Web Apps Security Testing and Active
Detection of Malicious URL(URI)
Charlie Chaeho Lim, Ph.D
CERT-KR, KIST/SERI
CERTCC-KR, KISA
Visiting Professor, KAIST
Security Manager, Naver/NHN
Research, Bit-Scan
Publish Security Books, Journal
Penetration Test, Bank, Company
Abstracts
• In 4th industry age, Software programs are popular
and data is 1st competitiveness.
• Data Breach hacking is done 3M – 7M USD
economic loss using program error(Web Apps
Security and abusing (Phishing Malware APT)
• DHS and MILTRE announced 25 Program errors and
OWASP tools detect errors 82% rate STST in SDLC
process of implementation/assessment.
• In the agile application development environment,
it introduced
• Bit-Scanner : 100% detection rate at Web HTTP
• PCDS : 200,000 Malicious URL Black List, World Top
2020-08-30 3
1. Cost of a Data Breach Report https://www.ibm.com/security/data-breach
2. https://www.ptsecurity.com/ww-en/analytics/web-vulnerabilities-2020/
3. http://progressivenext.com/devops/
Abstracts
• Bit-Scanner defines 30 web application attack
signature and detect vulnerability TCP HTTP.
• 30 vulnerabilities defined and simulated after
Crawling phase.
• Pre Crime Detect Satellite(PCDS) crawls 48/day in
6M web severs and keeps 200,000 black lists.
1. http://journalhome.ap-northeast-2.elasticbeanstalk.com/journals/jkiisc/digital-library/23308
Abstracts
• PCDS, Pre Crime Detection Satellite Crawls and
Analyzes Malicious Web URL(URI).
• PCDS Crawls 48 times a day 6M target web severs
and analyzes by automatic regex analyze.
• 200,000 Malicious URL(URL).
• Just local use 99%.
• Google Safe Browsing is not active.
• Used global if target Web Server.
1. https://transparencyreport.google.com/safe-
browsing/overview?unsafe=dataset:1;series:malwareDetected,phishingDetected;start:1148194800000;end:1597561200000&lu=unsafe
Contents
1. Data Breach
2. Bit-Scanner
3. PCDS
4. Conclusion
Add 1 Security Profssional
Add 2 Content of Future Book
1. Cost of a Data Breach Report https://www.ibm.com/security/data-breach
APT(Phishing Malware), Web Apps
Data Breach
1. Cost of a Data Breach Report https://www.ibm.com/security/data-breach
2. https://us-cert.cisa.gov/ncas/current-activity/2020/01/24/nsa-releases-guidance-mitigating-cloud-vulnerabilities
Software
Data Breach
Data Breach
Remote Access Terminal
Top Level of
Bit-Scanner Vulnerability
1. http://journalhome.ap-northeast-2.elasticbeanstalk.com/journals/jkiisc/digital-library/23308
Bit-Scanner
1. https://www.dhs.gov/science-and-technology/news/2019/11/26/snapshot-top-25-most-dangerous-software-errors
 From smartphone games and personal email
accounts to international banking and hospital
records, software is everywhere. It entertains,
boosts efficiency, and even saves lives.
Unfortunately, for every new program developed,
there is likely a hacker ready to disrupt and exploit
it. That’s why it is vital for software designers,
developers, and cybersecurity experts to keep
apprised of potential weaknesses that could cause
substantial damage to their computer systems. –
DHS
Bit-Scanner
“Similar services exist in Japan. But in the end, the reason I chose
Korean tools was because of two advantages.” “First, it was too
powerful compared to other services in terms of speed. As a result
of testing on several company sites, the light scan service was
completed in 8 minutes that other companies' products took more
than 8 hours. Another advantage is that it does not damage the
website at all while checking quickly.” -Director Masaharu
Shirasugi, IWI Group, Japan
50 times the speed (OWASP 8 hours, Light Scan Co., Ltd. 8
minutes)
1. https://www.dailysecu.com/news/articleView.html?idxno=1308
2. http://journalhome.ap-northeast-2.elasticbeanstalk.com/journals/jkiisc/digital-library/23308
3. https://www.ptsecurity.com/ww-en/analytics/web-vulnerabilities-2020/
Bit-Scanner
1. https://www.dailysecu.com/news/articleView.html?idxno=1308
2. http://journalhome.ap-northeast-2.elasticbeanstalk.com/journals/jkiisc/digital-library/23308
3. https://www.ptsecurity.com/ww-en/analytics/web-vulnerabilities-2020/
Crawl
Attack
Simulation
Structure
Analysis
Report
1. http://journalhome.ap-northeast-2.elasticbeanstalk.com/journals/jkiisc/digital-library/23308
1
2
3
4
Bit-Scanner
1. http://journalhome.ap-northeast-2.elasticbeanstalk.com/journals/jkiisc/digital-library/23308
2. https://www.ptsecurity.com/ww-en/analytics/web-vulnerabilities-2020/
PCDS
 Malware?
 Code in abnormal in PC. Web, Mobile
 Web Malware URL, Email. Mobile
Execution of Malware
1. https://us-cert.cisa.gov/northkorea
2. https://obamawhitehouse.archives.gov/issues/foreign-policy/cybersecurity/national-initiative
3. https://globalcybersecurityreport.com/2017/08/04/dhs-st-announces-commercialization-of-renigma-malware-reverse-engineering-tool/
1. Compliance
2. Architecture
3. Normal Behavior
4. Response Capability
The Comprehensive National
Cybersecurity Initiative
PCDS
1. https://us-cert.cisa.gov/northkorea
2. https://nvlpubs.nist.gov/nistpubs/Legacy/SP/nistspecialpublication800-30r1.pdf
 HIDS Malware Detection
 Host Intrusion Detection
1. Scan all PC disk NEW Files
2. Analyze Using “Reverse Engineering”
3. If Problems “RESTORE”
4. Delete malware
5. Add “Black List”
PCDS
2020-08-30 18
1. https://us-cert.cisa.gov/northkorea
2. https://nvlpubs.nist.gov/nistpubs/Legacy/SP/nistspecialpublication800-30r1.pdf
 PCDS
 Pre Crime Detection Satellite
1. Crawling Web Servers :
• 12 /6M. 48/2 M
2. Analyzing in Regex in Full Depths
3. Update Black List : 200,000 Record
• Under 10,000
 Using Local Cloud Company
 Ransom ware Detection
Conclusion
2020-08-30 17
 Less Loss of data breach with BitScan
• Bit-Scanner scan, detect 100% in web apps
• PCDS 100% black list actively
• As major risk management
 Security Control Measure
• Normal risk management
• Quantitative risk management system
Conclusion
2020-08-30 18
• Quantitative risk management system
• Risk Index = SUM(Control/Target Asset X 100)
• Score Card or Periodic Rule Check Data
• Daily Check :
• Web Apps Security and APT Malware Check
• World Best Tools : Bit Scanner and PCDS
A Client’s Security
C Class : 631/880
https://docs.microsoft.com/en-us/microsoft-365/security/mtp/microsoft-secure-score?view=o365-worldwide
Add 1 Security Professional
2020-08-30 19
1. https://www.nist.gov/itl/applied-cybersecurity/nice/nice-framework-resource-center
2. https://resources.infosecinstitute.com/keeping-your-cybersecurity-skills-relevant/#gref
1. Intrusion Detection:
2. Software Reverse-Engineering
3. Analytical Skills:
4. Risk Mitigation:
5. Cloud Security:
6. Incident Response:
7. Encryption Technologies:
8. Penetration Testing:
Add 2 Content of Future Book
2020-08-30 20
I. Cyber Security Abstract
II. Strategy
III. Cyber Security Issues
IV. Penetration Test
V. IDS and Information Warfare
VI. Practical Case Study
Cyber Security Abstract
1. Strategy
2. Software Security
3. Cloud Security
4. US Cyber Security
5. Incident Case Analysis
6. Cyber Security Jobs
7. Penetration Strategy
8. APT Malware
9. Web Apps
10. Information Warfare
11. IDS
12. Security Measure
13. Risk Management

More Related Content

PDF
Cost effective cyber security
PDF
Continuous Monitoring for Web Application Security
PDF
Essentials of Web Application Security: what it is, why it matters and how to...
PPTX
Edgescan vulnerability stats report 2019 - h-isac-2-2-2019
PPTX
How Long to Boom: Understanding and Measuring ICS Hacker Maturity
PDF
SplunkLive! Stockholm 2015 breakout - Analytics based security
PPTX
Gov Day Sacramento 2015 - User Behavior Analytics
PDF
The Critical Security Controls and the StealthWatch System
Cost effective cyber security
Continuous Monitoring for Web Application Security
Essentials of Web Application Security: what it is, why it matters and how to...
Edgescan vulnerability stats report 2019 - h-isac-2-2-2019
How Long to Boom: Understanding and Measuring ICS Hacker Maturity
SplunkLive! Stockholm 2015 breakout - Analytics based security
Gov Day Sacramento 2015 - User Behavior Analytics
The Critical Security Controls and the StealthWatch System

What's hot (20)

PDF
Cyber Security Beyond 2020 – Will We Learn From Our Mistakes?
PDF
Final presentation january iia cybersecurity securing your 2016 audit plan
PPTX
CYBER THREAT ASSESSMENT
PDF
2016 Trends in Security
PPTX
Hiding In Plain Sight – Protect Against Bad Hashes
PDF
Splunk for Security
DOCX
Dhishant -Latest Resume
PDF
Enterprise Security featuring UBA
PDF
JAKU Botnet Analysis
PPTX
Open Source Insight: Heartbleed Results in £100,000 fine, WannaCry Hits Japan...
PPTX
Open Source Insight: Equifax, Apache Struts, & CVE-2017-5638 Vulnerability
PPTX
Base Metal Forensics
PDF
FireEye Use Cases — FireEye Solution Deployment Experience
PDF
2 20613 qualys_top_10_reports_vm
PDF
Wireless Infusion Pumps: Securing Hospitals’ Most Ubiquitous Medical Device
PDF
Web Application Attack Report, Edition #4
PPTX
Operationalizing Security Intelligence
PDF
Cisco Annual Security Report 2016
PDF
Cisco Annual Security Report
PDF
Cisco 2016 Annual Security Report
Cyber Security Beyond 2020 – Will We Learn From Our Mistakes?
Final presentation january iia cybersecurity securing your 2016 audit plan
CYBER THREAT ASSESSMENT
2016 Trends in Security
Hiding In Plain Sight – Protect Against Bad Hashes
Splunk for Security
Dhishant -Latest Resume
Enterprise Security featuring UBA
JAKU Botnet Analysis
Open Source Insight: Heartbleed Results in £100,000 fine, WannaCry Hits Japan...
Open Source Insight: Equifax, Apache Struts, & CVE-2017-5638 Vulnerability
Base Metal Forensics
FireEye Use Cases — FireEye Solution Deployment Experience
2 20613 qualys_top_10_reports_vm
Wireless Infusion Pumps: Securing Hospitals’ Most Ubiquitous Medical Device
Web Application Attack Report, Edition #4
Operationalizing Security Intelligence
Cisco Annual Security Report 2016
Cisco Annual Security Report
Cisco 2016 Annual Security Report
Ad

Similar to World best web apps security and Active detection of malicious link (20)

PPT
How PCI And PA DSS will change enterprise applications
PPTX
ISACA ISSA Presentation
PPTX
Practical risk management for the multi cloud
PPT
Discovering the Value of Verifying Web Application Security Using IBM Rationa...
PPTX
Symantec and ForeScout Delivering a Unified Cyber Security Solution
PDF
Cyber Risk Management in 2017: Challenges & Recommendations
PDF
Cybersecurity for Energy: Moving Beyond Compliance
PPTX
Solnet dev secops meetup
PPTX
So You Want a Job in Cybersecurity
PDF
cybersecurity-careers.pdf
PPTX
Data Protection & Privacy During the Coronavirus Pandemic
PPT
Key Strategies to Address Rising Application Risk in Your Enterprise
PPTX
Defend-Against-Next-Gen-Attacks-with-Wire-Data-by-Pete-Anderson.pptx
PPTX
Open Source Insight: Amazon Servers Exposed Open Source & the Public Sector...
PDF
201512 - Vulnerability Management -PCI Best Practices - stepbystep
PPTX
Security Analytics & Security Intelligence-as-a-Service
PDF
Mitre ATT&CK by Mattias Almeflo Nixu
PDF
Unified application security analyser
PDF
Delve Labs - Upcoming Security Challenges for the Internet of Things
PDF
Application security Best Practices Framework
How PCI And PA DSS will change enterprise applications
ISACA ISSA Presentation
Practical risk management for the multi cloud
Discovering the Value of Verifying Web Application Security Using IBM Rationa...
Symantec and ForeScout Delivering a Unified Cyber Security Solution
Cyber Risk Management in 2017: Challenges & Recommendations
Cybersecurity for Energy: Moving Beyond Compliance
Solnet dev secops meetup
So You Want a Job in Cybersecurity
cybersecurity-careers.pdf
Data Protection & Privacy During the Coronavirus Pandemic
Key Strategies to Address Rising Application Risk in Your Enterprise
Defend-Against-Next-Gen-Attacks-with-Wire-Data-by-Pete-Anderson.pptx
Open Source Insight: Amazon Servers Exposed Open Source & the Public Sector...
201512 - Vulnerability Management -PCI Best Practices - stepbystep
Security Analytics & Security Intelligence-as-a-Service
Mitre ATT&CK by Mattias Almeflo Nixu
Unified application security analyser
Delve Labs - Upcoming Security Challenges for the Internet of Things
Application security Best Practices Framework
Ad

Recently uploaded (20)

PPTX
1402_iCSC_-_RESTful_Web_APIs_--_Josef_Hammer.pptx
PPT
Ethics in Information System - Management Information System
PPTX
curriculumandpedagogyinearlychildhoodcurriculum-171021103104 - Copy.pptx
DOCX
Powerful Ways AIRCONNECT INFOSYSTEMS Pvt Ltd Enhances IT Infrastructure in In...
PPTX
Top Website Bugs That Hurt User Experience – And How Expert Web Design Fixes
PPTX
artificialintelligenceai1-copy-210604123353.pptx
PDF
simpleintnettestmetiaerl for the simple testint
PDF
Alethe Consulting Corporate Profile and Solution Aproach
PDF
Smart Home Technology for Health Monitoring (www.kiu.ac.ug)
PPTX
newyork.pptxirantrafgshenepalchinachinane
PDF
Containerization lab dddddddddddddddmanual.pdf
PDF
📍 LABUAN4D EXCLUSIVE SERVER STAR GAMING ASIA NO.1 TERPOPULER DI INDONESIA ! 🌟
PPTX
IPCNA VIRTUAL CLASSES INTERMEDIATE 6 PROJECT.pptx
PPT
415456121-Jiwratrwecdtwfdsfwgdwedvwe dbwsdjsadca-EVN.ppt
PPTX
Cyber Hygine IN organizations in MSME or
PPT
250152213-Excitation-SystemWERRT (1).ppt
PPT
FIRE PREVENTION AND CONTROL PLAN- LUS.FM.MQ.OM.UTM.PLN.00014.ppt
PPTX
AI_Cyberattack_Solutions AI AI AI AI .pptx
PPTX
Introduction to cybersecurity and digital nettiquette
PPTX
module 1-Part 1.pptxdddddddddddddddddddddddddddddddddddd
1402_iCSC_-_RESTful_Web_APIs_--_Josef_Hammer.pptx
Ethics in Information System - Management Information System
curriculumandpedagogyinearlychildhoodcurriculum-171021103104 - Copy.pptx
Powerful Ways AIRCONNECT INFOSYSTEMS Pvt Ltd Enhances IT Infrastructure in In...
Top Website Bugs That Hurt User Experience – And How Expert Web Design Fixes
artificialintelligenceai1-copy-210604123353.pptx
simpleintnettestmetiaerl for the simple testint
Alethe Consulting Corporate Profile and Solution Aproach
Smart Home Technology for Health Monitoring (www.kiu.ac.ug)
newyork.pptxirantrafgshenepalchinachinane
Containerization lab dddddddddddddddmanual.pdf
📍 LABUAN4D EXCLUSIVE SERVER STAR GAMING ASIA NO.1 TERPOPULER DI INDONESIA ! 🌟
IPCNA VIRTUAL CLASSES INTERMEDIATE 6 PROJECT.pptx
415456121-Jiwratrwecdtwfdsfwgdwedvwe dbwsdjsadca-EVN.ppt
Cyber Hygine IN organizations in MSME or
250152213-Excitation-SystemWERRT (1).ppt
FIRE PREVENTION AND CONTROL PLAN- LUS.FM.MQ.OM.UTM.PLN.00014.ppt
AI_Cyberattack_Solutions AI AI AI AI .pptx
Introduction to cybersecurity and digital nettiquette
module 1-Part 1.pptxdddddddddddddddddddddddddddddddddddd

World best web apps security and Active detection of malicious link

  • 1. Web Apps Security Testing and Active Detection of Malicious URL(URI)
  • 2. Charlie Chaeho Lim, Ph.D CERT-KR, KIST/SERI CERTCC-KR, KISA Visiting Professor, KAIST Security Manager, Naver/NHN Research, Bit-Scan Publish Security Books, Journal Penetration Test, Bank, Company
  • 3. Abstracts • In 4th industry age, Software programs are popular and data is 1st competitiveness. • Data Breach hacking is done 3M – 7M USD economic loss using program error(Web Apps Security and abusing (Phishing Malware APT) • DHS and MILTRE announced 25 Program errors and OWASP tools detect errors 82% rate STST in SDLC process of implementation/assessment. • In the agile application development environment, it introduced • Bit-Scanner : 100% detection rate at Web HTTP • PCDS : 200,000 Malicious URL Black List, World Top 2020-08-30 3 1. Cost of a Data Breach Report https://www.ibm.com/security/data-breach 2. https://www.ptsecurity.com/ww-en/analytics/web-vulnerabilities-2020/ 3. http://progressivenext.com/devops/
  • 4. Abstracts • Bit-Scanner defines 30 web application attack signature and detect vulnerability TCP HTTP. • 30 vulnerabilities defined and simulated after Crawling phase. • Pre Crime Detect Satellite(PCDS) crawls 48/day in 6M web severs and keeps 200,000 black lists. 1. http://journalhome.ap-northeast-2.elasticbeanstalk.com/journals/jkiisc/digital-library/23308
  • 5. Abstracts • PCDS, Pre Crime Detection Satellite Crawls and Analyzes Malicious Web URL(URI). • PCDS Crawls 48 times a day 6M target web severs and analyzes by automatic regex analyze. • 200,000 Malicious URL(URL). • Just local use 99%. • Google Safe Browsing is not active. • Used global if target Web Server. 1. https://transparencyreport.google.com/safe- browsing/overview?unsafe=dataset:1;series:malwareDetected,phishingDetected;start:1148194800000;end:1597561200000&lu=unsafe
  • 6. Contents 1. Data Breach 2. Bit-Scanner 3. PCDS 4. Conclusion Add 1 Security Profssional Add 2 Content of Future Book 1. Cost of a Data Breach Report https://www.ibm.com/security/data-breach APT(Phishing Malware), Web Apps
  • 7. Data Breach 1. Cost of a Data Breach Report https://www.ibm.com/security/data-breach 2. https://us-cert.cisa.gov/ncas/current-activity/2020/01/24/nsa-releases-guidance-mitigating-cloud-vulnerabilities Software
  • 9. Data Breach Remote Access Terminal Top Level of Bit-Scanner Vulnerability 1. http://journalhome.ap-northeast-2.elasticbeanstalk.com/journals/jkiisc/digital-library/23308
  • 10. Bit-Scanner 1. https://www.dhs.gov/science-and-technology/news/2019/11/26/snapshot-top-25-most-dangerous-software-errors  From smartphone games and personal email accounts to international banking and hospital records, software is everywhere. It entertains, boosts efficiency, and even saves lives. Unfortunately, for every new program developed, there is likely a hacker ready to disrupt and exploit it. That’s why it is vital for software designers, developers, and cybersecurity experts to keep apprised of potential weaknesses that could cause substantial damage to their computer systems. – DHS
  • 11. Bit-Scanner “Similar services exist in Japan. But in the end, the reason I chose Korean tools was because of two advantages.” “First, it was too powerful compared to other services in terms of speed. As a result of testing on several company sites, the light scan service was completed in 8 minutes that other companies' products took more than 8 hours. Another advantage is that it does not damage the website at all while checking quickly.” -Director Masaharu Shirasugi, IWI Group, Japan 50 times the speed (OWASP 8 hours, Light Scan Co., Ltd. 8 minutes) 1. https://www.dailysecu.com/news/articleView.html?idxno=1308 2. http://journalhome.ap-northeast-2.elasticbeanstalk.com/journals/jkiisc/digital-library/23308 3. https://www.ptsecurity.com/ww-en/analytics/web-vulnerabilities-2020/
  • 12. Bit-Scanner 1. https://www.dailysecu.com/news/articleView.html?idxno=1308 2. http://journalhome.ap-northeast-2.elasticbeanstalk.com/journals/jkiisc/digital-library/23308 3. https://www.ptsecurity.com/ww-en/analytics/web-vulnerabilities-2020/ Crawl Attack Simulation Structure Analysis Report 1. http://journalhome.ap-northeast-2.elasticbeanstalk.com/journals/jkiisc/digital-library/23308 1 2 3 4
  • 14. PCDS  Malware?  Code in abnormal in PC. Web, Mobile  Web Malware URL, Email. Mobile Execution of Malware 1. https://us-cert.cisa.gov/northkorea 2. https://obamawhitehouse.archives.gov/issues/foreign-policy/cybersecurity/national-initiative 3. https://globalcybersecurityreport.com/2017/08/04/dhs-st-announces-commercialization-of-renigma-malware-reverse-engineering-tool/ 1. Compliance 2. Architecture 3. Normal Behavior 4. Response Capability The Comprehensive National Cybersecurity Initiative
  • 15. PCDS 1. https://us-cert.cisa.gov/northkorea 2. https://nvlpubs.nist.gov/nistpubs/Legacy/SP/nistspecialpublication800-30r1.pdf  HIDS Malware Detection  Host Intrusion Detection 1. Scan all PC disk NEW Files 2. Analyze Using “Reverse Engineering” 3. If Problems “RESTORE” 4. Delete malware 5. Add “Black List”
  • 16. PCDS 2020-08-30 18 1. https://us-cert.cisa.gov/northkorea 2. https://nvlpubs.nist.gov/nistpubs/Legacy/SP/nistspecialpublication800-30r1.pdf  PCDS  Pre Crime Detection Satellite 1. Crawling Web Servers : • 12 /6M. 48/2 M 2. Analyzing in Regex in Full Depths 3. Update Black List : 200,000 Record • Under 10,000  Using Local Cloud Company  Ransom ware Detection
  • 17. Conclusion 2020-08-30 17  Less Loss of data breach with BitScan • Bit-Scanner scan, detect 100% in web apps • PCDS 100% black list actively • As major risk management  Security Control Measure • Normal risk management • Quantitative risk management system
  • 18. Conclusion 2020-08-30 18 • Quantitative risk management system • Risk Index = SUM(Control/Target Asset X 100) • Score Card or Periodic Rule Check Data • Daily Check : • Web Apps Security and APT Malware Check • World Best Tools : Bit Scanner and PCDS A Client’s Security C Class : 631/880 https://docs.microsoft.com/en-us/microsoft-365/security/mtp/microsoft-secure-score?view=o365-worldwide
  • 19. Add 1 Security Professional 2020-08-30 19 1. https://www.nist.gov/itl/applied-cybersecurity/nice/nice-framework-resource-center 2. https://resources.infosecinstitute.com/keeping-your-cybersecurity-skills-relevant/#gref 1. Intrusion Detection: 2. Software Reverse-Engineering 3. Analytical Skills: 4. Risk Mitigation: 5. Cloud Security: 6. Incident Response: 7. Encryption Technologies: 8. Penetration Testing:
  • 20. Add 2 Content of Future Book 2020-08-30 20 I. Cyber Security Abstract II. Strategy III. Cyber Security Issues IV. Penetration Test V. IDS and Information Warfare VI. Practical Case Study Cyber Security Abstract 1. Strategy 2. Software Security 3. Cloud Security 4. US Cyber Security 5. Incident Case Analysis 6. Cyber Security Jobs 7. Penetration Strategy 8. APT Malware 9. Web Apps 10. Information Warfare 11. IDS 12. Security Measure 13. Risk Management