SlideShare a Scribd company logo
MD RIZWAN HASAN
https://www.linkedin.com/in/md-rizwan-hasan-
9230b362/
Outline
The 5 W's of Web Security
3
Why Web Security is IMP ?
4
Why Web Security is IMP ?
5
Approx 56% of all internet traffic is from an automated
source such as hacking tools, spammers, impersonators
and bots.
Why Web Security is IMP ?
6
Why we care about Security ?
Downtime
Loss of data
Business reputation loss
7
Why we care about Security ?
8
Hacking
Exploiting system vulnerabilities
Modifying system / application features
Compromising security controls
Business loss
9
Who are the actual Hackers ?
“If you know yourself but not the enemy, for every
victory gained you may also suffer a defeat.”
10
Hackers Classification
White Hat
Black Hat
Gray Hat
Script Kiddies
Suicide Hackers
Cyber Terrorists
Hacktivist
11
Hacking Phases
Reconnaissance
Scanning
Gaining Access
Maintaining Access
Clearing Track
12
Hacking Jargons
13
Hacker Jargons
Hack Value
Vulnerability
Exploit
Payload
Zero day attack
Bot
Doxing & daisy chaining
14
Attack Vectors
Attack = Motive (Goal) + Method + Vulnerability.
15
Top Attack Vectors
Botnet
Insider attack
Web application threats
Virus & worms
Mobile Threat
Phishing
Cloud Computer Threat
16
Attack
Operating System attacks
Buffer overflow vulnerability
Bugs in operating system
Un-patched operating system
Breaking file-system security
Cracking password and encryption
mechanism
Attacking built-in authentication
system
Application Level attacks
Denial-of-service attack
SQL injection attack
Cross-site scripting
Sensitive information disclosure
Session hijacking
Parameter / form tampering
Directory traversal attack
Phishing
Buffer overflow attack
17
DoS (Denial-of-Service)
18
DDoS
Distributed Denial of Service
19
DDoS Types
Volume based attack
UDP Flood
ICMP Flood
Application Layer attack
GET/POST floods
Protocol attack
SYN Flood
Ping of death attack
20
UDP Flood
21
ICMP Flood
22
SYN Flood
23
Ping of Death Attack
24
HTTP Flood Attack
25
Mark Curphey started OWASP on Sep 9,
2001.
OWASP
The Open Web Application Security Project (OWASP), an online
community, produces freely-available articles, methodologies,
documentation, tools, and technologies in the field of web application
security.
26
OWASP Top 10
OWASP Top Ten - The "Top Ten", first published in 2003, which is
regularly updated.
It aims to raise awareness about application security by
identifying some of the most critical risks facing organizations.
27
Injection
Broken Authentication
Sensitive data exposure
XML external entities.
Broken access control
Security mis-configuration
XSS
Insecure Deserialization
Using component with known
vulnerabilities.
Insufficient logging &
monitoring
OWASP Top 10 - 2017
28
A1- SQL Injection
Un-sanitized input vulnerabilities to pass SQL commands for
execution by a backend database.
It is a flaw in web application and not a DB or web server issue.
Authentication Bypass
Information Disclosure
Compromised Integrity & Availability of Data.
29
SQL Injection
30
SQL Injection Login
URL = http://demo.testfire.net/index.jsp
Username: ' or 'bug'='bug
Password: ' or 'bug'='bug
31
A2 - Broken Authentication
Password Exploitation
Predictable login credentials
Session ID in URLs
Timeout exploitation
User authentication credentials are not protected when stored.
32
A3 - Sensitive Data Exposure
Application does not protect sensitive information from being
disclosed.
Information such as passwords, credit card data, session tokens, or
other authentication credentials.
33
How to Prevent
Never store or transmit data in clear text.
Use strong, unique passwords for your applications and change them
regularly.
Use the latest encryption algorithms.
Disable autocomplete on forms that collect data.
34
A4 - XML External Entities
Application is able to parse XML input from an unreliable source
because of misconfigured XML parser.
Allows to access protected files & services.
Attacker sends malicious XML inputs containing reference to an
external entity to victim web application.
35
A5 - Broken Access Control
Exploitability - Occurs when the attacker changes the parameter
value for which he is unauthorized.
Technical impact - Privilege escalation
Insecure direct object reference - Exposure of internal
implementation objects.
36
A6 - Security Misconfiguration
Unvalidated Inputs
Parameter / form tampering
Improper error handling
Unpatched security flaws
Enabling unnecessary services
37
A7 - Cross Site Scripting
Malicious Script Execution
Exploiting user privilege
Data manipulation
Session hijacking
Brute force password cracking
Adds in hidden iframes and pop-ups
38
Stored Cross Site Scripting
39
A8 - Insecure Deserialization
Occurs when untrusted data is used to abuse the logic of an
application
Remediation
Validate the data before using it.
Use of checksum or digital signatures while transferring data b/w
two end points.
40
A9 - Using Components with
Known Vulnerabilities
Applications and APIs using components with known vulnerabilities.
Components, such as libraries, frameworks, and other software
modules, run with the same privileges as the application.
Search of vulnerabilities on exploit sites.
41
A 10 - Insufficient Logging &
Monitoring
Insufficient tracking leads to escape recording of malicious event.
It ignores important details about event.
Sufficient Content
Good format
Response plan
42
VAPT
43
Importance Of VAPT
Comprehensive Testing for Applications and Networks.
Identifies the weakest link in the chain.
Eliminates false positives and prioritizes real threats.
Detection of attack vectors missed through manual testing.
Secures against business logic flaws.
44
VAPT Approaches
Software testing type performed to evaluate the security risks in the
system.
45

More Related Content

What's hot

Cyber Security roadmap.pptx
Cyber Security roadmap.pptxCyber Security roadmap.pptx
Cyber Security roadmap.pptx
SandeepK707540
 
Cyber security by Anushka Jha
Cyber security by Anushka JhaCyber security by Anushka Jha
Cyber security by Anushka Jha
Anushka Jha
 
Basics of Cyber Security
Basics of Cyber SecurityBasics of Cyber Security
Basics of Cyber Security
Nikunj Thakkar
 
Information Security vs. Data Governance vs. Data Protection: What Is the Rea...
Information Security vs. Data Governance vs. Data Protection: What Is the Rea...Information Security vs. Data Governance vs. Data Protection: What Is the Rea...
Information Security vs. Data Governance vs. Data Protection: What Is the Rea...
PECB
 
Introduction to Cyber Security
Introduction to Cyber SecurityIntroduction to Cyber Security
Introduction to Cyber SecurityStephen Lahanas
 
Cybersecurity
CybersecurityCybersecurity
Cybersecurity
NebiyeLioul
 
Cybersecurity Fundamental Course by Haris Chughtai.pdf
Cybersecurity Fundamental Course by Haris Chughtai.pdfCybersecurity Fundamental Course by Haris Chughtai.pdf
Cybersecurity Fundamental Course by Haris Chughtai.pdf
Haris Chughtai
 
An introduction to Cyber Essentials
An introduction to Cyber EssentialsAn introduction to Cyber Essentials
An introduction to Cyber Essentials
Jisc
 
Security tools
Security toolsSecurity tools
Security tools
arfan shahzad
 
Cybersecurity 1. intro to cybersecurity
Cybersecurity 1. intro to cybersecurityCybersecurity 1. intro to cybersecurity
Cybersecurity 1. intro to cybersecurity
sommerville-videos
 
The difference between Cybersecurity and Information Security
The difference between Cybersecurity and Information SecurityThe difference between Cybersecurity and Information Security
The difference between Cybersecurity and Information Security
PECB
 
Secure Design: Threat Modeling
Secure Design: Threat ModelingSecure Design: Threat Modeling
Secure Design: Threat Modeling
Narudom Roongsiriwong, CISSP
 
Cybersecurity
CybersecurityCybersecurity
Cybersecurity
ANGIEPAEZ304
 
Cyber security
Cyber securityCyber security
Cyber security
Bhavin Shah
 
Introduction - Trend Micro Deep Security
Introduction - Trend Micro Deep SecurityIntroduction - Trend Micro Deep Security
Introduction - Trend Micro Deep Security
Andrew Wong
 
Active Directory in ICS: Lessons Learned From The Field
Active Directory in ICS: Lessons Learned From The FieldActive Directory in ICS: Lessons Learned From The Field
Active Directory in ICS: Lessons Learned From The Field
Digital Bond
 
NIST cybersecurity framework
NIST cybersecurity frameworkNIST cybersecurity framework
NIST cybersecurity framework
Shriya Rai
 
Cybersecurity trends - What to expect in 2023
Cybersecurity trends - What to expect in 2023Cybersecurity trends - What to expect in 2023
Cybersecurity trends - What to expect in 2023
PECB
 
Microsoft-CISO-Workshop-Security-Strategy-and-Program (1).pdf
Microsoft-CISO-Workshop-Security-Strategy-and-Program (1).pdfMicrosoft-CISO-Workshop-Security-Strategy-and-Program (1).pdf
Microsoft-CISO-Workshop-Security-Strategy-and-Program (1).pdf
ParishSummer
 
Cloud Security: A New Perspective
Cloud Security: A New PerspectiveCloud Security: A New Perspective
Cloud Security: A New Perspective
Wen-Pai Lu
 

What's hot (20)

Cyber Security roadmap.pptx
Cyber Security roadmap.pptxCyber Security roadmap.pptx
Cyber Security roadmap.pptx
 
Cyber security by Anushka Jha
Cyber security by Anushka JhaCyber security by Anushka Jha
Cyber security by Anushka Jha
 
Basics of Cyber Security
Basics of Cyber SecurityBasics of Cyber Security
Basics of Cyber Security
 
Information Security vs. Data Governance vs. Data Protection: What Is the Rea...
Information Security vs. Data Governance vs. Data Protection: What Is the Rea...Information Security vs. Data Governance vs. Data Protection: What Is the Rea...
Information Security vs. Data Governance vs. Data Protection: What Is the Rea...
 
Introduction to Cyber Security
Introduction to Cyber SecurityIntroduction to Cyber Security
Introduction to Cyber Security
 
Cybersecurity
CybersecurityCybersecurity
Cybersecurity
 
Cybersecurity Fundamental Course by Haris Chughtai.pdf
Cybersecurity Fundamental Course by Haris Chughtai.pdfCybersecurity Fundamental Course by Haris Chughtai.pdf
Cybersecurity Fundamental Course by Haris Chughtai.pdf
 
An introduction to Cyber Essentials
An introduction to Cyber EssentialsAn introduction to Cyber Essentials
An introduction to Cyber Essentials
 
Security tools
Security toolsSecurity tools
Security tools
 
Cybersecurity 1. intro to cybersecurity
Cybersecurity 1. intro to cybersecurityCybersecurity 1. intro to cybersecurity
Cybersecurity 1. intro to cybersecurity
 
The difference between Cybersecurity and Information Security
The difference between Cybersecurity and Information SecurityThe difference between Cybersecurity and Information Security
The difference between Cybersecurity and Information Security
 
Secure Design: Threat Modeling
Secure Design: Threat ModelingSecure Design: Threat Modeling
Secure Design: Threat Modeling
 
Cybersecurity
CybersecurityCybersecurity
Cybersecurity
 
Cyber security
Cyber securityCyber security
Cyber security
 
Introduction - Trend Micro Deep Security
Introduction - Trend Micro Deep SecurityIntroduction - Trend Micro Deep Security
Introduction - Trend Micro Deep Security
 
Active Directory in ICS: Lessons Learned From The Field
Active Directory in ICS: Lessons Learned From The FieldActive Directory in ICS: Lessons Learned From The Field
Active Directory in ICS: Lessons Learned From The Field
 
NIST cybersecurity framework
NIST cybersecurity frameworkNIST cybersecurity framework
NIST cybersecurity framework
 
Cybersecurity trends - What to expect in 2023
Cybersecurity trends - What to expect in 2023Cybersecurity trends - What to expect in 2023
Cybersecurity trends - What to expect in 2023
 
Microsoft-CISO-Workshop-Security-Strategy-and-Program (1).pdf
Microsoft-CISO-Workshop-Security-Strategy-and-Program (1).pdfMicrosoft-CISO-Workshop-Security-Strategy-and-Program (1).pdf
Microsoft-CISO-Workshop-Security-Strategy-and-Program (1).pdf
 
Cloud Security: A New Perspective
Cloud Security: A New PerspectiveCloud Security: A New Perspective
Cloud Security: A New Perspective
 

Similar to Owasp top 10 & Web vulnerabilities

Owasp top 10
Owasp top 10Owasp top 10
Owasp top 10
YasserElsnbary
 
Security workshop - Lets get our hands dirty!!
Security workshop - Lets get our hands dirty!!Security workshop - Lets get our hands dirty!!
Security workshop - Lets get our hands dirty!!
Manjyot Singh
 
Soteria Cybersecurity Healthcheck-FB01
Soteria Cybersecurity Healthcheck-FB01Soteria Cybersecurity Healthcheck-FB01
Soteria Cybersecurity Healthcheck-FB01Richard Sullivan
 
Security in the cloud protecting your cloud apps
Security in the cloud   protecting your cloud appsSecurity in the cloud   protecting your cloud apps
Security in the cloud protecting your cloud apps
Cenzic
 
owasp top 10.ppt
owasp top 10.pptowasp top 10.ppt
owasp top 10.ppt
ssuserec53e73
 
Web and Mobile Application Security
Web and Mobile Application SecurityWeb and Mobile Application Security
Web and Mobile Application Security
Prateek Jain
 
Top 10 Web App Security Risks
Top 10 Web App Security RisksTop 10 Web App Security Risks
Top 10 Web App Security Risks
Sperasoft
 
Alert logic anatomy owasp infographic
Alert logic anatomy owasp infographicAlert logic anatomy owasp infographic
Alert logic anatomy owasp infographic
CMR WORLD TECH
 
OWASP Top 10 Project
OWASP Top 10 ProjectOWASP Top 10 Project
OWASP Top 10 Project
Muhammad Shehata
 
PASTA: Risk-centric Threat Modeling
PASTA: Risk-centric Threat ModelingPASTA: Risk-centric Threat Modeling
PASTA: Risk-centric Threat Modeling
Craig Walker, CISSP
 
Cybersecurity update 12
Cybersecurity update 12Cybersecurity update 12
Cybersecurity update 12
Jim Kaplan CIA CFE
 
Discovering the Value of Verifying Web Application Security Using IBM Rationa...
Discovering the Value of Verifying Web Application Security Using IBM Rationa...Discovering the Value of Verifying Web Application Security Using IBM Rationa...
Discovering the Value of Verifying Web Application Security Using IBM Rationa...
Alan Kan
 
Vulnerability manager v1.0
Vulnerability manager v1.0Vulnerability manager v1.0
SecureWV: Exploiting Web APIs
SecureWV: Exploiting Web APIsSecureWV: Exploiting Web APIs
SecureWV: Exploiting Web APIs
ThreatReel Podcast
 
PwnSchool: Exploiting Web APIs
PwnSchool: Exploiting Web APIsPwnSchool: Exploiting Web APIs
PwnSchool: Exploiting Web APIs
ThreatReel Podcast
 
DataMindsConnect2018_SECDEVOPS
DataMindsConnect2018_SECDEVOPSDataMindsConnect2018_SECDEVOPS
DataMindsConnect2018_SECDEVOPS
Tobias Koprowski
 
Security For Application Development
Security For Application DevelopmentSecurity For Application Development
Security For Application Development
6502programmer
 
A talk on OWASP Top 10 by Mukunda Tamly
A talk on  OWASP Top 10 by Mukunda TamlyA talk on  OWASP Top 10 by Mukunda Tamly
A talk on OWASP Top 10 by Mukunda Tamly
null - The Open Security Community
 

Similar to Owasp top 10 & Web vulnerabilities (20)

Owasp top 10
Owasp top 10Owasp top 10
Owasp top 10
 
Security workshop - Lets get our hands dirty!!
Security workshop - Lets get our hands dirty!!Security workshop - Lets get our hands dirty!!
Security workshop - Lets get our hands dirty!!
 
Soteria Cybersecurity Healthcheck-FB01
Soteria Cybersecurity Healthcheck-FB01Soteria Cybersecurity Healthcheck-FB01
Soteria Cybersecurity Healthcheck-FB01
 
Secure Software Engineering
Secure Software EngineeringSecure Software Engineering
Secure Software Engineering
 
Security in the cloud protecting your cloud apps
Security in the cloud   protecting your cloud appsSecurity in the cloud   protecting your cloud apps
Security in the cloud protecting your cloud apps
 
owasp top 10.ppt
owasp top 10.pptowasp top 10.ppt
owasp top 10.ppt
 
Web and Mobile Application Security
Web and Mobile Application SecurityWeb and Mobile Application Security
Web and Mobile Application Security
 
Top 10 Web App Security Risks
Top 10 Web App Security RisksTop 10 Web App Security Risks
Top 10 Web App Security Risks
 
Alert logic anatomy owasp infographic
Alert logic anatomy owasp infographicAlert logic anatomy owasp infographic
Alert logic anatomy owasp infographic
 
OWASP Top 10 Project
OWASP Top 10 ProjectOWASP Top 10 Project
OWASP Top 10 Project
 
PASTA: Risk-centric Threat Modeling
PASTA: Risk-centric Threat ModelingPASTA: Risk-centric Threat Modeling
PASTA: Risk-centric Threat Modeling
 
Cybersecurity update 12
Cybersecurity update 12Cybersecurity update 12
Cybersecurity update 12
 
Discovering the Value of Verifying Web Application Security Using IBM Rationa...
Discovering the Value of Verifying Web Application Security Using IBM Rationa...Discovering the Value of Verifying Web Application Security Using IBM Rationa...
Discovering the Value of Verifying Web Application Security Using IBM Rationa...
 
Vulnerability manager v1.0
Vulnerability manager v1.0Vulnerability manager v1.0
Vulnerability manager v1.0
 
SecureWV: Exploiting Web APIs
SecureWV: Exploiting Web APIsSecureWV: Exploiting Web APIs
SecureWV: Exploiting Web APIs
 
OWASP -Top 5 Jagjit
OWASP -Top 5 JagjitOWASP -Top 5 Jagjit
OWASP -Top 5 Jagjit
 
PwnSchool: Exploiting Web APIs
PwnSchool: Exploiting Web APIsPwnSchool: Exploiting Web APIs
PwnSchool: Exploiting Web APIs
 
DataMindsConnect2018_SECDEVOPS
DataMindsConnect2018_SECDEVOPSDataMindsConnect2018_SECDEVOPS
DataMindsConnect2018_SECDEVOPS
 
Security For Application Development
Security For Application DevelopmentSecurity For Application Development
Security For Application Development
 
A talk on OWASP Top 10 by Mukunda Tamly
A talk on  OWASP Top 10 by Mukunda TamlyA talk on  OWASP Top 10 by Mukunda Tamly
A talk on OWASP Top 10 by Mukunda Tamly
 

Recently uploaded

Pile Foundation by Venkatesh Taduvai (Sub Geotechnical Engineering II)-conver...
Pile Foundation by Venkatesh Taduvai (Sub Geotechnical Engineering II)-conver...Pile Foundation by Venkatesh Taduvai (Sub Geotechnical Engineering II)-conver...
Pile Foundation by Venkatesh Taduvai (Sub Geotechnical Engineering II)-conver...
AJAYKUMARPUND1
 
Nuclear Power Economics and Structuring 2024
Nuclear Power Economics and Structuring 2024Nuclear Power Economics and Structuring 2024
Nuclear Power Economics and Structuring 2024
Massimo Talia
 
DESIGN A COTTON SEED SEPARATION MACHINE.docx
DESIGN A COTTON SEED SEPARATION MACHINE.docxDESIGN A COTTON SEED SEPARATION MACHINE.docx
DESIGN A COTTON SEED SEPARATION MACHINE.docx
FluxPrime1
 
Railway Signalling Principles Edition 3.pdf
Railway Signalling Principles Edition 3.pdfRailway Signalling Principles Edition 3.pdf
Railway Signalling Principles Edition 3.pdf
TeeVichai
 
Governing Equations for Fundamental Aerodynamics_Anderson2010.pdf
Governing Equations for Fundamental Aerodynamics_Anderson2010.pdfGoverning Equations for Fundamental Aerodynamics_Anderson2010.pdf
Governing Equations for Fundamental Aerodynamics_Anderson2010.pdf
WENKENLI1
 
Architectural Portfolio Sean Lockwood
Architectural Portfolio Sean LockwoodArchitectural Portfolio Sean Lockwood
Architectural Portfolio Sean Lockwood
seandesed
 
Final project report on grocery store management system..pdf
Final project report on grocery store management system..pdfFinal project report on grocery store management system..pdf
Final project report on grocery store management system..pdf
Kamal Acharya
 
NO1 Uk best vashikaran specialist in delhi vashikaran baba near me online vas...
NO1 Uk best vashikaran specialist in delhi vashikaran baba near me online vas...NO1 Uk best vashikaran specialist in delhi vashikaran baba near me online vas...
NO1 Uk best vashikaran specialist in delhi vashikaran baba near me online vas...
Amil Baba Dawood bangali
 
ethical hacking-mobile hacking methods.ppt
ethical hacking-mobile hacking methods.pptethical hacking-mobile hacking methods.ppt
ethical hacking-mobile hacking methods.ppt
Jayaprasanna4
 
The role of big data in decision making.
The role of big data in decision making.The role of big data in decision making.
The role of big data in decision making.
ankuprajapati0525
 
ASME IX(9) 2007 Full Version .pdf
ASME IX(9)  2007 Full Version       .pdfASME IX(9)  2007 Full Version       .pdf
ASME IX(9) 2007 Full Version .pdf
AhmedHussein950959
 
AP LAB PPT.pdf ap lab ppt no title specific
AP LAB PPT.pdf ap lab ppt no title specificAP LAB PPT.pdf ap lab ppt no title specific
AP LAB PPT.pdf ap lab ppt no title specific
BrazilAccount1
 
Gen AI Study Jams _ For the GDSC Leads in India.pdf
Gen AI Study Jams _ For the GDSC Leads in India.pdfGen AI Study Jams _ For the GDSC Leads in India.pdf
Gen AI Study Jams _ For the GDSC Leads in India.pdf
gdsczhcet
 
RAT: Retrieval Augmented Thoughts Elicit Context-Aware Reasoning in Long-Hori...
RAT: Retrieval Augmented Thoughts Elicit Context-Aware Reasoning in Long-Hori...RAT: Retrieval Augmented Thoughts Elicit Context-Aware Reasoning in Long-Hori...
RAT: Retrieval Augmented Thoughts Elicit Context-Aware Reasoning in Long-Hori...
thanhdowork
 
block diagram and signal flow graph representation
block diagram and signal flow graph representationblock diagram and signal flow graph representation
block diagram and signal flow graph representation
Divya Somashekar
 
CFD Simulation of By-pass Flow in a HRSG module by R&R Consult.pptx
CFD Simulation of By-pass Flow in a HRSG module by R&R Consult.pptxCFD Simulation of By-pass Flow in a HRSG module by R&R Consult.pptx
CFD Simulation of By-pass Flow in a HRSG module by R&R Consult.pptx
R&R Consult
 
Student information management system project report ii.pdf
Student information management system project report ii.pdfStudent information management system project report ii.pdf
Student information management system project report ii.pdf
Kamal Acharya
 
Top 10 Oil and Gas Projects in Saudi Arabia 2024.pdf
Top 10 Oil and Gas Projects in Saudi Arabia 2024.pdfTop 10 Oil and Gas Projects in Saudi Arabia 2024.pdf
Top 10 Oil and Gas Projects in Saudi Arabia 2024.pdf
Teleport Manpower Consultant
 
CME397 Surface Engineering- Professional Elective
CME397 Surface Engineering- Professional ElectiveCME397 Surface Engineering- Professional Elective
CME397 Surface Engineering- Professional Elective
karthi keyan
 
space technology lecture notes on satellite
space technology lecture notes on satellitespace technology lecture notes on satellite
space technology lecture notes on satellite
ongomchris
 

Recently uploaded (20)

Pile Foundation by Venkatesh Taduvai (Sub Geotechnical Engineering II)-conver...
Pile Foundation by Venkatesh Taduvai (Sub Geotechnical Engineering II)-conver...Pile Foundation by Venkatesh Taduvai (Sub Geotechnical Engineering II)-conver...
Pile Foundation by Venkatesh Taduvai (Sub Geotechnical Engineering II)-conver...
 
Nuclear Power Economics and Structuring 2024
Nuclear Power Economics and Structuring 2024Nuclear Power Economics and Structuring 2024
Nuclear Power Economics and Structuring 2024
 
DESIGN A COTTON SEED SEPARATION MACHINE.docx
DESIGN A COTTON SEED SEPARATION MACHINE.docxDESIGN A COTTON SEED SEPARATION MACHINE.docx
DESIGN A COTTON SEED SEPARATION MACHINE.docx
 
Railway Signalling Principles Edition 3.pdf
Railway Signalling Principles Edition 3.pdfRailway Signalling Principles Edition 3.pdf
Railway Signalling Principles Edition 3.pdf
 
Governing Equations for Fundamental Aerodynamics_Anderson2010.pdf
Governing Equations for Fundamental Aerodynamics_Anderson2010.pdfGoverning Equations for Fundamental Aerodynamics_Anderson2010.pdf
Governing Equations for Fundamental Aerodynamics_Anderson2010.pdf
 
Architectural Portfolio Sean Lockwood
Architectural Portfolio Sean LockwoodArchitectural Portfolio Sean Lockwood
Architectural Portfolio Sean Lockwood
 
Final project report on grocery store management system..pdf
Final project report on grocery store management system..pdfFinal project report on grocery store management system..pdf
Final project report on grocery store management system..pdf
 
NO1 Uk best vashikaran specialist in delhi vashikaran baba near me online vas...
NO1 Uk best vashikaran specialist in delhi vashikaran baba near me online vas...NO1 Uk best vashikaran specialist in delhi vashikaran baba near me online vas...
NO1 Uk best vashikaran specialist in delhi vashikaran baba near me online vas...
 
ethical hacking-mobile hacking methods.ppt
ethical hacking-mobile hacking methods.pptethical hacking-mobile hacking methods.ppt
ethical hacking-mobile hacking methods.ppt
 
The role of big data in decision making.
The role of big data in decision making.The role of big data in decision making.
The role of big data in decision making.
 
ASME IX(9) 2007 Full Version .pdf
ASME IX(9)  2007 Full Version       .pdfASME IX(9)  2007 Full Version       .pdf
ASME IX(9) 2007 Full Version .pdf
 
AP LAB PPT.pdf ap lab ppt no title specific
AP LAB PPT.pdf ap lab ppt no title specificAP LAB PPT.pdf ap lab ppt no title specific
AP LAB PPT.pdf ap lab ppt no title specific
 
Gen AI Study Jams _ For the GDSC Leads in India.pdf
Gen AI Study Jams _ For the GDSC Leads in India.pdfGen AI Study Jams _ For the GDSC Leads in India.pdf
Gen AI Study Jams _ For the GDSC Leads in India.pdf
 
RAT: Retrieval Augmented Thoughts Elicit Context-Aware Reasoning in Long-Hori...
RAT: Retrieval Augmented Thoughts Elicit Context-Aware Reasoning in Long-Hori...RAT: Retrieval Augmented Thoughts Elicit Context-Aware Reasoning in Long-Hori...
RAT: Retrieval Augmented Thoughts Elicit Context-Aware Reasoning in Long-Hori...
 
block diagram and signal flow graph representation
block diagram and signal flow graph representationblock diagram and signal flow graph representation
block diagram and signal flow graph representation
 
CFD Simulation of By-pass Flow in a HRSG module by R&R Consult.pptx
CFD Simulation of By-pass Flow in a HRSG module by R&R Consult.pptxCFD Simulation of By-pass Flow in a HRSG module by R&R Consult.pptx
CFD Simulation of By-pass Flow in a HRSG module by R&R Consult.pptx
 
Student information management system project report ii.pdf
Student information management system project report ii.pdfStudent information management system project report ii.pdf
Student information management system project report ii.pdf
 
Top 10 Oil and Gas Projects in Saudi Arabia 2024.pdf
Top 10 Oil and Gas Projects in Saudi Arabia 2024.pdfTop 10 Oil and Gas Projects in Saudi Arabia 2024.pdf
Top 10 Oil and Gas Projects in Saudi Arabia 2024.pdf
 
CME397 Surface Engineering- Professional Elective
CME397 Surface Engineering- Professional ElectiveCME397 Surface Engineering- Professional Elective
CME397 Surface Engineering- Professional Elective
 
space technology lecture notes on satellite
space technology lecture notes on satellitespace technology lecture notes on satellite
space technology lecture notes on satellite
 

Owasp top 10 & Web vulnerabilities

  • 2. Outline The 5 W's of Web Security
  • 5. 5 Approx 56% of all internet traffic is from an automated source such as hacking tools, spammers, impersonators and bots. Why Web Security is IMP ?
  • 6. 6 Why we care about Security ? Downtime Loss of data Business reputation loss
  • 7. 7 Why we care about Security ?
  • 8. 8 Hacking Exploiting system vulnerabilities Modifying system / application features Compromising security controls Business loss
  • 9. 9 Who are the actual Hackers ? “If you know yourself but not the enemy, for every victory gained you may also suffer a defeat.”
  • 10. 10 Hackers Classification White Hat Black Hat Gray Hat Script Kiddies Suicide Hackers Cyber Terrorists Hacktivist
  • 13. 13 Hacker Jargons Hack Value Vulnerability Exploit Payload Zero day attack Bot Doxing & daisy chaining
  • 14. 14 Attack Vectors Attack = Motive (Goal) + Method + Vulnerability.
  • 15. 15 Top Attack Vectors Botnet Insider attack Web application threats Virus & worms Mobile Threat Phishing Cloud Computer Threat
  • 16. 16 Attack Operating System attacks Buffer overflow vulnerability Bugs in operating system Un-patched operating system Breaking file-system security Cracking password and encryption mechanism Attacking built-in authentication system Application Level attacks Denial-of-service attack SQL injection attack Cross-site scripting Sensitive information disclosure Session hijacking Parameter / form tampering Directory traversal attack Phishing Buffer overflow attack
  • 19. 19 DDoS Types Volume based attack UDP Flood ICMP Flood Application Layer attack GET/POST floods Protocol attack SYN Flood Ping of death attack
  • 25. 25 Mark Curphey started OWASP on Sep 9, 2001. OWASP The Open Web Application Security Project (OWASP), an online community, produces freely-available articles, methodologies, documentation, tools, and technologies in the field of web application security.
  • 26. 26 OWASP Top 10 OWASP Top Ten - The "Top Ten", first published in 2003, which is regularly updated. It aims to raise awareness about application security by identifying some of the most critical risks facing organizations.
  • 27. 27 Injection Broken Authentication Sensitive data exposure XML external entities. Broken access control Security mis-configuration XSS Insecure Deserialization Using component with known vulnerabilities. Insufficient logging & monitoring OWASP Top 10 - 2017
  • 28. 28 A1- SQL Injection Un-sanitized input vulnerabilities to pass SQL commands for execution by a backend database. It is a flaw in web application and not a DB or web server issue. Authentication Bypass Information Disclosure Compromised Integrity & Availability of Data.
  • 30. 30 SQL Injection Login URL = http://demo.testfire.net/index.jsp Username: ' or 'bug'='bug Password: ' or 'bug'='bug
  • 31. 31 A2 - Broken Authentication Password Exploitation Predictable login credentials Session ID in URLs Timeout exploitation User authentication credentials are not protected when stored.
  • 32. 32 A3 - Sensitive Data Exposure Application does not protect sensitive information from being disclosed. Information such as passwords, credit card data, session tokens, or other authentication credentials.
  • 33. 33 How to Prevent Never store or transmit data in clear text. Use strong, unique passwords for your applications and change them regularly. Use the latest encryption algorithms. Disable autocomplete on forms that collect data.
  • 34. 34 A4 - XML External Entities Application is able to parse XML input from an unreliable source because of misconfigured XML parser. Allows to access protected files & services. Attacker sends malicious XML inputs containing reference to an external entity to victim web application.
  • 35. 35 A5 - Broken Access Control Exploitability - Occurs when the attacker changes the parameter value for which he is unauthorized. Technical impact - Privilege escalation Insecure direct object reference - Exposure of internal implementation objects.
  • 36. 36 A6 - Security Misconfiguration Unvalidated Inputs Parameter / form tampering Improper error handling Unpatched security flaws Enabling unnecessary services
  • 37. 37 A7 - Cross Site Scripting Malicious Script Execution Exploiting user privilege Data manipulation Session hijacking Brute force password cracking Adds in hidden iframes and pop-ups
  • 38. 38 Stored Cross Site Scripting
  • 39. 39 A8 - Insecure Deserialization Occurs when untrusted data is used to abuse the logic of an application Remediation Validate the data before using it. Use of checksum or digital signatures while transferring data b/w two end points.
  • 40. 40 A9 - Using Components with Known Vulnerabilities Applications and APIs using components with known vulnerabilities. Components, such as libraries, frameworks, and other software modules, run with the same privileges as the application. Search of vulnerabilities on exploit sites.
  • 41. 41 A 10 - Insufficient Logging & Monitoring Insufficient tracking leads to escape recording of malicious event. It ignores important details about event. Sufficient Content Good format Response plan
  • 43. 43 Importance Of VAPT Comprehensive Testing for Applications and Networks. Identifies the weakest link in the chain. Eliminates false positives and prioritizes real threats. Detection of attack vectors missed through manual testing. Secures against business logic flaws.
  • 44. 44 VAPT Approaches Software testing type performed to evaluate the security risks in the system.
  • 45. 45

Editor's Notes

  1. <number>