SlideShare a Scribd company logo
Canyourbusinesssurvivewithoutdata?
www.ebusinessmantra.com
Canyourbusinesssurvivewithoutdata?
Presented by ebusinessmantra
Canyourbusinesssurvivewithoutdata?
 ebusinessmantra --
 Web design and programming
 Web application security solutions
 Document Management Solutions
Sales of Web Vulnerability Scanner software
www.ebusinessmantra.com
Canyourbusinesssurvivewithoutdata?
 Sales of Web Vulnerability Scanner software
 Internet Business Consulting – improve
website ROI, lead generation to Customer
Service (pre-sale to post sale cycle)
Canyourbusinesssurvivewithoutdata?
 What are web applications? commonly used examples
 Why are web applications at security risk?
 Should you worry?
 Top 10 vulnerabilities (2008)
How do you minimize the risk?
www.ebusinessmantra.com
Canyourbusinesssurvivewithoutdata?
 How do you minimize the risk?
 Application Testing
 Hacking 101
Canyourbusinesssurvivewithoutdata?
 What are web applications? commonly used examples
 Why are web applications at security risk?
 Should you worry?
 Top 10 vulnerabilities (2008)
How do you minimize the risk?
www.ebusinessmantra.com
Canyourbusinesssurvivewithoutdata?
 How do you minimize the risk?
 Application Testing
 Hacking 101
Canyourbusinesssurvivewithoutdata?
 Common examples of web applications
◦ Dynamic, database driven web sites
 Two types – with and without user actions.
◦ With User Actions
 Account management (bank, financial, mortgage, …)
 Online shopping
www.ebusinessmantra.com
Canyourbusinesssurvivewithoutdata?
 Online shopping
 Online banking
 Online trading
 Web sites that ask for information
◦ Without User Actions
 Information passed through URL, hidden form fields,
cookies – without user entering data in a form
Canyourbusinesssurvivewithoutdata?
 Simple Model
www.ebusinessmantra.com
Canyourbusinesssurvivewithoutdata?
Canyourbusinesssurvivewithoutdata?
 Added Security around components
www.ebusinessmantra.com
Canyourbusinesssurvivewithoutdata?
Canyourbusinesssurvivewithoutdata?
 What are web applications? commonly used examples
 Why are web applications at security risk?
 Should you worry?
 Top 10 vulnerabilities (2008)
How do you minimize the risk?
www.ebusinessmantra.com
Canyourbusinesssurvivewithoutdata?
 How do you minimize the risk?
 Application Testing
 Hacking 101
Canyourbusinesssurvivewithoutdata?
 Easy target
◦ More than 70% websites are vulnerable (studies)
◦ SSL, Network, OS securities cannot protect web apps.
◦ Attack passes as normal traffic through ports 80 & 443
◦ Only getting attention recently
Lucrative: Easy access to confidential information –
www.ebusinessmantra.com
Canyourbusinesssurvivewithoutdata?
 Lucrative: Easy access to confidential information –
identity theft is a huge market
 Low investment and high returns mean high ROI
for a hacker
 Economy
◦ Large number of software professionals without jobs –
layoffs or fresh out of schools/colleges
Canyourbusinesssurvivewithoutdata?
 What are web applications? commonly used examples
 Why are web applications at security risk?
 Should you worry?
 Top 10 vulnerabilities (2008)
How do you minimize the risk?
www.ebusinessmantra.com
Canyourbusinesssurvivewithoutdata?
 How do you minimize the risk?
 Application Testing
 Hacking 101
Canyourbusinesssurvivewithoutdata?
 As web site owner, you should worry
◦ Notable (Govt., security firms, banks) web sites
have been hacked
◦ Many are not reported – legally not required,
don’t want to tarnish company’s image and loose
business
www.ebusinessmantra.com
Canyourbusinesssurvivewithoutdata?
business
◦ Organized crimes, blackmail if the data is worth it
◦ High costs to remediate: $90 - $300 per record,
plus lost business, lost customer confidence
Canyourbusinesssurvivewithoutdata?
 Consequences to business can be
overwhelming
◦ Loss or corruption of data
◦ Loss of business
◦ Loss of productive employees’ time to remediate
www.ebusinessmantra.com
Canyourbusinesssurvivewithoutdata?
◦ Loss of productive employees’ time to remediate
the problem
Canyourbusinesssurvivewithoutdata?
www.ebusinessmantra.com
Canyourbusinesssurvivewithoutdata?
October 2008
Canyourbusinesssurvivewithoutdata?
www.ebusinessmantra.com
Canyourbusinesssurvivewithoutdata?
October 2008
Canyourbusinesssurvivewithoutdata?
www.ebusinessmantra.com
Canyourbusinesssurvivewithoutdata?
October 2008
Canyourbusinesssurvivewithoutdata?
www.ebusinessmantra.com
Canyourbusinesssurvivewithoutdata?
October 2008
Canyourbusinesssurvivewithoutdata?
 What are web applications? commonly used examples
 Why are web applications at security risk?
 Should you worry?
 Top 10 vulnerabilities (2008)
How do you minimize the risk?
www.ebusinessmantra.com
Canyourbusinesssurvivewithoutdata?
 How do you minimize the risk?
 Application Testing
 Hacking 101
Canyourbusinesssurvivewithoutdata?
 Cross Site Scripting (XSS)
 Injection Flaws
 Malicious File Execution
 Insecure Direct Object Reference
 Cross Site Request Forgery (CSRF)
Information Leakage and Improper Error
www.ebusinessmantra.com
Canyourbusinesssurvivewithoutdata?
 Information Leakage and Improper Error
Handling
 Broken Authentication and Session Management
 Insecure Cryptographic Storage
 Insecure Communications
 Failure to Restrict URL Access
Canyourbusinesssurvivewithoutdata?
 XSS flaws occur whenever an application
takes user supplied data and sends it to a
web browser without first examining the
content. XSS allows attackers to execute
script in the victim’s browser which can
www.ebusinessmantra.com
Canyourbusinesssurvivewithoutdata?
script in the victim’s browser which can
hijack user sessions, deface web sites,
possibly introduce worms, etc.
Canyourbusinesssurvivewithoutdata?
 Injection flaws, particularly SQL injection,
are common in web applications. Injection
occurs when user-supplied data is sent to
an interpreter as part of a command or
query. The attacker’s hostile data tricks the
www.ebusinessmantra.com
Canyourbusinesssurvivewithoutdata?
query. The attacker’s hostile data tricks the
interpreter into executing unintended
commands or changing data.
Canyourbusinesssurvivewithoutdata?
 Code vulnerable to remote file inclusion
(RFI) allows attackers to include hostile
code and data, resulting in devastating
attacks, such as total server compromise.
Malicious file execution attacks affect PHP,
www.ebusinessmantra.com
Canyourbusinesssurvivewithoutdata?
Malicious file execution attacks affect PHP,
XML and any framework which accepts
filenames or files from users.
Canyourbusinesssurvivewithoutdata?
 A direct object reference occurs when a
developer exposes a reference to an
internal objects, such as a file, directory,
database record, or key, as a URL or form
parameter. Attackers can manipulate those
www.ebusinessmantra.com
Canyourbusinesssurvivewithoutdata?
parameter. Attackers can manipulate those
references to access other objects without
authorization.
Canyourbusinesssurvivewithoutdata?
 A CSRF attack forces a logged-on victim’s
browser to send a pre-authenticated
request to a vulnerable web application,
which then forces the victim’s browser to
perform a hostile action to the benefit of
www.ebusinessmantra.com
Canyourbusinesssurvivewithoutdata?
perform a hostile action to the benefit of
the attacker. CSRF can be as powerful as
the web application that it attacks.
Canyourbusinesssurvivewithoutdata?
 Applications can unintentionally leak
information about their configuration,
internal workings, or violate privacy through
a variety of application problems. Attackers
use this weakness to steal sensitive data or
www.ebusinessmantra.com
Canyourbusinesssurvivewithoutdata?
use this weakness to steal sensitive data or
conduct more serious attacks.
Canyourbusinesssurvivewithoutdata?
 Account credentials and session tokens are
often not properly protected. Attackers
compromise passwords, keys, or
authentication tokens to assume other
users’ identities.
www.ebusinessmantra.com
Canyourbusinesssurvivewithoutdata?
users’ identities.
Canyourbusinesssurvivewithoutdata?
 Web applications rarely use cryptographic
functions properly to protect data and
credentials. Attackers use weakly protected
data to conduct identity theft and other
crimes, such as credit card fraud.
www.ebusinessmantra.com
Canyourbusinesssurvivewithoutdata?
crimes, such as credit card fraud.
Canyourbusinesssurvivewithoutdata?
 Applications frequently fail to encrypt
network traffic when it is necessary to
protect sensitive communications.
www.ebusinessmantra.com
Canyourbusinesssurvivewithoutdata?
Canyourbusinesssurvivewithoutdata?
 Frequently, an application only protects
sensitive functionality by preventing the
display of links or URLs to unauthorized
users. Attackers can use this weakness to
access and perform unauthorized
www.ebusinessmantra.com
Canyourbusinesssurvivewithoutdata?
access and perform unauthorized
operations by accessing those URLs directly.
Canyourbusinesssurvivewithoutdata?
 What are web applications? commonly used examples
 Why are web applications at security risk?
 Should you worry?
 Top 10 vulnerabilities (2008)
How do you minimize the risk?
www.ebusinessmantra.com
Canyourbusinesssurvivewithoutdata?
 How do you minimize the risk?
 Application Testing
 Hacking 101
Canyourbusinesssurvivewithoutdata?
 Awareness
◦ All stakeholder must recognize the risks and work
towards mitigation
 Testing
◦ During all stages of development life cycle
www.ebusinessmantra.com
Canyourbusinesssurvivewithoutdata?
◦ During all stages of development life cycle
◦ Regular interval during post deployment
Canyourbusinesssurvivewithoutdata?
 Manual
◦ Source Code – Code review
◦ Application – Penetration
 Automated
◦ Source Code – Source Code Analyzer
www.ebusinessmantra.com
Canyourbusinesssurvivewithoutdata?
◦ Source Code – Source Code Analyzer
◦ Application – Vulnerability Scanners
(ebusinessmantra is a sales channel for Acunetix
– a leading web application vulnerability scanner
in the market)
Canyourbusinesssurvivewithoutdata?
 What are web applications? commonly used examples
 Why are web applications at security risk?
 Should you worry?
 Top 10 vulnerabilities (2008)
How do you minimize the risk?
www.ebusinessmantra.com
Canyourbusinesssurvivewithoutdata?
 How do you minimize the risk?
 Application Testing
 Hacking 101
Canyourbusinesssurvivewithoutdata?
 Cross Site Scripting
◦ http://testasp.acunetix.com/Search.asp
◦ Enter the following in the search field
◦ <br><br>Please login with the form below before proceeding:<form
action="destination.asp"><table><tr><td>Login:</td><td><input type=text
length=20 name=login></td></tr><tr><td>Password:</td><td><input
type=text length=20 name=password></td></tr></table><input type=submit
value=LOGIN></form>
www.ebusinessmantra.com
Canyourbusinesssurvivewithoutdata?
value=LOGIN></form>
◦ A login form is displayed but the login information is sent to hacker
◦ A hacker can use the same credentials and login on the site and hack the site
◦ Email spam: Click on the link, but the link contains the code as above which would
have the same results
◦ http://testasp.acunetix.com/Search.asp?tfSearch=%3Cbr%3E%3Cbr%3EPlease+login+with+
◦ the+form+below+before+proceeding%3A%3C form+action%3D%22test.asp%22%3E%3C
◦ table%3E%3Ctr%3E%3Ctd%3ELogin%3A%3C%2Ftd%3E%3Ctd%3E%3Cinput+type%3D
◦ text+ length%3D20+name%3Dlogin%3E%3C%2Ftd%3E%3C%2Ftr%3E%3Ctr%3E%3C
◦ td%3EPassword%3A%3C%2Ftd%3E%3Ctd%3E%3Cinput +type%3Dtext+length%3D20
◦ +name%3Dpassword%3E%3C%2Ftd%3E%3C%2Ftr%3E%3C%2Ftable%3E%3Cinput
◦ +type%3Dsubmit+value %3DLOGIN%3E%3C%2Fform%3E
Canyourbusinesssurvivewithoutdata?
www.ebusinessmantra.com
Canyourbusinesssurvivewithoutdata?
October 2008
Source: You Tube
Canyourbusinesssurvivewithoutdata?
 Remove all javascript validation from web
page
 Enter ‘ or 1 = 1 --; in the password field
 A code that is vulnerable to SQL Injection
will return the first record in the database
www.ebusinessmantra.com
Canyourbusinesssurvivewithoutdata?
will return the first record in the database
 YouTube has several demos,
◦ www.youtube.com/watch?v=MJNJjh4jORY
Canyourbusinesssurvivewithoutdata?
www.ebusinessmantra.com
Canyourbusinesssurvivewithoutdata?
October 2008
Source: You Tube
Canyourbusinesssurvivewithoutdata?
www.ebusinessmantra.com
Canyourbusinesssurvivewithoutdata?
October 2008
Source: You Tube

More Related Content

What's hot

Application Security - Your Success Depends on it
Application Security - Your Success Depends on itApplication Security - Your Success Depends on it
Application Security - Your Success Depends on it
WSO2
 
VAPT - Vulnerability Assessment & Penetration Testing
VAPT - Vulnerability Assessment & Penetration Testing VAPT - Vulnerability Assessment & Penetration Testing
VAPT - Vulnerability Assessment & Penetration Testing
Netpluz Asia Pte Ltd
 
OWASP Top 10 2021 What's New
OWASP Top 10 2021 What's NewOWASP Top 10 2021 What's New
OWASP Top 10 2021 What's New
Michael Furman
 
Secure coding presentation Oct 3 2020
Secure coding presentation Oct 3 2020Secure coding presentation Oct 3 2020
Secure coding presentation Oct 3 2020
Moataz Kamel
 
What is Penetration Testing?
What is Penetration Testing?What is Penetration Testing?
What is Penetration Testing?
btpsec
 
Secure coding practices
Secure coding practicesSecure coding practices
Secure coding practices
Mohammed Danish Amber
 
Top 10 Web Security Vulnerabilities (OWASP Top 10)
Top 10 Web Security Vulnerabilities (OWASP Top 10)Top 10 Web Security Vulnerabilities (OWASP Top 10)
Top 10 Web Security Vulnerabilities (OWASP Top 10)
Brian Huff
 
Cyber Security Awareness Session for Executives and Non-IT professionals
Cyber Security Awareness Session for Executives and Non-IT professionalsCyber Security Awareness Session for Executives and Non-IT professionals
Cyber Security Awareness Session for Executives and Non-IT professionals
Krishna Srikanth Manda
 
Secure code
Secure codeSecure code
Secure code
ddeogun
 
Owasp top 10 vulnerabilities
Owasp top 10 vulnerabilitiesOwasp top 10 vulnerabilities
Owasp top 10 vulnerabilities
OWASP Delhi
 
Vulnerability assessment and penetration testing
Vulnerability assessment and penetration testingVulnerability assessment and penetration testing
Vulnerability assessment and penetration testing
Abu Sadat Mohammed Yasin
 
Penetration Testing
Penetration Testing Penetration Testing
Penetration Testing
RomSoft SRL
 
Introduction to penetration testing
Introduction to penetration testingIntroduction to penetration testing
Introduction to penetration testing
Nezar Alazzabi
 
Application Security Architecture and Threat Modelling
Application Security Architecture and Threat ModellingApplication Security Architecture and Threat Modelling
Application Security Architecture and Threat Modelling
Priyanka Aash
 
Security tools
Security toolsSecurity tools
Security tools
arfan shahzad
 
Secure coding practices
Secure coding practicesSecure coding practices
Secure coding practices
Scott Hurrey
 
Web App Security Presentation by Ryan Holland - 05-31-2017
Web App Security Presentation by Ryan Holland - 05-31-2017Web App Security Presentation by Ryan Holland - 05-31-2017
Web App Security Presentation by Ryan Holland - 05-31-2017
TriNimbus
 
Cyber Security Awareness
Cyber Security AwarenessCyber Security Awareness
Cyber Security Awareness
Ramiro Cid
 
Secure Coding 101 - OWASP University of Ottawa Workshop
Secure Coding 101 - OWASP University of Ottawa WorkshopSecure Coding 101 - OWASP University of Ottawa Workshop
Secure Coding 101 - OWASP University of Ottawa Workshop
Paul Ionescu
 
Cross-Site Scripting (XSS)
Cross-Site Scripting (XSS)Cross-Site Scripting (XSS)
Cross-Site Scripting (XSS)
Daniel Tumser
 

What's hot (20)

Application Security - Your Success Depends on it
Application Security - Your Success Depends on itApplication Security - Your Success Depends on it
Application Security - Your Success Depends on it
 
VAPT - Vulnerability Assessment & Penetration Testing
VAPT - Vulnerability Assessment & Penetration Testing VAPT - Vulnerability Assessment & Penetration Testing
VAPT - Vulnerability Assessment & Penetration Testing
 
OWASP Top 10 2021 What's New
OWASP Top 10 2021 What's NewOWASP Top 10 2021 What's New
OWASP Top 10 2021 What's New
 
Secure coding presentation Oct 3 2020
Secure coding presentation Oct 3 2020Secure coding presentation Oct 3 2020
Secure coding presentation Oct 3 2020
 
What is Penetration Testing?
What is Penetration Testing?What is Penetration Testing?
What is Penetration Testing?
 
Secure coding practices
Secure coding practicesSecure coding practices
Secure coding practices
 
Top 10 Web Security Vulnerabilities (OWASP Top 10)
Top 10 Web Security Vulnerabilities (OWASP Top 10)Top 10 Web Security Vulnerabilities (OWASP Top 10)
Top 10 Web Security Vulnerabilities (OWASP Top 10)
 
Cyber Security Awareness Session for Executives and Non-IT professionals
Cyber Security Awareness Session for Executives and Non-IT professionalsCyber Security Awareness Session for Executives and Non-IT professionals
Cyber Security Awareness Session for Executives and Non-IT professionals
 
Secure code
Secure codeSecure code
Secure code
 
Owasp top 10 vulnerabilities
Owasp top 10 vulnerabilitiesOwasp top 10 vulnerabilities
Owasp top 10 vulnerabilities
 
Vulnerability assessment and penetration testing
Vulnerability assessment and penetration testingVulnerability assessment and penetration testing
Vulnerability assessment and penetration testing
 
Penetration Testing
Penetration Testing Penetration Testing
Penetration Testing
 
Introduction to penetration testing
Introduction to penetration testingIntroduction to penetration testing
Introduction to penetration testing
 
Application Security Architecture and Threat Modelling
Application Security Architecture and Threat ModellingApplication Security Architecture and Threat Modelling
Application Security Architecture and Threat Modelling
 
Security tools
Security toolsSecurity tools
Security tools
 
Secure coding practices
Secure coding practicesSecure coding practices
Secure coding practices
 
Web App Security Presentation by Ryan Holland - 05-31-2017
Web App Security Presentation by Ryan Holland - 05-31-2017Web App Security Presentation by Ryan Holland - 05-31-2017
Web App Security Presentation by Ryan Holland - 05-31-2017
 
Cyber Security Awareness
Cyber Security AwarenessCyber Security Awareness
Cyber Security Awareness
 
Secure Coding 101 - OWASP University of Ottawa Workshop
Secure Coding 101 - OWASP University of Ottawa WorkshopSecure Coding 101 - OWASP University of Ottawa Workshop
Secure Coding 101 - OWASP University of Ottawa Workshop
 
Cross-Site Scripting (XSS)
Cross-Site Scripting (XSS)Cross-Site Scripting (XSS)
Cross-Site Scripting (XSS)
 

Similar to Web application vulnerabilities

Online Security and Privacy Issues
Online Security and Privacy IssuesOnline Security and Privacy Issues
Online Security and Privacy Issues
ebusinessmantra
 
Cyber security considerations for Small and Medium Businesses
Cyber security considerations for Small and Medium BusinessesCyber security considerations for Small and Medium Businesses
Cyber security considerations for Small and Medium Businesses
ebusinessmantra
 
10 ways to protect your e commerce site from hacking & fraud
10 ways to protect your e commerce site from hacking & fraud10 ways to protect your e commerce site from hacking & fraud
10 ways to protect your e commerce site from hacking & fraud
WebSitePulse
 
Cybersecurity Threats Web Developers Must Know.pptx
Cybersecurity Threats Web Developers Must Know.pptxCybersecurity Threats Web Developers Must Know.pptx
Cybersecurity Threats Web Developers Must Know.pptx
Master Infotech
 
Hybrid website security from Indusface
Hybrid website security from IndusfaceHybrid website security from Indusface
Hybrid website security from Indusface
Infosys
 
Web Site vulnerability Sales and Consulting
Web Site vulnerability Sales and ConsultingWeb Site vulnerability Sales and Consulting
Web Site vulnerability Sales and Consultingguest4cee27ac
 
Website Security: A Guide to Defending Your Website
Website Security: A Guide to Defending Your WebsiteWebsite Security: A Guide to Defending Your Website
Website Security: A Guide to Defending Your Website
WebGuru Infosystems Pvt. Ltd.
 
Cybersecurity Training
Cybersecurity TrainingCybersecurity Training
Cybersecurity Training
WindstoneHealth
 
What Makes Web Applications Desirable For Hackers
What Makes Web Applications Desirable For HackersWhat Makes Web Applications Desirable For Hackers
What Makes Web Applications Desirable For Hackers
Jaime Manteiga
 
How to Secure your ecommerce website-Threats and tips
How to Secure your ecommerce website-Threats and tipsHow to Secure your ecommerce website-Threats and tips
How to Secure your ecommerce website-Threats and tips
SilverClouding Consultancy Pvt Ltd
 
The Importance of Security Testing in Web Applications.docx
The Importance of Security Testing in Web Applications.docxThe Importance of Security Testing in Web Applications.docx
The Importance of Security Testing in Web Applications.docx
QACraft
 
How Can I Reduce The Risk Of A Cyber-Attack?
How Can I Reduce The Risk Of A Cyber-Attack?How Can I Reduce The Risk Of A Cyber-Attack?
How Can I Reduce The Risk Of A Cyber-Attack?
Osei Fortune
 
securityattackvectorsslidesharefinal-160405191759.pdf
securityattackvectorsslidesharefinal-160405191759.pdfsecurityattackvectorsslidesharefinal-160405191759.pdf
securityattackvectorsslidesharefinal-160405191759.pdf
ssuser6c59cb
 
Cybersecurity Attack Vectors: How to Protect Your Organization
Cybersecurity Attack Vectors: How to Protect Your OrganizationCybersecurity Attack Vectors: How to Protect Your Organization
Cybersecurity Attack Vectors: How to Protect Your Organization
TriCorps Technologies
 
parabcswithout-front-200320113631.pdf
parabcswithout-front-200320113631.pdfparabcswithout-front-200320113631.pdf
parabcswithout-front-200320113631.pdf
NirGoldstein5
 
Cyber security presentation
Cyber security presentationCyber security presentation
Cyber security presentation
Parab Mishra
 
SPI Dynamics web application security 101
SPI Dynamics web application security 101 SPI Dynamics web application security 101
SPI Dynamics web application security 101
Wade Malone
 
Panama Papers Leak and Precautions Law firms should take
Panama Papers Leak and Precautions Law firms should takePanama Papers Leak and Precautions Law firms should take
Panama Papers Leak and Precautions Law firms should take
Adv. Prashant Mali ♛ [Bsc(Phy),MSc(Comp Sci), CCFP,CISSA,LLM]
 
Are you fighting_new_threats_with_old_weapons
Are you fighting_new_threats_with_old_weaponsAre you fighting_new_threats_with_old_weapons
Are you fighting_new_threats_with_old_weapons
Bhargav Modi
 

Similar to Web application vulnerabilities (20)

Online Security and Privacy Issues
Online Security and Privacy IssuesOnline Security and Privacy Issues
Online Security and Privacy Issues
 
Cyber security considerations for Small and Medium Businesses
Cyber security considerations for Small and Medium BusinessesCyber security considerations for Small and Medium Businesses
Cyber security considerations for Small and Medium Businesses
 
10 ways to protect your e commerce site from hacking & fraud
10 ways to protect your e commerce site from hacking & fraud10 ways to protect your e commerce site from hacking & fraud
10 ways to protect your e commerce site from hacking & fraud
 
Cybersecurity Threats Web Developers Must Know.pptx
Cybersecurity Threats Web Developers Must Know.pptxCybersecurity Threats Web Developers Must Know.pptx
Cybersecurity Threats Web Developers Must Know.pptx
 
Hybrid website security from Indusface
Hybrid website security from IndusfaceHybrid website security from Indusface
Hybrid website security from Indusface
 
Web Site vulnerability Sales and Consulting
Web Site vulnerability Sales and ConsultingWeb Site vulnerability Sales and Consulting
Web Site vulnerability Sales and Consulting
 
Website Security: A Guide to Defending Your Website
Website Security: A Guide to Defending Your WebsiteWebsite Security: A Guide to Defending Your Website
Website Security: A Guide to Defending Your Website
 
Cybersecurity Training
Cybersecurity TrainingCybersecurity Training
Cybersecurity Training
 
What Makes Web Applications Desirable For Hackers
What Makes Web Applications Desirable For HackersWhat Makes Web Applications Desirable For Hackers
What Makes Web Applications Desirable For Hackers
 
How to Secure your ecommerce website-Threats and tips
How to Secure your ecommerce website-Threats and tipsHow to Secure your ecommerce website-Threats and tips
How to Secure your ecommerce website-Threats and tips
 
The Importance of Security Testing in Web Applications.docx
The Importance of Security Testing in Web Applications.docxThe Importance of Security Testing in Web Applications.docx
The Importance of Security Testing in Web Applications.docx
 
How Can I Reduce The Risk Of A Cyber-Attack?
How Can I Reduce The Risk Of A Cyber-Attack?How Can I Reduce The Risk Of A Cyber-Attack?
How Can I Reduce The Risk Of A Cyber-Attack?
 
securityattackvectorsslidesharefinal-160405191759.pdf
securityattackvectorsslidesharefinal-160405191759.pdfsecurityattackvectorsslidesharefinal-160405191759.pdf
securityattackvectorsslidesharefinal-160405191759.pdf
 
Cybersecurity Attack Vectors: How to Protect Your Organization
Cybersecurity Attack Vectors: How to Protect Your OrganizationCybersecurity Attack Vectors: How to Protect Your Organization
Cybersecurity Attack Vectors: How to Protect Your Organization
 
parabcswithout-front-200320113631.pdf
parabcswithout-front-200320113631.pdfparabcswithout-front-200320113631.pdf
parabcswithout-front-200320113631.pdf
 
Cyber security presentation
Cyber security presentationCyber security presentation
Cyber security presentation
 
SPI Dynamics web application security 101
SPI Dynamics web application security 101 SPI Dynamics web application security 101
SPI Dynamics web application security 101
 
Panama Papers Leak and Precautions Law firms should take
Panama Papers Leak and Precautions Law firms should takePanama Papers Leak and Precautions Law firms should take
Panama Papers Leak and Precautions Law firms should take
 
Panama-Paper-Leak
Panama-Paper-LeakPanama-Paper-Leak
Panama-Paper-Leak
 
Are you fighting_new_threats_with_old_weapons
Are you fighting_new_threats_with_old_weaponsAre you fighting_new_threats_with_old_weapons
Are you fighting_new_threats_with_old_weapons
 

Recently uploaded

BASIC C++ lecture NOTE C++ lecture 3.pptx
BASIC C++ lecture NOTE C++ lecture 3.pptxBASIC C++ lecture NOTE C++ lecture 3.pptx
BASIC C++ lecture NOTE C++ lecture 3.pptx
natyesu
 
This 7-second Brain Wave Ritual Attracts Money To You.!
This 7-second Brain Wave Ritual Attracts Money To You.!This 7-second Brain Wave Ritual Attracts Money To You.!
This 7-second Brain Wave Ritual Attracts Money To You.!
nirahealhty
 
急速办(bedfordhire毕业证书)英国贝德福特大学毕业证成绩单原版一模一样
急速办(bedfordhire毕业证书)英国贝德福特大学毕业证成绩单原版一模一样急速办(bedfordhire毕业证书)英国贝德福特大学毕业证成绩单原版一模一样
急速办(bedfordhire毕业证书)英国贝德福特大学毕业证成绩单原版一模一样
3ipehhoa
 
Output determination SAP S4 HANA SAP SD CC
Output determination SAP S4 HANA SAP SD CCOutput determination SAP S4 HANA SAP SD CC
Output determination SAP S4 HANA SAP SD CC
ShahulHameed54211
 
Living-in-IT-era-Module-7-Imaging-and-Design-for-Social-Impact.pptx
Living-in-IT-era-Module-7-Imaging-and-Design-for-Social-Impact.pptxLiving-in-IT-era-Module-7-Imaging-and-Design-for-Social-Impact.pptx
Living-in-IT-era-Module-7-Imaging-and-Design-for-Social-Impact.pptx
TristanJasperRamos
 
Latest trends in computer networking.pptx
Latest trends in computer networking.pptxLatest trends in computer networking.pptx
Latest trends in computer networking.pptx
JungkooksNonexistent
 
test test test test testtest test testtest test testtest test testtest test ...
test test  test test testtest test testtest test testtest test testtest test ...test test  test test testtest test testtest test testtest test testtest test ...
test test test test testtest test testtest test testtest test testtest test ...
Arif0071
 
History+of+E-commerce+Development+in+China-www.cfye-commerce.shop
History+of+E-commerce+Development+in+China-www.cfye-commerce.shopHistory+of+E-commerce+Development+in+China-www.cfye-commerce.shop
History+of+E-commerce+Development+in+China-www.cfye-commerce.shop
laozhuseo02
 
The+Prospects+of+E-Commerce+in+China.pptx
The+Prospects+of+E-Commerce+in+China.pptxThe+Prospects+of+E-Commerce+in+China.pptx
The+Prospects+of+E-Commerce+in+China.pptx
laozhuseo02
 
Multi-cluster Kubernetes Networking- Patterns, Projects and Guidelines
Multi-cluster Kubernetes Networking- Patterns, Projects and GuidelinesMulti-cluster Kubernetes Networking- Patterns, Projects and Guidelines
Multi-cluster Kubernetes Networking- Patterns, Projects and Guidelines
Sanjeev Rampal
 
原版仿制(uob毕业证书)英国伯明翰大学毕业证本科学历证书原版一模一样
原版仿制(uob毕业证书)英国伯明翰大学毕业证本科学历证书原版一模一样原版仿制(uob毕业证书)英国伯明翰大学毕业证本科学历证书原版一模一样
原版仿制(uob毕业证书)英国伯明翰大学毕业证本科学历证书原版一模一样
3ipehhoa
 
ER(Entity Relationship) Diagram for online shopping - TAE
ER(Entity Relationship) Diagram for online shopping - TAEER(Entity Relationship) Diagram for online shopping - TAE
ER(Entity Relationship) Diagram for online shopping - TAE
Himani415946
 
guildmasters guide to ravnica Dungeons & Dragons 5...
guildmasters guide to ravnica Dungeons & Dragons 5...guildmasters guide to ravnica Dungeons & Dragons 5...
guildmasters guide to ravnica Dungeons & Dragons 5...
Rogerio Filho
 
1比1复刻(bath毕业证书)英国巴斯大学毕业证学位证原版一模一样
1比1复刻(bath毕业证书)英国巴斯大学毕业证学位证原版一模一样1比1复刻(bath毕业证书)英国巴斯大学毕业证学位证原版一模一样
1比1复刻(bath毕业证书)英国巴斯大学毕业证学位证原版一模一样
3ipehhoa
 
1.Wireless Communication System_Wireless communication is a broad term that i...
1.Wireless Communication System_Wireless communication is a broad term that i...1.Wireless Communication System_Wireless communication is a broad term that i...
1.Wireless Communication System_Wireless communication is a broad term that i...
JeyaPerumal1
 
How to Use Contact Form 7 Like a Pro.pptx
How to Use Contact Form 7 Like a Pro.pptxHow to Use Contact Form 7 Like a Pro.pptx
How to Use Contact Form 7 Like a Pro.pptx
Gal Baras
 

Recently uploaded (16)

BASIC C++ lecture NOTE C++ lecture 3.pptx
BASIC C++ lecture NOTE C++ lecture 3.pptxBASIC C++ lecture NOTE C++ lecture 3.pptx
BASIC C++ lecture NOTE C++ lecture 3.pptx
 
This 7-second Brain Wave Ritual Attracts Money To You.!
This 7-second Brain Wave Ritual Attracts Money To You.!This 7-second Brain Wave Ritual Attracts Money To You.!
This 7-second Brain Wave Ritual Attracts Money To You.!
 
急速办(bedfordhire毕业证书)英国贝德福特大学毕业证成绩单原版一模一样
急速办(bedfordhire毕业证书)英国贝德福特大学毕业证成绩单原版一模一样急速办(bedfordhire毕业证书)英国贝德福特大学毕业证成绩单原版一模一样
急速办(bedfordhire毕业证书)英国贝德福特大学毕业证成绩单原版一模一样
 
Output determination SAP S4 HANA SAP SD CC
Output determination SAP S4 HANA SAP SD CCOutput determination SAP S4 HANA SAP SD CC
Output determination SAP S4 HANA SAP SD CC
 
Living-in-IT-era-Module-7-Imaging-and-Design-for-Social-Impact.pptx
Living-in-IT-era-Module-7-Imaging-and-Design-for-Social-Impact.pptxLiving-in-IT-era-Module-7-Imaging-and-Design-for-Social-Impact.pptx
Living-in-IT-era-Module-7-Imaging-and-Design-for-Social-Impact.pptx
 
Latest trends in computer networking.pptx
Latest trends in computer networking.pptxLatest trends in computer networking.pptx
Latest trends in computer networking.pptx
 
test test test test testtest test testtest test testtest test testtest test ...
test test  test test testtest test testtest test testtest test testtest test ...test test  test test testtest test testtest test testtest test testtest test ...
test test test test testtest test testtest test testtest test testtest test ...
 
History+of+E-commerce+Development+in+China-www.cfye-commerce.shop
History+of+E-commerce+Development+in+China-www.cfye-commerce.shopHistory+of+E-commerce+Development+in+China-www.cfye-commerce.shop
History+of+E-commerce+Development+in+China-www.cfye-commerce.shop
 
The+Prospects+of+E-Commerce+in+China.pptx
The+Prospects+of+E-Commerce+in+China.pptxThe+Prospects+of+E-Commerce+in+China.pptx
The+Prospects+of+E-Commerce+in+China.pptx
 
Multi-cluster Kubernetes Networking- Patterns, Projects and Guidelines
Multi-cluster Kubernetes Networking- Patterns, Projects and GuidelinesMulti-cluster Kubernetes Networking- Patterns, Projects and Guidelines
Multi-cluster Kubernetes Networking- Patterns, Projects and Guidelines
 
原版仿制(uob毕业证书)英国伯明翰大学毕业证本科学历证书原版一模一样
原版仿制(uob毕业证书)英国伯明翰大学毕业证本科学历证书原版一模一样原版仿制(uob毕业证书)英国伯明翰大学毕业证本科学历证书原版一模一样
原版仿制(uob毕业证书)英国伯明翰大学毕业证本科学历证书原版一模一样
 
ER(Entity Relationship) Diagram for online shopping - TAE
ER(Entity Relationship) Diagram for online shopping - TAEER(Entity Relationship) Diagram for online shopping - TAE
ER(Entity Relationship) Diagram for online shopping - TAE
 
guildmasters guide to ravnica Dungeons & Dragons 5...
guildmasters guide to ravnica Dungeons & Dragons 5...guildmasters guide to ravnica Dungeons & Dragons 5...
guildmasters guide to ravnica Dungeons & Dragons 5...
 
1比1复刻(bath毕业证书)英国巴斯大学毕业证学位证原版一模一样
1比1复刻(bath毕业证书)英国巴斯大学毕业证学位证原版一模一样1比1复刻(bath毕业证书)英国巴斯大学毕业证学位证原版一模一样
1比1复刻(bath毕业证书)英国巴斯大学毕业证学位证原版一模一样
 
1.Wireless Communication System_Wireless communication is a broad term that i...
1.Wireless Communication System_Wireless communication is a broad term that i...1.Wireless Communication System_Wireless communication is a broad term that i...
1.Wireless Communication System_Wireless communication is a broad term that i...
 
How to Use Contact Form 7 Like a Pro.pptx
How to Use Contact Form 7 Like a Pro.pptxHow to Use Contact Form 7 Like a Pro.pptx
How to Use Contact Form 7 Like a Pro.pptx
 

Web application vulnerabilities

  • 2. Canyourbusinesssurvivewithoutdata?  ebusinessmantra --  Web design and programming  Web application security solutions  Document Management Solutions Sales of Web Vulnerability Scanner software www.ebusinessmantra.com Canyourbusinesssurvivewithoutdata?  Sales of Web Vulnerability Scanner software  Internet Business Consulting – improve website ROI, lead generation to Customer Service (pre-sale to post sale cycle)
  • 3. Canyourbusinesssurvivewithoutdata?  What are web applications? commonly used examples  Why are web applications at security risk?  Should you worry?  Top 10 vulnerabilities (2008) How do you minimize the risk? www.ebusinessmantra.com Canyourbusinesssurvivewithoutdata?  How do you minimize the risk?  Application Testing  Hacking 101
  • 4. Canyourbusinesssurvivewithoutdata?  What are web applications? commonly used examples  Why are web applications at security risk?  Should you worry?  Top 10 vulnerabilities (2008) How do you minimize the risk? www.ebusinessmantra.com Canyourbusinesssurvivewithoutdata?  How do you minimize the risk?  Application Testing  Hacking 101
  • 5. Canyourbusinesssurvivewithoutdata?  Common examples of web applications ◦ Dynamic, database driven web sites  Two types – with and without user actions. ◦ With User Actions  Account management (bank, financial, mortgage, …)  Online shopping www.ebusinessmantra.com Canyourbusinesssurvivewithoutdata?  Online shopping  Online banking  Online trading  Web sites that ask for information ◦ Without User Actions  Information passed through URL, hidden form fields, cookies – without user entering data in a form
  • 7. Canyourbusinesssurvivewithoutdata?  Added Security around components www.ebusinessmantra.com Canyourbusinesssurvivewithoutdata?
  • 8. Canyourbusinesssurvivewithoutdata?  What are web applications? commonly used examples  Why are web applications at security risk?  Should you worry?  Top 10 vulnerabilities (2008) How do you minimize the risk? www.ebusinessmantra.com Canyourbusinesssurvivewithoutdata?  How do you minimize the risk?  Application Testing  Hacking 101
  • 9. Canyourbusinesssurvivewithoutdata?  Easy target ◦ More than 70% websites are vulnerable (studies) ◦ SSL, Network, OS securities cannot protect web apps. ◦ Attack passes as normal traffic through ports 80 & 443 ◦ Only getting attention recently Lucrative: Easy access to confidential information – www.ebusinessmantra.com Canyourbusinesssurvivewithoutdata?  Lucrative: Easy access to confidential information – identity theft is a huge market  Low investment and high returns mean high ROI for a hacker  Economy ◦ Large number of software professionals without jobs – layoffs or fresh out of schools/colleges
  • 10. Canyourbusinesssurvivewithoutdata?  What are web applications? commonly used examples  Why are web applications at security risk?  Should you worry?  Top 10 vulnerabilities (2008) How do you minimize the risk? www.ebusinessmantra.com Canyourbusinesssurvivewithoutdata?  How do you minimize the risk?  Application Testing  Hacking 101
  • 11. Canyourbusinesssurvivewithoutdata?  As web site owner, you should worry ◦ Notable (Govt., security firms, banks) web sites have been hacked ◦ Many are not reported – legally not required, don’t want to tarnish company’s image and loose business www.ebusinessmantra.com Canyourbusinesssurvivewithoutdata? business ◦ Organized crimes, blackmail if the data is worth it ◦ High costs to remediate: $90 - $300 per record, plus lost business, lost customer confidence
  • 12. Canyourbusinesssurvivewithoutdata?  Consequences to business can be overwhelming ◦ Loss or corruption of data ◦ Loss of business ◦ Loss of productive employees’ time to remediate www.ebusinessmantra.com Canyourbusinesssurvivewithoutdata? ◦ Loss of productive employees’ time to remediate the problem
  • 17. Canyourbusinesssurvivewithoutdata?  What are web applications? commonly used examples  Why are web applications at security risk?  Should you worry?  Top 10 vulnerabilities (2008) How do you minimize the risk? www.ebusinessmantra.com Canyourbusinesssurvivewithoutdata?  How do you minimize the risk?  Application Testing  Hacking 101
  • 18. Canyourbusinesssurvivewithoutdata?  Cross Site Scripting (XSS)  Injection Flaws  Malicious File Execution  Insecure Direct Object Reference  Cross Site Request Forgery (CSRF) Information Leakage and Improper Error www.ebusinessmantra.com Canyourbusinesssurvivewithoutdata?  Information Leakage and Improper Error Handling  Broken Authentication and Session Management  Insecure Cryptographic Storage  Insecure Communications  Failure to Restrict URL Access
  • 19. Canyourbusinesssurvivewithoutdata?  XSS flaws occur whenever an application takes user supplied data and sends it to a web browser without first examining the content. XSS allows attackers to execute script in the victim’s browser which can www.ebusinessmantra.com Canyourbusinesssurvivewithoutdata? script in the victim’s browser which can hijack user sessions, deface web sites, possibly introduce worms, etc.
  • 20. Canyourbusinesssurvivewithoutdata?  Injection flaws, particularly SQL injection, are common in web applications. Injection occurs when user-supplied data is sent to an interpreter as part of a command or query. The attacker’s hostile data tricks the www.ebusinessmantra.com Canyourbusinesssurvivewithoutdata? query. The attacker’s hostile data tricks the interpreter into executing unintended commands or changing data.
  • 21. Canyourbusinesssurvivewithoutdata?  Code vulnerable to remote file inclusion (RFI) allows attackers to include hostile code and data, resulting in devastating attacks, such as total server compromise. Malicious file execution attacks affect PHP, www.ebusinessmantra.com Canyourbusinesssurvivewithoutdata? Malicious file execution attacks affect PHP, XML and any framework which accepts filenames or files from users.
  • 22. Canyourbusinesssurvivewithoutdata?  A direct object reference occurs when a developer exposes a reference to an internal objects, such as a file, directory, database record, or key, as a URL or form parameter. Attackers can manipulate those www.ebusinessmantra.com Canyourbusinesssurvivewithoutdata? parameter. Attackers can manipulate those references to access other objects without authorization.
  • 23. Canyourbusinesssurvivewithoutdata?  A CSRF attack forces a logged-on victim’s browser to send a pre-authenticated request to a vulnerable web application, which then forces the victim’s browser to perform a hostile action to the benefit of www.ebusinessmantra.com Canyourbusinesssurvivewithoutdata? perform a hostile action to the benefit of the attacker. CSRF can be as powerful as the web application that it attacks.
  • 24. Canyourbusinesssurvivewithoutdata?  Applications can unintentionally leak information about their configuration, internal workings, or violate privacy through a variety of application problems. Attackers use this weakness to steal sensitive data or www.ebusinessmantra.com Canyourbusinesssurvivewithoutdata? use this weakness to steal sensitive data or conduct more serious attacks.
  • 25. Canyourbusinesssurvivewithoutdata?  Account credentials and session tokens are often not properly protected. Attackers compromise passwords, keys, or authentication tokens to assume other users’ identities. www.ebusinessmantra.com Canyourbusinesssurvivewithoutdata? users’ identities.
  • 26. Canyourbusinesssurvivewithoutdata?  Web applications rarely use cryptographic functions properly to protect data and credentials. Attackers use weakly protected data to conduct identity theft and other crimes, such as credit card fraud. www.ebusinessmantra.com Canyourbusinesssurvivewithoutdata? crimes, such as credit card fraud.
  • 27. Canyourbusinesssurvivewithoutdata?  Applications frequently fail to encrypt network traffic when it is necessary to protect sensitive communications. www.ebusinessmantra.com Canyourbusinesssurvivewithoutdata?
  • 28. Canyourbusinesssurvivewithoutdata?  Frequently, an application only protects sensitive functionality by preventing the display of links or URLs to unauthorized users. Attackers can use this weakness to access and perform unauthorized www.ebusinessmantra.com Canyourbusinesssurvivewithoutdata? access and perform unauthorized operations by accessing those URLs directly.
  • 29. Canyourbusinesssurvivewithoutdata?  What are web applications? commonly used examples  Why are web applications at security risk?  Should you worry?  Top 10 vulnerabilities (2008) How do you minimize the risk? www.ebusinessmantra.com Canyourbusinesssurvivewithoutdata?  How do you minimize the risk?  Application Testing  Hacking 101
  • 30. Canyourbusinesssurvivewithoutdata?  Awareness ◦ All stakeholder must recognize the risks and work towards mitigation  Testing ◦ During all stages of development life cycle www.ebusinessmantra.com Canyourbusinesssurvivewithoutdata? ◦ During all stages of development life cycle ◦ Regular interval during post deployment
  • 31. Canyourbusinesssurvivewithoutdata?  Manual ◦ Source Code – Code review ◦ Application – Penetration  Automated ◦ Source Code – Source Code Analyzer www.ebusinessmantra.com Canyourbusinesssurvivewithoutdata? ◦ Source Code – Source Code Analyzer ◦ Application – Vulnerability Scanners (ebusinessmantra is a sales channel for Acunetix – a leading web application vulnerability scanner in the market)
  • 32. Canyourbusinesssurvivewithoutdata?  What are web applications? commonly used examples  Why are web applications at security risk?  Should you worry?  Top 10 vulnerabilities (2008) How do you minimize the risk? www.ebusinessmantra.com Canyourbusinesssurvivewithoutdata?  How do you minimize the risk?  Application Testing  Hacking 101
  • 33. Canyourbusinesssurvivewithoutdata?  Cross Site Scripting ◦ http://testasp.acunetix.com/Search.asp ◦ Enter the following in the search field ◦ <br><br>Please login with the form below before proceeding:<form action="destination.asp"><table><tr><td>Login:</td><td><input type=text length=20 name=login></td></tr><tr><td>Password:</td><td><input type=text length=20 name=password></td></tr></table><input type=submit value=LOGIN></form> www.ebusinessmantra.com Canyourbusinesssurvivewithoutdata? value=LOGIN></form> ◦ A login form is displayed but the login information is sent to hacker ◦ A hacker can use the same credentials and login on the site and hack the site ◦ Email spam: Click on the link, but the link contains the code as above which would have the same results ◦ http://testasp.acunetix.com/Search.asp?tfSearch=%3Cbr%3E%3Cbr%3EPlease+login+with+ ◦ the+form+below+before+proceeding%3A%3C form+action%3D%22test.asp%22%3E%3C ◦ table%3E%3Ctr%3E%3Ctd%3ELogin%3A%3C%2Ftd%3E%3Ctd%3E%3Cinput+type%3D ◦ text+ length%3D20+name%3Dlogin%3E%3C%2Ftd%3E%3C%2Ftr%3E%3Ctr%3E%3C ◦ td%3EPassword%3A%3C%2Ftd%3E%3Ctd%3E%3Cinput +type%3Dtext+length%3D20 ◦ +name%3Dpassword%3E%3C%2Ftd%3E%3C%2Ftr%3E%3C%2Ftable%3E%3Cinput ◦ +type%3Dsubmit+value %3DLOGIN%3E%3C%2Fform%3E
  • 35. Canyourbusinesssurvivewithoutdata?  Remove all javascript validation from web page  Enter ‘ or 1 = 1 --; in the password field  A code that is vulnerable to SQL Injection will return the first record in the database www.ebusinessmantra.com Canyourbusinesssurvivewithoutdata? will return the first record in the database  YouTube has several demos, ◦ www.youtube.com/watch?v=MJNJjh4jORY