SlideShare a Scribd company logo
Propelling Security
Driving security that makes sense
Why is security important ?
● Data security : protect users who use your website
● Network security : protect your infrastructure from DOS, Spyware & unintended
misuse.
Source : http://breachlevelindex.com/
Application Security
● What is OWASP top 10 ?
○ Open Web Application Security Project
○ Focus on making security visible
○ Help organizations can take informed decisions
○ Top 10 most critical application security risks
○ Available at http://www.owasp.org
How OWASP helps?
● Check if your application is vulnerable
● Sample attack patterns
● Prevention guidelines
● What is the Business impact?
○ sell it to your investors
Most critical vulnerability in 2017 : Injection
SQL / NoSQL injection
Query in code : String sql = "SELECT * FROM USERS WHERE
USERID='"+request.getParameter("id")+"'";
App url : http://mywebsite.com/app/userView?id='123' or '1'='1
Query which gets executed : "SELECT * FROM USERS WHERE USERID='123 or
'1'='1'";
What if someone is able to execute
"SELECT * FROM USERS WHERE USERID='123'; DROP TABLE USERS;"
OS Command injection
Code : delete.php
<?php
$file = $_GET['filename'];
system("rm $file");
?>
URL : http://mywebsite.com/delete.php?filename=abc;ls -l
What if the attacker runs :
URL : http://mywebsite.com/delete.php?filename=abc;cat dbconfig.php
Injection : Story
Injection : Story
Vulnerabilities exploited
● file upload
● sql injections
Attacker uploaded webshell
get yours at https://github.com/JohnTroony/php-webshells.git
shell used : c99_locus7s.php
● what did the attacker get ?
● how was the attacker discovered ?
Mitigating injections
● Check user input
○ type check : string, int, float
○ format check : ip address, email
● Web application firewall
○ 3rd party tool
○ WAF by AWS / Akamai
Network / Infrasturcture security
● DDOS
○ Personal experience story
○ Letsbuy DDOS attack
■ SYN flooding
○ How was it mitigated ?
● Common solutions to DDOS
○ Reverse proxy
○ IP Blocking ?
○ Paid solutions - Akamai / AWS
Infrastructure misuse
● AWS Hacking story
● Discovery ?
● Mitigation ?
Security Strategy
● Figure out where you stand
● Prioritize security
● Creating an action plan
Application security plan
● Keep a lookout on latest security vulnerabilities
○ OWASP top 10
● Collect and analyze all data
○ ELK ?
○ Know your users
○ Anomaly alerts based on Traffic / Database query
● Get WAF (specifically startups)
○ Progressive tuning required
● Black Box / gray box scanning
○ On premise tool : Acunetix web application vulnerability scanner
○ 3rd party black box scans at regular intervals
Infrastructure security plan
● DDOS prevention strategy
○ AWS / Firewall / Akamai
● DNS attacks
○ DNS DOS attack
○ SYN Flooding
○ DNS hijacking
● Protect your DNS
○ Use better DNS provider
○ Ultra DNS
○ Route 53
Can I handle phishing ?
● Replica websites
○ Have you received phishing mails of hdfc / icici bank ?
● Strategy to detect phishing
○ Honeypot
○ Logging / monitoring
Continuous improvement plan
● Change organization culture
● Code review : is this code secure ?
● Security roadmap
● Track progress at regular intervals
○ JIRA Epic
○ Prioritization
Remember
Hackers are always 1 step ahead
No lock can stop a skilled thief
Q & A

More Related Content

PPTX
Emerging Trends in Cybersecurity by Amar Prusty
PPTX
Linux confau 2019: Web Security 2019
PPTX
Cyber Security Briefing for Beginners
ODP
Atmosphere 2016 - Eugenij Safanov - Web Application Security: from reactive t...
PPTX
Defend your organisation from Cyber Attacks
PDF
Security awareness training
PDF
Information Security Awareness Training (En)_Information Security Awareness F...
PDF
OWASP, PHP, life and universe
Emerging Trends in Cybersecurity by Amar Prusty
Linux confau 2019: Web Security 2019
Cyber Security Briefing for Beginners
Atmosphere 2016 - Eugenij Safanov - Web Application Security: from reactive t...
Defend your organisation from Cyber Attacks
Security awareness training
Information Security Awareness Training (En)_Information Security Awareness F...
OWASP, PHP, life and universe

What's hot (15)

PPTX
Security in the IoT generation - Guy Rombaut - Codemotion Amsterdam 2017
PDF
Living with Determined Attackers MOSI Edition
PDF
Vault and Security as a Service
PDF
ResellerClub Ctrl+F5 - WordPress Security session
PPTX
Now you can trust the browser - Ben Gidley, Tim Charman - Codemotion Amsterda...
PDF
パフォーマンスを考慮したプリミティブなTrusted TypesによるClient-Side XSS防御手法
PDF
Secure wordpress
PDF
CloudFlare - The Heartbleed Bug - Webinar
PPTX
Xss attack
PPTX
Basic WordPress Security
PDF
CSRF_RSA_2008_Jeremiah_Grossman
PDF
Openbar Leuven // Top 5 focus areas in cyber security linked to you digital t...
PPTX
CLUSIR INFONORD OWASP iot 2014
PDF
Forcepoint - Analýza chování uživatelů
PDF
SSH - From Zero to Hero
Security in the IoT generation - Guy Rombaut - Codemotion Amsterdam 2017
Living with Determined Attackers MOSI Edition
Vault and Security as a Service
ResellerClub Ctrl+F5 - WordPress Security session
Now you can trust the browser - Ben Gidley, Tim Charman - Codemotion Amsterda...
パフォーマンスを考慮したプリミティブなTrusted TypesによるClient-Side XSS防御手法
Secure wordpress
CloudFlare - The Heartbleed Bug - Webinar
Xss attack
Basic WordPress Security
CSRF_RSA_2008_Jeremiah_Grossman
Openbar Leuven // Top 5 focus areas in cyber security linked to you digital t...
CLUSIR INFONORD OWASP iot 2014
Forcepoint - Analýza chování uživatelů
SSH - From Zero to Hero
Ad

Similar to Propelling security (20)

PDF
Become a Security Ninja
PPTX
Web Application Security Session for Web Developers
PDF
Web Security
PDF
Protecting Against Web App Attacks
PDF
Secure coding presentation Oct 3 2020
PDF
Css sf azure_8-9-17-protecting_web_apps_stephen coty_al
PDF
CSS17: Houston - Protecting Web Apps
PDF
Secure coding guidelines
PPTX
Altitude SF 2017: Security at the edge
PDF
Shields up - improving web application security
PDF
Web Security
PPT
Discovering the Value of Verifying Web Application Security Using IBM Rationa...
PPTX
Web Security Overview
PPT
Information security
PPTX
CSS 17: NYC - Protecting your Web Applications
PDF
Web hackingtools cf-summit2014
PDF
Web hackingtools 2015
PDF
Web hackingtools 2015
PPTX
Security is not a feature
PPTX
Web App Security
Become a Security Ninja
Web Application Security Session for Web Developers
Web Security
Protecting Against Web App Attacks
Secure coding presentation Oct 3 2020
Css sf azure_8-9-17-protecting_web_apps_stephen coty_al
CSS17: Houston - Protecting Web Apps
Secure coding guidelines
Altitude SF 2017: Security at the edge
Shields up - improving web application security
Web Security
Discovering the Value of Verifying Web Application Security Using IBM Rationa...
Web Security Overview
Information security
CSS 17: NYC - Protecting your Web Applications
Web hackingtools cf-summit2014
Web hackingtools 2015
Web hackingtools 2015
Security is not a feature
Web App Security
Ad

Recently uploaded (20)

PDF
Empathic Computing: Creating Shared Understanding
PPTX
Big Data Technologies - Introduction.pptx
PDF
Spectral efficient network and resource selection model in 5G networks
PDF
Approach and Philosophy of On baking technology
PDF
7 ChatGPT Prompts to Help You Define Your Ideal Customer Profile.pdf
PPTX
Group 1 Presentation -Planning and Decision Making .pptx
PPTX
A Presentation on Artificial Intelligence
PPTX
1. Introduction to Computer Programming.pptx
PDF
Building Integrated photovoltaic BIPV_UPV.pdf
PDF
Build a system with the filesystem maintained by OSTree @ COSCUP 2025
PDF
Machine learning based COVID-19 study performance prediction
PPTX
20250228 LYD VKU AI Blended-Learning.pptx
PDF
Dropbox Q2 2025 Financial Results & Investor Presentation
PPTX
Tartificialntelligence_presentation.pptx
PPTX
SOPHOS-XG Firewall Administrator PPT.pptx
PPTX
Programs and apps: productivity, graphics, security and other tools
PDF
Encapsulation_ Review paper, used for researhc scholars
PDF
Blue Purple Modern Animated Computer Science Presentation.pdf.pdf
PDF
NewMind AI Weekly Chronicles - August'25-Week II
PPTX
KOM of Painting work and Equipment Insulation REV00 update 25-dec.pptx
Empathic Computing: Creating Shared Understanding
Big Data Technologies - Introduction.pptx
Spectral efficient network and resource selection model in 5G networks
Approach and Philosophy of On baking technology
7 ChatGPT Prompts to Help You Define Your Ideal Customer Profile.pdf
Group 1 Presentation -Planning and Decision Making .pptx
A Presentation on Artificial Intelligence
1. Introduction to Computer Programming.pptx
Building Integrated photovoltaic BIPV_UPV.pdf
Build a system with the filesystem maintained by OSTree @ COSCUP 2025
Machine learning based COVID-19 study performance prediction
20250228 LYD VKU AI Blended-Learning.pptx
Dropbox Q2 2025 Financial Results & Investor Presentation
Tartificialntelligence_presentation.pptx
SOPHOS-XG Firewall Administrator PPT.pptx
Programs and apps: productivity, graphics, security and other tools
Encapsulation_ Review paper, used for researhc scholars
Blue Purple Modern Animated Computer Science Presentation.pdf.pdf
NewMind AI Weekly Chronicles - August'25-Week II
KOM of Painting work and Equipment Insulation REV00 update 25-dec.pptx

Propelling security

  • 2. Why is security important ? ● Data security : protect users who use your website ● Network security : protect your infrastructure from DOS, Spyware & unintended misuse. Source : http://breachlevelindex.com/
  • 3. Application Security ● What is OWASP top 10 ? ○ Open Web Application Security Project ○ Focus on making security visible ○ Help organizations can take informed decisions ○ Top 10 most critical application security risks ○ Available at http://www.owasp.org
  • 4. How OWASP helps? ● Check if your application is vulnerable ● Sample attack patterns ● Prevention guidelines ● What is the Business impact? ○ sell it to your investors Most critical vulnerability in 2017 : Injection
  • 5. SQL / NoSQL injection Query in code : String sql = "SELECT * FROM USERS WHERE USERID='"+request.getParameter("id")+"'"; App url : http://mywebsite.com/app/userView?id='123' or '1'='1 Query which gets executed : "SELECT * FROM USERS WHERE USERID='123 or '1'='1'"; What if someone is able to execute "SELECT * FROM USERS WHERE USERID='123'; DROP TABLE USERS;"
  • 6. OS Command injection Code : delete.php <?php $file = $_GET['filename']; system("rm $file"); ?> URL : http://mywebsite.com/delete.php?filename=abc;ls -l What if the attacker runs : URL : http://mywebsite.com/delete.php?filename=abc;cat dbconfig.php
  • 8. Injection : Story Vulnerabilities exploited ● file upload ● sql injections Attacker uploaded webshell get yours at https://github.com/JohnTroony/php-webshells.git shell used : c99_locus7s.php ● what did the attacker get ? ● how was the attacker discovered ?
  • 9. Mitigating injections ● Check user input ○ type check : string, int, float ○ format check : ip address, email ● Web application firewall ○ 3rd party tool ○ WAF by AWS / Akamai
  • 10. Network / Infrasturcture security ● DDOS ○ Personal experience story ○ Letsbuy DDOS attack ■ SYN flooding ○ How was it mitigated ? ● Common solutions to DDOS ○ Reverse proxy ○ IP Blocking ? ○ Paid solutions - Akamai / AWS
  • 11. Infrastructure misuse ● AWS Hacking story ● Discovery ? ● Mitigation ?
  • 12. Security Strategy ● Figure out where you stand ● Prioritize security ● Creating an action plan
  • 13. Application security plan ● Keep a lookout on latest security vulnerabilities ○ OWASP top 10 ● Collect and analyze all data ○ ELK ? ○ Know your users ○ Anomaly alerts based on Traffic / Database query ● Get WAF (specifically startups) ○ Progressive tuning required ● Black Box / gray box scanning ○ On premise tool : Acunetix web application vulnerability scanner ○ 3rd party black box scans at regular intervals
  • 14. Infrastructure security plan ● DDOS prevention strategy ○ AWS / Firewall / Akamai ● DNS attacks ○ DNS DOS attack ○ SYN Flooding ○ DNS hijacking ● Protect your DNS ○ Use better DNS provider ○ Ultra DNS ○ Route 53
  • 15. Can I handle phishing ? ● Replica websites ○ Have you received phishing mails of hdfc / icici bank ? ● Strategy to detect phishing ○ Honeypot ○ Logging / monitoring
  • 16. Continuous improvement plan ● Change organization culture ● Code review : is this code secure ? ● Security roadmap ● Track progress at regular intervals ○ JIRA Epic ○ Prioritization
  • 17. Remember Hackers are always 1 step ahead No lock can stop a skilled thief Q & A