r wp autoscan

Upload: austinfru

Post on 14-Apr-2018

220 views

Category:

Documents


0 download

TRANSCRIPT

  • 7/27/2019 r Wp Autoscan

    1/8

    Web application security

    White paper

    January 2008

    Web application security:

    automated scanning versus

    manual penetration testing.

    Danny Allan, strategic research analyst,

    IBM Software Group

  • 7/27/2019 r Wp Autoscan

    2/8

    Contents

    2 Introduction

    2 Evolving testing techniques

    3 Two primary categories of

    vulnerabilities

    4 Technical vulnerabilities

    5 Logical vulnerabilities

    6 Delivering the software and

    services you need to help

    secure your Web applications

    Introduction

    Research has shown that a vast number of Web sites are vulnerable to Web

    application attacks and that a great percentage of these attacks occur over the

    HTTP/S protocols, ports that are often exposed to the entire online commu-

    nity. With these facts in mind, its essential for organizations to take serious

    measures to help secure their Web applications.

    As Web applications become increasingly complex, tremendous amounts of sensi-tive data including personal, medical and nancial information are exchanged

    and stored. Consumers expect and even demand that this information be kept

    secure. There are two primary methods for discovering Web application vulner-

    abilities: using manual penetration testing and code review or using automated

    scanning tools and static analysis. The purpose of this paper is to compare these

    two methods.

    Evolving testing techniques

    Manual security penetration testing is one of the oldest methods for discovering

    application vulnerabilities. Over time, as the frequency of attacks has grown an

    application complexity has increased, specialists known as penetration, or pen

    testers have emerged. Their sole purpose is to nd and exploit Web applicatio

    Web application security: automated scanning

    versus manual penetration testing.

    Page 2

  • 7/27/2019 r Wp Autoscan

    3/8

    Web application security: automated scanning

    versus manual penetration testing.

    Page 3

    security problems. In the late 1990s, companies began developing automated

    Web application testing techniques. By that point, the Web had become more

    mature, and Web browsers were beginning to be able to handle the complexi-

    ties of dynamic applications. The goal of these early automated testing tools

    was to automate the process of discovering a Web application and inject faults

    into it to help discover vulnerabilities.

    Two primary categories of vulnerabilitiesGenerally, Web application vulnerabilities can be grouped into two categories:

    technical and logical. Technical vulnerabilities include cross-site scripting

    (XSS), injection aws and buffer overows. Logical vulnerabilities are much

    harder to explicitly categorize. These vulnerabilities manipulate the logic of

    the application to get it to do things it was never intended to do. For example, in

    early 2002, a hacker used a logical vulnerability to bypass the required personal

    information validation in a popular e-mail application, allowing the hacker to

    reset users passwords by guessing the answer to a single security question.

    Web application vulnerabilities

    typically fall into two categories:

    technical and logical.

    Highlights

  • 7/27/2019 r Wp Autoscan

    4/8

    Web application security: automated scanning

    versus manual penetration testing.

    Page 4

    Technical vulnerabilities

    There are more than 70 techniques that can be used to exploit XSS, one of the

    most common technical vulnerabilities. A typical registration form on the Web

    contains approximately 30 unique elements, each of which is potentially vul-

    nerable to XSS, injection aws, buffer overows or improper error handling.

    Therefore, to test the form for XSS vulnerability, you would need more than

    2,000 tests to check all 30 elements against the 70 XSS techniques. Its certainly

    no surprise that a great number of applications are vulnerable to this one exploit

    Given the number of tests needed to check such applications for technical

    vulnerabilities, automated tools that are able to traverse, analyze and test are

    perhaps more efcient than manual penetration testing. Automated scanning

    and testing tools may not currently be able to test 100 percent of technica

    vulnerabilities, but they can test for a large percentage of them. Early version

    of automated tools had trouble dealing with certain issues, including:

    Client-side-generated URLs.

    Required Java Script functions.

    Application logout.

    Transaction-based systems requiring specic user paths.

    Automated form submission.

    One-time passwords.

    Innite Web sites with random URL-based session IDs.

    Automated testing tools can now

    traverse, analyze and test for a

    large percentage of technical

    vulnerabilities.

    Highlights

  • 7/27/2019 r Wp Autoscan

    5/8

    Web application security: automated scanning

    versus manual penetration testing.

    Page 5

    As automated Web application security tools have matured, the majority of

    these issues have been addressed, and automated assessments have reduced

    incidents of uncertain determinations (false positives) and missed issues (false

    negatives). However, as Web applications continue to grow in size, manual test-

    ing is becoming more and more difcult. In many enterprise organizations, it

    will become impossible to dedicate the time, effort and money to assess the

    booming number of Web applications. The bottom line is that humans can

    only look at so many lines of code per day, and as your volume of applicationsincreases, so too must your stable of testerswhich can quickly become cost

    prohibitive.

    Logical vulnerabilities

    Logical vulnerabilities are security gaps that can be exploited by understandin

    how an application works and circumventing the typical business ow. While

    automated scanning tools and skil led pen testers can navigate a Web applicatio

    only the tester is able to understand the logic behind the applications workow

    This understanding enables the tester to subvert the business logic and expos

    a security vulnerability. For example, an application might direct the user frompoint A to point B to point C, where point B is a security validation check. A

    manual review of the application might show that it is possible to go directly

    from point A to point C, bypassing the security validation entirely.

    As automated Web application

    security testing tools have matured,

    enterprises have experienced fewer

    incidents of false positives and

    false negatives.

    Highlights

    Logical vulnerabilities are security

    weaknesses that can be exploited

    by circumventing the typical flow

    of an application.

  • 7/27/2019 r Wp Autoscan

    6/8

    Web application security: automated scanning

    versus manual penetration testing.

    Page 6

    Neither manual penetration testing nor automated scanning is an exhaustive

    method for identifying Web application vulnerabilities. Each method has its

    own inherent strengths and weaknesses, and both can be used to discover

    critical security vulnerabilities in Web applications. Automated tools were

    never intended to, and should never entirely replace, the manual penetra-

    tion test. However, if used correctly, automated tools can be used to nd a

    broad range of technical security vulnerabilities in Web applications, saving

    time and money. Sophisticated organizations will determine the correct mixof automated scanning versus manual penetration testing to provide the best

    Web application security coverage possible.

    Delivering the software and services you need to help secure your Web applications

    IBM is a marketplace leader in Web application vulnerability assessment soft-

    ware. Providing a range of security software products, IBM offers individual

    tools for any size organization.

    IBM Rational Web application security testing products can help your orga-

    nization build security into applications destined for online deployment. The

    Rational products allow users to work within familiar technology environment

    offering virtually seamless integration with leading quality assurance tools and

    Although manual penetration

    testing and automated scanning

    can both be used to find critical

    security vulnerabilities in Web

    applications, each has inherentstrengths and weaknesses.

    Highlights

    Using IBM Rational Web application

    security testing products, develop-

    ers can build security into every

    Web applicationand work within

    familiar technology environments.

  • 7/27/2019 r Wp Autoscan

    7/8

    Web application security: automated scanning

    versus manual penetration testing.

    Page 7

    integrated development environments (IDEs). And the applications enable you

    to perform continuous security auditing, helping software delivery teams build

    security into Web applications from the ground up, and helping to mitigate

    business risk before you deploy your applications.

    For more information

    To learn more about IBM Rational Web security solutions, contact

    your IBM representative or IBM Business Partner, or visit:

    ibm.com/software /rational/offerings/testing/webapplicationsecurity

    Rational testing software enables

    enterprises to continuously audit

    the security of Web applications

    and to mitigate business risk prior

    to deployment.

    Highlights

    http://www-306.ibm.com/software/rational/offerings/testing/webapplicationsecurity/http://www-306.ibm.com/software/rational/offerings/testing/webapplicationsecurity/http://www-306.ibm.com/software/rational/offerings/testing/webapplicationsecurity/
  • 7/27/2019 r Wp Autoscan

    8/8

    Copyright IBM Corporation 2008

    IBM Corporation

    Software Group

    Route 100

    Somers, NY 10589

    U.S.A.

    Produced in the United States of America

    01-08

    All Rights Reserved.

    IBM, the IBM logo and Rational are registered

    trademarks of International Business Machines

    Corporation in the United States, other countries,

    or both.

    The information contained in this documentation

    is provided for informational purposes only. While

    efforts were made to verify the completeness

    and accuracy of the information contained in this

    documentation, it is provided as is without wa

    ranty of any kind, express or implied. In addition

    this information is based on IBMs current product

    plans and strategy, which are subject to change b

    IBM without notice. IBM shall not be responsible fo

    any damages arising out of the use of, or otherwis

    related to, this documentation or any other docu-

    mentation. Nothing contained in this documentati

    is intended to, nor shall have the effect of, creating

    any warranties or representations from IBM (or its

    suppliers or licensors), or altering the terms and

    conditions of the applicable license agreement

    governing the use of IBM software.

    IBM customers are responsible for ensuring their

    own compliance with legal requirements. It is the

    customers sole responsibility to obtain advice of

    competent legal counsel as to the identification

    and interpretation of any relevant laws and regul

    tory requirements that may affect the customers

    business and any actions the customer may nee

    to take to comply with such laws.

    RAW14011-USEN-00