Web Security: Vulnerability and Threats: Presented by Deepti Patole
Web Security: Vulnerability and Threats: Presented by Deepti Patole
Securing the custom code that drives a web application Securing libraries Securing backend systems Securing web and application servers
Network Security Mostly Ignores the Contents of Application Layer Traffic such as HTTP Traffic.
Protect vital information while still allowing access to those who need it Provide authentication and access control for resources Guarantee availability of resources
vulnerability
A vulnerability is a hole or a weakness in the application, which can be a design flaw or an implementation bug, that allows an attacker to cause harm to the stakeholders of an application.
Injection Cross-Site Scripting (XSS) Broken Authentication and Session Management Insecure Direct Object References Cross-Site Request Forgery (CSRF) Security Misconfiguration Insecure Cryptographic Storage Failure to Restrict URL Access Insufficient Transport Layer Protection Invalidated Redirects and Forwards
Who is vulnerable?
Financial institutions and banks Internet service providers Pharmaceutical companies Government and defense agencies Contractors to various government agencies Multinational corporations ANYONE ON THE NETWORK
Vulnerability Lifecycle
Since vulnerabilities are almost always associated with a particular software flaw, they are usually remediated via a software patch (or update).
Web Threat:
A web threat is any threat that uses the internet to facilitate cybercrime. Web threats use multiple types of malware and fraud, all of which utilize HTTP or HTTPS protocols, but may also employ other protocols and components, such as links in email, or malware attachments or on servers that access the Web.
They benefit cybercriminals by stealing information for subsequent sale and help absorb infected PCs into botnets.
Tampering
Deliberate alteration of a system's logic, data, or control information to interrupt or prevent correct operation of system functions.
Repudiation
A threat action whereby an entity deceives another by falsely denying responsibility for an act.
Elevation of privilege
a lower privilege user or application accesses functions or content reserved for higher privilege users or applications
DREAD
DREAD is a classification scheme used by microsoft for quantifying, comparing and prioritizing the amount of risk presented by each evaluated threat. Risk_DREAD = ( DAMAGE + REPRODUCIBILITY + EXPLOITABILITY + AFFECTED USERS + DISCOVERABILITY) / 5
The calculation always produces a number between 0 and 10; the higher the number, the more serious the risk.
DREAD (Cont..)
Damage Potential If a threat exploit occurs, how much damage will be caused?
10 = Complete system or data destruction 0 = Nothing; 5 = Individual user data is compromised or affected;
Reproducibility -
0 = Very hard or impossible, even for administrators of the application. 5 = One or two steps required, may need to be an authorized user. 10 = Just a web browser and the address bar is sufficient, without authentication.
Exploitability-
0 = Advanced programming and networking knowledge, with advanced attack tools. 5 = Malware exists on the Internet, or an exploit is easily performed, using available tools. 10 = Just a web browser
Discoverability-
0 = Very hard to impossible; requires source code or administrative access. 5 = Can figure it out by guessing or by monitoring network traces. 9 = Details of faults like this are already in the public domain and can be easily discovered using a search engine. 10 = The information is visible in the web browser address bar or in a form.
Threat Graph
Attacker may be able to read other users information
User may not have Data Validation Authorization may logged off on a fail, allowing Allowing Fail may shared Computer SQL injection unauthorized Access
Implement Data Implement Implement Anti Validation Authorization caching HTTP Checks Headers
In September 2008, malicious hackers broke into several sections of BusinessWeek.com to redirect visitors to malware-hosting websites. Hundreds of pages were compromised with malicious JavaScript pointing to thirdparty servers.
In August 2008, popular social networking sites were hit by a worm using social engineering techniques to get users to install a piece of malware. The worm installs comments on the sites with links to a fake site. If users follow the link, they are told they need to update their Flash Player. The installer then installs malware rather than the Flash Player. The malware then downloads a rogue anti-spyware application, AntiSpy Spider.
Conclusion
Organizations need to be aware that old threats never actually retire from the digital landscape. Rather, they tend to become background noise on the Internet ready to burst into life with each new software update, host recovery, device deployment or embedded system release. At the same time educating the developers and users in the context of security against continuously upcoming threats.
References
Cryptography and Network Security, Priciples and Practices: William Stallings( Pearson Education) http://www.technicalinfo.net/papers/OldThreats.html https://www.owasp.org/index.php/Threat_Risk_Mod eling https://www.owasp.org/index.php/Category:Attack msdn.microsoft.com/en-us/library/ff648644.aspx http://www.m86security.com/labs/glossary.asp
Thank you