web application assessment - securosis · 2020. 7. 11. · web application vulnerability...

19
Integrating Web Application Penetration Testing into Your Vulnerability Management Program Rich Mogull Securosis, L.L.C.

Upload: others

Post on 24-Sep-2020

0 views

Category:

Documents


0 download

TRANSCRIPT

Page 1: Web Application Assessment - Securosis · 2020. 7. 11. · web application vulnerability management. •Establish web application configuration standards and begin enforcement during

Integrating Web Application Penetration Testing into Your

Vulnerability Management Program

Rich MogullSecurosis, L.L.C.

Page 2: Web Application Assessment - Securosis · 2020. 7. 11. · web application vulnerability management. •Establish web application configuration standards and begin enforcement during

ecurosis.com

Top Threats

ClientsideWeb Applications

Page 3: Web Application Assessment - Securosis · 2020. 7. 11. · web application vulnerability management. •Establish web application configuration standards and begin enforcement during

ecurosis.com

Why Web Applications Are Such a Problem

• Rapid development with limited QA

• Eternal beta cycles

• Un(security)trained developers

• New vulnerability classes

• Insecure browsers

• Inherent insecurity of web model

Page 4: Web Application Assessment - Securosis · 2020. 7. 11. · web application vulnerability management. •Establish web application configuration standards and begin enforcement during

ecurosis.com

Major Webapp AttacksBreaking Trust Relationships

Cross Site Scripting

Cross Site Request Forgery

SQL InjectionBrowser Server

Page 5: Web Application Assessment - Securosis · 2020. 7. 11. · web application vulnerability management. •Establish web application configuration standards and begin enforcement during

ecurosis.com

Cross Site Scripting

2) Malicious script stored

Stored

1

2) User follows to

trusted site

3) Malicious script injected

by site

Reflected

1) Malicious URL

23

Victim VictimAttacker Attacker

Page 6: Web Application Assessment - Securosis · 2020. 7. 11. · web application vulnerability management. •Establish web application configuration standards and begin enforcement during

ecurosis.com

Cross Site Request Forgery

Script/link to submit

transaction to trusted site

Malicious transactions

Session 1

Authenticates

Session 2 StealthSession

Page 7: Web Application Assessment - Securosis · 2020. 7. 11. · web application vulnerability management. •Establish web application configuration standards and begin enforcement during

ecurosis.com

SQL Injection

SQL Statement

Statement: “SELECT * FROM users WHERE name = '" + uName + "‘ AND password =

‘” + upass + “’;”

admin‘--

Attack Input

SELECT * FROM users WHERE name = ‘admin’-- "‘ AND password = ‘” + upass

+ “’;”

Executed Statement

Page 8: Web Application Assessment - Securosis · 2020. 7. 11. · web application vulnerability management. •Establish web application configuration standards and begin enforcement during

ecurosis.com

Accidental/Directory Traversal

+ Or - “/” =

Page 9: Web Application Assessment - Securosis · 2020. 7. 11. · web application vulnerability management. •Establish web application configuration standards and begin enforcement during

ecurosis.com

How we used to manage web applications

Page 10: Web Application Assessment - Securosis · 2020. 7. 11. · web application vulnerability management. •Establish web application configuration standards and begin enforcement during

ecurosis.com

Vulnerability Management

Page 11: Web Application Assessment - Securosis · 2020. 7. 11. · web application vulnerability management. •Establish web application configuration standards and begin enforcement during

ecurosis.com

Web Application Security Program Overview

Page 12: Web Application Assessment - Securosis · 2020. 7. 11. · web application vulnerability management. •Establish web application configuration standards and begin enforcement during

ecurosis.com

Application Security Lifecycle

Page 13: Web Application Assessment - Securosis · 2020. 7. 11. · web application vulnerability management. •Establish web application configuration standards and begin enforcement during

ecurosis.com

Development Phases

Page 14: Web Application Assessment - Securosis · 2020. 7. 11. · web application vulnerability management. •Establish web application configuration standards and begin enforcement during

ecurosis.com

Integration

Pla$ormvulns

Page 15: Web Application Assessment - Securosis · 2020. 7. 11. · web application vulnerability management. •Establish web application configuration standards and begin enforcement during

ecurosis.com

Integration

Pla$ormvulns

Page 16: Web Application Assessment - Securosis · 2020. 7. 11. · web application vulnerability management. •Establish web application configuration standards and begin enforcement during

ecurosis.com

Limitations of static analysis/scanning

• Can’t catch everything

• No validation

• No exploitability/Impact

• Miss logic flaws

• Fire and forget

• The bad guys don’t use them

Page 17: Web Application Assessment - Securosis · 2020. 7. 11. · web application vulnerability management. •Establish web application configuration standards and begin enforcement during

ecurosis.com

Best Practices for Web App Pen Testing

• Begun testing in the development process.

• Use a combination of tools and manual process.

• Include traditional pen testing of the underlying platform.

• Perform periodic testing post-deployment, especially as new exploits appear.

Page 18: Web Application Assessment - Securosis · 2020. 7. 11. · web application vulnerability management. •Establish web application configuration standards and begin enforcement during

ecurosis.com

Adapting your program for the long term

• Understand the different requirements of web application vulnerability management.

• Establish web application configuration standards and begin enforcement during development.

• Include code and vulnerability scanning, but you cannot skip penetration testing.

Page 19: Web Application Assessment - Securosis · 2020. 7. 11. · web application vulnerability management. •Establish web application configuration standards and begin enforcement during

ecurosis.com

Integrating Web Application Penetration Testing into Your

Vulnerability Management Program

Rich MogullSecurosis, L.L.C.

http://[email protected]