Security Mis-Config Introduction
Security Mis-Config Introduction
Tariqul Islam
IT 6873 Information security seminar
Application
applications.
Misconfiguration
OWASP Ranking
Impact
Can be severe.
Partial or full data loss.
Data modification.
Compromise of full system.
Expensive recovery.
Statistics
Default
Examples:
Revealing
Role
This
causes groups or roles to access settings or records that were not intended for
them. There are many reasons for role misconfigurations.
Complex
Human
mistakes are frequent and unavoidable and can account for up to 43% of all
system failures.
Operator
error is the main reason for downtime for large websites, such as Google,
MSN, and Yahoo. Proper interfaces and good design can drastically reduce operator
mistakes.
Poorly
designed application interfaces and too tight restriction may force user to
attempt or bypass security then they need to accomplish a goal.
Where?
How?:Hidden manipulation
Often
used to save users session without the need to maintain a complex database
on the server side.
In
Once
How?:Parameter Tampering
Based
hacked web application acts according to the modified information and allows
access to the users data. Example: Arbitrarily manipulating users selection from a
field values, such as; check box or combo box.
How?:Cookie poisoning
Act
are common elements in web applications and their usage involves saving
information for instance; user ID, account numbers, time stamp, passwords, etc. The
saved information is stored in the users hard drive.
Cookies
How?:Stealth commanding
Is
targets are server-side includes, parsed scripts, code that appears to take input
and turn it into OS commands, and anything that takes parameters and turns them into
parsed protocols.
How?:Forced browsing
An
attack where the aim is to enumerate and access resources that are not referenced
by the application, but are still accessible.
Attacker
can use Brute Force techniques to search for unlinked contents in the
domain directory, such as temporary directories and files, and old backup and
configuration files.
Inadequate
Applications
contain code left for debugging purposes, and some even contain code
left by disgruntled employees.
Debug
options comprise entry points that allows a hacker access to the application.
Backdoors
Am I at risk?
Is
Attention to detail .
Each component should be checked and verified.
Turn off unsafe features.
Remove default accounts and expire default passwords.
Stress testing.
Penetration testing.
Both automatic and manual testing.
Summary
Risk:
Dos :
Follow up Questions?
Do you like default or custom application installation? Please explain why or why
not?
References:
Whitelegg, D. (2014, June 17). Scan your app to find and fix OWASP Top 10 2013 vulnerabilities.
Retrieved September 17, 2014, from
http://www.ibm.com/developerworks/library/se-owasp-top10/index.html
Auger, R. (2010, January 1). Application Misconfiguration. Retrieved September 15, 2014, from
http://projects.webappsec.org/w/page/13246914/Application Misconfiguration
Henneberger, D. (2012, January 1). Misconfiguration of Web Applications: A View of Security. Retrieved
September 15, 2014, from http://danielhenneberger.com/dist/papers/misconfiguration.pdf
How Misconfiguration Can Leave You Vulnerable to Attackers - Calavista Software. (2014, January 1).
Retrieved September 22, 2014, from
http://www.calavista.com/misconfiguration-can-leave-vulnerable-attackers/
Pasho, A. (2011, June 22). Is Your Web Site or App Secure? Avoiding Security Misconfiguration.
Retrieved September 20, 2014, from
http://blog.makingsense.com/2011/06/is-your-web-site-or-app-secure-avoiding-security-misconfiguration/
References:
Kerner, S. (2014, February 3). App Misconfiguration, Mobile Apps With Poor Encryption Pose Risks, HP.
Retrieved September 23, 2014, from
http://www.eweek.com/security/app-misconfiguration-mobile-apps-with-poor-encryption-pose-risks-hp.ht
ml
Misconfigurations: The Firewalls Greatest Threat. (2012, December 3). Retrieved September 24, 2014,
from http://www.firemon.com/blog/firewall-management/misconfigurations-the-firewalls-greatest-threat
Weldermariam, K. (2014, January 1). Early Detection of Security Misconfiguration Vulnerabilities in Web
Applications. Retrieved September 25, 2014, from
http://www.academia.edu/2719069/Early_Detection_of_Security_Misconfiguration_Vulnerabilities_in_W
eb_Applications
Brady, P. (2014, January 1). PHP Security: Default Vulnerabilities, Security Omissions and Framing
Programmers?. Retrieved September 25, 2014, from
http://phpsecurity.readthedocs.org/en/latest/_articles/PHP-Security-Default-Vulnerabilities-Security-O
missions-And-Framing-Programmers.html
References:
Reshef, E. (n.d.). Internet Application Security. Retrieved September 29, 2014, from
http://www.cgisecurity.com/lib/IAS.pdf
Behringer, M. (n.d.). Understanding Operational Security. Retrieved September 24, 2014, from
http://www.cisco.com/web/about/security/intelligence/opsecurity.html
Cookie Poisoning | Hacker4Lease. (2012, January 1). Retrieved October 1, 2014, from
http://www.hacker4lease.com/attack-methods/cookie-poisoning/
Top 10 2013-A5-Security Misconfiguration. (2013, June 23). Retrieved September 14, 2014, from
https://www.owasp.org/index.php/Top_10_2013-A5-Security_Misconfiguration