Open navigation menu
Close suggestions
Search
Search
en
Change Language
Upload
Sign in
Sign in
Download free for days
0 ratings
0% found this document useful (0 votes)
53 views
10 pages
Virtual Patching Cheatsheet
Virtual Patching Cheatsheet
Uploaded by
Rizki Kurniawan
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content,
claim it here
.
Available Formats
Download as PDF or read online on Scribd
Download
Save
Save Virtual Patching Cheatsheet For Later
Share
0%
0% found this document useful, undefined
0%
, undefined
Print
Embed
Report
0 ratings
0% found this document useful (0 votes)
53 views
10 pages
Virtual Patching Cheatsheet
Virtual Patching Cheatsheet
Uploaded by
Rizki Kurniawan
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content,
claim it here
.
Available Formats
Download as PDF or read online on Scribd
Carousel Previous
Carousel Next
Download
Save
Save Virtual Patching Cheatsheet For Later
Share
0%
0% found this document useful, undefined
0%
, undefined
Print
Embed
Report
Download
Save Virtual Patching Cheatsheet For Later
You are on page 1
/ 10
Search
Fullscreen
9128122, 857 AM ‘Virtual Patching - OWASP Cheat Sheet Series Virtual Patching Cheat Sheet Introduction ‘The goal with this cheat Sheet is to present a concise virtual patching framework that organizations can follow to maximize the timely implementation of mitigation protections. Definition: Virtual Patching A security policy enforcement layer which prevents and reports the exploitation attempt of a known vulnerability. ‘The virtual patch works when the security enforcement layer analyzes transactions and intercepts attacks in transit, so malicious traffic never reaches the web application. The resulting impact of virtual patching is that, while the actual source code of the application itself has not been modified, the exploitation attempt does not succeed Why Not Just Fix the Code From a purely technical perspective, the number one remediation strategy would be for an organization to correct the identified vulnerability within the source code of the web application. This concept is universally agreed upon by both web application security experts and system owners. Unfortunately, in real world business situations, there arise many scenarios where Updating the source code of a web application is not easy such as: + Lack of resources - Devs are already allocated to other projects. + Third-party Software - Code can not be modified by the user. + Outsourced App Dev - Changes would require a new project ‘The important point is this - Code level fixes and Virtual Patching are NOT mutually exclusive. They are processes that are executed by different team (OWASP Builders/Devs vs. OWASP Defenders/OpSec) and can be run in tandem. Value of Virtual Patching Intps:ifeheatshectseries.owasp.orgicheatsheets/Virual Patching_Cheat_Sheethtml ato9128122, 857 AM ‘Virtual Patching - OWASP Cheat Sheet Series The two main goals of Virtual Patching are: ‘+ Minimize Time-to-Fix - Fixing application source code takes time. The main purpose of a Virtual patch is to implement a mitigation for the identified vulnerability as soon as possible. The urgency of this response may be different: for example if the vulnerability was identified in- house through code reviews or penetration testing vs. finding a vulnerability as part of live incident response. ‘+ Attack Surface Reduction - Focus on minimizing the attack vector. In some cases, such as missing positive security input validation, it is possible to achieve 100% attack surface reduction. In other cases, such with missing output encoding for XSS flaws, you may only be able to limit the exposures. Keep in mind - 50% reduction in 10 minutes is better than 100% reduction in 48 hrs. Virtual Patching Tools Notice that the definition above did not list any specific tool as there are a number of different options that may be used for virtual patching efforts such as: ‘+ Intermediary devices such as a WAF or IPS appliance + Web server plugin such as ModSecurity ‘+ Application layer filter such as ESAPI WAF For example purposes, we will show virtual patching examples using the open source ModSecurity WAF tool. A Virtual Patching Methodology Virtual Patching, ke most ather security processes, is nct something that should be approached haphazardly. Instead, a consistent, repeatable process should be followed that will provide the best chances of success. The following virtual patching workflow mimics the industry accepted practice for conducting IT Incident Response and consists of the following phases: 1. Preparation, 2. Identification. 3. Analysis. 4, Virtual Patch Creation. 5. Implementation Testi Intps:ifeheatshectseries.owasp.orgicheatsheets/Virual Patching_Cheat_Sheethtml 2109128122, 857 AM ‘Virtual Patching - OWASP Cheat Sheet Series 6. Reccvery/Follew Up. Example Public Vulnerability Lets take the following SQL Injection vulnerability as our example for the remainder of this article: WordPress Shopping Cart Plugin for WordPress Ip content /plugins/levelfourstorefront/scripts/administration/exportsubscribers.php reqlD Parameter prone to SQL Injection Description: WordPress Shopping Cart Plugin for WordPress contains a flaw that may allow an zttacker to camy out an SQL injection attack. The issue is due to the /wp- content plugins /Level fourstorefront/scripts/administration/exportsubscribers.php ‘script not properly sanitizing user-supplied input to the reqID parameter. This may allow an attacker to inject or manipulate SQL queries in the back-end database, allowing for the manipulation or disclosure of arbitrary data. Preparation Phase ‘The importance of properly utilizing the preparation phase with regards to virtual patching cannot be overstated. You need to do a number of things to setup the virtual patching processes and framework prior to actually having to deal with an identified vulnerability, or worse yet, react toa live web application intrusion. The point is that during a live compromise is not the ideal time to be proposing installation of a web application firewall and the concept of a virtual patch. Tension is high during real incidents and time is of the essence, so lay the foundation of virtual patching when the waters are calm and get everything in place and ready to go when an incident does occur. Here are a few critical items that should be addressed during the preparation phase: ~ Ensure that you are signed up for all vendor alert maihlists for commercial software that you are using. This will ensure that you will be notified in the event that the vendor releases vulnerability information and patching data. + Virtual Patching Pre-Authorization ~ Virtual Patches need to be implemented quickly so the normal governance processes and authorizations steps for standard software patches need to be expedited. Since virtual patches are not actually modifying source code, they do not require Intps:ifeheatshectseries.owasp.orgicheatsheets/Virual Patching_Cheat_Sheethtml sito‘Virtual Patching - OWASP Cheat Sheet Series the same amount of regression testing as normal software patches. Categorizing virtual patches in the same group as Anti-Virus updates or Network IDS signatures helps to speed up the authorization process and minimize extended testing phases. + Deploy Virtual Patching Tool In Advance - As time is critical during incident response, it would be a poor time to have to get approvals to install new software. For instance, you can install ModSecurity WAF in embedded mode on your Apache servers, or an Apache reverse proxy server. The advantage with this deployment is that you can create fixes for non-Apache back: end servers. Even if you do not use ModSecurity under normal circumstances, itis best to have it “on deck" ready to be enabled if need be. + Increase HTTP Audit Logging - The standard Common Log Format (CLF) utilized by most web servers does not provide adequate data for conducting proper incident response. You need to have access to the following HTTP data: + Request URI (including QUERY_STRING) + Full Request Headers (including Cookies) + Full Request Body (POST payload) + Full Response Headers + Full Response Body Identification Phase The Identification Phase occurs when an organization becomes aware of a vulnerability within their web application. There are generally two different methods of identifying vulnerabilities: Proactive and Reactive Proactive Identification This ocours when an organization takes it upon themselves to assess their web security posture and conducts the following tasks: ‘+ Dynamic Application Assessments - Whitehat attackers conduct penetration tests or automated web assessment tools are run against the live web application to identify flaws. + Source code reviews - Whitehat attackers use manual/automated means to analyze the source code of the web application to identify flaws. Due to the fact that custom coded web applications are unique, these proactive identification tasks are extremely important as you are not able to rely upon third-party vulnerability notifications. Intps:ifeheatshectseries.owasp.orgicheatsheets/Virual Patching_Cheat_Sheethtml ano9128122, 857 AM ‘Virtual Patching - OWASP Cheat Sheet Series Reactive Identification ‘There are three main reactive methods for identifying vulherabilties: + Vendor contact (e.g. pre-waming) - Occurs when a vendor discloses a vulherability for commercial web application software that you are using, ExempleisMicrosoft’s Active Protections Program (MAPP) + Public disclosure - Public vulnerability disclosure for commercial/open source web application software that you are using. The threat level for public disclosure is increased as more people know about the vulnerability. ‘+ Security incident ~ This is the most urgent situation as the attack is active. In these situations, remediation must be immediate. Analysis Phase Here are the recommended steps to start the analysis phase: 1. Determine Virtual Patching Applicability - Virtual patching is ideally suited for injection-type flaws but may not provide an adequate level of attack surface reduction for other attack types or categories. Thorough analysis of the underlying flaw should be conducted to determine if the virtual patching tool has adequate detection logic capabilities. 2. Utilize Bug Tracking/Ticketing System - Enter the vulnerability information into a bug tracking system for tracking purposes and metrics. Recommend you use ticketing systems you already use such as Jira or you may use a specialized tool such as ThreadFix. 3, Verify the name of the vulnerability - This means that you need to have the proper public vulnerability identifier (such as CVE name/number) specified by the vulnerability announcement, vulnerability scan, etc. If the vulnerability is identified proactively rather than through public announcements, then you should assign your own unique identifier to each vulnerability. 4, Designate the impact level - It is always important to understand the level of criticality involved with a web vulnerability. Information leakages may not be treated in the same manner as an SQL Injection issue. 5. Specify which versions of software are impacted - You need to identify what versions of software are listed so that you can determine if the version(s) you have installed are affected 6. List what configuration is required to trigger the problem - Some vulnerabilities may only manifest themselves under certain configuration settings. Intps:ifeheatshectseries.owasp.orgicheatsheets/Virual Patching_Cheat_Sheethtml sito9128122, 857 AM ‘Virtual Patching - OWASP Cheat Sheet Series 7. List Proof of Concept (PoC) exploit code or payloads used during attacks/testing - Many vulnerability announcements have accompanying exploit code that shows how to demonstrate the vulnerability. If this data is available, make sure to download it for analysis. This will be Useful later on when both developing and testing the virtual patch, Virtual Patch Creation Phase ‘The process of creating an accurate virtual patch is bound by two main tenants: 1. No false posit ives - Do not ever block legitimate traffic under any circumstances. 2. No false negatives - Do not ever miss attacks, even when the attacker intentionally tries to evade detection. Care should be taken to attempt to minimize either of these two rules. It may not be possible to adhere 100% to each of these goals but remember that virtual patching is about Risk Reduction. It should be understood by business owners that while you are gaining the advantage of shortening the Time-to-Fix metric, you may not be implementing a complete fix for the flaw. Manual Virtual Patch Creation Positive Security (Allow List) Virtual Patches (Recommended Solution) Positive security model (allow list) is a comprehensive security mechanism that provides an independent input validation envelope to an application. The model specifies the characteristics of valid input (character set, length, etc..) and denies anything that does not conform. By defining rules for every parameter in every page in the application the application is protected by an additional security envelop independent from its code. EXAMPLE ALLOW LIST MODSECURITY VIRTUAL PATCH In order to create an allow-list virtual patch, you must be able to verify what the normal, expected input values are. If you have implemented proper audit logging as part of the Preparation Phase, then you should be able to review audit logs to identify the format of expected input types. In this case, the reql0 parameter is supposed to only hold integer characters so we can use this virtual patch: ” ## Verify we only receive 1 parameter called "regiD SecRule REQUEST_URE "contains /wp- content /plugins/levelfourstorefront/scripts/adninistration/exportsubscribers php" “chain, id:1, phase:2, t:none, t:Utf8toUnicode, t:urlDecodeUni, t :normalizePathWin, t: lone Intps:ifeheatshectseries.owasp.orgicheatsheets/Virual Patching_Cheat_Sheethtml eto9128122, 857 AM ‘Virtual Patching - OWASP Cheat Sheet Series Validation Error for \‘reqID\' paramet Seen." logdata: "s{natched_var}'" SecRule GARGS: /reqID/ "!Beq 1" ~ Duplicate Parameters Nanes “ #4 Verify reqID's payload only contains integers 1 SecRule REQUEST_URT "@contains /wp- content /plugins/levelfourstorefront/scripts/adninistration/exportsubscribers php" “chain, id:2, phase:2, t:none, t:Utf8toUnicode, t:urlDecodeUni, t:normalizePathWin, t: lone Validation Error for \'reqID\' parameter.’ logdata: "%{args.reqid)' SecRule ARGS:/reqID/ “lerx *[@-9]+8" This virtual patch will inspect the rego parameter value on the specified page and prevent any characters other than integers as input. ‘* Note- You shouldmake sure to assign rule IDs properly andtrack them in the bug tracking system, '* Caution: There are numerous evasion vectors when creating virtual patches. Please consult the OWASP Best Practices: Virtual Patching document for a more thorough discussion on countering evasion methods. Negative Security (Block List) Virtual Patches: Anegative security mode! (block list) is based on a set of rules that detect specific known attacks rather than allow only valid traffic. [EXAMPLE BLOCK LIST MODSEOURTY VIRTUAL PATCH. Hereis the example PoC code that was supplied by the public advisory: http: //localhost/wordpress/wp- content /plugins/levelfourstorefront/scripts/adninistration/exportsubscribers.php? reqID=1" or 1="1 Looking at the payload, we can see that the attacker is inserting a single quote character and then adding additional SQL query logicto the end. Based on this deta, we could disallow the single quote character ike this: SecRule REQUEST_URI “@contains /wp- content /plugins/levelfourstorefront/scripts/administration/exportsubscribers.ahp' chain, id:1, phase:2, tnone, t:Utf8toUnicode, t:ur1DecodeUni, t:normalizePathWin, t:1owe Validation Error for \'reqID\' parameter.’ , logdata:'%{args.reaid) SecRule ARGS: /reqID/ “Spm Which Methodis Better for Virtual Patching ~ Positive or Negative Security Intps:ifeheatshectseries.owasp.orgicheatsheets/Virual Patching_Cheat_Sheethtml m09128122, 857 AM ‘Virtual Patching - OWASP Cheat Sheet Series A virtual patch may employ either a positive or negative security model. Which one you decide to use depends on the situation and a few different considerations. For example, negative security rules can usually be implemented more quickly, however the possible evasions are more likely. Positive security rules, only the other hand, provides better protection however itis often a manual process and thus is not scalable and difficult to maintain for large/dynamic sites. While manual positive security rules for an entire site may not be feasible, a positive security model can be selectively employed when a vulnerability alert identifies a specific location with a problem. Beware of Exploit-Specific Virtual Patches You want to resist the urge to take the easy road and quickly create an exploit-specific virtual patch For instance, if an authorized penetration test identified an XSS vulnerability on a page and used the following attack payload in the report It would not be wise to implement a virtual patch that simply blocks that exact payload. While it may provide some immediate protection, its long term value Is significantly decreased, Automated Virtual Patch Creation Manual patch creation may become unfeasible as the number of vulnerabilities grow and automated means may become necessary. If the vulnerabilities were identified using automated tools and an XML report is available, itis possible to leverage automated processes to auto- convert this vulnerability data into virtual patches for protection systems. Three examples include: + OWASP ModSecurity Core Rule Set (CRS) Scripts - The OWASP CRS includes scripts to auto- convert XML output from tools such as [OWASP ZAP into ModSecurity Virtual Patches]. Reference here, ‘+ ThreadFix Virtual Patching - ThreadFix also includes automated processes cf converting imported vuherability XML data into virtual patches for security tools such as ModSecurity.. Reference here. ‘+ Ditect Importing to WAF Device - Many commercial WAF products have the capability to import DAST tool XML report data and automatically adjust their prctection prcfiles. Intps:ifeheatshectseries.owasp.orgicheatsheets/Virual Patching_Cheat_Sheethtml ano9128122, 857 AM ‘Virtual Patching - OWASP Cheat Sheet Series Implementation/Testing Phase In orderto accurately test out thenewly created virtual patches, it may be necessary touse an application other than @ web browser. Some useful ools are: + Webbrowser. + Command-line web clients such as Curl and Woet. + Local Proxy Servers such as OWASP ZAP, + ModSecurity AuditViewer ~ which allows you to load a ModSecurity audit og file, manipulate it and then re-inject the data back into any web server. Testing Steps + Implement virtual patches initially in a "Log Only” configuration to ensure that you do not block any normal user traffic (false positives) ‘+ If the vulnerability was identified by a specific tool or assessment team - request a retest. + If retesting fails due to evasions, then you must go back to the Analysis phase to identify how to better fix the issue. Recovery/Follow-Up Phase ‘+ Update Data in Ticket System - Although you may need to expedite the implementation of virtual patches, you should still track them in your normal Patch Management processes. This means that you should create proper change request tickets, etc... so that their existence and functionality is documented. Updating the ticket system also helps to identify “time-to-fix’ metrics for different vulnerability types. Make sure to properly log the virtual patch rule ID values. + Periodic Re-assessments - You should also have periodic re-assessments to verify if/when you can remove previous virtual patches if the web application code has been updated with the real source code fix. | have found that many people opt to keep virtual patches in place due to better identification/logging vs. application or db capabilities. ‘+ Running Virtual Patch Alert Reports - Run reports to identify if/when any of your virtual patches have triggered. This will show value for virtual patching in relation to windows of exposure for source code time-to-ix. References Intps:ifeheatshectseries.owasp.orgicheatsheets/Virual Patching_Cheat_Sheethtml onto‘Virtual Patching - OWASP Cheat Sheet Series © OWASP Virtual Patching Best Practices. ‘+ OWASP Securing WebGoat with ModSecurity. Intps:ifeheatshectseries.owasp.orgicheatsheets/Virual Patching_Cheat_Sheethtml
You might also like
TLS Cipher String Cheatsheet
PDF
0% (1)
TLS Cipher String Cheatsheet
2 pages
OWASP Vulnerability Management Guide
PDF
No ratings yet
OWASP Vulnerability Management Guide
20 pages
Patch Management Best Practices Guide
PDF
No ratings yet
Patch Management Best Practices Guide
15 pages
VAPT Module 2 Part 1
PDF
No ratings yet
VAPT Module 2 Part 1
36 pages
Bug Bounty For Beginners
PDF
No ratings yet
Bug Bounty For Beginners
24 pages
PHP Configuration Cheatsheet
PDF
No ratings yet
PHP Configuration Cheatsheet
3 pages
OWASP Vulnerability Management Guide (OVMG)
PDF
100% (1)
OWASP Vulnerability Management Guide (OVMG)
20 pages
Threat Modeling Cheatsheet
PDF
No ratings yet
Threat Modeling Cheatsheet
12 pages
Need For Vuln Management 1
PDF
No ratings yet
Need For Vuln Management 1
9 pages
Unit 4 - Vulnerability Assessment and Penetration Testing
PDF
No ratings yet
Unit 4 - Vulnerability Assessment and Penetration Testing
19 pages
Secret Management Cheatsheet
PDF
100% (1)
Secret Management Cheatsheet
22 pages
Laravel Cheatsheet
PDF
No ratings yet
Laravel Cheatsheet
13 pages
XML Security Cheatsheet
PDF
No ratings yet
XML Security Cheatsheet
22 pages
Session Management Cheatsheet
PDF
No ratings yet
Session Management Cheatsheet
20 pages
SQL Injection Prevention Cheatsheet
PDF
No ratings yet
SQL Injection Prevention Cheatsheet
14 pages
JSON Web Token Cheatsheet For Java
PDF
No ratings yet
JSON Web Token Cheatsheet For Java
14 pages
Exploit Development For Defense
PDF
No ratings yet
Exploit Development For Defense
15 pages
Third Party Javascript Management Cheatsheet
PDF
No ratings yet
Third Party Javascript Management Cheatsheet
11 pages
Injection Prevention Cheatsheet
PDF
No ratings yet
Injection Prevention Cheatsheet
11 pages
Xss Prevention
PDF
No ratings yet
Xss Prevention
10 pages
Transport Layer Protection Cheatsheet
PDF
No ratings yet
Transport Layer Protection Cheatsheet
9 pages
Input Validation Cheatsheet
PDF
No ratings yet
Input Validation Cheatsheet
9 pages
Pinning Cheat Sheet
PDF
No ratings yet
Pinning Cheat Sheet
8 pages
Mass Assignment Cheatsheet
PDF
No ratings yet
Mass Assignment Cheatsheet
7 pages
WP Vuln
PDF
No ratings yet
WP Vuln
58 pages
SAML Security Cheatsheet
PDF
No ratings yet
SAML Security Cheatsheet
6 pages
CySA+ Last Minute Review Guide (CS0-002) - 2021
PDF
100% (1)
CySA+ Last Minute Review Guide (CS0-002) - 2021
14 pages
Logging Vocabulary Cheatsheet
PDF
No ratings yet
Logging Vocabulary Cheatsheet
26 pages
Tabulinar, Thea Khamylle T.
PDF
No ratings yet
Tabulinar, Thea Khamylle T.
72 pages
XML External Entity Prevention Cheatsheet
PDF
No ratings yet
XML External Entity Prevention Cheatsheet
18 pages
REST Security Cheatsheet
PDF
No ratings yet
REST Security Cheatsheet
9 pages
Chapt. 7 Auditing Web Servers and Web Applications
PDF
No ratings yet
Chapt. 7 Auditing Web Servers and Web Applications
34 pages
Password Storage Cheatsheet
PDF
No ratings yet
Password Storage Cheatsheet
7 pages
Insecure Direct Object Reference
PDF
No ratings yet
Insecure Direct Object Reference
6 pages
Xss Filter Evasion Cheatsheet
PDF
No ratings yet
Xss Filter Evasion Cheatsheet
32 pages
Ruby On Rails Cheatsheet
PDF
No ratings yet
Ruby On Rails Cheatsheet
13 pages
Components With Known Vulnerabilities
PDF
No ratings yet
Components With Known Vulnerabilities
12 pages
Lec5-03 - Performing Security Assessments
PDF
No ratings yet
Lec5-03 - Performing Security Assessments
17 pages
Server Side Request Forgery Prevention Cheatsheet
PDF
No ratings yet
Server Side Request Forgery Prevention Cheatsheet
12 pages
Processunityseptember 2024 Vspptfinal 11722957560412
PDF
No ratings yet
Processunityseptember 2024 Vspptfinal 11722957560412
42 pages
Lesson 1 ITWS04
PDF
No ratings yet
Lesson 1 ITWS04
33 pages
06 Vulnerable and Outdated Components OWASP Top 10
PDF
No ratings yet
06 Vulnerable and Outdated Components OWASP Top 10
20 pages
Chapter 5 Cyber Solutions Part 2
PDF
No ratings yet
Chapter 5 Cyber Solutions Part 2
10 pages
Nodejs Security Cheatsheet
PDF
No ratings yet
Nodejs Security Cheatsheet
18 pages
Key Takeaways
PDF
No ratings yet
Key Takeaways
72 pages
Paper 164
PDF
No ratings yet
Paper 164
7 pages
Security+Vulnerabilities Study+Notes Cyvitrix
PDF
No ratings yet
Security+Vulnerabilities Study+Notes Cyvitrix
4 pages
Security Patch Management
PDF
No ratings yet
Security Patch Management
79 pages
Ashis Das Vulnerability Management Patch Presentation V2 PDF
PDF
No ratings yet
Ashis Das Vulnerability Management Patch Presentation V2 PDF
69 pages
Black Hat Hacking Part 1
PDF
No ratings yet
Black Hat Hacking Part 1
22 pages
Deep Dive Into Stageless Meterpreter Payloads - Rapid7 Blog
PDF
No ratings yet
Deep Dive Into Stageless Meterpreter Payloads - Rapid7 Blog
1 page
Remote Exploitation
PDF
No ratings yet
Remote Exploitation
12 pages
Techboost Unit42 Ir Report
PDF
No ratings yet
Techboost Unit42 Ir Report
36 pages
Security Vulnerability Response
PDF
No ratings yet
Security Vulnerability Response
5 pages
Can Vendors Ever Provide Secure Solutions? (HITB 2015) Version 2 2
PDF
100% (1)
Can Vendors Ever Provide Secure Solutions? (HITB 2015) Version 2 2
27 pages
Task4 CristianAlmanzar
PDF
No ratings yet
Task4 CristianAlmanzar
20 pages
Life On The Endpoint Edge
PDF
No ratings yet
Life On The Endpoint Edge
17 pages
@ACME Company Threat Assessment - Edited.edited
PDF
No ratings yet
@ACME Company Threat Assessment - Edited.edited
10 pages
EHDF Module 2
PDF
No ratings yet
EHDF Module 2
37 pages
What Is Vulnerability
PDF
No ratings yet
What Is Vulnerability
33 pages
Owasp Final
PDF
No ratings yet
Owasp Final
131 pages
PTC - Interview Questions On Vulnerability Assessment 1
PDF
No ratings yet
PTC - Interview Questions On Vulnerability Assessment 1
20 pages
CYBER SECURITY USING PYTHON Sysnosis
PDF
No ratings yet
CYBER SECURITY USING PYTHON Sysnosis
8 pages
Introduction To WASP
PDF
No ratings yet
Introduction To WASP
44 pages
OWASP - Top 6 and 7
PDF
No ratings yet
OWASP - Top 6 and 7
27 pages
PROJECT Yhills
PDF
No ratings yet
PROJECT Yhills
27 pages
Cyber Security VAPT v1.0 Published - Compressed
PDF
100% (3)
Cyber Security VAPT v1.0 Published - Compressed
29 pages
Understand OWASP Top 10 and How WAFs Mitigate Them Guide - 2023 - Guide
PDF
No ratings yet
Understand OWASP Top 10 and How WAFs Mitigate Them Guide - 2023 - Guide
1 page
08 Jan Palo Alto v2 82591
PDF
No ratings yet
08 Jan Palo Alto v2 82591
29 pages
OWASP Top Ten - OWASP Foundation
PDF
No ratings yet
OWASP Top Ten - OWASP Foundation
5 pages
Assessment
PDF
No ratings yet
Assessment
50 pages
Web Security Vulnerabilities
PDF
No ratings yet
Web Security Vulnerabilities
50 pages
IT Security Bulletin Canada
PDF
No ratings yet
IT Security Bulletin Canada
5 pages
03 - Web Application Penetration Testing
PDF
No ratings yet
03 - Web Application Penetration Testing
25 pages
OWASP Top10 Workshop
PDF
No ratings yet
OWASP Top10 Workshop
77 pages
Web Goat
PDF
No ratings yet
Web Goat
73 pages
OWASP Top 10 Vulnerabilities
PDF
No ratings yet
OWASP Top 10 Vulnerabilities
4 pages
3 Endpoint PDF
PDF
No ratings yet
3 Endpoint PDF
70 pages
Vulnerability Intelligence
PDF
No ratings yet
Vulnerability Intelligence
24 pages
Lab 13-1: Web Server Footprinting Using Tool
PDF
No ratings yet
Lab 13-1: Web Server Footprinting Using Tool
7 pages
Web Security: Vulnerability and Threats: Presented by Deepti Patole
PDF
No ratings yet
Web Security: Vulnerability and Threats: Presented by Deepti Patole
21 pages
Seguridad en Sistemas Operativos: Investigación
PDF
No ratings yet
Seguridad en Sistemas Operativos: Investigación
6 pages
The Shellcode Generation: Attack Trends
PDF
No ratings yet
The Shellcode Generation: Attack Trends
5 pages
How To Response Against Web Security Incident Signed
PDF
No ratings yet
How To Response Against Web Security Incident Signed
38 pages
Auditing and Securing Web Enabled Applications
PDF
No ratings yet
Auditing and Securing Web Enabled Applications
5 pages