SlideShare a Scribd company logo
www.cloudsecurityalliance.org
Custom web applications
as a way into your
internal network
Andrew Useckas
Copyright © 2016 Cloud Security Alliance
www.cloudsecurityalliance.orgCopyright © 2011 Cloud Security Alliance www.cloudsecurityalliance.orgCopyright © 2015 Cloud Security Alliance
Introduction
• Securing custom web applications is more challenging than
most people realize:
- Security is often overlooked during design and development
- As long as the site is indexed by at least one search engine, it is
exposed to hacks, attacks, and full-blown assaults from anywhere
in the world
- There’s big money in hacking and web applications are seen as an
easy target with potential to use them as a jump board to the
internal network or private customer cloud
- No “security patch” for custom WebApps (vs. infrastructure)
• It’s simply not as difficult to compromise a web application as
most people think
- You don’t have to be a hacking wiz to exploit most badly written
apps – there are plenty of tools out there to help you do it
www.cloudsecurityalliance.orgCopyright © 2011 Cloud Security Alliance www.cloudsecurityalliance.orgCopyright © 2015 Cloud Security Alliance
About Me
• CTO at Threat X working on a new approach to Web
Application security.
• Over 15 years of experience in penetration testing / ethical
hacking.
• Author and architect of multiple security sensors.
• Consulted for multiple enterprises in technical and compliance
aspects of security.
www.cloudsecurityalliance.orgCopyright © 2011 Cloud Security Alliance www.cloudsecurityalliance.orgCopyright © 2015 Cloud Security Alliance
Agenda
• Basic overview of hacker’s mindset.
• Overview of most currently popular security measures.
• Web Application Attacks
• Authentication
• Session Management
• Access Controls
• Client Side checks
• Server Side checks
www.cloudsecurityalliance.orgCopyright © 2011 Cloud Security Alliance www.cloudsecurityalliance.orgCopyright © 2015 Cloud Security Alliance
Who is the target?
• According to Verizon 2016 DBIR Report:
• 40% of confirmed breaches were Web App Attacks.
• 95% of confirmed WebApp breaches financially motivated.
• Top Industries attacked: Finance, Information, Retail.
• Higher percentage of confirmed data disclosure as security
measures are lacking.
• Botnets. Is my company too small to be attacked?
• My perimeter is secure – we run quarterly scans.
www.cloudsecurityalliance.orgCopyright © 2011 Cloud Security Alliance www.cloudsecurityalliance.orgCopyright © 2015 Cloud Security Alliance
The wild west of WebApps
• Security is often an afterthought. Time to market is more
important than security.
• Developer education on safe coding techniques is lacking.
• Traditional Layer 3 firewall does nothing for WebApp Security.
• IDS / IPS systems do very little as the focus is more on the
network applications.
• New ciphers use ephemeral keys making it harder to decrypt
and examine the flows at the edge (no more decryption in
passive sensors).
• Piping all the logs to a SIEM tool may overwhelm the
administrators.
• Most of these tools are useless in a cloud deployment model.
www.cloudsecurityalliance.orgCopyright © 2011 Cloud Security Alliance www.cloudsecurityalliance.orgCopyright © 2015 Cloud Security Alliance
Tools
• Browser – Firefox
• Intercepting Proxy – Burpsuite
• SQLMap
• Target apps – Bodgeit from Google
www.cloudsecurityalliance.orgCopyright © 2011 Cloud Security Alliance www.cloudsecurityalliance.orgCopyright © 2015 Cloud Security Alliance
Authentication
• Login forms are often the first thing a hacker will try to break.
• Common issues:
• Weak or default passwords
• Default pages
• Guessable protected URIs
• Navigation tree leaks in JS
• Lack of proper server side sanitization
www.cloudsecurityalliance.orgCopyright © 2011 Cloud Security Alliance www.cloudsecurityalliance.orgCopyright © 2015 Cloud Security Alliance
Session Management
• Sessions are used to track users
• First line of defense
• Common attacks
• Session hijacking
• Missing idle session timeouts
• Session riding (CSRF)
• Cookie manipulation
www.cloudsecurityalliance.orgCopyright © 2011 Cloud Security Alliance www.cloudsecurityalliance.orgCopyright © 2015 Cloud Security Alliance
Access Controls
• Defective access controls are often used after the initial
penetration.
• Hidden information in HTML
• Information leaks through JS
• Horizontal privilege escalation
• Vertical privilege escalation
www.cloudsecurityalliance.orgCopyright © 2011 Cloud Security Alliance www.cloudsecurityalliance.orgCopyright © 2015 Cloud Security Alliance
Client Side Checks
• Validation of input fields before they are passed to the server
• Usually based on JS
• Can be easily bypassed with transparent proxy
www.cloudsecurityalliance.orgCopyright © 2011 Cloud Security Alliance www.cloudsecurityalliance.orgCopyright © 2015 Cloud Security Alliance
Server Side Checks
• Server side usually talking to a database engine such as
MySql.
• User input can be passed to the backend scripts without
proper validation, resulting in the backend attacks such as
SQL injection (SQLi).
• SQLi can be used to
• Bypass authentication controls
• Bypass access controls
• Execute full database dumps
• Write script files to the remote file system. Scripts can then
be executed from the browser giving an attacker shell
access to the remote system
www.cloudsecurityalliance.orgCopyright © 2011 Cloud Security Alliance www.cloudsecurityalliance.orgCopyright © 2015 Cloud Security Alliance
Further Exploits
• It is possible to upload server side scripts via backends such
as MySQL.
• Scripts can then be executed from the browser giving shell
access.
• Sample injection:
UNION SELECT '<%Runtime.getRuntime().exec(request.getParameter("cmd"));%>',null INTO
OUTFILE '/some/webdir/dir/cmd.jsp'
www.cloudsecurityalliance.orgCopyright © 2011 Cloud Security Alliance www.cloudsecurityalliance.orgCopyright © 2015 Cloud Security Alliance
Parting Recommendations
• Secure development and QA
• Next-generation Web Application Firewall
• Pen testing
www.cloudsecurityalliance.orgCopyright © 2011 Cloud Security Alliance www.cloudsecurityalliance.orgCopyright © 2015 Cloud Security Alliance
References
• Verizon DBIR report: http://www.verizonenterprise.com/verizon-insights-
lab/dbir/

More Related Content

PPTX
The cyber house of horrors - securing the expanding attack surface
PDF
Web Application Firewall - Web Application & Web Services Security integrated...
PPTX
Why Network and Endpoint Security Isn’t Enough
PDF
Ken Czekaj & Robert Wright - Leveraging APM NPM Solutions to Compliment Cyber...
PDF
The Non-Advanced Persistent Threat
PPTX
Mitigating the Top 5 Cloud Security Threats
PDF
SecureSphere ThreatRadar: Improve Security Team Productivity and Focus
PPTX
All your files now belong to us
The cyber house of horrors - securing the expanding attack surface
Web Application Firewall - Web Application & Web Services Security integrated...
Why Network and Endpoint Security Isn’t Enough
Ken Czekaj & Robert Wright - Leveraging APM NPM Solutions to Compliment Cyber...
The Non-Advanced Persistent Threat
Mitigating the Top 5 Cloud Security Threats
SecureSphere ThreatRadar: Improve Security Team Productivity and Focus
All your files now belong to us

What's hot (20)

PDF
An Inside Look at a Sophisticated, Multi-vector DDoS Attack
PDF
Journey to the Cloud: Securing Your AWS Applications - April 2015
PPT
Why current security solutions fail
PDF
More databases. More hackers.
PDF
Top Five Security Must-Haves for Office 365
PPTX
Security O365 Using AI-based Advanced Threat Protection
PDF
Trust No One - Zero Trust on the Akamai Platform
PPTX
Shared Security Responsibility in the AWS Public Cloud
PPTX
What's Wrong with Vulnerability Management & How Can We Fix It
PPTX
Man in the Cloud Attacks
PDF
Extend Enterprise Application-level Security to Your AWS Environment
PPT
The State of Application Security: Hackers On Steroids
PPTX
5 Steps to Reduce Your Window of Vulnerability
PDF
Zero trust in a hybrid architecture
PDF
Micro-Segmentation for Data Centers - Without Using Internal Firewalls
PPTX
Tiptoe Through The Network: Practical Vulnerability Assessments in Control Sy...
PPTX
The Top 10 Most Common Weaknesses in Serverless Applications 2018
PPTX
Network Security Best Practices - Reducing Your Attack Surface
PDF
CyberArk Cleveland Defend End Point Infection and Lateral Movement
PPTX
Bil Harmer - Myths of Cloud Security Debunked!
An Inside Look at a Sophisticated, Multi-vector DDoS Attack
Journey to the Cloud: Securing Your AWS Applications - April 2015
Why current security solutions fail
More databases. More hackers.
Top Five Security Must-Haves for Office 365
Security O365 Using AI-based Advanced Threat Protection
Trust No One - Zero Trust on the Akamai Platform
Shared Security Responsibility in the AWS Public Cloud
What's Wrong with Vulnerability Management & How Can We Fix It
Man in the Cloud Attacks
Extend Enterprise Application-level Security to Your AWS Environment
The State of Application Security: Hackers On Steroids
5 Steps to Reduce Your Window of Vulnerability
Zero trust in a hybrid architecture
Micro-Segmentation for Data Centers - Without Using Internal Firewalls
Tiptoe Through The Network: Practical Vulnerability Assessments in Control Sy...
The Top 10 Most Common Weaknesses in Serverless Applications 2018
Network Security Best Practices - Reducing Your Attack Surface
CyberArk Cleveland Defend End Point Infection and Lateral Movement
Bil Harmer - Myths of Cloud Security Debunked!

Viewers also liked (17)

PPT
I Love Linux - Pawel Zorzan Urban & Bocelli Davide
DOCX
Salomon 7e
PDF
&lt;img src="xx">
PDF
One pagepdf
PPT
Startup Sorocaba: Palestra Davi Paunovic - Pivotagem
PPTX
4_C_CEM_2016
PPTX
Ed Rios - New ncc brief
DOCX
Resultados finales municipio_de_giraldo
PDF
Underground hacker Nazionale - Clima & Eventi
PDF
Sicurezza Informatica e Hacking - Università di Teramo 23/10/2015
PPTX
Privileged accesss management for den csa user group CA Technologies
PPT
Hrvatska u napoleonovo doba
PPT
Napoleon bonaparte
PPT
Engleska u 18. stoljeću
PPT
Diseño e innovación
PDF
Understanding the evolving healthcare ecosystem -- Aimia -- 052714
PDF
Ready
I Love Linux - Pawel Zorzan Urban & Bocelli Davide
Salomon 7e
&lt;img src="xx">
One pagepdf
Startup Sorocaba: Palestra Davi Paunovic - Pivotagem
4_C_CEM_2016
Ed Rios - New ncc brief
Resultados finales municipio_de_giraldo
Underground hacker Nazionale - Clima & Eventi
Sicurezza Informatica e Hacking - Università di Teramo 23/10/2015
Privileged accesss management for den csa user group CA Technologies
Hrvatska u napoleonovo doba
Napoleon bonaparte
Engleska u 18. stoljeću
Diseño e innovación
Understanding the evolving healthcare ecosystem -- Aimia -- 052714
Ready

Similar to Andrew Useckas Csa presentation hacking custom webapps 4 3 (20)

PPT
Avoiding Application Attacks: A Guide to Preventing the OWASP Top 10 from Hap...
PPT
Cloud security
PDF
Presd1 10
PDF
Migrating Critical Applications to the Cloud - isaca seattle - sanitized
PDF
Migrating Critical Applications To The Cloud - ISACA Seattle - Sanitized
PPTX
Certes webinar securing the frictionless enterprise
PPT
Insecurity in security products 2013
PPTX
Application Control - Maintenance Headache or Manageable Solution?
PDF
Expand Your Control of Access to IBM i Systems and Data
PPTX
A DevOps Guide to Web Application Security
PPTX
Joomla Security Simplified —  Seven Easy Steps For a More Secure Website
PDF
Scalar Security Roadshow: Toronto Presentation - April 15, 2015
PPTX
Top Application Security Trends of 2012
PPTX
Defending Today's Threats with Tomorrow's Security by Microsoft by Aidan Finn
PDF
Realities of Security in the Cloud
PDF
Top Cyber Security Trends for 2016
PPTX
Cloud Security: A matter of trust?
PDF
Cloudflare_Everywhere_Security_Solution_Brief (1).pdf
PDF
Managing Your Application Security Program with the ThreadFix Ecosystem
PDF
Controlling Access to IBM i Systems and Data
Avoiding Application Attacks: A Guide to Preventing the OWASP Top 10 from Hap...
Cloud security
Presd1 10
Migrating Critical Applications to the Cloud - isaca seattle - sanitized
Migrating Critical Applications To The Cloud - ISACA Seattle - Sanitized
Certes webinar securing the frictionless enterprise
Insecurity in security products 2013
Application Control - Maintenance Headache or Manageable Solution?
Expand Your Control of Access to IBM i Systems and Data
A DevOps Guide to Web Application Security
Joomla Security Simplified —  Seven Easy Steps For a More Secure Website
Scalar Security Roadshow: Toronto Presentation - April 15, 2015
Top Application Security Trends of 2012
Defending Today's Threats with Tomorrow's Security by Microsoft by Aidan Finn
Realities of Security in the Cloud
Top Cyber Security Trends for 2016
Cloud Security: A matter of trust?
Cloudflare_Everywhere_Security_Solution_Brief (1).pdf
Managing Your Application Security Program with the ThreadFix Ecosystem
Controlling Access to IBM i Systems and Data

More from Trish McGinity, CCSK (14)

PDF
Csa privacy by design &amp; gdpr austin chambers 11-4-17
PPTX
PPTX
Cloud Seeding
PPTX
Token Binding as the Foundation for a More Secure Web
PPTX
Security and Automation: Can they work together? Can we survive if they don't?
PDF
GDPR Overview
PDF
Practical AWS Security - Scott Hogg
PDF
CSA colorado 2016 presentation CloudPassage
PPTX
Csa presentation november 2016 sloane ghx
PPTX
Steve Kosten - Exploiting common web application vulnerabilities
PPTX
Shawn Harris - CCSP SAH v2
PPTX
Larry Whiteside - Optiv Cloud ready or steam rolled csa version
PPTX
Scott Hogg - Gtri cloud security knowledge and certs
PPTX
Davitt Potter - CSA Arrow
Csa privacy by design &amp; gdpr austin chambers 11-4-17
Cloud Seeding
Token Binding as the Foundation for a More Secure Web
Security and Automation: Can they work together? Can we survive if they don't?
GDPR Overview
Practical AWS Security - Scott Hogg
CSA colorado 2016 presentation CloudPassage
Csa presentation november 2016 sloane ghx
Steve Kosten - Exploiting common web application vulnerabilities
Shawn Harris - CCSP SAH v2
Larry Whiteside - Optiv Cloud ready or steam rolled csa version
Scott Hogg - Gtri cloud security knowledge and certs
Davitt Potter - CSA Arrow

Recently uploaded (20)

PPTX
Cloud computing and distributed systems.
PDF
Network Security Unit 5.pdf for BCA BBA.
PPTX
PA Analog/Digital System: The Backbone of Modern Surveillance and Communication
PPTX
A Presentation on Artificial Intelligence
PDF
CIFDAQ's Market Insight: SEC Turns Pro Crypto
PDF
Empathic Computing: Creating Shared Understanding
PDF
Advanced methodologies resolving dimensionality complications for autism neur...
PDF
Shreyas Phanse Resume: Experienced Backend Engineer | Java • Spring Boot • Ka...
PPTX
Understanding_Digital_Forensics_Presentation.pptx
PDF
Mobile App Security Testing_ A Comprehensive Guide.pdf
PPTX
Digital-Transformation-Roadmap-for-Companies.pptx
PPTX
Effective Security Operations Center (SOC) A Modern, Strategic, and Threat-In...
PDF
How UI/UX Design Impacts User Retention in Mobile Apps.pdf
PDF
Reach Out and Touch Someone: Haptics and Empathic Computing
PPTX
KOM of Painting work and Equipment Insulation REV00 update 25-dec.pptx
PDF
Encapsulation_ Review paper, used for researhc scholars
DOCX
The AUB Centre for AI in Media Proposal.docx
PDF
The Rise and Fall of 3GPP – Time for a Sabbatical?
PPTX
VMware vSphere Foundation How to Sell Presentation-Ver1.4-2-14-2024.pptx
PDF
Architecting across the Boundaries of two Complex Domains - Healthcare & Tech...
Cloud computing and distributed systems.
Network Security Unit 5.pdf for BCA BBA.
PA Analog/Digital System: The Backbone of Modern Surveillance and Communication
A Presentation on Artificial Intelligence
CIFDAQ's Market Insight: SEC Turns Pro Crypto
Empathic Computing: Creating Shared Understanding
Advanced methodologies resolving dimensionality complications for autism neur...
Shreyas Phanse Resume: Experienced Backend Engineer | Java • Spring Boot • Ka...
Understanding_Digital_Forensics_Presentation.pptx
Mobile App Security Testing_ A Comprehensive Guide.pdf
Digital-Transformation-Roadmap-for-Companies.pptx
Effective Security Operations Center (SOC) A Modern, Strategic, and Threat-In...
How UI/UX Design Impacts User Retention in Mobile Apps.pdf
Reach Out and Touch Someone: Haptics and Empathic Computing
KOM of Painting work and Equipment Insulation REV00 update 25-dec.pptx
Encapsulation_ Review paper, used for researhc scholars
The AUB Centre for AI in Media Proposal.docx
The Rise and Fall of 3GPP – Time for a Sabbatical?
VMware vSphere Foundation How to Sell Presentation-Ver1.4-2-14-2024.pptx
Architecting across the Boundaries of two Complex Domains - Healthcare & Tech...

Andrew Useckas Csa presentation hacking custom webapps 4 3

  • 1. www.cloudsecurityalliance.org Custom web applications as a way into your internal network Andrew Useckas Copyright © 2016 Cloud Security Alliance
  • 2. www.cloudsecurityalliance.orgCopyright © 2011 Cloud Security Alliance www.cloudsecurityalliance.orgCopyright © 2015 Cloud Security Alliance Introduction • Securing custom web applications is more challenging than most people realize: - Security is often overlooked during design and development - As long as the site is indexed by at least one search engine, it is exposed to hacks, attacks, and full-blown assaults from anywhere in the world - There’s big money in hacking and web applications are seen as an easy target with potential to use them as a jump board to the internal network or private customer cloud - No “security patch” for custom WebApps (vs. infrastructure) • It’s simply not as difficult to compromise a web application as most people think - You don’t have to be a hacking wiz to exploit most badly written apps – there are plenty of tools out there to help you do it
  • 3. www.cloudsecurityalliance.orgCopyright © 2011 Cloud Security Alliance www.cloudsecurityalliance.orgCopyright © 2015 Cloud Security Alliance About Me • CTO at Threat X working on a new approach to Web Application security. • Over 15 years of experience in penetration testing / ethical hacking. • Author and architect of multiple security sensors. • Consulted for multiple enterprises in technical and compliance aspects of security.
  • 4. www.cloudsecurityalliance.orgCopyright © 2011 Cloud Security Alliance www.cloudsecurityalliance.orgCopyright © 2015 Cloud Security Alliance Agenda • Basic overview of hacker’s mindset. • Overview of most currently popular security measures. • Web Application Attacks • Authentication • Session Management • Access Controls • Client Side checks • Server Side checks
  • 5. www.cloudsecurityalliance.orgCopyright © 2011 Cloud Security Alliance www.cloudsecurityalliance.orgCopyright © 2015 Cloud Security Alliance Who is the target? • According to Verizon 2016 DBIR Report: • 40% of confirmed breaches were Web App Attacks. • 95% of confirmed WebApp breaches financially motivated. • Top Industries attacked: Finance, Information, Retail. • Higher percentage of confirmed data disclosure as security measures are lacking. • Botnets. Is my company too small to be attacked? • My perimeter is secure – we run quarterly scans.
  • 6. www.cloudsecurityalliance.orgCopyright © 2011 Cloud Security Alliance www.cloudsecurityalliance.orgCopyright © 2015 Cloud Security Alliance The wild west of WebApps • Security is often an afterthought. Time to market is more important than security. • Developer education on safe coding techniques is lacking. • Traditional Layer 3 firewall does nothing for WebApp Security. • IDS / IPS systems do very little as the focus is more on the network applications. • New ciphers use ephemeral keys making it harder to decrypt and examine the flows at the edge (no more decryption in passive sensors). • Piping all the logs to a SIEM tool may overwhelm the administrators. • Most of these tools are useless in a cloud deployment model.
  • 7. www.cloudsecurityalliance.orgCopyright © 2011 Cloud Security Alliance www.cloudsecurityalliance.orgCopyright © 2015 Cloud Security Alliance Tools • Browser – Firefox • Intercepting Proxy – Burpsuite • SQLMap • Target apps – Bodgeit from Google
  • 8. www.cloudsecurityalliance.orgCopyright © 2011 Cloud Security Alliance www.cloudsecurityalliance.orgCopyright © 2015 Cloud Security Alliance Authentication • Login forms are often the first thing a hacker will try to break. • Common issues: • Weak or default passwords • Default pages • Guessable protected URIs • Navigation tree leaks in JS • Lack of proper server side sanitization
  • 9. www.cloudsecurityalliance.orgCopyright © 2011 Cloud Security Alliance www.cloudsecurityalliance.orgCopyright © 2015 Cloud Security Alliance Session Management • Sessions are used to track users • First line of defense • Common attacks • Session hijacking • Missing idle session timeouts • Session riding (CSRF) • Cookie manipulation
  • 10. www.cloudsecurityalliance.orgCopyright © 2011 Cloud Security Alliance www.cloudsecurityalliance.orgCopyright © 2015 Cloud Security Alliance Access Controls • Defective access controls are often used after the initial penetration. • Hidden information in HTML • Information leaks through JS • Horizontal privilege escalation • Vertical privilege escalation
  • 11. www.cloudsecurityalliance.orgCopyright © 2011 Cloud Security Alliance www.cloudsecurityalliance.orgCopyright © 2015 Cloud Security Alliance Client Side Checks • Validation of input fields before they are passed to the server • Usually based on JS • Can be easily bypassed with transparent proxy
  • 12. www.cloudsecurityalliance.orgCopyright © 2011 Cloud Security Alliance www.cloudsecurityalliance.orgCopyright © 2015 Cloud Security Alliance Server Side Checks • Server side usually talking to a database engine such as MySql. • User input can be passed to the backend scripts without proper validation, resulting in the backend attacks such as SQL injection (SQLi). • SQLi can be used to • Bypass authentication controls • Bypass access controls • Execute full database dumps • Write script files to the remote file system. Scripts can then be executed from the browser giving an attacker shell access to the remote system
  • 13. www.cloudsecurityalliance.orgCopyright © 2011 Cloud Security Alliance www.cloudsecurityalliance.orgCopyright © 2015 Cloud Security Alliance Further Exploits • It is possible to upload server side scripts via backends such as MySQL. • Scripts can then be executed from the browser giving shell access. • Sample injection: UNION SELECT '<%Runtime.getRuntime().exec(request.getParameter("cmd"));%>',null INTO OUTFILE '/some/webdir/dir/cmd.jsp'
  • 14. www.cloudsecurityalliance.orgCopyright © 2011 Cloud Security Alliance www.cloudsecurityalliance.orgCopyright © 2015 Cloud Security Alliance Parting Recommendations • Secure development and QA • Next-generation Web Application Firewall • Pen testing
  • 15. www.cloudsecurityalliance.orgCopyright © 2011 Cloud Security Alliance www.cloudsecurityalliance.orgCopyright © 2015 Cloud Security Alliance References • Verizon DBIR report: http://www.verizonenterprise.com/verizon-insights- lab/dbir/

Editor's Notes