SlideShare a Scribd company logo
Web Security – Everything we know is wrong
Eoin Keary
• CTO BCCRISKADVISORY.COM
• OWASP GLOBAL BOARD MEMBER
• OWASP Reboot & Code Review Project Lead
HACKED
3
Last Week (11th November):

“Loyaltybuild” BREACH

1,100,000
30
$$$
Globally,
2012 Cyber Crime
every
second, 18 • US $20.7 billion in direct losses
• Global $110 billion in direct losses
adults
• Global $338 billion + downtime
become
victims of
“The loss of industrial information and intellectual
cybercrime property through cyber espionage constitutes the
- Symantec greatest transfer of wealth in history” - Keith

“One
hundred
BILLION
dollars” Dr Evil

Alexander

Almost 1 trillion USD was spent in
2012 protecting against cybercrime

Eoin, I didn’t click it – My
Grandma

“556 million adults across the world have first-hand experience of
cybercrime -- more than the entire population of the European
Union.”
Its (not) the $$$$

Information
security spend

Security incidents
(business impact)
……we are approaching this problem
[software <in>Security] completely wrong and
have been for years…..
Asymmetric Arms Race
A traditional end of cycle / Annual pentest only
gives minimal security…..
There are too many variables and too little time
to ensure “real security”.
Two weeks of
ethical hacking

Business
Logic Flaws

Security
Errors

Code
Flaws

Ten man-years of
development
Make this more difficult: Lets change the application code once a month.
"Risk comes from not knowing what you're
doing." - Warren Buffet
Time Limited:
Consultant “tune tools”
Use multiple tools – verify issues
Customize Attack Vectors to technology stack
Achieve 80-90 application functionality coverage

A fool with a tool, is still a fool”…..?
Experience
As good as the bad guys?

Code may be pushed frequently:
Erosion of Penetration test?
Window of Exploitation?
Tools with Tunnel Vision:
Problem has moved (back) to the client.
Some “Client Side” vulnerabilities can’t be tested via HTTP parameter testing.
AJAX
Flex/Flash/Air
Native Mobile Web Apps – Data Storage, leakage, malware.
DOM XSS – Sinks & Sources in client script -> no HTTP required
Scanning in not enough anymore.
We need DOM security assessment.
- Javascript parsing/ Taint analysis/ String analysis

http://code.google.com/p/domxsswiki/
“We need an Onion”
SDL

Design review
Threat Modeling
Code review/SAST
Negative use/abuse cases/Fuzzing/DAST

Live/
Ongoing

Continuous/Frequent monitoring / Testing
Manual Validation
Vulnerability management & Priority
Dependency Management ….

“Robots are good at detecting known unknowns”
“Humans are good at detecting unknown unknowns”
You are what you eat
Cheeseburger Security

We know they are bad for us, but who cares, right?
If we eat too many we may get a heart attack? …sound familiar
We also write [in]secure code until we get hacked
The Cheeseburger approach: “Cheeseburger risk’ is the kind of risk you
deliberately take even knowing the consequences, until those consequences
actually come to pass.”
Software food chain

COTS
(Commercial off
the shelf

Application
Code

Outsourced
development

SubContractors

Third Party
API’s

Bespoke
outsourced
development

Third Party
Components
& Systems
Bespoke Internal
development

More

Degrees of trust

Less

You may not let some of the people who have developed your code into your offices!!
19
2012- Study of 31 popular open source libraries.
- 19.8 million (26%) of the library downloads
have known vulnerabilities.
- Today's applications may use up to 30 or more
libraries - 80% of the codebase
Spring - application development framework :
downloaded 18 million times by over 43,000
organizations in the last year. – Vulnerability:
Information leakage CVE-2011-2730
http://support.springsource.com/security/cve-2011-2730

In Apache CXF– application framework: 4.2
million downloads.- Vulnerability: high risk CVE2010-2076 & CVE 2012-0803
http://svn.apache.org/repos/asf/cxf/trunk/security/CVE-2010-2076.pdf
http://cxf.apache.org/cve-2012-0803.html
Do we test for "dependency“ issues?

NO
Does your patch management policy cover
application dependencies?

Check out: https://github.com/jeremylong/DependencyCheck
Bite off more than we chew
“We can’t improve what we can’t measure”
How can we manage vulnerabilities on a large
scale….
Web security-–-everything-we-know-is-wrong-eoin-keary
Say 300 web applications:
300 Annual Penetration tests
10’s of different penetration testers?
300 reports
How do we consume this Data?
Enterprise Security Intelligence:
Consolidation of vulnerability data.
Continuous active monitoring
Vulnerability Management solutions
Delta Analysis is Key: Initial testing is most work. Subsequent
testing is easier we focus on delta/change.
Metrics: We can measure what problems we have
Measure: We cant improve what we cant measure

Priority: If we can measure we can prioritise
Delta: If we can measure we can detect change
Apply: We can apply our (limited) budget on the right things
Improve: We can improve where it matters……
Value: Demonstrate value to our business

Answer the question: “Are we secure?” <- a little better
Information flooding
(Melting a developers brain, White noise and
“compliance”)
Doing things right != Doing the right things.
“Not all bugs/vulnerabilities are equal”
(is HttpOnly important if there is no XSS?)

Context is important!

Contextualize Risk
(is XSS /SQLi always High Risk?)

Do developers need to fix everything?
- Limited time
- Finite Resources
- Task Priority
- Pass internal audit?
Dick Tracy

White Noise
Compliance

There’s Compliance:
EU directive:
http://register.consilium.europa.eu/pdf/en/12/st05/st05853.
en12.pdf

Article 23,24 & 79, - Administrative sanctions
“The supervisory authority shall impose a fine up to 250 000
EUR, or in case of an enterprise up to 0.5 % of its annual
worldwide turnover, to anyone who, intentionally or
negligently does not protect personal data”
…and there’s Compliance

Clear and Present Danger!!
Update:

Kinder eggs are now legal in the USA.

You’re Welcome!!
Problem
Explain issues in “Developer speak” (AKA English)
Is Cross-Site Scripting the same as SQL injection?
Both are injection attacks -> code and data
being confused by system.

LDAP Injection, Command Injection, Log Injection, XSS, SQLI etc etc
XSS causes the browser to execute user
supplied input as code. The input breaks out of
the [data context] and becomes [execution
context].
SQLI causes the database or source code
calling the database to confuse [data context]
and ANSI SQL [ execution context].
Command injection mixes up [data context]
and the [execution context].
To Conclude….
We need to understand what we are protecting against.
We need to understand that a pentest alone is a loosing battle.
You can only improve what you can measure
Not all bugs are created equal.
Bugs are Bugs. Explain security issues to developers in “Dev speak”
Thanks for Listening
eoin@bccriskadvisory.com

Eoin.Keary@owasp.org
@eoinkeary

www.bccriskadvisory.com

© BCC Risk Advisory Ltd 2013 ..
All rights reserved.

More Related Content

ODP
Csrf not-all-defenses-are-created-equal
PPTX
Owasp2013 johannesullrich
PPTX
Phu appsec13
PDF
Owasp advanced mobile-application-code-review-techniques-v0.2
PDF
Web Application Security with PHP
PPTX
Cyber ppt
PDF
Web Security - Introduction v.1.3
PPTX
Hacking WebApps for fun and profit : how to approach a target?
Csrf not-all-defenses-are-created-equal
Owasp2013 johannesullrich
Phu appsec13
Owasp advanced mobile-application-code-review-techniques-v0.2
Web Application Security with PHP
Cyber ppt
Web Security - Introduction v.1.3
Hacking WebApps for fun and profit : how to approach a target?

What's hot (20)

PDF
Web Security: A Primer for Developers
PPTX
[Wroclaw #2] Web Application Security Headers
PDF
Web Security 101
PPTX
Nguyen Phuong Truong Anh - Some new vulnerabilities in modern web application
PPTX
Rapid Android Application Security Testing
PPTX
Case Study of Django: Web Frameworks that are Secure by Default
PPT
Django (Web Applications that are Secure by Default)
PPTX
Web Hacking Intro
PPTX
In The Middle of Printers - The (In)Security of Pull Printing solutions - Hac...
PDF
Penetration testing web application web application (in) security
PDF
Abusing & Securing XPC in macOS apps
PPTX
[CB16] Electron - Build cross platform desktop XSS, it’s easier than you thin...
PDF
ATM Malware: Understanding the threat
PPTX
3. backup file artifacts - mazin ahmed
PPTX
2013 michael coates-javaone
PDF
2013 OWASP Top 10
PPTX
Devouring Security XML Attack surface and Defences
PPTX
DVWA(Damn Vulnerabilities Web Application)
PPTX
[OWASP Poland Day] Application security - daily questions & answers
PPTX
Owasp web application security trends
Web Security: A Primer for Developers
[Wroclaw #2] Web Application Security Headers
Web Security 101
Nguyen Phuong Truong Anh - Some new vulnerabilities in modern web application
Rapid Android Application Security Testing
Case Study of Django: Web Frameworks that are Secure by Default
Django (Web Applications that are Secure by Default)
Web Hacking Intro
In The Middle of Printers - The (In)Security of Pull Printing solutions - Hac...
Penetration testing web application web application (in) security
Abusing & Securing XPC in macOS apps
[CB16] Electron - Build cross platform desktop XSS, it’s easier than you thin...
ATM Malware: Understanding the threat
3. backup file artifacts - mazin ahmed
2013 michael coates-javaone
2013 OWASP Top 10
Devouring Security XML Attack surface and Defences
DVWA(Damn Vulnerabilities Web Application)
[OWASP Poland Day] Application security - daily questions & answers
Owasp web application security trends
Ad

Viewers also liked (20)

PDF
99 inception-deck
PPT
大规模网站架构
PPTX
I mas appsecusa-nov13-v2
PPTX
新浪微博稳定性经验谈
PPT
14 key management & exchange
PPT
Mr&ueh数据库方面
PPT
Презентация
PDF
Docker在豆瓣的实践 刘天伟-20160709
PPTX
4 高阳 淘宝主站cgroup资源控制实践
PPTX
Ceph Day San Jose - Ceph at Salesforce
PDF
Ceph Day San Jose - From Zero to Ceph in One Minute
PPTX
Ceph Day San Jose - Red Hat Storage Acceleration Utlizing Flash Technology
PDF
Ceph Day San Jose - HA NAS with CephFS
PPTX
Ceph Day San Jose - Enable Fast Big Data Analytics on Ceph with Alluxio
PDF
Ceph Day San Jose - All-Flahs Ceph on NUMA-Balanced Server
PPTX
Ceph Day San Jose - Ceph in a Post-Cloud World
PPTX
Ceph Day Tokyo - Ceph Community Update
PDF
Ceph Day Tokyo -- Ceph on All-Flash Storage
PDF
Ceph, Now and Later: Our Plan for Open Unified Cloud Storage
99 inception-deck
大规模网站架构
I mas appsecusa-nov13-v2
新浪微博稳定性经验谈
14 key management & exchange
Mr&ueh数据库方面
Презентация
Docker在豆瓣的实践 刘天伟-20160709
4 高阳 淘宝主站cgroup资源控制实践
Ceph Day San Jose - Ceph at Salesforce
Ceph Day San Jose - From Zero to Ceph in One Minute
Ceph Day San Jose - Red Hat Storage Acceleration Utlizing Flash Technology
Ceph Day San Jose - HA NAS with CephFS
Ceph Day San Jose - Enable Fast Big Data Analytics on Ceph with Alluxio
Ceph Day San Jose - All-Flahs Ceph on NUMA-Balanced Server
Ceph Day San Jose - Ceph in a Post-Cloud World
Ceph Day Tokyo - Ceph Community Update
Ceph Day Tokyo -- Ceph on All-Flash Storage
Ceph, Now and Later: Our Plan for Open Unified Cloud Storage
Ad

Similar to Web security-–-everything-we-know-is-wrong-eoin-keary (20)

PPTX
We cant hack ourselves secure
PPTX
Web security – everything we know is wrong cloud version
PPTX
Web security – application security roads to software security nirvana iisf...
PPTX
00. introduction to app sec v3
PDF
Security Awareness
PDF
Secure coding guidelines
PDF
Secure Coding principles by example: Build Security In from the start - Carlo...
PPTX
Security in an Interconnected and Complex World of Software
PPTX
DevBeat 2013 - Developer-first Security
PPTX
State of the information security nation
PDF
C01461422
PPTX
Started In Security Now I'm Here
PPTX
Ryan Elkins - Simple Security Defense to Thwart an Army of Cyber Ninja Warriors
PPTX
How to Test for The OWASP Top Ten
PDF
New Era of Software with modern Application Security v1.0
PDF
Owasp top 10_openwest_2019
PDF
Who Owns Software Security?
PDF
Who owns Software Security
PPTX
WEB APPLICATION SECURITY
PPTX
RSA Europe 2013 OWASP Training
We cant hack ourselves secure
Web security – everything we know is wrong cloud version
Web security – application security roads to software security nirvana iisf...
00. introduction to app sec v3
Security Awareness
Secure coding guidelines
Secure Coding principles by example: Build Security In from the start - Carlo...
Security in an Interconnected and Complex World of Software
DevBeat 2013 - Developer-first Security
State of the information security nation
C01461422
Started In Security Now I'm Here
Ryan Elkins - Simple Security Defense to Thwart an Army of Cyber Ninja Warriors
How to Test for The OWASP Top Ten
New Era of Software with modern Application Security v1.0
Owasp top 10_openwest_2019
Who Owns Software Security?
Who owns Software Security
WEB APPLICATION SECURITY
RSA Europe 2013 OWASP Training

More from drewz lin (20)

PDF
Via forensics appsecusa-nov-2013
PDF
Defeating xss-and-xsrf-with-my faces-frameworks-steve-wolf
PPTX
Chuck willis-owaspbwa-beyond-1.0-app secusa-2013-11-21
PPTX
Appsec usa roberthansen
PDF
Appsec usa2013 js_libinsecurity_stefanodipaola
PPT
Appsec2013 presentation-dickson final-with_all_final_edits
PPTX
Appsec2013 presentation
PPTX
Appsec 2013-krehel-ondrej-forensic-investigations-of-web-exploitations
PPTX
Appsec2013 assurance tagging-robert martin
PPTX
Amol scadaowasp
PPTX
Agile sdlc-v1.1-owasp-app sec-usa
PPTX
Vulnex app secusa2013
PDF
基于虚拟化技术的分布式软件测试框架
PPTX
无线App的性能分析和监控实践 rickyqiu
PPT
网易移动自动化测试实践(孔庆云)
PDF
天猫后端技术架构优化实践
PPTX
天猫大促性能测试实践 耿电
PDF
互联网海量运维 20130807
PPTX
阿里自研数据库 Ocean base实践
PDF
T4 淘宝私有云
Via forensics appsecusa-nov-2013
Defeating xss-and-xsrf-with-my faces-frameworks-steve-wolf
Chuck willis-owaspbwa-beyond-1.0-app secusa-2013-11-21
Appsec usa roberthansen
Appsec usa2013 js_libinsecurity_stefanodipaola
Appsec2013 presentation-dickson final-with_all_final_edits
Appsec2013 presentation
Appsec 2013-krehel-ondrej-forensic-investigations-of-web-exploitations
Appsec2013 assurance tagging-robert martin
Amol scadaowasp
Agile sdlc-v1.1-owasp-app sec-usa
Vulnex app secusa2013
基于虚拟化技术的分布式软件测试框架
无线App的性能分析和监控实践 rickyqiu
网易移动自动化测试实践(孔庆云)
天猫后端技术架构优化实践
天猫大促性能测试实践 耿电
互联网海量运维 20130807
阿里自研数据库 Ocean base实践
T4 淘宝私有云

Recently uploaded (20)

PDF
Building Integrated photovoltaic BIPV_UPV.pdf
PDF
Per capita expenditure prediction using model stacking based on satellite ima...
PDF
KodekX | Application Modernization Development
PDF
Reach Out and Touch Someone: Haptics and Empathic Computing
PDF
CIFDAQ's Market Insight: SEC Turns Pro Crypto
PDF
Approach and Philosophy of On baking technology
PDF
Chapter 3 Spatial Domain Image Processing.pdf
PDF
Shreyas Phanse Resume: Experienced Backend Engineer | Java • Spring Boot • Ka...
PPTX
Cloud computing and distributed systems.
PDF
NewMind AI Monthly Chronicles - July 2025
PPTX
Detection-First SIEM: Rule Types, Dashboards, and Threat-Informed Strategy
PDF
7 ChatGPT Prompts to Help You Define Your Ideal Customer Profile.pdf
PDF
Advanced methodologies resolving dimensionality complications for autism neur...
PDF
Encapsulation theory and applications.pdf
PPTX
Big Data Technologies - Introduction.pptx
PPTX
Understanding_Digital_Forensics_Presentation.pptx
PDF
Architecting across the Boundaries of two Complex Domains - Healthcare & Tech...
PDF
Machine learning based COVID-19 study performance prediction
PDF
Bridging biosciences and deep learning for revolutionary discoveries: a compr...
PDF
Empathic Computing: Creating Shared Understanding
Building Integrated photovoltaic BIPV_UPV.pdf
Per capita expenditure prediction using model stacking based on satellite ima...
KodekX | Application Modernization Development
Reach Out and Touch Someone: Haptics and Empathic Computing
CIFDAQ's Market Insight: SEC Turns Pro Crypto
Approach and Philosophy of On baking technology
Chapter 3 Spatial Domain Image Processing.pdf
Shreyas Phanse Resume: Experienced Backend Engineer | Java • Spring Boot • Ka...
Cloud computing and distributed systems.
NewMind AI Monthly Chronicles - July 2025
Detection-First SIEM: Rule Types, Dashboards, and Threat-Informed Strategy
7 ChatGPT Prompts to Help You Define Your Ideal Customer Profile.pdf
Advanced methodologies resolving dimensionality complications for autism neur...
Encapsulation theory and applications.pdf
Big Data Technologies - Introduction.pptx
Understanding_Digital_Forensics_Presentation.pptx
Architecting across the Boundaries of two Complex Domains - Healthcare & Tech...
Machine learning based COVID-19 study performance prediction
Bridging biosciences and deep learning for revolutionary discoveries: a compr...
Empathic Computing: Creating Shared Understanding

Web security-–-everything-we-know-is-wrong-eoin-keary

  • 1. Web Security – Everything we know is wrong
  • 2. Eoin Keary • CTO BCCRISKADVISORY.COM • OWASP GLOBAL BOARD MEMBER • OWASP Reboot & Code Review Project Lead
  • 4. Last Week (11th November): “Loyaltybuild” BREACH 1,100,000 30 $$$
  • 5. Globally, 2012 Cyber Crime every second, 18 • US $20.7 billion in direct losses • Global $110 billion in direct losses adults • Global $338 billion + downtime become victims of “The loss of industrial information and intellectual cybercrime property through cyber espionage constitutes the - Symantec greatest transfer of wealth in history” - Keith “One hundred BILLION dollars” Dr Evil Alexander Almost 1 trillion USD was spent in 2012 protecting against cybercrime Eoin, I didn’t click it – My Grandma “556 million adults across the world have first-hand experience of cybercrime -- more than the entire population of the European Union.”
  • 6. Its (not) the $$$$ Information security spend Security incidents (business impact)
  • 7. ……we are approaching this problem [software <in>Security] completely wrong and have been for years…..
  • 9. A traditional end of cycle / Annual pentest only gives minimal security…..
  • 10. There are too many variables and too little time to ensure “real security”.
  • 11. Two weeks of ethical hacking Business Logic Flaws Security Errors Code Flaws Ten man-years of development
  • 12. Make this more difficult: Lets change the application code once a month.
  • 13. "Risk comes from not knowing what you're doing." - Warren Buffet
  • 14. Time Limited: Consultant “tune tools” Use multiple tools – verify issues Customize Attack Vectors to technology stack Achieve 80-90 application functionality coverage A fool with a tool, is still a fool”…..? Experience As good as the bad guys? Code may be pushed frequently: Erosion of Penetration test? Window of Exploitation?
  • 15. Tools with Tunnel Vision: Problem has moved (back) to the client. Some “Client Side” vulnerabilities can’t be tested via HTTP parameter testing. AJAX Flex/Flash/Air Native Mobile Web Apps – Data Storage, leakage, malware. DOM XSS – Sinks & Sources in client script -> no HTTP required Scanning in not enough anymore. We need DOM security assessment. - Javascript parsing/ Taint analysis/ String analysis http://code.google.com/p/domxsswiki/
  • 16. “We need an Onion” SDL Design review Threat Modeling Code review/SAST Negative use/abuse cases/Fuzzing/DAST Live/ Ongoing Continuous/Frequent monitoring / Testing Manual Validation Vulnerability management & Priority Dependency Management …. “Robots are good at detecting known unknowns” “Humans are good at detecting unknown unknowns”
  • 17. You are what you eat
  • 18. Cheeseburger Security We know they are bad for us, but who cares, right? If we eat too many we may get a heart attack? …sound familiar We also write [in]secure code until we get hacked The Cheeseburger approach: “Cheeseburger risk’ is the kind of risk you deliberately take even knowing the consequences, until those consequences actually come to pass.”
  • 19. Software food chain COTS (Commercial off the shelf Application Code Outsourced development SubContractors Third Party API’s Bespoke outsourced development Third Party Components & Systems Bespoke Internal development More Degrees of trust Less You may not let some of the people who have developed your code into your offices!! 19
  • 20. 2012- Study of 31 popular open source libraries. - 19.8 million (26%) of the library downloads have known vulnerabilities. - Today's applications may use up to 30 or more libraries - 80% of the codebase
  • 21. Spring - application development framework : downloaded 18 million times by over 43,000 organizations in the last year. – Vulnerability: Information leakage CVE-2011-2730 http://support.springsource.com/security/cve-2011-2730 In Apache CXF– application framework: 4.2 million downloads.- Vulnerability: high risk CVE2010-2076 & CVE 2012-0803 http://svn.apache.org/repos/asf/cxf/trunk/security/CVE-2010-2076.pdf http://cxf.apache.org/cve-2012-0803.html
  • 22. Do we test for "dependency“ issues? NO Does your patch management policy cover application dependencies? Check out: https://github.com/jeremylong/DependencyCheck
  • 23. Bite off more than we chew
  • 24. “We can’t improve what we can’t measure”
  • 25. How can we manage vulnerabilities on a large scale….
  • 27. Say 300 web applications: 300 Annual Penetration tests 10’s of different penetration testers? 300 reports How do we consume this Data?
  • 28. Enterprise Security Intelligence: Consolidation of vulnerability data. Continuous active monitoring Vulnerability Management solutions Delta Analysis is Key: Initial testing is most work. Subsequent testing is easier we focus on delta/change.
  • 29. Metrics: We can measure what problems we have Measure: We cant improve what we cant measure Priority: If we can measure we can prioritise Delta: If we can measure we can detect change Apply: We can apply our (limited) budget on the right things Improve: We can improve where it matters…… Value: Demonstrate value to our business Answer the question: “Are we secure?” <- a little better
  • 30. Information flooding (Melting a developers brain, White noise and “compliance”)
  • 31. Doing things right != Doing the right things. “Not all bugs/vulnerabilities are equal” (is HttpOnly important if there is no XSS?) Context is important! Contextualize Risk (is XSS /SQLi always High Risk?) Do developers need to fix everything? - Limited time - Finite Resources - Task Priority - Pass internal audit? Dick Tracy White Noise
  • 32. Compliance There’s Compliance: EU directive: http://register.consilium.europa.eu/pdf/en/12/st05/st05853. en12.pdf Article 23,24 & 79, - Administrative sanctions “The supervisory authority shall impose a fine up to 250 000 EUR, or in case of an enterprise up to 0.5 % of its annual worldwide turnover, to anyone who, intentionally or negligently does not protect personal data”
  • 33. …and there’s Compliance Clear and Present Danger!!
  • 34. Update: Kinder eggs are now legal in the USA. You’re Welcome!!
  • 35. Problem Explain issues in “Developer speak” (AKA English)
  • 36. Is Cross-Site Scripting the same as SQL injection? Both are injection attacks -> code and data being confused by system. LDAP Injection, Command Injection, Log Injection, XSS, SQLI etc etc
  • 37. XSS causes the browser to execute user supplied input as code. The input breaks out of the [data context] and becomes [execution context]. SQLI causes the database or source code calling the database to confuse [data context] and ANSI SQL [ execution context]. Command injection mixes up [data context] and the [execution context].
  • 38. To Conclude…. We need to understand what we are protecting against. We need to understand that a pentest alone is a loosing battle. You can only improve what you can measure Not all bugs are created equal. Bugs are Bugs. Explain security issues to developers in “Dev speak”

Editor's Notes

  • #17: If you don’t understand the business, you cant see the flaws in the business logic