owasp top 10 practice workshop by stanislav breslavskyi

18
OWASP Top-10 Hands-on Workshop

Upload: nazar-tymoshyk-ceh-phd

Post on 21-Feb-2017

291 views

Category:

Technology


1 download

TRANSCRIPT

Page 1: OWASP Top 10 practice workshop by Stanislav Breslavskyi

OWASP Top-10 Hands-on Workshop

Page 2: OWASP Top 10 practice workshop by Stanislav Breslavskyi

•Security Engineer @ SoftServe•NU “LP” student

whoami

Page 3: OWASP Top 10 practice workshop by Stanislav Breslavskyi

•Web Application Security Assessment•Penetration Testing•Secure Software Development Lifecycle

What we do?

Page 4: OWASP Top 10 practice workshop by Stanislav Breslavskyi

•Non-profit organization•Numerous chapters around the globe•Everyone can join•Open-Source

Open Web ApplicationSecurity Project

Page 5: OWASP Top 10 practice workshop by Stanislav Breslavskyi

Meetings and conferences all around the globe

@AppSecEU ‘15 in Amsterdam

Page 6: OWASP Top 10 practice workshop by Stanislav Breslavskyi

Knowledge base

Page 7: OWASP Top 10 practice workshop by Stanislav Breslavskyi

OWASP Top-10Injection

Broken Auth and Session

ManagementXSS

Insecure Direct Object

References

Security misconfiguration

Sensitive Data Exposure

Missing Function Level

ControlCSRF

Using Known Vulnerable

Components

Unvalidated Redirects and

Forwards

Page 8: OWASP Top 10 practice workshop by Stanislav Breslavskyi

OWASP is GOOD!Hackers• Methodologies how to hack

Developers• Methodologies how to implement things securely and fix them

Testers• The same that hackers do• Methodologies how to test security stuff on their projects

Page 9: OWASP Top 10 practice workshop by Stanislav Breslavskyi

Demo Time

Page 10: OWASP Top 10 practice workshop by Stanislav Breslavskyi

•Either go by scenario with me or try to find 10 vulnerabilities by yourself.•No scanners (DDoS alert).•Do not attack infrastructure. Only web application vulnerabilities here.•Do not attack people around you.•No punching.

Rules

Page 11: OWASP Top 10 practice workshop by Stanislav Breslavskyi

•<open redirect url>•<change pass csrf url>•<Email for SE>•Credentials:

Let’s begin

[email protected]/[email protected]/admin

Page 12: OWASP Top 10 practice workshop by Stanislav Breslavskyi

Open Redirectexample.com/smth?redirect_url=http://google.comCSRFbank.com/trans?acc1=1234&acc2=4321&ammount=10000

Open Redirect + CSRF

Page 13: OWASP Top 10 practice workshop by Stanislav Breslavskyi

Cross-Site ScriptingSupply JS code instead of valid data which will be processed by the browserBroken AuthSession management flaws (HTTPOnly flag is missing in our case)

XSS + Broken Authentication

Page 14: OWASP Top 10 practice workshop by Stanislav Breslavskyi

Inject this script into the website<script src=“<url to the hook>” type=“text/javascript”/>

BeEF

Page 15: OWASP Top 10 practice workshop by Stanislav Breslavskyi

SQL-injectionSupply SQL operators and statements instead of valid data which will be processed with the server as SQL queries (not strings)Security misconfigurationCrypto misuse, wrong DB configuration, etcSensitive Data ExposureCritical info leakage

SQLi + Security Misconfiguration + Sensitive Data Exposure

Page 16: OWASP Top 10 practice workshop by Stanislav Breslavskyi

Insecure Direct Object ReferenceAccess file you have no permission toMissing Function Level ControlAccess to restricted (sensitive) function.Using Components with known VulnerabilitiesVulnerable OS, libraries, frameworks, CMS, Algorithms, etc.

Everything else …

Page 17: OWASP Top 10 practice workshop by Stanislav Breslavskyi

• Try it by yourselfhttps://github.com/Varyagovich/hole-blog• Try to fix the project• Use OWASP projects (attack/prevention cheat sheets and tools)• Contribute!

What to do next?

Page 18: OWASP Top 10 practice workshop by Stanislav Breslavskyi

http://owasp-lviv.blogspot.com/

STAY SAFE!