SlideShare a Scribd company logo
“ PerformFuzz” On Application’s Web Interface. Aniket Kulkarni Symantec , India.
Agenda Brief Overview. Performance Testing, Fuzzing & Fuzzer. What Can Be Fuzzed & Common Defects ? What Is PerformFuzz ? Packet\Port Fuzzing. How Fuzzing Degrades Performance ? View Of Original & Malicious Packets.
Agenda Contd.. Impact On 3 rd  Party Components. Case Study & Crash Analysis. Best Practices To Avoid such Potholes. References.
Brief Overview. Focus On “Performance & Security”. Its attack, that affects application’s “Performance & Availability”.  Security Test technique is,  “Fuzzing” . Target is, Application's Web interface. Performance + Fuzzing =  “PerformFuzz” .
What Is Performance Testing ? System check for Responsiveness, Throughput and Scalability, under given workload. Outcome helps to decide: Production readiness, Evaluation of application against performance, Finding  root cause of performance issues.
What’s Fuzzing &What Can Be Fuzzed ? Its technique to inject, random bad data into an application to see what breaks! Any type  of application inputs can be fuzzed: N/W Protocols, Files, GUI, Inter Process communication etc etc Note :   Aiming to fuzz application’s web interface, we will consider network protocol\port fuzzing only, for current topic.
Fuzzer is just a tool, that generates gibberish data. Few fuzzers available are:  SPIKE, PEACH,  DFUZ, GPF(General Purpose Fuzzer) & SULLEY What Is Fuzzer ? Fuzzer Input File File File File File File Software Application Original Input
Common Defects By Fuzzing. Buffer Overflow. Integer Overflow. Invalid Memory Reference. Infinite Loop. 3 rd  Party components May Sit, Compromising Application. Degraded Performance Of Web Interface (DoER) In quotes, it gives crash (Termed as DoS, Denial Of Service), if analyzed in-depth, one of above is detected.
So, what’s PerformFuzz? It’s  a Packet Fuzzing. Increasing “Render Response Time” Applying Multiple Fuzzing Instances is PerformFuzz. Causes “DoER” & “DoS”. Note:  O nce attacker successfully slow down the  performance,  its key achievement for him to get confident of next stage, that it’s going to be a definite, crash!
How Packet\Port Fuzzing Is Done ? Way-1:  Trapping valid packets, detecting  magic strings, modifying those and resending to respected target. Way-2:  Bombarding malicious packets automatically to respected target.
But, How Performance Degrades ? Defensive Security Talk, Need To Research Attacks & Then Mitigation. Opting Way-2: Automated Bombarding. Application Response With Single Fuzzing Instance. Craft Instances, Till “Render Response Time” Is Increased.  Once Render Response Time Is Caught, Performance Is Tuned Negatively By Just Up & Down Of These instances.
View: Ideal & Malicious Packet. Ideal Network Packet. Malicious Network Packet.
Impact On 3 rd  Party Components. Fuzzing target is  http://ip address: port no/ Sometimes, web server get’s impacted. Next is our own application. Among  “CIA”: A ( Availability )  of an application is hampered 100%
Case Study & Crash Analysis. Description: Fuzzing  was performed by, sending random packets to the port , on which “ABC” server was listening. Multiple network fuzzers were made to send random packets to the port simultaneously. It was  observed degraded performance of application, increasing its render response time. Finally a crash was observed in JVM, bringing down tomcat, due to the race condition in JVM threads. The crash has been reproduced multiple times upto J6U21, which was latest java update when this was encountered for first time. Crash Analysis!
Best Practices To Avoid Such Issues. Server Side Validation. Latest OS & Application Vendor Patches. Run Firewall & Intrusion Detectors. Big Fish Have Implemented  “CAPTCHA”
What’s Out From This Presentation? DoER. DoS. Importance Of 3 rd  Party Components. Might Be A Small Test, Under your Performance & Security Test Strategy.
Question To think ? Is This Going to Hamper Cloud Clients ? Anyway’s, That’s Under Research With Us, Let’s see What We Bring Up Next.
Reference. http://msdn.microsoft.com/en-us/library/bb924356.aspx http://peachfuzzer.com/PeachInstallation http://openmaniak.com/wireshark_tutorial.php http://www.wireshark.org/download.html http://resources.infosecinstitute.com/intro-to-fuzzing/ http://resources.infosecinstitute.com/fuzzer-automation-with-spike/ http://windbg.info/doc/1-common-cmds.html#7_symbols
Questions ?
The End. Thank You! Aniket Kulkarni , Product Security Group, Symantec. [email_address]

More Related Content

PDF
Daniel billing exploring the security testers toolbox
PDF
SCA del Software Open Source: come interpretarlo per evitare problemi di sicu...
PPTX
Web Application Penetration Testing Introduction
PPTX
Application Virtualization
PDF
Best Practices of Static Code Analysis in the SDLC
PDF
Client-Side Penetration Testing Presentation
PPTX
FUEL_USERS_GROUP
PPTX
What? Why? Who? How? Of Application Security Testing
Daniel billing exploring the security testers toolbox
SCA del Software Open Source: come interpretarlo per evitare problemi di sicu...
Web Application Penetration Testing Introduction
Application Virtualization
Best Practices of Static Code Analysis in the SDLC
Client-Side Penetration Testing Presentation
FUEL_USERS_GROUP
What? Why? Who? How? Of Application Security Testing

What's hot (20)

PPTX
20160211 OWASP Charlotte RASP
PPTX
Owasp A9 USING KNOWN VULNERABLE COMPONENTS IT 6873 presentation
PDF
Detecting Web Browser Heap Corruption Attacks - Stephan Chenette, Moti Joseph...
PPTX
Security hole #5 application security science or quality assurance
PPTX
Reversing malware analysis training part11 exploit development advanced
PPTX
Introduction to security testing
PPTX
Hack through Injections
PPTX
Penetration testing dont just leave it to chance
PPTX
Secure develpment 2014
PPTX
Server Side Template Injection by Mandeep Jadon
PDF
How to secure web applications
PDF
Security-testing presentation
PDF
Stephanie Vanroelen - Mobile Anti-Virus apps exposed
PDF
Breaking Antivirus Software - Joxean Koret (SYSCAN 2014)
PDF
Automation of Security scanning easy or cheese
PPTX
Automation of Security scanning easy or cheese?
PPTX
OWASP Top 10 practice workshop by Stanislav Breslavskyi
PPTX
Mobile security services 2012
PPTX
Reversing & Malware Analysis Training Part 9 - Advanced Malware Analysis
20160211 OWASP Charlotte RASP
Owasp A9 USING KNOWN VULNERABLE COMPONENTS IT 6873 presentation
Detecting Web Browser Heap Corruption Attacks - Stephan Chenette, Moti Joseph...
Security hole #5 application security science or quality assurance
Reversing malware analysis training part11 exploit development advanced
Introduction to security testing
Hack through Injections
Penetration testing dont just leave it to chance
Secure develpment 2014
Server Side Template Injection by Mandeep Jadon
How to secure web applications
Security-testing presentation
Stephanie Vanroelen - Mobile Anti-Virus apps exposed
Breaking Antivirus Software - Joxean Koret (SYSCAN 2014)
Automation of Security scanning easy or cheese
Automation of Security scanning easy or cheese?
OWASP Top 10 practice workshop by Stanislav Breslavskyi
Mobile security services 2012
Reversing & Malware Analysis Training Part 9 - Advanced Malware Analysis
Ad

Similar to Perform fuzz on appplications web interface (20)

PDF
Finding Bugs FASTER with Fuzzing
PDF
FUZZING & SOFTWARE SECURITY TESTING
PPTX
Fault Models and Fuzzing
PDF
Fuzzing underestimated method of finding hidden bugs
PDF
Az4301280282
PPTX
Blaze Information Security: Slaying bugs and improving software security thro...
PDF
Fuzz-testing: A hacker's approach to making your code more secure | Pascal Ze...
PPT
Fuzzing101 - webinar on Fuzzing Performance
PPTX
PDF
Fuzzing: Challenges and Reflections
PPTX
Fuzzing.pptx
PPTX
Showing How Security Has (And Hasn't) Improved, After Ten Years Of Trying
PDF
[Wroclaw #4] Fuzzing - underestimated method of finding hidden bugs
PPTX
Fuzzing101: Unknown vulnerability management for Telecommunications
PPT
msutton-fuzzing.ppt
PPT
Fuzzing 101 Webinar on Zero Day Management
PDF
How to find Zero day vulnerabilities
PPTX
Security Testing: Fuzzing
PPTX
Dagstuhl2021
PPT
Igor Agievich, Pavel Markov. Dynamic Detection of Shellcode in Electronic Doc...
Finding Bugs FASTER with Fuzzing
FUZZING & SOFTWARE SECURITY TESTING
Fault Models and Fuzzing
Fuzzing underestimated method of finding hidden bugs
Az4301280282
Blaze Information Security: Slaying bugs and improving software security thro...
Fuzz-testing: A hacker's approach to making your code more secure | Pascal Ze...
Fuzzing101 - webinar on Fuzzing Performance
Fuzzing: Challenges and Reflections
Fuzzing.pptx
Showing How Security Has (And Hasn't) Improved, After Ten Years Of Trying
[Wroclaw #4] Fuzzing - underestimated method of finding hidden bugs
Fuzzing101: Unknown vulnerability management for Telecommunications
msutton-fuzzing.ppt
Fuzzing 101 Webinar on Zero Day Management
How to find Zero day vulnerabilities
Security Testing: Fuzzing
Dagstuhl2021
Igor Agievich, Pavel Markov. Dynamic Detection of Shellcode in Electronic Doc...
Ad

More from IndicThreads (20)

PPTX
Http2 is here! And why the web needs it
ODP
Understanding Bitcoin (Blockchain) and its Potential for Disruptive Applications
PPT
Go Programming Language - Learning The Go Lang way
PPT
Building Resilient Microservices
PPT
App using golang indicthreads
PDF
Building on quicksand microservices indicthreads
PDF
How to Think in RxJava Before Reacting
PPT
Iot secure connected devices indicthreads
PDF
Real world IoT for enterprises
PPT
IoT testing and quality assurance indicthreads
PPT
Functional Programming Past Present Future
PDF
Harnessing the Power of Java 8 Streams
PDF
Building & scaling a live streaming mobile platform - Gr8 road to fame
PPTX
Internet of things architecture perspective - IndicThreads Conference
PDF
Cars and Computers: Building a Java Carputer
PPTX
Scrap Your MapReduce - Apache Spark
PPT
Continuous Integration (CI) and Continuous Delivery (CD) using Jenkins & Docker
PPTX
Speed up your build pipeline for faster feedback
PPT
Unraveling OpenStack Clouds
PPTX
Digital Transformation of the Enterprise. What IT leaders need to know!
Http2 is here! And why the web needs it
Understanding Bitcoin (Blockchain) and its Potential for Disruptive Applications
Go Programming Language - Learning The Go Lang way
Building Resilient Microservices
App using golang indicthreads
Building on quicksand microservices indicthreads
How to Think in RxJava Before Reacting
Iot secure connected devices indicthreads
Real world IoT for enterprises
IoT testing and quality assurance indicthreads
Functional Programming Past Present Future
Harnessing the Power of Java 8 Streams
Building & scaling a live streaming mobile platform - Gr8 road to fame
Internet of things architecture perspective - IndicThreads Conference
Cars and Computers: Building a Java Carputer
Scrap Your MapReduce - Apache Spark
Continuous Integration (CI) and Continuous Delivery (CD) using Jenkins & Docker
Speed up your build pipeline for faster feedback
Unraveling OpenStack Clouds
Digital Transformation of the Enterprise. What IT leaders need to know!

Recently uploaded (20)

PDF
Enhancing emotion recognition model for a student engagement use case through...
PDF
A comparative analysis of optical character recognition models for extracting...
PDF
Assigned Numbers - 2025 - Bluetooth® Document
PDF
7 ChatGPT Prompts to Help You Define Your Ideal Customer Profile.pdf
PDF
NewMind AI Weekly Chronicles - August'25-Week II
PDF
Accuracy of neural networks in brain wave diagnosis of schizophrenia
PPTX
SOPHOS-XG Firewall Administrator PPT.pptx
PPTX
Digital-Transformation-Roadmap-for-Companies.pptx
PDF
gpt5_lecture_notes_comprehensive_20250812015547.pdf
PDF
Univ-Connecticut-ChatGPT-Presentaion.pdf
PDF
Transform Your ITIL® 4 & ITSM Strategy with AI in 2025.pdf
PPTX
Group 1 Presentation -Planning and Decision Making .pptx
PDF
1 - Historical Antecedents, Social Consideration.pdf
PPTX
1. Introduction to Computer Programming.pptx
PDF
Encapsulation theory and applications.pdf
PPTX
cloud_computing_Infrastucture_as_cloud_p
PDF
Unlocking AI with Model Context Protocol (MCP)
PDF
Profit Center Accounting in SAP S/4HANA, S4F28 Col11
PDF
From MVP to Full-Scale Product A Startup’s Software Journey.pdf
PDF
project resource management chapter-09.pdf
Enhancing emotion recognition model for a student engagement use case through...
A comparative analysis of optical character recognition models for extracting...
Assigned Numbers - 2025 - Bluetooth® Document
7 ChatGPT Prompts to Help You Define Your Ideal Customer Profile.pdf
NewMind AI Weekly Chronicles - August'25-Week II
Accuracy of neural networks in brain wave diagnosis of schizophrenia
SOPHOS-XG Firewall Administrator PPT.pptx
Digital-Transformation-Roadmap-for-Companies.pptx
gpt5_lecture_notes_comprehensive_20250812015547.pdf
Univ-Connecticut-ChatGPT-Presentaion.pdf
Transform Your ITIL® 4 & ITSM Strategy with AI in 2025.pdf
Group 1 Presentation -Planning and Decision Making .pptx
1 - Historical Antecedents, Social Consideration.pdf
1. Introduction to Computer Programming.pptx
Encapsulation theory and applications.pdf
cloud_computing_Infrastucture_as_cloud_p
Unlocking AI with Model Context Protocol (MCP)
Profit Center Accounting in SAP S/4HANA, S4F28 Col11
From MVP to Full-Scale Product A Startup’s Software Journey.pdf
project resource management chapter-09.pdf

Perform fuzz on appplications web interface

  • 1. “ PerformFuzz” On Application’s Web Interface. Aniket Kulkarni Symantec , India.
  • 2. Agenda Brief Overview. Performance Testing, Fuzzing & Fuzzer. What Can Be Fuzzed & Common Defects ? What Is PerformFuzz ? Packet\Port Fuzzing. How Fuzzing Degrades Performance ? View Of Original & Malicious Packets.
  • 3. Agenda Contd.. Impact On 3 rd Party Components. Case Study & Crash Analysis. Best Practices To Avoid such Potholes. References.
  • 4. Brief Overview. Focus On “Performance & Security”. Its attack, that affects application’s “Performance & Availability”. Security Test technique is, “Fuzzing” . Target is, Application's Web interface. Performance + Fuzzing = “PerformFuzz” .
  • 5. What Is Performance Testing ? System check for Responsiveness, Throughput and Scalability, under given workload. Outcome helps to decide: Production readiness, Evaluation of application against performance, Finding root cause of performance issues.
  • 6. What’s Fuzzing &What Can Be Fuzzed ? Its technique to inject, random bad data into an application to see what breaks! Any type of application inputs can be fuzzed: N/W Protocols, Files, GUI, Inter Process communication etc etc Note : Aiming to fuzz application’s web interface, we will consider network protocol\port fuzzing only, for current topic.
  • 7. Fuzzer is just a tool, that generates gibberish data. Few fuzzers available are: SPIKE, PEACH, DFUZ, GPF(General Purpose Fuzzer) & SULLEY What Is Fuzzer ? Fuzzer Input File File File File File File Software Application Original Input
  • 8. Common Defects By Fuzzing. Buffer Overflow. Integer Overflow. Invalid Memory Reference. Infinite Loop. 3 rd Party components May Sit, Compromising Application. Degraded Performance Of Web Interface (DoER) In quotes, it gives crash (Termed as DoS, Denial Of Service), if analyzed in-depth, one of above is detected.
  • 9. So, what’s PerformFuzz? It’s a Packet Fuzzing. Increasing “Render Response Time” Applying Multiple Fuzzing Instances is PerformFuzz. Causes “DoER” & “DoS”. Note: O nce attacker successfully slow down the performance, its key achievement for him to get confident of next stage, that it’s going to be a definite, crash!
  • 10. How Packet\Port Fuzzing Is Done ? Way-1: Trapping valid packets, detecting magic strings, modifying those and resending to respected target. Way-2: Bombarding malicious packets automatically to respected target.
  • 11. But, How Performance Degrades ? Defensive Security Talk, Need To Research Attacks & Then Mitigation. Opting Way-2: Automated Bombarding. Application Response With Single Fuzzing Instance. Craft Instances, Till “Render Response Time” Is Increased. Once Render Response Time Is Caught, Performance Is Tuned Negatively By Just Up & Down Of These instances.
  • 12. View: Ideal & Malicious Packet. Ideal Network Packet. Malicious Network Packet.
  • 13. Impact On 3 rd Party Components. Fuzzing target is http://ip address: port no/ Sometimes, web server get’s impacted. Next is our own application. Among “CIA”: A ( Availability ) of an application is hampered 100%
  • 14. Case Study & Crash Analysis. Description: Fuzzing was performed by, sending random packets to the port , on which “ABC” server was listening. Multiple network fuzzers were made to send random packets to the port simultaneously. It was observed degraded performance of application, increasing its render response time. Finally a crash was observed in JVM, bringing down tomcat, due to the race condition in JVM threads. The crash has been reproduced multiple times upto J6U21, which was latest java update when this was encountered for first time. Crash Analysis!
  • 15. Best Practices To Avoid Such Issues. Server Side Validation. Latest OS & Application Vendor Patches. Run Firewall & Intrusion Detectors. Big Fish Have Implemented “CAPTCHA”
  • 16. What’s Out From This Presentation? DoER. DoS. Importance Of 3 rd Party Components. Might Be A Small Test, Under your Performance & Security Test Strategy.
  • 17. Question To think ? Is This Going to Hamper Cloud Clients ? Anyway’s, That’s Under Research With Us, Let’s see What We Bring Up Next.
  • 18. Reference. http://msdn.microsoft.com/en-us/library/bb924356.aspx http://peachfuzzer.com/PeachInstallation http://openmaniak.com/wireshark_tutorial.php http://www.wireshark.org/download.html http://resources.infosecinstitute.com/intro-to-fuzzing/ http://resources.infosecinstitute.com/fuzzer-automation-with-spike/ http://windbg.info/doc/1-common-cmds.html#7_symbols
  • 20. The End. Thank You! Aniket Kulkarni , Product Security Group, Symantec. [email_address]