security testing for web applications

18
Security Testing For Web Applications Created by: Kristina Filipyan Reviewed by: Vladimir Soghoyan Ogma Applications

Upload: vladimir-soghoyan

Post on 15-May-2015

2.760 views

Category:

Technology


12 download

DESCRIPTION

Causes of vulnerabilities Security testing concepts Security Testing Types Main methods of manual security testing URL manipulation SQL injection XSS (Cross Site Scripting) Automated security testing tools ------------------------------------------------ Created by: Kristina Filipyan Reviewed by: Vladimir Soghoyan Ogma Applications

TRANSCRIPT

Page 1: Security Testing For Web Applications

Security Testing For Web Applications

Created by: Kristina FilipyanReviewed by: Vladimir SoghoyanOgma Applications

Page 2: Security Testing For Web Applications

Design and development errors

Poor system configuration

Human errors

Causes of vulnerabilities

Page 3: Security Testing For Web Applications

AuthenticationDetermining the act of confirming the truth of an attribute of a datum or entity.

AuthorizationDetermining that a requester is allowed to receive a service or perform an

operation.

ConfidentialityA security measure which protects the disclosure of data or information to parties

other than the intended.

IntegrityWhether the intended receiver receives the information or data which is not altered

in transmission.

Non-repudiation(session time limitations) Interchange of authentication information with some form

of provable time stamp e.g. with session id .

Security testing concepts

Page 4: Security Testing For Web Applications

Vulnerability Scanning Method to assess computers, computer systems, networks or applications for weaknesses.

Security ScanningSecurity Scanning is a Vulnerability Scan

Penetration TestingMethod of evaluating the security of a computer system or network by simulating an attack

Risk AssessmentRisk Assessment involves a security analysis of interviews compiled with research of business, legal, and industry justifications.

Security AuditingSecurity Auditing involves hands on internal inspection of Operating Systems

andApplications, often via line-by-line inspection of the code.

Ethical HackingThis is basically a number of Penetration Tests on a number of

systems on a network segment.

Security Testing Types

Page 5: Security Testing For Web Applications

To secure financial data while transferring between different system

To secure user data To find security vulnerabilities in an

application

Why Security testing is needed?

Page 6: Security Testing For Web Applications

URL manipulation

SQL injection

XSS (Cross Site Scripting)

Main methods of manual security testing

Page 7: Security Testing For Web Applications

Search for directories making it possible to administer the site: http://target/admin/http://target/admin.cgi

Search for a script to reveal information about the remote system: http://target/phpinfo.php3

Search for backup copies. The .bak extension is generally used and is not interpreted by servers by default, which can cause a script to be displayed: http://target/.bak

URL manipulation through HTTP GET methods examples

Page 8: Security Testing For Web Applications

SELECT fieldlist

FROM table WHERE field = ‘[email protected]'';

SELECT fieldlist

FROM table WHERE field = 'x' AND email IS NULL; --';

SELECT email, passwd, login_id, full_name FROM table

WHERE email = 'x' AND 1=(SELECT COUNT(*) FROM tabname); --';

SQL Injection examples

Page 9: Security Testing For Web Applications

'';!--"<XSS>=&{()}

<SCRIPT SRC=http://ha.ckers.org/xss.js></SCRIPT>

<IMG SRC="javascript:alert('XSS');">

Cross Site Scripting (XSS)

Page 10: Security Testing For Web Applications

XSS Attack example on RockSquare:

XSS Input XSS Attack Results

Page 11: Security Testing For Web Applications

NMAP (free source)Security scanner used to discover hosts and services on a computer network.

GFI LANguard (licensed)Network Security Scanner and Vulnerability Management Tool.

Automated security testing tools:

Page 12: Security Testing For Web Applications

Zenmap is the official Nmap Security Scanner GUI

Zenmap action shots:Nmap Output

Hosts and PostsTopologyHost Details

What is Zenmap ?

Page 13: Security Testing For Web Applications

Nmap Output:

The “Nmap Output” shows scanning results.

Page 14: Security Testing For Web Applications

Hosts and Ports

“Ports / Hosts” tab shows all the hosts which have that port open filtered, or closed.

Page 15: Security Testing For Web Applications

Topology

The “Topology” tab is an interactive view of the connections between hosts in a network.

Page 16: Security Testing For Web Applications

Host Details

The “Host Details” tab breaks all the information about a single host into a hierarchical display.

Page 17: Security Testing For Web Applications

Nmap sends specially crafted packets to the target host and then analyzes the responses.

Nmap can determine the operating system of the target, names and versions of the listening services, estimated uptime, type of device, and presence of a firewall.

The goal of the Nmap

Page 18: Security Testing For Web Applications

Thank You