Sast, Dast and Vulnerability Assessments, 1+1+1 4: Gordon Mackay
Sast, Dast and Vulnerability Assessments, 1+1+1 4: Gordon Mackay
Sast, Dast and Vulnerability Assessments, 1+1+1 4: Gordon Mackay
1+1+1 = 4
Gordon MacKay
Digital Defense, Inc.
Chris Wysopal
Veracode
AGENDA
WHAT IS RISK?
Risk is Relative to an Entity
Risk Involves
An Entity with a Goal Something to Gain/Lose
An Entity with Weaknesses/Disadvantages
An Environment Capable of Taking Advantage of Weaknesses
Scanner
EVA
IVA
Internet
Scanner
Authenticated
Client Network
Endpoint Exposure
Identify
Portfolio
Assess
Vulnerabilities
Manage
Risk
ASSESS VULNERABILITIES
Understand vulnerabilities in your application portfolio
Leverage automated analysis techniques
Static and dynamic scanning
Engage third-party vendors and service providers
Automated
Static
Penetration
Testing
Automated
Dynamic
STATIC ANALYSIS
Analysis of software performed
without actually executing the
program
DYNAMIC ANALYSIS
Analysis of software performed against
a running instance of the program
Mimics how an attacker would attack
the application
Discovering vulnerabilities can take
longer and coverage may be limited
Exposes vulnerabilities in the
deployment environment
Vulnerability
Management
Application
Assessments
Assessments Performed
Veracode Static Analysis
Veracode Dynamic Analysis
Network Unauthenticated Vulnerability Assessment
Dynamic
21
Very High
OS Command Injection
High
SQL Injection
Medium
CRLF Injection
Credential Management
Cross-Site Scripting
117
Cryptographic Issues
Directory Traversal
10
Critical (Compromised)
NetBIOS Shares: Win32/Rorpian Infected Files
High Risk Vulnerabilities
MS12-020 Remote Desktop Protocol Use-After-Free
Combined Coverage
DDI scans the attack surface exposed by the Ssh,
telnet, and tomcat processes as well as Windows XP
Veracode scans the attack surface exposed by the
WebGoat application
Ssh
Telnet
DDI
Tomcat
WebGoat
Windows XP
Veracode
Summary
Vulnerability scanning should include both host layer and
application layer
Vulnerability Silos impede understanding of overall
security risk
Map application layer vulnerabilities and host
vulnerabilities over infrastructure to gain risk insight
Come talk to us to find out our future research plans in
this area.
QUESTIONS?
Contact
Gordon MacKay, Digital Defense Inc.
[email protected]
@gord_mackay