Snakes and Ladders OWASP Newcastle 24 th November 2015.

Slides:



Advertisements
Similar presentations
OWASP Mobile Top 10 Beau Woods
Advertisements

Don’t Teach Developers Security Caleb Sima Armorize Technologies.
OWASP Web Vulnerabilities and Auditing
PENETRATION TESTING Presenters:Chakrit Sanbuapoh Sr. Information Security MFEC.
Don’t get Stung (An introduction to the OWASP Top Ten Project) Barry Dorrans Microsoft Information Security Tools NEW AND IMPROVED!
OWASP Top 10 for 2010 OWASP Education Nishi Kumar
The Web Hacking Incident Database (WHID) Report for 2010 Ryan Barnett WASC WHID Project Leader Senior Security Researcher.
A Demo of and Preventing XSS in.NET Applications.
Information Networking Security and Assurance Lab National Chung Cheng University The Ten Most Critical Web Application Security Vulnerabilities Ryan J.W.
Information Networking Security and Assurance Lab National Chung Cheng University 1 Top Vulnerabilities in Web Applications (I) Unvalidated Input:  Information.
“Today over 70% of attacks against a company’s network come at the ‘Application Layer’ not the Network or System layer.” - Gartner Is Your Web Application.
Solving Real-World Problems with an Enterprise Security API (ESAPI) Chris Schmidt ESAPI Project Manager ESAPI4JS Project Owner Application Security Engineer.
BUILDING A SECURE STANDARD LIBRARY Information Assurance Project I MN Tajuddin hj. Tappe Supervisor Mdm. Rasimah Che Mohd Yusoff ASP.NET TECHNOLOGY.
Glass Box Testing: Thinking Inside the Box Omri Weisman Manager, Security Research Group IBM Rational.
OWASP Mobile Top 10 Why They Matter and What We Can Do
Workshop 3 Web Application Security Li Weichao March
OWASP Zed Attack Proxy Project Lead
The OWASP Way Understanding the OWASP Vision and the Top Ten.
Security testing of study information system Security team: Matis Alliksoo Alo Konno Urmo Lihten Taavi Podzuks Sander Saarm.
Ryan Dewhurst - 20th March 2012 Web Application (PHP) Security.
Copyright 2007 © The OWASP Foundation Permission is granted to copy, distribute and/or modify this document under the terms of the OWASP License. The OWASP.
Web Application Security ECE ECE Internetwork Security What is a Web Application? An application generally comprised of a collection of scripts.
CSCE 522 Lecture 12 Program Security Malicious Code.
WWW 安全 國立暨南國際大學 資訊管理學系 陳彥錚. WWW 安全 Web security is important for E-Commerce. Previous studies: –SSL –SET –Web server security Application-level security.
OWASP Cambridge 2 nd December Agenda Networking, food and refreshments Welcome Colin Watson Global Application Security Survey & Benchmarking John.
OWASP Top 10 from a developer’s perspective John Wilander, OWASP/Omegapoint, IBWAS’10.
Copyright © The OWASP Foundation Permission is granted to copy, distribute and/or modify this document under the terms of the OWASP License. The OWASP.
Web Applications Testing By Jamie Rougvie Supported by.
Building Secure Web Applications With ASP.Net MVC.
OWASP OWASP top 10 - Agenda  Background  Risk based  Top 10 items 1 – 6  Live demo  Top 10 items 7 – 10  OWASP resources.
Deconstructing API Security
Securing Java Applications
COMP9321 Web Application Engineering Semester 2, 2015 Dr. Amin Beheshti Service Oriented Computing Group, CSE, UNSW Australia Week 9 1COMP9321, 15s2, Week.
CS526Topic 12: Web Security (2)1 Information Security CS 526 Topic 9 Web Security Part 2.
Mr. Justin “JET” Turner CSCI 3000 – Fall 2015 CRN Section A – TR 9:30-10:45 CRN – Section B – TR 5:30-6:45.
OWASP Building Secure Web Applications And the OWASP top 10 vulnerabilities.
Chapter 1 The Software Security Problem. Goals of this course Become aware of common pitfalls. Static Analysis and tools.
//ALPHA.1 OWASP Knoxville Application Security Then and Now. Make a Difference Now 2015 June 11 Phil Agcaoili.
Copyright © The OWASP Foundation This work is available under the Creative Commons SA 2.5 license The OWASP Foundation OWASP Denver February 2012.
OWASP London 4 th December Agenda Networking, food and refreshments Welcome Justin Clark Offensive OSINT Christian Martorella and Zigor Zumalde.
Ken De Souza KWSQA, April 2016 V. 1.0
The OWASP Foundation Copyright © The OWASP Foundation Permission is granted to copy, distribute and/or modify this document under.
Do not try any of the techniques discussed in this presentation on a system you do not own. It is illegal and you will get caught.
Page 1 Ethical Hacking by Douglas Williams. Page 2 Intro Attackers can potentially use many different paths through your application to do harm to your.
SECURE DEVELOPMENT. SEI CERT TOP 10 SECURE CODING PRACTICES Validate input Use strict compiler settings and resolve warnings Architect and design for.
Web Application Security
OWASP ASVS for NFTaaS in Financial Services
Web Application Vulnerabilities
An Introduction to Web Application Security
Security Autodesk DevDays rEvolution
Web Application Vulnerabilities, Detection Mechanisms, and Defenses
Securing Your Web Application in Azure with a WAF
TOPIC: Web Security (Part-4)
Canberra OWASP Chapter meeting
Vulnerability Chaining Every Low Issue Has its big impact
Penetration Testing following OWASP
Finding and Fighting the Causes of Insecure Applications
Relevance of the OWASP Top 10
Intro to Ethical Hacking
1. ASSOCILATE DEGREE PROGRAM Application Attacks SUBMITTED TO: Fatima Ashiq SUBMITTED By: University Of Central Punjab Farooq Sardar (V1F16ASOC0012) Adnan.
CompTIA Security+ Study Guide (SY0-501)
امنیت نرم‌افزارهای وب تقديم به پيشگاه مقدس امام عصر (عج) عباس نادری
Finding and Fighting the Causes of Insecure Applications
WWW安全 國立暨南國際大學 資訊管理學系 陳彥錚.
Presentation transcript:

Snakes and Ladders OWASP Newcastle 24 th November 2015

Web Risks th September p_Ten_Project

Well-Known List Top Ten Risks to Web Applications (2013) A1Injection A2Broken Authentication and Session Management A3Cross-Site Scripting (XSS) A4Insecure Direct Object References A5Security Misconfiguration A6Sensitive Data Exposure A7Missing Function Level Access Control A8Cross-Site Request Forgery (CSRF) A9Using Components with Known Vulnerabilities A10Unvalidated Redirects and Forwards

Proactive Controls Version 1 10 th March oactive_Controls (version 2 in progress, due end 2015)

A Better List Top Ten Proactive Controls Web Applications C1Parameterize Queries C2Encode Data C3Validate All Inputs C4Implement Appropriate Access Controls C5Establish Identity and Authentication Controls C6Protect Data and Privacy C7Implement Logging, Error Handling & Intrusion Detection C8Leverage Security Features of Frameworks and Libraries C9Include Security-Specific Requirements C10Design and Architect Security In

Too Much Text! Educate Move from risks to controls Make a game Learn Adobe Illustrator Christmas “cards”

Designs, Trademarks, Etc

Concept 10 snakes 10 ladders 100 squares

Flat Design

Web Applications: ES

Web Applications: ZH

Web Applications: DE

Mobile Apps: JA

Mobile Apps: EN

Relationships 1/3 Is the placement of snakes and ladders meaningful? Do nearby ladders fix adjacent snakes? No

Relationships 2/3 Top Ten Risks A1 Injection A2 Broken Authentication and Session Management A3 Cross-Site Scripting (XSS) A4 Insecure Direct Object References A5 Security Misconfiguration A6 Sensitive Data Exposure A7 Missing Function Level Access Control A8 Cross-Site Request Forgery (CSRF) A9 Using Components with Known Vulnerabilities A10 Unvalidated Redirects and Forwards Top Ten Proactive Controls C1 Parameterize Queries C2 Encode Data C3 Validate All Inputs C4 Implement Appropriate Access Controls C5 Establish Identity and Authentication Controls C6 Protect Data and Privacy C7 Implement Logging, Error Handling and Intrusion Detection C8 Leverage Security Features of Frameworks and Security Libraries C9 Include Security-Specific Requirements C10 Design and Architect Security In

Relationships 3/3 OWASP_Proactive_Controls#tab=Top_Ten_Mapping

Print Your Own Adobe PDF A2 print quality Adobe Illustrator Source Web Applications BR, DE, EN, ES, FR, JA, ZH Mobile Apps EN, JA

Twitter

From Lists to Threat Modelling Not just 10 issues Build security in from the start, and throughout processes In depth application security requirements

Staying in Touch Project page Mailing list Twitter (Web)(Mobile) Full world tour Singapore, Cambridge, London Docklands, London Shoreditch, Bristol, Amsterdam, San Francisco, Newcastle upon Tyne

Q&A