Webcast 97585
Webcast 97585
Once the script is inserted into the web page, it is automatically executed by the
victim’s web browser when the web page is loaded.
THREAT LANDSCAPE: SQL INJECTION ATTACKS
SQL Injection attacks are commonly used to extract sensitive information from web
applications. Examples include:
User account information, i.e. email
addresses and passwords
Stored credit card data
System configuration details
THREAT LANDSCAPE: SQL INJECTION ATTACKS (CONTINUED)
There are SQL Injection tricks that the hackers can use to find your interesting data
such as viewing all of the tables in the database:
THE ALIENVAULT USM SOLUTION: NETWORK INTRUSION DETECTION
Network IDS is embedded in our platform, giving you the ability to detect network level
attacks including identifying malicious web requests sent to your web server.
Automatically
correlates known
attackers with
malicious activity
detected from both
the network and host
intrusion detection
systems
Security
Piece it all
Asset Discovery
Intelligence
together • Active Network Scanning
• Passive Network Scanning
• Asset Inventory
• Host-based Software Inventory
Vulnerability Assessment
Look for strange • Network Vulnerability Testing
Behavioral Figure out what
Asset
activity which could is valuable
Monitoring
indicate a threat Discovery Threat Detection
• Network IDS
• Host IDS
• Wireless IDS
• File Integrity Monitoring
Behavioral Monitoring
• Log Collection
• Netflow Analysis
Threat
Start looking Identify ways the
Vulnerability • Service Availability Monitoring
Detection
for threats target could be
Assessment
compromised Security Intelligence
• SIEM Correlation
• Incident Response
UNIFIED SECURITY MANAGEMENT
“Security Intelligence through Integration that we do, NOT you”
USM Platform • USM Extension API - Support for inclusion of any other
• Bundled Products - 30 Open-Source Security tools to plug data source into the USM Framework
the gaps in your existing controls • Open Threat Exchange –Provides threat intelligence for
• USM Framework - Configure, Manage, & Run Security collaborative defense
Tools. Visualize output and run reports
DEMO NETWORK DETAILS
The demo environment that we are testing in today contains
the following:
NON-DEFAULT CONFIGURATION
Apache access.log monitoring is not a default behavior of the
AlienVault HIDS agent
NOW FOR SOME Q&A…
Questions? [email protected]