1. Prelude Diebold’s electronic voting system source code was discovered and subsequently leaked due to it being on a Diebold web server. Although it.

Slides:



Advertisements
Similar presentations
What is code injection? Code injection is the exploitation of a computer bug that is caused by processing invalid data. Code injection can be used by.
Advertisements

Security Q&A OSG Site Administrators workshop Indianapolis August Doug Olson LBNL.
1 Web Servers / Deployment Alastair Dawes Original by Bhupinder Reehal.
DT211/3 Internet Application Development Active Server Pages & IIS Web server.
Toolbox Mirror -Overview Effective Distributed Learning.
Server-Side vs. Client-Side Scripting Languages
Mod Security (Is it worth it?) By Rich Helton. Abstract (see my paper for sources)  Based on statistics, Apache is the most used web server being used.
B.Sc. Multimedia ComputingMedia Technologies Database Technologies.
Information Networking Security and Assurance Lab National Chung Cheng University The Ten Most Critical Web Application Security Vulnerabilities Ryan J.W.
Creating WordPress Websites. Creating a site on your computer Local server Local WordPress installation Setting Up Dreamweaver.
1 CS6320 – Why Servlets? L. Grewe 2 What is a Servlet? Servlets are Java programs that can be run dynamically from a Web Server Servlets are Java programs.
How Clients and Servers Work Together. Objectives Learn about the interaction of clients and servers Explore the features and functions of Web servers.
Browser Exploitation Framework (BeEF) Lab
 Proxy Servers are software that act as intermediaries between client and servers on the Internet.  They help users on private networks get information.
Module 6: Patches and Security Updates 1. Overview Installing Patches and Security Updates Recent patches and security updates for IIS Recent patches.
Chapter 6: Hostile Code Guide to Computer Network Security.
Presented by Manager, MIS.  GRIDCo’s intentions for publishing an Acceptable Use Policy are not to impose restrictions that are contrary to GRIDCo’s.
Web Application Vulnerabilities Checklist. EC-Council Parameter Checklist  URL request  URL encoding  Query string  Header  Cookie  Form field 
SYST Web Technologies SYST Web Technologies Installing a Web Server (XAMPP)
Nikto LUCA ALEXANDRA ADELA. Nikto  Web server assessment tool  Written by Chris Solo and David Lodge  Released on December 27, 2001  Stable release:
D ATABASE S ECURITY Proposed by Abdulrahman Aldekhelallah University of Scranton – CS521 Spring2015.
Introduction to Application Penetration Testing
Introduction: Drupal is a free and open-source content management system (CMS). A content management system(CMS) is a computer program that allows publishing,
M. Taimoor Khan * Java Server Pages (JSP) is a server-side programming technology that enables the creation of dynamic,
Brad Baker CS526 May 7 th, /7/ Project goals 2. Test Environment 3. The Problem 4. Some Solutions 5. ModSecurity Overview 6. ModSecurity.
Design and Implement an Efficient Web Application Server Presented by Tai-Lin Han Date: 11/28/2000.
Business Computing 550 Lesson 6. 2 Security Threats on Web Sites Issues and vulnerabilities 1.Illegal Access and Use (Hacking the system or users exposing.
IST 210 Web Application Security. IST 210 Introduction Security is a process of authenticating users and controlling what a user can see or do.
CIS 450 – Network Security Chapter 16 – Covering the Tracks.
IIS Security Sridurga Mavram. Contents -Introduction -Security Consideration -Creating a web page -Drawbacks -Security Tools -Conclusion -References.
DEV325 Deploying Visual Studio.NET Applications Billy Hollis Author / Consultant.
Copyright © The OWASP Foundation Permission is granted to copy, distribute and/or modify this document under the terms of the OWASP License. The OWASP.
National Center for Supercomputing Applications NCSA OPIE Presentation November 2000.
Top Five Web Application Vulnerabilities Vebjørn Moen Selmersenteret/NoWires.org Norsk Kryptoseminar Trondheim
AppSec USA 2014 Denver, Colorado CMS Hacking 101 Hacking and Securing Popular Open Source Content Management Systems.
Hands-On Microsoft Windows Server Implementing Microsoft Internet Information Services Microsoft Internet Information Services (IIS) –Software included.
WEP Presentation for non-IT Steps and roles in software development 2. Skills developed in 1 st year 3. What can do a student in 1 st internship.
Software Security Without The Source Code By Matt Hargett.
Web Applications Testing By Jamie Rougvie Supported by.
Building Secure Web Applications With ASP.Net MVC.
Module 8 : Configuration II Jong S. Bok
PwC New Technologies New Risks. PricewaterhouseCoopers Technology and Security Evolution Mainframe Technology –Single host –Limited Trusted users Security.
Web Security Group 5 Adam Swett Brian Marco. Why Web Security? Web sites and web applications constantly growing Complex business applications are now.
Group 19 Juan O’Connell Justin Rand ECE 4112 Group 19 May 1, 2007 Georgia Institute of Technology College of Engineering School of Electrical and Computer.
Implementing and Using the SIRWEB Interface Setup of the CGI script and web procfile Connecting to your database using HTML Retrieving data using the CGI.
1 ECE 4112 Internetwork Security: Web Application Security 28 April 2005 John Owens Shantan Pesaru.
GLite build and integration system Building and Packaging Robert HARAKALY
CITA 310 Section 7 Installing and Testing a Programming Environment (Textbook Chapter 7)
Wireless and Mobile Security
Database Security Cmpe 226 Fall 2015 By Akanksha Jain Jerry Mengyuan Zheng.
Web Security. Introduction Webserver hacking refers to attackers taking advantage of vulnerabilities inherent to the web server software itself These.
Intro to APACHE, MySQL, and PHP & freely available (hackable) Packages Aonghus Sugrue 04 Oct 2012.
CGS 3066: Web Programming and Design Spring 2016 Introduction to Server-Side Programming.
Web development. What is web development? - It is a broad term for the work involved in developing a web site for the Internet - It can range from developing.
Lecture 19 Page 1 CS 236 Online 6. Application Software Security Why it’s important: –Security flaws in applications are increasingly the attacker’s entry.
Software Testing Training Online. Software testing is ruling the software business in current scenario. It provides an objective, independent view of.
CGS 3066: Web Programming and Design Spring 2017
Web Application Security
Web Application Vulnerabilities, Detection Mechanisms, and Defenses
Introduction to Dynamic Web Programming
WEB APPLICATION TESTING
World Wide Web policy.
Penetration Testing Karen Miller.
Defense in Depth Web Server Custom HTTP Handler Input Validation
Lecture 2 - SQL Injection
Web Servers / Deployment
Protecting Against Common Web Application Vulnerabilities
Lecture 34: Testing II April 24, 2017 Selenium testing script 7/7/2019
6. Application Software Security
Presentation transcript:

1

Prelude Diebold’s electronic voting system source code was discovered and subsequently leaked due to it being on a Diebold web server. Although it is unclear exactly how it was discovered, this type of information leakage is what this pre-proposal will be covering. 2

Project Overview and Goals This presentation is an overview of preliminary findings on discovering and retrieving private information on the world wide web. The goal of this project will be to identify the best methods of attack and defense for information leakage. The result of this research will be a set of design guidelines to mitigate identified vulnerabilities in web sites. 3

Obscurity Leads to Exploitation 4 Just because it’s not listed does not mean that it is not there. Many “dynamic” sites do not employ “real” security measures to protect files. –e.g., Drupal and Joomla default installations. These sites generally use “fake” paths or just php/asp/cgi/pl/py/etc files to give you the file. –Drupal pathauto is an example of “fake” paths.

5 Current Tools Nikto –Checks for known files of popular systems for the purpose of vulnerability assessment. –Makes no attempt to find private files. NavNet –“Fusker” - geared towards getting free photos and videos. –Not very light weight..net GUI (with built in web browser) DirBuster –True brute forcing application, closer to what we want. –Uses lists that are not very dynamic. dsc00828, dscn0279 –Not very light weight. Java + GUI

My Tool - wdivulge Written in Perl. –Allows rapid prototyping and development –Multiplatform –Command line tool Threaded for maximum efficiency Planned open source release via GPL (unless sponsored) Modular –Possible plans for “glue” code to pass data off to other attack tools like sqlmap Smarter Detection 6

7 Needed because brute forcing is really expensive. Web is SLOW! –Compared to local brute forcing. Uses customizable “smart lists”. –"DSCN"[####]/".jpg" versus dscn0279 Pass results back to parent thread. –Not yet implemented. –Could speed things up or slow things down depending on target.

Early Results Able to find many hidden files depending on naming schemes. –Default names are the easiest. –Helpful if you have access to at least one file. –Complex names are not discovered yet. e.g., “hey^s3cr3t%$.txt” Attacks are only as good as the “smart lists”. –Better lists needed! Doesn’t work against.htaccess protected sites or binaries embedded in databases. –Tested on Apache server, not on IIS yet. 8

Defense.htaccess control seems to be the best in terms of performance. –Password protection for basic sites. –“Deny from all” directories + Dupral Protected Download module (there are other modules like this). Storing binaries in the database. –Causes a performance hit due to all files having to go through your database. –Works well against this type of attack, but could leave you even more vulnerable if your site is vulnerable to attacks like sql injection. Don’t put sensitive information on your web server. –Best defense, also the least practical in many situations. –Internal web servers may also be vulnerable depending on your network setup. Adrian Lamo gained access to many internal pages via poorly configured proxies. 9

Future Better lists will increase results. –Lists require considerable research to maximize efficiency. –There is often no “universal” list for a certain file type due to personalized naming standards. wdivulge is intended as a framework. –Support of other tools like sqlmap will result in better information discovery. Adding “smart directory” discovery is critical. –We cannot brute force if we do not know where to brute force. –Similar to “smart lists” but based on internal workings of various content management systems (CMS). –Scraping of public sites will be needed for non public CMS. Sponsorship? 10

Q/A Questions? 11