SlideShare une entreprise Scribd logo
1  sur  58
Télécharger pour lire hors ligne
Certified Secure Software Lifecycle Professional
                      (CSSLP)
  Master Degree in Management Information Systems (MSMIS)
  Faculty of Commerce and Accountancy, Thammasat University
                        05-April-2010



                Surachai Chatchalermpun
Speaker Profile




     , CSSLP, ECSA , LPT




                           2
Agenda

    Challenges Today…

         What is CSSLP?
      What is OWASP?
    What is WebGoat?
     WebGoat Lesson!
Challenges Today…
• Over 70% of breaches of security vulnerabilities exist at
  the application level.                      (Gartner Group, 2005)

• Software is often not developed with security in mind
• Attack targeted, financially motivated attacks continue
  to rise
• Attacks are moving up the application stack
• New technology waves keep on coming -- there are still
  numerous emerging threat vectors which require
  increased spending in certain security sub-segments.
  Source: Global Information Security & IT Security Personnel Development in USA –
  trend and hurdles, Prof. Howard A. Schmidt
Source: Issue number 9 Info Security Professional Magazine
W. Hord Tipton, CISSP-
   ISSEP, CAP, CISA
(ISC)² Executive Director
What is the CSSLP?

• Certified Secure Software Lifecycle Professional (CSSLP)
• Base credential
• Professional certification program
• Takes a holistic approach to security in the software
  lifecycle
• Tests candidates competency (KSAs) to significantly
  mitigate the security concerns
•   Global leaders in certifying and educating information security
    professionals with the CISSP® and related concentrations,
    CAP® and SSCP®.

•   Established in 1989 – not-for-profit consortium of industry
    leaders.

•   More than 60,000 certified professionals in over 135 countries.

•   Board of Directors - top information security professionals
    worldwide.

•   All of our information security credentials are accredited
    ANSI/ISO/IEC Standard 17024 and were the first technology-
    related credentials to receive this accreditation.
Over 70% of breaches of security vulnerabilities exist
at the application level.*




   * Gartner Group, 2005
Purpose
• Provide a credential that speaks to the individual’s
  understanding of and ability to deliver secure
  software through the use of best practices.

• The target professionals for this Certification would
  be anyone who is directly and in some cases
  indirectly, involved in the Software Lifecycle.
Software Lifecycle Stakeholder Chart

                             Top Management
                 Auditors
                                                Business Unit Heads

   Client Side PM
                                                        IT Manager
Industry Group
Delivery Heads                                                Security Specialists
                                  Software
                                  Lifecycle
  Business                      Stakeholders                  Application Owners
  Analysts

                                                        Developers/
        Quality                                         Coders
        Assurance                                                         Influencers
        Managers                                                          Primary Target
                                          Project Managers/
                            Technical                                     Secondary Target
                            Architects    Team Leads
Market Drivers

• Security is everyone’s responsibility
• Software vulnerabilities have emerged
  as a major concern
• Off shoring of software development
• Software is often not developed with
  security in mind
• Desire to meet growing industry needs
Certified Secure Software
           Lifecycle Professional

(ISC)² CSSLP CBK 7 Domains:
•   Secure Software Concepts
•   Secure Software Requirements
•   Secure Software Design
•   Secure Software Implementation/Coding
•   Secure Software Testing
•   Software Acceptance
•   Software Deployment, Operations, Maintenance,
    and Disposal
CSSLP Certification Requirements

By Experience Assessment:
•   Experience Assessment will be open until March 31, 2009
•   Candidate will be required to submit:
    – Experience Assessment Application
    – Signed candidate agreement and adherence to (ISC)² Code of
      Ethics
    – Detailed resume of experience
    – Four essay responses (Between 250-500 words) detailing
      experience in four of the following knowledge areas
        •   Applying Security concepts to Software Development
        •   Software Design
        •   Software Implementation/Coding
        •   Software Testing
        •   Software Acceptance
        •   Software Deployment, Operations, Maintenance, and Disposal
    – Fee of $650
CSSLP Certification Requirements

By Examination:
•   The first public exam will be held at the end of June 2009
•   Candidate will be required to submit:
     – Completed examination registration form
     – Signed candidate agreement and adherence to the (ISC)² Code of
       ethics
     – Proof of 4 years of FTE experience in the Software Development
       Lifecycle (SDLC) Process or 3 years plus 1 year waiver of
       experience for degree in an IT related field
     – Fee of $549 early-bird and $599 standard
•   Candidate will be required to
     – Pass the official (ISC)² CSSLP certification examination
     – Complete the endorsement process
•   The Associate of (ISC)² Program will apply to those who have
    passed the exam but still need to acquire the necessary
    minimum experience requirements
CSSLP CBK Overlap between
                       other Certifications/Programs

                        GSSP-C                        GSSP-J

                              (SANS)                        (SANS)

                          Software Coder                Software Coder
                        Certification Program         Certification Program


CSSE                                        CSSLP
 (ISSECO)

 Entry-level
 Education                                      (ISC)²
                                       Professional Certification               Software
  Program
Certificate of                                 Program                         Assurance
Completion                                                                      Initiative
                                                                                   (DHS)

                                                                              Awareness Effort
                              CSDA                      CSDP
         Vendor-
         Specific
         Credentials              (IEEE)                    (IEEE)
                             Associate Level             Professional
                                 Status
                                                     Certification Program
Future of CSSLP

• International Marketing Efforts

• ANSI/ISO/IEC17024 accreditation

• Maintenance activities

• Cert Education Program
Hear what Anthony Lim, from IBM,
has to say about CSSLP
CSSLP Certification
My CSSLP Certification
Why is Web Application Security Important?

 •    Easiest way to compromise hosts, networks and users.
 •    Widely deployed.
 •    No Logs! (POST Request payload)
 •    Incredibly hard to defend against or detect.
 •    Most don’t think of locking down web applications.
 •    Intrusion detection is a joke.
 •    Firewall? What firewall? I don’t see no firewall…
 •    SSL Encrypted transport layer does nothing.



Source: White Hat Security
Web Application Hacking



          Outer

                   DMZ Zone




          Inner


           Server farm Zone
Source: White Hat Security
Your “Code” is Part of Your Security Perimeter
                       APPLICATION                    Your security “perimeter” has huge
                         ATTACK
  Application Layer



                                                       holes at the “Application layer”




                                                                                                                    Legacy Systems
                                                                                                                                     Web Services


                                                                                                                                                                  Human Resource
                                                                                                                                                    Directories
                                                                                                        Databases
                                                                Custom Developed




                                                                                                                                                                                   Billing
                                                                 Application Code




                                                                  App Server
 Network Layer




                                                                  Web Server
                                                                  Hardened OS




                                                                                       Inner Firewall
                                     Outer Firewall




                      You can’t use network layer protection (Firewall, SSL, IDS, hardening)
                                    to stop or detect application layer attacks
Source: White Hat Security
The Web Application Security Risk
   • Web Applications are vulnerable:
       – exposing its own vulnerabilities.
       – Change frequently, requiring constant tuning of application
         security.
       – Complex and feature rich with the advent of AJAX, Web
         Services and Web 2.0. (and Social Network)
   • Web Applications are threatened:
       – New business models drive “for profit” hacking.
       – Performed by Black hat professionals enabling complex
         attacks.
   • Potential impact may be severe:
       – Web applications are used for sensitive information and
         important transactions.
Source: White Hat Security
Threat is Difficult to Assess
   • Web Attacks are Stealth:
       – Victims hide breaches.
       – Incidents are not
         detected.

   • Statistics are Skewed:
       – Number of incident
         reported is statistically
         insignificant.


Source: Breach Security
Source: Web Hacking Incidents Database
Source: Web Hacking Incidents Database
Available Sources Attacks
• Zone-H (The Hacker Community)
  – http://www.zone-h.org
  – The most comprehensive attack repository, very
    important for public awareness.
  – Reported by hackers and focus on defacements.

• WASC Statistics Project
  – http://www.webappsec.org


• OWASP top 10
  – http://www.owasp.org
Hacking Incidents (Defacement)
Hacking Incidents (Defacement)
Hacking Incidents (Defacement)
Key Principle
     3 Pillars of ICT             3 Pillars of Security
                                             Disclosure
          People                             Confidentiality




           PPT                                    CIA


Process            Technology    Integrity                     Availability
                     (Tool)     Alteration                Disruption
                                                                   31
Root Causes of Application Insecurity : PPT
                             Missing or       • People and Organization
                            Inadequate          Examples
                          Tools, Libraries,
                                 or              – Lack of Application Security training
          Missing or
         Inadequate        Infrastructure        – Roles & Responsibilities not clear
          Processes                              – No budget allocated

                                              • Process Examples
                                                 – Underestimated risks
                                                 – Missed requirements
      Untrained                                  – Inadequate testing and reviews
     People and
    Organizational                               – Lack of metrics
   Structure Issues                              – Lack of implementing Best Practices or
                                                   Standards
                       Knowledge Mgmt
                        Communication
                        Administration




                         Bus. Functions
                          Transactions


                          E-Commerce




                                                 – No detection of attacks
                            Accounts
                             Finance




                                              • Technology Examples
                          Custom Code            – Lack of appropriate tools
                                                 – Lack of common infrastructure
                                                 – Configuration errors
Source: OWASP
People / Processes / Technology
                                      Training
                     Awareness

                                                 Guidelines

        Automated
         Testing                                     Secure
                                                   Development


       Application                                   Secure Code
        Firewalls                                       Review


                        Secure             Security Testing
                      Configuration
33
SDLC & OWASP Guidelines




 Source: OWASP
34
Source: OWASP
Source: OWASP
Source: OWASP
Source: Microsoft
CSSLP Certification
              What is OWASP?
The Open Web Application Security Project (OWASP) is:

       A not-for-profit worldwide charitable organization focused on
improving the security of application software.

       Our mission is to make application security visible, so that
people and organizations can make informed decisions about true
application security risks.

       Everyone is free to participate in OWASP and all of our
materials are available under a free and open software license.

Source: http://www.owasp.org
OWASP Foundation has over 130 Local Chapters
41
CSSLP is WebGoat?
           What Certification
     WebGoat is a deliberately insecure J2EE web
application maintained by OWASP TOP 10 designed to
teach web application security lessons.

     In each lesson, users must demonstrate their
understanding of a security issue by exploiting a real
vulnerability in the WebGoat application.
CSSLP is WebGoat?
What Certification
CSSLP Certification
         WebGoat Installation
Windows - (Download, Extract, Double Click Release)


   1.   To start Tomcat, browse to the WebGoat directory unzipped above
        and double click "webgoat.bat“

   2.   start your browser and browse to... (Notice the capital 'W' and 'G')
         http://localhost/WebGoat/attack

   3.   login in as: user = guest, password = guest

   4.   To stop WebGoat, simply close the window you launched it from.
tion
WebGoat Lesson 1
tion
WebGoat Lesson 2
tion
WebGoat Lesson 3
tion
Solution: WebGoat Lesson 3
tion
Solution: WebGoat Lesson 3




           True OR ? = True
tion
WebGoat Lesson 4
tion
Solution: WebGoat Lesson 4
tion
WebGoat Lesson 5
tion
 Solution: WebGoat Lesson 5
Use Tamper data (Firefox Plug-in)for edit variable value:
AccessControlMatrix.help" | net user"
Question & Answer
   Thank You
   Surachai Chatchalermpun
    surachai.c@pttict.com

Contenu connexe

Tendances

Web Application Penetration Testing
Web Application Penetration Testing Web Application Penetration Testing
Web Application Penetration Testing Priyanka Aash
 
Web application security
Web application securityWeb application security
Web application securityKapil Sharma
 
OWASP based Threat Modeling Framework
OWASP based Threat Modeling FrameworkOWASP based Threat Modeling Framework
OWASP based Threat Modeling FrameworkChaitanya Bhatt
 
Security in the Software Development Life Cycle (SDLC)
Security in the Software Development Life Cycle (SDLC)Security in the Software Development Life Cycle (SDLC)
Security in the Software Development Life Cycle (SDLC)Frances Coronel
 
Introduction to penetration testing
Introduction to penetration testingIntroduction to penetration testing
Introduction to penetration testingNezar Alazzabi
 
Threat Modeling In 2021
Threat Modeling In 2021Threat Modeling In 2021
Threat Modeling In 2021Adam Shostack
 
Secure Coding 101 - OWASP University of Ottawa Workshop
Secure Coding 101 - OWASP University of Ottawa WorkshopSecure Coding 101 - OWASP University of Ottawa Workshop
Secure Coding 101 - OWASP University of Ottawa WorkshopPaul Ionescu
 
Learn Ethical Hacking in 10 Hours | Ethical Hacking Full Course | Edureka
Learn Ethical Hacking in 10 Hours | Ethical Hacking Full Course | EdurekaLearn Ethical Hacking in 10 Hours | Ethical Hacking Full Course | Edureka
Learn Ethical Hacking in 10 Hours | Ethical Hacking Full Course | EdurekaEdureka!
 
Understanding Penetration Testing & its Benefits for Organization
Understanding Penetration Testing & its Benefits for OrganizationUnderstanding Penetration Testing & its Benefits for Organization
Understanding Penetration Testing & its Benefits for OrganizationPECB
 
Web Application Security and Awareness
Web Application Security and AwarenessWeb Application Security and Awareness
Web Application Security and AwarenessAbdul Rahman Sherzad
 
Application Threat Modeling
Application Threat ModelingApplication Threat Modeling
Application Threat ModelingPriyanka Aash
 
Overview of the Cyber Kill Chain [TM]
Overview of the Cyber Kill Chain [TM]Overview of the Cyber Kill Chain [TM]
Overview of the Cyber Kill Chain [TM]David Sweigert
 
NIST cybersecurity framework
NIST cybersecurity frameworkNIST cybersecurity framework
NIST cybersecurity frameworkShriya Rai
 
Info Security - Vulnerability Assessment
Info Security - Vulnerability AssessmentInfo Security - Vulnerability Assessment
Info Security - Vulnerability AssessmentMarcelo Silva
 
Cross Site Scripting ( XSS)
Cross Site Scripting ( XSS)Cross Site Scripting ( XSS)
Cross Site Scripting ( XSS)Amit Tyagi
 

Tendances (20)

Threat Modelling
Threat ModellingThreat Modelling
Threat Modelling
 
Threat Modeling Using STRIDE
Threat Modeling Using STRIDEThreat Modeling Using STRIDE
Threat Modeling Using STRIDE
 
Web Application Penetration Testing
Web Application Penetration Testing Web Application Penetration Testing
Web Application Penetration Testing
 
Web application security
Web application securityWeb application security
Web application security
 
OWASP based Threat Modeling Framework
OWASP based Threat Modeling FrameworkOWASP based Threat Modeling Framework
OWASP based Threat Modeling Framework
 
Security in the Software Development Life Cycle (SDLC)
Security in the Software Development Life Cycle (SDLC)Security in the Software Development Life Cycle (SDLC)
Security in the Software Development Life Cycle (SDLC)
 
Introduction to penetration testing
Introduction to penetration testingIntroduction to penetration testing
Introduction to penetration testing
 
Threat Modeling In 2021
Threat Modeling In 2021Threat Modeling In 2021
Threat Modeling In 2021
 
Secure Coding 101 - OWASP University of Ottawa Workshop
Secure Coding 101 - OWASP University of Ottawa WorkshopSecure Coding 101 - OWASP University of Ottawa Workshop
Secure Coding 101 - OWASP University of Ottawa Workshop
 
Csslp
CsslpCsslp
Csslp
 
Learn Ethical Hacking in 10 Hours | Ethical Hacking Full Course | Edureka
Learn Ethical Hacking in 10 Hours | Ethical Hacking Full Course | EdurekaLearn Ethical Hacking in 10 Hours | Ethical Hacking Full Course | Edureka
Learn Ethical Hacking in 10 Hours | Ethical Hacking Full Course | Edureka
 
Understanding Penetration Testing & its Benefits for Organization
Understanding Penetration Testing & its Benefits for OrganizationUnderstanding Penetration Testing & its Benefits for Organization
Understanding Penetration Testing & its Benefits for Organization
 
Career in cyber security
Career in  cyber securityCareer in  cyber security
Career in cyber security
 
Web Application Security and Awareness
Web Application Security and AwarenessWeb Application Security and Awareness
Web Application Security and Awareness
 
Application Threat Modeling
Application Threat ModelingApplication Threat Modeling
Application Threat Modeling
 
Overview of the Cyber Kill Chain [TM]
Overview of the Cyber Kill Chain [TM]Overview of the Cyber Kill Chain [TM]
Overview of the Cyber Kill Chain [TM]
 
NIST cybersecurity framework
NIST cybersecurity frameworkNIST cybersecurity framework
NIST cybersecurity framework
 
Info Security - Vulnerability Assessment
Info Security - Vulnerability AssessmentInfo Security - Vulnerability Assessment
Info Security - Vulnerability Assessment
 
Cross Site Scripting ( XSS)
Cross Site Scripting ( XSS)Cross Site Scripting ( XSS)
Cross Site Scripting ( XSS)
 
Endpoint Security
Endpoint SecurityEndpoint Security
Endpoint Security
 

Similaire à CSSLP & OWASP & WebGoat

Setting up a secure development life cycle with OWASP - seba deleersnyder
Setting up a secure development life cycle with OWASP - seba deleersnyderSetting up a secure development life cycle with OWASP - seba deleersnyder
Setting up a secure development life cycle with OWASP - seba deleersnyderSebastien Deleersnyder
 
Csslp Launch Presentation
Csslp Launch PresentationCsslp Launch Presentation
Csslp Launch Presentationgueste35899
 
Midrange role in isets
Midrange role in isetsMidrange role in isets
Midrange role in isetsraziqfareed
 
IBM Rational AppScan Product Overview
IBM Rational AppScan Product OverviewIBM Rational AppScan Product Overview
IBM Rational AppScan Product OverviewAshish Patel
 
Fortify-Application_Security_Foundation_Training.pptx
Fortify-Application_Security_Foundation_Training.pptxFortify-Application_Security_Foundation_Training.pptx
Fortify-Application_Security_Foundation_Training.pptxYoisRoberthTapiadeLa
 
Fortify-Application_Security_Foundation_Training.pptx
Fortify-Application_Security_Foundation_Training.pptxFortify-Application_Security_Foundation_Training.pptx
Fortify-Application_Security_Foundation_Training.pptxVictoriaChavesta
 
Application Security Done Right
Application Security Done RightApplication Security Done Right
Application Security Done Rightpvanwoud
 
SCS DevSecOps Seminar - State of DevSecOps
SCS DevSecOps Seminar - State of DevSecOpsSCS DevSecOps Seminar - State of DevSecOps
SCS DevSecOps Seminar - State of DevSecOpsStefan Streichsbier
 
Cast Application Intelligence Platform
Cast Application Intelligence PlatformCast Application Intelligence Platform
Cast Application Intelligence PlatformJohn Fotiadis ✔️
 
Efficient Security Development and Testing Using Dynamic and Static Code Anal...
Efficient Security Development and Testing Using Dynamic and Static Code Anal...Efficient Security Development and Testing Using Dynamic and Static Code Anal...
Efficient Security Development and Testing Using Dynamic and Static Code Anal...Perforce
 
A Warrior's Journey: Building a Global AppSec Program - OWASP Global AppSec 2020
A Warrior's Journey: Building a Global AppSec Program - OWASP Global AppSec 2020A Warrior's Journey: Building a Global AppSec Program - OWASP Global AppSec 2020
A Warrior's Journey: Building a Global AppSec Program - OWASP Global AppSec 2020Brian Levine
 
Cyber Security in The Cloud
Cyber Security in The CloudCyber Security in The Cloud
Cyber Security in The CloudPECB
 
Succeeding-Marriage-Cybersecurity-DevOps final
Succeeding-Marriage-Cybersecurity-DevOps finalSucceeding-Marriage-Cybersecurity-DevOps final
Succeeding-Marriage-Cybersecurity-DevOps finalrkadayam
 
Is an agile SDLC an oxymoron?
Is an agile SDLC an oxymoron? Is an agile SDLC an oxymoron?
Is an agile SDLC an oxymoron? Dave Sharrock
 
Owasp Summit - Wednesday evening briefing master
Owasp Summit - Wednesday evening briefing masterOwasp Summit - Wednesday evening briefing master
Owasp Summit - Wednesday evening briefing masterDinis Cruz
 
Bridging the Security Testing Gap in Your CI/CD Pipeline
Bridging the Security Testing Gap in Your CI/CD PipelineBridging the Security Testing Gap in Your CI/CD Pipeline
Bridging the Security Testing Gap in Your CI/CD PipelineDevOps.com
 
The CA Technologies | Veracode Platform: A 360-Degree View of Your Applicatio...
The CA Technologies | Veracode Platform: A 360-Degree View of Your Applicatio...The CA Technologies | Veracode Platform: A 360-Degree View of Your Applicatio...
The CA Technologies | Veracode Platform: A 360-Degree View of Your Applicatio...CA Technologies
 

Similaire à CSSLP & OWASP & WebGoat (20)

Setting up a secure development life cycle with OWASP - seba deleersnyder
Setting up a secure development life cycle with OWASP - seba deleersnyderSetting up a secure development life cycle with OWASP - seba deleersnyder
Setting up a secure development life cycle with OWASP - seba deleersnyder
 
Csslp Launch Presentation
Csslp Launch PresentationCsslp Launch Presentation
Csslp Launch Presentation
 
Midrange role in isets
Midrange role in isetsMidrange role in isets
Midrange role in isets
 
Mycv Tb
Mycv TbMycv Tb
Mycv Tb
 
Malik M. Ashfaque - CV
Malik M. Ashfaque - CVMalik M. Ashfaque - CV
Malik M. Ashfaque - CV
 
IBM Rational AppScan Product Overview
IBM Rational AppScan Product OverviewIBM Rational AppScan Product Overview
IBM Rational AppScan Product Overview
 
Fortify-Application_Security_Foundation_Training.pptx
Fortify-Application_Security_Foundation_Training.pptxFortify-Application_Security_Foundation_Training.pptx
Fortify-Application_Security_Foundation_Training.pptx
 
Fortify-Application_Security_Foundation_Training.pptx
Fortify-Application_Security_Foundation_Training.pptxFortify-Application_Security_Foundation_Training.pptx
Fortify-Application_Security_Foundation_Training.pptx
 
Application Security Done Right
Application Security Done RightApplication Security Done Right
Application Security Done Right
 
SCS DevSecOps Seminar - State of DevSecOps
SCS DevSecOps Seminar - State of DevSecOpsSCS DevSecOps Seminar - State of DevSecOps
SCS DevSecOps Seminar - State of DevSecOps
 
Mycv Sas
Mycv SasMycv Sas
Mycv Sas
 
Cast Application Intelligence Platform
Cast Application Intelligence PlatformCast Application Intelligence Platform
Cast Application Intelligence Platform
 
Efficient Security Development and Testing Using Dynamic and Static Code Anal...
Efficient Security Development and Testing Using Dynamic and Static Code Anal...Efficient Security Development and Testing Using Dynamic and Static Code Anal...
Efficient Security Development and Testing Using Dynamic and Static Code Anal...
 
A Warrior's Journey: Building a Global AppSec Program - OWASP Global AppSec 2020
A Warrior's Journey: Building a Global AppSec Program - OWASP Global AppSec 2020A Warrior's Journey: Building a Global AppSec Program - OWASP Global AppSec 2020
A Warrior's Journey: Building a Global AppSec Program - OWASP Global AppSec 2020
 
Cyber Security in The Cloud
Cyber Security in The CloudCyber Security in The Cloud
Cyber Security in The Cloud
 
Succeeding-Marriage-Cybersecurity-DevOps final
Succeeding-Marriage-Cybersecurity-DevOps finalSucceeding-Marriage-Cybersecurity-DevOps final
Succeeding-Marriage-Cybersecurity-DevOps final
 
Is an agile SDLC an oxymoron?
Is an agile SDLC an oxymoron? Is an agile SDLC an oxymoron?
Is an agile SDLC an oxymoron?
 
Owasp Summit - Wednesday evening briefing master
Owasp Summit - Wednesday evening briefing masterOwasp Summit - Wednesday evening briefing master
Owasp Summit - Wednesday evening briefing master
 
Bridging the Security Testing Gap in Your CI/CD Pipeline
Bridging the Security Testing Gap in Your CI/CD PipelineBridging the Security Testing Gap in Your CI/CD Pipeline
Bridging the Security Testing Gap in Your CI/CD Pipeline
 
The CA Technologies | Veracode Platform: A 360-Degree View of Your Applicatio...
The CA Technologies | Veracode Platform: A 360-Degree View of Your Applicatio...The CA Technologies | Veracode Platform: A 360-Degree View of Your Applicatio...
The CA Technologies | Veracode Platform: A 360-Degree View of Your Applicatio...
 

Plus de Surachai Chatchalermpun

Experienced in blackhat 2015 surachai chatchalermpun
Experienced in blackhat 2015 surachai chatchalermpunExperienced in blackhat 2015 surachai chatchalermpun
Experienced in blackhat 2015 surachai chatchalermpunSurachai Chatchalermpun
 
Experienced in blackhat 2015 by surachai.c
Experienced in blackhat 2015 by surachai.cExperienced in blackhat 2015 by surachai.c
Experienced in blackhat 2015 by surachai.cSurachai Chatchalermpun
 
Why computer security certification is important
Why computer security certification is importantWhy computer security certification is important
Why computer security certification is importantSurachai Chatchalermpun
 
Thailand Online Marketing 2013: Maya Online Show
Thailand Online Marketing 2013: Maya Online Show Thailand Online Marketing 2013: Maya Online Show
Thailand Online Marketing 2013: Maya Online Show Surachai Chatchalermpun
 
Addressing IT Risk [Lecture at MIS Mahidol]
Addressing IT Risk [Lecture at MIS Mahidol]Addressing IT Risk [Lecture at MIS Mahidol]
Addressing IT Risk [Lecture at MIS Mahidol]Surachai Chatchalermpun
 
Cyber security awareness สถาบันพระปกเกล้า
Cyber security awareness สถาบันพระปกเกล้าCyber security awareness สถาบันพระปกเกล้า
Cyber security awareness สถาบันพระปกเกล้าSurachai Chatchalermpun
 
Computer for Kids_Internet security awareness
Computer for Kids_Internet security awarenessComputer for Kids_Internet security awareness
Computer for Kids_Internet security awarenessSurachai Chatchalermpun
 
PTT ICT ความเสี่ยง...จากการใช้ software ละเมิดลิขสิทธิ์
PTT ICT ความเสี่ยง...จากการใช้ software ละเมิดลิขสิทธิ์PTT ICT ความเสี่ยง...จากการใช้ software ละเมิดลิขสิทธิ์
PTT ICT ความเสี่ยง...จากการใช้ software ละเมิดลิขสิทธิ์Surachai Chatchalermpun
 
IT Security Risk [Guest Speaker It Audit Class@Utcc]
IT Security Risk [Guest Speaker It Audit Class@Utcc]IT Security Risk [Guest Speaker It Audit Class@Utcc]
IT Security Risk [Guest Speaker It Audit Class@Utcc]Surachai Chatchalermpun
 

Plus de Surachai Chatchalermpun (11)

Experienced in blackhat 2015 surachai chatchalermpun
Experienced in blackhat 2015 surachai chatchalermpunExperienced in blackhat 2015 surachai chatchalermpun
Experienced in blackhat 2015 surachai chatchalermpun
 
Experienced in blackhat 2015 by surachai.c
Experienced in blackhat 2015 by surachai.cExperienced in blackhat 2015 by surachai.c
Experienced in blackhat 2015 by surachai.c
 
Why computer security certification is important
Why computer security certification is importantWhy computer security certification is important
Why computer security certification is important
 
Thailand Online Marketing 2013: Maya Online Show
Thailand Online Marketing 2013: Maya Online Show Thailand Online Marketing 2013: Maya Online Show
Thailand Online Marketing 2013: Maya Online Show
 
Emerging threat
Emerging threatEmerging threat
Emerging threat
 
Addressing IT Risk [Lecture at MIS Mahidol]
Addressing IT Risk [Lecture at MIS Mahidol]Addressing IT Risk [Lecture at MIS Mahidol]
Addressing IT Risk [Lecture at MIS Mahidol]
 
Cyber security awareness สถาบันพระปกเกล้า
Cyber security awareness สถาบันพระปกเกล้าCyber security awareness สถาบันพระปกเกล้า
Cyber security awareness สถาบันพระปกเกล้า
 
Computer for Kids_Internet security awareness
Computer for Kids_Internet security awarenessComputer for Kids_Internet security awareness
Computer for Kids_Internet security awareness
 
PTT ICT ความเสี่ยง...จากการใช้ software ละเมิดลิขสิทธิ์
PTT ICT ความเสี่ยง...จากการใช้ software ละเมิดลิขสิทธิ์PTT ICT ความเสี่ยง...จากการใช้ software ละเมิดลิขสิทธิ์
PTT ICT ความเสี่ยง...จากการใช้ software ละเมิดลิขสิทธิ์
 
IT Security Risk [Guest Speaker It Audit Class@Utcc]
IT Security Risk [Guest Speaker It Audit Class@Utcc]IT Security Risk [Guest Speaker It Audit Class@Utcc]
IT Security Risk [Guest Speaker It Audit Class@Utcc]
 
Ethical Hacking & Penetration Testing
Ethical Hacking & Penetration TestingEthical Hacking & Penetration Testing
Ethical Hacking & Penetration Testing
 

Dernier

Connector Corner: Accelerate revenue generation using UiPath API-centric busi...
Connector Corner: Accelerate revenue generation using UiPath API-centric busi...Connector Corner: Accelerate revenue generation using UiPath API-centric busi...
Connector Corner: Accelerate revenue generation using UiPath API-centric busi...DianaGray10
 
Scaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organizationScaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organizationRadu Cotescu
 
AWS Community Day CPH - Three problems of Terraform
AWS Community Day CPH - Three problems of TerraformAWS Community Day CPH - Three problems of Terraform
AWS Community Day CPH - Three problems of TerraformAndrey Devyatkin
 
Repurposing LNG terminals for Hydrogen Ammonia: Feasibility and Cost Saving
Repurposing LNG terminals for Hydrogen Ammonia: Feasibility and Cost SavingRepurposing LNG terminals for Hydrogen Ammonia: Feasibility and Cost Saving
Repurposing LNG terminals for Hydrogen Ammonia: Feasibility and Cost SavingEdi Saputra
 
Apidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, Adobe
Apidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, AdobeApidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, Adobe
Apidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, Adobeapidays
 
Deploy with confidence: VMware Cloud Foundation 5.1 on next gen Dell PowerEdg...
Deploy with confidence: VMware Cloud Foundation 5.1 on next gen Dell PowerEdg...Deploy with confidence: VMware Cloud Foundation 5.1 on next gen Dell PowerEdg...
Deploy with confidence: VMware Cloud Foundation 5.1 on next gen Dell PowerEdg...Principled Technologies
 
Real Time Object Detection Using Open CV
Real Time Object Detection Using Open CVReal Time Object Detection Using Open CV
Real Time Object Detection Using Open CVKhem
 
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024The Digital Insurer
 
2024: Domino Containers - The Next Step. News from the Domino Container commu...
2024: Domino Containers - The Next Step. News from the Domino Container commu...2024: Domino Containers - The Next Step. News from the Domino Container commu...
2024: Domino Containers - The Next Step. News from the Domino Container commu...Martijn de Jong
 
Exploring the Future Potential of AI-Enabled Smartphone Processors
Exploring the Future Potential of AI-Enabled Smartphone ProcessorsExploring the Future Potential of AI-Enabled Smartphone Processors
Exploring the Future Potential of AI-Enabled Smartphone Processorsdebabhi2
 
Polkadot JAM Slides - Token2049 - By Dr. Gavin Wood
Polkadot JAM Slides - Token2049 - By Dr. Gavin WoodPolkadot JAM Slides - Token2049 - By Dr. Gavin Wood
Polkadot JAM Slides - Token2049 - By Dr. Gavin WoodJuan lago vázquez
 
Powerful Google developer tools for immediate impact! (2023-24 C)
Powerful Google developer tools for immediate impact! (2023-24 C)Powerful Google developer tools for immediate impact! (2023-24 C)
Powerful Google developer tools for immediate impact! (2023-24 C)wesley chun
 
Manulife - Insurer Innovation Award 2024
Manulife - Insurer Innovation Award 2024Manulife - Insurer Innovation Award 2024
Manulife - Insurer Innovation Award 2024The Digital Insurer
 
Why Teams call analytics are critical to your entire business
Why Teams call analytics are critical to your entire businessWhy Teams call analytics are critical to your entire business
Why Teams call analytics are critical to your entire businesspanagenda
 
Data Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt RobisonData Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt RobisonAnna Loughnan Colquhoun
 
Top 5 Benefits OF Using Muvi Live Paywall For Live Streams
Top 5 Benefits OF Using Muvi Live Paywall For Live StreamsTop 5 Benefits OF Using Muvi Live Paywall For Live Streams
Top 5 Benefits OF Using Muvi Live Paywall For Live StreamsRoshan Dwivedi
 
The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024Rafal Los
 
MINDCTI Revenue Release Quarter One 2024
MINDCTI Revenue Release Quarter One 2024MINDCTI Revenue Release Quarter One 2024
MINDCTI Revenue Release Quarter One 2024MIND CTI
 
Workshop - Best of Both Worlds_ Combine KG and Vector search for enhanced R...
Workshop - Best of Both Worlds_ Combine  KG and Vector search for  enhanced R...Workshop - Best of Both Worlds_ Combine  KG and Vector search for  enhanced R...
Workshop - Best of Both Worlds_ Combine KG and Vector search for enhanced R...Neo4j
 
ProductAnonymous-April2024-WinProductDiscovery-MelissaKlemke
ProductAnonymous-April2024-WinProductDiscovery-MelissaKlemkeProductAnonymous-April2024-WinProductDiscovery-MelissaKlemke
ProductAnonymous-April2024-WinProductDiscovery-MelissaKlemkeProduct Anonymous
 

Dernier (20)

Connector Corner: Accelerate revenue generation using UiPath API-centric busi...
Connector Corner: Accelerate revenue generation using UiPath API-centric busi...Connector Corner: Accelerate revenue generation using UiPath API-centric busi...
Connector Corner: Accelerate revenue generation using UiPath API-centric busi...
 
Scaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organizationScaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organization
 
AWS Community Day CPH - Three problems of Terraform
AWS Community Day CPH - Three problems of TerraformAWS Community Day CPH - Three problems of Terraform
AWS Community Day CPH - Three problems of Terraform
 
Repurposing LNG terminals for Hydrogen Ammonia: Feasibility and Cost Saving
Repurposing LNG terminals for Hydrogen Ammonia: Feasibility and Cost SavingRepurposing LNG terminals for Hydrogen Ammonia: Feasibility and Cost Saving
Repurposing LNG terminals for Hydrogen Ammonia: Feasibility and Cost Saving
 
Apidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, Adobe
Apidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, AdobeApidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, Adobe
Apidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, Adobe
 
Deploy with confidence: VMware Cloud Foundation 5.1 on next gen Dell PowerEdg...
Deploy with confidence: VMware Cloud Foundation 5.1 on next gen Dell PowerEdg...Deploy with confidence: VMware Cloud Foundation 5.1 on next gen Dell PowerEdg...
Deploy with confidence: VMware Cloud Foundation 5.1 on next gen Dell PowerEdg...
 
Real Time Object Detection Using Open CV
Real Time Object Detection Using Open CVReal Time Object Detection Using Open CV
Real Time Object Detection Using Open CV
 
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024
 
2024: Domino Containers - The Next Step. News from the Domino Container commu...
2024: Domino Containers - The Next Step. News from the Domino Container commu...2024: Domino Containers - The Next Step. News from the Domino Container commu...
2024: Domino Containers - The Next Step. News from the Domino Container commu...
 
Exploring the Future Potential of AI-Enabled Smartphone Processors
Exploring the Future Potential of AI-Enabled Smartphone ProcessorsExploring the Future Potential of AI-Enabled Smartphone Processors
Exploring the Future Potential of AI-Enabled Smartphone Processors
 
Polkadot JAM Slides - Token2049 - By Dr. Gavin Wood
Polkadot JAM Slides - Token2049 - By Dr. Gavin WoodPolkadot JAM Slides - Token2049 - By Dr. Gavin Wood
Polkadot JAM Slides - Token2049 - By Dr. Gavin Wood
 
Powerful Google developer tools for immediate impact! (2023-24 C)
Powerful Google developer tools for immediate impact! (2023-24 C)Powerful Google developer tools for immediate impact! (2023-24 C)
Powerful Google developer tools for immediate impact! (2023-24 C)
 
Manulife - Insurer Innovation Award 2024
Manulife - Insurer Innovation Award 2024Manulife - Insurer Innovation Award 2024
Manulife - Insurer Innovation Award 2024
 
Why Teams call analytics are critical to your entire business
Why Teams call analytics are critical to your entire businessWhy Teams call analytics are critical to your entire business
Why Teams call analytics are critical to your entire business
 
Data Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt RobisonData Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt Robison
 
Top 5 Benefits OF Using Muvi Live Paywall For Live Streams
Top 5 Benefits OF Using Muvi Live Paywall For Live StreamsTop 5 Benefits OF Using Muvi Live Paywall For Live Streams
Top 5 Benefits OF Using Muvi Live Paywall For Live Streams
 
The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024
 
MINDCTI Revenue Release Quarter One 2024
MINDCTI Revenue Release Quarter One 2024MINDCTI Revenue Release Quarter One 2024
MINDCTI Revenue Release Quarter One 2024
 
Workshop - Best of Both Worlds_ Combine KG and Vector search for enhanced R...
Workshop - Best of Both Worlds_ Combine  KG and Vector search for  enhanced R...Workshop - Best of Both Worlds_ Combine  KG and Vector search for  enhanced R...
Workshop - Best of Both Worlds_ Combine KG and Vector search for enhanced R...
 
ProductAnonymous-April2024-WinProductDiscovery-MelissaKlemke
ProductAnonymous-April2024-WinProductDiscovery-MelissaKlemkeProductAnonymous-April2024-WinProductDiscovery-MelissaKlemke
ProductAnonymous-April2024-WinProductDiscovery-MelissaKlemke
 

CSSLP & OWASP & WebGoat

  • 1. Certified Secure Software Lifecycle Professional (CSSLP) Master Degree in Management Information Systems (MSMIS) Faculty of Commerce and Accountancy, Thammasat University 05-April-2010 Surachai Chatchalermpun
  • 2. Speaker Profile , CSSLP, ECSA , LPT 2
  • 3. Agenda Challenges Today… What is CSSLP? What is OWASP? What is WebGoat? WebGoat Lesson!
  • 4. Challenges Today… • Over 70% of breaches of security vulnerabilities exist at the application level. (Gartner Group, 2005) • Software is often not developed with security in mind • Attack targeted, financially motivated attacks continue to rise • Attacks are moving up the application stack • New technology waves keep on coming -- there are still numerous emerging threat vectors which require increased spending in certain security sub-segments. Source: Global Information Security & IT Security Personnel Development in USA – trend and hurdles, Prof. Howard A. Schmidt
  • 5. Source: Issue number 9 Info Security Professional Magazine
  • 6. W. Hord Tipton, CISSP- ISSEP, CAP, CISA (ISC)² Executive Director
  • 7. What is the CSSLP? • Certified Secure Software Lifecycle Professional (CSSLP) • Base credential • Professional certification program • Takes a holistic approach to security in the software lifecycle • Tests candidates competency (KSAs) to significantly mitigate the security concerns
  • 8. Global leaders in certifying and educating information security professionals with the CISSP® and related concentrations, CAP® and SSCP®. • Established in 1989 – not-for-profit consortium of industry leaders. • More than 60,000 certified professionals in over 135 countries. • Board of Directors - top information security professionals worldwide. • All of our information security credentials are accredited ANSI/ISO/IEC Standard 17024 and were the first technology- related credentials to receive this accreditation.
  • 9. Over 70% of breaches of security vulnerabilities exist at the application level.* * Gartner Group, 2005
  • 10. Purpose • Provide a credential that speaks to the individual’s understanding of and ability to deliver secure software through the use of best practices. • The target professionals for this Certification would be anyone who is directly and in some cases indirectly, involved in the Software Lifecycle.
  • 11. Software Lifecycle Stakeholder Chart Top Management Auditors Business Unit Heads Client Side PM IT Manager Industry Group Delivery Heads Security Specialists Software Lifecycle Business Stakeholders Application Owners Analysts Developers/ Quality Coders Assurance Influencers Managers Primary Target Project Managers/ Technical Secondary Target Architects Team Leads
  • 12. Market Drivers • Security is everyone’s responsibility • Software vulnerabilities have emerged as a major concern • Off shoring of software development • Software is often not developed with security in mind • Desire to meet growing industry needs
  • 13. Certified Secure Software Lifecycle Professional (ISC)² CSSLP CBK 7 Domains: • Secure Software Concepts • Secure Software Requirements • Secure Software Design • Secure Software Implementation/Coding • Secure Software Testing • Software Acceptance • Software Deployment, Operations, Maintenance, and Disposal
  • 14. CSSLP Certification Requirements By Experience Assessment: • Experience Assessment will be open until March 31, 2009 • Candidate will be required to submit: – Experience Assessment Application – Signed candidate agreement and adherence to (ISC)² Code of Ethics – Detailed resume of experience – Four essay responses (Between 250-500 words) detailing experience in four of the following knowledge areas • Applying Security concepts to Software Development • Software Design • Software Implementation/Coding • Software Testing • Software Acceptance • Software Deployment, Operations, Maintenance, and Disposal – Fee of $650
  • 15. CSSLP Certification Requirements By Examination: • The first public exam will be held at the end of June 2009 • Candidate will be required to submit: – Completed examination registration form – Signed candidate agreement and adherence to the (ISC)² Code of ethics – Proof of 4 years of FTE experience in the Software Development Lifecycle (SDLC) Process or 3 years plus 1 year waiver of experience for degree in an IT related field – Fee of $549 early-bird and $599 standard • Candidate will be required to – Pass the official (ISC)² CSSLP certification examination – Complete the endorsement process • The Associate of (ISC)² Program will apply to those who have passed the exam but still need to acquire the necessary minimum experience requirements
  • 16. CSSLP CBK Overlap between other Certifications/Programs GSSP-C GSSP-J (SANS) (SANS) Software Coder Software Coder Certification Program Certification Program CSSE CSSLP (ISSECO) Entry-level Education (ISC)² Professional Certification Software Program Certificate of Program Assurance Completion Initiative (DHS) Awareness Effort CSDA CSDP Vendor- Specific Credentials (IEEE) (IEEE) Associate Level Professional Status Certification Program
  • 17. Future of CSSLP • International Marketing Efforts • ANSI/ISO/IEC17024 accreditation • Maintenance activities • Cert Education Program
  • 18. Hear what Anthony Lim, from IBM, has to say about CSSLP
  • 20. Why is Web Application Security Important? • Easiest way to compromise hosts, networks and users. • Widely deployed. • No Logs! (POST Request payload) • Incredibly hard to defend against or detect. • Most don’t think of locking down web applications. • Intrusion detection is a joke. • Firewall? What firewall? I don’t see no firewall… • SSL Encrypted transport layer does nothing. Source: White Hat Security
  • 21. Web Application Hacking Outer DMZ Zone Inner Server farm Zone Source: White Hat Security
  • 22. Your “Code” is Part of Your Security Perimeter APPLICATION Your security “perimeter” has huge ATTACK Application Layer holes at the “Application layer” Legacy Systems Web Services Human Resource Directories Databases Custom Developed Billing Application Code App Server Network Layer Web Server Hardened OS Inner Firewall Outer Firewall You can’t use network layer protection (Firewall, SSL, IDS, hardening) to stop or detect application layer attacks Source: White Hat Security
  • 23. The Web Application Security Risk • Web Applications are vulnerable: – exposing its own vulnerabilities. – Change frequently, requiring constant tuning of application security. – Complex and feature rich with the advent of AJAX, Web Services and Web 2.0. (and Social Network) • Web Applications are threatened: – New business models drive “for profit” hacking. – Performed by Black hat professionals enabling complex attacks. • Potential impact may be severe: – Web applications are used for sensitive information and important transactions. Source: White Hat Security
  • 24. Threat is Difficult to Assess • Web Attacks are Stealth: – Victims hide breaches. – Incidents are not detected. • Statistics are Skewed: – Number of incident reported is statistically insignificant. Source: Breach Security
  • 25. Source: Web Hacking Incidents Database
  • 26. Source: Web Hacking Incidents Database
  • 27. Available Sources Attacks • Zone-H (The Hacker Community) – http://www.zone-h.org – The most comprehensive attack repository, very important for public awareness. – Reported by hackers and focus on defacements. • WASC Statistics Project – http://www.webappsec.org • OWASP top 10 – http://www.owasp.org
  • 31. Key Principle 3 Pillars of ICT 3 Pillars of Security Disclosure People Confidentiality PPT CIA Process Technology Integrity Availability (Tool) Alteration Disruption 31
  • 32. Root Causes of Application Insecurity : PPT Missing or • People and Organization Inadequate Examples Tools, Libraries, or – Lack of Application Security training Missing or Inadequate Infrastructure – Roles & Responsibilities not clear Processes – No budget allocated • Process Examples – Underestimated risks – Missed requirements Untrained – Inadequate testing and reviews People and Organizational – Lack of metrics Structure Issues – Lack of implementing Best Practices or Standards Knowledge Mgmt Communication Administration Bus. Functions Transactions E-Commerce – No detection of attacks Accounts Finance • Technology Examples Custom Code – Lack of appropriate tools – Lack of common infrastructure – Configuration errors Source: OWASP
  • 33. People / Processes / Technology Training Awareness Guidelines Automated Testing Secure Development Application Secure Code Firewalls Review Secure Security Testing Configuration 33
  • 34. SDLC & OWASP Guidelines Source: OWASP 34
  • 39. CSSLP Certification What is OWASP? The Open Web Application Security Project (OWASP) is: A not-for-profit worldwide charitable organization focused on improving the security of application software. Our mission is to make application security visible, so that people and organizations can make informed decisions about true application security risks. Everyone is free to participate in OWASP and all of our materials are available under a free and open software license. Source: http://www.owasp.org
  • 40. OWASP Foundation has over 130 Local Chapters
  • 41. 41
  • 42.
  • 43.
  • 44.
  • 45.
  • 46. CSSLP is WebGoat? What Certification WebGoat is a deliberately insecure J2EE web application maintained by OWASP TOP 10 designed to teach web application security lessons. In each lesson, users must demonstrate their understanding of a security issue by exploiting a real vulnerability in the WebGoat application.
  • 47. CSSLP is WebGoat? What Certification
  • 48. CSSLP Certification WebGoat Installation Windows - (Download, Extract, Double Click Release) 1. To start Tomcat, browse to the WebGoat directory unzipped above and double click "webgoat.bat“ 2. start your browser and browse to... (Notice the capital 'W' and 'G') http://localhost/WebGoat/attack 3. login in as: user = guest, password = guest 4. To stop WebGoat, simply close the window you launched it from.
  • 53. tion Solution: WebGoat Lesson 3 True OR ? = True
  • 57. tion Solution: WebGoat Lesson 5 Use Tamper data (Firefox Plug-in)for edit variable value: AccessControlMatrix.help" | net user"
  • 58. Question & Answer Thank You Surachai Chatchalermpun surachai.c@pttict.com