SlideShare a Scribd company logo
Ayoob Kalathingal - PMP
Director - Emstell Technology Consulting
Ayoob.ok@emstell.com
Kuwait, India, United Kingdom, Saudi Arabia
 Understand the need for securing the application layer of web based
applications.
 Understand the various web application vulnerabilities, impact and Counter
Measures
 Security testing.
www.emstell.com
 Web applications have evolved from static pages to a more interactive set up.
This interaction has started exposing the technical deficiencies of web
applications in the form of vulnerabilities.
 Dependency on the internet to carry out critical and sensitive business
transactions has increased . Hence the stake involved is very high.
 “Over 50% of security attacks are targeted on web based applications” -
Gartner Report”
 Competition is so high that enterprises can‟t ignore the risk associated with
their vulnerable application. Loss incurred could vary from monetary losses
to loss of credibility. In certain cases it could mean end of business.
www.emstell.com
Many Countries has come up with strict rules and regulations on Information
Security of business.
 IT Act 2011 in India
 PIPED Act – Canada (Personal Information Protection and Electronic Documents Act)
 U.S. Information Security Law,
 HIPAA – 1996 - Health Insurance Portability and Accountability Act
Business Customers are increasingly aware of the systems security and is
demanding security and quality certifications in the systems
 ISO 27001
 PCI DSS - Payment Card Industry Data Security Standard
www.emstell.com
Large number of applications coming to the hands of common man carrying out
transactions with personal and financial data
More and more applications moving to cloud where multiple user or enterprise
data is stored in single server or data centers.
“Application security is no more a Luxury, its Business”
www.emstell.com
 Confidentiality – ensuring that information is accessible only to those authorized.
 Integrity – safeguarding the accuracy and completeness of information and processing
methods.
 Availability – ensuring that authorized users have access to information and associated
assets when required.
 Accountability – ensuring that authorized users use information in appropriate ways.
www.emstell.com
Web
Server
DBApp
Server
Firewall
Port 80 (Open)HTTP Traffic
Client
www.emstell.com
SQL Query
SELECT user FROM Users
WHERE
Username = '"& strname &"' AND Password = '"& strPassword &"„
Query with valid input
SELECT user FROM Users
WHERE
Username = 'avis' AND Password = 'avis'
www.emstell.com
Query with tampered input
SELECT user FROM Users
WHERE
Username = 'avis';--' AND Password = '"& strPassword &"'
www.emstell.com
Authorization
 Credential/Session
Prediction
 Insufficient Session
Expiration
 Session Fixation
 Insufficient
Authorization
Authentication
 Brute Force
 Weak Password Recovery
Policy
 Insufficient
Authentication
Client-Side Attacks
 Content Spoofing
 Cross Site Scripting
Information Disclosure
 Directory Indexing
 Information Leakage
 Path Traversal
 Predictable Resource
Location
Command Execution
 Buffer Overflow
 Format String Attack
 LDAP Injection
 OS Commanding
 SQL Injection
 SSI Injection
 X Path Injection
Logical Attacks
 Abuse of Functionality
 Denial of Service
 Insufficient Anti-
Automation
 Insufficient Process
Validation
www.emstell.com
 Non-availability (By bringing the database down)
 Breach of confidentiality (By viewing other user‟s records)
 Breach of integrity (By updating other user‟s records)
 Impersonation (By logging into accounts without a valid password)
 + Business Impacts
www.emstell.com
 Strong and Secure systems, firewalls and antiviruses
 Proper Input validation
 Following standard coding practices
 Have strong password policy in place.
 Use of strong session ID generation algorithms
 Disable scripting in the web browser and disable input echoing
 Grant only necessary privileges for accounts that are used to connect to DB
 Implement/configure proper access control mechanisms on the web server.
 Application Security Testing and Fixing the vulnerabilities
 Educating the users
www.emstell.com
“Though the significant attacks over time where of Zero Day Attack nature, this
forms much a lesser count of the total attacks”
Test based on the Target Users
 Vulnerability Assessments
 Penetration Testing
Manual - a team of security
experts manually probe the
application for common flaws.
Automated - a tool is used for
testing the application for flaws.
False Positives
www.emstell.com
“The cost of quality is higher in the later stages of an application”
Application security should be a part of the application development and
should be incorporated to the SDLC Process.
Integrating security to the build.
Educating the users, using the best of media and creative formats.
www.emstell.com
Ref: www.owasp.org
www.emstell.com
Emstell Technology Consulting, is a technology firm offering enterprise level
software quality assurance and testing services and ERP Solutions in Education
sector.
Our Media team deliver creative animated videos for educating users on
company policies, explaining business and promotion.
We deliver ERP Solutions in
◦ Web Enabled School Management
◦ Library Management Solution
◦ Business Accounting and Inventory
www.emstell.com
Ayoob Kalathingal - PMP
Director - Emstell Technology Consulting
Ayoob.ok@emstell.com
Kuwait, India, United Kingdom, Saudi Arabia
www.emstell.com

More Related Content

PPTX
Scug 1809 Take conditional access to the next level
PPT
Get Ready for Web Application Security Testing
PPT
Proxy For employee monitoring
PPT
Web Application Security
PPTX
Security by the numbers
PDF
Modern IAM Trends and Themes by Eve Maler, Forrester
PPTX
Ewug 1808 take conditional access to the next level
PPTX
Identity and Access Management Introduction
Scug 1809 Take conditional access to the next level
Get Ready for Web Application Security Testing
Proxy For employee monitoring
Web Application Security
Security by the numbers
Modern IAM Trends and Themes by Eve Maler, Forrester
Ewug 1808 take conditional access to the next level
Identity and Access Management Introduction

What's hot (16)

PDF
DataMindsConnect2018_SECDEVOPS
PDF
Symantec Mobility Suite -Workforce apps
PDF
ITCamp 2018 - Tobiasz Koprowski - SECDEV(OPS). How to Brace Your IT Security.
PPT
Developing Secure Applications and Defending Against Common Attacks
PDF
Iasi code camp 12 october 2013 ana tudosa - challenges in implementing and ...
PDF
C01461422
PPTX
Securing Software-as-a-Service: Cover your SaaS and protect enterprise data
PPTX
Web app presentation
PDF
Review Paper ( Research Articles )
PPTX
Exploiting parameter tempering attack in web application
PPTX
We cant hack ourselves secure
PDF
Verizon DMS' Bot Mitigation from Paul Hobbs
PPTX
Parameter tampering
PPTX
4 ways to defend against internal attacks
PPTX
Identity's Role in a Zero Trust Strategy
PDF
Web Application Security Tips
DataMindsConnect2018_SECDEVOPS
Symantec Mobility Suite -Workforce apps
ITCamp 2018 - Tobiasz Koprowski - SECDEV(OPS). How to Brace Your IT Security.
Developing Secure Applications and Defending Against Common Attacks
Iasi code camp 12 october 2013 ana tudosa - challenges in implementing and ...
C01461422
Securing Software-as-a-Service: Cover your SaaS and protect enterprise data
Web app presentation
Review Paper ( Research Articles )
Exploiting parameter tempering attack in web application
We cant hack ourselves secure
Verizon DMS' Bot Mitigation from Paul Hobbs
Parameter tampering
4 ways to defend against internal attacks
Identity's Role in a Zero Trust Strategy
Web Application Security Tips
Ad

Viewers also liked (17)

DOCX
Pengenalan game fps point blank
PPT
Paparan malindo (malaysia indonesia)
PPTX
Bahan rakernis 2011
PPT
Organisasi kepribadian
PDF
Plan de trabajo AEXSAM 2016 - 2018
PPT
Slide pppm
PPT
Online campus School Management ERP
PPTX
Presentasi bu linda
PPT
правописание заглавной буквы г
PPTX
Des Presentation
PDF
Gray whale in the Mediterranean Sea
PPTX
P sujiman
PPT
Skype sebagai solusi komunikasi dalam pengajaran jarak jauh
PPT
страны снг
PPTX
проект тюльпаны
PPT
Pps 2008 pendidikan prof. dr. dwi nugroho
PPTX
Water rescue
Pengenalan game fps point blank
Paparan malindo (malaysia indonesia)
Bahan rakernis 2011
Organisasi kepribadian
Plan de trabajo AEXSAM 2016 - 2018
Slide pppm
Online campus School Management ERP
Presentasi bu linda
правописание заглавной буквы г
Des Presentation
Gray whale in the Mediterranean Sea
P sujiman
Skype sebagai solusi komunikasi dalam pengajaran jarak jauh
страны снг
проект тюльпаны
Pps 2008 pendidikan prof. dr. dwi nugroho
Water rescue
Ad

Similar to Web application security - Emstell Technology Consulting (20)

PDF
Ibm app security assessment_ds
PDF
Security testing
PPT
Discovering the Value of Verifying Web Application Security Using IBM Rationa...
PDF
Nikhil wagholikar _risk_based_penetration_testing - ClubHack2009
PDF
The Future of Software Security Assurance
PDF
Application security Best Practices Framework
PPTX
Ryan Elkins - Simple Security Defense to Thwart an Army of Cyber Ninja Warriors
PPTX
Enterprise under attack dealing with security threats and compliance
PDF
Application Security
PPTX
Application Security TRENDS – Lessons Learnt- Firosh Ummer
PPT
Compliance Awareness
PDF
Data Power For Pci Webinar Aug 2012
PPS
Application Security Review 5 Dec 09 Final
PDF
Essentials of Web Application Security: what it is, why it matters and how to...
PPT
How PCI And PA DSS will change enterprise applications
DOCX
Project Quality-SIPOCSelect a process of your choice and creat.docx
PDF
Cyber security series Application Security
PDF
Re-Thinking BYOD Policy.pptx
PDF
Application security testing an integrated approach
PDF
Application Security - Your Success Depends on it
Ibm app security assessment_ds
Security testing
Discovering the Value of Verifying Web Application Security Using IBM Rationa...
Nikhil wagholikar _risk_based_penetration_testing - ClubHack2009
The Future of Software Security Assurance
Application security Best Practices Framework
Ryan Elkins - Simple Security Defense to Thwart an Army of Cyber Ninja Warriors
Enterprise under attack dealing with security threats and compliance
Application Security
Application Security TRENDS – Lessons Learnt- Firosh Ummer
Compliance Awareness
Data Power For Pci Webinar Aug 2012
Application Security Review 5 Dec 09 Final
Essentials of Web Application Security: what it is, why it matters and how to...
How PCI And PA DSS will change enterprise applications
Project Quality-SIPOCSelect a process of your choice and creat.docx
Cyber security series Application Security
Re-Thinking BYOD Policy.pptx
Application security testing an integrated approach
Application Security - Your Success Depends on it

Recently uploaded (20)

PDF
Taming the Chaos: How to Turn Unstructured Data into Decisions
PDF
Architecture types and enterprise applications.pdf
PDF
A comparative study of natural language inference in Swahili using monolingua...
PDF
A contest of sentiment analysis: k-nearest neighbor versus neural network
PPTX
Chapter 5: Probability Theory and Statistics
PPTX
Final SEM Unit 1 for mit wpu at pune .pptx
PDF
TrustArc Webinar - Click, Consent, Trust: Winning the Privacy Game
PDF
Five Habits of High-Impact Board Members
PPTX
Modernising the Digital Integration Hub
PDF
STKI Israel Market Study 2025 version august
PDF
A review of recent deep learning applications in wood surface defect identifi...
PPTX
O2C Customer Invoices to Receipt V15A.pptx
PPT
Module 1.ppt Iot fundamentals and Architecture
PDF
Zenith AI: Advanced Artificial Intelligence
PPTX
Tartificialntelligence_presentation.pptx
PDF
Unlock new opportunities with location data.pdf
PDF
sustainability-14-14877-v2.pddhzftheheeeee
PPT
Geologic Time for studying geology for geologist
PDF
ENT215_Completing-a-large-scale-migration-and-modernization-with-AWS.pdf
PDF
Video forgery: An extensive analysis of inter-and intra-frame manipulation al...
Taming the Chaos: How to Turn Unstructured Data into Decisions
Architecture types and enterprise applications.pdf
A comparative study of natural language inference in Swahili using monolingua...
A contest of sentiment analysis: k-nearest neighbor versus neural network
Chapter 5: Probability Theory and Statistics
Final SEM Unit 1 for mit wpu at pune .pptx
TrustArc Webinar - Click, Consent, Trust: Winning the Privacy Game
Five Habits of High-Impact Board Members
Modernising the Digital Integration Hub
STKI Israel Market Study 2025 version august
A review of recent deep learning applications in wood surface defect identifi...
O2C Customer Invoices to Receipt V15A.pptx
Module 1.ppt Iot fundamentals and Architecture
Zenith AI: Advanced Artificial Intelligence
Tartificialntelligence_presentation.pptx
Unlock new opportunities with location data.pdf
sustainability-14-14877-v2.pddhzftheheeeee
Geologic Time for studying geology for geologist
ENT215_Completing-a-large-scale-migration-and-modernization-with-AWS.pdf
Video forgery: An extensive analysis of inter-and intra-frame manipulation al...

Web application security - Emstell Technology Consulting

  • 1. Ayoob Kalathingal - PMP Director - Emstell Technology Consulting Ayoob.ok@emstell.com Kuwait, India, United Kingdom, Saudi Arabia
  • 2.  Understand the need for securing the application layer of web based applications.  Understand the various web application vulnerabilities, impact and Counter Measures  Security testing. www.emstell.com
  • 3.  Web applications have evolved from static pages to a more interactive set up. This interaction has started exposing the technical deficiencies of web applications in the form of vulnerabilities.  Dependency on the internet to carry out critical and sensitive business transactions has increased . Hence the stake involved is very high.  “Over 50% of security attacks are targeted on web based applications” - Gartner Report”  Competition is so high that enterprises can‟t ignore the risk associated with their vulnerable application. Loss incurred could vary from monetary losses to loss of credibility. In certain cases it could mean end of business. www.emstell.com
  • 4. Many Countries has come up with strict rules and regulations on Information Security of business.  IT Act 2011 in India  PIPED Act – Canada (Personal Information Protection and Electronic Documents Act)  U.S. Information Security Law,  HIPAA – 1996 - Health Insurance Portability and Accountability Act Business Customers are increasingly aware of the systems security and is demanding security and quality certifications in the systems  ISO 27001  PCI DSS - Payment Card Industry Data Security Standard www.emstell.com
  • 5. Large number of applications coming to the hands of common man carrying out transactions with personal and financial data More and more applications moving to cloud where multiple user or enterprise data is stored in single server or data centers. “Application security is no more a Luxury, its Business” www.emstell.com
  • 6.  Confidentiality – ensuring that information is accessible only to those authorized.  Integrity – safeguarding the accuracy and completeness of information and processing methods.  Availability – ensuring that authorized users have access to information and associated assets when required.  Accountability – ensuring that authorized users use information in appropriate ways. www.emstell.com
  • 8. SQL Query SELECT user FROM Users WHERE Username = '"& strname &"' AND Password = '"& strPassword &"„ Query with valid input SELECT user FROM Users WHERE Username = 'avis' AND Password = 'avis' www.emstell.com
  • 9. Query with tampered input SELECT user FROM Users WHERE Username = 'avis';--' AND Password = '"& strPassword &"' www.emstell.com
  • 10. Authorization  Credential/Session Prediction  Insufficient Session Expiration  Session Fixation  Insufficient Authorization Authentication  Brute Force  Weak Password Recovery Policy  Insufficient Authentication Client-Side Attacks  Content Spoofing  Cross Site Scripting Information Disclosure  Directory Indexing  Information Leakage  Path Traversal  Predictable Resource Location Command Execution  Buffer Overflow  Format String Attack  LDAP Injection  OS Commanding  SQL Injection  SSI Injection  X Path Injection Logical Attacks  Abuse of Functionality  Denial of Service  Insufficient Anti- Automation  Insufficient Process Validation www.emstell.com
  • 11.  Non-availability (By bringing the database down)  Breach of confidentiality (By viewing other user‟s records)  Breach of integrity (By updating other user‟s records)  Impersonation (By logging into accounts without a valid password)  + Business Impacts www.emstell.com
  • 12.  Strong and Secure systems, firewalls and antiviruses  Proper Input validation  Following standard coding practices  Have strong password policy in place.  Use of strong session ID generation algorithms  Disable scripting in the web browser and disable input echoing  Grant only necessary privileges for accounts that are used to connect to DB  Implement/configure proper access control mechanisms on the web server.  Application Security Testing and Fixing the vulnerabilities  Educating the users www.emstell.com
  • 13. “Though the significant attacks over time where of Zero Day Attack nature, this forms much a lesser count of the total attacks” Test based on the Target Users  Vulnerability Assessments  Penetration Testing Manual - a team of security experts manually probe the application for common flaws. Automated - a tool is used for testing the application for flaws. False Positives www.emstell.com
  • 14. “The cost of quality is higher in the later stages of an application” Application security should be a part of the application development and should be incorporated to the SDLC Process. Integrating security to the build. Educating the users, using the best of media and creative formats. www.emstell.com
  • 16. Emstell Technology Consulting, is a technology firm offering enterprise level software quality assurance and testing services and ERP Solutions in Education sector. Our Media team deliver creative animated videos for educating users on company policies, explaining business and promotion. We deliver ERP Solutions in ◦ Web Enabled School Management ◦ Library Management Solution ◦ Business Accounting and Inventory www.emstell.com
  • 17. Ayoob Kalathingal - PMP Director - Emstell Technology Consulting Ayoob.ok@emstell.com Kuwait, India, United Kingdom, Saudi Arabia www.emstell.com