Infosec 2012 | 25/4/12 Application Performance Monitoring Ofer MAOR CTO Infosec 2012.

Slides:



Advertisements
Similar presentations
Webgoat.
Advertisements

OWASP’s Ten Most Critical Web Application Security Vulnerabilities
HI-TEC 2011 SQL Injection. Client’s Browser HTTP or HTTPS Web Server Apache or IIS HTML Forms CGI Scripts Database SQL Server or Oracle or MySQL ODBC.
Hands-on SQL Injection Attack and Defense HI-TEC July 21, 2013.
Xiao Zhang and Wenliang Du Dept. of Electrical Engineering & Computer Science Syracuse University.
OWASP Web Vulnerabilities and Auditing
Don’t get Stung (An introduction to the OWASP Top Ten Project) Barry Dorrans Microsoft Information Security Tools NEW AND IMPROVED!
HVC2012 | 8-Nov-12 Application Performance Monitoring Ofer Maor CTO HVC Nov 2012 Haifa, Israel.
Creating Stronger, Safer, Web Facing Code JPL IT Security Mary Rivera June 17, 2011.
© 2008 All Right Reserved Fortify Software Inc. Hybrid 2.0 – In search of the holy grail… A Talk for OWASP BeNeLux by Roger Thornton Founder/CTO Fortify.
Vulnerability Assessment Course Applications Assessment.
Barracuda Web Application Firewall
Application Security: What Does it Take to Build and Test a “Trusted” App? John Dickson, CISSP Denim Group.
ReferencesReferences DiscussionDiscussion Vulnerability Example: SQL injection Auditing Tool for Eclipse LAPSE: a Security Auditing Tool for Eclipse IntroductionIntroductionResultsResults.
Security in Application & SDLC
Information Networking Security and Assurance Lab National Chung Cheng University The Ten Most Critical Web Application Security Vulnerabilities Ryan J.W.
It’s always better live. MSDN Events Securing Web Applications Part 1 of 2 Understanding Threats and Attacks.
Information Networking Security and Assurance Lab National Chung Cheng University 1 Top Vulnerabilities in Web Applications (I) Unvalidated Input:  Information.
© Copyright 2012 Elitecore Technologies Ltd. All Rights Reserved. Securing You Web Application Firewall Protection CYBEROAM UTM’s Unified.
Handling Security Threats in Kentico CMS Karol Jarkovsky Sr. Solution Architect Kentico Software
Copyright © The OWASP Foundation Permission is granted to copy, distribute and/or modify this document under the terms of the Creative Commons Attribution-ShareAlike.
Web Application Vulnerabilities Checklist. EC-Council Parameter Checklist  URL request  URL encoding  Query string  Header  Cookie  Form field 
Security Scanning OWASP Education Nishi Kumar Computer based training
By: Razieh Rezaei Saleh.  Security Evaluation The examination of a system to determine its degree of compliance with a stated security model, security.
W3af LUCA ALEXANDRA ADELA – MISS 1. w3af  Web Application Attack and Audit Framework  Secures web applications by finding and exploiting web application.
Evolving Threats. Application Security - Understanding the Problem DesktopTransportNetworkWeb Applications Antivirus Protection Encryption (SSL) Firewalls.
Web Security Overview Lohika ASC team 2009
OWASP Zed Attack Proxy Project Lead
Testing Tools. Categories of testing tools Black box testing, or functional testing Testing performed via GUI. The tool helps in emulating end-user actions.
Approaches to Application Security – DSM
A Framework for Automated Web Application Security Evaluation
Penetration Testing James Walden Northern Kentucky University.
A Security Review Process for Existing Software Applications
Ryan Dewhurst - 20th March 2012 Web Application (PHP) Security.
Software Security Testing Vinay Srinivasan cell:
OWASP Top Ten #1 Unvalidated Input. Agenda What is the OWASP Top 10? Where can I find it? What is Unvalidated Input? What environments are effected? How.
Copyright © The OWASP Foundation Permission is granted to copy, distribute and/or modify this document under the terms of the OWASP License. The OWASP.
The attacks ● XSS – type 1: non-persistent – type 2: persistent – Advanced: other keywords (, prompt()) or other technologies such as Flash.
SDBI Seminar Web Application Security Name: Lior Ateret.
APPLICATION PENETRATION TESTING Author: Herbert H. Thompson Presentation by: Nancy Cohen.
Copyright © The OWASP Foundation Permission is granted to copy, distribute and/or modify this document under the terms of the OWASP License. The OWASP.
October 3, 2008IMI Security Symposium Application Security through a Hacker’s Eyes James Walden Northern Kentucky University
nd Joint Workshop between Security Research Labs in JAPAN and KOREA Marking Scheme for Semantic- aware Web Application Security HPC.
Web Applications Testing By Jamie Rougvie Supported by.
Building Secure Web Applications With ASP.Net MVC.
Practical Threat Modeling for Software Architects & System Developers
New Techniques in Application Intrusion Detection Al Huizenga, Mykonos Product Manager May 2010.
TESTING FOR VULNERABILITIES AND APPLICATION SECURITY REVIEW George-Alexandru Andrei CTO BIT SENTINEL.
CS526Topic 12: Web Security (2)1 Information Security CS 526 Topic 9 Web Security Part 2.
OWASP Building Secure Web Applications And the OWASP top 10 vulnerabilities.
Chapter 1 The Software Security Problem. Goals of this course Become aware of common pitfalls. Static Analysis and tools.
Copyright © The OWASP Foundation This work is available under the Creative Commons SA 2.5 license The OWASP Foundation OWASP Denver February 2012.
Copyright © The OWASP Foundation Permission is granted to copy, distribute and/or modify this document under the terms of the OWASP License. The OWASP.
The OWASP Foundation Copyright © The OWASP Foundation Permission is granted to copy, distribute and/or modify this document under.
Do not try any of the techniques discussed in this presentation on a system you do not own. It is illegal and you will get caught.
Page 1 Ethical Hacking by Douglas Williams. Page 2 Intro Attackers can potentially use many different paths through your application to do harm to your.
Web Application Vulnerabilities
Web Application Protection Against Hackers and Vulnerabilities
Securing Your Web Application in Azure with a WAF
TOPIC: Web Security (Part-4)
World Wide Web policy.
Penetration Testing following OWASP
A Security Review Process for Existing Software Applications
OWASP WebGoat v5 16 April 2010.
امنیت نرم‌افزارهای وب تقديم به پيشگاه مقدس امام عصر (عج) عباس نادری
Eoin Keary Code review Lead Irish Chapter Lead
WWW安全 國立暨南國際大學 資訊管理學系 陳彥錚.
Presentation transcript:

Infosec 2012 | 25/4/12 Application Performance Monitoring Ofer MAOR CTO Infosec 2012

Infosec 2012 | 25/4/12 Introduction Application Security vs. Data Security Current Application Security Approach –Vulnerability vs. Risk –Technique vs. Goal Challenges of Existing Application Security Solutions New Approach for Application Data Security

Infosec 2012 | 25/4/12 About Myself 16 years in information/application security (Over 10 years hands on penetration testing) Research, Development, Enhancement –Attack & Defense Techniques –WAF / AppSec Testing Products Regular Speaker in Security Conferences OWASP Global Membership Committee & Chairman of OWASP Israel

Infosec 2012 | 25/4/12 The Problem Application Security – Goal or Mean? Importance of Protecting Persistent Data DB Security Solutions – Is It Enough? Influence of App Vulns on Data Security AppSec As a Mean for Data Protection AppSec As Integrate Part of R&D?

Infosec 2012 | 25/4/12 Current Approach Approach Too Technical Focus on Technical Aspects –Examine it from the vulnerability perspective –Focus on injections & technical problems –Analysis of code, rather than application –Ignoring application data Focus on technology instead of risk Hard to fit into the development lifecycle

Infosec 2012 | 25/4/12 Too Many Vulnerabilities… SQL Injection Cross Site Scripting Cross Site Request Forgery Parameter Tampering Forceful Browsing Session Riding Hidden Field Manipulation LDAP Injection Cookie Poisoning CRLF Injection HTTP Response Splitting XPath Injection Directory Traversal OS Commanding Session Hijacking Insecure Redirect Flow Bypassing Director Listing Insecure Password Storage File Inclusion No User Lockout Unauthenticated Access Buffer Overflow No SSL Session Fixation Detailed Error Messages Misconfiguration Information Leakage URL Encoding

Infosec 2012 | 25/4/12 Going Back to the Roots Risk Based Approach CIA –Confidentiality –Integrity (+ Non Repudiation) –Availability Assess Application Vulnerabilities Based on Data Risk

Infosec 2012 | 25/4/12 Data Oriented Approach Taking a Data-Oriented Approach to Application Security Testing Logical vs Technical Business Impact Level of Exploitability Risk, Risk, Risk

Infosec 2012 | 25/4/12 Example: Unauthorized Data Modification The Attack is Data Modification Can be performed in various ways: –Parameter Tampering –Flow Bypassing –SQL Injection –Cross Site Scripting –Cross Site Request Forgery

Infosec 2012 | 25/4/12 The Problem – Take II Existing Solutions – Too Technical No One Used Data Oriented Approach –DAST (Scanners) Analyze Request/Responses – No Data Access Focused on Technical Vulnerabilities –SAST (Static Analyzers) Only Static Code – No Data Access Focused on Technical Vulnerabilities –Pentesters – Better, But Still Mostly Technical

Infosec 2012 | 25/4/12 The Problem – Take II Result – Low Security ROI – €€€ spent on solutions not focused on data risk – €€€ spent on professional services trying to sort through the thousands of results – €€€ spent on R&D hours of fixing unnecessary fixes High Costs, Unfocused Efforts, Inefficient.

Infosec 2012 | 25/4/12 The Solution: Data Centric Application Security Analysis of Actual Data Handling in System Automatic Data Classification –Sensitivity –Ownership –Accessibility –etc. Identifying Vulns Which Pose Real Risk Verification of Actual Risk Level

Infosec 2012 | 25/4/12 Advantages Focus on Real Vulnerabilities Holistic Approach (Application, not Code) Support for Business Transactions –Multi Tier, Multi Step Components, etc. Identify Vulnerabilities Otherwise Unidentified Identify Potential Data Breaches Easy to Integrate into R&D

Infosec 2012 | 25/4/12 The Data Centric Approach More REAL Vulnerabilities No IRRELEVANT Vulnerabilities Efficient, Practical, Focused Fits R&D Security Program Provides High Security ROI

Infosec 2012 | 25/4/12 About Quotium New Generation Application Security Data Oriented Approach Utilizes new Runtime Analysis Engine –Analysis of application data and code –Exploit verification to classify risk. Intuitive & Easy to Use Adaptive to the Development Process

Infosec 2012 | 25/4/12 Application Performance Monitoring Ofer Maor Come Visit Us! Booth #F51