SlideShare a Scribd company logo
Web Application Security
security. protection. intelligence.
Q: Where Do Your Current Security
Measures Fail?
A: Your Proprietary, Custom written
Web Applications
security. protection. intelligence.
Today over 70% of attacks against a company‟s
Web site or Web application come at the
„Application Layer‟ not the Network or System
layer.
A complete security solution requires attention at each potential
point of attack.
security. protection. intelligence.
A: Enact policies requiring your developers
to write secure code.
Q: So how do we remedy this situation?
•Verify all request parameters are in proper format (via through a
standard library)
•Any unknown or incorrect user data should be logged and
terminated.
security. protection. intelligence.
But if you instituted this policy, how
would you effectively enforce it?
What measures would you have in
place to make sure that they comply?
“A unenforceable policy, or one with
out a process to determine the
outlined specifications, is just as
good, as no policy at all.”
security. protection. intelligence.
Q: But I use XYZ Scanner, won’t it discover
these types of vulnerabilities?
A: No, and this is why.
security. protection. intelligence.
Where Today’s Security Measures Fail
security. protection. intelligence.
A: Because other Scanners are a security Broadsword,
where ours is a Security Scalpel
WebInspectTM
is NOT meant to replace any tools that are
currently being used, instead it complements them.
Q: How can SPI Dynamics do all of this
and the others can’t?
security. protection. intelligence.
How SPI Solves The Problem
security. protection. intelligence.
WebInspectTM
scans the whole site:
Web server
Web pages
Scripts
Proprietary applications
Cookies
Database Server
Internet IDS
Firewall
CC#’s Database
Users Database
Web Server
security. protection. intelligence.
WebInspectTM
Scans authentication codes
Assesses security procedures
Carves into confidential data
… Just like a hacker would
Database Server
Internet IDS
Firewall
CC#’s Database
Users Database
Web Server
security. protection. intelligence.
WebInspect™, automates our security expertise so that customers can simulate an
advanced web-application attack on their own. WebInspect™ detects holes in
both standard and proprietary applications, and crawls over the entire website in
search of potential security problems.
WebInspect™
security. protection. intelligence.
WebInspect™ is easy to use. Simply enter the URL of the Web
site or Web application you wish to scan and click go.
WebInspect™
security. protection. intelligence.
WebInspect™ is easy to understand. The Vulnerability Report is
listed in order of severity and contains HTML links for navigation.
WebInspect™
security. protection. intelligence.
Features & Benefits of WebInspectTM
Unique Focus: Your proprietary Web site or Web application
Superior Scanning: Products codify our security expertise
Extremely Fast: WebInspectTM
runs in minutes/ hours vs. days/
weeks it takes to complete traditional vulnerability assessments
Automated: Continuously maintain your security integrity
Updated: Continuously keep up to date on the latest vulnerabilities
with the online update feature
Simple & Cost Effective: Licensed per IP address or per consultant
Risk-Free: Offered on a trial basis at no cost
security. protection. intelligence.
How does WebInspectTM
do this?
Hidden Manipulation
Parameter Tampering
Cookie Poisoning
Stealth Commanding
Forceful Browsing
Backdoor/Debug Options
Configuration Subversion
Vendor–Assisted Hacking
security. protection. intelligence.
The SPI Works Product Suite
Use WebInspectTM
to
assess current Web
sites or Web
applications.
Use WebInspectTM
to
QA new applications
during development
prior to release into
production.
Available now
Know your vulnerabilities
Use LogAlertTM
to
audit Web logs to
know if an attacker
has successfully
compromised your
Web site or Web
application.
Use LogAlertTM
after
you have been
attacked for Web log
forensic analysis.
Available now
Know if you have been attacked
Use WebDefendTM
to
proactively stop Web
site or Web application
intrusions.
Available Q2 2002
Proactively stop attacks
WebInspect
Application Assessment
WebDefend
Application Intrusion Protection
LogAlert
Application Log Audit
TM TM
TM
security. protection. intelligence.
Our Company
Founded in April 2000 by recognized Information
Security industry experts
Released WebInspectTM
in April 2001
HQ in Atlanta, Georgia
Resellers in New York, Chicago, Washington D.C., Knoxville,
Miami, London
SPI serves clients in each of the following vertical
industries:
HealthCare
Insurance
Financial Services
Government
Global Enterprise
Consulting
security. protection. intelligence.
SPI Dynamics is the leading provider of
automated Web Application security products.
SPI develops “hands-off” security products that
contain the knowledge and expertise of an
information security professional embedded in the
code.
The embedded “hacker logic” enables our software to
think for the end-user, making their job easier.

More Related Content

PDF
Reducing Risk of Credential Compromise at Netflix
PDF
Efficacy Of Layered Application Security Through The Lens Of Hacker
PDF
BitSensor Webwinkel Vakdagen
PDF
Web Application Firewall - Web Application & Web Services Security integrated...
PPSX
Waratek presentation for RANT November 2016
PPTX
Web Application Firewall (WAF) DAST/SAST combination
PPTX
2017-11 Three Ways of Security - OWASP London
PDF
Waratek ISACA Webinar
Reducing Risk of Credential Compromise at Netflix
Efficacy Of Layered Application Security Through The Lens Of Hacker
BitSensor Webwinkel Vakdagen
Web Application Firewall - Web Application & Web Services Security integrated...
Waratek presentation for RANT November 2016
Web Application Firewall (WAF) DAST/SAST combination
2017-11 Three Ways of Security - OWASP London
Waratek ISACA Webinar

What's hot (20)

PDF
Innovating Faster with Continuous Application Security
PPTX
Accessibility Clickjacking, Devastating Android Vulnerability
PPTX
Application Security at DevOps Speed and Portfolio Scale
PDF
Waratek overview 2016
PPTX
API Security Survey
PPTX
Agile Network India | DevSecOps - The What and the Why | Ritesh Shregill
PDF
Solving for Compliance: Mobile app security for banking and financial services
PPT
Get Ready for Web Application Security Testing
PPTX
Pegasus Spyware - What You Need to Know
PPTX
[OPD 2019] AST Platform and the importance of multi-layered application secu...
PPT
Panda Security2008
PPTX
Owasp Mobile Risk Series : M4 : Unintended Data Leakage
PPTX
Automation of Security scanning easy or cheese?
PDF
SAST vs. DAST: What’s the Best Method For Application Security Testing?
PDF
Automation of Security scanning easy or cheese
PPTX
Android App Security Solution
PPTX
How to Add Advanced Threat Defense to Your EMM
PDF
Enough with the Mobile SDK Mess: A New Technology Is Born
PPTX
Decrypting the security mystery with SIEM (Part 2) ​
PPTX
Elizabeth Lawler - Devops, security, and compliance working in unison
Innovating Faster with Continuous Application Security
Accessibility Clickjacking, Devastating Android Vulnerability
Application Security at DevOps Speed and Portfolio Scale
Waratek overview 2016
API Security Survey
Agile Network India | DevSecOps - The What and the Why | Ritesh Shregill
Solving for Compliance: Mobile app security for banking and financial services
Get Ready for Web Application Security Testing
Pegasus Spyware - What You Need to Know
[OPD 2019] AST Platform and the importance of multi-layered application secu...
Panda Security2008
Owasp Mobile Risk Series : M4 : Unintended Data Leakage
Automation of Security scanning easy or cheese?
SAST vs. DAST: What’s the Best Method For Application Security Testing?
Automation of Security scanning easy or cheese
Android App Security Solution
How to Add Advanced Threat Defense to Your EMM
Enough with the Mobile SDK Mess: A New Technology Is Born
Decrypting the security mystery with SIEM (Part 2) ​
Elizabeth Lawler - Devops, security, and compliance working in unison
Ad

Similar to SPI Dynamics web application security 101 (20)

PDF
C01461422
PPT
Bitrix Software Security
PDF
FireEye - Breaches are inevitable, but the outcome is not
PPTX
Splunk for Security Breakout Session
PPT
Assessing and Measuring Security in Custom SAP Applications
PDF
Invicti Security Scanner Automate And Secure Your Web Applications.pdf
PPT
Web Application Testing for Today’s Biggest and Emerging Threats
PDF
"Thinking diffrent" about your information security strategy
PDF
Web Intrusion Detection
PDF
HP WebInspect
PPTX
Splunk EMEA Webinar: Scoping infections and disrupting breaches
PDF
Watch Guard Reputation Enabled Defense (White Paper)Dna
PPTX
HP Software Performance Tour 2014 - Guarding against the Data Breach
PDF
Web Application Penetration Testing Course in 2025.pdf
PPT
Web Application Hacking 2004
PDF
Revolutionizing Advanced Threat Protection
PPTX
5 Ways to Get Even More from Your IBM Security QRadar Investment in 2016
PPTX
5 Ways to Get Even More from Your IBM Security QRadar Investment in 2016
KEY
EISA Considerations for Web Application Security
PPTX
Info sec for startups
C01461422
Bitrix Software Security
FireEye - Breaches are inevitable, but the outcome is not
Splunk for Security Breakout Session
Assessing and Measuring Security in Custom SAP Applications
Invicti Security Scanner Automate And Secure Your Web Applications.pdf
Web Application Testing for Today’s Biggest and Emerging Threats
"Thinking diffrent" about your information security strategy
Web Intrusion Detection
HP WebInspect
Splunk EMEA Webinar: Scoping infections and disrupting breaches
Watch Guard Reputation Enabled Defense (White Paper)Dna
HP Software Performance Tour 2014 - Guarding against the Data Breach
Web Application Penetration Testing Course in 2025.pdf
Web Application Hacking 2004
Revolutionizing Advanced Threat Protection
5 Ways to Get Even More from Your IBM Security QRadar Investment in 2016
5 Ways to Get Even More from Your IBM Security QRadar Investment in 2016
EISA Considerations for Web Application Security
Info sec for startups
Ad

Recently uploaded (20)

PDF
The Rise and Fall of 3GPP – Time for a Sabbatical?
PDF
Network Security Unit 5.pdf for BCA BBA.
PPTX
Understanding_Digital_Forensics_Presentation.pptx
PPTX
MYSQL Presentation for SQL database connectivity
PPTX
Big Data Technologies - Introduction.pptx
PDF
Reach Out and Touch Someone: Haptics and Empathic Computing
PDF
Peak of Data & AI Encore- AI for Metadata and Smarter Workflows
PPTX
sap open course for s4hana steps from ECC to s4
PPTX
Cloud computing and distributed systems.
PDF
Diabetes mellitus diagnosis method based random forest with bat algorithm
PDF
Electronic commerce courselecture one. Pdf
PDF
Review of recent advances in non-invasive hemoglobin estimation
PPTX
Spectroscopy.pptx food analysis technology
PDF
Mobile App Security Testing_ A Comprehensive Guide.pdf
PPTX
VMware vSphere Foundation How to Sell Presentation-Ver1.4-2-14-2024.pptx
PDF
Spectral efficient network and resource selection model in 5G networks
PDF
Blue Purple Modern Animated Computer Science Presentation.pdf.pdf
PDF
Encapsulation theory and applications.pdf
PPTX
Effective Security Operations Center (SOC) A Modern, Strategic, and Threat-In...
PPT
“AI and Expert System Decision Support & Business Intelligence Systems”
The Rise and Fall of 3GPP – Time for a Sabbatical?
Network Security Unit 5.pdf for BCA BBA.
Understanding_Digital_Forensics_Presentation.pptx
MYSQL Presentation for SQL database connectivity
Big Data Technologies - Introduction.pptx
Reach Out and Touch Someone: Haptics and Empathic Computing
Peak of Data & AI Encore- AI for Metadata and Smarter Workflows
sap open course for s4hana steps from ECC to s4
Cloud computing and distributed systems.
Diabetes mellitus diagnosis method based random forest with bat algorithm
Electronic commerce courselecture one. Pdf
Review of recent advances in non-invasive hemoglobin estimation
Spectroscopy.pptx food analysis technology
Mobile App Security Testing_ A Comprehensive Guide.pdf
VMware vSphere Foundation How to Sell Presentation-Ver1.4-2-14-2024.pptx
Spectral efficient network and resource selection model in 5G networks
Blue Purple Modern Animated Computer Science Presentation.pdf.pdf
Encapsulation theory and applications.pdf
Effective Security Operations Center (SOC) A Modern, Strategic, and Threat-In...
“AI and Expert System Decision Support & Business Intelligence Systems”

SPI Dynamics web application security 101

  • 2. security. protection. intelligence. Q: Where Do Your Current Security Measures Fail? A: Your Proprietary, Custom written Web Applications
  • 3. security. protection. intelligence. Today over 70% of attacks against a company‟s Web site or Web application come at the „Application Layer‟ not the Network or System layer. A complete security solution requires attention at each potential point of attack.
  • 4. security. protection. intelligence. A: Enact policies requiring your developers to write secure code. Q: So how do we remedy this situation? •Verify all request parameters are in proper format (via through a standard library) •Any unknown or incorrect user data should be logged and terminated.
  • 5. security. protection. intelligence. But if you instituted this policy, how would you effectively enforce it? What measures would you have in place to make sure that they comply? “A unenforceable policy, or one with out a process to determine the outlined specifications, is just as good, as no policy at all.”
  • 6. security. protection. intelligence. Q: But I use XYZ Scanner, won’t it discover these types of vulnerabilities? A: No, and this is why.
  • 7. security. protection. intelligence. Where Today’s Security Measures Fail
  • 8. security. protection. intelligence. A: Because other Scanners are a security Broadsword, where ours is a Security Scalpel WebInspectTM is NOT meant to replace any tools that are currently being used, instead it complements them. Q: How can SPI Dynamics do all of this and the others can’t?
  • 10. security. protection. intelligence. WebInspectTM scans the whole site: Web server Web pages Scripts Proprietary applications Cookies Database Server Internet IDS Firewall CC#’s Database Users Database Web Server
  • 11. security. protection. intelligence. WebInspectTM Scans authentication codes Assesses security procedures Carves into confidential data … Just like a hacker would Database Server Internet IDS Firewall CC#’s Database Users Database Web Server
  • 12. security. protection. intelligence. WebInspect™, automates our security expertise so that customers can simulate an advanced web-application attack on their own. WebInspect™ detects holes in both standard and proprietary applications, and crawls over the entire website in search of potential security problems. WebInspect™
  • 13. security. protection. intelligence. WebInspect™ is easy to use. Simply enter the URL of the Web site or Web application you wish to scan and click go. WebInspect™
  • 14. security. protection. intelligence. WebInspect™ is easy to understand. The Vulnerability Report is listed in order of severity and contains HTML links for navigation. WebInspect™
  • 15. security. protection. intelligence. Features & Benefits of WebInspectTM Unique Focus: Your proprietary Web site or Web application Superior Scanning: Products codify our security expertise Extremely Fast: WebInspectTM runs in minutes/ hours vs. days/ weeks it takes to complete traditional vulnerability assessments Automated: Continuously maintain your security integrity Updated: Continuously keep up to date on the latest vulnerabilities with the online update feature Simple & Cost Effective: Licensed per IP address or per consultant Risk-Free: Offered on a trial basis at no cost
  • 16. security. protection. intelligence. How does WebInspectTM do this? Hidden Manipulation Parameter Tampering Cookie Poisoning Stealth Commanding Forceful Browsing Backdoor/Debug Options Configuration Subversion Vendor–Assisted Hacking
  • 17. security. protection. intelligence. The SPI Works Product Suite Use WebInspectTM to assess current Web sites or Web applications. Use WebInspectTM to QA new applications during development prior to release into production. Available now Know your vulnerabilities Use LogAlertTM to audit Web logs to know if an attacker has successfully compromised your Web site or Web application. Use LogAlertTM after you have been attacked for Web log forensic analysis. Available now Know if you have been attacked Use WebDefendTM to proactively stop Web site or Web application intrusions. Available Q2 2002 Proactively stop attacks WebInspect Application Assessment WebDefend Application Intrusion Protection LogAlert Application Log Audit TM TM TM
  • 18. security. protection. intelligence. Our Company Founded in April 2000 by recognized Information Security industry experts Released WebInspectTM in April 2001 HQ in Atlanta, Georgia Resellers in New York, Chicago, Washington D.C., Knoxville, Miami, London SPI serves clients in each of the following vertical industries: HealthCare Insurance Financial Services Government Global Enterprise Consulting
  • 19. security. protection. intelligence. SPI Dynamics is the leading provider of automated Web Application security products. SPI develops “hands-off” security products that contain the knowledge and expertise of an information security professional embedded in the code. The embedded “hacker logic” enables our software to think for the end-user, making their job easier.