SlideShare a Scribd company logo
Web application security – war
stories from real penetration
testing engagements
Didzis Balodis, CISSP, GPEN
Lead of security and infrastrucure division
Contents
Didzis Balodis
• Lead of DPA Securituy and Infrastructure division
• More than 10 years in IT (from year 1999)
• System administration, development, security
• Last 5 years – IT consulting, audits, security, penetration testing (more
than 50 engagements)
• Hobby - wifi hacking
• Certifications:
• CISSP- Certified Information System Security Professional
• GPEN – GIAC Certified Penetration Tester
DPA security portfolio
IT audit and security testing:
Network pentests
Wireless network assessment
Web application security testing
Social engineering
Compliance
Security awareness trainings
Statistics
of web aplications contain at least
High risk vulnerability
Injections on the rise
ENISA Threat Landscape 2013 report:
«....Cross-Site Scripting (XSS), Directory Traversal, SQL injection
(SQLi) and Cross-Site Request Forgery (CSRF).
... injection attacks are on sharp rise.»
It`s easy...
Statistics:
OWASP TOP 10
A1- Injection (SQL, LDAP, SMTP, XML...) A2-Broken Authentication and Session
Management
A3-Cross-Site Scripting (XSS) A4-Insecure Direct Object References
A5-Security Misconfiguration A6-Sensitive Data Exposure
A7-Missing Function Level Access Control A8-Cross-Site Request Forgery (CSRF)
A9-Using Components with Known Vulnerabilities A10-Unvalidated Redirects and Forwards
Consequences..
Stolen or
published client
data
Leakage of internal
company
information
Loss of reputation
Compliance and
legal issues
(Personal data
protection)
System downtime Financial losses
Example 1
Example 2
Example 3
Example 4
DEMO TIME
SQLi
http://somesystem.lv/ gettextLang=0&usr_login=login
KWgn&usr_password=aaa&sendpost=PieslÄgties sistÄmai
' AND (SELECT 4747 FROM
(SELECT COUNT(*),CONCAT(0x3a76796a3a,
(SELECT (CASE WHEN (4747=4747) THEN 1 ELSE 0 END)),
0x3a787a693a,FLOOR(RAND(0)*2))x FROM
INFORMATION_SCHEMA.CHARACTER_SETS GROUP BY x)a)
AND 'KWgn'='KWgn&usr_password=aaa&sendpost=PieslÄgties sistÄmai
Insecure upload
Be proactive
To avoid unpleasnt surprise-
before someone else will do
How it is done
• Network layer
• App layer
Identification/
automated tests
• Injections
• Sessions
• Business logic,
etc
Manual testing
• DoS
• Report
• Re-tests
Finalizing
Recap
Questions?

More Related Content

PPTX
Web application firewall
PPTX
NK Butuan Presentaion
PPTX
Últimos retos en el ámbito de la Ciberseguridad: Análisis de amenazas Ciberné...
PDF
Custom defense - Blake final
PPTX
Wannacry & Petya ransomware
PPTX
Network security, seriously?
PPT
Nguyễn Tấn Vi - office of the CISO
PPTX
Navigating Cybersecurity
Web application firewall
NK Butuan Presentaion
Últimos retos en el ámbito de la Ciberseguridad: Análisis de amenazas Ciberné...
Custom defense - Blake final
Wannacry & Petya ransomware
Network security, seriously?
Nguyễn Tấn Vi - office of the CISO
Navigating Cybersecurity

What's hot (20)

PDF
No More SIlos: Connected Security - Mike Desai and Ryan Rowcliffe
PDF
Experience Sharing on School Pentest Project (Updated)
PPTX
Cyberthreats: causes, consequences, prevention
PPT
Safeguard your enterprise against ransomware
PDF
The importance of Cybersecurity
PPTX
Information Security Engineering
PPTX
VAPT - Vulnerability Assessment & Penetration Testing
PDF
Cyber Kill Chain Deck for General Audience
PDF
WannaCry Ransomware Attack: What to Do Now
PDF
Overview of the Cyber Kill Chain [TM]
PPTX
Webinar: Backup vs. Ransomware - 5 Requirements for Backup Success
PPTX
An introduction to Cyber Essentials
PDF
TIC-TOC: Ransomware: Help your Customers be Prepared with Dominique Singer an...
PPTX
2016 - Cyber Security for the Public Sector
PPTX
DC970 Presents: Defense in Depth
PPTX
Tonex Cybersecurity Fundamentals, Cybersecurity Training and Certification
PDF
Application Security | Application Security Tutorial | Cyber Security Certifi...
PDF
Cyber security report 2017 cisco 2017 acr_pdf
PDF
Cybersecurity Fundamentals | Understanding Cybersecurity Basics | Cybersecuri...
PPTX
Outpost24 webinar: The state of ransomware in 2021 and how to limit your expo...
No More SIlos: Connected Security - Mike Desai and Ryan Rowcliffe
Experience Sharing on School Pentest Project (Updated)
Cyberthreats: causes, consequences, prevention
Safeguard your enterprise against ransomware
The importance of Cybersecurity
Information Security Engineering
VAPT - Vulnerability Assessment & Penetration Testing
Cyber Kill Chain Deck for General Audience
WannaCry Ransomware Attack: What to Do Now
Overview of the Cyber Kill Chain [TM]
Webinar: Backup vs. Ransomware - 5 Requirements for Backup Success
An introduction to Cyber Essentials
TIC-TOC: Ransomware: Help your Customers be Prepared with Dominique Singer an...
2016 - Cyber Security for the Public Sector
DC970 Presents: Defense in Depth
Tonex Cybersecurity Fundamentals, Cybersecurity Training and Certification
Application Security | Application Security Tutorial | Cyber Security Certifi...
Cyber security report 2017 cisco 2017 acr_pdf
Cybersecurity Fundamentals | Understanding Cybersecurity Basics | Cybersecuri...
Outpost24 webinar: The state of ransomware in 2021 and how to limit your expo...
Ad

Viewers also liked (20)

PDF
Palfinger 2013 Interim Presentation
PDF
Áfonyát a kertbe - Dr. Ehrenberger
PDF
Windows Phone: Presente y futuro
PPS
Lo que importa_al_final_es_haber_amado
PDF
Xhibit Presentation
PPTX
Como llevar bien un tocado
DOCX
Herramientas de comunicación (Internet)
PDF
Industrieel Flugschrift Deutsch
PPTX
El uso de teledetección para conocer la precipitación de una zona montañosa. ...
PPTX
FUNDAMENTOS DE LAS HERRAMIENTAS WEB 2.0
PPT
Desarrollo Sostenible
PPTX
Preguntas de Refuerzo 3
PDF
Resultados examen 2015 profersores
PDF
Actividad u3 juan samilo sandoval
PDF
Presentacion
PDF
Biochimie structurale
PDF
Parte 1: Capítulo 4: Otras Dimensiones de la Densidad del Estado para el Desa...
DOC
Unidad 4 comercio electronico
Palfinger 2013 Interim Presentation
Áfonyát a kertbe - Dr. Ehrenberger
Windows Phone: Presente y futuro
Lo que importa_al_final_es_haber_amado
Xhibit Presentation
Como llevar bien un tocado
Herramientas de comunicación (Internet)
Industrieel Flugschrift Deutsch
El uso de teledetección para conocer la precipitación de una zona montañosa. ...
FUNDAMENTOS DE LAS HERRAMIENTAS WEB 2.0
Desarrollo Sostenible
Preguntas de Refuerzo 3
Resultados examen 2015 profersores
Actividad u3 juan samilo sandoval
Presentacion
Biochimie structurale
Parte 1: Capítulo 4: Otras Dimensiones de la Densidad del Estado para el Desa...
Unidad 4 comercio electronico
Ad

Similar to Didzis Balodis - Web application security – war stories from real penetration testing engagements (20)

PDF
Common Web Application Attacks
PDF
Web hackingtools 2015
PDF
Web hackingtools 2015
PDF
Problems with parameters b sides-msp
PDF
Become a Security Ninja
PPTX
Web Application Security
PPTX
How to Test for The OWASP Top Ten
PDF
Web hackingtools cf-summit2014
PPTX
OWASP top 10-2013
PDF
Secure software development presentation
PPTX
Web_Appication_Security_Training_For_Developers.pptx
PPT
Discovering the Value of Verifying Web Application Security Using IBM Rationa...
PDF
Solvay secure application layer v2015 seba
PPT
OWASP App Sec US - 2010
PPT
Web Apps Security
PDF
Alert logic anatomy owasp infographic
PPTX
Vulnerabilities in modern web applications
PDF
Web Security
PPTX
Owasp Indy Q2 2012 Cheat Sheet Overview
PDF
Security Firm Program - Corporate College
Common Web Application Attacks
Web hackingtools 2015
Web hackingtools 2015
Problems with parameters b sides-msp
Become a Security Ninja
Web Application Security
How to Test for The OWASP Top Ten
Web hackingtools cf-summit2014
OWASP top 10-2013
Secure software development presentation
Web_Appication_Security_Training_For_Developers.pptx
Discovering the Value of Verifying Web Application Security Using IBM Rationa...
Solvay secure application layer v2015 seba
OWASP App Sec US - 2010
Web Apps Security
Alert logic anatomy owasp infographic
Vulnerabilities in modern web applications
Web Security
Owasp Indy Q2 2012 Cheat Sheet Overview
Security Firm Program - Corporate College

More from DevConFu (20)

PDF
Hanno Jarvet - Agile is a bad strategy or 5 things every Agile practitioner s...
PDF
Wilko Nienhaus - continuous delivery release the right thing, done right, at ...
PDF
Gojko Adzic - Taking the business on the journey - ConFu
PPTX
Vasco Duarte - Agile Innovation - Product Management in turbulent times - ConFu
PDF
Hanno Jarvet - VSM, Planning and Problem Solving - ConFu
PDF
Andrey Adamovich - Enterprise flight into DevOps space - ConFu
PDF
Jina Bolton - in the search of the single source of truth
PDF
Jina bolton - Refactoring Web Interfaces
PDF
Hanno Jarvet - The Lean Toolkit – Value Stream Mapping and Problem Solving
PDF
Ivan Gaydamakin and Juri Tishko - ​3D Printing (workshop)
PDF
Robin Hawkes - Using OpenStreetMap and WebGL to create real-world cities in 3D
PPTX
Marion de Groot - Scrum and Specs
PDF
Allan Kelly - Dialogue Sheets for retrospectives and discussion
PDF
Robert Virkus - Playing with LEGO Mindstorms from your Mobile Phone
PPTX
Eduards Sizovs - Micro Service Architecture
ODP
Misha Beshkin - How to organize execution of tests on real Android devices
PDF
Jon Arne Sæterås - Give Responsive Design a mobile performance boost
PDF
Andrey Adamovich and Luciano Fiandesio - Groovy dev ops in the cloud
PDF
Patrick H. Lauke - Getting Touchy; an introduction to touch and pointer events
PDF
Allan Kelly - Do it right, then do the right thing
Hanno Jarvet - Agile is a bad strategy or 5 things every Agile practitioner s...
Wilko Nienhaus - continuous delivery release the right thing, done right, at ...
Gojko Adzic - Taking the business on the journey - ConFu
Vasco Duarte - Agile Innovation - Product Management in turbulent times - ConFu
Hanno Jarvet - VSM, Planning and Problem Solving - ConFu
Andrey Adamovich - Enterprise flight into DevOps space - ConFu
Jina Bolton - in the search of the single source of truth
Jina bolton - Refactoring Web Interfaces
Hanno Jarvet - The Lean Toolkit – Value Stream Mapping and Problem Solving
Ivan Gaydamakin and Juri Tishko - ​3D Printing (workshop)
Robin Hawkes - Using OpenStreetMap and WebGL to create real-world cities in 3D
Marion de Groot - Scrum and Specs
Allan Kelly - Dialogue Sheets for retrospectives and discussion
Robert Virkus - Playing with LEGO Mindstorms from your Mobile Phone
Eduards Sizovs - Micro Service Architecture
Misha Beshkin - How to organize execution of tests on real Android devices
Jon Arne Sæterås - Give Responsive Design a mobile performance boost
Andrey Adamovich and Luciano Fiandesio - Groovy dev ops in the cloud
Patrick H. Lauke - Getting Touchy; an introduction to touch and pointer events
Allan Kelly - Do it right, then do the right thing

Recently uploaded (20)

PDF
17 Powerful Integrations Your Next-Gen MLM Software Needs
PDF
How AI/LLM recommend to you ? GDG meetup 16 Aug by Fariman Guliev
PPTX
WiFi Honeypot Detecscfddssdffsedfseztor.pptx
PDF
Wondershare Filmora 15 Crack With Activation Key [2025
PPTX
Patient Appointment Booking in Odoo with online payment
PDF
Download FL Studio Crack Latest version 2025 ?
PDF
Salesforce Agentforce AI Implementation.pdf
PDF
Internet Downloader Manager (IDM) Crack 6.42 Build 42 Updates Latest 2025
PDF
Nekopoi APK 2025 free lastest update
DOCX
Greta — No-Code AI for Building Full-Stack Web & Mobile Apps
PDF
Product Update: Alluxio AI 3.7 Now with Sub-Millisecond Latency
PDF
AI-Powered Threat Modeling: The Future of Cybersecurity by Arun Kumar Elengov...
PDF
Design an Analysis of Algorithms I-SECS-1021-03
PDF
Designing Intelligence for the Shop Floor.pdf
PDF
iTop VPN 6.5.0 Crack + License Key 2025 (Premium Version)
PDF
CCleaner Pro 6.38.11537 Crack Final Latest Version 2025
PPTX
Why Generative AI is the Future of Content, Code & Creativity?
PDF
Navsoft: AI-Powered Business Solutions & Custom Software Development
PDF
How to Make Money in the Metaverse_ Top Strategies for Beginners.pdf
PPTX
Embracing Complexity in Serverless! GOTO Serverless Bengaluru
17 Powerful Integrations Your Next-Gen MLM Software Needs
How AI/LLM recommend to you ? GDG meetup 16 Aug by Fariman Guliev
WiFi Honeypot Detecscfddssdffsedfseztor.pptx
Wondershare Filmora 15 Crack With Activation Key [2025
Patient Appointment Booking in Odoo with online payment
Download FL Studio Crack Latest version 2025 ?
Salesforce Agentforce AI Implementation.pdf
Internet Downloader Manager (IDM) Crack 6.42 Build 42 Updates Latest 2025
Nekopoi APK 2025 free lastest update
Greta — No-Code AI for Building Full-Stack Web & Mobile Apps
Product Update: Alluxio AI 3.7 Now with Sub-Millisecond Latency
AI-Powered Threat Modeling: The Future of Cybersecurity by Arun Kumar Elengov...
Design an Analysis of Algorithms I-SECS-1021-03
Designing Intelligence for the Shop Floor.pdf
iTop VPN 6.5.0 Crack + License Key 2025 (Premium Version)
CCleaner Pro 6.38.11537 Crack Final Latest Version 2025
Why Generative AI is the Future of Content, Code & Creativity?
Navsoft: AI-Powered Business Solutions & Custom Software Development
How to Make Money in the Metaverse_ Top Strategies for Beginners.pdf
Embracing Complexity in Serverless! GOTO Serverless Bengaluru

Didzis Balodis - Web application security – war stories from real penetration testing engagements

  • 1. Web application security – war stories from real penetration testing engagements Didzis Balodis, CISSP, GPEN Lead of security and infrastrucure division
  • 3. Didzis Balodis • Lead of DPA Securituy and Infrastructure division • More than 10 years in IT (from year 1999) • System administration, development, security • Last 5 years – IT consulting, audits, security, penetration testing (more than 50 engagements) • Hobby - wifi hacking • Certifications: • CISSP- Certified Information System Security Professional • GPEN – GIAC Certified Penetration Tester
  • 4. DPA security portfolio IT audit and security testing: Network pentests Wireless network assessment Web application security testing Social engineering Compliance Security awareness trainings
  • 5. Statistics of web aplications contain at least High risk vulnerability
  • 6. Injections on the rise ENISA Threat Landscape 2013 report: «....Cross-Site Scripting (XSS), Directory Traversal, SQL injection (SQLi) and Cross-Site Request Forgery (CSRF). ... injection attacks are on sharp rise.»
  • 8. OWASP TOP 10 A1- Injection (SQL, LDAP, SMTP, XML...) A2-Broken Authentication and Session Management A3-Cross-Site Scripting (XSS) A4-Insecure Direct Object References A5-Security Misconfiguration A6-Sensitive Data Exposure A7-Missing Function Level Access Control A8-Cross-Site Request Forgery (CSRF) A9-Using Components with Known Vulnerabilities A10-Unvalidated Redirects and Forwards
  • 9. Consequences.. Stolen or published client data Leakage of internal company information Loss of reputation Compliance and legal issues (Personal data protection) System downtime Financial losses
  • 15. SQLi http://somesystem.lv/ gettextLang=0&usr_login=login KWgn&usr_password=aaa&sendpost=PieslÄgties sistÄmai ' AND (SELECT 4747 FROM (SELECT COUNT(*),CONCAT(0x3a76796a3a, (SELECT (CASE WHEN (4747=4747) THEN 1 ELSE 0 END)), 0x3a787a693a,FLOOR(RAND(0)*2))x FROM INFORMATION_SCHEMA.CHARACTER_SETS GROUP BY x)a) AND 'KWgn'='KWgn&usr_password=aaa&sendpost=PieslÄgties sistÄmai
  • 17. Be proactive To avoid unpleasnt surprise- before someone else will do
  • 18. How it is done • Network layer • App layer Identification/ automated tests • Injections • Sessions • Business logic, etc Manual testing • DoS • Report • Re-tests Finalizing
  • 19. Recap