient time? – How are logs reviewed? Can administrators use these reviews to detect targeted attacks? – How are log backups preserved? – Is the data being logged data validated (min/max length, chars etc) prior to being logged?
  • 16. OWASP Testing Guide: Configuration and Deployment Management Testing 16 3. Test File Extensions Handling for Sensitive Information (OTG-CONFIG-003) Test Objectives • To test the behaviour of each extension to assess that when users access our pages what kind of information display to users
  • 17. OWASP Testing Guide: Configuration and Deployment Management Testing 17 3. Test File Extensions Handling for Sensitive Information (OTG-CONFIG-003) How to test • Forced browsing Example: The tester has identified the existence of a file named connection.inc. Trying to access it directly gives back its contents, which is
  • 18. OWASP Testing Guide: Configuration and Deployment Management Testing 18 3. Test File Extensions Handling for Sensitive Information (OTG-CONFIG-003) How to test • Make sure you check all below file extensions: .zip, .tar, .gz, .tgz, .rar: (Compressed) archive files .java: No reason to provide access to Java source files .txt: Text files .pdf: PDF documents .docx, .rtf, .xls, .pptx,: Office documents .bak, .old and other extensions indicative of backup files
  • 19. OWASP Testing Guide: Configuration and Deployment Management Testing 19 3. Test File Extensions Handling for Sensitive Information (OTG-CONFIG-003) Example:
  • 20. OWASP Testing Guide: Configuration and Deployment Management Testing 20 4. Review Old Backup and Unreferenced Files for Sensitive Information (OTG-CONFIG-004) Test Objectives • To find sensitive information from files that left on a server
  • 21. OWASP Testing Guide: Configuration and Deployment Management Testing 21 4. Review Old Backup and Unreferenced Files for Sensitive Information (OTG-CONFIG-004) How to test • Check from the public contents - Comment in source-code - Java script connected to related page -/robots.txt
  • 22. OWASP Testing Guide: Configuration and Deployment Management Testing 22 4. Review Old Backup and Unreferenced Files for Sensitive Information (OTG-CONFIG-004) How to test • Blind guessing - For example, if a page ’viewuser.asp’ is found, then look also for ‘edituser.aspx’. - If ‘/app/user’ is found, then an attacker will look also for ’/app/admin’ and ‘/app/manager’. - Using Dictionary or brute forcing a directory paths and files on a web server Tools ‘Wfuzz’, ‘Burp (Intruder)’, ‘ZAP’
  • 23. OWASP Testing Guide: Configuration and Deployment Management Testing 23 4. Review Old Backup and Unreferenced Files for Sensitive Information (OTG-CONFIG-004) How to test • Information obtained through server vulnerabilities and misconfiguration - Directory listing Vulnerability
  • 24. OWASP Testing Guide: Configuration and Deployment Management Testing 24 5. Enumerate Infrastructure and Application Admin Interfaces (OTG-CONFIG-005) Test Objectives • To discover administrator interfaces and accessing functionalities intended for the privileged users.
  • 25. OWASP Testing Guide: Configuration and Deployment Management Testing 25 5. Enumerate Infrastructure and Application Admin Interfaces (OTG-CONFIG-005) How to test - Reviewing server and application documentation - Directory and file enumeration by searching for: /admin or /administrator - Publicly available information. Many applications such as wordpress have default administrative interfaces. - Alternative server port. Administration interfaces may be seen on a different port on the host than the main application. For example, Apache Tomcat's Administration interface can often be seen on port 8080. - Clue from cookie information:
  • 26. OWASP Testing Guide: Configuration and Deployment Management Testing 26 5. Enumerate Infrastructure and Application Admin Interfaces (OTG-CONFIG-005)
  • 27. OWASP Testing Guide: Configuration and Deployment Management Testing 27 6. Test HTTP Methods (OTG-CONFIG-006) Test Objectives • To check that how a web server handles different type of HTTP Methods
  • 28. OWASP Testing Guide: Configuration and Deployment Management Testing 28 6. Test HTTP Methods (OTG-CONFIG-006) What is HTTP Methods The method that indicates the desired action to be performed on the identified resource at the web server.
  • 29. OWASP Testing Guide: Configuration and Deployment Management Testing 29 6. Test HTTP Methods (OTG-CONFIG-006) What is HTTP Methods to indicate the desired action to be performed on the identified resource. There are 8 methods in HTTP /1.1 1) GET: Requests a representation of the specified resource. 2) POST: Requests that a web server accepts and stores the data enclosed in the body of the request message. 3) HEAD : Request a resource and response identical to the one that would correspond to a GET request, but without the response body 4) PUT : This method allows a client to upload new files on the web server.
  • 30. OWASP Testing Guide: Configuration and Deployment Management Testing 30 6. Test HTTP Methods (OTG-CONFIG-006) What is HTTP Methods The method that indicates the desired action to be performed on the identified resource at the web server. There are 8 methods in HTTP /1.1 (cont..) 5) DELETE: This method allows a client to delete a file on the web server. 6) TRACE: This method simply echoes back to the client whatever string has been sent to the server, and is used mainly for debugging purposes. 7) OPTIONS: The OPTIONS method returns the HTTP methods that the server supports for the specified URL 8) CONNECT: This method could allow a client to use the web server as a proxy
  • 31. OWASP Testing Guide: Configuration and Deployment Management Testing 31 6. Test HTTP Methods (OTG-CONFIG-006) How to test - Using ‘Nmap’ to list supported methods
  • 32. OWASP Testing Guide: Configuration and Deployment Management Testing 32 6. Test HTTP Methods (OTG-CONFIG-006) How to test - Using ‘netcat’
  • 33. OWASP Testing Guide: Configuration and Deployment Management Testing 33 7. Test HTTP Strict Transport Security (OTG-CONFIG-007) Test Objectives • To verify that a web server always exchange an information with web browser over HTTPS.
  • 34. OWASP Testing Guide: Configuration and Deployment Management Testing 34 7. Test HTTP Strict Transport Security (OTG-CONFIG-007) How to test • Testing for the presence of HSTS header can be done by checking for the existence of the HSTS header in the server's response in an interception proxy, or by using curl as follows: curl –D https://facebook.com • Expected result:
  • 35. OWASP Testing Guide: Configuration and Deployment Management Testing 35 7. Test HTTP Strict Transport Security (OTG-CONFIG-007) Example When the expiration time specified by the Strict-Transport-Security header elapses, the next attempt to load the site via HTTP will proceed as normal instead of automatically using HTTPS.
  • 36. OWASP Testing Guide: Configuration and Deployment Management Testing 36 8. Test RIA cross domain policy (OTG-CONFIG-008) What is RIA? RIA (Rich Internet Application) is a Web application that has many of the characteristics of desktop application software, typically delivered by way of a site-specific browser, a browser plug-in, extensive use of JavaScript. Example of RIA: Adobe Flash, JavaFX, and Microsoft Silverlight.
  • 37. OWASP Testing Guide: Configuration and Deployment Management Testing 37 8. Test RIA cross domain policy (OTG-CONFIG-008) What is cross domain policy? • A cross-domain policy file ("crossdomain.xml" in Flash and "clientaccesspolicy.xml" in Silverlight) defines a whitelist of domains from which a server is allowed to make cross-domain requests. When making a cross-domain request, the Flash or Silverlight client will first look for the policy file on the target server. If it is found, and the domain hosting the application is explicitly allowed to make requests, the request is made. • The crossdomain.xml file is normally present on the root of the web server.
  • 38. OWASP Testing Guide: Configuration and Deployment Management Testing 38 8. Test RIA cross domain policy (OTG-CONFIG-008) How cross domain policy really works? For example:
  • 39. OWASP Testing Guide: Configuration and Deployment Management Testing 39 8. Test RIA cross domain policy (OTG-CONFIG-008) How to test To test for RIA policy file weakness the tester should try to retrieve the policy files crossdomain.xml and clientaccesspolicy.xml from the application's root, and from every folder found. Browse to : http://www.example.com/crossdomain.xml