Closing the Door on Web Application Attacks FISSEA 2004

Slides:



Advertisements
Similar presentations
Security Issues and Challenges in Cloud Computing
Advertisements

Building Your Own Firewall Chapter 10. Learning Objectives List and define the two categories of firewalls Explain why desktop firewalls are used Explain.
Barracuda Web Application Firewall
It’s always better live. MSDN Events Security Best Practices Part 2 of 2 Reducing Vulnerabilities using Visual Studio 2008.
WEB SECURITY. WEB ATTACK TYPES Buffer OverflowsXML InjectionsSession Hijacking Attacks WEB Attack Types.
8.1 © 2007 by Prentice Hall 8 Chapter Securing Information Systems.
Information Networking Security and Assurance Lab National Chung Cheng University The Ten Most Critical Web Application Security Vulnerabilities Ryan J.W.
Information Networking Security and Assurance Lab National Chung Cheng University 1 Top Vulnerabilities in Web Applications (I) Unvalidated Input:  Information.
ASP.NET 2.0 Chapter 6 Securing the ASP.NET Application.
Lesson 9-Securing a Network. Overview Identifying threats to the network security. Planning a secure network.
Jonas Thomsen, Ph.d. student Computer Science University of Aarhus Best Practices and Techniques for Building Secure Microsoft.
Handling Security Threats in Kentico CMS Karol Jarkovsky Sr. Solution Architect Kentico Software
Web Application Vulnerabilities Checklist. EC-Council Parameter Checklist  URL request  URL encoding  Query string  Header  Cookie  Form field 
D ATABASE S ECURITY Proposed by Abdulrahman Aldekhelallah University of Scranton – CS521 Spring2015.
Evolving Threats. Application Security - Understanding the Problem DesktopTransportNetworkWeb Applications Antivirus Protection Encryption (SSL) Firewalls.
©2003–2008 Check Point Software Technologies Ltd. All rights reserved. CheckPoint new security architecture and R70 highlights.
AIS, Passwords Should not be shared Should be changed by user Should be changed frequently and upon compromise (suspected unauthorized disclosure)
Closing the Door on Web Application Attacks FISSEA 2004 Confidential and proprietary information ©2004, MagniFire Websystems Inc.
Imperva Total Application Security Idan Soen, CISSP Security Engineer SecureSphere – The First Dynamic Profiling Firewall Idan Soen, CISSP Security Engineer.
1-Vulnerabilities 2-Hackers 3-Categories of attacks 4-What a malicious hacker do? 5-Security mechanisms 6-HTTP Web Servers 7-Web applications attacks.
Business Computing 550 Lesson 6. 2 Security Threats on Web Sites Issues and vulnerabilities 1.Illegal Access and Use (Hacking the system or users exposing.
Security Professional Services. Security Assessments Vulnerability Assessment IT Security Assessment Firewall Migration Custom Professional Security Services.
Copyright 2007 © The OWASP Foundation Permission is granted to copy, distribute and/or modify this document under the terms of the OWASP License. The OWASP.
3-Protecting Systems Dr. John P. Abraham Professor UTPA.
Software Security Testing Vinay Srinivasan cell:
COMP3121 E-Commerce Technologies Richard Henson University of Worcester November 2011.
Chapter 2. Core Defense Mechanisms. Fundamental security problem All user input is untrusted.
Top Five Web Application Vulnerabilities Vebjørn Moen Selmersenteret/NoWires.org Norsk Kryptoseminar Trondheim
SEC835 Runtime authentication Secure session management Secure use of cryptomaterials.
APPLICATION PENETRATION TESTING Author: Herbert H. Thompson Presentation by: Nancy Cohen.
Security Attacks CS 795. Buffer Overflow Problem Buffer overflows can be triggered by inputs that are designed to execute code, or alter the way the program.
Copyright © The OWASP Foundation Permission is granted to copy, distribute and/or modify this document under the terms of the OWASP License. The OWASP.
By Sean Rose and Erik Hazzard.  SQL Injection is a technique that exploits security weaknesses of the database layer of an application in order to gain.
PwC New Technologies New Risks. PricewaterhouseCoopers Technology and Security Evolution Mainframe Technology –Single host –Limited Trusted users Security.
Web Security Group 5 Adam Swett Brian Marco. Why Web Security? Web sites and web applications constantly growing Complex business applications are now.
Lesson 19-E-Commerce Security Needs. Overview Understand e-commerce services. Understand the importance of availability. Implement client-side security.
Chap1: Is there a Security Problem in Computing?.
Web Application (In)security Note: Unless noted differently, all scanned figures were from the textbook, Stuttard & Pinto, 2011.
Role Of Network IDS in Network Perimeter Defense.
By Collin Donaldson. Hacking is only legal under the following circumstances: 1.You hack (penetration test) a device/network you own. 2.You gain explicit,
Carrie Estes Collin Donaldson.  Zero day attacks  “zero day”  Web application attacks  Signing up for a class  Hardening the web server  Enhancing.
Unit 2 Personal Cyber Security and Social Engineering Part 2.
HIPS. Host-Based Intrusion Prevention Systems  One of the major benefits to HIPS technology is the ability to identify and stop known and unknown attacks,
Securing Information Systems
ArcGIS for Server Security: Advanced
Database and Cloud Security
Securing Information Systems
Fortinet NSE8 Exam Do You Want To Pass In First Attempt.
TMG Client Protection 6NPS – Session 7.
Web Application Protection Against Hackers and Vulnerabilities
Chapter 7: Identifying Advanced Attacks
World Wide Web policy.
Real-time protection for web sites and web apps against ATTACKS
Secure Software Confidentiality Integrity Data Security Authentication
A Security Review Process for Existing Software Applications
Security mechanisms and vulnerabilities in .NET
Securing Information Systems
Jon Peppler, Menlo Security Channels
Myths About Web Application Security That You Need To Ignore.
Website Security Testing: Why Business Need It Very Badly.
Firewalls at UNM 11/8/2018 Chad VanPelt Sean Taylor.
What is Cookie? Cookie is small information stored in text file on user’s hard drive by web server. This information is later used by web browser to retrieve.
INFORMATION SYSTEMS SECURITY and CONTROL
Lecture 2 - SQL Injection
Field Systems Engineer F5 Networks Central Europe
Designing IIS Security (IIS – Internet Information Service)
Exploring DOM-Based Cross Site Attacks
Web Application Development Using PHP
Presentation transcript:

Closing the Door on Web Application Attacks FISSEA 2004 Confidential and proprietary information ©2004, MagniFire Websystems Inc.

Today’s Session What are the risks? Why don’t traditional solutions work? What can be done?

Ensuring 100% protection In Israel the government has an effective way to protect sensitive data from internet hackers…

However, Government Is Moving Online Unique Audience (2002) (Source: Nielson NetRatings)

Web Servers and Web Applications: Prime Targets for Attacks “64% of the 10 million security incidents Security Focus tracked the first week of Feb 2002, targeted port 80.” (Information Week magazine) “Nearly 70% of all attacks in the first quarter of 2002 used port 80, a common port devoted to Web traffic.” (ISS Internet Risk Impact Summary Report for 2002)

What are the Risks ? Access to user databases Social Security Numbers (CA) Police Records (MI) Financial loss as a result of fraud Theft of secure or sensitive information

Web Applications Are The Weakest Point Host IDS & Secure OS Net IDS System “64% of the 10 million security incidents tracked targeted port 80.” (Information Week magazine) Network Application DATA Desktop Access Antivirus Firewall

Major Categories of Web Application Vulnerabilities Improper validation of user input by the Web application server side (relying on client side validation): Cookie Poisoning Hidden Field Manipulation Parameter Tampering Stealth Commanding (e.g. SQL/OS Injection) Cross-site Scripting Application Buffer Overflow URL & Unicode encoding Backdoors and Debugs option (left in the application) Poor Session Management, Access Control & Authentication Third Party Misconfiguration Almost all Web applications are exposed “From 45 applications, @stake found nearly 500 ‘significant’ security defects, with an average of at least 10 per assessment” (@Stake Study on Web application security)

Hidden Field Manipulation Modifying form fields allowing damaging data to pass to the web application Example: Online Retail Store Changing prices and stealing goods Hidden field hacking in 3rd party shopping cart software

Hidden Field Manipulation - Example

Hidden Field Manipulation - Example

Hidden Field Manipulation - Example

Hidden Field Manipulation - Example

Hidden Field Manipulation - Example

Cookie Poisoning Modifying the cookie file causing the return of unauthorized information or enabling performance of activity on behalf of another user Example: Online account administration Impersonation

Cookie Poisoning - Example

Cookie Poisoning - Example

Cookie Poisoning - Example

Cookie Poisoning - Example

Cookie Poisoning - Example

Buffer Overflow Sending too much data in a request to the application, attacking either 3rd party or internally developed code

Buffer Overflow - Example

Buffer Overflow - Example

Buffer Overflow - Example

Cross Site Scripting Inserting scripting languages into text fields to be displayed to other users Example: Add an Item Section of Web Site Site defacement Changing field parameters

Cross Site Scripting - Example

Cross Site Scripting - Example

Cross Site Scripting - Example

Cross Site Scripting - Example

Cross Site Scripting - Example

Known Vulnerabilities & Misconfiguration Exploiting configuration errors in 3rd party components, such as web and database servers Newdsn.exe can be used by an attacker to create files anywhere on your disk if they have the NTFS correct file permissions to do so. Newdsn.exe can also be used to overwrite the DSNs on existing on-line databases making the information contained in the database inaccessible. This file, getdrvrs.exe, dsnform.exe and mkilog.exe should be deleted.

Known Vulnerabilities & Misconfiguration

Known Vulnerabilities & Misconfiguration

Parameter Tampering Modify the parameters being passed as part of the URL Example: Online Auction Site User Account Access Forbidden SQL Query via wrong parameters

Parameter Tampering - Example

Parameter Tampering - Example

Forceful Browsing Jumping directly to pages that can normally only be accessed through authentication mechanisms Example: Auction Web Site Breaching users’ privacy Direct file access

Forceful Browsing - Example

Forceful Browsing - Example

Forceful Browsing - Example

Reasons for Web Application Vulnerabilities Applications were written according to client-server security standards (rely on client-side validation) The complexity of platforms and environments makes secure coding very difficult Web developers focus on functionality and performance, not on security Web developers are not trained for secure programming Bugs in Web infrastructure (OS and Web platforms) and Web applications Web sites are changed/updated frequently Threat is exacerbated by the availability of: Web application client-side source code (hackers gain information for planning attacks) Widely available, free, easy to use hacking tools

Existing Security Solutions are Inadequate

Traditional Security Solutions Don’t Protect Web Applications Current solutions are not enough (CSI & FBI 2002): 89% of respondents have a firewall 60% of respondents used at least one Intrusion Detection System However: 40% reported system penetration from the outside 40% reported DoS attacks Firewalls: “Firewalls offer little protection at the application layer because ports within the firewall have to be left open for communication” (IDC 2002) Network IDS: “Intrusion detection systems are a market failure, and vendors are now hyping intrusion prevention systems, which have also stalled. Functionality is moving into firewalls, which will perform deep packet inspection for content and malicious traffic blocking, as well as antivirus activities." (Gartner, 2003)

Fundamental Problem with IPS/IDS: ‘Negative Security Logic’ How It Works: Let everything through except what can be identified as malicious traffic (based on attack signatures & traffic characteristics) Problems Protects only against known attacks (signature and/or characteristics are known and defined) Requires constant updating of attack signatures and / or characteristics database Doesn’t protect against “Zero Day” attacks Doesn’t protect against attacks based on illegal user input: Cookie Poisoning and Hidden-Field Manipulation Parameter (Form-Field) Tampering Forceful Browsing Backdoors and debug-option exploitation

Traditional Security Solutions Don’t Protect Web Applications HIPS NIPS FW TrafficShield Yes Limited Known Web Worms Partial No Unknown Web Worms Known Web Vulnerabilities Unknown Web Vulnerabilities Illegal Access to Web-server files Forceful Browsing File/Directory Enumerations Brute Force attacks Buffer Overflow Cross-Site Scripting SQL/OS Injection Cookie Poisoning Hidden-Field Manipulation Parameter Tampering Flood attacks (GET, 404) SSL Flooding

Current Application-Layer Approaches Scan-and-Fix Scanning HTML code for known breaches and then rewriting it is ineffective and costly compared to installing an application firewall. Time-Consuming due to high rate of false positives that must be evaluated. Ineffective since it does not find all vulnerabilities, thereby requiring additional techniques (e.g. manual code review) in order to ensure protection. Requires Code Rewrites which are very expensive in terms of both time and resources Slows Down Product Development since every change in the application requires new “scan & fix” iteration Useless for 3rd party web applications since they can’t be altered Defenseless against new threats, since it only looks for known vulnerabilities

The Solution: Granular & Tailored Application-Specific Security

Solution Criteria Web Application Firewall Using Positive Security Logic 1 Model application extremely accurately Auto configuration / customization around app No false positives or false negatives Minimal ongoing policy management No latency introduced (<1 ms) 2 3 4 5

Model the Application Flow Web Application Application Flow Model Application Flow CHANGE USER ID Actions not known to be legal can now be blocked. - wrong page order - invalid parameter - invalid value - etc.

The Application Flow Model An accurate representation of the designed interaction between the user and the Web application Legal user will request: Links existing in the Web page currently browsed OR Web pages which are entry points to the app Thus, a legal request to a Web page should always have two characteristics: It should come from a link embedded in the original page browsed by the user* It should comply with the request definition in the Web page the user is currently browsing, defining: Request method Request parameters Request parameters values * Unless the page requested is the entry point to the Web application.

The Application Flow Model The only way to provide total security in front of Web applications (the only way to replace embedded security code) Stateful - Tracks which pages a user is coming from, and the specific permissions associated with that context. A request which is perfectly legal within the context of one page might be inappropriate for a user on another page Bidirectional - Looks at server responses to the client as well as client requests to the server. Essential to verify that the user hasn’t attempted to tamper with the credentials sent to him in his response Granular – Complete logical rendering of the transitions between every page, including every object, every parameter of each object, and every legal value within each object parameter.

Hybrid Policy Generator: Creating the Application Flow Model Automatic analysis of Web page content. Purpose-built crawler Complete analysis of the Web page content, including active code such as JavaScript, ‘Learns’ all details of the interaction between the user and the Web application. Iterative policy adjustment. Examines how users interact with application over time, based on real-life traffic. Recommends adjustments to the current policy, based on the on-line analysis on the rejected traffic.

Hybrid Policy Generator Hybrid policy generation combines crawler-based application modeling with adjustments based on real-life request analysis Request based learning is very useful to detect missing elements in policy Response based learning is limited in its analysis to avoid significant latency Model User Flow Static Parameters Active- Code Analysis Dynamic Parameters Accurate Security Policy Crawler based Learning Yes No Request based Learning Limited Response based Learning Partial Hybrid Approach

No False Positives, No False Negatives Constraints that prevent vulnerabilities in certain cases can cause “False Positives” in other cases Low granular policy means Either false positives OR low security (false negatives) due to relaxed policy The solution: Granular Security Policy that is accurately adjusted to the protected Web-application Constraints are adjusted to Web-application Flow Model (no need to relax security constraints) Policy enforcement takes into account user state No False Positives (constraints are not used when they are not applicable)

Low Latency Security Policy enforcement is translated into hash searches Hardened Linux Appliance Ease deployment Eliminates misconfiguration Optimized performance and throughput Scalable Architecture - Shield units can be added to handle larger traffic volumes Automatic recovery from unit failure based on the fact that units are identical and can switch roles Central and secure management

Solution Criteria Solution Crawling & full analysis of web pages Adjustments based on real-life traffic ‘Learning Mode’ automatically recommends policy adjustments based on customer activity Any non-recognized activity is blocked Automated mapping & policy suggestions Appliance: fits into web infrastructure Automatic detection of website changes and suggestions for newly-tailored policy Network appliance with modified OS for high throughput 1 2 3 4 5 Model application extremely accurately Auto configuration / customization around app No false positives or false negatives Minimal ongoing policy management No latency introduced (<1 ms)

Thank You! Confidential and proprietary information ©2003, MagniFire Websystems Inc.