39
Breaching a Web Application Common Issues and Mitigating Steps

Breaching a Web Application - Common Issues and Mitigating Steps

Embed Size (px)

Citation preview

Page 1: Breaching a Web Application - Common Issues and Mitigating Steps

Breaching a Web Application

Common Issues and Mitigating Steps

Page 2: Breaching a Web Application - Common Issues and Mitigating Steps

My Name is Jason Frank Director of Veris Group’s Adaptive Threat Division Trainer for Black HatYou can find me at @jasonjfrank

PS: IANAD – I am not a developer!

Hello!

Page 3: Breaching a Web Application - Common Issues and Mitigating Steps

Agenda◉An Attacker’s View◉Injection Attacks 101◉Misconfigurations◉Remediation and Mitigations

Page 4: Breaching a Web Application - Common Issues and Mitigating Steps

An Attacker’s View1

Page 5: Breaching a Web Application - Common Issues and Mitigating Steps

Testing ProcessDiscovery

ExploitationPost Exploitation

Pre-Assessmen

tActivities

Post-Assessment

Activities

Page 6: Breaching a Web Application - Common Issues and Mitigating Steps

http://tutorials.jenkov.com/images/software-architecture/n-tier-architecture-2.png

Page 7: Breaching a Web Application - Common Issues and Mitigating Steps

http://tutorials.jenkov.com/images/software-architecture/n-tier-architecture-2.png

Page 8: Breaching a Web Application - Common Issues and Mitigating Steps

http://tutorials.jenkov.com/images/software-architecture/n-tier-architecture-2.png

DMZ Protected EnclaveInternet

Page 9: Breaching a Web Application - Common Issues and Mitigating Steps

https://www.w3.org/2005/03/Demos/insurance.png

Page 10: Breaching a Web Application - Common Issues and Mitigating Steps

https://www.w3.org/2005/03/Demos/insurance.png

Page 11: Breaching a Web Application - Common Issues and Mitigating Steps

◉Provides free documentation on offensive and defensive application measures

◉Curated “OWASP Top Ten” Vulnerabilities◉OWASP Web Testing Guide◉Contains material for:

Web ApplicationsMobileSoftware DevelopmentTools

Page 12: Breaching a Web Application - Common Issues and Mitigating Steps

https://www.owasp.org/images/thumb/7/7e/WebTT_thumb.png/400px-WebTT_thumb.png

Page 13: Breaching a Web Application - Common Issues and Mitigating Steps

https://www.owasp.org/images/thumb/7/7e/WebTT_thumb.png/400px-WebTT_thumb.png

Page 14: Breaching a Web Application - Common Issues and Mitigating Steps

Injection Attacks 1012

Page 15: Breaching a Web Application - Common Issues and Mitigating Steps

Injection Attacks

◉Occurs when unintended data is sent to an application

◉Proper input validation / server-side validation is not being performed

◉A dynamically built query can be altered to execute arbitrary calls or requests

◉Common Types of InjectionSQLXMLOS Command

Page 16: Breaching a Web Application - Common Issues and Mitigating Steps

https://itswadesh.files.wordpress.com/2011/11/sql-injection.jpg

Page 17: Breaching a Web Application - Common Issues and Mitigating Steps

Users

Posts

Comments

Themes

Wordpress Server

WPDBUser

WP Table

Page 18: Breaching a Web Application - Common Issues and Mitigating Steps

Users

Posts

Comments

Themes

Wordpress Server

DBA WP Table

Names

SSNs

Salaries

Addresses

HR App

Page 19: Breaching a Web Application - Common Issues and Mitigating Steps

Quotations are commonly printed as a means of

inspiration and to invoke philosophical thoughts from

the reader.

Page 20: Breaching a Web Application - Common Issues and Mitigating Steps

SQL Injection Tools

◉Burp Suite Pro Scanner(Identification)◉SQLMap ◉SQLNinja

Page 21: Breaching a Web Application - Common Issues and Mitigating Steps

Misconfigurations3

Page 22: Breaching a Web Application - Common Issues and Mitigating Steps

Misconfigurations

◉Serves as a catchup for many facets of the implementation

◉Can occur at all levels of the technology stack

◉Identifies both technical and procedural weaknesses

Page 23: Breaching a Web Application - Common Issues and Mitigating Steps

Operating System

Web Servers

Applications

Add-ons

Page 24: Breaching a Web Application - Common Issues and Mitigating Steps

http://www.rvrsh3ll.net/blog/offensive/leveraging-adobe-livecycle/

Page 25: Breaching a Web Application - Common Issues and Mitigating Steps

http://www.rvrsh3ll.net/blog/offensive/leveraging-adobe-livecycle/

Page 26: Breaching a Web Application - Common Issues and Mitigating Steps

http://www.rvrsh3ll.net/blog/offensive/leveraging-adobe-livecycle/

Page 27: Breaching a Web Application - Common Issues and Mitigating Steps

DMZ Protected EnclaveInternet Internal

Systems

Page 28: Breaching a Web Application - Common Issues and Mitigating Steps

DMZ Protected EnclaveInternet Internal

Systems

Page 29: Breaching a Web Application - Common Issues and Mitigating Steps

DMZ Protected EnclaveInternet Internal

Systems

Page 30: Breaching a Web Application - Common Issues and Mitigating Steps

DMZ Protected EnclaveInternet Internal

Systems

Page 31: Breaching a Web Application - Common Issues and Mitigating Steps

DMZ Protected EnclaveInternet Internal

Systems

Page 32: Breaching a Web Application - Common Issues and Mitigating Steps

DMZ Protected EnclaveInternet Internal

Systems

Page 33: Breaching a Web Application - Common Issues and Mitigating Steps

Tools◉Nikto◉Web Scanners

AcunetixNTOSpiderBurp Suite Pro

◉Vulnerability ScannersNessusNeXpose

Page 34: Breaching a Web Application - Common Issues and Mitigating Steps

Remediation and Mitigation4

Page 36: Breaching a Web Application - Common Issues and Mitigating Steps

Static ReviewsSource code reviews that are incorporated throughout the development cycle.

A Note About Testing Types

Dynamic TestingAssessment of the final solution in an operational context.

Page 38: Breaching a Web Application - Common Issues and Mitigating Steps

Misconfiguration Prevention

◉Review of all technologies in the stack◉Implement available hardening guides◉Have your solution dynamically tested

periodically

Page 39: Breaching a Web Application - Common Issues and Mitigating Steps

Any questions ?You can find me at◉ @jasonjfrank◉ Slides posted at:

http://www.slideshare.net/jasonjfrank

Thanks!