SlideShare a Scribd company logo
© 2016 Denim Group – All Rights Reserved
Optimizing Your Application
Security Program with
Netsparker and ThreadFix
October 19, 2016
Ferruh Mavituna
Product Architect and CEO, Netsparker Ltd.
Dan Cornell
CTO, Denim Group
© 2016 Denim Group – All Rights Reserved
Agenda
• State of Application Security
• Netsparker Overview
• ThreadFix Overview
• ThreadFix / Netsparker Integration
1
© 2016 Denim Group – All Rights Reserved
2
© 2016 Denim Group – All Rights Reserved
Netsparker automatically finds and reports security
issues in web sites and web services.
Automated Web
Application Security
Netsparker Desktop
Windows only software, easy to install and use.
Netsparker Cloud
SaaS version of Netsparker. Uses the very same
engine, scalable and comes with enterprise features.
3
© 2016 Denim Group – All Rights Reserved
Netsparker Desktop
Windows Software
It simulates a real attacker to find
vulnerabilities in web applications
automatically.
Allows users to carry out advanced
security tasks and especially useful for
security consultants and in house
security teams.
4
© 2016 Denim Group – All Rights Reserved
Supports
Authentication
Netsparker’s Core Features
Ease of Use
Supports Modern
Web
Proof Based
Scanning
Integrated Exploitation
Supports
Mobile/Web Services
uniquefeature
5
© 2016 Denim Group – All Rights Reserved
Netsparker Cloud
Netsparker Cloud
Netsparker – Scalable, can scan
thousands of websites within hours.
Designed for enterprises, big teams and
big datasets in mind.
API for integrating with other solutions,
internal products.
On-premises or managed.
Scalable
Designed for
Enterprise
API
uniquefeature
6
© 2016 Denim Group – All Rights Reserved
Security Testing
Process
7
© 2016 Denim Group – All Rights Reserved
Automated Security Testing Process
2
3
Configure Custom 404, Authentication, URL
Rewrite Rules etc.1
Configure and Start the Scan
If there is a Local File Inclusion, exploit it safely to see that LFI is real and
not a False Positive, if it’s SQL Injection, safely read data from the
database. Repeat this for every vulnerability to eliminate false positives.
Check if the results are correct
Prioritize important issues, communicate with the developers and make
necessary changes. Deploy the new version of the application and Re-
test.
Take Action
8
© 2016 Denim Group – All Rights Reserved
Process with Netsparker & ThreadFix
2
3
URL Rewrite, will be discovered dynamically, Custom 404 will be
handled automatically, authentication only requires you to enter URL,
username and password. Supports SPA (Single Page Applications)
automatically.
1
Start your scan quickly
Netsparker will give you the proof
Now you know which vulnerabilities are real, without spending any more
time on them, pass them to your development team to start addressing
these issues immediately.
You don’t want to leave your website exposed during this process. Now
import these issues into ThreadFix and generate rules for your WAF
without worrying about False Positives!
Take Action
Proof Based
Scanning
Get the results with proof. If there is a SQL Injection, Netsparker will
extract some data from the target web application’s database, if there
is a LFI, Netsparker will give you a file from the target system etc. This
applies to all direct impact vulnerabilities.
9
© 2016 Denim Group – All Rights Reserved
Proof Based Scanning
False Positive or not?
10
© 2016 Denim Group – All Rights Reserved
A scanner you can
{ }
11
© 2016 Denim Group – All Rights Reserved
Scalability
How can you scan 1,000 applications? More importantly how can you address 10,000 issues in
these applications?
12
© 2016 Denim Group – All Rights Reserved
Netsparker Cloud & ThreadFix
In 24 Hours you can find & hot-patch
10,000 vulnerabilities
Netsparker Cloud can scan thousands of
websites under 24 hours.
API
Import the results to ThreadFix
Because results will be clearly flagged as
CONFIRMED and 100% real, now you can
just generate WAF rules without
worrying about False Positives.
Congratulations you have improved the state of your web application security
significantly just under 24 hours.
You still need to fix all these issues and not rely on WAF but the improvement will
be huge.
13
© 2016 Denim Group – All Rights Reserved
ThreadFix Overview
• Create a consolidated view of your
applications and vulnerabilities
• Prioritize application risk decisions based on data
• Reduce risk and provide protection via virtual
patching
• Translate vulnerabilities to developers in the tools
they are already using
14
© 2016 Denim Group – All Rights Reserved
ThreadFix Overview
15
© 2016 Denim Group – All Rights Reserved
Create a consolidated
view of your
applications and
vulnerabilities
16
© 2016 Denim Group – All Rights Reserved
Application Portfolio Tracking
17
© 2016 Denim Group – All Rights Reserved
Vulnerability Import
18
© 2016 Denim Group – All Rights Reserved
Vulnerability Consolidation
19
© 2016 Denim Group – All Rights Reserved
Prioritize application risk
decisions based on data
20
© 2016 Denim Group – All Rights Reserved
Vulnerability Prioritization
21
© 2016 Denim Group – All Rights Reserved
Reporting and Metrics
22
© 2016 Denim Group – All Rights Reserved
Reduce risk and
provide protection
via virtual patching
23
© 2016 Denim Group – All Rights Reserved
WAF Virtual Patching
24
© 2016 Denim Group – All Rights Reserved
Translate vulnerabilities to
developers in the tools they
are already using
25
© 2016 Denim Group – All Rights Reserved
Defect Tracker Integration
26
© 2016 Denim Group – All Rights Reserved
Questions and Contact
ThreadFix
www.threadfix.it
Netsparker
www.netsparker.com
27

More Related Content

PDF
Running a Comprehensive Application Security Program with Checkmarx and Threa...
PDF
ThreadFix and SD Elements Unifying Security Requirements and Vulnerability Ma...
PDF
Running a High-Efficiency, High-Visibility Application Security Program with...
PDF
Create a Unified View of Your Application Security Program – Black Duck Hub a...
PDF
Clear AppSec Visibility with AppSpider and ThreadFix
PDF
Achieving Software Assurance with Hybrid Analysis Mapping
PDF
What a locked down law firm looks like updated
PDF
ThreadFix 2.4: Maximizing the Impact of Your Application Security Resources
Running a Comprehensive Application Security Program with Checkmarx and Threa...
ThreadFix and SD Elements Unifying Security Requirements and Vulnerability Ma...
Running a High-Efficiency, High-Visibility Application Security Program with...
Create a Unified View of Your Application Security Program – Black Duck Hub a...
Clear AppSec Visibility with AppSpider and ThreadFix
Achieving Software Assurance with Hybrid Analysis Mapping
What a locked down law firm looks like updated
ThreadFix 2.4: Maximizing the Impact of Your Application Security Resources

What's hot (20)

PDF
ThreadFix 2.1 and Your Application Security Program
PDF
A New View of Your Application Security Program with Snyk and ThreadFix
PDF
Running a Software Security Program with Open Source Tools (Course)
PDF
Waratek ISACA Webinar
PPSX
Waratek presentation for RANT November 2016
PDF
Waratek Securing Red Hat JBoss from the Inside Out
PDF
ThreadFix 2.2 Preview Webinar with Dan Cornell
PDF
Managing Your Application Security Program with the ThreadFix Ecosystem
PPTX
Building an AppSec Pipeline: Keeping your program, and your life, sane
PDF
Structuring and Scaling an Application Security Program
PDF
Waratek overview 2016
PDF
Mobile Application Assessment - Don't Cheat Yourself
PPTX
Empowering Application Security Protection in the World of DevOps
PDF
Secure DevOps with ThreadFix 2.3
PDF
SecDevOps: Development Tools for Security Pros
PDF
Running a Software Security Program with Open Source Tools
PDF
Monitoring Application Attack Surface to Integrate Security into DevOps Pipel...
PDF
Using ThreadFix to Manage Application Vulnerabilities
PDF
Mobile Application Assessment By the Numbers: a Whole-istic View
PDF
AWS live hack: Atlassian + Snyk OSS on AWS
ThreadFix 2.1 and Your Application Security Program
A New View of Your Application Security Program with Snyk and ThreadFix
Running a Software Security Program with Open Source Tools (Course)
Waratek ISACA Webinar
Waratek presentation for RANT November 2016
Waratek Securing Red Hat JBoss from the Inside Out
ThreadFix 2.2 Preview Webinar with Dan Cornell
Managing Your Application Security Program with the ThreadFix Ecosystem
Building an AppSec Pipeline: Keeping your program, and your life, sane
Structuring and Scaling an Application Security Program
Waratek overview 2016
Mobile Application Assessment - Don't Cheat Yourself
Empowering Application Security Protection in the World of DevOps
Secure DevOps with ThreadFix 2.3
SecDevOps: Development Tools for Security Pros
Running a Software Security Program with Open Source Tools
Monitoring Application Attack Surface to Integrate Security into DevOps Pipel...
Using ThreadFix to Manage Application Vulnerabilities
Mobile Application Assessment By the Numbers: a Whole-istic View
AWS live hack: Atlassian + Snyk OSS on AWS
Ad

Viewers also liked (15)

PPT
Guvenli Flash Uygulamalari
PPT
Web 2.0 Guvenlik Trendleri
PDF
Laravel ile Hızlı ve Modern Web Programlama, Ömer Çıtak
DOC
POC-Netsparker
PDF
One Click Ownage Ferruh Mavituna (3)
PDF
Application Security Management with ThreadFix
PDF
OWTG 2016, Web Çatı Şablonlarının Güvenliği (SSTI), Ömer Çıtak
PDF
Tutorial Hacker
PPT
How To Detect Xss
PPTX
Fortify - Source Code Analyzer
PDF
The ABCs of Source-Assisted Web Application Penetration Testing With OWASP ZA...
PDF
Monitoring Attack Surface to Secure DevOps Pipelines
PDF
ABAP Qualitäts-Benchmark: Eine Analyse von über 200 SAP Installationen
PDF
Web Servislerinin Hacklenmesi, Ömer Çıtak
PPSX
Web Tarayıcılarının Evrimi
Guvenli Flash Uygulamalari
Web 2.0 Guvenlik Trendleri
Laravel ile Hızlı ve Modern Web Programlama, Ömer Çıtak
POC-Netsparker
One Click Ownage Ferruh Mavituna (3)
Application Security Management with ThreadFix
OWTG 2016, Web Çatı Şablonlarının Güvenliği (SSTI), Ömer Çıtak
Tutorial Hacker
How To Detect Xss
Fortify - Source Code Analyzer
The ABCs of Source-Assisted Web Application Penetration Testing With OWASP ZA...
Monitoring Attack Surface to Secure DevOps Pipelines
ABAP Qualitäts-Benchmark: Eine Analyse von über 200 SAP Installationen
Web Servislerinin Hacklenmesi, Ömer Çıtak
Web Tarayıcılarının Evrimi
Ad

Similar to Optimizing Your Application Security Program with Netsparker and ThreadFix (20)

PDF
Managing Penetration Testing Programs and Vulnerability Time to Live with Thr...
PPTX
Thread Fix Tour Presentation Final Final
PDF
Assessing Business Operations Risk With Unified Vulnerability Management in T...
PDF
Optimize Your Security Program with ThreadFix 2.7
PDF
Application Asset Management with ThreadFix
PDF
Enabling Developers in Your Application Security Program With Coverity and Th...
PDF
Enabling Developers in Your Application Security Program With Coverity and Th...
PDF
Benchmarking Web Application Scanners for YOUR Organization
PPTX
Continuous Authority to Operate (ATO) with ThreadFix – Bringing Commercial In...
PDF
The Self Healing Cloud: Protecting Applications and Infrastructure with Autom...
PDF
Hybrid Analysis Mapping: Making Security and Development Tools Play Nice Toge...
PDF
ThreadFix 2.5 Webinar
PPTX
Netsparker - Hosting Zirvesi 2010
PDF
Using Collaboration to Make Application Vulnerability Management a Team Sport
PDF
Software Security for Project Managers: What Do You Need To Know?
PDF
AppSec Fast and Slow: Your DevSecOps CI/CD Pipeline Isn’t an SSA Program
PDF
RSA 2015 Blending the Automated and the Manual: Making Application Vulnerabil...
PDF
DACHNUG50 HCL BigFix_Keynote.pdf
PDF
Skeletons in the Closet: Securing Inherited Applications
PDF
HCL BigFix - DNUG Stammtisch Salzburg
Managing Penetration Testing Programs and Vulnerability Time to Live with Thr...
Thread Fix Tour Presentation Final Final
Assessing Business Operations Risk With Unified Vulnerability Management in T...
Optimize Your Security Program with ThreadFix 2.7
Application Asset Management with ThreadFix
Enabling Developers in Your Application Security Program With Coverity and Th...
Enabling Developers in Your Application Security Program With Coverity and Th...
Benchmarking Web Application Scanners for YOUR Organization
Continuous Authority to Operate (ATO) with ThreadFix – Bringing Commercial In...
The Self Healing Cloud: Protecting Applications and Infrastructure with Autom...
Hybrid Analysis Mapping: Making Security and Development Tools Play Nice Toge...
ThreadFix 2.5 Webinar
Netsparker - Hosting Zirvesi 2010
Using Collaboration to Make Application Vulnerability Management a Team Sport
Software Security for Project Managers: What Do You Need To Know?
AppSec Fast and Slow: Your DevSecOps CI/CD Pipeline Isn’t an SSA Program
RSA 2015 Blending the Automated and the Manual: Making Application Vulnerabil...
DACHNUG50 HCL BigFix_Keynote.pdf
Skeletons in the Closet: Securing Inherited Applications
HCL BigFix - DNUG Stammtisch Salzburg

More from Denim Group (20)

PDF
Long-term Impact of Log4J
PDF
Threat Modeling the CI/CD Pipeline to Improve Software Supply Chain Security ...
PDF
Threat Modeling the CI/CD Pipeline to Improve Software Supply Chain Security ...
PDF
Optimizing Security Velocity in Your DevSecOps Pipeline at Scale
PDF
OWASP San Antonio Meeting 10/2/20
PDF
Security Champions: Pushing Security Expertise to the Edges of Your Organization
PDF
The As, Bs, and Four Cs of Testing Cloud-Native Applications
PDF
An Updated Take: Threat Modeling for IoT Systems
PDF
AppSec in a World of Digital Transformation
PDF
The As, Bs, and Four Cs of Testing Cloud-Native Applications
PDF
AppSec in a World of Digital Transformation
PDF
Enumerating Enterprise Attack Surface
PDF
Enumerating Enterprise Attack Surface
PDF
An OWASP SAMM Perspective on Serverless Computing
PDF
Application Security Testing for a DevOps Mindset
PDF
Reducing Attack Surface in Budget Constrained Environments
PDF
Securing Voting Infrastructure before the Mid-Term Elections
PDF
Threat Modeling for IoT Systems
PDF
Understanding IoT Security: How to Quantify Security Risk of IoT Technologies
PDF
How to Integrate AppSec Testing into your DevOps Program
Long-term Impact of Log4J
Threat Modeling the CI/CD Pipeline to Improve Software Supply Chain Security ...
Threat Modeling the CI/CD Pipeline to Improve Software Supply Chain Security ...
Optimizing Security Velocity in Your DevSecOps Pipeline at Scale
OWASP San Antonio Meeting 10/2/20
Security Champions: Pushing Security Expertise to the Edges of Your Organization
The As, Bs, and Four Cs of Testing Cloud-Native Applications
An Updated Take: Threat Modeling for IoT Systems
AppSec in a World of Digital Transformation
The As, Bs, and Four Cs of Testing Cloud-Native Applications
AppSec in a World of Digital Transformation
Enumerating Enterprise Attack Surface
Enumerating Enterprise Attack Surface
An OWASP SAMM Perspective on Serverless Computing
Application Security Testing for a DevOps Mindset
Reducing Attack Surface in Budget Constrained Environments
Securing Voting Infrastructure before the Mid-Term Elections
Threat Modeling for IoT Systems
Understanding IoT Security: How to Quantify Security Risk of IoT Technologies
How to Integrate AppSec Testing into your DevOps Program

Recently uploaded (20)

PDF
cuic standard and advanced reporting.pdf
PDF
Assigned Numbers - 2025 - Bluetooth® Document
PPTX
MYSQL Presentation for SQL database connectivity
PDF
A comparative analysis of optical character recognition models for extracting...
PPTX
20250228 LYD VKU AI Blended-Learning.pptx
PDF
Per capita expenditure prediction using model stacking based on satellite ima...
PDF
Building Integrated photovoltaic BIPV_UPV.pdf
PDF
Review of recent advances in non-invasive hemoglobin estimation
PPTX
ACSFv1EN-58255 AWS Academy Cloud Security Foundations.pptx
PPTX
KOM of Painting work and Equipment Insulation REV00 update 25-dec.pptx
PDF
NewMind AI Weekly Chronicles - August'25-Week II
PDF
Unlocking AI with Model Context Protocol (MCP)
PDF
Dropbox Q2 2025 Financial Results & Investor Presentation
PPTX
Programs and apps: productivity, graphics, security and other tools
PDF
Blue Purple Modern Animated Computer Science Presentation.pdf.pdf
PPT
“AI and Expert System Decision Support & Business Intelligence Systems”
DOCX
The AUB Centre for AI in Media Proposal.docx
PDF
Mobile App Security Testing_ A Comprehensive Guide.pdf
PPT
Teaching material agriculture food technology
PPTX
Machine Learning_overview_presentation.pptx
cuic standard and advanced reporting.pdf
Assigned Numbers - 2025 - Bluetooth® Document
MYSQL Presentation for SQL database connectivity
A comparative analysis of optical character recognition models for extracting...
20250228 LYD VKU AI Blended-Learning.pptx
Per capita expenditure prediction using model stacking based on satellite ima...
Building Integrated photovoltaic BIPV_UPV.pdf
Review of recent advances in non-invasive hemoglobin estimation
ACSFv1EN-58255 AWS Academy Cloud Security Foundations.pptx
KOM of Painting work and Equipment Insulation REV00 update 25-dec.pptx
NewMind AI Weekly Chronicles - August'25-Week II
Unlocking AI with Model Context Protocol (MCP)
Dropbox Q2 2025 Financial Results & Investor Presentation
Programs and apps: productivity, graphics, security and other tools
Blue Purple Modern Animated Computer Science Presentation.pdf.pdf
“AI and Expert System Decision Support & Business Intelligence Systems”
The AUB Centre for AI in Media Proposal.docx
Mobile App Security Testing_ A Comprehensive Guide.pdf
Teaching material agriculture food technology
Machine Learning_overview_presentation.pptx

Optimizing Your Application Security Program with Netsparker and ThreadFix

  • 1. © 2016 Denim Group – All Rights Reserved Optimizing Your Application Security Program with Netsparker and ThreadFix October 19, 2016 Ferruh Mavituna Product Architect and CEO, Netsparker Ltd. Dan Cornell CTO, Denim Group
  • 2. © 2016 Denim Group – All Rights Reserved Agenda • State of Application Security • Netsparker Overview • ThreadFix Overview • ThreadFix / Netsparker Integration 1
  • 3. © 2016 Denim Group – All Rights Reserved 2
  • 4. © 2016 Denim Group – All Rights Reserved Netsparker automatically finds and reports security issues in web sites and web services. Automated Web Application Security Netsparker Desktop Windows only software, easy to install and use. Netsparker Cloud SaaS version of Netsparker. Uses the very same engine, scalable and comes with enterprise features. 3
  • 5. © 2016 Denim Group – All Rights Reserved Netsparker Desktop Windows Software It simulates a real attacker to find vulnerabilities in web applications automatically. Allows users to carry out advanced security tasks and especially useful for security consultants and in house security teams. 4
  • 6. © 2016 Denim Group – All Rights Reserved Supports Authentication Netsparker’s Core Features Ease of Use Supports Modern Web Proof Based Scanning Integrated Exploitation Supports Mobile/Web Services uniquefeature 5
  • 7. © 2016 Denim Group – All Rights Reserved Netsparker Cloud Netsparker Cloud Netsparker – Scalable, can scan thousands of websites within hours. Designed for enterprises, big teams and big datasets in mind. API for integrating with other solutions, internal products. On-premises or managed. Scalable Designed for Enterprise API uniquefeature 6
  • 8. © 2016 Denim Group – All Rights Reserved Security Testing Process 7
  • 9. © 2016 Denim Group – All Rights Reserved Automated Security Testing Process 2 3 Configure Custom 404, Authentication, URL Rewrite Rules etc.1 Configure and Start the Scan If there is a Local File Inclusion, exploit it safely to see that LFI is real and not a False Positive, if it’s SQL Injection, safely read data from the database. Repeat this for every vulnerability to eliminate false positives. Check if the results are correct Prioritize important issues, communicate with the developers and make necessary changes. Deploy the new version of the application and Re- test. Take Action 8
  • 10. © 2016 Denim Group – All Rights Reserved Process with Netsparker & ThreadFix 2 3 URL Rewrite, will be discovered dynamically, Custom 404 will be handled automatically, authentication only requires you to enter URL, username and password. Supports SPA (Single Page Applications) automatically. 1 Start your scan quickly Netsparker will give you the proof Now you know which vulnerabilities are real, without spending any more time on them, pass them to your development team to start addressing these issues immediately. You don’t want to leave your website exposed during this process. Now import these issues into ThreadFix and generate rules for your WAF without worrying about False Positives! Take Action Proof Based Scanning Get the results with proof. If there is a SQL Injection, Netsparker will extract some data from the target web application’s database, if there is a LFI, Netsparker will give you a file from the target system etc. This applies to all direct impact vulnerabilities. 9
  • 11. © 2016 Denim Group – All Rights Reserved Proof Based Scanning False Positive or not? 10
  • 12. © 2016 Denim Group – All Rights Reserved A scanner you can { } 11
  • 13. © 2016 Denim Group – All Rights Reserved Scalability How can you scan 1,000 applications? More importantly how can you address 10,000 issues in these applications? 12
  • 14. © 2016 Denim Group – All Rights Reserved Netsparker Cloud & ThreadFix In 24 Hours you can find & hot-patch 10,000 vulnerabilities Netsparker Cloud can scan thousands of websites under 24 hours. API Import the results to ThreadFix Because results will be clearly flagged as CONFIRMED and 100% real, now you can just generate WAF rules without worrying about False Positives. Congratulations you have improved the state of your web application security significantly just under 24 hours. You still need to fix all these issues and not rely on WAF but the improvement will be huge. 13
  • 15. © 2016 Denim Group – All Rights Reserved ThreadFix Overview • Create a consolidated view of your applications and vulnerabilities • Prioritize application risk decisions based on data • Reduce risk and provide protection via virtual patching • Translate vulnerabilities to developers in the tools they are already using 14
  • 16. © 2016 Denim Group – All Rights Reserved ThreadFix Overview 15
  • 17. © 2016 Denim Group – All Rights Reserved Create a consolidated view of your applications and vulnerabilities 16
  • 18. © 2016 Denim Group – All Rights Reserved Application Portfolio Tracking 17
  • 19. © 2016 Denim Group – All Rights Reserved Vulnerability Import 18
  • 20. © 2016 Denim Group – All Rights Reserved Vulnerability Consolidation 19
  • 21. © 2016 Denim Group – All Rights Reserved Prioritize application risk decisions based on data 20
  • 22. © 2016 Denim Group – All Rights Reserved Vulnerability Prioritization 21
  • 23. © 2016 Denim Group – All Rights Reserved Reporting and Metrics 22
  • 24. © 2016 Denim Group – All Rights Reserved Reduce risk and provide protection via virtual patching 23
  • 25. © 2016 Denim Group – All Rights Reserved WAF Virtual Patching 24
  • 26. © 2016 Denim Group – All Rights Reserved Translate vulnerabilities to developers in the tools they are already using 25
  • 27. © 2016 Denim Group – All Rights Reserved Defect Tracker Integration 26
  • 28. © 2016 Denim Group – All Rights Reserved Questions and Contact ThreadFix www.threadfix.it Netsparker www.netsparker.com 27