340 likes | 354 Views
This article provides insights into the current state of web application vulnerabilities, including data analysis, top issues, and common attack techniques. It also offers recommendations for improving security.
E N D
Introduction Willem Mouton willemm@senseofsecurity.com.au @w_m__
Why we like numbers (and WebApps) Unpacking the numbers Digging a bit deeper Dealing with the root cause Closing thoughts Q&A
Why we like numbers (and WebApps) • Improves our internal processes and quality • Provides (somewhat of) a measurement against industry • Helps answer some of your most burning questions
Unpacking the numbers https://xkcd.com/
Unpacking the numbers Data collected from • 175 reports reviewed* • 3670 findings analysed** • Average of 21 findings per report • Roughly 40% of our projects
Unpacking the numbers Sense of Security Risk Matrix
Unpacking the numbers Top 10 issues identified in 2018 (irrespective of risk level)
Unpacking the numbers Top 10 issues identified in 2018 (irrespective of risk level) We’ll get back to these
Unpacking the numbers SOS Top 10 categories vs OWASP Top 10 (and why they differ on paper)
Unpacking the numbers Large vs Small (on average across all reports)
Unpacking the numbers Private sector vs Government (on average across all reports)
Digging deeper https://xkcd.com/
Digging deeper Data validation remains a massive problem SQL Injection 11% of all applications test had at least one instance 20 year old technique Fully industrialised attacks Widely used in breaches Noisy but low detection rate
Digging deeper Data validation remains a massive problem SQL Injection 11% of all applications test had at least one instance 20 year old technique Fully industrialised attacks Widely used in breaches Noisy but low detection rate
Digging deeper Data validation remains a massive problem SQL Injection 11% of all applications test had at least one instance 20 year old technique Fully industrialised attacks Widely used in breaches Noisy but low detection rate
Digging deeper Data validation remains a massive problem SQL Injection 11% of all applications test had at least one instance 20 year old technique Fully industrialised attacks Widely used in breaches Noisy but low detection rate
Digging deeper Data validation remains a massive problem SQL Injection 11% of all applications test had at least one instance 20 year old technique Fully industrialised attacks Widely used in breaches Noisy but low detection rate
Digging deeper Data validation remains a massive problem Cross-Site Scripting 31% of all applications tested had at least one instance More complicated, but can be more damaging
Digging deeper Data validation remains a massive problem Cross-Site Scripting 31% of all applications tested had at least one or more instances More complicated, but can be more damaging
Digging deeper The forgotten software stack Components with known vulnerabilities 31% of all applications tested had outdated components Mostly ignored Hosting of 3rd party CDN providers Poor internal management of code dependencies
Digging deeper The forgotten software stack Components with known vulnerabilities 31% of all applications tested had outdated components Mostly ignored Hosting of 3rd party CDN providers Poor internal management of code dependencies https://builtwith.com/
Digging deeper The forgotten software stack Components with known vulnerabilities 31% of all applications tested had outdated components Mostly ignored Hosting of 3rd party CDN providers Poor internal management of code dependencies
Digging deeper 88% of all applications tested had SSL/TLS issues Certificate issues Protocol issues Cipher / Configuration issues Known attacks Standardisation lacking
Digging deeper Some honourable mentions XML external entity vulnerabilities Serialization issues Server-side request forgery (SSRF)
Root cause • Configuration • Design • Implementation
Root cause • Configuration • Design • Implementation
A quick Segway Consider the eco system your web application live in Most common attack actively being used Credential stuffing Known breaches (Don’t be (in)one of them) #ShamelessPromotions Our Whitepaper on External Network Pentesting
A quick Segway Consider the eco system your web application live in Most common attack actively being used Credential stuffing Known breaches (Don’t be (in)one of them) #ShamelessPromotions Our Whitepaper on External Network Pentesting
Closing thoughts https://xkcd.com/
Closing thoughts Changing the next years report Security from design to …. to BAU Consider all vulnerabilities Create development / deployment standards for your organisation Automation is key, but don’t forget the manual work Use industry guidelines, OWASP ASVS is great Training
Closing thoughts Changing the next years report Security from design to …. to BAU Consider all vulnerabilities Create development / deployment standards for your organisation Automation is key, but don’t forget the manual work Use industry guidelines, OWASP ASVS is great Training
Questions? https://xkcd.com/