SlideShare a Scribd company logo
Andy Tinkham & Zach Bergman, Magenic Technologies



Contact Us
1600 Utica Avenue South, Suite 800
St. Louis Park, MN 55416
1 (877)-277-1044
info@magenic.com
» Magenic: Leading consultancy providing custom application development,
  testing and QA services
» Andy
  » 17 years of testing experience, focusing on automation, performance & other
     technical testing
  » Principal Consultant at Magenic, leading all our technical testing activities
» Zach
  » 3 years of testing experience, focusing on security & test automation
  » Consultant at Magenic, driving internal security growth & initiatives
» Testing focused on 3 aspects of a system
  » Authentication – determining an entity is who they claim to be
  » Authorization – determining whether an entity is allowed to use a
    requested action or resource
  » Accounting – documenting what occurs in the system
                                                               Authentication




                                               Authorization                    Accounting
» Talk about the most prevalent security vulnerabilities
» Structure that talk using the OWASP Top 10 list
  » Andy will describe issue
  » Zach will demonstrate issue and talk about techniques to identify it
» Cover some very basic testing techniques to find these
» Only begin to scratch the surface of security testing
» Open Web Application Security Project
» Non-profit organization focused on improving the security of software
» Around since 2001
» Not affiliated with any technology company
» Provide a variety of free tools, education, and information around
  application security
» Local chapter: https://www.owasp.org/index.php/Minneapolis_St_Paul
       Next meeting: 1/21/2013, Gunnar Peterson, “Mobile AppSec – How
           iOS and Android Apps fail and what to do to protect them”
•   Most critical web application security flaws
•   Occur frequently
•   Easy to find
•   Easy to exploit


    10. Unvalidated Redirects and Forwards       5. Cross-Site Request Forgery
    9. Insufficient Transport Layer Protection   4. Insecure Direct Object References
    8. Failure to Restrict URL Access            3. Broken Authentication & Session Management
    7. Insecure Cryptographic Storage            2. Cross-Site Scripting
    6. Security Misconfiguration                 1. Injection
» Security is a big deal
  » 77 million user accounts compromised on Sony PlayStation network
  » $1 trillion dollars worth of intellectual property stolen in 2008 (McAfee)
  » Symantec estimates the global price tag of consumer cybercrime to be $110 billion with 18
     victims every second
  » 90% of businesses suffered some sort of hack in last 12 months (Research
     Ponemon/Juniper Networks, June 2011)
  » 83% of websites have had a high, critical or urgent issue (WhiteHat Security, 2009)
» Poor security can lead to
  » Unwanted information disclosure
  » Compromised data
  » Financial and Reputational Costs
  » Legal Issues (HIPAA, other industry information security governance)
» Burp Suite (http://www.portswigger.net/burp/)
» Awesome Cookie Manager (Chrome App Store)
» BodgeIt Store (http://code.google.com/p/bodgeit/)
» REST Console (Chrome App Store)
» Use of an app’s built-in redirect to access an unintended location
  » http://yoursite.com/redirect.php?url=http://yoursite.com/admin.php
  » http://yoursite.com/redirect.php?url=http://badsite.com
» Users can be convinced to give information thinking they’re giving it to
  you

» Example
                                                                  Exploitability: Average
                                                                  Prevalence: Uncommon
                                                                  Detectability: Easy
                                                                  Impact: Moderate

                                              Testing Technique: Look for redirect functions
                                       throughout application in URL or request parameters
» Unencrypted data traversing networks can be seen, manipulated, and
  used without user knowledge
  » The session information from browser
  » User personally-identifiable information




                                                                  Exploitability: Difficult
                                                                  Prevalence: Common
                                                                  Detectability: Easy
                                                                  Impact: Moderate

                                       Testing Technique: See if HTTPS and TLS 1.1+ is being
                                                       used on appropriate secure pages
Request over HTTP   Request over HTTPS (SSL)
» Typically happens when assumptions are made regarding users’
  knowledge of the app’s layout/functionality – security by obscurity
  » http://www.mysite.com/MySecretAdminConsole.php
  » http://www.mysite.com/ManagerReports


» Hidden or Unlisted resources
  » Only show the user functionality they can use
                                                                   Exploitability: Easy
                                                                   Prevalence: Uncommon
                                                                   Detectability: Average
                                                                   Impact: Moderate

                                       Testing Technique: Look for exposed URLs. If unlisted,
                                  check if URLs may be accessed with wrong authentication
» Apps may not secure sensitive data with appropriate cryptography or may
  not store the artifacts around the cryptography securely
» Inside or Outside of the physical data storage
  » Stored plaintext
  » Weak algorithm used
  » Unrestricted access to decrypt function
  » Private keys accessible
                                                                   Exploitability: Difficult
                                                                   Prevalence: Uncommon
                                                                   Detectability: Difficult
                                                                   Impact: Severe

                                      Testing Technique: Look for sensitive data in plaintext.
                                                          Look for encryption in transit. (#9)
» Default settings of platform being used
  » Configuration
  » Default usernames/passwords
  » Default error messages
  » Debugger sessions open
  » Lack of updates being applied

                                                                 Exploitability: Easy
                                                                 Prevalence: Common
                                                                 Detectability: Easy
                                                                 Impact: Moderate

                                        Testing Technique: Look for custom error messages.
                                                  Look for debugger session being allowed.
Testing the OWASP Top 10
Testing the OWASP Top 10
» 200 - OK
» 401 - Unauthorized
» 403 - Forbidden
» Targets user’s session information in order to act as the user
  » http://www.store.com/AddToCart.aspx?itemID=1234
  » http://www.blog.com/ChangePassword.php?NewPass=password
» Attacker takes advantage of user’s currently stored sessions
  » In other tabs of browser
  » In browser if cookies haven’t been cleared after closing

                                                                  Exploitability: Average
                                                                  Prevalence: Widespread
                                                                  Detectability: Easy
                                                                  Impact: Moderate

                                          Testing Technique: Look for actions, which can be
                                                               completed by visiting a URL.
Testing the OWASP Top 10
» The image is right here:
» <img
  src=“http://10.30.46.15/bodgeit/basket.jsp?productid=17&price=4.1&qu
  antity=1” >
» Some application resources are accessible without going through access control
  » http://www.mysite.com/Report00032
  » http://www.mysite.com/files/BugsToFix.pdf


» Manipulate requests to access resources
  » hƩp://www.mysite.com/Report00032 →
    http://www.mysite.com/Report00033
  » http://www.mysite.com/MyAccount.php?user=bob →
                                                                    Exploitability: Easy
    http://www.mysite.com/MyAccount.php?user=joan                   Prevalence: Common
                                                                    Detectability: Easy
                                                                    Impact: Moderate

                                            Testing Technique: Look for references to objects,
                                                  and attempt to access other similar objects.
» Poorly implemented protections can still be insecure, leading to
    additional vulnerabilities

»   Sessions should expire
»   Logout should revoke the user’s session
»   Login should revoke any active sessions for same user
»   User shouldn’t be able to manipulate or guess session
»   Key actions should revoke certain session permissions
                                                                    Exploitability: Average
»   Session fixation                                                Prevalence: Common
                                                                    Detectability: Average
                                                                    Impact: Severe

                                          Testing Technique: Verify that sessions are actually
                                                             revoked following key actions.
» Untrusted input is not cleaned prior to being passed back to the browser
» Can involve rendered HTML, JavaScript or any other web content




                                                          Exploitability: Average
                                                          Prevalence: Very Widespread
                                                          Detectability: Easy
                                                          Impact: Moderate
                                      Testing Technique: Verify that input is being validated
                                                    or escaped so that it does not execute.
Testing the OWASP Top 10
» Untrusted input is not cleaned prior to being used by the application
» Users may inject their own code into
  » The App
  » SQL Queries
  » XPath Queries
  » Operating System
  » Browser/DOM
  » Anywhere data is combined into executable statements
                                                                       Exploitability: Easy
                                                                       Prevalence: Common
                                                                       Detectability: Average
                                                                       Impact: Severe

                                          Testing Technique: Verify that input is being validated
                                                          so that it is not executed server-side.
Testing the OWASP Top 10
Testing the OWASP Top 10
» SELECT Username FROM Users WHERE Password = ‘our input here’


» SELECT Username FROM Users WHERE Password = ‘a’ or ‘b’=‘b’
» Security is a big deal
» As testers, we can begin to look for obvious issues in the course of our
  normal work
» OWASP Top 10 lists 10 most prevalent web security issues & is a good
  starting point
» All of these security issues require deeper analysis beyond these
  techniques
» OWASP Top 10 document
  (http://owasptop10.googlecode.com/files/OWASP%20Top%2010%20-%202010.pdf)
» Troy Hunt’s OWASP Top 10 for .NET Developers eBook
  (https://asafaweb.com/OWASP%20Top%2010%20for%20.NET%20developers.pdf)
» The Web Application Hacker’s Handbook, 2nd Ed.
  Dafydd Stuttard and Marcus Pinto
Contact us:
AndyT@magenic.com
ZachB@magenic.com

More Related Content

PDF
How to find Zero day vulnerabilities
DOCX
Zero-Day Vulnerability and Heuristic Analysis
PPT
Penetration Testing Basics
PDF
Threats, Threat Modeling and Analysis
PPTX
Web Application Penetration Testing Introduction
PPTX
MITRE ATT&CK framework
PDF
Penetration and hacking training brief
How to find Zero day vulnerabilities
Zero-Day Vulnerability and Heuristic Analysis
Penetration Testing Basics
Threats, Threat Modeling and Analysis
Web Application Penetration Testing Introduction
MITRE ATT&CK framework
Penetration and hacking training brief

What's hot (20)

PPTX
IDSECCONF 2020 : A Tale Story of Building and Maturing Threat Hunting Program
PDF
Practical Incident Response - Work Guide
PPT
Web Application Security Testing
PPTX
Ethical Hacking & Penetration Testing
PDF
Artificial Intelligence Methods in Virus Detection & Recognition - Introducti...
PDF
Anti evasion and evader - klaus majewski
PPTX
Evading & Bypassing Anti-Malware applications using metasploit
DOCX
Malware detection
PPTX
Vapt life cycle
PDF
Whitelist Tutorial 1
PPTX
Malware Classification and Analysis
PDF
Splunk for Security
PDF
targeted-data-breach-bulletin-sept
PPTX
Application Whitelisting - Complementing Threat centric with Trust centric se...
PDF
OWASP Top 10 Project
PPTX
Information Security Awareness
PPTX
Penetration Testing
PPTX
Penetration testing reporting and methodology
PPTX
Network penetration testing
DOC
Honeypot Essentials
IDSECCONF 2020 : A Tale Story of Building and Maturing Threat Hunting Program
Practical Incident Response - Work Guide
Web Application Security Testing
Ethical Hacking & Penetration Testing
Artificial Intelligence Methods in Virus Detection & Recognition - Introducti...
Anti evasion and evader - klaus majewski
Evading & Bypassing Anti-Malware applications using metasploit
Malware detection
Vapt life cycle
Whitelist Tutorial 1
Malware Classification and Analysis
Splunk for Security
targeted-data-breach-bulletin-sept
Application Whitelisting - Complementing Threat centric with Trust centric se...
OWASP Top 10 Project
Information Security Awareness
Penetration Testing
Penetration testing reporting and methodology
Network penetration testing
Honeypot Essentials
Ad

Similar to Testing the OWASP Top 10 (20)

PPTX
NextGen Endpoint Security for Dummies
PPTX
PPTX
Delivering Security with GFI MAX - Mark Petrie
PPTX
Defending Your Corporate Endpoints How to Go Beyond Anti-Virus
PPTX
Eliz seminar
PPTX
Vulnerability assessment and penetration testing
PPTX
Delivering Security Within the MAX Remote Management Platform - Todd Haughland
PPTX
Delivering Security with the MAX RemoteManagement Platform - Paul Fenwick
PPTX
Penetration Testing vs. Vulnerability Scanning
PDF
The 5 Layers of Security Testing by Alan Koch
PDF
The 5 Layers of Security Testing by Alan Koch
PPTX
Ethical Hacking justvamshi .pptx
PDF
DSS ITSEC CONFERENCE - Lumension Security - Intelligent application whiteli...
PPTX
Traditional Reconnaissance and Attacks, Malicious Software, Defense in Depth,...
PPTX
Cyber warfare introduction
PPTX
Basics of getting Into Bug Bounty Hunting
PPT
RSA 2006 - Visual Security Event Analysis
PPTX
Metasploit
PPT
Information Technology Security Basics
PPTX
Lecture-39.pptx Xperia of this slide can conversation
NextGen Endpoint Security for Dummies
Delivering Security with GFI MAX - Mark Petrie
Defending Your Corporate Endpoints How to Go Beyond Anti-Virus
Eliz seminar
Vulnerability assessment and penetration testing
Delivering Security Within the MAX Remote Management Platform - Todd Haughland
Delivering Security with the MAX RemoteManagement Platform - Paul Fenwick
Penetration Testing vs. Vulnerability Scanning
The 5 Layers of Security Testing by Alan Koch
The 5 Layers of Security Testing by Alan Koch
Ethical Hacking justvamshi .pptx
DSS ITSEC CONFERENCE - Lumension Security - Intelligent application whiteli...
Traditional Reconnaissance and Attacks, Malicious Software, Defense in Depth,...
Cyber warfare introduction
Basics of getting Into Bug Bounty Hunting
RSA 2006 - Visual Security Event Analysis
Metasploit
Information Technology Security Basics
Lecture-39.pptx Xperia of this slide can conversation
Ad

Recently uploaded (20)

PDF
Unlocking AI with Model Context Protocol (MCP)
PDF
Dropbox Q2 2025 Financial Results & Investor Presentation
PPTX
KOM of Painting work and Equipment Insulation REV00 update 25-dec.pptx
PDF
MIND Revenue Release Quarter 2 2025 Press Release
PDF
Electronic commerce courselecture one. Pdf
PDF
Build a system with the filesystem maintained by OSTree @ COSCUP 2025
PDF
cuic standard and advanced reporting.pdf
PDF
Mobile App Security Testing_ A Comprehensive Guide.pdf
PDF
Machine learning based COVID-19 study performance prediction
PPTX
Effective Security Operations Center (SOC) A Modern, Strategic, and Threat-In...
PPTX
ACSFv1EN-58255 AWS Academy Cloud Security Foundations.pptx
PDF
Reach Out and Touch Someone: Haptics and Empathic Computing
PDF
Per capita expenditure prediction using model stacking based on satellite ima...
PPTX
Spectroscopy.pptx food analysis technology
PDF
Chapter 3 Spatial Domain Image Processing.pdf
DOCX
The AUB Centre for AI in Media Proposal.docx
PDF
Spectral efficient network and resource selection model in 5G networks
PPTX
MYSQL Presentation for SQL database connectivity
PDF
The Rise and Fall of 3GPP – Time for a Sabbatical?
PDF
Encapsulation theory and applications.pdf
Unlocking AI with Model Context Protocol (MCP)
Dropbox Q2 2025 Financial Results & Investor Presentation
KOM of Painting work and Equipment Insulation REV00 update 25-dec.pptx
MIND Revenue Release Quarter 2 2025 Press Release
Electronic commerce courselecture one. Pdf
Build a system with the filesystem maintained by OSTree @ COSCUP 2025
cuic standard and advanced reporting.pdf
Mobile App Security Testing_ A Comprehensive Guide.pdf
Machine learning based COVID-19 study performance prediction
Effective Security Operations Center (SOC) A Modern, Strategic, and Threat-In...
ACSFv1EN-58255 AWS Academy Cloud Security Foundations.pptx
Reach Out and Touch Someone: Haptics and Empathic Computing
Per capita expenditure prediction using model stacking based on satellite ima...
Spectroscopy.pptx food analysis technology
Chapter 3 Spatial Domain Image Processing.pdf
The AUB Centre for AI in Media Proposal.docx
Spectral efficient network and resource selection model in 5G networks
MYSQL Presentation for SQL database connectivity
The Rise and Fall of 3GPP – Time for a Sabbatical?
Encapsulation theory and applications.pdf

Testing the OWASP Top 10

  • 1. Andy Tinkham & Zach Bergman, Magenic Technologies Contact Us 1600 Utica Avenue South, Suite 800 St. Louis Park, MN 55416 1 (877)-277-1044 info@magenic.com
  • 2. » Magenic: Leading consultancy providing custom application development, testing and QA services » Andy » 17 years of testing experience, focusing on automation, performance & other technical testing » Principal Consultant at Magenic, leading all our technical testing activities » Zach » 3 years of testing experience, focusing on security & test automation » Consultant at Magenic, driving internal security growth & initiatives
  • 3. » Testing focused on 3 aspects of a system » Authentication – determining an entity is who they claim to be » Authorization – determining whether an entity is allowed to use a requested action or resource » Accounting – documenting what occurs in the system Authentication Authorization Accounting
  • 4. » Talk about the most prevalent security vulnerabilities » Structure that talk using the OWASP Top 10 list » Andy will describe issue » Zach will demonstrate issue and talk about techniques to identify it » Cover some very basic testing techniques to find these » Only begin to scratch the surface of security testing
  • 5. » Open Web Application Security Project » Non-profit organization focused on improving the security of software » Around since 2001 » Not affiliated with any technology company » Provide a variety of free tools, education, and information around application security » Local chapter: https://www.owasp.org/index.php/Minneapolis_St_Paul Next meeting: 1/21/2013, Gunnar Peterson, “Mobile AppSec – How iOS and Android Apps fail and what to do to protect them”
  • 6. Most critical web application security flaws • Occur frequently • Easy to find • Easy to exploit 10. Unvalidated Redirects and Forwards 5. Cross-Site Request Forgery 9. Insufficient Transport Layer Protection 4. Insecure Direct Object References 8. Failure to Restrict URL Access 3. Broken Authentication & Session Management 7. Insecure Cryptographic Storage 2. Cross-Site Scripting 6. Security Misconfiguration 1. Injection
  • 7. » Security is a big deal » 77 million user accounts compromised on Sony PlayStation network » $1 trillion dollars worth of intellectual property stolen in 2008 (McAfee) » Symantec estimates the global price tag of consumer cybercrime to be $110 billion with 18 victims every second » 90% of businesses suffered some sort of hack in last 12 months (Research Ponemon/Juniper Networks, June 2011) » 83% of websites have had a high, critical or urgent issue (WhiteHat Security, 2009) » Poor security can lead to » Unwanted information disclosure » Compromised data » Financial and Reputational Costs » Legal Issues (HIPAA, other industry information security governance)
  • 8. » Burp Suite (http://www.portswigger.net/burp/) » Awesome Cookie Manager (Chrome App Store) » BodgeIt Store (http://code.google.com/p/bodgeit/) » REST Console (Chrome App Store)
  • 9. » Use of an app’s built-in redirect to access an unintended location » http://yoursite.com/redirect.php?url=http://yoursite.com/admin.php » http://yoursite.com/redirect.php?url=http://badsite.com » Users can be convinced to give information thinking they’re giving it to you » Example Exploitability: Average Prevalence: Uncommon Detectability: Easy Impact: Moderate Testing Technique: Look for redirect functions throughout application in URL or request parameters
  • 10. » Unencrypted data traversing networks can be seen, manipulated, and used without user knowledge » The session information from browser » User personally-identifiable information Exploitability: Difficult Prevalence: Common Detectability: Easy Impact: Moderate Testing Technique: See if HTTPS and TLS 1.1+ is being used on appropriate secure pages
  • 11. Request over HTTP Request over HTTPS (SSL)
  • 12. » Typically happens when assumptions are made regarding users’ knowledge of the app’s layout/functionality – security by obscurity » http://www.mysite.com/MySecretAdminConsole.php » http://www.mysite.com/ManagerReports » Hidden or Unlisted resources » Only show the user functionality they can use Exploitability: Easy Prevalence: Uncommon Detectability: Average Impact: Moderate Testing Technique: Look for exposed URLs. If unlisted, check if URLs may be accessed with wrong authentication
  • 13. » Apps may not secure sensitive data with appropriate cryptography or may not store the artifacts around the cryptography securely » Inside or Outside of the physical data storage » Stored plaintext » Weak algorithm used » Unrestricted access to decrypt function » Private keys accessible Exploitability: Difficult Prevalence: Uncommon Detectability: Difficult Impact: Severe Testing Technique: Look for sensitive data in plaintext. Look for encryption in transit. (#9)
  • 14. » Default settings of platform being used » Configuration » Default usernames/passwords » Default error messages » Debugger sessions open » Lack of updates being applied Exploitability: Easy Prevalence: Common Detectability: Easy Impact: Moderate Testing Technique: Look for custom error messages. Look for debugger session being allowed.
  • 17. » 200 - OK » 401 - Unauthorized » 403 - Forbidden
  • 18. » Targets user’s session information in order to act as the user » http://www.store.com/AddToCart.aspx?itemID=1234 » http://www.blog.com/ChangePassword.php?NewPass=password » Attacker takes advantage of user’s currently stored sessions » In other tabs of browser » In browser if cookies haven’t been cleared after closing Exploitability: Average Prevalence: Widespread Detectability: Easy Impact: Moderate Testing Technique: Look for actions, which can be completed by visiting a URL.
  • 20. » The image is right here: » <img src=“http://10.30.46.15/bodgeit/basket.jsp?productid=17&price=4.1&qu antity=1” >
  • 21. » Some application resources are accessible without going through access control » http://www.mysite.com/Report00032 » http://www.mysite.com/files/BugsToFix.pdf » Manipulate requests to access resources » hƩp://www.mysite.com/Report00032 → http://www.mysite.com/Report00033 » http://www.mysite.com/MyAccount.php?user=bob → Exploitability: Easy http://www.mysite.com/MyAccount.php?user=joan Prevalence: Common Detectability: Easy Impact: Moderate Testing Technique: Look for references to objects, and attempt to access other similar objects.
  • 22. » Poorly implemented protections can still be insecure, leading to additional vulnerabilities » Sessions should expire » Logout should revoke the user’s session » Login should revoke any active sessions for same user » User shouldn’t be able to manipulate or guess session » Key actions should revoke certain session permissions Exploitability: Average » Session fixation Prevalence: Common Detectability: Average Impact: Severe Testing Technique: Verify that sessions are actually revoked following key actions.
  • 23. » Untrusted input is not cleaned prior to being passed back to the browser » Can involve rendered HTML, JavaScript or any other web content Exploitability: Average Prevalence: Very Widespread Detectability: Easy Impact: Moderate Testing Technique: Verify that input is being validated or escaped so that it does not execute.
  • 25. » Untrusted input is not cleaned prior to being used by the application » Users may inject their own code into » The App » SQL Queries » XPath Queries » Operating System » Browser/DOM » Anywhere data is combined into executable statements Exploitability: Easy Prevalence: Common Detectability: Average Impact: Severe Testing Technique: Verify that input is being validated so that it is not executed server-side.
  • 28. » SELECT Username FROM Users WHERE Password = ‘our input here’ » SELECT Username FROM Users WHERE Password = ‘a’ or ‘b’=‘b’
  • 29. » Security is a big deal » As testers, we can begin to look for obvious issues in the course of our normal work » OWASP Top 10 lists 10 most prevalent web security issues & is a good starting point » All of these security issues require deeper analysis beyond these techniques
  • 30. » OWASP Top 10 document (http://owasptop10.googlecode.com/files/OWASP%20Top%2010%20-%202010.pdf) » Troy Hunt’s OWASP Top 10 for .NET Developers eBook (https://asafaweb.com/OWASP%20Top%2010%20for%20.NET%20developers.pdf) » The Web Application Hacker’s Handbook, 2nd Ed. Dafydd Stuttard and Marcus Pinto