security testing testing… · a5 – security misconfiguration proper configuration of an...

18
SECURITY TESTING Towards a safer web world

Upload: others

Post on 25-Jun-2020

0 views

Category:

Documents


0 download

TRANSCRIPT

Page 1: SECURITY TESTING TESTING… · A5 – Security Misconfiguration Proper configuration of an application’s entire environment needs to be defined, implemented, and regulated or it

SECURITY TESTINGTowards a safer web world

Page 2: SECURITY TESTING TESTING… · A5 – Security Misconfiguration Proper configuration of an application’s entire environment needs to be defined, implemented, and regulated or it

AGENDA1. 3 W’S OF SECURITY TESTING2. SECURITY TESTING CONCEPTS3. SECURITY TESTING TYPES4. TOP 10 SECURITY RISKS

Page 3: SECURITY TESTING TESTING… · A5 – Security Misconfiguration Proper configuration of an application’s entire environment needs to be defined, implemented, and regulated or it

Few Security Breaches September 2016, while in negotiations to sell itself to Verizon, announced it had been the victim of the biggest data breach. The attack compromised of 500 million users. Yahoo later disclosed an earlier breach that had compromised 1 billion accounts.

Date: 2013-14

Impact: 1.5 billion user accounts Date: May 2014

Impact: 145 million user compromised

The online auction giant reported a cyberattack in May 2014 that it said exposed names, addresses, dates of birth and encrypted passwords of all of its 145 million users. The company said hackers got into the company network using the credentials of three corporate employees, and had complete inside access for 229 days, during which time they were able to make their way to the user database

Page 4: SECURITY TESTING TESTING… · A5 – Security Misconfiguration Proper configuration of an application’s entire environment needs to be defined, implemented, and regulated or it

3 W’S of Security Testing

Page 5: SECURITY TESTING TESTING… · A5 – Security Misconfiguration Proper configuration of an application’s entire environment needs to be defined, implemented, and regulated or it

WHAT IS SECURITY TESTING

➢ Security testing is the process to determine that an information system protects data and maintains functionality

➢ To check whether there is an information leakage➢ To test the application whether it has unauthorised access and having

the encoded security code➢ To finding out all the potential loopholes and weakness of the system

Page 6: SECURITY TESTING TESTING… · A5 – Security Misconfiguration Proper configuration of an application’s entire environment needs to be defined, implemented, and regulated or it

Why Security TestingWeb application security testing is a process that verifies that the information system protects the data and maintains its intended functionality. It involves an active analysis of the application for any weaknesses, technical flaws, or vulnerabilities.

Page 7: SECURITY TESTING TESTING… · A5 – Security Misconfiguration Proper configuration of an application’s entire environment needs to be defined, implemented, and regulated or it

WHEN TO START SECURITY TESTING

1. In general testing must start early to minimize defects of cost of quality2. Should start right from requirements gathering phase to make sure that

the quality of end product is high3. This is to ensure that any intentional /unintentional unforeseen action

does not halt or delay the system

Page 8: SECURITY TESTING TESTING… · A5 – Security Misconfiguration Proper configuration of an application’s entire environment needs to be defined, implemented, and regulated or it
Page 9: SECURITY TESTING TESTING… · A5 – Security Misconfiguration Proper configuration of an application’s entire environment needs to be defined, implemented, and regulated or it

Is the service and information safe from unauthorised prying eyes

Page 10: SECURITY TESTING TESTING… · A5 – Security Misconfiguration Proper configuration of an application’s entire environment needs to be defined, implemented, and regulated or it

Does the service provide only the correct information to the user

Page 11: SECURITY TESTING TESTING… · A5 – Security Misconfiguration Proper configuration of an application’s entire environment needs to be defined, implemented, and regulated or it

Is the person/package being truthful about their identity?

Page 12: SECURITY TESTING TESTING… · A5 – Security Misconfiguration Proper configuration of an application’s entire environment needs to be defined, implemented, and regulated or it

Is the person/package allowed to do this operation

Page 13: SECURITY TESTING TESTING… · A5 – Security Misconfiguration Proper configuration of an application’s entire environment needs to be defined, implemented, and regulated or it

Will the service do me good any time of the day

Page 14: SECURITY TESTING TESTING… · A5 – Security Misconfiguration Proper configuration of an application’s entire environment needs to be defined, implemented, and regulated or it

Did communication happen between two legitimate users

Page 15: SECURITY TESTING TESTING… · A5 – Security Misconfiguration Proper configuration of an application’s entire environment needs to be defined, implemented, and regulated or it

Security Testing TypesVulnerability scanning In this testing, whole system under test is scanned to find out the loopholes and vulnerable

signatures.

Penetration testing An attack from hacker is simulated on the system under test. Security testing is the one in which tester has to think of destroying the system while testing it

Ethical hacking This is different from penetration testing since here system under test is attacked from within to expose all the security flaws and loopholes in the application or software.

Risk assessment The assessment of risk involved with the security of system under test is done and then risks are classified as High, Medium and Low based on certain factors.

Security scanning This scans the whole system under test and finds out the network weaknesses. Then they are studied in detail, analyzed and fixed.

Security review Whether all the standards are followed and implemented properly are checked through gap analysis and code or design reviews.

Page 16: SECURITY TESTING TESTING… · A5 – Security Misconfiguration Proper configuration of an application’s entire environment needs to be defined, implemented, and regulated or it

OWASP TOP 10 RISKSA1 – Injection Injection flaws are a set of security vulnerabilities which occur when suspicious data is inserted into

an app as a command or query

A2 – Broken Authentication

and Session Management

When an application’s functions are not implemented correctly, the attack surface is open for criminals to easily break in and compromise passwords, session IDs, and exploit other flaws using stolen credentials

A3 – Cross-Site Scripting (XSS) XSS allows attackers to inject client-side scripts into public facing web pages and, in many cases, can be used by attackers to work their way past access controls.

A4 – Broken Access Control Access control is meant to control what “authorized” users are allowed and not allowed to do within an app, and to establish proper access control, the app must ensure that it is performing solid authorization checks and that proper authentication is in place to tell which users are privileged and which are in fact random internet users.

A5 – Security Misconfiguration Proper configuration of an application’s entire environment needs to be defined, implemented, and regulated or it may lead to severe security holes.

A6 – Sensitive Data Exposure Applications should ensure that access be authenticated and data be encrypted.

Page 17: SECURITY TESTING TESTING… · A5 – Security Misconfiguration Proper configuration of an application’s entire environment needs to be defined, implemented, and regulated or it

OWASP TOP 10 RISKS (Continued…)A7 – Insufficient Attack Protection This category looks into how many apps and APIs today struggle to “detect, prevent, and

respond to both manual and automated attacks”. The methods given include pentesting, vulnerability assessment, and using WAF or RASP as a means of detection and a quick and easy self-patch in response to an attack

A8 – Cross-Site Request Forgery

(CSRF)

This is done when an attacker takes control of a victim’s browser to generate requests the vulnerable app, which defines the actions as legitimate requests from the victim.

A9 – Using Components with Known

Vulnerabilities

Component, including libraries and frameworks, may be taken from the open source community and should be used with caution in case vulnerabilities are lurking

A10 – Underprotected APIs APIs serve as a link between intricate client platforms and a batch of web applications or services. And while APIs may technically be web apps, securing them is not as simple as securing traditional web applications.

Page 18: SECURITY TESTING TESTING… · A5 – Security Misconfiguration Proper configuration of an application’s entire environment needs to be defined, implemented, and regulated or it