SlideShare a Scribd company logo
Discovering the Value of Verifying Web Application Security Using IBM Rational AppScan Lee Kinsman – Software Architect Alan Kan – Technical Specialist
Agenda Introductions & facilities The importance of web application security Vulnerability Analysis Top Attacks Overview Hands on Labs 1-2 Vulnerability Analysis (continued) Hands on Labs 3-5 Automated Vulnerability Analysis AppScan Overview Hands on Lab 6
Welcome to the Hacking 101 Workshop Introductions Restrooms Emergency Exits Smoking Policy
POT Objectives By the end of this session you will: Understand the web application environment Understand and differentiate between network and application level vulnerabilities Understand where the vulnerabilities exist Understand how to leverage AppScan to perform an automated scan for vulnerabilities
Agenda Introductions & facilities The importance of web application security Vulnerability Analysis Top Attacks Overview Hands on Labs 1-2 Vulnerability Analysis (continued) Hands on Labs 3-5 Automated Vulnerability Analysis AppScan Overview Hands on Lab 6
The Alarming Truth LexisNexis Data Breach - Washington Post Feb 17, 2008 IndiaTimes.com Malware — InformationWeek Feb 17,2008 Hacker breaks into Ecuador’s presidential website —  Thaindian, Feb 11, 2008 Hacking Stage 6 —  Wikipedia, Feb 9 2007 Hacker steals Davidson Cos client data -  Falls Tribune, Feb 4 2008 RIAA wiped off the Net —  TheRegister, Jan 20 2008 Chinese hacker steals 18M identities - HackBase.com, Feb 10,2008 Mac blogs defaced by XSS The Register, Feb 17,  2008 Your Free MacWorld Expo Platinum Pass —  CNet, Jan 14, 2008   Hacker takes down Pennsylvania gvmt —  AP, Jan 6, 2008 Drive-by Pharming in the Wild —  Symantec, Jan 21 2008 Italian Bank hit by XSS fraudsters —  Netcraft, Jan 8 2008 Greek Ministry websites hit by hacker intrusion —  eKathimerini, Jan 31,2008
“ Security Intelligence Service director Warren Tucker revealed government department websites had been attacked and information stolen ” nzherald.co.nz Sep 12, 2007  “ A florist which does all of its business online has had its website targeted by hackers and customers' credit card details have been stolen. “ abc.net.au Sep 17, 2007  “ Turkish hackers bring down insurer's site…The site was shut down as a precaution and was unavailable for most of today” SMH.com.au July 20, 2007  “ Computer hackers have cracked the defences of dozens of top government and business sector internet sites this year, raising concerns about the safety of consumers' financial and personal information.”  SMH.com.au October 14 2007 “ Approximately 100 million Americans have been informed that they have suffered a security breach so this problem has reached epidemic proportions.” Jon Oltsik – Enterprise Strategy Group The Alarming Truth
Security and compliance risks 90% of sites are vulnerable to application attacks  80% of organizations will experience an application security incident by 2010 64% of CIOs feel that the most significant challenge facing IT organizations is Security, Compliance and Data Protection. (Disability Discrimination Act (DDA), Payment Card Industry (PCI) Standards, SOX 75%  of the cyber attacks today are at the  application level Compliance requirements: Payment Card Industry (PCI) Standards, GLBA, HIPPA, FISMA Security and compliance integrity risks have serious adverse impacts on a company’s identity, customer relations and business results.
Reality: Security and Spending Are Unbalanced Sources: Gartner, Watchfire % of Attacks % of Dollars 75% 10% 25% 90% Sources: Gartner, Watchfire of All Attacks on Information Security Are Directed to the Web Application Layer 75% of All Web Applications Are Vulnerable 2/3 Network Server Web Applications Security Spending
2006 Vulnerability Statistics (31,373 sites)  **  http://www.webappsec.org/projects/statistics/
The Myth: Our Site Is Safe We Use Network Vulnerability Scanners We Have Firewalls in Place We Audit It Once a Quarter with Pen Testers We Use SSL Encryption
Confusing Network Security Discipline with Application Security “Application developers and their superiors in IT departments too often mistakenly believe that firewalls, IDS / IPS, and network traffic encryption are sufficient measures for application security.  By doing so they are confusing application security with network security” “None of those technologies hardens application code.  All those technologies deal with traffic to applications, not with the applications themselves…. Applications need protection through separate, specific security discipline – application security”  Application Security Testing, Gartner, March 2, 2007
High Level Web Application Architecture Review (Presentation) App Server (Business Logic) Database Client Tier (Browser) Middle Tier Data Tier Firewall Sensitive data is stored here Protects Network Internet SSL Protects Transport Customer App is deployed here
Network Defenses for Web Applications Intrusion Detection System Intrusion Prevention System Application Firewall Firewall System Incident Event Management (SIEM) Perimeter IDS IPS App Firewall Security
Port 80 and Port 443 are open for business….
Building Security & Compliance into the SDLC Developers SDLC Developers Developers Enable Security to effectively drive remediation into development Provides Developers and Testers with expertise on detection and remediation ability Ensure vulnerabilities are addressed before applications are put into production Build Coding QA Security Production
Agenda Introductions & facilities The importance of web application security  Vulnerability Analysis Top Attacks Overview Hands on Labs 1-2 Vulnerability Analysis (continued) Hands on Labs 3-5 Automated Vulnerability Analysis AppScan Overview Hands on Lab 6
Where are the Vulnerabilities? Network Network Operating System Operating System Applications Applications Database Database Third-party Components Third-party Components Web Server Web Server Configuration Web Server Web Server Configuration Web Applications Client-Side Custom Web Services Web Applications Client-Side Custom Web Services Network Nessus ISS QualysGuard eEye Retina Foundstone Host Symantec NetIQ ISS CA  Harris STAT Database AppSec Inc NGS Software App Scanners Watchfire SPI Dynamics Cenzic NT Objectives Acunetix WVS Code Scanning Emerging Tech Fortify Ounce Labs Secure Software Klockwork Parasoft Network Operating System Applications Database Web Server Web Server Configuration Third-party Components Web Applications Client-Side Custom Web Services Security
Security Defects: Those I manage vs. Those I own Requires automatic application lifecycle security Patch latency primary issue Business Risk Requires application specific knowledge Match signatures & check for known misconfigurations. Detection Early detection saves $$$ As secure as 3 rd  party software Cost Control SQL injection, path tampering, Cross site scripting, Suspect content & cookie poisoning  Known vulnerabilities (patches issued), misconfiguration Type(s) of Exploits Business logic  - dynamic data consumed by an application 3 rd  party  technical building blocks or infrastructure  (web servers,) Location within Application Insecure application development  In-house   Insecure application development by  3 rd  party SW Cause of Defect Application Specific Vulnerabilities (ASVs) Infrastructure Vulnerabilities or Common Web Vulnerabilities (CWVs)
OWASP and the OWASP Top 10 list Open Web Application Security Project – an open organization dedicated to fight insecure software “The OWASP Top Ten document represents a broad consensus about what the most critical web application security flaws are”  We will use the Top 10 list to cover some of the most common security issues in web applications
The OWASP Top 10 list Hackers can impersonate legitimate users, and control their accounts. Identity Theft, Sensitive Information Leakage, … Cross Site scripting Hacker can forcefully browse and access a page past the login page Hacker can access unauthorized resources Failure to Restrict URL Access Unencrypted credentials “sniffed” and used by hacker to impersonate user Sensitive info sent unencrypted over insecure channel Insecure Communications Confidential information (SSN, Credit Cards) can be decrypted by malicious users Weak encryption techniques may lead to broken encryption Insecure Cryptographic Storage Hacker can “force” session token on victim; session tokens can be stolen after logout Session tokens not guarded or invalidated properly Broken Authentication & Session Management Malicious system reconnaissance may assist in developing further attacks Attackers can gain detailed system information Information Leakage and Improper Error Handling Blind requests to bank account transfer money to hacker Attacker can invoke “blind” actions on web applications, impersonating as a trusted user Cross-Site Request Forgery Web application returns contents of sensitive file (instead of harmless one) Attacker can access sensitive files and resources Insecure Direct Object Reference Site modified to transfer all interactions to the hacker. Execute shell commands on server, up to full control Malicious File Execution Hackers can access backend database information, alter it or steal it. Attacker can manipulate queries to the DB / LDAP / Other system Injection Flaws Example Impact Negative Impact Application Threat
1. Cross-Site Scripting (XSS) What is it? Malicious script echoed back into HTML returned from a trusted site, and runs under trusted context What are the implications? Session Tokens stolen (browser security circumvented) Complete page content compromised Future pages in browser compromised
Cross Site Scripting – The Exploit Process Evil.org User bank.com 1) Link to bank.com sent to user via E-mail or HTTP 2) User sends script embedded as data 3) Script/data returned, executed by browser 4) Script sends user’s cookie and session    information without the user’s    consent or knowledge 5) Evil.org uses stolen session information to impersonate user
XSS Example I HTML code:
XSS Example II HTML code:
XSS – Details Common in Search, Error Pages and returned forms. But can be found on any type of page Any input may be echoed back Path, Query, Post-data, Cookie, Header, etc. Browser technology used to aid attack XMLHttpRequest (AJAX), Flash, IFrame… Has many variations XSS in attribute, DOM Based XSS, etc.
Exploiting XSS If I can get you to run my JavaScript, I can… Steal your cookies for the domain you’re browsing Track every action you do in that browser from now on Redirect you to a Phishing site Completely modify the content of any page you see on this domain Exploit browser vulnerabilities to take over machine … XSS is the Top Security Risk today (most exploited)
Agenda Introductions & facilities The importance of web application security Vulnerability Analysis Top Attacks Overview Hands on Labs 1-2 Vulnerability Analysis (continued) Hands on Labs 3-5 Automated Vulnerability Analysis AppScan Overview Hands on Lab 6
Hands-on Labs Lab 1 – Profile Web Application Lab 2 – Steal Cookies Lab 3 – Login without Credentials Lab 4 – Steal Usernames and Passwords Lab 5 –  Logging into the Administrative Portal  Lab 6 – Automated Scan of Website
Lab 1 Profile Web Application The Goal of this lab is to profile the demo.testfire.net application Identify the Lab Workbook and where to start (page 5), where to stop (page 11)
Lab 2 Steal Cookies The goals of the lab is to utilize a Cross Site Scripting vulnerability on the demo.testfire.net application in order to access cookies on a target user’s browser Identify the Lab Workbook and where to start (page 12), where to stop (page 18)
Agenda Introductions & facilities Security Landscape Vulnerability Analysis Top Attacks Overview Hands on Labs 1-2 Vulnerability Analysis (continued) Hands on Labs 3-5 Automated Vulnerability Analysis AppScan Overview Hands on Lab 6
2 - Injection Flaws What is it? User-supplied data is sent to an interpreter as part of a command, query or data. What are the implications? SQL Injection – Access/modify data in DB SSI Injection – Execute commands on server and access sensitive data LDAP Injection – Bypass authentication …
SQL Injection User input inserted into SQL Command: Get product details by id: Select * from products where id=‘ $REQUEST[“id”] ’; Hack: send param id with value  ‘ or ‘1’=‘1 Resulting executed SQL: Select * from products where id=‘ ’ or ‘1’=‘1 ’ All products returned
SQL Injection Example I
SQL Injection Example II
SQL Injection Example - Exploit
SQL Injection Example - Outcome
Injection Flaws (SSI Injection Example)  Creating commands from input
The return is the private SSL key of the server
3 - Malicious File Execution What is it? Application tricked into executing commands or creating files on server What are the implications? Command execution on server – complete takeover Site Defacement, including XSS option
Malicious File Execution – Example I
Malicious File Execution – Example cont.
Malicious File Execution – Example cont.
4 - Insecure Direct Object Reference What is it? Part or all of a resource (file, table, etc.) name controlled by user input. What are the implications? Access to sensitive resources Information Leakage, aids future hacks
Insecure Direct Object Reference - Example
Insecure Direct Object Reference – Example Cont.
Insecure Direct Object Reference – Example Cont.
5 - Information Leakage and Improper Error Handling What is it? Unneeded information made available via errors or other means. What are the implications? Sensitive data exposed Web App internals and logic exposed (source code, SQL syntax, exception call stacks, etc.) Information aids in further hacks
Information Leakage  - Example
Improper Error Handling - Example
Information Leakage – Different User/Pass Error
6 - Failure to Restrict URL Access What is it? Resources that should only be available to authorized users can be accessed by forcefully browsing them What are the implications? Sensitive information leaked/modified Admin privileges made available to hacker
Failure to Restrict URL Access  - Admin User login /admin/admin.aspx
Simple user logs in, forcefully browses to admin page
Failure to Restrict URL Access:  Privilege Escalation Types Access given to completely restricted resources Accessing files that shouldn’t be served (*.bak, “Copy Of”, *.inc, *.cs, ws_ftp.log, etc.) Vertical Privilege Escalation Unknown user accessing pages past login page Simple user accessing admin pages Horizontal Privilege Escalation User accessing other user’s pages Example: Bank account user accessing another’s
Agenda Introductions & facilities Security Landscape Vulnerability Analysis Top Attacks Overview Hands on Labs 1-2 Vulnerability Analysis (continued) Hands on Labs 3-5 Automated Vulnerability Analysis AppScan Overview Hands on Lab 6
Hands-on Labs 3-5 Lab 1 – Profile Web Application Lab 2 – Steal Cookies Lab 3 – Login without Credentials Lab 4 – Steal Usernames and Passwords Lab 5 –  Logging into the Administrative Portal   Lab 6 – Automated Scan of Website
Lab 3 overview Login without Credentials The goal of the lab is to use locate a SQL injection vulnerability and exploit it to log into the demo.testfire.net application without a password Identify the Lab Workbook and where to start (page 19), where to stop (page 24)
Lab 4 overview – Steal Username and Password The Goal of this Lab is to exploit the SQL Injection vulnerability further in order to extract all the usernames and passwords from the demo.testfire.net application Identify the Lab Workbook and where to start (page 25), where to stop (page 31)
Lab 5 overview – Logging in to Admin Portal The Goal of this lab is to use Information Leakage and Direct Access to URLs to find and log into the administrative portal Identify the Lab Workbook and where to start (page 32), where to stop (page 36)
Agenda Introductions & facilities Security Landscape Vulnerability Analysis Top Attacks Overview Hands on Labs 1-2 Vulnerability Analysis (continued) Hands on Labs 3-5 Automated Vulnerability Analysis AppScan Overview Hands on Lab 6
Watchfire in the Rational Portfolio Developer Test Functional Test Automated Manual Rational RequisitePro  Rational ClearQuest Rational ClearQuest Defects Project Dashboards Detailed Test Results Quality Reports Performance Test SOFTWARE QUALITY SOLUTIONS Test and Change Management Test Automation Quality Metrics DEVELOPMENT OPERATOINS BUSINESS Rational ClearQuest Requirements  Test Change Rational PurifyPlus Rational Test RealTime  Rational Functional Tester Plus  Rational Functional Tester Rational Robot Rational Manual Tester Rational Performance Tester Security and Compliance Test AppScan Policy Tester Interface Compliance  Policy Tester Test Automation Content Compliance ADA 508, GLBA, Safe Harbor Quality, Brand, Search, Inventory
AppScan What is it? AppScan is an automated tool used to perform vulnerability assessments on Web Applications Why do I need it? To simplify finding and fixing web application security problems  What does it do? Scans web applications, finds security issues and reports on them in an actionable fashion Who uses it? Security Auditors – main users today QA engineers – when the auditors become the bottle neck Developers – to find issues as early as possible (most efficient)
What does AppScan test for? Network Operating System Applications Database Third-party Components Web Applications AppScan Web Server Web Server Configuration
How does AppScan work? Approaches an application as a black-box Traverses a web application and builds the site model Determines the attack vectors based on the selected Test policy  Tests by sending modified HTTP requests to the application and examining the HTTP response according to validate rules HTTP Request Web Application HTTP Response
AppScan Goes Beyond Pointing out Problems
Actionable Fix Recommendations
AppScan with QA Defect Logger for ClearQuest
IBM Watchfire on the Net Watchfire.com -  http://www.watchfire.com Product evaluation download AppScan Extensions Framework  –  http://axf.watchfire.com Power Point Reporter, Pyscan, Defect Logger CQ Watchfire Blog  –  http:// blog.watchfire.com/wfblog Expert opinion and watchfire news  AppScan Knowledge On Demand  (computer based training) App Security 101, OWASP Top 10, WASC Threat Classifications, Common Attacks
Lab 6 overview The goal of this lab is to use AppScan in order to automate the detection of vulnerabilities within a web application Identify the Lab Workbook and where to start (page 37), where to stop (page 59)
Session summary
Session summary Understand the web application environment Understand and differentiate between network and application level vulnerabilities Understand where the vulnerabilities exist Hands on exercises to understand types of vulnerabilities Hands on exercise to leverage automated scan for vulnerabilities
Next steps Further discussions with IBM Rational Account Representative and/or AppScan product expert. Jono Massy-Greene [email_address] 04-462-3487 021-228-3703 Alan Kan [email_address] 09-359-8768 021-668-185 Schedule a Security Business Value Assessment Schedule a Vulnerability Assessment of one our your Applications
Register today with discount code “HDDE” and receive $100 off your registration fee! Visit www.ibm.com/rational/rsdc for more information IBM Rational Software Development Conference 2008 June 1 – 5, 2008; Orlando, Florida CONFERENCE HIGHLIGHTS: Over 3,000 customers and partners Over 300 sessions – 14 tracks Executive Summit 2008 3- and 5-hour Technical Workshops Access to IBM Engineers  and IBM Research Keynotes with industry-leading experts Exhibit hall showcasing complimentary  product and services Unlimited networking opportunities IBM Solution Center Interactive Birds-of-a-Feather Sessions
 
We appreciate your feedback.  Please fill out the survey form in order to improve this educational event.

More Related Content

What's hot (20)

Testing Web Application Security
Testing Web Application SecurityTesting Web Application Security
Testing Web Application Security
Ted Husted
 
How PCI And PA DSS will change enterprise applications
How PCI And PA DSS will change enterprise applicationsHow PCI And PA DSS will change enterprise applications
How PCI And PA DSS will change enterprise applications
Ben Rothke
 
Web Application Security Testing Tools
Web Application Security Testing ToolsWeb Application Security Testing Tools
Web Application Security Testing Tools
Eric Lai
 
Innovating Faster with Continuous Application Security
Innovating Faster with Continuous Application Security Innovating Faster with Continuous Application Security
Innovating Faster with Continuous Application Security
Jeff Williams
 
Veracode - Inglês
Veracode - InglêsVeracode - Inglês
Veracode - Inglês
DeServ - Tecnologia e Servços
 
Application Security at DevOps Speed and Portfolio Scale
Application Security at DevOps Speed and Portfolio ScaleApplication Security at DevOps Speed and Portfolio Scale
Application Security at DevOps Speed and Portfolio Scale
Jeff Williams
 
2017-11 Three Ways of Security - OWASP London
2017-11 Three Ways of Security - OWASP London2017-11 Three Ways of Security - OWASP London
2017-11 Three Ways of Security - OWASP London
Jeff Williams
 
Mobile App Security Testing -2
Mobile App Security Testing -2Mobile App Security Testing -2
Mobile App Security Testing -2
Krisshhna Daasaarii
 
Challenges in Testing Mobile App Security
Challenges in Testing Mobile App SecurityChallenges in Testing Mobile App Security
Challenges in Testing Mobile App Security
Cygnet Infotech
 
The Complete Web Application Security Testing Checklist
The Complete Web Application Security Testing ChecklistThe Complete Web Application Security Testing Checklist
The Complete Web Application Security Testing Checklist
Cigital
 
Healthcare application-security-practices-survey-veracode
Healthcare application-security-practices-survey-veracodeHealthcare application-security-practices-survey-veracode
Healthcare application-security-practices-survey-veracode
Veracode
 
Mobile application security
Mobile application securityMobile application security
Mobile application security
Shubhneet Goel
 
Introducing IBM Cloud Security Enforcer, CASB, IDaaS and Threat Prevention
Introducing IBM Cloud Security Enforcer, CASB, IDaaS and Threat PreventionIntroducing IBM Cloud Security Enforcer, CASB, IDaaS and Threat Prevention
Introducing IBM Cloud Security Enforcer, CASB, IDaaS and Threat Prevention
IBM Security
 
Transforming Risky Mobile Apps into Self Defending Apps
Transforming Risky Mobile Apps into Self Defending AppsTransforming Risky Mobile Apps into Self Defending Apps
Transforming Risky Mobile Apps into Self Defending Apps
Blueboxer2014
 
Web Application Firewall (WAF) DAST/SAST combination
Web Application Firewall (WAF) DAST/SAST combinationWeb Application Firewall (WAF) DAST/SAST combination
Web Application Firewall (WAF) DAST/SAST combination
Tjylen Veselyj
 
Mobile Application Security Testing, Testing for Mobility App | www.idexcel.com
Mobile Application Security Testing, Testing for Mobility App | www.idexcel.comMobile Application Security Testing, Testing for Mobility App | www.idexcel.com
Mobile Application Security Testing, Testing for Mobility App | www.idexcel.com
Idexcel Technologies
 
Strengthening cyber resilience with Software Supply Chain Visibility
Strengthening cyber resilience with Software Supply Chain VisibilityStrengthening cyber resilience with Software Supply Chain Visibility
Strengthening cyber resilience with Software Supply Chain Visibility
Sonatype
 
The cyber house of horrors - securing the expanding attack surface
The cyber house of horrors -  securing the expanding attack surfaceThe cyber house of horrors -  securing the expanding attack surface
The cyber house of horrors - securing the expanding attack surface
Jason Bloomberg
 
Application Security
Application SecurityApplication Security
Application Security
Reggie Niccolo Santos
 
Security testing of mobile applications
Security testing of mobile applicationsSecurity testing of mobile applications
Security testing of mobile applications
GTestClub
 
Testing Web Application Security
Testing Web Application SecurityTesting Web Application Security
Testing Web Application Security
Ted Husted
 
How PCI And PA DSS will change enterprise applications
How PCI And PA DSS will change enterprise applicationsHow PCI And PA DSS will change enterprise applications
How PCI And PA DSS will change enterprise applications
Ben Rothke
 
Web Application Security Testing Tools
Web Application Security Testing ToolsWeb Application Security Testing Tools
Web Application Security Testing Tools
Eric Lai
 
Innovating Faster with Continuous Application Security
Innovating Faster with Continuous Application Security Innovating Faster with Continuous Application Security
Innovating Faster with Continuous Application Security
Jeff Williams
 
Application Security at DevOps Speed and Portfolio Scale
Application Security at DevOps Speed and Portfolio ScaleApplication Security at DevOps Speed and Portfolio Scale
Application Security at DevOps Speed and Portfolio Scale
Jeff Williams
 
2017-11 Three Ways of Security - OWASP London
2017-11 Three Ways of Security - OWASP London2017-11 Three Ways of Security - OWASP London
2017-11 Three Ways of Security - OWASP London
Jeff Williams
 
Challenges in Testing Mobile App Security
Challenges in Testing Mobile App SecurityChallenges in Testing Mobile App Security
Challenges in Testing Mobile App Security
Cygnet Infotech
 
The Complete Web Application Security Testing Checklist
The Complete Web Application Security Testing ChecklistThe Complete Web Application Security Testing Checklist
The Complete Web Application Security Testing Checklist
Cigital
 
Healthcare application-security-practices-survey-veracode
Healthcare application-security-practices-survey-veracodeHealthcare application-security-practices-survey-veracode
Healthcare application-security-practices-survey-veracode
Veracode
 
Mobile application security
Mobile application securityMobile application security
Mobile application security
Shubhneet Goel
 
Introducing IBM Cloud Security Enforcer, CASB, IDaaS and Threat Prevention
Introducing IBM Cloud Security Enforcer, CASB, IDaaS and Threat PreventionIntroducing IBM Cloud Security Enforcer, CASB, IDaaS and Threat Prevention
Introducing IBM Cloud Security Enforcer, CASB, IDaaS and Threat Prevention
IBM Security
 
Transforming Risky Mobile Apps into Self Defending Apps
Transforming Risky Mobile Apps into Self Defending AppsTransforming Risky Mobile Apps into Self Defending Apps
Transforming Risky Mobile Apps into Self Defending Apps
Blueboxer2014
 
Web Application Firewall (WAF) DAST/SAST combination
Web Application Firewall (WAF) DAST/SAST combinationWeb Application Firewall (WAF) DAST/SAST combination
Web Application Firewall (WAF) DAST/SAST combination
Tjylen Veselyj
 
Mobile Application Security Testing, Testing for Mobility App | www.idexcel.com
Mobile Application Security Testing, Testing for Mobility App | www.idexcel.comMobile Application Security Testing, Testing for Mobility App | www.idexcel.com
Mobile Application Security Testing, Testing for Mobility App | www.idexcel.com
Idexcel Technologies
 
Strengthening cyber resilience with Software Supply Chain Visibility
Strengthening cyber resilience with Software Supply Chain VisibilityStrengthening cyber resilience with Software Supply Chain Visibility
Strengthening cyber resilience with Software Supply Chain Visibility
Sonatype
 
The cyber house of horrors - securing the expanding attack surface
The cyber house of horrors -  securing the expanding attack surfaceThe cyber house of horrors -  securing the expanding attack surface
The cyber house of horrors - securing the expanding attack surface
Jason Bloomberg
 
Security testing of mobile applications
Security testing of mobile applicationsSecurity testing of mobile applications
Security testing of mobile applications
GTestClub
 

Viewers also liked (15)

IBM Security Software Solutions - Powerpoint
 IBM Security Software Solutions - Powerpoint IBM Security Software Solutions - Powerpoint
IBM Security Software Solutions - Powerpoint
Thierry Matusiak
 
IBM Security Software Solutions - One Pager
IBM Security Software Solutions - One PagerIBM Security Software Solutions - One Pager
IBM Security Software Solutions - One Pager
Thierry Matusiak
 
IBM Security Strategy
IBM Security StrategyIBM Security Strategy
IBM Security Strategy
Camilo Fandiño Gómez
 
IBM Security Software Solutions
IBM Security Software Solutions IBM Security Software Solutions
IBM Security Software Solutions
Thierry Matusiak
 
Hacking 101 (Session 2)
Hacking 101  (Session 2)Hacking 101  (Session 2)
Hacking 101 (Session 2)
Nitroxis Sprl
 
Advanced applications-architecture-threats
Advanced applications-architecture-threatsAdvanced applications-architecture-threats
Advanced applications-architecture-threats
Blueinfy Solutions
 
Unit 05: Physical Architecture Design
Unit 05: Physical Architecture DesignUnit 05: Physical Architecture Design
Unit 05: Physical Architecture Design
DSBW 2011/2002 - Carles Farré - Barcelona Tech
 
Web Security attacks and defense
Web Security attacks and defenseWeb Security attacks and defense
Web Security attacks and defense
Jose Mato
 
Ibm security guardium
Ibm security guardiumIbm security guardium
Ibm security guardium
CMR WORLD TECH
 
Data Power For Pci Webinar Aug 2012
Data Power For Pci Webinar Aug 2012Data Power For Pci Webinar Aug 2012
Data Power For Pci Webinar Aug 2012
gaborvodics
 
WEB APPLICATION VULNERABILITIES: DAWN, DETECTION, EXPLOITATION AND DEFENSE
WEB APPLICATION VULNERABILITIES: DAWN, DETECTION, EXPLOITATION AND DEFENSEWEB APPLICATION VULNERABILITIES: DAWN, DETECTION, EXPLOITATION AND DEFENSE
WEB APPLICATION VULNERABILITIES: DAWN, DETECTION, EXPLOITATION AND DEFENSE
Ajith Kp
 
Synthèse de l'offre logicielle IBM de Sécurité - Nov 2016
Synthèse de l'offre logicielle IBM de Sécurité - Nov 2016 Synthèse de l'offre logicielle IBM de Sécurité - Nov 2016
Synthèse de l'offre logicielle IBM de Sécurité - Nov 2016
Thierry Matusiak
 
NTXISSACSC4 - Layered Security / Defense in Depth
NTXISSACSC4 - Layered Security / Defense in DepthNTXISSACSC4 - Layered Security / Defense in Depth
NTXISSACSC4 - Layered Security / Defense in Depth
North Texas Chapter of the ISSA
 
Application Security: Last Line of Defense
Application Security: Last Line of DefenseApplication Security: Last Line of Defense
Application Security: Last Line of Defense
Narudom Roongsiriwong, CISSP
 
How to Choose the Right Security Information and Event Management (SIEM) Solu...
How to Choose the Right Security Information and Event Management (SIEM) Solu...How to Choose the Right Security Information and Event Management (SIEM) Solu...
How to Choose the Right Security Information and Event Management (SIEM) Solu...
IBM Security
 
IBM Security Software Solutions - Powerpoint
 IBM Security Software Solutions - Powerpoint IBM Security Software Solutions - Powerpoint
IBM Security Software Solutions - Powerpoint
Thierry Matusiak
 
IBM Security Software Solutions - One Pager
IBM Security Software Solutions - One PagerIBM Security Software Solutions - One Pager
IBM Security Software Solutions - One Pager
Thierry Matusiak
 
IBM Security Software Solutions
IBM Security Software Solutions IBM Security Software Solutions
IBM Security Software Solutions
Thierry Matusiak
 
Hacking 101 (Session 2)
Hacking 101  (Session 2)Hacking 101  (Session 2)
Hacking 101 (Session 2)
Nitroxis Sprl
 
Advanced applications-architecture-threats
Advanced applications-architecture-threatsAdvanced applications-architecture-threats
Advanced applications-architecture-threats
Blueinfy Solutions
 
Web Security attacks and defense
Web Security attacks and defenseWeb Security attacks and defense
Web Security attacks and defense
Jose Mato
 
Data Power For Pci Webinar Aug 2012
Data Power For Pci Webinar Aug 2012Data Power For Pci Webinar Aug 2012
Data Power For Pci Webinar Aug 2012
gaborvodics
 
WEB APPLICATION VULNERABILITIES: DAWN, DETECTION, EXPLOITATION AND DEFENSE
WEB APPLICATION VULNERABILITIES: DAWN, DETECTION, EXPLOITATION AND DEFENSEWEB APPLICATION VULNERABILITIES: DAWN, DETECTION, EXPLOITATION AND DEFENSE
WEB APPLICATION VULNERABILITIES: DAWN, DETECTION, EXPLOITATION AND DEFENSE
Ajith Kp
 
Synthèse de l'offre logicielle IBM de Sécurité - Nov 2016
Synthèse de l'offre logicielle IBM de Sécurité - Nov 2016 Synthèse de l'offre logicielle IBM de Sécurité - Nov 2016
Synthèse de l'offre logicielle IBM de Sécurité - Nov 2016
Thierry Matusiak
 
How to Choose the Right Security Information and Event Management (SIEM) Solu...
How to Choose the Right Security Information and Event Management (SIEM) Solu...How to Choose the Right Security Information and Event Management (SIEM) Solu...
How to Choose the Right Security Information and Event Management (SIEM) Solu...
IBM Security
 

Similar to Discovering the Value of Verifying Web Application Security Using IBM Rational AppScan aka Hacking 101 (20)

Security in the cloud protecting your cloud apps
Security in the cloud   protecting your cloud appsSecurity in the cloud   protecting your cloud apps
Security in the cloud protecting your cloud apps
Cenzic
 
Solvay secure application layer v2015 seba
Solvay secure application layer v2015   sebaSolvay secure application layer v2015   seba
Solvay secure application layer v2015 seba
Sebastien Deleersnyder
 
Are you fighting_new_threats_with_old_weapons
Are you fighting_new_threats_with_old_weaponsAre you fighting_new_threats_with_old_weapons
Are you fighting_new_threats_with_old_weapons
Bhargav Modi
 
Application security testing an integrated approach
Application security testing   an integrated approachApplication security testing   an integrated approach
Application security testing an integrated approach
Idexcel Technologies
 
Online Gaming Cyber security and Threat Model
Online Gaming Cyber security and Threat ModelOnline Gaming Cyber security and Threat Model
Online Gaming Cyber security and Threat Model
Eoin Keary
 
C01461422
C01461422C01461422
C01461422
IOSR Journals
 
Allianz Global CISO october-2015-draft
Allianz Global CISO  october-2015-draftAllianz Global CISO  october-2015-draft
Allianz Global CISO october-2015-draft
Eoin Keary
 
Web Application Security
Web Application SecurityWeb Application Security
Web Application Security
sudip pudasaini
 
Penetration Testing Basics
Penetration Testing BasicsPenetration Testing Basics
Penetration Testing Basics
Rick Wanner
 
DEVSECOPS_the_beginning.ppt
DEVSECOPS_the_beginning.pptDEVSECOPS_the_beginning.ppt
DEVSECOPS_the_beginning.ppt
schwarz10
 
Secure by design and secure software development
Secure by design and secure software developmentSecure by design and secure software development
Secure by design and secure software development
Bill Ross
 
Security risks awareness
Security risks awarenessSecurity risks awareness
Security risks awareness
Janagi Kannan
 
ITCamp 2018 - Tobiasz Koprowski - SECDEV(OPS). How to Brace Your IT Security.
ITCamp 2018 - Tobiasz Koprowski - SECDEV(OPS). How to Brace Your IT Security.ITCamp 2018 - Tobiasz Koprowski - SECDEV(OPS). How to Brace Your IT Security.
ITCamp 2018 - Tobiasz Koprowski - SECDEV(OPS). How to Brace Your IT Security.
ITCamp
 
Research challenges and issues in web security
Research challenges and issues in web securityResearch challenges and issues in web security
Research challenges and issues in web security
IAEME Publication
 
Essentials of Web Application Security: what it is, why it matters and how to...
Essentials of Web Application Security: what it is, why it matters and how to...Essentials of Web Application Security: what it is, why it matters and how to...
Essentials of Web Application Security: what it is, why it matters and how to...
Cenzic
 
Information security
Information securityInformation security
Information security
Sathyanarayana Panduranga
 
Application Security - Your Success Depends on it
Application Security - Your Success Depends on itApplication Security - Your Success Depends on it
Application Security - Your Success Depends on it
WSO2
 
Web Application Testing for Today’s Biggest and Emerging Threats
Web Application Testing for Today’s Biggest and Emerging ThreatsWeb Application Testing for Today’s Biggest and Emerging Threats
Web Application Testing for Today’s Biggest and Emerging Threats
Alan Kan
 
Appsec2013 assurance tagging-robert martin
Appsec2013 assurance tagging-robert martinAppsec2013 assurance tagging-robert martin
Appsec2013 assurance tagging-robert martin
drewz lin
 
NetWitness
NetWitnessNetWitness
NetWitness
TechBiz Forense Digital
 
Security in the cloud protecting your cloud apps
Security in the cloud   protecting your cloud appsSecurity in the cloud   protecting your cloud apps
Security in the cloud protecting your cloud apps
Cenzic
 
Solvay secure application layer v2015 seba
Solvay secure application layer v2015   sebaSolvay secure application layer v2015   seba
Solvay secure application layer v2015 seba
Sebastien Deleersnyder
 
Are you fighting_new_threats_with_old_weapons
Are you fighting_new_threats_with_old_weaponsAre you fighting_new_threats_with_old_weapons
Are you fighting_new_threats_with_old_weapons
Bhargav Modi
 
Application security testing an integrated approach
Application security testing   an integrated approachApplication security testing   an integrated approach
Application security testing an integrated approach
Idexcel Technologies
 
Online Gaming Cyber security and Threat Model
Online Gaming Cyber security and Threat ModelOnline Gaming Cyber security and Threat Model
Online Gaming Cyber security and Threat Model
Eoin Keary
 
Allianz Global CISO october-2015-draft
Allianz Global CISO  october-2015-draftAllianz Global CISO  october-2015-draft
Allianz Global CISO october-2015-draft
Eoin Keary
 
Web Application Security
Web Application SecurityWeb Application Security
Web Application Security
sudip pudasaini
 
Penetration Testing Basics
Penetration Testing BasicsPenetration Testing Basics
Penetration Testing Basics
Rick Wanner
 
DEVSECOPS_the_beginning.ppt
DEVSECOPS_the_beginning.pptDEVSECOPS_the_beginning.ppt
DEVSECOPS_the_beginning.ppt
schwarz10
 
Secure by design and secure software development
Secure by design and secure software developmentSecure by design and secure software development
Secure by design and secure software development
Bill Ross
 
Security risks awareness
Security risks awarenessSecurity risks awareness
Security risks awareness
Janagi Kannan
 
ITCamp 2018 - Tobiasz Koprowski - SECDEV(OPS). How to Brace Your IT Security.
ITCamp 2018 - Tobiasz Koprowski - SECDEV(OPS). How to Brace Your IT Security.ITCamp 2018 - Tobiasz Koprowski - SECDEV(OPS). How to Brace Your IT Security.
ITCamp 2018 - Tobiasz Koprowski - SECDEV(OPS). How to Brace Your IT Security.
ITCamp
 
Research challenges and issues in web security
Research challenges and issues in web securityResearch challenges and issues in web security
Research challenges and issues in web security
IAEME Publication
 
Essentials of Web Application Security: what it is, why it matters and how to...
Essentials of Web Application Security: what it is, why it matters and how to...Essentials of Web Application Security: what it is, why it matters and how to...
Essentials of Web Application Security: what it is, why it matters and how to...
Cenzic
 
Application Security - Your Success Depends on it
Application Security - Your Success Depends on itApplication Security - Your Success Depends on it
Application Security - Your Success Depends on it
WSO2
 
Web Application Testing for Today’s Biggest and Emerging Threats
Web Application Testing for Today’s Biggest and Emerging ThreatsWeb Application Testing for Today’s Biggest and Emerging Threats
Web Application Testing for Today’s Biggest and Emerging Threats
Alan Kan
 
Appsec2013 assurance tagging-robert martin
Appsec2013 assurance tagging-robert martinAppsec2013 assurance tagging-robert martin
Appsec2013 assurance tagging-robert martin
drewz lin
 

More from Alan Kan (13)

DevOps at Scale with Containers and the Cloud
DevOps at Scale with Containers and the CloudDevOps at Scale with Containers and the Cloud
DevOps at Scale with Containers and the Cloud
Alan Kan
 
Accelerate Software Delivery with DevOps
Accelerate Software Delivery with DevOpsAccelerate Software Delivery with DevOps
Accelerate Software Delivery with DevOps
Alan Kan
 
Teaching with Cloud at Unitec
Teaching with Cloud at UnitecTeaching with Cloud at Unitec
Teaching with Cloud at Unitec
Alan Kan
 
Sharpening your test skills in the age of collaboration and automation
Sharpening your test skills in the age of collaboration and automationSharpening your test skills in the age of collaboration and automation
Sharpening your test skills in the age of collaboration and automation
Alan Kan
 
The Agile Revolution of IBM
The Agile Revolution of IBMThe Agile Revolution of IBM
The Agile Revolution of IBM
Alan Kan
 
IBM Collaborative Lifecycle Management
IBM Collaborative Lifecycle ManagementIBM Collaborative Lifecycle Management
IBM Collaborative Lifecycle Management
Alan Kan
 
Rational Quality Manager
Rational Quality ManagerRational Quality Manager
Rational Quality Manager
Alan Kan
 
Software Delivery in the Web 2.0 Style
Software Delivery in the Web 2.0 StyleSoftware Delivery in the Web 2.0 Style
Software Delivery in the Web 2.0 Style
Alan Kan
 
Understanding IBM Rational Asset Manager
Understanding IBM Rational Asset ManagerUnderstanding IBM Rational Asset Manager
Understanding IBM Rational Asset Manager
Alan Kan
 
Define and Manage Requirements with IBM Rational Requirements Composer
Define and Manage Requirements with IBM Rational Requirements ComposerDefine and Manage Requirements with IBM Rational Requirements Composer
Define and Manage Requirements with IBM Rational Requirements Composer
Alan Kan
 
Business and IT alignment through effective Project & Program Portfolio Manag...
Business and IT alignment through effective Project & Program Portfolio Manag...Business and IT alignment through effective Project & Program Portfolio Manag...
Business and IT alignment through effective Project & Program Portfolio Manag...
Alan Kan
 
Business and IT alignment through effective Project & Program Portfolio Manag...
Business and IT alignment through effective Project & Program Portfolio Manag...Business and IT alignment through effective Project & Program Portfolio Manag...
Business and IT alignment through effective Project & Program Portfolio Manag...
Alan Kan
 
How Does IBM Do Agile
How Does IBM Do AgileHow Does IBM Do Agile
How Does IBM Do Agile
Alan Kan
 
DevOps at Scale with Containers and the Cloud
DevOps at Scale with Containers and the CloudDevOps at Scale with Containers and the Cloud
DevOps at Scale with Containers and the Cloud
Alan Kan
 
Accelerate Software Delivery with DevOps
Accelerate Software Delivery with DevOpsAccelerate Software Delivery with DevOps
Accelerate Software Delivery with DevOps
Alan Kan
 
Teaching with Cloud at Unitec
Teaching with Cloud at UnitecTeaching with Cloud at Unitec
Teaching with Cloud at Unitec
Alan Kan
 
Sharpening your test skills in the age of collaboration and automation
Sharpening your test skills in the age of collaboration and automationSharpening your test skills in the age of collaboration and automation
Sharpening your test skills in the age of collaboration and automation
Alan Kan
 
The Agile Revolution of IBM
The Agile Revolution of IBMThe Agile Revolution of IBM
The Agile Revolution of IBM
Alan Kan
 
IBM Collaborative Lifecycle Management
IBM Collaborative Lifecycle ManagementIBM Collaborative Lifecycle Management
IBM Collaborative Lifecycle Management
Alan Kan
 
Rational Quality Manager
Rational Quality ManagerRational Quality Manager
Rational Quality Manager
Alan Kan
 
Software Delivery in the Web 2.0 Style
Software Delivery in the Web 2.0 StyleSoftware Delivery in the Web 2.0 Style
Software Delivery in the Web 2.0 Style
Alan Kan
 
Understanding IBM Rational Asset Manager
Understanding IBM Rational Asset ManagerUnderstanding IBM Rational Asset Manager
Understanding IBM Rational Asset Manager
Alan Kan
 
Define and Manage Requirements with IBM Rational Requirements Composer
Define and Manage Requirements with IBM Rational Requirements ComposerDefine and Manage Requirements with IBM Rational Requirements Composer
Define and Manage Requirements with IBM Rational Requirements Composer
Alan Kan
 
Business and IT alignment through effective Project & Program Portfolio Manag...
Business and IT alignment through effective Project & Program Portfolio Manag...Business and IT alignment through effective Project & Program Portfolio Manag...
Business and IT alignment through effective Project & Program Portfolio Manag...
Alan Kan
 
Business and IT alignment through effective Project & Program Portfolio Manag...
Business and IT alignment through effective Project & Program Portfolio Manag...Business and IT alignment through effective Project & Program Portfolio Manag...
Business and IT alignment through effective Project & Program Portfolio Manag...
Alan Kan
 
How Does IBM Do Agile
How Does IBM Do AgileHow Does IBM Do Agile
How Does IBM Do Agile
Alan Kan
 

Recently uploaded (20)

Increasing Retail Store Efficiency How can Planograms Save Time and Money.pptx
Increasing Retail Store Efficiency How can Planograms Save Time and Money.pptxIncreasing Retail Store Efficiency How can Planograms Save Time and Money.pptx
Increasing Retail Store Efficiency How can Planograms Save Time and Money.pptx
Anoop Ashok
 
DevOpsDays Atlanta 2025 - Building 10x Development Organizations.pptx
DevOpsDays Atlanta 2025 - Building 10x Development Organizations.pptxDevOpsDays Atlanta 2025 - Building 10x Development Organizations.pptx
DevOpsDays Atlanta 2025 - Building 10x Development Organizations.pptx
Justin Reock
 
Linux Professional Institute LPIC-1 Exam.pdf
Linux Professional Institute LPIC-1 Exam.pdfLinux Professional Institute LPIC-1 Exam.pdf
Linux Professional Institute LPIC-1 Exam.pdf
RHCSA Guru
 
AI Changes Everything – Talk at Cardiff Metropolitan University, 29th April 2...
AI Changes Everything – Talk at Cardiff Metropolitan University, 29th April 2...AI Changes Everything – Talk at Cardiff Metropolitan University, 29th April 2...
AI Changes Everything – Talk at Cardiff Metropolitan University, 29th April 2...
Alan Dix
 
2025-05-Q4-2024-Investor-Presentation.pptx
2025-05-Q4-2024-Investor-Presentation.pptx2025-05-Q4-2024-Investor-Presentation.pptx
2025-05-Q4-2024-Investor-Presentation.pptx
Samuele Fogagnolo
 
Andrew Marnell: Transforming Business Strategy Through Data-Driven Insights
Andrew Marnell: Transforming Business Strategy Through Data-Driven InsightsAndrew Marnell: Transforming Business Strategy Through Data-Driven Insights
Andrew Marnell: Transforming Business Strategy Through Data-Driven Insights
Andrew Marnell
 
The Evolution of Meme Coins A New Era for Digital Currency ppt.pdf
The Evolution of Meme Coins A New Era for Digital Currency ppt.pdfThe Evolution of Meme Coins A New Era for Digital Currency ppt.pdf
The Evolution of Meme Coins A New Era for Digital Currency ppt.pdf
Abi john
 
Designing Low-Latency Systems with Rust and ScyllaDB: An Architectural Deep Dive
Designing Low-Latency Systems with Rust and ScyllaDB: An Architectural Deep DiveDesigning Low-Latency Systems with Rust and ScyllaDB: An Architectural Deep Dive
Designing Low-Latency Systems with Rust and ScyllaDB: An Architectural Deep Dive
ScyllaDB
 
Special Meetup Edition - TDX Bengaluru Meetup #52.pptx
Special Meetup Edition - TDX Bengaluru Meetup #52.pptxSpecial Meetup Edition - TDX Bengaluru Meetup #52.pptx
Special Meetup Edition - TDX Bengaluru Meetup #52.pptx
shyamraj55
 
Manifest Pre-Seed Update | A Humanoid OEM Deeptech In France
Manifest Pre-Seed Update | A Humanoid OEM Deeptech In FranceManifest Pre-Seed Update | A Humanoid OEM Deeptech In France
Manifest Pre-Seed Update | A Humanoid OEM Deeptech In France
chb3
 
Dev Dives: Automate and orchestrate your processes with UiPath Maestro
Dev Dives: Automate and orchestrate your processes with UiPath MaestroDev Dives: Automate and orchestrate your processes with UiPath Maestro
Dev Dives: Automate and orchestrate your processes with UiPath Maestro
UiPathCommunity
 
Cyber Awareness overview for 2025 month of security
Cyber Awareness overview for 2025 month of securityCyber Awareness overview for 2025 month of security
Cyber Awareness overview for 2025 month of security
riccardosl1
 
Technology Trends in 2025: AI and Big Data Analytics
Technology Trends in 2025: AI and Big Data AnalyticsTechnology Trends in 2025: AI and Big Data Analytics
Technology Trends in 2025: AI and Big Data Analytics
InData Labs
 
Electronic_Mail_Attacks-1-35.pdf by xploit
Electronic_Mail_Attacks-1-35.pdf by xploitElectronic_Mail_Attacks-1-35.pdf by xploit
Electronic_Mail_Attacks-1-35.pdf by xploit
niftliyevhuseyn
 
Cybersecurity Identity and Access Solutions using Azure AD
Cybersecurity Identity and Access Solutions using Azure ADCybersecurity Identity and Access Solutions using Azure AD
Cybersecurity Identity and Access Solutions using Azure AD
VICTOR MAESTRE RAMIREZ
 
Semantic Cultivators : The Critical Future Role to Enable AI
Semantic Cultivators : The Critical Future Role to Enable AISemantic Cultivators : The Critical Future Role to Enable AI
Semantic Cultivators : The Critical Future Role to Enable AI
artmondano
 
UiPath Community Berlin: Orchestrator API, Swagger, and Test Manager API
UiPath Community Berlin: Orchestrator API, Swagger, and Test Manager APIUiPath Community Berlin: Orchestrator API, Swagger, and Test Manager API
UiPath Community Berlin: Orchestrator API, Swagger, and Test Manager API
UiPathCommunity
 
HCL Nomad Web – Best Practices und Verwaltung von Multiuser-Umgebungen
HCL Nomad Web – Best Practices und Verwaltung von Multiuser-UmgebungenHCL Nomad Web – Best Practices und Verwaltung von Multiuser-Umgebungen
HCL Nomad Web – Best Practices und Verwaltung von Multiuser-Umgebungen
panagenda
 
Heap, Types of Heap, Insertion and Deletion
Heap, Types of Heap, Insertion and DeletionHeap, Types of Heap, Insertion and Deletion
Heap, Types of Heap, Insertion and Deletion
Jaydeep Kale
 
Massive Power Outage Hits Spain, Portugal, and France: Causes, Impact, and On...
Massive Power Outage Hits Spain, Portugal, and France: Causes, Impact, and On...Massive Power Outage Hits Spain, Portugal, and France: Causes, Impact, and On...
Massive Power Outage Hits Spain, Portugal, and France: Causes, Impact, and On...
Aqusag Technologies
 
Increasing Retail Store Efficiency How can Planograms Save Time and Money.pptx
Increasing Retail Store Efficiency How can Planograms Save Time and Money.pptxIncreasing Retail Store Efficiency How can Planograms Save Time and Money.pptx
Increasing Retail Store Efficiency How can Planograms Save Time and Money.pptx
Anoop Ashok
 
DevOpsDays Atlanta 2025 - Building 10x Development Organizations.pptx
DevOpsDays Atlanta 2025 - Building 10x Development Organizations.pptxDevOpsDays Atlanta 2025 - Building 10x Development Organizations.pptx
DevOpsDays Atlanta 2025 - Building 10x Development Organizations.pptx
Justin Reock
 
Linux Professional Institute LPIC-1 Exam.pdf
Linux Professional Institute LPIC-1 Exam.pdfLinux Professional Institute LPIC-1 Exam.pdf
Linux Professional Institute LPIC-1 Exam.pdf
RHCSA Guru
 
AI Changes Everything – Talk at Cardiff Metropolitan University, 29th April 2...
AI Changes Everything – Talk at Cardiff Metropolitan University, 29th April 2...AI Changes Everything – Talk at Cardiff Metropolitan University, 29th April 2...
AI Changes Everything – Talk at Cardiff Metropolitan University, 29th April 2...
Alan Dix
 
2025-05-Q4-2024-Investor-Presentation.pptx
2025-05-Q4-2024-Investor-Presentation.pptx2025-05-Q4-2024-Investor-Presentation.pptx
2025-05-Q4-2024-Investor-Presentation.pptx
Samuele Fogagnolo
 
Andrew Marnell: Transforming Business Strategy Through Data-Driven Insights
Andrew Marnell: Transforming Business Strategy Through Data-Driven InsightsAndrew Marnell: Transforming Business Strategy Through Data-Driven Insights
Andrew Marnell: Transforming Business Strategy Through Data-Driven Insights
Andrew Marnell
 
The Evolution of Meme Coins A New Era for Digital Currency ppt.pdf
The Evolution of Meme Coins A New Era for Digital Currency ppt.pdfThe Evolution of Meme Coins A New Era for Digital Currency ppt.pdf
The Evolution of Meme Coins A New Era for Digital Currency ppt.pdf
Abi john
 
Designing Low-Latency Systems with Rust and ScyllaDB: An Architectural Deep Dive
Designing Low-Latency Systems with Rust and ScyllaDB: An Architectural Deep DiveDesigning Low-Latency Systems with Rust and ScyllaDB: An Architectural Deep Dive
Designing Low-Latency Systems with Rust and ScyllaDB: An Architectural Deep Dive
ScyllaDB
 
Special Meetup Edition - TDX Bengaluru Meetup #52.pptx
Special Meetup Edition - TDX Bengaluru Meetup #52.pptxSpecial Meetup Edition - TDX Bengaluru Meetup #52.pptx
Special Meetup Edition - TDX Bengaluru Meetup #52.pptx
shyamraj55
 
Manifest Pre-Seed Update | A Humanoid OEM Deeptech In France
Manifest Pre-Seed Update | A Humanoid OEM Deeptech In FranceManifest Pre-Seed Update | A Humanoid OEM Deeptech In France
Manifest Pre-Seed Update | A Humanoid OEM Deeptech In France
chb3
 
Dev Dives: Automate and orchestrate your processes with UiPath Maestro
Dev Dives: Automate and orchestrate your processes with UiPath MaestroDev Dives: Automate and orchestrate your processes with UiPath Maestro
Dev Dives: Automate and orchestrate your processes with UiPath Maestro
UiPathCommunity
 
Cyber Awareness overview for 2025 month of security
Cyber Awareness overview for 2025 month of securityCyber Awareness overview for 2025 month of security
Cyber Awareness overview for 2025 month of security
riccardosl1
 
Technology Trends in 2025: AI and Big Data Analytics
Technology Trends in 2025: AI and Big Data AnalyticsTechnology Trends in 2025: AI and Big Data Analytics
Technology Trends in 2025: AI and Big Data Analytics
InData Labs
 
Electronic_Mail_Attacks-1-35.pdf by xploit
Electronic_Mail_Attacks-1-35.pdf by xploitElectronic_Mail_Attacks-1-35.pdf by xploit
Electronic_Mail_Attacks-1-35.pdf by xploit
niftliyevhuseyn
 
Cybersecurity Identity and Access Solutions using Azure AD
Cybersecurity Identity and Access Solutions using Azure ADCybersecurity Identity and Access Solutions using Azure AD
Cybersecurity Identity and Access Solutions using Azure AD
VICTOR MAESTRE RAMIREZ
 
Semantic Cultivators : The Critical Future Role to Enable AI
Semantic Cultivators : The Critical Future Role to Enable AISemantic Cultivators : The Critical Future Role to Enable AI
Semantic Cultivators : The Critical Future Role to Enable AI
artmondano
 
UiPath Community Berlin: Orchestrator API, Swagger, and Test Manager API
UiPath Community Berlin: Orchestrator API, Swagger, and Test Manager APIUiPath Community Berlin: Orchestrator API, Swagger, and Test Manager API
UiPath Community Berlin: Orchestrator API, Swagger, and Test Manager API
UiPathCommunity
 
HCL Nomad Web – Best Practices und Verwaltung von Multiuser-Umgebungen
HCL Nomad Web – Best Practices und Verwaltung von Multiuser-UmgebungenHCL Nomad Web – Best Practices und Verwaltung von Multiuser-Umgebungen
HCL Nomad Web – Best Practices und Verwaltung von Multiuser-Umgebungen
panagenda
 
Heap, Types of Heap, Insertion and Deletion
Heap, Types of Heap, Insertion and DeletionHeap, Types of Heap, Insertion and Deletion
Heap, Types of Heap, Insertion and Deletion
Jaydeep Kale
 
Massive Power Outage Hits Spain, Portugal, and France: Causes, Impact, and On...
Massive Power Outage Hits Spain, Portugal, and France: Causes, Impact, and On...Massive Power Outage Hits Spain, Portugal, and France: Causes, Impact, and On...
Massive Power Outage Hits Spain, Portugal, and France: Causes, Impact, and On...
Aqusag Technologies
 

Discovering the Value of Verifying Web Application Security Using IBM Rational AppScan aka Hacking 101

  • 1. Discovering the Value of Verifying Web Application Security Using IBM Rational AppScan Lee Kinsman – Software Architect Alan Kan – Technical Specialist
  • 2. Agenda Introductions & facilities The importance of web application security Vulnerability Analysis Top Attacks Overview Hands on Labs 1-2 Vulnerability Analysis (continued) Hands on Labs 3-5 Automated Vulnerability Analysis AppScan Overview Hands on Lab 6
  • 3. Welcome to the Hacking 101 Workshop Introductions Restrooms Emergency Exits Smoking Policy
  • 4. POT Objectives By the end of this session you will: Understand the web application environment Understand and differentiate between network and application level vulnerabilities Understand where the vulnerabilities exist Understand how to leverage AppScan to perform an automated scan for vulnerabilities
  • 5. Agenda Introductions & facilities The importance of web application security Vulnerability Analysis Top Attacks Overview Hands on Labs 1-2 Vulnerability Analysis (continued) Hands on Labs 3-5 Automated Vulnerability Analysis AppScan Overview Hands on Lab 6
  • 6. The Alarming Truth LexisNexis Data Breach - Washington Post Feb 17, 2008 IndiaTimes.com Malware — InformationWeek Feb 17,2008 Hacker breaks into Ecuador’s presidential website — Thaindian, Feb 11, 2008 Hacking Stage 6 — Wikipedia, Feb 9 2007 Hacker steals Davidson Cos client data - Falls Tribune, Feb 4 2008 RIAA wiped off the Net — TheRegister, Jan 20 2008 Chinese hacker steals 18M identities - HackBase.com, Feb 10,2008 Mac blogs defaced by XSS The Register, Feb 17, 2008 Your Free MacWorld Expo Platinum Pass — CNet, Jan 14, 2008 Hacker takes down Pennsylvania gvmt — AP, Jan 6, 2008 Drive-by Pharming in the Wild — Symantec, Jan 21 2008 Italian Bank hit by XSS fraudsters — Netcraft, Jan 8 2008 Greek Ministry websites hit by hacker intrusion — eKathimerini, Jan 31,2008
  • 7. “ Security Intelligence Service director Warren Tucker revealed government department websites had been attacked and information stolen ” nzherald.co.nz Sep 12, 2007 “ A florist which does all of its business online has had its website targeted by hackers and customers' credit card details have been stolen. “ abc.net.au Sep 17, 2007 “ Turkish hackers bring down insurer's site…The site was shut down as a precaution and was unavailable for most of today” SMH.com.au July 20, 2007 “ Computer hackers have cracked the defences of dozens of top government and business sector internet sites this year, raising concerns about the safety of consumers' financial and personal information.” SMH.com.au October 14 2007 “ Approximately 100 million Americans have been informed that they have suffered a security breach so this problem has reached epidemic proportions.” Jon Oltsik – Enterprise Strategy Group The Alarming Truth
  • 8. Security and compliance risks 90% of sites are vulnerable to application attacks 80% of organizations will experience an application security incident by 2010 64% of CIOs feel that the most significant challenge facing IT organizations is Security, Compliance and Data Protection. (Disability Discrimination Act (DDA), Payment Card Industry (PCI) Standards, SOX 75% of the cyber attacks today are at the application level Compliance requirements: Payment Card Industry (PCI) Standards, GLBA, HIPPA, FISMA Security and compliance integrity risks have serious adverse impacts on a company’s identity, customer relations and business results.
  • 9. Reality: Security and Spending Are Unbalanced Sources: Gartner, Watchfire % of Attacks % of Dollars 75% 10% 25% 90% Sources: Gartner, Watchfire of All Attacks on Information Security Are Directed to the Web Application Layer 75% of All Web Applications Are Vulnerable 2/3 Network Server Web Applications Security Spending
  • 10. 2006 Vulnerability Statistics (31,373 sites) ** http://www.webappsec.org/projects/statistics/
  • 11. The Myth: Our Site Is Safe We Use Network Vulnerability Scanners We Have Firewalls in Place We Audit It Once a Quarter with Pen Testers We Use SSL Encryption
  • 12. Confusing Network Security Discipline with Application Security “Application developers and their superiors in IT departments too often mistakenly believe that firewalls, IDS / IPS, and network traffic encryption are sufficient measures for application security. By doing so they are confusing application security with network security” “None of those technologies hardens application code. All those technologies deal with traffic to applications, not with the applications themselves…. Applications need protection through separate, specific security discipline – application security” Application Security Testing, Gartner, March 2, 2007
  • 13. High Level Web Application Architecture Review (Presentation) App Server (Business Logic) Database Client Tier (Browser) Middle Tier Data Tier Firewall Sensitive data is stored here Protects Network Internet SSL Protects Transport Customer App is deployed here
  • 14. Network Defenses for Web Applications Intrusion Detection System Intrusion Prevention System Application Firewall Firewall System Incident Event Management (SIEM) Perimeter IDS IPS App Firewall Security
  • 15. Port 80 and Port 443 are open for business….
  • 16. Building Security & Compliance into the SDLC Developers SDLC Developers Developers Enable Security to effectively drive remediation into development Provides Developers and Testers with expertise on detection and remediation ability Ensure vulnerabilities are addressed before applications are put into production Build Coding QA Security Production
  • 17. Agenda Introductions & facilities The importance of web application security Vulnerability Analysis Top Attacks Overview Hands on Labs 1-2 Vulnerability Analysis (continued) Hands on Labs 3-5 Automated Vulnerability Analysis AppScan Overview Hands on Lab 6
  • 18. Where are the Vulnerabilities? Network Network Operating System Operating System Applications Applications Database Database Third-party Components Third-party Components Web Server Web Server Configuration Web Server Web Server Configuration Web Applications Client-Side Custom Web Services Web Applications Client-Side Custom Web Services Network Nessus ISS QualysGuard eEye Retina Foundstone Host Symantec NetIQ ISS CA Harris STAT Database AppSec Inc NGS Software App Scanners Watchfire SPI Dynamics Cenzic NT Objectives Acunetix WVS Code Scanning Emerging Tech Fortify Ounce Labs Secure Software Klockwork Parasoft Network Operating System Applications Database Web Server Web Server Configuration Third-party Components Web Applications Client-Side Custom Web Services Security
  • 19. Security Defects: Those I manage vs. Those I own Requires automatic application lifecycle security Patch latency primary issue Business Risk Requires application specific knowledge Match signatures & check for known misconfigurations. Detection Early detection saves $$$ As secure as 3 rd party software Cost Control SQL injection, path tampering, Cross site scripting, Suspect content & cookie poisoning Known vulnerabilities (patches issued), misconfiguration Type(s) of Exploits Business logic - dynamic data consumed by an application 3 rd party technical building blocks or infrastructure (web servers,) Location within Application Insecure application development In-house Insecure application development by 3 rd party SW Cause of Defect Application Specific Vulnerabilities (ASVs) Infrastructure Vulnerabilities or Common Web Vulnerabilities (CWVs)
  • 20. OWASP and the OWASP Top 10 list Open Web Application Security Project – an open organization dedicated to fight insecure software “The OWASP Top Ten document represents a broad consensus about what the most critical web application security flaws are” We will use the Top 10 list to cover some of the most common security issues in web applications
  • 21. The OWASP Top 10 list Hackers can impersonate legitimate users, and control their accounts. Identity Theft, Sensitive Information Leakage, … Cross Site scripting Hacker can forcefully browse and access a page past the login page Hacker can access unauthorized resources Failure to Restrict URL Access Unencrypted credentials “sniffed” and used by hacker to impersonate user Sensitive info sent unencrypted over insecure channel Insecure Communications Confidential information (SSN, Credit Cards) can be decrypted by malicious users Weak encryption techniques may lead to broken encryption Insecure Cryptographic Storage Hacker can “force” session token on victim; session tokens can be stolen after logout Session tokens not guarded or invalidated properly Broken Authentication & Session Management Malicious system reconnaissance may assist in developing further attacks Attackers can gain detailed system information Information Leakage and Improper Error Handling Blind requests to bank account transfer money to hacker Attacker can invoke “blind” actions on web applications, impersonating as a trusted user Cross-Site Request Forgery Web application returns contents of sensitive file (instead of harmless one) Attacker can access sensitive files and resources Insecure Direct Object Reference Site modified to transfer all interactions to the hacker. Execute shell commands on server, up to full control Malicious File Execution Hackers can access backend database information, alter it or steal it. Attacker can manipulate queries to the DB / LDAP / Other system Injection Flaws Example Impact Negative Impact Application Threat
  • 22. 1. Cross-Site Scripting (XSS) What is it? Malicious script echoed back into HTML returned from a trusted site, and runs under trusted context What are the implications? Session Tokens stolen (browser security circumvented) Complete page content compromised Future pages in browser compromised
  • 23. Cross Site Scripting – The Exploit Process Evil.org User bank.com 1) Link to bank.com sent to user via E-mail or HTTP 2) User sends script embedded as data 3) Script/data returned, executed by browser 4) Script sends user’s cookie and session information without the user’s consent or knowledge 5) Evil.org uses stolen session information to impersonate user
  • 24. XSS Example I HTML code:
  • 25. XSS Example II HTML code:
  • 26. XSS – Details Common in Search, Error Pages and returned forms. But can be found on any type of page Any input may be echoed back Path, Query, Post-data, Cookie, Header, etc. Browser technology used to aid attack XMLHttpRequest (AJAX), Flash, IFrame… Has many variations XSS in attribute, DOM Based XSS, etc.
  • 27. Exploiting XSS If I can get you to run my JavaScript, I can… Steal your cookies for the domain you’re browsing Track every action you do in that browser from now on Redirect you to a Phishing site Completely modify the content of any page you see on this domain Exploit browser vulnerabilities to take over machine … XSS is the Top Security Risk today (most exploited)
  • 28. Agenda Introductions & facilities The importance of web application security Vulnerability Analysis Top Attacks Overview Hands on Labs 1-2 Vulnerability Analysis (continued) Hands on Labs 3-5 Automated Vulnerability Analysis AppScan Overview Hands on Lab 6
  • 29. Hands-on Labs Lab 1 – Profile Web Application Lab 2 – Steal Cookies Lab 3 – Login without Credentials Lab 4 – Steal Usernames and Passwords Lab 5 – Logging into the Administrative Portal Lab 6 – Automated Scan of Website
  • 30. Lab 1 Profile Web Application The Goal of this lab is to profile the demo.testfire.net application Identify the Lab Workbook and where to start (page 5), where to stop (page 11)
  • 31. Lab 2 Steal Cookies The goals of the lab is to utilize a Cross Site Scripting vulnerability on the demo.testfire.net application in order to access cookies on a target user’s browser Identify the Lab Workbook and where to start (page 12), where to stop (page 18)
  • 32. Agenda Introductions & facilities Security Landscape Vulnerability Analysis Top Attacks Overview Hands on Labs 1-2 Vulnerability Analysis (continued) Hands on Labs 3-5 Automated Vulnerability Analysis AppScan Overview Hands on Lab 6
  • 33. 2 - Injection Flaws What is it? User-supplied data is sent to an interpreter as part of a command, query or data. What are the implications? SQL Injection – Access/modify data in DB SSI Injection – Execute commands on server and access sensitive data LDAP Injection – Bypass authentication …
  • 34. SQL Injection User input inserted into SQL Command: Get product details by id: Select * from products where id=‘ $REQUEST[“id”] ’; Hack: send param id with value ‘ or ‘1’=‘1 Resulting executed SQL: Select * from products where id=‘ ’ or ‘1’=‘1 ’ All products returned
  • 39. Injection Flaws (SSI Injection Example) Creating commands from input
  • 40. The return is the private SSL key of the server
  • 41. 3 - Malicious File Execution What is it? Application tricked into executing commands or creating files on server What are the implications? Command execution on server – complete takeover Site Defacement, including XSS option
  • 42. Malicious File Execution – Example I
  • 43. Malicious File Execution – Example cont.
  • 44. Malicious File Execution – Example cont.
  • 45. 4 - Insecure Direct Object Reference What is it? Part or all of a resource (file, table, etc.) name controlled by user input. What are the implications? Access to sensitive resources Information Leakage, aids future hacks
  • 46. Insecure Direct Object Reference - Example
  • 47. Insecure Direct Object Reference – Example Cont.
  • 48. Insecure Direct Object Reference – Example Cont.
  • 49. 5 - Information Leakage and Improper Error Handling What is it? Unneeded information made available via errors or other means. What are the implications? Sensitive data exposed Web App internals and logic exposed (source code, SQL syntax, exception call stacks, etc.) Information aids in further hacks
  • 50. Information Leakage - Example
  • 52. Information Leakage – Different User/Pass Error
  • 53. 6 - Failure to Restrict URL Access What is it? Resources that should only be available to authorized users can be accessed by forcefully browsing them What are the implications? Sensitive information leaked/modified Admin privileges made available to hacker
  • 54. Failure to Restrict URL Access - Admin User login /admin/admin.aspx
  • 55. Simple user logs in, forcefully browses to admin page
  • 56. Failure to Restrict URL Access: Privilege Escalation Types Access given to completely restricted resources Accessing files that shouldn’t be served (*.bak, “Copy Of”, *.inc, *.cs, ws_ftp.log, etc.) Vertical Privilege Escalation Unknown user accessing pages past login page Simple user accessing admin pages Horizontal Privilege Escalation User accessing other user’s pages Example: Bank account user accessing another’s
  • 57. Agenda Introductions & facilities Security Landscape Vulnerability Analysis Top Attacks Overview Hands on Labs 1-2 Vulnerability Analysis (continued) Hands on Labs 3-5 Automated Vulnerability Analysis AppScan Overview Hands on Lab 6
  • 58. Hands-on Labs 3-5 Lab 1 – Profile Web Application Lab 2 – Steal Cookies Lab 3 – Login without Credentials Lab 4 – Steal Usernames and Passwords Lab 5 – Logging into the Administrative Portal Lab 6 – Automated Scan of Website
  • 59. Lab 3 overview Login without Credentials The goal of the lab is to use locate a SQL injection vulnerability and exploit it to log into the demo.testfire.net application without a password Identify the Lab Workbook and where to start (page 19), where to stop (page 24)
  • 60. Lab 4 overview – Steal Username and Password The Goal of this Lab is to exploit the SQL Injection vulnerability further in order to extract all the usernames and passwords from the demo.testfire.net application Identify the Lab Workbook and where to start (page 25), where to stop (page 31)
  • 61. Lab 5 overview – Logging in to Admin Portal The Goal of this lab is to use Information Leakage and Direct Access to URLs to find and log into the administrative portal Identify the Lab Workbook and where to start (page 32), where to stop (page 36)
  • 62. Agenda Introductions & facilities Security Landscape Vulnerability Analysis Top Attacks Overview Hands on Labs 1-2 Vulnerability Analysis (continued) Hands on Labs 3-5 Automated Vulnerability Analysis AppScan Overview Hands on Lab 6
  • 63. Watchfire in the Rational Portfolio Developer Test Functional Test Automated Manual Rational RequisitePro Rational ClearQuest Rational ClearQuest Defects Project Dashboards Detailed Test Results Quality Reports Performance Test SOFTWARE QUALITY SOLUTIONS Test and Change Management Test Automation Quality Metrics DEVELOPMENT OPERATOINS BUSINESS Rational ClearQuest Requirements Test Change Rational PurifyPlus Rational Test RealTime Rational Functional Tester Plus Rational Functional Tester Rational Robot Rational Manual Tester Rational Performance Tester Security and Compliance Test AppScan Policy Tester Interface Compliance Policy Tester Test Automation Content Compliance ADA 508, GLBA, Safe Harbor Quality, Brand, Search, Inventory
  • 64. AppScan What is it? AppScan is an automated tool used to perform vulnerability assessments on Web Applications Why do I need it? To simplify finding and fixing web application security problems What does it do? Scans web applications, finds security issues and reports on them in an actionable fashion Who uses it? Security Auditors – main users today QA engineers – when the auditors become the bottle neck Developers – to find issues as early as possible (most efficient)
  • 65. What does AppScan test for? Network Operating System Applications Database Third-party Components Web Applications AppScan Web Server Web Server Configuration
  • 66. How does AppScan work? Approaches an application as a black-box Traverses a web application and builds the site model Determines the attack vectors based on the selected Test policy Tests by sending modified HTTP requests to the application and examining the HTTP response according to validate rules HTTP Request Web Application HTTP Response
  • 67. AppScan Goes Beyond Pointing out Problems
  • 69. AppScan with QA Defect Logger for ClearQuest
  • 70. IBM Watchfire on the Net Watchfire.com - http://www.watchfire.com Product evaluation download AppScan Extensions Framework – http://axf.watchfire.com Power Point Reporter, Pyscan, Defect Logger CQ Watchfire Blog – http:// blog.watchfire.com/wfblog Expert opinion and watchfire news AppScan Knowledge On Demand (computer based training) App Security 101, OWASP Top 10, WASC Threat Classifications, Common Attacks
  • 71. Lab 6 overview The goal of this lab is to use AppScan in order to automate the detection of vulnerabilities within a web application Identify the Lab Workbook and where to start (page 37), where to stop (page 59)
  • 73. Session summary Understand the web application environment Understand and differentiate between network and application level vulnerabilities Understand where the vulnerabilities exist Hands on exercises to understand types of vulnerabilities Hands on exercise to leverage automated scan for vulnerabilities
  • 74. Next steps Further discussions with IBM Rational Account Representative and/or AppScan product expert. Jono Massy-Greene [email_address] 04-462-3487 021-228-3703 Alan Kan [email_address] 09-359-8768 021-668-185 Schedule a Security Business Value Assessment Schedule a Vulnerability Assessment of one our your Applications
  • 75. Register today with discount code “HDDE” and receive $100 off your registration fee! Visit www.ibm.com/rational/rsdc for more information IBM Rational Software Development Conference 2008 June 1 – 5, 2008; Orlando, Florida CONFERENCE HIGHLIGHTS: Over 3,000 customers and partners Over 300 sessions – 14 tracks Executive Summit 2008 3- and 5-hour Technical Workshops Access to IBM Engineers and IBM Research Keynotes with industry-leading experts Exhibit hall showcasing complimentary product and services Unlimited networking opportunities IBM Solution Center Interactive Birds-of-a-Feather Sessions
  • 76.  
  • 77. We appreciate your feedback. Please fill out the survey form in order to improve this educational event.

Editor's Notes

  • #9: March,2007: Sixty-six percent of vulnerabilities disclosed during this period affected Web applications. Seventy-seven percent of all easily exploitable vulnerabilities affected Web applications, and seven percent affected servers. With the advent of Windows Vista and the continued use of the Security Development Lifecycle, it is likely that Microsoft-authored code will become more difficult to exploit. As a result, attackers may turn their focus to common third-party applications that are authored by companies that have not employed the Security Development Lifecycle. These third-party applications may not use accepted best software development practices, such as secure design, secure coding practices, code reviews, or secure developer tools such as Microsoft’s Visual Studio.19 As a result, they may be less secure http://www.symantec.com/enterprise/theme.jsp?themeid=threatreport September, 2006 Report: Seventy-eight percent of easily exploitable vulnerabilities affected Web applications. Web application vulnerabilities made up 69% of all vulnerabilities this period.
  • #12: .
  • #14: In a typical Web application security landscape, the user on the left-hand side interacts with the server environment, on the right. The data that is exchanged back and forth between the user and server environment might be encrypted using SSL, or it may not be, but it moves across the firewalls, intrusion detection systems, intrusion prevention systems, routers, switches to the web server on the other side. Note that it is the web application that facilitates the exchange of data between the server environment and the user. It is interesting to stop and note that while the data received from the client is not to be trusted, the web application itself is implicitly trusted by the backend environment and is permitted to communicate with everything from the database to an LDAP authentication system or to the core network. Let’s take a little closer look at the network protections that might be associated with this exchange of data.
  • #15: The first barrier that an HTTP request encounters while crossing the network is a firewall. Firewalls are set up to allow outsiders access to specific resources, and to prevent them from accessing other resources. For example, an outside individual wouldn't be allowed to directly connect to a database, but they can make a request to a web server. This means the firewall would be configured to deny traffic on a standard database port 1443, but allow traffic through ports 80 and 443 - web application ports. This system is clearly no protection at all against malicious attacks. The next protection an HTTP request encounters is an intrusion detection system. The IDS has been set up to look for signatures in the traffic that might indicate an attack. For example, they may look for a SQL statement embedded within a request, or they might look for a script tag for indicates a potential XSS attack. The challenge with these systems is that if the request is encoded in some alternative format (say UTF-7) or perhaps the traffic is encrypted using SSL, the intrusion detection system is often not able to interpret or understand the requests. The IDS offers little to no protection against the web application attack. The next protection that an HTTP request might encounter is an intrusion prevention system or IPS. These systems are designed to explicitly block requests that are deemed to be malicious. It is very similar to the IDS, except that it takes an active role rather than a passive one. Again, if the traffic is encoded or encrypted, the systems may not be able to block malicious requests. The IPS offers little protection against the web application attack. The lines are blurring actually, between the IDS and IPS systems. The last system that the HTTP request might encounter before the web server is probably an application firewall. These are the smartest of all the network protections and can be configured explicitly to only allow through certain traffic that it knows to be good. The problem with these systems is that it's very expensive to maintain the correct configurations or valid algorithms to recognize good traffic. If the web application firewall has been designed to fail securely (a web application security principle), that is, if you're not sure what to do, they block the user, the web application firewall may block legitimate traffic. For this reason, most application firewalls are usually designed to break one of the founding principles of security (fail securely) by allowing through traffic that they don't understand. There is one other issue with web application firewalls. They do not understand the application. As an example, they might be configured to allow a numerical value for a certain cookie value, but they do not know that my user is only allowed a value of 6014, but not 6015. A core principle in web application defense is that THE WEB APPLICATION MUST DEFEND ITSELF. Are web application firewalls valuable? Absolutely! Another implicit challenge faced by the network protections is that they throttle and slow the data traffic. Some organizations are averse to decrypting and re-encrypting, or implementing systems that have noticeable degradation of the user experience. All of these systems feed into the security incident and event management system. You may consider these devices as operational controls or real-time defense against the real-time attack. They are not used to find vulnerabilities but rather to protect the application in real time.
  • #17: Security and compliance should be an important consideration during the Software Development Lifecycle. Watchfire solutions of AppScan and WebXM provide tools to ensure web security vulnerabilities are identified and addressed early in the lifecycle and also ensure that web sites are in compliance.
  • #19: This security stack clearly depicts the framework of the network through to web application. What areas do each of the VA tools address? Let’s look at the network VA tools first. These do not have any permission on the operating system itself and includes products like Nessus, ISS Security Scanner, QualysGuard, and eEye Retina. These discover and search for vulnerabilities on the network (routers, switches, and firewalls) as well as web servers and known web applications. Host-based assessment products look at applications. (Remember that the operating system is really just a foundational application.) Database assessment products are specialized host-based products requiring credentials, that consider specific issues found in databases – another form of application. Black-box application scanners consider everything at the top of this stack: from the web server to web server configuration, third party components and the web application itself. This might include client-side components such as JavaScript used in AJAX and Web 2.0, web services and service oriented architectures as well as the web application itself. White-box application scanners are limited to the latter component. They can look at the source code of the web application itself, and only where the code is available. So why is it that some network scanners claim that they can find and report on SQL injection, XSS and buffer overflows? This is because there is some overlap in capabilities. Some of these issues (XSS and buffer overflows) exist in the web server itself, while all three (SQL Injection, XSS and buffer overflows) can be found in third party components. Network scanners DO NOT explore the web application or find any issues that are introduced in the application itself. Some overlap exists because both black-box application scanners and network scanners are able to find issues in the web server, web server configuration and third party components. So is a web application scanning technology really necessary? Where do the vulnerabilities exist? It is interesting to realize that 10 years ago most of the vulnerabilities lived in the network or operating system. This is no longer the case. IT administrators to become very smart about security and products have gotten very mature in the lower levels of the stack, right up to, and including, third party components used by web applications. The people who understand security are those that control the network, operating systems and applications. These issues are solved through configuration and patching. The challenge arises because they IT administrator does not understand the application – a requirement for securing the application. The web developer, who understands the application, does not understand security or have sufficient tools or knowledge to eliminate this issue. Further, while there a finite number of IPs in a network, or a finite number of ports on a device to be analyzed, a web application has a potentially infinite number of entry points, from forms, to query strings to cookies to header fields. This leaves the application with a significant number of vulnerabilities. Crackers are not unaware of this. Gartner reports that 75% of attacks now occur at the network layer and Watchfire has found that 90% of applications are vulnerable. One last thought. There is implicit trust in this stack. If the malicious individual is able to find an issue in the web application, keep in mind that the web application is typically trusted by the database, the applications, the operating system and the network. The entire system may be compromised.
  • #20: This chart details more of the differences between CWVs and ASVs and ultimately points out how an organization can most effectively reduce security defect costs. Basically, an organization has very little control over the costs to find and fix CWVs and a lot of control over the costs to find and fix ASVs. CWVs are a result of 3 rd party defects and as such can only be found once the application is in production. Because they are relatively easy to identify, and have patches issued for them that are publicly available their cost to the organization is relatively low in terms of finding and fixing. On the other hand, ASVs are defects introduced during the application development lifecycle, are very difficult to identify manually, and require the entire app lifecycle process for creating a fix, therefore, the ability to control the cost is relatively high. The cost to fix a vulnerability once it reaches deployments is 100 times greater than if it were caught and fixed in design. Because an ASV can be caught throughout the application lifecycle the organization has the ability to control this cost.
  • #22: The OWASP Top 10 list, includes the following 10 common security issues, which we will cover in a moment.
  • #23: A Cross Site Scripting attack, attempts to echo back a malicious script in the HTML returned from a trusted site. Since the script is echoed back from a trusted site, it runs in the context of that site. The implications of XSS are: Stealing HTTP session tokens Page content may be compromised (this may include “local” site defacement, or hijacking of the browser’s session using scripting) Future pages may be contaminated as well (by hijacking the session)
  • #24: Let’s take a look at the chain of events during a XSS attack The attack creates and sends the victim a link to bank.com (a trusted site). The link contains a search string (or any other string that is echoed back), which contains a malicious JavaScript code The victim, clicks on this link, since he/she trusts the bank.com web site The bank.com web application, echoes back the malicious JavaScript code inside the response page. This JavaScript is executed in the security context of bank.com, since it is echoed by from that site. This means that it has access to DOM elements belonging to this domain/session The malicious script, sends the current cookie and session information, without the victim’s consent, to the evil.org web site, where the hacker is waiting for it.
  • #25: Let’s take a look at the following banking web site – this site contains a search function, that allows users to search the site for specific text. If we type the string “asdf”, the response to the search will contain that string, inside the results page, in what we call “free HTML context”. What will happen if instead of typing “asdf”, we will type some JavaScript code? Let’s try to type the following JavaScript code: <script>alert(document.cookie)</script>
  • #26: As you can see – the piece of JavaScript code that we wrote, was echoed back by the site’s search function – since it was returned from the banking application, it had access to the Document Object Model (DOM), and could access the current session cookie. In this situation, I myself planted this JavaScript code in the web page, but in a XSS attack, it is the attacker who creates a link that contains the malicious JavaScript, and then sends this link to the victim. When the victim clicks on the link, the malicious JavaScript will be echoed back from the trusted site.
  • #27: XSS usually occurs in pages that echo back user input, for example – search pages, error pages and forms that are returned in subsequent pages Echoed input can come from any part of the HTTP message that is used by the application, for example: parts of the path, query, cookie or other headers. Some browser technologies can help with mounting the XSS attack, for example XMLHttpRequest (used in AJAX), flash objects or IFrames. There are several different flavors and variations of XSS, for example – XSS in HTML attributes, DOM Based XSS, etc.
  • #28: If a hacker can get you to run a JavaScript, he/she can: - Steal your cookies for the domain you’re browsing - Completely modify the content of any page you see on this domain - Track every action you do in that browser from now on - Redirect you to a Phishing site - Exploit browser vulnerabilities to take over machine XSS is currently one of the “hottest” security risks
  • #34: Injection flaws occur when user supplied data, is sent to an interpreter as a part of a command, query or data. The main issue here is that user input is not sanitized, and is embedded in pre-existing commands. Injection flaws can occur in: SQL queries (known as SQL Injection) Server Side Includes (execute commands on the web server) LDAP queries – used to bypass authentication
  • #35: SQL Injection occurs when user input is embedded as-is inside a pre-built SQL query. For example: Let’s assume that our web application receives a product ID as input, and presents that product’s page. The SQL query looks like this: “ Select * from products where id=‘” + $REQUEST[‘id’]; You should note, that the query is basically a text string, and user input is concatenated to it. In this example, the user string is surrounded by apostrophes. Let’s take a look at what will happen if we submit the product ID value of ‘ or ‘’=‘ The query will be: SELECT * from products where id=‘’ or ‘’=‘’; You should pay attention to the fact that the WHERE criteria here is basically a Boolean TRUE. Since the results of this query matches every entry in the database, all the products will be returned.
  • #36: Let’s take a look at how SQL Injection can assist a hacker to bypass the login mechanism of a banking application: - First, in order to sense that SQL Injection is possible, the hacker will injection the character apostrophe (‘), as the user name
  • #37: This yields a very informative SQL error message, which helps the attacker to devise the next phase of the injection
  • #38: Now, the hacker attempts to send the username: ‘ or 1=1— Note: the apostrophe is used to close the string context in which our input is embedded in 1=1 is a Boolean TRUE -- is used in MS SQL to comment out everything after the – sign, so we don’t have to worry about the rest of the SQL query
  • #39: After sending this SQL injection payload, we will be logged into the application, as the first user in the user's table - without having to supply actual credentials.
  • #40: Comments at one level can be command at another
  • #42: Let's continue to the next item on the OWASP Top 10 list - Malicious File Execution. In Malicious File Execution, the hacker attempts to trick the application into executing commands or creating files on the server. The implications of this attack are: - The hacker can execute remote commands on the server, which means a complete takeover - The hacker may deface the web site.
  • #43: Let’s take a look at our banking application again – The application contains a feedback form, which allows users to send the application owner all sorts of feedback. This feedback is submitted and appended to a file on the operating system. Since the application was designed poorly, the location of the feedback is taken from a “hidden” form parameter called “cfile”. All a hacker has to do in order to “create” a new file on the operating system, is manipulate the value of the “cfile” parameter to a different filename, and submit contents to that file (submitted as feedback).
  • #44: Let’s perform the attack – We change the value of the cfile parameter to myevilfile.aspx (we are creating an ASPX file, which is a server-side Microsoft ASP.NET script) Instead of a feedback, we’ll fill this file with some C# code, that will reveal the contents of the system’s hosts file
  • #45: When requesting the server-side script we just created, the application will execute it for us, revealing the contents of the hosts file. Game Over!
  • #46: In several scenarios, it may be possible for an attacker to manipulate the web application to disclose a resource such as a sensitive file. This can occur by either guessing a common file name and location and attempting to request it, or by manipulating a parameter value that is used to access a file, as will be seen in the next example. The implications of Insecure Direct Object Reference is usually information leakage or access to sensitive resources.
  • #47: In this example, we see that a web application that uses a parameter called “content”, which points to the contents of the page to be displayed. An attacker might attempt to manipulate the parameter value, from “business_deposit.htm”, which is the valid page, to some other file – for example, the Boot.ini which is a system file.
  • #48: The attempt failed, and the system disclosed that it only allows parameter value (file names) that end with either txt or htm as their file extension. Let’s try a little trick called “Poison Null Byte”, we’ll write the file we actually want to open which is Boot.ini, but append a NULL character and the extension the application is looking for (in this example .htm)
  • #49: Bingo! – we managed to circumvent the file extension validation, and open a sensitive system file. Using this technique, we can manipulate the application to hand us the contents of other, more sensitive files, such as databases, customer files, etc.
  • #50: Let's move on to the next item on the OWASP Top 10 list - Information Leakage and Improper Error Handling. Information leakage vulnerabilities usually do not allow a hacker to perform malicious actions, but rather enable the attacker to gather sensitive information, either about the application or about its users. This usually happens when application debugging information is not sanitized from response pages, when all sorts of errors (such as SQL error messages as shown before) occur, but it can also happen from more naive mistakes, such as leaving personal information or debugging remnants inside HTML comments. The implication of Information leakage can range between sensitive data being exposed, to web application internal logic being visible to the hacker.
  • #51: Let’s take a look at two information leakage examples: The first example is a simple one – the administrator left his/her phone number inside HTML comments, assuming that users do not read them. This information can be harvested and later on used for social engineering purposes The second example is the same as our previous SQL Injection scenario – if we submit a value (in this case apostrophe), that the application does not know how to handle, it might spit back debugging information.
  • #52: What you see here, is the response to the form submission, which included an apostrophe character as the user name. This error page reveals information about the type of SQL database that is used, and about the structure of the SQL query, allowing us to further devise a SQL Injection attack against the web application
  • #53: One last example of information leakage, which is also very common, is verbose login error messages. Some applications, will present the user with different error messages when the login process failed due to invalid username or invalid password (as seen in this slide). While this is not a severe issue, it narrows down the amount of time it will take the hacker to guess (or brute force) his/her way into the application.
  • #54: The last item on the OWASP Top 10 list, is Failure to Restrict URL Access. One of the most common security issues in web applications is the lack of proper access restrictions. Many people forget that not having a link to a resource, doesn’t mean that hackers can’t guess it. You should always limit user’s access, by putting URL access restrictions. Portions of the site that belong to administrators, should never be accessed by regular users. Failing to create proper access restrictions on web application resources might lead to: Information leakage Privilege escalation
  • #55: We'll now take a look at a simple Privilege Escalation example - This example, shows how unrestricted access to the administration page, may lead to complete compromise of the web application. When we log into the application as the administrator, we are presented with a link to the user account editing page. Naturally, this link doesn't appear in regular users' screens, nor should it be accessible for them. Since the application doesn't restrict access to this page, a hacker can attempt to guess that link, and take over the web application, as will be seen in the following slide.
  • #56: In this slide you see how the user authenticates as a regular user, but since the application did not have proper URL access permissions, the user guessed the link to the administration page, and was able to perform actions on behalf of the administrator, without having to log in as a high privileged user.
  • #57: You should always block users from requesting and retrieving restricted resources (for example, backup files, log files, source code files, etc.) Regular users shouldn’t be allowed to access pages that belong to higher privileged users (this is referred to as vertical PE) Regular users shouldn’t have access to other regular users’ pages (this is referred to horizontal PE)
  • #64: Rational has an integrated solution that allows for Testing(both manual and automated) and Change management. Watchfire’s tools AppScan and WebXM expand our exisitng solution to allow for security and compliance testing. WebXM allows organizations to ensure the complicance of their web sites and AppScan the quality and security of the websites. TEST AND CHANGE MANAGEMENT The key components of Rational’s software development and test platform are: Rational Team Unifying Platform, which contains RequisitePro for capturing and tracking software system requirements and use cases, ClearQuest for building detailed test plans executing automated and manual tests and analyzing test results and ClearQuest for managing all defects and change requests. DEVELOPER TESTING Rational PurifyPlus for run-time analysis, performance profiling and code coverage analysis, Rational Test RealTime for component test and run-time analysis for embedded applications. FUNCTIONAL AND PERFORMANCE TESTING Rational Functional Tester for automated build validation and functional/regression system testing Rational Manual Tester for building modular, reusable manual tests and automation of common error-prone tasks in manual testing Rational Performance Tester for load and scalability testing and transaction breakdown analysis to identify the source of a performance bottleneck
  • #65: This proof of technology focuses on vulnerability testing using AppScan
  • #67: AppScan scans for vulnerabilities by traversing an application similarly to the way a user browses a website. It starts from the home page or some other entry point, as defined by the user, and follows all the links. Each page is analyzed, and based on the characteristics of the page, AppScan sends a number of tests. The tests are sent in the form of HTTP requests. AppScan determines the presence of vulnerabilities based on the responses from the web server. The application is treated as a black box and AppScan communicates with it just like a browser does. AppScan Enterprise has thousands of built-in tests and checks for hundreds of different types of vulnerabilities.
  • #76: It’s time to join the League of Extraordinary Software Development Professionals at the 11 th annual Rational Software Development Conference, which will be held on June 1 – 5, 2008 at the Walt Disney Dolphin & Swan Resort. This is the premier event where software development professionals come to learn how to heroically team with each other and IBM Rational to combat the evil forces of information isolation, data overload, poor processes, and barriers to distance and language. Winning in today’s geographically distributed world takes more than just individual heroics. It takes Collaboration! Effective Organizational Ability! Teamwork! For more information on the tracks and or to register at www.ibm.com/rational/rsdc This year added: Application Security and Compliance Track