+ All Categories
Home > Technology > Web Application Security and Release of "WhiteHat Arsenal"

Web Application Security and Release of "WhiteHat Arsenal"

Date post: 13-May-2015
Category:
Upload: jeremiah-grossman
View: 1,279 times
Download: 4 times
Share this document with a friend
Description:
Discussion will include the theory surrounding some of the more dangerous web application attacks known, how to test for them quickly and determine possible countermeasures. Insecure and unprotected web applications are the fastest, easiest, and arguably the most utilized route to compromise networks and exploit users. It is for these very reasons that WhiteHat Security Inc., is pleased to introduce its new release, "WhiteHat Arsenal", the next generation of professional web security audit software.WH Arsenal possesses a powerful suite of GUI-Browser based web security tools. These endowments make WH Arsenal capable of completing painstaking web security pen-test work considerably faster and more effectively than any of the currently available tools. Imagine employing WH Arsenal to quickly customize and execute just about any web security attack possible and having those penetration attempts logged in XML format for later reporting or analysis.Many experienced web security professionals tend to agree that even the best current web security scanners, which scan only for known vulnerabilities, achieve only very limited success or simply do not work at all. Furthermore, these types of tools often result in an enormous overflow of false positives. WhiteHat understands these frustrating shortcomings and is poised to revolutionize the way in which web applications are penetration tested.
Popular Tags:
44
Black Hat New Orleans Windows Security 2002 “Web Application Security and Arsenal” Presenter: Jeremiah Grossman Copyright 2002 WhiteHat Security All Rights Reserved
Transcript
Page 1: Web Application Security and Release of "WhiteHat Arsenal"

Black Hat New Orleans

Windows Security 2002

“Web Application Security and Arsenal”

Presenter: Jeremiah Grossman

Copyright 2002 WhiteHat Security All Rights Reserved

Page 2: Web Application Security and Release of "WhiteHat Arsenal"

Topics

•Web Application Security Landscape

•Why is Web Application Security Important

•Common Web Application Security Mistakes

•Web Application Attack Methodologies

Page 3: Web Application Security and Release of "WhiteHat Arsenal"

Web Application Security Landscape

Entertainment

Message BoardsWebMail

Guest BooksVoting Polls

E-Commerce

ShoppingAuctionsBanking

Stock Trading

Just Plain Crazy

PrintersPDA’s

Cell PhonesSystem

Configuration.NET/Passport

Page 4: Web Application Security and Release of "WhiteHat Arsenal"

Web Application The Simple Definition

A web application or web service is a software application that is accessible using a web browser or HTTP(s) user agent.

Page 5: Web Application Security and Release of "WhiteHat Arsenal"

Web Application The “EASIER” Definition

If it runs on port 80 or port 443, then is probably a web application.

Page 6: Web Application Security and Release of "WhiteHat Arsenal"
Page 7: Web Application Security and Release of "WhiteHat Arsenal"
Page 8: Web Application Security and Release of "WhiteHat Arsenal"
Page 9: Web Application Security and Release of "WhiteHat Arsenal"

Why is Web Application Security Important?

Easiest way to compromise hosts, networks and

users. Widely deployed. No Logs! (POST Request payload) Incredibly hard to defend against or detect. Most don’t think of locking down web applications. Intrusion detection is a joke. Firewall? What firewall? I don’t see no firewall… Encrypted transport layer does nothing.

How much easier can it get!? Unicode.

Page 10: Web Application Security and Release of "WhiteHat Arsenal"

Common Web Application Security Mistakes

Trusting Client-Side Data

Unescaped Special Characters

HTML Output Character Filtering

SUID

ActiveX/JavaScript Authentication

Lack of User Authentication before performing critical task.

Page 11: Web Application Security and Release of "WhiteHat Arsenal"

Trusting Client-Side Data

DO NOT TRUST DO NOT TRUST CLIENT-SIDE DATA!!!CLIENT-SIDE DATA!!!Trusting client-side data is #1 cause of

vulnerabilities.

Identify all input parameters that trust client-side data.

Page 12: Web Application Security and Release of "WhiteHat Arsenal"

Unescaped Special Characters

The Level of Trust :

Searches/Queries/Templates

Path:

http://foo.com/cgi?val=string&file=/html/name.db

Or better yet…

http://www.foo.com/cgi?string=root&file=../../../../../etc/passwd

Page 13: Web Application Security and Release of "WhiteHat Arsenal"

Unescaped Special Characters

! @ $ % ^ & * ( ) -_ + ` ~ \ | [ ] { } ; : ' " ? / , . > <

Check for:Unescaped special characters

within input strings

Page 14: Web Application Security and Release of "WhiteHat Arsenal"

HTML Character Filtering

Proper handling of special characters

> => &gt;< => &lt;

" => &quot;& => &amp;

Null characters should all be removed. %00

Page 15: Web Application Security and Release of "WhiteHat Arsenal"

More mistakes…

SUID (Does a web application really need root?)

Authentication mechanisms using technologies suchas JavaScript or ActiveX.

Lack of re-authenticating the user before issuing newpasswords or performing critical tasks.

Hosting of uncontrolled data on a protected domain.

Page 16: Web Application Security and Release of "WhiteHat Arsenal"

WhiteHat Arsenal

GUI Web-Based Interface Session Based Discovery Utilities Active Assessment Encoding/Decoding Reporting

Page 17: Web Application Security and Release of "WhiteHat Arsenal"

Web Application Penetration Methodologies

Information Gathering & Discovery

Input/Output Client-Side Data Manipulation

Page 18: Web Application Security and Release of "WhiteHat Arsenal"

Information Gathering & Discovery

•Spidering /Site Map

•Identifiable Characteristics

•Error and Response Codes

•File / Application Enumeration

Page 19: Web Application Security and Release of "WhiteHat Arsenal"

Spidering

Page 20: Web Application Security and Release of "WhiteHat Arsenal"

Spidering/Site Crawling

Site Map Service Map Documentation Hidden Services CGI's and Forms Email addresses

Page 21: Web Application Security and Release of "WhiteHat Arsenal"

Identifiable Characteristics

Comment LinesURL ExtensionsMeta TagsCookiesClient-Side scripting languages

Enormous wealth of information about process flows, debug command, system types and

configurations.

Page 22: Web Application Security and Release of "WhiteHat Arsenal"

Error and Response Codes

HTTP Response HeadersServer: IBM/Apache 1.3.19

Cookie Characteristics

Error MessagesException Messages (Java / SQL)

404 Error Pages

Failed Login

Locked Account

Database or file non-existent

Page 23: Web Application Security and Release of "WhiteHat Arsenal"

File/Application Enumeration

Commonly referred to as “forced browsing” or “CGI Scanning”.

Page 24: Web Application Security and Release of "WhiteHat Arsenal"

File/Application Enumeration

Sample FilesTemplate DirectoriesTemp or Backup files

Hidden FilesVulnerable CGIs

Page 25: Web Application Security and Release of "WhiteHat Arsenal"

Common Directories

Page 26: Web Application Security and Release of "WhiteHat Arsenal"

Common Log Files

Page 27: Web Application Security and Release of "WhiteHat Arsenal"

Common Backup Files

Page 28: Web Application Security and Release of "WhiteHat Arsenal"

Input/Output Client-Side Data Manipulation

URL Manipulation CGI Parameter Tampering HTTP Client-Header Injection

Filter/Intrusion Detection Evasion

Protocol/Method Manipulation

Overflows

Page 29: Web Application Security and Release of "WhiteHat Arsenal"

Input Manipulation Parameter Tampering

"Twiddling Bits."

•Cross-Site Scripting•Filter-Bypass Manipulation•OS Commands•Meta Characters•Path/Directory Traversal•Hidden Form Field Manipulation•HTTP Headers

Page 30: Web Application Security and Release of "WhiteHat Arsenal"

Cross-Site ScriptingBad name given to a dangerous security issue

Attack targets the user of the system rather than the system itself.

Outside client-side languages executing within the users web environment with the same level of privilege as the hosted site.

Page 31: Web Application Security and Release of "WhiteHat Arsenal"

Client-Side Scripting Languages

DHTML (HTML, XHTML, HTML x.0)Opens all the doors.

JavaScript (1.x) Browser/DOM ManipulationJava (Applets) Malicious AppletsVBScript Browser/DOM ManipulationFlash Dangerous Third-Party InteractivityActiveX Let me count the ways…XML/XSL Another Door OpenerCSS Browser/DOM Manipulation

Page 32: Web Application Security and Release of "WhiteHat Arsenal"

The Scenarios

Trick a user to re-login to a spoofed page

Compromise authentication credentials

Load dangerous of malicious ActiveX

Re-Direct a user or ALL users

Crash the machine or the browser

Page 33: Web Application Security and Release of "WhiteHat Arsenal"

CSS Danger“The Remote Launch Pad.”

Successfully CSS a user via a protected domain.

Utilizing a Client-Side utility (JavaScript, ActiveX,VBScript, etc.), exploit a browser hole to downloada trojan/virus.

User is unknowingly infected/compromised withina single HTTP page load.

ActiveX Netcat Anyone?

Page 34: Web Application Security and Release of "WhiteHat Arsenal"

2 Types of CSS

Click on a link to activate

<A HREF=“http://www.evil_javascript_link”>Click Here</A>

Auto-Execute by viewing HTML

<SCRIPT>run evil JavaScript</SCRIPT>

Page 35: Web Application Security and Release of "WhiteHat Arsenal"

Dangerous HTML“HTML Bad”

<APPLET> Malicious Java Applications<BODY> Altering HTML Page Characteristics<EMBED> Embedding Third-Party Applications (Flash, etc.)<FRAME> Directly calling in other uncontrolled HTML<FRAMESET> Directly calling in other uncontrolled HTML<HTML> Altering HTML Page Characteristics<IFRAME> Directly calling in other uncontrolled HTML<IMG> SCRing Protocol attacks and other abuses<LAYER> Directly calling in other uncontrolled HTML<ILAYER> Directly calling in other uncontrolled HTML<META> META Refreshes. (Client-Redirects)<OBJECT>ActiveX (Nuff Said)<SCRIPT> JavaScript/VBScript Loading<STYLE> Style Sheet and Scripting Alterations

Page 36: Web Application Security and Release of "WhiteHat Arsenal"

Dangerous Attributes“Attributes Bad”

ATTRIBUTE DANGER LIST (Any HTML Tag that has these attributes)

STYLESRC

HREFTYPE

Page 37: Web Application Security and Release of "WhiteHat Arsenal"

Power of the Dots and Slashespiping input to the command line.

Path Directory Traversal

http://foo.com/app.cgi?directory=/path/to/data

DotDot Slash:

http://foo.com/app.cgi?dir=path/to/data../../../../etc/passwd

Dot Slash:

http://foo.com/app.cgi?dir=path/to/data../../../../etc/././passwd

Double DotDot Slash:

http://foo.com/app.cgi?dir=path/to/data....//….//….//etc/passwd

Page 38: Web Application Security and Release of "WhiteHat Arsenal"

More Filter Bypassing

Method Alteration (HEAD, PUT, POST, GET, ect.)

URL Encodehttp://www.foo.com/cgi?value=%46%72%68%86

Null Charactershttp://www.foo.com/cgi?value=file%00.html

More…Alternate Case, Unicode, String Length, Multi-Slash, etc.

Page 39: Web Application Security and Release of "WhiteHat Arsenal"

Authentication & Session Management

Brute/Reverse Force

Session Hi-Jacking

Session Replay

Session Forgoing

Page Sequencing

Page 40: Web Application Security and Release of "WhiteHat Arsenal"

Reporting

XML/HTML Based

Manual Hack Attack Log w/ Descriptor

Common Directory Force Browsing

Common Log File Force Browsing

Backup File Force Browsing

Spider Log

Page 41: Web Application Security and Release of "WhiteHat Arsenal"

Spider XML Log

Page 42: Web Application Security and Release of "WhiteHat Arsenal"

Attempts XML Log

Page 43: Web Application Security and Release of "WhiteHat Arsenal"

A few quick things to help secure a web application.

Do Not Trust Client-Side Data Escape and filter all input/output data Set-up parameter and request method allow lists. Don’t use what your not expecting to receive.

Page 44: Web Application Security and Release of "WhiteHat Arsenal"

Thank You!

Questions?

Jeremiah [email protected]

WhiteHat Security

All presentation updates will be available on

www.whitehatsec.com

and

community.whitehatsec.com


Recommended