OWASP Mobile Top 10 Why They Matter and What We Can Do

Slides:



Advertisements
Similar presentations
Innovation Towards a next generation secure internet Private Application Ecosystems Sanjay Deshpande CEO and Chief Innovation Officer Center.
Advertisements

OWASP Mobile Top 10 Beau Woods
Kerberos 1 Public domain image of Heracles and Cerberus. From an Attic bilingual amphora, 530–520 BC. From Italy (?).
Don’t get Stung (An introduction to the OWASP Top Ten Project) Barry Dorrans Microsoft Information Security Tools NEW AND IMPROVED!
SEC835 OWASP Top Ten Project.
Engineering Secure Software. Uses of Risk Thus Far  Start with the functionality Use cases  abuse/misuse cases p(exploit), p(vulnerability)  Start.
It’s always better live. MSDN Events Security Best Practices Part 2 of 2 Reducing Vulnerabilities using Visual Studio 2008.
Information Networking Security and Assurance Lab National Chung Cheng University The Ten Most Critical Web Application Security Vulnerabilities Ryan J.W.
It’s always better live. MSDN Events Securing Web Applications Part 1 of 2 Understanding Threats and Attacks.
Information Networking Security and Assurance Lab National Chung Cheng University 1 Top Vulnerabilities in Web Applications (I) Unvalidated Input:  Information.
BUILDING A SECURE STANDARD LIBRARY Information Assurance Project I MN Tajuddin hj. Tappe Supervisor Mdm. Rasimah Che Mohd Yusoff ASP.NET TECHNOLOGY.
Injection Attacks by Example SQL Injection and XSS Adam Forsythe Thomas Hollingsworth.
Designing Security In Web Applications Andrew Tomkowiak 10/8/2013 UW-Platteville Software Engineering Department
Metro (down the Tube) Security Testing Windows Store Apps Marion McCune – ScotSTS Ltd.
Telenet for Business Mobile & Security? Brice Mees Security Services Operations Manager.
SEC835 Database and Web application security Information Security Architecture.
OWASP Zed Attack Proxy Project Lead
Principles of Computer Security: CompTIA Security + ® and Beyond, Third Edition © 2012 Principles of Computer Security: CompTIA Security+ ® and Beyond,
 Computer security policy ◦ Defines the goals and elements of an organization's computer systems  Definition can be ◦ Highly formal ◦ Informal  Security.
Ladd Van Tol Senior Software Engineer Security on the Web Part One - Vulnerabilities.
Ryan Dewhurst - 20th March 2012 Web Application (PHP) Security.
Security Trifecta – Overview of Vulnerabilities in the Racing Industry Gus Fritschie December 11, 2013.
Databases and security continued CMSC 461 Michael Wilson.
Copyright 2007 © The OWASP Foundation Permission is granted to copy, distribute and/or modify this document under the terms of the OWASP License. The OWASP.
Internet of Things Top Ten. Agenda -Introduction -Misconception -Considerations -The OWASP Internet of Things Top 10 Project -The Top 10 Walkthrough.
An Inside Look at Mobile Security Android & iOS Zachary Hance & Andrew Phifer Dr Harold Grossman.
Chapter 2. Core Defense Mechanisms. Fundamental security problem All user input is untrusted.
OWASP Top Ten #1 Unvalidated Input. Agenda What is the OWASP Top 10? Where can I find it? What is Unvalidated Input? What environments are effected? How.
SEC835 Runtime authentication Secure session management Secure use of cryptomaterials.
ADV. NETWORK SECURITY CODY WATSON What’s in Your Dongle and Bank Account? Mandatory and Discretionary Protections of External Resources.
Web Applications Testing By Jamie Rougvie Supported by.
Building Secure Web Applications With ASP.Net MVC.
Lecture 16 Page 1 CS 236 Online Web Security CS 236 On-Line MS Program Networks and Systems Security Peter Reiher.
IT Security. What is Information Security? Information security describes efforts to protect computer and non computer equipment, facilities, data, and.
Deconstructing API Security
CS526Topic 12: Web Security (2)1 Information Security CS 526 Topic 9 Web Security Part 2.
Wireless and Mobile Security
Copyright © The OWASP Foundation Permission is granted to copy, distribute and/or modify this document under the terms of the OWASP License. The OWASP.
Database Security Cmpe 226 Fall 2015 By Akanksha Jain Jerry Mengyuan Zheng.
OWASP Building Secure Web Applications And the OWASP top 10 vulnerabilities.
Engineering Secure Software. Agenda  What is IoT?  Security implications of IoT  IoT Attack Surface Areas  IoT Testing Guidelines  Top IoT Vulnerabilities.
Copyright © The OWASP Foundation This work is available under the Creative Commons SA 2.5 license The OWASP Foundation OWASP Denver February 2012.
CIT 380: Securing Computer SystemsSlide #1 CIT 380: Securing Computer Systems Web Security.
Web Application (In)security Note: Unless noted differently, all scanned figures were from the textbook, Stuttard & Pinto, 2011.
Do not try any of the techniques discussed in this presentation on a system you do not own. It is illegal and you will get caught.
Technical Security Issues in Cloud Computing By: Meiko Jensen, Jorg Schwenk, Nils Gruschka, Luigi Lo Lacono Presentation by: Winston Tong 2009 IEEE.
Carrie Estes Collin Donaldson.  Zero day attacks  “zero day”  Web application attacks  Signing up for a class  Hardening the web server  Enhancing.
By: Matt Winkeler.  PCI – Payment Card Industry  DSS – Data Security Standard  PAN – Primary Account Number.
James F. Fox MENA Cyber Security Practice Lead Presenters Cyber Security in a Mobile and “Always-on” World Booz | Allen | Hamilton.
Page 1 Ethical Hacking by Douglas Williams. Page 2 Intro Attackers can potentially use many different paths through your application to do harm to your.
The Fallacy Behind “There’s Nothing to Hide” Why End-to-End Encryption Is a Must in Today’s World.
Web Applications Security Cryptography 1
Web Application Vulnerabilities
Web Application Vulnerabilities, Detection Mechanisms, and Defenses
Securing Your Web Application in Azure with a WAF
TOPIC: Web Security (Part-4)
Canberra OWASP Chapter meeting
Cyber Security for REDCap Extended Features Protecting REDCap extended features (Twilio, Mobile App, API, and more). – Staying ahead of the bad guys.
Secure Software Confidentiality Integrity Data Security Authentication
An Introduction to Web Application Security
Engineering Secure Software
WWW安全 國立暨南國際大學 資訊管理學系 陳彥錚.
Designing IIS Security (IIS – Internet Information Service)
6. Application Software Security
Leo McCavana, OWASP Belfast, October 1st, 2015
Presentation transcript:

OWASP Mobile Top 10 Why They Matter and What We Can Do BSides Columbus 2015 January 19th, 2015

Who Am I? Husband and Father Over 20 years in technology New to the information security field. This is my first conference talk ever

Changes

M1: Weak Server Side Controls What it is: Attack vectors typically leading to the traditional OWASP Top 10 as well as the OWASP Cloud Top 10 Anything that a mobile application can do wrong that is not on the phone itself. SQL Injection, CSRF, XSS, etc.. Insecure Coding Practices How to prevent: Satisfy the requirements for the OWASP Top 10 and OWASP Cloud Top 10. Implement secure coding practices across your organization. Don’t think that holes in your web application or cloud services are limited to just those areas.

M2: Insecure Data Storage What It Is: Securing critical information insecurely on the device Most commonly seen in these places: SQLite Databases Log Files Binary Data Stores SD Cards Cloud Synced How to Prevent: The primary rule of mobile apps is not to store data unless absolutely necessary. If you must store data on the phone, it is your responsibility to know what is stored and protect it accordingly. OWASP maintains Best Practices for both iOS and Android in terms of data storage.

M3: Insufficient Transport Layer Protection What It Is: Anything related to the transport of information from the client to the server, whether over a mobile network or a Wi-Fi Network. Lack of Certificate Inspection Weak Handshake Negotiation Confidential Information Leakage How to Prevent: We must assume the network layer is not secure. Apply SSL/TLS to all transport channel the mobile apple will use. Good Certificate practices DO NOT send sensitive information over alternate methods (SMS, MMS, notifications)

M4: Unintended Data Leakage What It Is: Vulnerabilities in the operating system, frameworks, etc. that occur without a developer’s knowledge. The way an operating system or frameworks might cache data, images, key presses, images, etc.. How to Prevent: Understand the tools, frameworks, and operating systems that you use for mobile development. Threat model your operating system. Once you identify weakness you can you put in controls to offset this and avoid data lea

M5: Poor Authorization and Authentication What It Is: This is primarily a lack of or mishandling of the authentication or authorization within the application. This can be storing information on the client side or not requiring server side authentication. How to Prevent: Assume any and all client side authorization/authentication controls can be exploited. Re-enforce server side controls where possible. If the app has offline usage requirements, implement local integrity checks.

M6: Broken Cryptography What It Is: Insecure use of cryptography presents as having a flawed process behind the encryption that can be exploited or using an method of encryption/decryption that is weak by default. How to Prevent: Always use modern encryption methods and also consider white box encryption. Do not use weak or insufficient algorithms: RC2 MD4 MD5 SHA1

M7: Client Side Injection What it Its: Allowing input without input validation and no prevention against code injection. This can be related to the data on the device itself, the mobile browser, application interfaces or the binary code itself. How to Prevent: Look at all areas your application can receive data from and apply some sort of data validation. For injection attacks on the mobile side, follow best practices for your OS of choice in terms of secure development against injections. M10 will discuss more in terms of binary attacks.

M8: Security Decisions Via Untrusted Inputs What it Is: This is related specifically a mishandling or a misunderstanding about how to handle input via Inter Process Communications (IPC) within the operating system. How to Prevent: If IPC is needed, restrict access to a white list of trusted apps. Sensitive actions should require user interaction. Input validation must be strict for all IPC entries. Do not pass sensitive information over IPC.

M9: Improper Session Handling What It Is: This primarily centers around not invalidating sessions on the back end, have no time out protection or inadequate time outs, not rotating cookies, and insecure token creation. How to Prevent: Invalidate sessions both on the mobile app and on the server side. Set good time out protections, with high security apps having the shortest window before timing out. Destroy cookies on the server side and insure cookies from prior sessions no longer accepted. Like cryptography, use well established and industry standard methods of creating tokens.

M10: Lack of Binary Protections What It Is: The primary risk and attack vector is a code base that is hosted in an untrusted environment. This is an environment where the organization does not have physical control. Mobile clients, firmware in appliances, cloud spaces or data centers in certain countries. How to Prevent: Follow secure coding techniques for mobile apps. Build the app to prevent an adversary from analyzing and reverse engineering the app. Build the app to react appropriately to code integrity violation.

In Closing: As we continue to move towards more and more mobile apps, it is important for developers, QA, support, and security personnel to understand the weaknesses in the tools we are use and put in mitigation strategies to account for these. Security must be an end to end process in development. Always assume insecurity and work to address it. Never assume security is present or that someone else is handling it. Threat model everything from top to bottom. This will prevent surprises. Never compromise security in an application, mobile or otherwise.

Additional Information OWASP Mobile Security Project: https://www.owasp.org/index.php/OWASP_Mobile_Security_Project OWASP Traditional Top 10: https://www.owasp.org/index.php/Category:OWASP_Top_Ten_Project OWASP Cloud Project: https://www.owasp.org/index.php/Category:OWASP_Cloud_%E2%80%90_10_Project OWASP Reverse Engineering and Code Modification Prevention Project: https://www.owasp.org/index.php/OWASP_Reverse_Engineering_and_Code_Modification_Prevention _Project Android Secure Developer Practices: http://developer.android.com/training/best-security.html iOS Secure Developer Practices: https://developer.apple.com/library/ios/documentation/Security/Conceptual/SecureCodingGuide/Sec urityDevelopmentChecklists/SecurityDevelopmentChecklists.html Microsoft Security Development LifeCycle: http://www.microsoft.com/security/sdl/default.aspx BlackBerry Security Best Practices: http://developer.blackberry.com/native/documentation/core/com.qnx.doc.native_sdk.security/topic/s ecurity_overview.html

QUESTIONS?

THANK YOU!!!! @rrickardjr