Discussion will include the theory surrounding some of the more dangerous web application attacks known, how to test for them quickly and determine possible countermeasures. Insecure and unprotected web applications are the fastest, easiest, and arguably the most utilized route to compromise networks and exploit users. It is for these very reasons that WhiteHat Security Inc., is pleased to introduce its new release, "WhiteHat Arsenal", the next generation of professional web security audit software.
WH Arsenal possesses a powerful suite of GUI-Browser based web security tools. These endowments make WH Arsenal capable of completing painstaking web security pen-test work considerably faster and more effectively than any of the currently available tools. Imagine employing WH Arsenal to quickly customize and execute just about any web security attack possible and having those penetration attempts logged in XML format for later reporting or analysis.
Many experienced web security professionals tend to agree that even the best current web security scanners, which scan only for known vulnerabilities, achieve only very limited success or simply do not work at all. Furthermore, these types of tools often result in an enormous overflow of false positives. WhiteHat understands these frustrating shortcomings and is poised to revolutionize the way in which web applications are penetration tested.
Driving Behavioral Change for Information Management through Data-Driven Gree...
Web Application Security and Release of "WhiteHat Arsenal"
1.
2.
3. Web Application Security Landscape Entertainment Message Boards WebMail Guest Books Voting Polls E-Commerce Shopping Auctions Banking Stock Trading Just Plain Crazy Printers PDA’s Cell Phones System Configuration .NET/Passport
4. Web Application The Simple Definition A web application or web service is a software application that is accessible using a web browser or HTTP(s) user agent.
5. Web Application The “EASIER” Definition If it runs on port 80 or port 443, then is probably a web application.
6.
7.
8.
9.
10. Common Web Application Security Mistakes Trusting Client-Side Data Unescaped Special Characters HTML Output Character Filtering SUID ActiveX/JavaScript Authentication Lack of User Authentication before performing critical task.
11. Trusting Client-Side Data DO NOT TRUST CLIENT-SIDE DATA!!! Trusting client-side data is #1 cause of vulnerabilities. Identify all input parameters that trust client-side data.
12. Unescaped Special Characters The Level of Trust : Searches/Queries/Templates Path: http://foo.com/cgi?val=string&file=/html/name.db Or better yet… http://www.foo.com/cgi?string=root&file=../../../../../etc/passwd
14. HTML Character Filtering Proper handling of special characters > => > < => < " => " & => & Null characters should all be removed. %00
15.
16.
17. Web Application Penetration Methodologies Information Gathering & Discovery Input/Output Client-Side Data Manipulation
21. Identifiable Characteristics Comment Lines URL Extensions Meta Tags Cookies Client-Side scripting languages Enormous wealth of information about process flows, debug command, system types and configurations.
30. Cross-Site Scripting Bad name given to a dangerous security issue Attack targets the user of the system rather than the system itself. Outside client-side languages executing within the users web environment with the same level of privilege as the hosted site.
31. Client-Side Scripting Languages DHTML (HTML, XHTML, HTML x.0) Opens all the doors. JavaScript (1.x) Browser/DOM Manipulation Java (Applets) Malicious Applets VBScript Browser/DOM Manipulation Flash Dangerous Third-Party Interactivity ActiveX Let me count the ways… XML/XSL Another Door Opener CSS Browser/DOM Manipulation
32. The Scenarios Trick a user to re-login to a spoofed page Compromise authentication credentials Load dangerous of malicious ActiveX Re-Direct a user or ALL users Crash the machine or the browser
33. CSS Danger “The Remote Launch Pad.” Successfully CSS a user via a protected domain. Utilizing a Client-Side utility (JavaScript, ActiveX, VBScript, etc.), exploit a browser hole to download a trojan/virus. User is unknowingly infected/compromised within a single HTTP page load. ActiveX Netcat Anyone?
34.
35. Dangerous HTML “HTML Bad” <APPLET> Malicious Java Applications <BODY> Altering HTML Page Characteristics <EMBED> Embedding Third-Party Applications (Flash, etc.) <FRAME> Directly calling in other uncontrolled HTML <FRAMESET> Directly calling in other uncontrolled HTML <HTML> Altering HTML Page Characteristics <IFRAME> Directly calling in other uncontrolled HTML <IMG> SCRing Protocol attacks and other abuses <LAYER> Directly calling in other uncontrolled HTML <ILAYER> Directly calling in other uncontrolled HTML <META> META Refreshes. (Client-Redirects) <OBJECT> ActiveX (Nuff Said) <SCRIPT> JavaScript/VBScript Loading <STYLE> Style Sheet and Scripting Alterations
37. Power of the Dots and Slashes piping input to the command line. Path Directory Traversal http://foo.com/app.cgi?directory=/path/to/data DotDot Slash: http://foo.com/app.cgi?dir=path/to/data../../../../etc/passwd Dot Slash: http://foo.com/app.cgi?dir=path/to/data../../../../etc/././passwd Double DotDot Slash: http://foo.com/app.cgi?dir=path/to/data....//….//….//etc/passwd
38. More Filter Bypassing Method Alteration (HEAD, PUT, POST, GET, ect.) URL Encode http://www.foo.com/cgi?value=%46%72%68%86 Null Characters http://www.foo.com/cgi?value=file%00.html More… Alternate Case, Unicode, String Length, Multi-Slash, etc.
40. Reporting XML/HTML Based Manual Hack Attack Log w/ Descriptor Common Directory Force Browsing Common Log File Force Browsing Backup File Force Browsing Spider Log
44. Thank You! Questions? Jeremiah Grossman [email_address] WhiteHat Security All presentation updates will be available on www.whitehatsec.com and community.whitehatsec.com