Академический Документы
Профессиональный Документы
Культура Документы
http://www.owasp.org
Sebastien Deleersnyder?
5 years developer experience 11 years information security experience
Co-organizer www.BruCON.org
OWASP World
OWASP is a worldwide free and open community focused on improving the security of application software.
Everyone is free to participate in OWASP and all of our materials are available under a free and open software license. The OWASP Foundation is a 501c3 not-for-profit charitable organization that ensures the ongoing availability and support for our work.
Our mission is to make application security visible so that people and organizations can make informed decisions about application security risks.
Myth
We are secure because we have a firewall 75% of Internet Vulnerabilities are at Web Application Layer *
|4
|5
Security evolution?
You cant use network layer protection (firewall, SSL, IDS, hardening) to stop or detect application layer attacks
|9
Billing
Firewall
OWASP Top 10
A1 Injection
Injection means Tricking an application into including unintended commands in the data sent to an interpreter
Interpreters
Take strings and interpret them as commands SQL, OS Shell, LDAP, XPath, Hibernate, etc SQL injection is still quite common Many applications still susceptible (really dont know why) Even though its usually very simple to avoid Typical Impact
Usually severe. Entire database can usually be read or modified May also allow full database schema, or account access, or even OS level access
User Database
Web Server
Application Server
Select user_information from user_table where username=input username and password=input password
RockYou?
December 2009 Result
data of 32.603.388 users and administrative accounts was compromised (credentials + clear text passwords) the data also contained email-addresses and passwords for 3rd party sites a hacker used SQL Injection techniques to hack the database of RockYou RockYou creates applications for MySpace, Facebook, ...
Question: how many of those users use the same password for other sites too?
Raw data
Stored in database Reflected from web input (form field, hidden field, URL, etc) Sent directly into rich JavaScript client Virtually every web application has this problem Try this in your browser javascript:alert(document.cookie) Typical Impact Steal users session, steal sensitive data, rewrite web page, redirect user to phishing or malware site Most Severe: Install XSS proxy which allows attacker to observe and direct all users behavior on vulnerable site and force user to other sites
XSSED.ORG
HTTP is a stateless protocol Means credentials have to go with every request Should use SSL for everything requiring authentication Session management flaws SESSION ID used to track state since HTTP doesnt and it is just as good as credentials to an attacker SESSION ID is typically exposed on the network, in browser, in logs,
https://www.onlinebank.com/user?acct=6065
CSRF Illustrated
page 23
CSRF Illustrated
25
A6 Security Misconfiguration
Web applications rely on a secure foundation All through the network and platform Dont forget the development environment Is your source code a secret?
Think of all the places your source code goes Security should not require secret source code
Configuration Management must extend to all parts of the application All credentials should change in production Typical Impact Install backdoor through missing network or server patch XSS flaw exploits due to missing application framework patches Unauthorized access to default accounts, application functionality or data, or unused but accessible functionality due to poor server configuration
Administration Transactions
Accounts Finance
Datab ase
Development
Insider
Test Servers
Source Control
Serving up malware
A quick Google Safe Browsing search of TechCrunch Europe's site shows suspicious activity twice over the last 90 days. "Of the 128 pages we tested on the site over the past 90 days, 58 page(s) resulted in malicious software being downloaded and installed without user consent. (sep 2010)
28
This is part of enforcing proper authorization, along with A4 Insecure Direct Object References
A common mistake Displaying only authorized links and menu choices This is called presentation layer access control, and doesnt work Attacker simply forges direct access to unauthorized pages Typical Impact
Attackers invoke functions and services theyre not authorized for Access other users accounts and data Perform privileged actions
https://www.onlinebank.com/user/getAccounts
Failure to identify all sensitive data Failure to identify all the places that this sensitive data gets stored
Databases, files, directories, log files, backups, etc.
Typical Impact
Attackers extract secrets to use in additional attacks Company embarrassment, customer dissatisfaction, and loss of trust Expense of cleaning up the incident, such as forensics, sending apology letters, reissuing thousands of credit cards, providing identity theft insurance Business gets sued and/or fined
32
Failure to identify all sensitive data Failure to identify all the places that this sensitive data is sent
On the web, to backend databases, to business partners, internal communications
Typical Impact
Attackers extract secrets to use in additional attacks Company embarrassment, customer dissatisfaction, and loss of trust Expense of cleaning up the incident Business gets sued and/or fined
34
They internally send the request to a new page in the same application Sometimes parameters define the target page If not validated, attacker may be able to use unvalidated forward to bypass authentication or authorization checks Typical Impact Redirect victim to phishing or malware site Attackers request is forwarded past security checks, allowing unauthorized function or data access
Jobs by CNN?
http://ads.cnn.com/event.ng/Type=click&Redirect=http:/bit.ly/cPXW
36
Download
http://www.owasp.org/index.php/Top_10
People
Tools
Process
39
Gap analysis:
Capturing scores from detailed assessments versus expected performance levels Demonstrating improvement
Capturing scores from before and after an iteration of assurance program build-out
Ongoing measurement
To make the building blocks usable, SAMM defines Roadmaps templates for typical kinds of organizations
|43
www.owasp.org
44
|44
45
The Ghost of XSS Past, Present and Future A Defensive Tale (by Jim Manico, Infrared Security) 16-Jun - Brussels: The OWASP AppSensor Project (by Colin Watson, Watson Hall Ltd)
How to become Twitter's admin: An introduction to Modern Web Service Attacks (by Andreas Falkenberg, RUB)
OWASP AppSec Europe Dublin Jun 7-9 BruCON Brussels Sep 19-22
46
47
48