Canyourbusinesssurvivewithoutdata?
www.ebusinessmantra.com
Canyourbusinesssurvivewithoutdata?
Presented by ebusinessmantra
Canyourbusinesssurvivewithoutdata?
 ebusinessmantra --
 Web design and programming
 Web application security solutions
 Document Management Solutions
Sales of Web Vulnerability Scanner software
www.ebusinessmantra.com
Canyourbusinesssurvivewithoutdata?
 Sales of Web Vulnerability Scanner software
 Internet Business Consulting – improve
website ROI, lead generation to Customer
Service (pre-sale to post sale cycle)
Canyourbusinesssurvivewithoutdata?
 What are web applications? commonly used examples
 Why are web applications at security risk?
 Should you worry?
 Top 10 vulnerabilities (2008)
How do you minimize the risk?
www.ebusinessmantra.com
Canyourbusinesssurvivewithoutdata?
 How do you minimize the risk?
 Application Testing
 Hacking 101
Canyourbusinesssurvivewithoutdata?
 What are web applications? commonly used examples
 Why are web applications at security risk?
 Should you worry?
 Top 10 vulnerabilities (2008)
How do you minimize the risk?
www.ebusinessmantra.com
Canyourbusinesssurvivewithoutdata?
 How do you minimize the risk?
 Application Testing
 Hacking 101
Canyourbusinesssurvivewithoutdata?
 Common examples of web applications
◦ Dynamic, database driven web sites
 Two types – with and without user actions.
◦ With User Actions
 Account management (bank, financial, mortgage, …)
 Online shopping
www.ebusinessmantra.com
Canyourbusinesssurvivewithoutdata?
 Online shopping
 Online banking
 Online trading
 Web sites that ask for information
◦ Without User Actions
 Information passed through URL, hidden form fields,
cookies – without user entering data in a form
Canyourbusinesssurvivewithoutdata?
 Simple Model
www.ebusinessmantra.com
Canyourbusinesssurvivewithoutdata?
Canyourbusinesssurvivewithoutdata?
 Added Security around components
www.ebusinessmantra.com
Canyourbusinesssurvivewithoutdata?
Canyourbusinesssurvivewithoutdata?
 What are web applications? commonly used examples
 Why are web applications at security risk?
 Should you worry?
 Top 10 vulnerabilities (2008)
How do you minimize the risk?
www.ebusinessmantra.com
Canyourbusinesssurvivewithoutdata?
 How do you minimize the risk?
 Application Testing
 Hacking 101
Canyourbusinesssurvivewithoutdata?
 Easy target
◦ More than 70% websites are vulnerable (studies)
◦ SSL, Network, OS securities cannot protect web apps.
◦ Attack passes as normal traffic through ports 80 & 443
◦ Only getting attention recently
Lucrative: Easy access to confidential information –
www.ebusinessmantra.com
Canyourbusinesssurvivewithoutdata?
 Lucrative: Easy access to confidential information –
identity theft is a huge market
 Low investment and high returns mean high ROI
for a hacker
 Economy
◦ Large number of software professionals without jobs –
layoffs or fresh out of schools/colleges
Canyourbusinesssurvivewithoutdata?
 What are web applications? commonly used examples
 Why are web applications at security risk?
 Should you worry?
 Top 10 vulnerabilities (2008)
How do you minimize the risk?
www.ebusinessmantra.com
Canyourbusinesssurvivewithoutdata?
 How do you minimize the risk?
 Application Testing
 Hacking 101
Canyourbusinesssurvivewithoutdata?
 As web site owner, you should worry
◦ Notable (Govt., security firms, banks) web sites
have been hacked
◦ Many are not reported – legally not required,
don’t want to tarnish company’s image and loose
business
www.ebusinessmantra.com
Canyourbusinesssurvivewithoutdata?
business
◦ Organized crimes, blackmail if the data is worth it
◦ High costs to remediate: $90 - $300 per record,
plus lost business, lost customer confidence
Canyourbusinesssurvivewithoutdata?
 Consequences to business can be
overwhelming
◦ Loss or corruption of data
◦ Loss of business
◦ Loss of productive employees’ time to remediate
www.ebusinessmantra.com
Canyourbusinesssurvivewithoutdata?
◦ Loss of productive employees’ time to remediate
the problem
Canyourbusinesssurvivewithoutdata?
www.ebusinessmantra.com
Canyourbusinesssurvivewithoutdata?
October 2008
Canyourbusinesssurvivewithoutdata?
www.ebusinessmantra.com
Canyourbusinesssurvivewithoutdata?
October 2008
Canyourbusinesssurvivewithoutdata?
www.ebusinessmantra.com
Canyourbusinesssurvivewithoutdata?
October 2008
Canyourbusinesssurvivewithoutdata?
www.ebusinessmantra.com
Canyourbusinesssurvivewithoutdata?
October 2008
Canyourbusinesssurvivewithoutdata?
 What are web applications? commonly used examples
 Why are web applications at security risk?
 Should you worry?
 Top 10 vulnerabilities (2008)
How do you minimize the risk?
www.ebusinessmantra.com
Canyourbusinesssurvivewithoutdata?
 How do you minimize the risk?
 Application Testing
 Hacking 101
Canyourbusinesssurvivewithoutdata?
 Cross Site Scripting (XSS)
 Injection Flaws
 Malicious File Execution
 Insecure Direct Object Reference
 Cross Site Request Forgery (CSRF)
Information Leakage and Improper Error
www.ebusinessmantra.com
Canyourbusinesssurvivewithoutdata?
 Information Leakage and Improper Error
Handling
 Broken Authentication and Session Management
 Insecure Cryptographic Storage
 Insecure Communications
 Failure to Restrict URL Access
Canyourbusinesssurvivewithoutdata?
 XSS flaws occur whenever an application
takes user supplied data and sends it to a
web browser without first examining the
content. XSS allows attackers to execute
script in the victim’s browser which can
www.ebusinessmantra.com
Canyourbusinesssurvivewithoutdata?
script in the victim’s browser which can
hijack user sessions, deface web sites,
possibly introduce worms, etc.
Canyourbusinesssurvivewithoutdata?
 Injection flaws, particularly SQL injection,
are common in web applications. Injection
occurs when user-supplied data is sent to
an interpreter as part of a command or
query. The attacker’s hostile data tricks the
www.ebusinessmantra.com
Canyourbusinesssurvivewithoutdata?
query. The attacker’s hostile data tricks the
interpreter into executing unintended
commands or changing data.
Canyourbusinesssurvivewithoutdata?
 Code vulnerable to remote file inclusion
(RFI) allows attackers to include hostile
code and data, resulting in devastating
attacks, such as total server compromise.
Malicious file execution attacks affect PHP,
www.ebusinessmantra.com
Canyourbusinesssurvivewithoutdata?
Malicious file execution attacks affect PHP,
XML and any framework which accepts
filenames or files from users.
Canyourbusinesssurvivewithoutdata?
 A direct object reference occurs when a
developer exposes a reference to an
internal objects, such as a file, directory,
database record, or key, as a URL or form
parameter. Attackers can manipulate those
www.ebusinessmantra.com
Canyourbusinesssurvivewithoutdata?
parameter. Attackers can manipulate those
references to access other objects without
authorization.
Canyourbusinesssurvivewithoutdata?
 A CSRF attack forces a logged-on victim’s
browser to send a pre-authenticated
request to a vulnerable web application,
which then forces the victim’s browser to
perform a hostile action to the benefit of
www.ebusinessmantra.com
Canyourbusinesssurvivewithoutdata?
perform a hostile action to the benefit of
the attacker. CSRF can be as powerful as
the web application that it attacks.
Canyourbusinesssurvivewithoutdata?
 Applications can unintentionally leak
information about their configuration,
internal workings, or violate privacy through
a variety of application problems. Attackers
use this weakness to steal sensitive data or
www.ebusinessmantra.com
Canyourbusinesssurvivewithoutdata?
use this weakness to steal sensitive data or
conduct more serious attacks.
Canyourbusinesssurvivewithoutdata?
 Account credentials and session tokens are
often not properly protected. Attackers
compromise passwords, keys, or
authentication tokens to assume other
users’ identities.
www.ebusinessmantra.com
Canyourbusinesssurvivewithoutdata?
users’ identities.
Canyourbusinesssurvivewithoutdata?
 Web applications rarely use cryptographic
functions properly to protect data and
credentials. Attackers use weakly protected
data to conduct identity theft and other
crimes, such as credit card fraud.
www.ebusinessmantra.com
Canyourbusinesssurvivewithoutdata?
crimes, such as credit card fraud.
Canyourbusinesssurvivewithoutdata?
 Applications frequently fail to encrypt
network traffic when it is necessary to
protect sensitive communications.
www.ebusinessmantra.com
Canyourbusinesssurvivewithoutdata?
Canyourbusinesssurvivewithoutdata?
 Frequently, an application only protects
sensitive functionality by preventing the
display of links or URLs to unauthorized
users. Attackers can use this weakness to
access and perform unauthorized
www.ebusinessmantra.com
Canyourbusinesssurvivewithoutdata?
access and perform unauthorized
operations by accessing those URLs directly.
Canyourbusinesssurvivewithoutdata?
 What are web applications? commonly used examples
 Why are web applications at security risk?
 Should you worry?
 Top 10 vulnerabilities (2008)
How do you minimize the risk?
www.ebusinessmantra.com
Canyourbusinesssurvivewithoutdata?
 How do you minimize the risk?
 Application Testing
 Hacking 101
Canyourbusinesssurvivewithoutdata?
 Awareness
◦ All stakeholder must recognize the risks and work
towards mitigation
 Testing
◦ During all stages of development life cycle
www.ebusinessmantra.com
Canyourbusinesssurvivewithoutdata?
◦ During all stages of development life cycle
◦ Regular interval during post deployment
Canyourbusinesssurvivewithoutdata?
 Manual
◦ Source Code – Code review
◦ Application – Penetration
 Automated
◦ Source Code – Source Code Analyzer
www.ebusinessmantra.com
Canyourbusinesssurvivewithoutdata?
◦ Source Code – Source Code Analyzer
◦ Application – Vulnerability Scanners
(ebusinessmantra is a sales channel for Acunetix
– a leading web application vulnerability scanner
in the market)
Canyourbusinesssurvivewithoutdata?
 What are web applications? commonly used examples
 Why are web applications at security risk?
 Should you worry?
 Top 10 vulnerabilities (2008)
How do you minimize the risk?
www.ebusinessmantra.com
Canyourbusinesssurvivewithoutdata?
 How do you minimize the risk?
 Application Testing
 Hacking 101
Canyourbusinesssurvivewithoutdata?
 Cross Site Scripting
◦ http://testasp.acunetix.com/Search.asp
◦ Enter the following in the search field
◦ <br><br>Please login with the form below before proceeding:<form
action="destination.asp"><table><tr><td>Login:</td><td><input type=text
length=20 name=login></td></tr><tr><td>Password:</td><td><input
type=text length=20 name=password></td></tr></table><input type=submit
value=LOGIN></form>
www.ebusinessmantra.com
Canyourbusinesssurvivewithoutdata?
value=LOGIN></form>
◦ A login form is displayed but the login information is sent to hacker
◦ A hacker can use the same credentials and login on the site and hack the site
◦ Email spam: Click on the link, but the link contains the code as above which would
have the same results
◦ http://testasp.acunetix.com/Search.asp?tfSearch=%3Cbr%3E%3Cbr%3EPlease+login+with+
◦ the+form+below+before+proceeding%3A%3C form+action%3D%22test.asp%22%3E%3C
◦ table%3E%3Ctr%3E%3Ctd%3ELogin%3A%3C%2Ftd%3E%3Ctd%3E%3Cinput+type%3D
◦ text+ length%3D20+name%3Dlogin%3E%3C%2Ftd%3E%3C%2Ftr%3E%3Ctr%3E%3C
◦ td%3EPassword%3A%3C%2Ftd%3E%3Ctd%3E%3Cinput +type%3Dtext+length%3D20
◦ +name%3Dpassword%3E%3C%2Ftd%3E%3C%2Ftr%3E%3C%2Ftable%3E%3Cinput
◦ +type%3Dsubmit+value %3DLOGIN%3E%3C%2Fform%3E
Canyourbusinesssurvivewithoutdata?
www.ebusinessmantra.com
Canyourbusinesssurvivewithoutdata?
October 2008
Source: You Tube
Canyourbusinesssurvivewithoutdata?
 Remove all javascript validation from web
page
 Enter ‘ or 1 = 1 --; in the password field
 A code that is vulnerable to SQL Injection
will return the first record in the database
www.ebusinessmantra.com
Canyourbusinesssurvivewithoutdata?
will return the first record in the database
 YouTube has several demos,
◦ www.youtube.com/watch?v=MJNJjh4jORY
Canyourbusinesssurvivewithoutdata?
www.ebusinessmantra.com
Canyourbusinesssurvivewithoutdata?
October 2008
Source: You Tube
Canyourbusinesssurvivewithoutdata?
www.ebusinessmantra.com
Canyourbusinesssurvivewithoutdata?
October 2008
Source: You Tube

Web application vulnerabilities

  • 1.
  • 2.
    Canyourbusinesssurvivewithoutdata?  ebusinessmantra -- Web design and programming  Web application security solutions  Document Management Solutions Sales of Web Vulnerability Scanner software www.ebusinessmantra.com Canyourbusinesssurvivewithoutdata?  Sales of Web Vulnerability Scanner software  Internet Business Consulting – improve website ROI, lead generation to Customer Service (pre-sale to post sale cycle)
  • 3.
    Canyourbusinesssurvivewithoutdata?  What areweb applications? commonly used examples  Why are web applications at security risk?  Should you worry?  Top 10 vulnerabilities (2008) How do you minimize the risk? www.ebusinessmantra.com Canyourbusinesssurvivewithoutdata?  How do you minimize the risk?  Application Testing  Hacking 101
  • 4.
    Canyourbusinesssurvivewithoutdata?  What areweb applications? commonly used examples  Why are web applications at security risk?  Should you worry?  Top 10 vulnerabilities (2008) How do you minimize the risk? www.ebusinessmantra.com Canyourbusinesssurvivewithoutdata?  How do you minimize the risk?  Application Testing  Hacking 101
  • 5.
    Canyourbusinesssurvivewithoutdata?  Common examplesof web applications ◦ Dynamic, database driven web sites  Two types – with and without user actions. ◦ With User Actions  Account management (bank, financial, mortgage, …)  Online shopping www.ebusinessmantra.com Canyourbusinesssurvivewithoutdata?  Online shopping  Online banking  Online trading  Web sites that ask for information ◦ Without User Actions  Information passed through URL, hidden form fields, cookies – without user entering data in a form
  • 6.
  • 7.
    Canyourbusinesssurvivewithoutdata?  Added Securityaround components www.ebusinessmantra.com Canyourbusinesssurvivewithoutdata?
  • 8.
    Canyourbusinesssurvivewithoutdata?  What areweb applications? commonly used examples  Why are web applications at security risk?  Should you worry?  Top 10 vulnerabilities (2008) How do you minimize the risk? www.ebusinessmantra.com Canyourbusinesssurvivewithoutdata?  How do you minimize the risk?  Application Testing  Hacking 101
  • 9.
    Canyourbusinesssurvivewithoutdata?  Easy target ◦More than 70% websites are vulnerable (studies) ◦ SSL, Network, OS securities cannot protect web apps. ◦ Attack passes as normal traffic through ports 80 & 443 ◦ Only getting attention recently Lucrative: Easy access to confidential information – www.ebusinessmantra.com Canyourbusinesssurvivewithoutdata?  Lucrative: Easy access to confidential information – identity theft is a huge market  Low investment and high returns mean high ROI for a hacker  Economy ◦ Large number of software professionals without jobs – layoffs or fresh out of schools/colleges
  • 10.
    Canyourbusinesssurvivewithoutdata?  What areweb applications? commonly used examples  Why are web applications at security risk?  Should you worry?  Top 10 vulnerabilities (2008) How do you minimize the risk? www.ebusinessmantra.com Canyourbusinesssurvivewithoutdata?  How do you minimize the risk?  Application Testing  Hacking 101
  • 11.
    Canyourbusinesssurvivewithoutdata?  As website owner, you should worry ◦ Notable (Govt., security firms, banks) web sites have been hacked ◦ Many are not reported – legally not required, don’t want to tarnish company’s image and loose business www.ebusinessmantra.com Canyourbusinesssurvivewithoutdata? business ◦ Organized crimes, blackmail if the data is worth it ◦ High costs to remediate: $90 - $300 per record, plus lost business, lost customer confidence
  • 12.
    Canyourbusinesssurvivewithoutdata?  Consequences tobusiness can be overwhelming ◦ Loss or corruption of data ◦ Loss of business ◦ Loss of productive employees’ time to remediate www.ebusinessmantra.com Canyourbusinesssurvivewithoutdata? ◦ Loss of productive employees’ time to remediate the problem
  • 13.
  • 14.
  • 15.
  • 16.
  • 17.
    Canyourbusinesssurvivewithoutdata?  What areweb applications? commonly used examples  Why are web applications at security risk?  Should you worry?  Top 10 vulnerabilities (2008) How do you minimize the risk? www.ebusinessmantra.com Canyourbusinesssurvivewithoutdata?  How do you minimize the risk?  Application Testing  Hacking 101
  • 18.
    Canyourbusinesssurvivewithoutdata?  Cross SiteScripting (XSS)  Injection Flaws  Malicious File Execution  Insecure Direct Object Reference  Cross Site Request Forgery (CSRF) Information Leakage and Improper Error www.ebusinessmantra.com Canyourbusinesssurvivewithoutdata?  Information Leakage and Improper Error Handling  Broken Authentication and Session Management  Insecure Cryptographic Storage  Insecure Communications  Failure to Restrict URL Access
  • 19.
    Canyourbusinesssurvivewithoutdata?  XSS flawsoccur whenever an application takes user supplied data and sends it to a web browser without first examining the content. XSS allows attackers to execute script in the victim’s browser which can www.ebusinessmantra.com Canyourbusinesssurvivewithoutdata? script in the victim’s browser which can hijack user sessions, deface web sites, possibly introduce worms, etc.
  • 20.
    Canyourbusinesssurvivewithoutdata?  Injection flaws,particularly SQL injection, are common in web applications. Injection occurs when user-supplied data is sent to an interpreter as part of a command or query. The attacker’s hostile data tricks the www.ebusinessmantra.com Canyourbusinesssurvivewithoutdata? query. The attacker’s hostile data tricks the interpreter into executing unintended commands or changing data.
  • 21.
    Canyourbusinesssurvivewithoutdata?  Code vulnerableto remote file inclusion (RFI) allows attackers to include hostile code and data, resulting in devastating attacks, such as total server compromise. Malicious file execution attacks affect PHP, www.ebusinessmantra.com Canyourbusinesssurvivewithoutdata? Malicious file execution attacks affect PHP, XML and any framework which accepts filenames or files from users.
  • 22.
    Canyourbusinesssurvivewithoutdata?  A directobject reference occurs when a developer exposes a reference to an internal objects, such as a file, directory, database record, or key, as a URL or form parameter. Attackers can manipulate those www.ebusinessmantra.com Canyourbusinesssurvivewithoutdata? parameter. Attackers can manipulate those references to access other objects without authorization.
  • 23.
    Canyourbusinesssurvivewithoutdata?  A CSRFattack forces a logged-on victim’s browser to send a pre-authenticated request to a vulnerable web application, which then forces the victim’s browser to perform a hostile action to the benefit of www.ebusinessmantra.com Canyourbusinesssurvivewithoutdata? perform a hostile action to the benefit of the attacker. CSRF can be as powerful as the web application that it attacks.
  • 24.
    Canyourbusinesssurvivewithoutdata?  Applications canunintentionally leak information about their configuration, internal workings, or violate privacy through a variety of application problems. Attackers use this weakness to steal sensitive data or www.ebusinessmantra.com Canyourbusinesssurvivewithoutdata? use this weakness to steal sensitive data or conduct more serious attacks.
  • 25.
    Canyourbusinesssurvivewithoutdata?  Account credentialsand session tokens are often not properly protected. Attackers compromise passwords, keys, or authentication tokens to assume other users’ identities. www.ebusinessmantra.com Canyourbusinesssurvivewithoutdata? users’ identities.
  • 26.
    Canyourbusinesssurvivewithoutdata?  Web applicationsrarely use cryptographic functions properly to protect data and credentials. Attackers use weakly protected data to conduct identity theft and other crimes, such as credit card fraud. www.ebusinessmantra.com Canyourbusinesssurvivewithoutdata? crimes, such as credit card fraud.
  • 27.
    Canyourbusinesssurvivewithoutdata?  Applications frequentlyfail to encrypt network traffic when it is necessary to protect sensitive communications. www.ebusinessmantra.com Canyourbusinesssurvivewithoutdata?
  • 28.
    Canyourbusinesssurvivewithoutdata?  Frequently, anapplication only protects sensitive functionality by preventing the display of links or URLs to unauthorized users. Attackers can use this weakness to access and perform unauthorized www.ebusinessmantra.com Canyourbusinesssurvivewithoutdata? access and perform unauthorized operations by accessing those URLs directly.
  • 29.
    Canyourbusinesssurvivewithoutdata?  What areweb applications? commonly used examples  Why are web applications at security risk?  Should you worry?  Top 10 vulnerabilities (2008) How do you minimize the risk? www.ebusinessmantra.com Canyourbusinesssurvivewithoutdata?  How do you minimize the risk?  Application Testing  Hacking 101
  • 30.
    Canyourbusinesssurvivewithoutdata?  Awareness ◦ Allstakeholder must recognize the risks and work towards mitigation  Testing ◦ During all stages of development life cycle www.ebusinessmantra.com Canyourbusinesssurvivewithoutdata? ◦ During all stages of development life cycle ◦ Regular interval during post deployment
  • 31.
    Canyourbusinesssurvivewithoutdata?  Manual ◦ SourceCode – Code review ◦ Application – Penetration  Automated ◦ Source Code – Source Code Analyzer www.ebusinessmantra.com Canyourbusinesssurvivewithoutdata? ◦ Source Code – Source Code Analyzer ◦ Application – Vulnerability Scanners (ebusinessmantra is a sales channel for Acunetix – a leading web application vulnerability scanner in the market)
  • 32.
    Canyourbusinesssurvivewithoutdata?  What areweb applications? commonly used examples  Why are web applications at security risk?  Should you worry?  Top 10 vulnerabilities (2008) How do you minimize the risk? www.ebusinessmantra.com Canyourbusinesssurvivewithoutdata?  How do you minimize the risk?  Application Testing  Hacking 101
  • 33.
    Canyourbusinesssurvivewithoutdata?  Cross SiteScripting ◦ http://testasp.acunetix.com/Search.asp ◦ Enter the following in the search field ◦ <br><br>Please login with the form below before proceeding:<form action="destination.asp"><table><tr><td>Login:</td><td><input type=text length=20 name=login></td></tr><tr><td>Password:</td><td><input type=text length=20 name=password></td></tr></table><input type=submit value=LOGIN></form> www.ebusinessmantra.com Canyourbusinesssurvivewithoutdata? value=LOGIN></form> ◦ A login form is displayed but the login information is sent to hacker ◦ A hacker can use the same credentials and login on the site and hack the site ◦ Email spam: Click on the link, but the link contains the code as above which would have the same results ◦ http://testasp.acunetix.com/Search.asp?tfSearch=%3Cbr%3E%3Cbr%3EPlease+login+with+ ◦ the+form+below+before+proceeding%3A%3C form+action%3D%22test.asp%22%3E%3C ◦ table%3E%3Ctr%3E%3Ctd%3ELogin%3A%3C%2Ftd%3E%3Ctd%3E%3Cinput+type%3D ◦ text+ length%3D20+name%3Dlogin%3E%3C%2Ftd%3E%3C%2Ftr%3E%3Ctr%3E%3C ◦ td%3EPassword%3A%3C%2Ftd%3E%3Ctd%3E%3Cinput +type%3Dtext+length%3D20 ◦ +name%3Dpassword%3E%3C%2Ftd%3E%3C%2Ftr%3E%3C%2Ftable%3E%3Cinput ◦ +type%3Dsubmit+value %3DLOGIN%3E%3C%2Fform%3E
  • 34.
  • 35.
    Canyourbusinesssurvivewithoutdata?  Remove alljavascript validation from web page  Enter ‘ or 1 = 1 --; in the password field  A code that is vulnerable to SQL Injection will return the first record in the database www.ebusinessmantra.com Canyourbusinesssurvivewithoutdata? will return the first record in the database  YouTube has several demos, ◦ www.youtube.com/watch?v=MJNJjh4jORY
  • 36.
  • 37.