SlideShare a Scribd company logo
Why Your SharePoint Applications
are a Hackers Best Friend
Waughn
Hughes
Waughn has over 14 years of consulting experience, and has worked
extensively with SharePoint for the past seven years as a developer
and solutions architect.
Solutions Architect | about.me/waughn
Justin
Tibbs
Justin Tibbs, developed and heads up the security solutions practice
at NET Source, Inc, in Littleton Colorado. Prior to NET Source, Justin
held positions at Cisco Systems, Lockheed Martin, and others,
specializing in the areas of Vulnerability & Threat Research,
Exploitation Development, and Secure Architecture Design.
NET Source Security Director | about.me/justintibbs
Agenda
• Introduction
• SharePoint Tips and Tools
Why Your SharePoint Applications are a Hackers Best Friend 4
Definitions
Security Breach
An act from outside an organization that bypasses or contravenes security policies, practices, or
procedures.
Security Violation
An act from inside an organization that bypasses or contravenes security policies, practices, or
procedures.
Why Your SharePoint Applications are a Hackers Best Friend 5
National Security Agency
"This leaker was a sysadmin who was trusted with moving the information to actually make
sure that the right information was on the SharePoint servers that NSA Hawaii needed."
- National Security Agency Director and the Pentagon's Cyber Command Commander
General Keith Alexander
Why Your SharePoint Applications are a Hackers Best Friend
NSA chief leaks info on data sharing tech: It's SharePoint, By Jack Clark
Clear and Present Danger: Cyber-Crime; Cyber-Espionage; Cyber-Terror; and Cyber-War
6
Why SharePoint?
Started as a way to simplify document sharing…
12 years and numerous releases later…
Evolved into a platform for collaboration, document and file management, intranets,
extranets, websites, enterprise search, business intelligence, business process automation,
social networks, etc…
Used by 78% of the Fortune 500 companies*
Why Your SharePoint Applications are a Hackers Best Friend 7
* SharePoint 2010 : The First 10 Years [http://technet.microsoft.com/en-us/magazine/gg981684.aspx]
SharePoint Security Policy
Why Your SharePoint Applications are a Hackers Best Friend 8
A recent study by Emedia, covered in full by
InfoSecurity magazine in February 2013,
found that only about one-third of
organizations with 25-5000 users employing
SharePoint have security policies covering
the platform.
Installation & Configuration
• Windows, SQL Server and .NET Stack
• Security Patching
• Service Accounts
• Service Applications
• Authentication
• Web Applications, Site Collections and Sites
Why Your SharePoint Applications are a Hackers Best Friend 9
Installation & Configuration: Tips
• Review and install applicable service packs and cumulative updates
• Plan for least-privilege administration and do not use single account to run SharePoint
farm(s)
• Understand the features and configuration options for service applications prior to
deployment
• Define authentication methods for the various web and extended web applications
• Develop and use information architecture to define web applications, site collections and
sites
• Use metadata to identify data sensitivity
Why Your SharePoint Applications are a Hackers Best Friend 10
Access Control
• User Permissions
• Excessive Access
• Administrative Access
Why Your SharePoint Applications are a Hackers Best Friend 11
Access Control: Tips
• Train end users on the key permission feature within SharePoint (e.g. security groups,
permission levels, and permissions inheritance)
• Automate the review process to keep rights aligned with business needs
• Enable auditing for sites that contain sensitive information
• Access the need to use database encryption to protect content
Why Your SharePoint Applications are a Hackers Best Friend 12
External Exposure: Demo
Why Your SharePoint Applications are a Hackers Best Friend 13
External Exposure: Tips
• Use Google or Bing to check for externally exposed information
• Google Samples:
• inurl:"/_layouts/viewlsts.aspx"
• "all site content" filetype:aspx
• Use port scanner like nMap to look for open listeners
• Management applications
• Misconfigured web services
• Database listeners (SQL)
• Pretend to be a hacker… Try Shodan, a search engine that lets you find specific types of
computers using a variety of filters
Why Your SharePoint Applications are a Hackers Best Friend 14
Development
• Cross-Site Scripting
• Cross-Site Request Forgery
• Elevation of Privilege
• Information Disclosure
Why Your SharePoint Applications are a Hackers Best Friend 15
Development: Tips
• Understand Code Access Security
• Encode output properly using SPHttpUtility methods
• Do not allow contributor users to add script to the site
• Specify a charset in the Content-Type HTTP response header
• Avoid using AllowUnsafeUpdates where possible
• Check user permissions appropriately
Why Your SharePoint Applications are a Hackers Best Friend 16
Questions?
Why Your SharePoint Applications are a Hackers Best Friend 17
6000 Greenwood Plaza Blvd
Suite 110
Greenwood Village, CO 80111
303.798.5458
www.aspenware.com
Aspenware

More Related Content

PPTX
Developing Secure Web Apps
PPTX
Securing Web Applications
PPTX
5 Security Questions To Ask A Cloud Service Provider
PDF
Data encryption for Ruby web applications - Dmytro Shapovalov (RUS) | Ruby Me...
PDF
6 Most Surprising SharePoint Security Risks
PDF
Cybersecurity - Mobile Application Security
PDF
Information Security and Forensics
Developing Secure Web Apps
Securing Web Applications
5 Security Questions To Ask A Cloud Service Provider
Data encryption for Ruby web applications - Dmytro Shapovalov (RUS) | Ruby Me...
6 Most Surprising SharePoint Security Risks
Cybersecurity - Mobile Application Security
Information Security and Forensics

What's hot (20)

PDF
Goans-Helms-IT Security at Georgia Tech Library
PDF
SPUnite17 10 Steps to be Successful with Enterprise Search
PPTX
What is Ethical Hacking?
PDF
O365Con18 - Protecting your Data in Office 365 - Arjan Cornelissen
PPTX
Red teaming in the cloud
PPTX
Intro to Office 365 Security & Compliance Center
PPTX
Basics of Security Testing
PPTX
Security & Compliance: Core Concepts Explained
PPTX
Security as an Enabler for the Digital World - CISO Perspective
PDF
Logikcull Webinar: Preventing the #1 Litigation Risk
PPTX
Owasp 2017 oveview
PPTX
AWS User Group August Edition
PPT
Ethical Hacking
PPTX
OWASP Top Ten 2017
PPT
Universal Search for Legal Enterprises
PPTX
Rencore Webinar: Understanding EU GDPR from an Office 365 perspective with Pa...
PPTX
Ann West- Trust Federations: What We Have In Common
PPTX
Enterprise search
PDF
Emerging Technology Risk Series - Internet of Things (IoT)
PPTX
The cyber house of horrors - securing the expanding attack surface
Goans-Helms-IT Security at Georgia Tech Library
SPUnite17 10 Steps to be Successful with Enterprise Search
What is Ethical Hacking?
O365Con18 - Protecting your Data in Office 365 - Arjan Cornelissen
Red teaming in the cloud
Intro to Office 365 Security & Compliance Center
Basics of Security Testing
Security & Compliance: Core Concepts Explained
Security as an Enabler for the Digital World - CISO Perspective
Logikcull Webinar: Preventing the #1 Litigation Risk
Owasp 2017 oveview
AWS User Group August Edition
Ethical Hacking
OWASP Top Ten 2017
Universal Search for Legal Enterprises
Rencore Webinar: Understanding EU GDPR from an Office 365 perspective with Pa...
Ann West- Trust Federations: What We Have In Common
Enterprise search
Emerging Technology Risk Series - Internet of Things (IoT)
The cyber house of horrors - securing the expanding attack surface
Ad

Similar to Taking the Share out of Sharepoint: SharePoint Application Security. (20)

PDF
OWASP LA – SharePoint Hacking – 22Feb2012 – Slides.PDF
PPT
D Cornell Securing Share Point
PPTX
Securing the SharePoint Platform
PDF
Protecting Against Vulnerabilities in SharePoint Add-ons
PPTX
Hacking_SharePoint_FINAL
PPTX
What’s your Social IQ? Succeeding with SharePoint Social by Chris McNulty - S...
PDF
Preventing Security Leaks in SharePoint with Joel Oleson & Christian Buckley
PPTX
Securing Sharepoint platform
PPSX
Replacing your fileshare with SharePoint 2013 Farm - SharePoint User Group UK...
PDF
Securing Microsoft Technologies for HITECH Compliance
PPTX
SharePoint 2013 App Provisioning Models
PDF
CISO's Guide to Securing SharePoint
PPTX
ESDDC - Making Secured Content Discoverable in SharePoint
PPTX
Security, Administration & Governance for SharePoint On-Prem, Online, & Every...
PPTX
Best practices for security and governance in share point 2013 published
PDF
Selecting And Protecting The Right Sharepoint Backup Targets Sps Michigan
PPTX
Understanding SharePoint Apps, authentication and authorization infrastructur...
PPTX
SPSPTCDC - SharePoint Admin 101 - SpeedMetal - PowerUser to Admin in 75 Minutes
PPT
Share Point Server Security with Joel Oleson
PDF
RSA SecurBook for Microsoft SharePoint
OWASP LA – SharePoint Hacking – 22Feb2012 – Slides.PDF
D Cornell Securing Share Point
Securing the SharePoint Platform
Protecting Against Vulnerabilities in SharePoint Add-ons
Hacking_SharePoint_FINAL
What’s your Social IQ? Succeeding with SharePoint Social by Chris McNulty - S...
Preventing Security Leaks in SharePoint with Joel Oleson & Christian Buckley
Securing Sharepoint platform
Replacing your fileshare with SharePoint 2013 Farm - SharePoint User Group UK...
Securing Microsoft Technologies for HITECH Compliance
SharePoint 2013 App Provisioning Models
CISO's Guide to Securing SharePoint
ESDDC - Making Secured Content Discoverable in SharePoint
Security, Administration & Governance for SharePoint On-Prem, Online, & Every...
Best practices for security and governance in share point 2013 published
Selecting And Protecting The Right Sharepoint Backup Targets Sps Michigan
Understanding SharePoint Apps, authentication and authorization infrastructur...
SPSPTCDC - SharePoint Admin 101 - SpeedMetal - PowerUser to Admin in 75 Minutes
Share Point Server Security with Joel Oleson
RSA SecurBook for Microsoft SharePoint
Ad

More from Aspenware (20)

PPTX
Playing nice with the MEAN stack
PDF
Stop competing and start leading: A user experience case study.
PPTX
Tips for building fast multi touch enabled web sites
PPTX
Build once deploy everywhere using the telerik platform
PPTX
Building web applications using kendo ui and the mvvm pattern
PDF
Rich Web Applications with Aspenware
PPTX
Implementing Scrum with Microsoft Team Foundation Service (TFS)
PPTX
Implementing Scrum with Microsoft Team Foundation Service (TFS)
PDF
Building a Windows Store App for SharePoint 2013
PDF
Aspenware TechMunch presents: mobile communities of interest
PDF
Hate JavaScript? Try TypeScript.
PDF
Understanding Game Mechanics
PDF
What people are saying about working with Aspenware.
PPTX
Aspenware Customer Labs lift line experience
PDF
Aspenware 2013 consulting program
PPTX
On Culture and Perks
PDF
Maintaining Culture and Staying True to Your Values in Times of Change: Tye E...
PPTX
Fast multi touch enabled web sites
PDF
Business considerations for node.js applications
PPTX
Restful web services with nodejs
Playing nice with the MEAN stack
Stop competing and start leading: A user experience case study.
Tips for building fast multi touch enabled web sites
Build once deploy everywhere using the telerik platform
Building web applications using kendo ui and the mvvm pattern
Rich Web Applications with Aspenware
Implementing Scrum with Microsoft Team Foundation Service (TFS)
Implementing Scrum with Microsoft Team Foundation Service (TFS)
Building a Windows Store App for SharePoint 2013
Aspenware TechMunch presents: mobile communities of interest
Hate JavaScript? Try TypeScript.
Understanding Game Mechanics
What people are saying about working with Aspenware.
Aspenware Customer Labs lift line experience
Aspenware 2013 consulting program
On Culture and Perks
Maintaining Culture and Staying True to Your Values in Times of Change: Tye E...
Fast multi touch enabled web sites
Business considerations for node.js applications
Restful web services with nodejs

Recently uploaded (20)

PDF
DP Operators-handbook-extract for the Mautical Institute
PDF
WOOl fibre morphology and structure.pdf for textiles
PDF
Agricultural_Statistics_at_a_Glance_2022_0.pdf
PDF
Unlocking AI with Model Context Protocol (MCP)
PDF
Zenith AI: Advanced Artificial Intelligence
PDF
Encapsulation_ Review paper, used for researhc scholars
PPTX
1. Introduction to Computer Programming.pptx
PPTX
TechTalks-8-2019-Service-Management-ITIL-Refresh-ITIL-4-Framework-Supports-Ou...
PDF
Getting Started with Data Integration: FME Form 101
PPTX
Programs and apps: productivity, graphics, security and other tools
PDF
MIND Revenue Release Quarter 2 2025 Press Release
PPTX
Chapter 5: Probability Theory and Statistics
PDF
1 - Historical Antecedents, Social Consideration.pdf
PDF
From MVP to Full-Scale Product A Startup’s Software Journey.pdf
PDF
ENT215_Completing-a-large-scale-migration-and-modernization-with-AWS.pdf
PDF
project resource management chapter-09.pdf
PDF
Encapsulation theory and applications.pdf
PPTX
OMC Textile Division Presentation 2021.pptx
PDF
Video forgery: An extensive analysis of inter-and intra-frame manipulation al...
PDF
A comparative analysis of optical character recognition models for extracting...
DP Operators-handbook-extract for the Mautical Institute
WOOl fibre morphology and structure.pdf for textiles
Agricultural_Statistics_at_a_Glance_2022_0.pdf
Unlocking AI with Model Context Protocol (MCP)
Zenith AI: Advanced Artificial Intelligence
Encapsulation_ Review paper, used for researhc scholars
1. Introduction to Computer Programming.pptx
TechTalks-8-2019-Service-Management-ITIL-Refresh-ITIL-4-Framework-Supports-Ou...
Getting Started with Data Integration: FME Form 101
Programs and apps: productivity, graphics, security and other tools
MIND Revenue Release Quarter 2 2025 Press Release
Chapter 5: Probability Theory and Statistics
1 - Historical Antecedents, Social Consideration.pdf
From MVP to Full-Scale Product A Startup’s Software Journey.pdf
ENT215_Completing-a-large-scale-migration-and-modernization-with-AWS.pdf
project resource management chapter-09.pdf
Encapsulation theory and applications.pdf
OMC Textile Division Presentation 2021.pptx
Video forgery: An extensive analysis of inter-and intra-frame manipulation al...
A comparative analysis of optical character recognition models for extracting...

Taking the Share out of Sharepoint: SharePoint Application Security.

  • 1. Why Your SharePoint Applications are a Hackers Best Friend
  • 2. Waughn Hughes Waughn has over 14 years of consulting experience, and has worked extensively with SharePoint for the past seven years as a developer and solutions architect. Solutions Architect | about.me/waughn
  • 3. Justin Tibbs Justin Tibbs, developed and heads up the security solutions practice at NET Source, Inc, in Littleton Colorado. Prior to NET Source, Justin held positions at Cisco Systems, Lockheed Martin, and others, specializing in the areas of Vulnerability & Threat Research, Exploitation Development, and Secure Architecture Design. NET Source Security Director | about.me/justintibbs
  • 4. Agenda • Introduction • SharePoint Tips and Tools Why Your SharePoint Applications are a Hackers Best Friend 4
  • 5. Definitions Security Breach An act from outside an organization that bypasses or contravenes security policies, practices, or procedures. Security Violation An act from inside an organization that bypasses or contravenes security policies, practices, or procedures. Why Your SharePoint Applications are a Hackers Best Friend 5
  • 6. National Security Agency "This leaker was a sysadmin who was trusted with moving the information to actually make sure that the right information was on the SharePoint servers that NSA Hawaii needed." - National Security Agency Director and the Pentagon's Cyber Command Commander General Keith Alexander Why Your SharePoint Applications are a Hackers Best Friend NSA chief leaks info on data sharing tech: It's SharePoint, By Jack Clark Clear and Present Danger: Cyber-Crime; Cyber-Espionage; Cyber-Terror; and Cyber-War 6
  • 7. Why SharePoint? Started as a way to simplify document sharing… 12 years and numerous releases later… Evolved into a platform for collaboration, document and file management, intranets, extranets, websites, enterprise search, business intelligence, business process automation, social networks, etc… Used by 78% of the Fortune 500 companies* Why Your SharePoint Applications are a Hackers Best Friend 7 * SharePoint 2010 : The First 10 Years [http://technet.microsoft.com/en-us/magazine/gg981684.aspx]
  • 8. SharePoint Security Policy Why Your SharePoint Applications are a Hackers Best Friend 8 A recent study by Emedia, covered in full by InfoSecurity magazine in February 2013, found that only about one-third of organizations with 25-5000 users employing SharePoint have security policies covering the platform.
  • 9. Installation & Configuration • Windows, SQL Server and .NET Stack • Security Patching • Service Accounts • Service Applications • Authentication • Web Applications, Site Collections and Sites Why Your SharePoint Applications are a Hackers Best Friend 9
  • 10. Installation & Configuration: Tips • Review and install applicable service packs and cumulative updates • Plan for least-privilege administration and do not use single account to run SharePoint farm(s) • Understand the features and configuration options for service applications prior to deployment • Define authentication methods for the various web and extended web applications • Develop and use information architecture to define web applications, site collections and sites • Use metadata to identify data sensitivity Why Your SharePoint Applications are a Hackers Best Friend 10
  • 11. Access Control • User Permissions • Excessive Access • Administrative Access Why Your SharePoint Applications are a Hackers Best Friend 11
  • 12. Access Control: Tips • Train end users on the key permission feature within SharePoint (e.g. security groups, permission levels, and permissions inheritance) • Automate the review process to keep rights aligned with business needs • Enable auditing for sites that contain sensitive information • Access the need to use database encryption to protect content Why Your SharePoint Applications are a Hackers Best Friend 12
  • 13. External Exposure: Demo Why Your SharePoint Applications are a Hackers Best Friend 13
  • 14. External Exposure: Tips • Use Google or Bing to check for externally exposed information • Google Samples: • inurl:"/_layouts/viewlsts.aspx" • "all site content" filetype:aspx • Use port scanner like nMap to look for open listeners • Management applications • Misconfigured web services • Database listeners (SQL) • Pretend to be a hacker… Try Shodan, a search engine that lets you find specific types of computers using a variety of filters Why Your SharePoint Applications are a Hackers Best Friend 14
  • 15. Development • Cross-Site Scripting • Cross-Site Request Forgery • Elevation of Privilege • Information Disclosure Why Your SharePoint Applications are a Hackers Best Friend 15
  • 16. Development: Tips • Understand Code Access Security • Encode output properly using SPHttpUtility methods • Do not allow contributor users to add script to the site • Specify a charset in the Content-Type HTTP response header • Avoid using AllowUnsafeUpdates where possible • Check user permissions appropriately Why Your SharePoint Applications are a Hackers Best Friend 16
  • 17. Questions? Why Your SharePoint Applications are a Hackers Best Friend 17
  • 18. 6000 Greenwood Plaza Blvd Suite 110 Greenwood Village, CO 80111 303.798.5458 www.aspenware.com Aspenware