SlideShare a Scribd company logo
By:
Cyberops Infosec
Cyberops Infosec
1
WEB PENETRATION
Session Flow
 What is Vulnerability
 What is Threat?
 What is Web Penetration
 What is OWASP
 OWASP Top 10 Vulnerabilities
Cyberops Infosec
2
WEB PENETRATION
What is Vulnerability
A vulnerability is a flaw or weakness in a system's design, implementation,
operation or management that could be exploited to compromise the system's
security objectives.
Cyberops Infosec
3
WEB PENETRATION
What is Threat
A threat is anything (a malicious external attacker, an internal user, a system
instability, etc) that may harm the assets owned by an application (resources of
value, such as the data in a database or in the file system) by exploiting a
vulnerability.
Cyberops Infosec
4
WEB PENETRATION
What is Web Penetration
A security test is a method of evaluating the security of a computer system or
network by methodically validating and verifying the effectiveness of application
security controls.
Cyberops Infosec
5
WEB PENETRATION
What is OWASP
The Open Web Application Security Project (OWASP) is an open
community dedicated to enabling organizations to develop, purchase, and
maintain applications and APIs that can be trusted.
Cyberops Infosec
6
WEB PENETRATION
OWASP Top 10 – 2017 has evolved:
• 2017-A1 – Injection
• 2017-A2 – Broken Authentication and Session Management
• 2017-A3 –Sensitive Data Exposure
• 2017-A4 – XML External Entities (XXE)
• 2017-A5 – Broken Access Control
• 2017-A6 – Security Misconfiguration
• 2017-A7 – Cross Site Scripting
• 2017-A8 – Insecure Deserialization
• 2017-A9 – Using Component with known Vulnerabilities
• 2017-A10 – Insufficient Logging & Monitoring
Cyberops Infosec
7
WEB PENETRATION
OWASP Top 10 – 2017 has evolved:
• 2017-A1 – Injection
Describe : Injection flaws, such as SQL, NoSQL, OS, and LDAP injection, occur
when untrusted data is sent to an interpreter as part of a command or query.
Impact : The attacker’s hostile data can trick the interpreter into executing
unintended commands or accessing data without proper authorization.
Cyberops Infosec
8
WEB PENETRATION
OWASP Top 10 – 2017 has evolved:
• 2017-A2 – Broken Authentication
Describe : Application functions related to authentication and session
management are often implemented incorrectly by developers.
Impact : Vulnerability allowing attackers to compromise passwords, keys, or
session tokens, or to exploit other implementation flaws to assume other
users’ identities temporarily or permanently.
Cyberops Infosec
9
WEB PENETRATION
OWASP Top 10 – 2017 has evolved:
• 2017-A3 – Sensitive Data Exposure
Describe : Web applications and APIs do not properly protect sensitive data,
such as financial, healthcare, and PII.
Impact : Attackers may steal or modify such weakly protected data to conduct
credit card fraud, identity theft, or other crimes. Sensitive data may be
compromised without extra protection, such as encryption at rest or in transit,
and requires special precautions when exchanged with the browser.
Cyberops Infosec
10
WEB PENETRATION
OWASP Top 10 – 2017 has evolved:
• 2017-A4 – XML External Entities (XSS)
Describe : Many older or poorly configured XML processors evaluate external
entity references within XML documents.
Impact : External entities can be used to disclose internal files using the file URI
handler, internal file shares, internal port scanning, remote code execution,
and denial of service attacks.
Cyberops Infosec
11
WEB PENETRATION
OWASP Top 10 – 2017 has evolved:
• 2017-A5 – Broken Access Control
Describe : Restrictions on what authenticated users are allowed to do are often
not properly enforced.
Impact : Attackers can exploit these flaws to access unauthorized functionality
and/or data, such as access other users' accounts, view sensitive files, modify
other users’ data, change access rights, etc.
Cyberops Infosec
12
WEB PENETRATION
OWASP Top 10 – 2017 has evolved:
• 2017-A6 – Security Misconfiguration
Describe : Security misconfiguration is the most commonly seen issue. This is
commonly a result of insecure default configurations, incomplete or ad hoc
configurations, open cloud storage, misconfigured HTTP headers, and verbose
error messages containing sensitive information.
Impact : Due to security misconfiguration all data, packages and messages can
be compromised.
Cyberops Infosec
13
WEB PENETRATION
OWASP Top 10 – 2017 has evolved:
• 2017-A7 – Cross Site Scripting
Describe : XSS flaws occur whenever an application includes untrusted data in
a new web page without proper validation or escaping, or updates an existing
web page with user-supplied data using a browser API that can create HTML or
JavaScript.
Impact : XSS allows attackers to execute scripts in the victim’s browser which
can hijack user sessions, deface web sites, or redirect the user to malicious
sites.
Cyberops Infosec
14
WEB PENETRATION
OWASP Top 10 – 2017 has evolved:
• 2017-A8 – Insecure Deserialization
Describe : Insecure deserialization often leads to remote code execution.
Impact : If deserialization flaws do not result in remote code execution, they
can be used to perform attacks, including replay attacks,
Cyberops Infosec
15
WEB PENETRATION
OWASP Top 10 – 2017 has evolved:
• 2017-A9 – Using Components with known vulnerabilities
Describe : Components, such as libraries, frameworks, and other software
modules, run with the same privileges as the application.
Impact : If a vulnerable component is exploited, such an attack can facilitate
serious data loss or server takeover. Applications and APIs using components
with known
Cyberops Infosec
16
WEB PENETRATION
OWASP Top 10 – 2017 has evolved:
• 2017-A10 – Insufficient Logging & Monitoring
Describe : Insufficient logging and monitoring, coupled with missing or
ineffective integration with incident response, allows attackers to further
attack systems, maintain persistence, pivot to more systems, and tamper,
extract, or destroy data.
Impact : Most breach studies show time to detect a breach is over 200 days,
typically detected by external parties rather than internal processes or
monitoring.
Cyberops Infosec
17
Thank
You
Cyberops Infosec
18

More Related Content

PPTX
PPTX
OWASP -Top 5 Jagjit
PPTX
Owasp top 10 2017
PPTX
Owasp top 10 web application security risks 2017
PPTX
Owasp 2017 oveview
PPTX
OWASP Top 10 2017 - New Vulnerabilities
PDF
Owasp top 10
PPT
Owasp Top 10
OWASP -Top 5 Jagjit
Owasp top 10 2017
Owasp top 10 web application security risks 2017
Owasp 2017 oveview
OWASP Top 10 2017 - New Vulnerabilities
Owasp top 10
Owasp Top 10

What's hot (20)

PDF
OWASP Top 10 - 2017
PDF
OWASP Top 10 2017
PDF
OWASP TOP 10 & .NET
PPTX
Web Application Vulnerabilities
PDF
Benefits of Web Application Firewall
PPTX
Anatomy of an Attack - Sophos Day Belux 2014
PDF
OWASP Top 10 Project
PPTX
PPTX
Owasp top 10 security threats
PPTX
Owasp top 10 vulnerabilities
PDF
The New OWASP Top Ten: Let's Cut to the Chase
PPTX
OWASP Top 10 - 2017 Top 10 web application security risks
PDF
Oh, WASP! Security Essentials for Web Apps
PPTX
Web Application Firewall (WAF) DAST/SAST combination
PPTX
Beyond the OWASP Top 10
PPTX
Infosec for web apps 2014_18november2014
PPTX
OWASP Top 10 2017 rc1 - The Ten Most Critical Web Application Security Risks
PDF
Web Application Security 101
PPTX
Web Application Security 101
PDF
Web Application Security and Awareness
OWASP Top 10 - 2017
OWASP Top 10 2017
OWASP TOP 10 & .NET
Web Application Vulnerabilities
Benefits of Web Application Firewall
Anatomy of an Attack - Sophos Day Belux 2014
OWASP Top 10 Project
Owasp top 10 security threats
Owasp top 10 vulnerabilities
The New OWASP Top Ten: Let's Cut to the Chase
OWASP Top 10 - 2017 Top 10 web application security risks
Oh, WASP! Security Essentials for Web Apps
Web Application Firewall (WAF) DAST/SAST combination
Beyond the OWASP Top 10
Infosec for web apps 2014_18november2014
OWASP Top 10 2017 rc1 - The Ten Most Critical Web Application Security Risks
Web Application Security 101
Web Application Security 101
Web Application Security and Awareness
Ad

Similar to Owasp top 10 Vulnerabilities by cyberops infosec (20)

PDF
Web hackingtools 2015
PDF
Web hackingtools 2015
PPT
Owasp top 10 & Web vulnerabilities
PPTX
Security risks awareness
PPTX
Web Application Penetration
PDF
Secure coding guidelines
PPT
OWASP App Sec US - 2010
PDF
Web hackingtools cf-summit2014
PDF
Ofer Maor - OWASP Top 10
PDF
OWASP Top Ten 2013
PPTX
OWASP Top 10 Vulnerabilities 2017- AppTrana
PDF
Owasp top 10 2013
PDF
Owasp top 10_-_2013
PDF
Owasp top 10 2013
PDF
Top 10 web application security risks akash mahajan
PDF
Owasp Top 10
PPT
30ITSecurityThreatsVulnerabilitiesandCountermeasuresV1.ppt
PDF
529 owasp top 10 2013 - rc1[1]
PDF
529 owasp top 10 2013 - rc1[1]
PDF
Security Awareness
Web hackingtools 2015
Web hackingtools 2015
Owasp top 10 & Web vulnerabilities
Security risks awareness
Web Application Penetration
Secure coding guidelines
OWASP App Sec US - 2010
Web hackingtools cf-summit2014
Ofer Maor - OWASP Top 10
OWASP Top Ten 2013
OWASP Top 10 Vulnerabilities 2017- AppTrana
Owasp top 10 2013
Owasp top 10_-_2013
Owasp top 10 2013
Top 10 web application security risks akash mahajan
Owasp Top 10
30ITSecurityThreatsVulnerabilitiesandCountermeasuresV1.ppt
529 owasp top 10 2013 - rc1[1]
529 owasp top 10 2013 - rc1[1]
Security Awareness
Ad

Recently uploaded (20)

PPTX
Module 1 - Cyber Law and Ethics 101.pptx
PPT
tcp ip networks nd ip layering assotred slides
PPTX
SAP Ariba Sourcing PPT for learning material
PDF
Cloud-Scale Log Monitoring _ Datadog.pdf
PDF
Sims 4 Historia para lo sims 4 para jugar
PPTX
Funds Management Learning Material for Beg
PPTX
Job_Card_System_Styled_lorem_ipsum_.pptx
PPTX
CHE NAA, , b,mn,mblblblbljb jb jlb ,j , ,C PPT.pptx
PPTX
Power Point - Lesson 3_2.pptx grad school presentation
PPTX
presentation_pfe-universite-molay-seltan.pptx
PDF
Vigrab.top – Online Tool for Downloading and Converting Social Media Videos a...
PDF
Introduction to the IoT system, how the IoT system works
PDF
How to Ensure Data Integrity During Shopify Migration_ Best Practices for Sec...
PDF
Unit-1 introduction to cyber security discuss about how to secure a system
PPTX
PptxGenJS_Demo_Chart_20250317130215833.pptx
PDF
RPKI Status Update, presented by Makito Lay at IDNOG 10
PDF
An introduction to the IFRS (ISSB) Stndards.pdf
PPTX
Introduction about ICD -10 and ICD11 on 5.8.25.pptx
PPTX
INTERNET------BASICS-------UPDATED PPT PRESENTATION
DOCX
Unit-3 cyber security network security of internet system
Module 1 - Cyber Law and Ethics 101.pptx
tcp ip networks nd ip layering assotred slides
SAP Ariba Sourcing PPT for learning material
Cloud-Scale Log Monitoring _ Datadog.pdf
Sims 4 Historia para lo sims 4 para jugar
Funds Management Learning Material for Beg
Job_Card_System_Styled_lorem_ipsum_.pptx
CHE NAA, , b,mn,mblblblbljb jb jlb ,j , ,C PPT.pptx
Power Point - Lesson 3_2.pptx grad school presentation
presentation_pfe-universite-molay-seltan.pptx
Vigrab.top – Online Tool for Downloading and Converting Social Media Videos a...
Introduction to the IoT system, how the IoT system works
How to Ensure Data Integrity During Shopify Migration_ Best Practices for Sec...
Unit-1 introduction to cyber security discuss about how to secure a system
PptxGenJS_Demo_Chart_20250317130215833.pptx
RPKI Status Update, presented by Makito Lay at IDNOG 10
An introduction to the IFRS (ISSB) Stndards.pdf
Introduction about ICD -10 and ICD11 on 5.8.25.pptx
INTERNET------BASICS-------UPDATED PPT PRESENTATION
Unit-3 cyber security network security of internet system

Owasp top 10 Vulnerabilities by cyberops infosec

  • 2. WEB PENETRATION Session Flow  What is Vulnerability  What is Threat?  What is Web Penetration  What is OWASP  OWASP Top 10 Vulnerabilities Cyberops Infosec 2
  • 3. WEB PENETRATION What is Vulnerability A vulnerability is a flaw or weakness in a system's design, implementation, operation or management that could be exploited to compromise the system's security objectives. Cyberops Infosec 3
  • 4. WEB PENETRATION What is Threat A threat is anything (a malicious external attacker, an internal user, a system instability, etc) that may harm the assets owned by an application (resources of value, such as the data in a database or in the file system) by exploiting a vulnerability. Cyberops Infosec 4
  • 5. WEB PENETRATION What is Web Penetration A security test is a method of evaluating the security of a computer system or network by methodically validating and verifying the effectiveness of application security controls. Cyberops Infosec 5
  • 6. WEB PENETRATION What is OWASP The Open Web Application Security Project (OWASP) is an open community dedicated to enabling organizations to develop, purchase, and maintain applications and APIs that can be trusted. Cyberops Infosec 6
  • 7. WEB PENETRATION OWASP Top 10 – 2017 has evolved: • 2017-A1 – Injection • 2017-A2 – Broken Authentication and Session Management • 2017-A3 –Sensitive Data Exposure • 2017-A4 – XML External Entities (XXE) • 2017-A5 – Broken Access Control • 2017-A6 – Security Misconfiguration • 2017-A7 – Cross Site Scripting • 2017-A8 – Insecure Deserialization • 2017-A9 – Using Component with known Vulnerabilities • 2017-A10 – Insufficient Logging & Monitoring Cyberops Infosec 7
  • 8. WEB PENETRATION OWASP Top 10 – 2017 has evolved: • 2017-A1 – Injection Describe : Injection flaws, such as SQL, NoSQL, OS, and LDAP injection, occur when untrusted data is sent to an interpreter as part of a command or query. Impact : The attacker’s hostile data can trick the interpreter into executing unintended commands or accessing data without proper authorization. Cyberops Infosec 8
  • 9. WEB PENETRATION OWASP Top 10 – 2017 has evolved: • 2017-A2 – Broken Authentication Describe : Application functions related to authentication and session management are often implemented incorrectly by developers. Impact : Vulnerability allowing attackers to compromise passwords, keys, or session tokens, or to exploit other implementation flaws to assume other users’ identities temporarily or permanently. Cyberops Infosec 9
  • 10. WEB PENETRATION OWASP Top 10 – 2017 has evolved: • 2017-A3 – Sensitive Data Exposure Describe : Web applications and APIs do not properly protect sensitive data, such as financial, healthcare, and PII. Impact : Attackers may steal or modify such weakly protected data to conduct credit card fraud, identity theft, or other crimes. Sensitive data may be compromised without extra protection, such as encryption at rest or in transit, and requires special precautions when exchanged with the browser. Cyberops Infosec 10
  • 11. WEB PENETRATION OWASP Top 10 – 2017 has evolved: • 2017-A4 – XML External Entities (XSS) Describe : Many older or poorly configured XML processors evaluate external entity references within XML documents. Impact : External entities can be used to disclose internal files using the file URI handler, internal file shares, internal port scanning, remote code execution, and denial of service attacks. Cyberops Infosec 11
  • 12. WEB PENETRATION OWASP Top 10 – 2017 has evolved: • 2017-A5 – Broken Access Control Describe : Restrictions on what authenticated users are allowed to do are often not properly enforced. Impact : Attackers can exploit these flaws to access unauthorized functionality and/or data, such as access other users' accounts, view sensitive files, modify other users’ data, change access rights, etc. Cyberops Infosec 12
  • 13. WEB PENETRATION OWASP Top 10 – 2017 has evolved: • 2017-A6 – Security Misconfiguration Describe : Security misconfiguration is the most commonly seen issue. This is commonly a result of insecure default configurations, incomplete or ad hoc configurations, open cloud storage, misconfigured HTTP headers, and verbose error messages containing sensitive information. Impact : Due to security misconfiguration all data, packages and messages can be compromised. Cyberops Infosec 13
  • 14. WEB PENETRATION OWASP Top 10 – 2017 has evolved: • 2017-A7 – Cross Site Scripting Describe : XSS flaws occur whenever an application includes untrusted data in a new web page without proper validation or escaping, or updates an existing web page with user-supplied data using a browser API that can create HTML or JavaScript. Impact : XSS allows attackers to execute scripts in the victim’s browser which can hijack user sessions, deface web sites, or redirect the user to malicious sites. Cyberops Infosec 14
  • 15. WEB PENETRATION OWASP Top 10 – 2017 has evolved: • 2017-A8 – Insecure Deserialization Describe : Insecure deserialization often leads to remote code execution. Impact : If deserialization flaws do not result in remote code execution, they can be used to perform attacks, including replay attacks, Cyberops Infosec 15
  • 16. WEB PENETRATION OWASP Top 10 – 2017 has evolved: • 2017-A9 – Using Components with known vulnerabilities Describe : Components, such as libraries, frameworks, and other software modules, run with the same privileges as the application. Impact : If a vulnerable component is exploited, such an attack can facilitate serious data loss or server takeover. Applications and APIs using components with known Cyberops Infosec 16
  • 17. WEB PENETRATION OWASP Top 10 – 2017 has evolved: • 2017-A10 – Insufficient Logging & Monitoring Describe : Insufficient logging and monitoring, coupled with missing or ineffective integration with incident response, allows attackers to further attack systems, maintain persistence, pivot to more systems, and tamper, extract, or destroy data. Impact : Most breach studies show time to detect a breach is over 200 days, typically detected by external parties rather than internal processes or monitoring. Cyberops Infosec 17