170 likes | 284 Views
Why WebAppsec Matters. Module (to be combined). Education Project. What goes Wrong?. Public Health Warning. 3. XSS and CSRF have evolved Any website you visit could infect your browser An infected browser can do anything you can do An infected browser can scan, infect, spread
E N D
Why WebAppsec Matters Module (to be combined) Education Project
Public Health Warning 3 • XSS and CSRF have evolved • Any website you visit could infect your browser • An infected browser can do anything you can do • An infected browser can scan, infect, spread • 70-90% of web applications are ‘carriers’
Key Application Security Vulnerabilities http://www.owasp.org/index.php?title=Top_10_2007
Tools – At Best 45% MITRE found that all application security tool vendors’ claims put together cover only 45% of the known vulnerability types (over 600 in CWE) They found very little overlap between tools, so to get 45% you need them all (assuming their claims are true)
Myth Myth: we are secure because we have a firewall 75% of Internet Vulnerabilities are at Web Application Layer * *GartnerGroup (2002 report)
Myth Source: Jeremiah Grossman, BlackHat 2001
Myth • Myth 2 - we are secure because we use SSL • only secures data in transit • does not solve vulnerabilities on: • Web server • Browser
Myth Source: Jeremiah Grossman, BlackHat 2001
Myth Your security “perimeter” has huge holes at the application layer Custom Developed Application Code Application Layer Databases Legacy Systems Web Services Directories Human Resrcs Billing APPLICATIONATTACK App Server Web Server Hardened OS Network Layer Firewall Firewall You can’t use network layer protection (firewall, SSL, IDS, hardening) to stop or detect application layer attacks
Web Application Security • Combination of • People, • Processes, • and Technology • to identify, measure, and manage Risk • presented by COTS(*), open source, and custom web applications. (*) Commercial Of The Shelf
People Processes Technology Training Awareness Guidelines Automated Testing Secure Development Application Firewalls Secure Code Review Security Testing Secure Configuration
Trends • Business demands more bells and whistles • Internal applications get ‘web-enabled’ and are exposed to Intranet or Internet • Increasing complexity of software • Rush software out without adequate testing • Poor security training and awareness
A1: Cross site scripting (XSS) A2: Injection flaws A3: Malicious file execution A4: Insecure direct object reference A5: Cross site request forgery (CSRF) A6: Information leakage and improper error handling A7: Broken authentication and session management A8: Insecure cryptographic storage A9: Insecure communications A10: Failure to restrict URL access Vulnerabilities: OWASP top 10 (v 2007)
Attacks • Defacements • Phishing • Denial of Service • Credit Card Stealing • Bot Infection • ... See the Web Hacking Incidents Database on http://www.webappsec.org/projects/whid/