SlideShare a Scribd company logo
OpenSourceSecurityTools - UPDATED
Sparsh Raj
Application Security @ Box
Open Source
Security Assessment
Tools
There IS free breakfast!
Key Takeaways
Security is easy when done right
Basic Web Application vulnerability assessment
Basic Mobile (Android and iOS) vulnerability assessment
1
2
3
4
5
Basic network vulnerability assessment
Why use any security assessment tool during SDLC?
Agenda Overview
What do you need to assess (secure)?
Web Application Security Assessment Tool – OWASP ZAP
Android Application Security Assessment Tool - Qark
iOS Application Security Assessment Tool - Needle
1
2
3
4
5
6
Questions?7
Network Security Assessment tool - OpenVAS
Why use any security assessment tool?
• Detecting “low-hanging fruits”
before release
• Detection of vulnerabilities in early
development phase
• Open Source Tools:
‒ Free!!
Image Source: Kaspersky Security Bulletin 2015
Distribution of exploits used in cyberattacks, by type of application attacked,
2015
What do you need to assess (secure)?
• Network
• Web application
• Mobile Application
‒ Android
‒ iOS
Network Security Assessment tool - OpenVAS
• Open Vulnerability Assessment System
• Network Vulnerability Tests (NVTs)
• Simple to install and use
• Web interface
‒ Launch scans
‒ View reports
• Alternatives: Nessus, nmap
• Get Started! : OpenVAS setup and start
guide
Network Security Assessment tool - OpenVAS
Network Security Assessment tool - OpenVAS
Network Security Assessment tool - OpenVAS
Network Security Assessment tool - OpenVAS
Network Security Assessment tool - OpenVAS
Network Security Assessment tool - OpenVAS
Sample Report Index Page Sample Report
Summary
Network Security Assessment tool - OpenVAS
Sample Report Common Vulns Sample Report Vuln
Overview
Web Application Security Assessment Tool – OWASP
ZAP
• Ideal for devs, esp. for automated security tests
• Cross platform, easy to install and use
• Main features: Intercepting Proxy, Traditional and
Ajax Spiders, WebSockets support, Forced Browsing
(DirBuster), Fuzzing etc.
• Point-n-shoot
• Plug-n-hack add-on
• Get started !! : Zed Attack Proxy
Web Application Security Assessment Tool – OWASP
ZAP
Android Application Security Assessment Tool - Qark
• Quick Android Review Kit (created by LinkedIn)
• Some important vulns QARK finds:
‒ Apps supporting outdated API versions, with
known vulnerabilities
‒ Tapjacking
‒ Activities which may leak data
‒ …and many more.
• QARK GitHub
Android Application Security Assessment Tool - Qark
iOS Application Security Assessment Tool - Needle
• By MWR Labs
• Easy to add python modules
• Covers areas:
‒ data storage
‒ inter-process communication
‒ network communications
‒ static code analysis
• Needle quick intro link
iOS Application Security Assessment Tool - Needle
iOS Application Security Assessment Tool - Needle
iOS Application Security Assessment Tool - Needle
Conclusions:
Use OpenVAS to find network vulnerabilities
Use OWASP Zap to find web app vulnerabilities
Use Needle to find iOS app vulnerabilities
Use Box for the most awesome and secure platform
1
2
3
4
5
Use QARK to find Android app vulnerabilities
Why use any security assessment tool during SDLC?
Agenda Overview
What do you need to assess (secure)?
Web Application Security Assessment Tool – OWASP ZAP
Android Application Security Assessment Tool - Qark
iOS Application Security Assessment Tool - Needle
1
2
3
4
5
6
Questions?7
Network Security Assessment tool - OpenVAS

More Related Content

PDF
Proactive Security AppSec Case Study
PPTX
Alfredo Reino - Monitoring aws and azure
PDF
Security in a Continuous Delivery World
PDF
Dev seccon london 2016 intelliment security
PDF
A Secure DevOps Journey
PDF
DevSecOps - Building Rugged Software
PDF
The Rise of DevSecOps - Fabian Lim - DevSecOpsSg
PDF
Intro to DefectDojo at OWASP Switzerland
Proactive Security AppSec Case Study
Alfredo Reino - Monitoring aws and azure
Security in a Continuous Delivery World
Dev seccon london 2016 intelliment security
A Secure DevOps Journey
DevSecOps - Building Rugged Software
The Rise of DevSecOps - Fabian Lim - DevSecOpsSg
Intro to DefectDojo at OWASP Switzerland

What's hot (20)

PPTX
Security guidelines
PDF
Using jira to manage risks v1.0 - owasp app sec eu - june 2016
PPTX
[Wroclaw #2] iOS Security - 101
PPTX
AllDayDevOps 2019 AppSensor
PDF
Veracode Automation CLI (using Jenkins for SDL integration)
PDF
SecDevOps Risk Workflow - v0.6
PPTX
SecDevOps 2.0 - Managing Your Robot Army
PPTX
You Build It, You Secure It: Introduction to DevSecOps
ODP
OWASP WTE - Now in the Cloud!
PDF
DevSecOps: What Why and How : Blackhat 2019
PDF
[OWASP Poland Day] Security in developer's life
PPTX
OWASP AppSec EU - SecDevOps, a view from the trenches - Abhay Bhargav
PDF
[OWASP Poland Day] OWASP for testing mobile applications
PPTX
DevSecCon London 2017: when good containers go bad by Tim Mackey
PPTX
Elizabeth Lawler - Devops, security, and compliance working in unison
PDF
PDF
Renato Rodrigues - Security in the wild
PDF
Security champions v1.0
PPTX
The OWASP Zed Attack Proxy
PDF
DevSecCon Asia 2017 Ofer Maor: AppSec DevOps automation – real world cases
Security guidelines
Using jira to manage risks v1.0 - owasp app sec eu - june 2016
[Wroclaw #2] iOS Security - 101
AllDayDevOps 2019 AppSensor
Veracode Automation CLI (using Jenkins for SDL integration)
SecDevOps Risk Workflow - v0.6
SecDevOps 2.0 - Managing Your Robot Army
You Build It, You Secure It: Introduction to DevSecOps
OWASP WTE - Now in the Cloud!
DevSecOps: What Why and How : Blackhat 2019
[OWASP Poland Day] Security in developer's life
OWASP AppSec EU - SecDevOps, a view from the trenches - Abhay Bhargav
[OWASP Poland Day] OWASP for testing mobile applications
DevSecCon London 2017: when good containers go bad by Tim Mackey
Elizabeth Lawler - Devops, security, and compliance working in unison
Renato Rodrigues - Security in the wild
Security champions v1.0
The OWASP Zed Attack Proxy
DevSecCon Asia 2017 Ofer Maor: AppSec DevOps automation – real world cases
Ad

Viewers also liked (16)

PDF
Project Contract for Green Enery
PDF
02 DSD-NL 2016 - D-HYDRO Symposium - D-HYDRO Suite voor samenwerking Nederlan...
PDF
ใบความรู้ที่5 ตาราง Table
PDF
Qué hacer ante una lesiónRICE
PDF
La Cascada de Piragua.
PDF
Sit Straight
PDF
Placeware Marketing Model
PDF
18 DSD-NL 2016 - Delft-FEWS Gebruikersdag - Ontwikkeling van Delft-FEWS - Ger...
PDF
You are the dark knight
PPTX
It and ict-bangladesh_world
PPTX
ລະບົບຖານຂໍ້ມູນ
PDF
Harem del palacio de tiopkapi
DOCX
مشروع التخرج LTE
PPT
Dispositivos de almacenamiento magnetico
DOCX
Organizational behavior
PPTX
Desarrollo cognoscitivo en la primera infancia
Project Contract for Green Enery
02 DSD-NL 2016 - D-HYDRO Symposium - D-HYDRO Suite voor samenwerking Nederlan...
ใบความรู้ที่5 ตาราง Table
Qué hacer ante una lesiónRICE
La Cascada de Piragua.
Sit Straight
Placeware Marketing Model
18 DSD-NL 2016 - Delft-FEWS Gebruikersdag - Ontwikkeling van Delft-FEWS - Ger...
You are the dark knight
It and ict-bangladesh_world
ລະບົບຖານຂໍ້ມູນ
Harem del palacio de tiopkapi
مشروع التخرج LTE
Dispositivos de almacenamiento magnetico
Organizational behavior
Desarrollo cognoscitivo en la primera infancia
Ad

Similar to OpenSourceSecurityTools - UPDATED (20)

PPTX
ATAGTR2017 Cost-effective Security Testing Approaches for Web, Mobile & Enter...
PPTX
[Wroclaw #5] OWASP Projects: beyond Top 10
PDF
we45 DEFCON Workshop - Building AppSec Automation with Python
ODP
JavaOne 2014 Security Testing for Developers using OWASP ZAP
PDF
Filling your AppSec Toolbox - Which Tools, When to Use Them, and Why
ODP
JoinSEC 2013 London - ZAP Intro
PPTX
Integrating security into the application development process
PPTX
Secure SDLC in mobile software development.
PDF
Null singapore - Mobile Security Essentials
PDF
Bringing Security Testing to Development: How to Enable Developers to Act as ...
PDF
What Every Developer And Tester Should Know About Software Security
ODP
CiNPA Security SIG - AppSec Presentation
PDF
Automating OWASP Tests in your CI/CD
PPSX
ODP
Building an Open Source AppSec Pipeline - 2015 Texas Linux Fest
PPTX
Manual JavaScript Analysis Is A Bug
PDF
Myths and Misperceptions of Open Source Security
ODP
OWASP 2014 AppSec EU ZAP Advanced Features
PPTX
AppSec DC 2019 ASVS 4.0 Final.pptx
PPTX
AppSec DC 2019 ASVS 4.0 Final.pptx
ATAGTR2017 Cost-effective Security Testing Approaches for Web, Mobile & Enter...
[Wroclaw #5] OWASP Projects: beyond Top 10
we45 DEFCON Workshop - Building AppSec Automation with Python
JavaOne 2014 Security Testing for Developers using OWASP ZAP
Filling your AppSec Toolbox - Which Tools, When to Use Them, and Why
JoinSEC 2013 London - ZAP Intro
Integrating security into the application development process
Secure SDLC in mobile software development.
Null singapore - Mobile Security Essentials
Bringing Security Testing to Development: How to Enable Developers to Act as ...
What Every Developer And Tester Should Know About Software Security
CiNPA Security SIG - AppSec Presentation
Automating OWASP Tests in your CI/CD
Building an Open Source AppSec Pipeline - 2015 Texas Linux Fest
Manual JavaScript Analysis Is A Bug
Myths and Misperceptions of Open Source Security
OWASP 2014 AppSec EU ZAP Advanced Features
AppSec DC 2019 ASVS 4.0 Final.pptx
AppSec DC 2019 ASVS 4.0 Final.pptx

OpenSourceSecurityTools - UPDATED

  • 2. Sparsh Raj Application Security @ Box Open Source Security Assessment Tools
  • 3. There IS free breakfast! Key Takeaways Security is easy when done right Basic Web Application vulnerability assessment Basic Mobile (Android and iOS) vulnerability assessment 1 2 3 4 5 Basic network vulnerability assessment
  • 4. Why use any security assessment tool during SDLC? Agenda Overview What do you need to assess (secure)? Web Application Security Assessment Tool – OWASP ZAP Android Application Security Assessment Tool - Qark iOS Application Security Assessment Tool - Needle 1 2 3 4 5 6 Questions?7 Network Security Assessment tool - OpenVAS
  • 5. Why use any security assessment tool? • Detecting “low-hanging fruits” before release • Detection of vulnerabilities in early development phase • Open Source Tools: ‒ Free!! Image Source: Kaspersky Security Bulletin 2015 Distribution of exploits used in cyberattacks, by type of application attacked, 2015
  • 6. What do you need to assess (secure)? • Network • Web application • Mobile Application ‒ Android ‒ iOS
  • 7. Network Security Assessment tool - OpenVAS • Open Vulnerability Assessment System • Network Vulnerability Tests (NVTs) • Simple to install and use • Web interface ‒ Launch scans ‒ View reports • Alternatives: Nessus, nmap • Get Started! : OpenVAS setup and start guide
  • 10. Network Security Assessment tool - OpenVAS
  • 11. Network Security Assessment tool - OpenVAS
  • 12. Network Security Assessment tool - OpenVAS
  • 13. Network Security Assessment tool - OpenVAS Sample Report Index Page Sample Report Summary
  • 14. Network Security Assessment tool - OpenVAS Sample Report Common Vulns Sample Report Vuln Overview
  • 15. Web Application Security Assessment Tool – OWASP ZAP • Ideal for devs, esp. for automated security tests • Cross platform, easy to install and use • Main features: Intercepting Proxy, Traditional and Ajax Spiders, WebSockets support, Forced Browsing (DirBuster), Fuzzing etc. • Point-n-shoot • Plug-n-hack add-on • Get started !! : Zed Attack Proxy
  • 16. Web Application Security Assessment Tool – OWASP ZAP
  • 17. Android Application Security Assessment Tool - Qark • Quick Android Review Kit (created by LinkedIn) • Some important vulns QARK finds: ‒ Apps supporting outdated API versions, with known vulnerabilities ‒ Tapjacking ‒ Activities which may leak data ‒ …and many more. • QARK GitHub
  • 18. Android Application Security Assessment Tool - Qark
  • 19. iOS Application Security Assessment Tool - Needle • By MWR Labs • Easy to add python modules • Covers areas: ‒ data storage ‒ inter-process communication ‒ network communications ‒ static code analysis • Needle quick intro link
  • 20. iOS Application Security Assessment Tool - Needle
  • 21. iOS Application Security Assessment Tool - Needle
  • 22. iOS Application Security Assessment Tool - Needle
  • 23. Conclusions: Use OpenVAS to find network vulnerabilities Use OWASP Zap to find web app vulnerabilities Use Needle to find iOS app vulnerabilities Use Box for the most awesome and secure platform 1 2 3 4 5 Use QARK to find Android app vulnerabilities
  • 24. Why use any security assessment tool during SDLC? Agenda Overview What do you need to assess (secure)? Web Application Security Assessment Tool – OWASP ZAP Android Application Security Assessment Tool - Qark iOS Application Security Assessment Tool - Needle 1 2 3 4 5 6 Questions?7 Network Security Assessment tool - OpenVAS

Editor's Notes

  • #3: Add a key-takeaways slide and a conclusion slide
  • #6: Low hanging fruits – very simple vulnerabilities which can be easy to fix but can have disastrous consequences. Requires lower set skills by a malicious user to exploit. Open source advantages: They are FREE! Exploits contributions from all around Flexibility Community support Documentation
  • #8: Scanners have the capability to cause disruption. It is safer to run these tools in dev rather than prod. Or configuration must match what the prod can handle (?) We have tuned these scanners to run on prod. Type of vulns found: bad network configurations such as an open telnet port on the main server unpatched host OS and libraries with known exploits data leakage from back end by methods such as brute forcing
  • #9: First screen you add a “Task” which is basically a scan that you want to run in next few steps you configure the scan or Task
  • #10: Scanners have the capability to cause disruption. It is safer to run these tools in dev rather than prod. Or configuration must match what the prod can handle (?) We have tuned these scanners to run on prod. Choose the configuration wisely If in doubt it is always safe to go easy
  • #11: Specify targets – it could be just one web server that is supporting your app or multiple ones
  • #12: Once the task is added, you can start the scan by clicking the Play button
  • #13: You can track the progress as the scan finishes
  • #14: The report variety range from very executive to very techincal type of report can be selected depending on the needs
  • #15: Reports are breakdown of individual hosts or vulnerabilities most of these tools offer recommendations on fixing the vulnerabilities found a word of caution here: these recomms are VERY generic taking these recommendation more as a guideline to fix the vulnerability than the fix itself is a safe option
  • #16: Talk a little OWASP Open Web Application Security Project (or OWASP for short). The Open Web Application Security Project (OWASP) is a worldwide not-for-profit charitable organization focused on improving the security of software. very well contributed organisation Vulns found: web application vunerabilities like XSS, SQLi, CSRF, bad cookie handling such as no secure flag bad session handling All these are generally easy to fix but difficult to spot
  • #17: A small demo Enter the URL of your web application (point and attack) Highly customizable – plugins can be written
  • #18: Decompiles Android apps to raw source code No rooted device needed Vulns it finds: old unsupported api versions with known exploits activites that can leak data tapjacking - Like ClickJacking on the web, TapJackingoccurs when a malicious application displays a fake user interface that seems like it can be interacted with, but actually passes interaction events such as finger taps to a hidden user interface behind it.
  • #19: I will leave the full video available for a more step by step instruction and walk through Due to time contraints I will be skipping some sections here though. Launch and selecting the apk – 0:00 to 0:06 Decompiling the apk – 0:36 Performing basic vulnerability checks - 2:57 Basic report that is generate – 5:28
  • #20: Jailbroken device needed!!!!
  • #21: The "show modules" command can be used to list all the modules currently available in the framework.
  • #22: Once selected, the "info" command can be used to show details of a particular module. Very similar to metasploit
  • #23: When all the options are set as preferred, the "run" command can be used to start the module's execution. If a target app has not been selected yet (with the global option "TARGET_APP" still unset), Needle will first launch a wizard that will help the user in selecting a target.