SlideShare a Scribd company logo
Access Control Rules Tester Andrew Petukhov Department of Computer Science Moscow State University [email_address]
Contents ‘ About box’ Motivation: what is flawed access control in web apps? Model: how do we view web application? Method: how to detect inconsistency of access control? Implementation: the AcCoRuTe tool Features and Limitations Future work
Web Security group at  Computing Systems Lab, Moscow State University Andrew Petukhov Dmitry Kozlov Igor Konnov MSU Computer Science faculty students who participate in our projects: Georgy Klimov, Edward Toroschin, Denis Zalivin, Alexander Mischenkko
Our contributions to OWASP Python tainted mode (SoC 2007) Detecting Security Vulnerabilities  in Web Applications Using Dynamic Analysis with Penetration Testing (AppSecEU08) Static analysis of Python web applications (SoC 2008) Teachable Static Analysis Workbench (SoC 2008) Access Control Rules Tester (SoC 2008) OWASP Site Generator Refresh (SoC 2008)
What is flawed access control?
What is flawed access control?  -- continued --
What is flawed access control?  -- continued --
Web Application Model Web application is not a simple union of Sitemaps available to its users Web application is indeed a State transition system:  State is a set of all accessible resources through GET-requests States are changed by POST-requests called actions Access control rules are constraints on the set of resources and actions that should be available to particular user at certain time So how do we infer access control rules having the black-box scope of view? Assumption : if user is not presented a link to resource or action, he is not supposed to access it
Tasks of access control tester Be able to build a set of GET- resources and POST-actions accessible through HTML user interface to a user at a given web application state Given sets of accessible resources and actions (R a  and R b ) for two different users at certain web application state:  Be able to verify whether inaccessible resources via user interface are indeed inaccessible through direct requests Issue direct requests for {R b \R a } while logged in as user  a  and for {R a \R b } while logged in as user  b Be able to perform checks for different web application states for different users
Deliveries of the Project A formal model and algorithm for web application access control assessment A guide how to decompose web application into states and transitions A workflow how to build Sitemap for a given web application state A command line tool, which actually performs access control testing: Input: an XML file describing web application States and Transitions and Sitemaps representing each state Output: an HTML report (XML is in near future) specifying broken access control URIs and participating users
Sitemap Building Workflow
Access Control Testing Workflow
Features and Limitations Automatically maintains the logged-in state while performing access control testing, relogins after forceful session expiration Always submits current values extracted from the latest HTTP-responses (instead of recorded ones) for such parameters as session IDs, ASP.NET __EVENTVALIDATION and __EVENTSTATE variables. The set of non-replayable parameters is customizable 100% result on the HacMe Bank v2.0 web application No support for AJAX No support for multi-factor authentication No support for anti-automation (CAPTCHAs) Toilsome Sitemap building process for web applications containing JavaScript –based navigation and lots of forms
Future work Perform in-depth evaluation on real-world web applications Add XSD schema for WebApplication.xml and perform validation against it Make the tool generate XML reports, create XSLT transformation style sheets  Implement GUI for creating WebApplication.xml file Fix mistakes in English in the documentation (need help form native speakers!!!)
Thank You! Any questions?

More Related Content

PDF
Research Inventy : International Journal of Engineering and Science
PPTX
Introduction to ASP.NET MVC
PPTX
Testing project (basic)
PPT
Ajax Testing Approach
PPT
Ajax Testing Approach
PDF
M6 l8-ajax-handout
PDF
Principles of MVC for Rails Developers
PPTX
You Can Be Anything You Want to Be: Breaking Through Certified Crypto in Bank...
Research Inventy : International Journal of Engineering and Science
Introduction to ASP.NET MVC
Testing project (basic)
Ajax Testing Approach
Ajax Testing Approach
M6 l8-ajax-handout
Principles of MVC for Rails Developers
You Can Be Anything You Want to Be: Breaking Through Certified Crypto in Bank...

Viewers also liked (9)

PDF
Detecting Insufficient Access Control in Web Applications
PDF
Обнаружение уязвимостей в механизме авторизации веб-приложении
PDF
Армия освобождения домохозяек: структура, состав вооружений, методы коммуникации
PDF
Обнаружение уязвимостей логики приложений методом статического анализа. Где п...
PPT
Benchmark сканеров SQL injection
KEY
Обеспечение безопасности расширений в корпоративных информационных системах
KEY
Безопасность веб-приложений: starter edition
KEY
No locked doors, no windows barred: hacking OpenAM infrastructure
PPT
Detecting Security Vulnerabilities in Web Applications Using Dynamic Analysis...
Detecting Insufficient Access Control in Web Applications
Обнаружение уязвимостей в механизме авторизации веб-приложении
Армия освобождения домохозяек: структура, состав вооружений, методы коммуникации
Обнаружение уязвимостей логики приложений методом статического анализа. Где п...
Benchmark сканеров SQL injection
Обеспечение безопасности расширений в корпоративных информационных системах
Безопасность веб-приложений: starter edition
No locked doors, no windows barred: hacking OpenAM infrastructure
Detecting Security Vulnerabilities in Web Applications Using Dynamic Analysis...
Ad

Similar to Access Control Rules Tester (20)

PPTX
Web Application Security
PPT
Hacking web applications
PDF
CNIT 129S: 8: Attacking Access Controls
PDF
S5-Authorization
PPT
performing security testing of web applications.web-and- -hacking.ppt
PPT
Hack applications
PDF
Automated Inference of Access Control Policies for Web Applications
PPTX
A7 Missing Function Level Access Control
PPTX
Application Security-Understanding The Horizon
PDF
Application Security - Your Success Depends on it
PPSX
Web application testing
PDF
The Web AppSec How-To: The Defender's Toolbox
PPT
Web Application Security
PPTX
Defending broken access control in .NET
PDF
Web Application Penetration Testing Course in 2025.pdf
PPT
FinalProjectPresentation.ppt
PPTX
Securing the Web @DevDay Da Nang 2018
PPTX
[DevDay2018] Securing the Web - By Sumanth Damarla, Tech Speaker at Mozilla
PPT
OWASPAppSecEU2006_CanTestingToolsReallyFindOWASPTop10
PPTX
CyberSecurityppt. pptx
Web Application Security
Hacking web applications
CNIT 129S: 8: Attacking Access Controls
S5-Authorization
performing security testing of web applications.web-and- -hacking.ppt
Hack applications
Automated Inference of Access Control Policies for Web Applications
A7 Missing Function Level Access Control
Application Security-Understanding The Horizon
Application Security - Your Success Depends on it
Web application testing
The Web AppSec How-To: The Defender's Toolbox
Web Application Security
Defending broken access control in .NET
Web Application Penetration Testing Course in 2025.pdf
FinalProjectPresentation.ppt
Securing the Web @DevDay Da Nang 2018
[DevDay2018] Securing the Web - By Sumanth Damarla, Tech Speaker at Mozilla
OWASPAppSecEU2006_CanTestingToolsReallyFindOWASPTop10
CyberSecurityppt. pptx
Ad

Recently uploaded (20)

PDF
KodekX | Application Modernization Development
PDF
Mobile App Security Testing_ A Comprehensive Guide.pdf
PDF
Unlocking AI with Model Context Protocol (MCP)
PPT
Teaching material agriculture food technology
PDF
Build a system with the filesystem maintained by OSTree @ COSCUP 2025
PPT
“AI and Expert System Decision Support & Business Intelligence Systems”
PDF
Agricultural_Statistics_at_a_Glance_2022_0.pdf
PPTX
A Presentation on Artificial Intelligence
PPTX
Big Data Technologies - Introduction.pptx
PDF
CIFDAQ's Market Insight: SEC Turns Pro Crypto
PDF
Modernizing your data center with Dell and AMD
PDF
Architecting across the Boundaries of two Complex Domains - Healthcare & Tech...
PDF
Dropbox Q2 2025 Financial Results & Investor Presentation
PDF
Reach Out and Touch Someone: Haptics and Empathic Computing
PPTX
Understanding_Digital_Forensics_Presentation.pptx
DOCX
The AUB Centre for AI in Media Proposal.docx
PDF
Blue Purple Modern Animated Computer Science Presentation.pdf.pdf
PDF
Network Security Unit 5.pdf for BCA BBA.
PDF
Per capita expenditure prediction using model stacking based on satellite ima...
PDF
Bridging biosciences and deep learning for revolutionary discoveries: a compr...
KodekX | Application Modernization Development
Mobile App Security Testing_ A Comprehensive Guide.pdf
Unlocking AI with Model Context Protocol (MCP)
Teaching material agriculture food technology
Build a system with the filesystem maintained by OSTree @ COSCUP 2025
“AI and Expert System Decision Support & Business Intelligence Systems”
Agricultural_Statistics_at_a_Glance_2022_0.pdf
A Presentation on Artificial Intelligence
Big Data Technologies - Introduction.pptx
CIFDAQ's Market Insight: SEC Turns Pro Crypto
Modernizing your data center with Dell and AMD
Architecting across the Boundaries of two Complex Domains - Healthcare & Tech...
Dropbox Q2 2025 Financial Results & Investor Presentation
Reach Out and Touch Someone: Haptics and Empathic Computing
Understanding_Digital_Forensics_Presentation.pptx
The AUB Centre for AI in Media Proposal.docx
Blue Purple Modern Animated Computer Science Presentation.pdf.pdf
Network Security Unit 5.pdf for BCA BBA.
Per capita expenditure prediction using model stacking based on satellite ima...
Bridging biosciences and deep learning for revolutionary discoveries: a compr...

Access Control Rules Tester

  • 1. Access Control Rules Tester Andrew Petukhov Department of Computer Science Moscow State University [email_address]
  • 2. Contents ‘ About box’ Motivation: what is flawed access control in web apps? Model: how do we view web application? Method: how to detect inconsistency of access control? Implementation: the AcCoRuTe tool Features and Limitations Future work
  • 3. Web Security group at Computing Systems Lab, Moscow State University Andrew Petukhov Dmitry Kozlov Igor Konnov MSU Computer Science faculty students who participate in our projects: Georgy Klimov, Edward Toroschin, Denis Zalivin, Alexander Mischenkko
  • 4. Our contributions to OWASP Python tainted mode (SoC 2007) Detecting Security Vulnerabilities in Web Applications Using Dynamic Analysis with Penetration Testing (AppSecEU08) Static analysis of Python web applications (SoC 2008) Teachable Static Analysis Workbench (SoC 2008) Access Control Rules Tester (SoC 2008) OWASP Site Generator Refresh (SoC 2008)
  • 5. What is flawed access control?
  • 6. What is flawed access control? -- continued --
  • 7. What is flawed access control? -- continued --
  • 8. Web Application Model Web application is not a simple union of Sitemaps available to its users Web application is indeed a State transition system: State is a set of all accessible resources through GET-requests States are changed by POST-requests called actions Access control rules are constraints on the set of resources and actions that should be available to particular user at certain time So how do we infer access control rules having the black-box scope of view? Assumption : if user is not presented a link to resource or action, he is not supposed to access it
  • 9. Tasks of access control tester Be able to build a set of GET- resources and POST-actions accessible through HTML user interface to a user at a given web application state Given sets of accessible resources and actions (R a and R b ) for two different users at certain web application state: Be able to verify whether inaccessible resources via user interface are indeed inaccessible through direct requests Issue direct requests for {R b \R a } while logged in as user a and for {R a \R b } while logged in as user b Be able to perform checks for different web application states for different users
  • 10. Deliveries of the Project A formal model and algorithm for web application access control assessment A guide how to decompose web application into states and transitions A workflow how to build Sitemap for a given web application state A command line tool, which actually performs access control testing: Input: an XML file describing web application States and Transitions and Sitemaps representing each state Output: an HTML report (XML is in near future) specifying broken access control URIs and participating users
  • 13. Features and Limitations Automatically maintains the logged-in state while performing access control testing, relogins after forceful session expiration Always submits current values extracted from the latest HTTP-responses (instead of recorded ones) for such parameters as session IDs, ASP.NET __EVENTVALIDATION and __EVENTSTATE variables. The set of non-replayable parameters is customizable 100% result on the HacMe Bank v2.0 web application No support for AJAX No support for multi-factor authentication No support for anti-automation (CAPTCHAs) Toilsome Sitemap building process for web applications containing JavaScript –based navigation and lots of forms
  • 14. Future work Perform in-depth evaluation on real-world web applications Add XSD schema for WebApplication.xml and perform validation against it Make the tool generate XML reports, create XSLT transformation style sheets Implement GUI for creating WebApplication.xml file Fix mistakes in English in the documentation (need help form native speakers!!!)
  • 15. Thank You! Any questions?