30
Top 5 Things a Security Researcher Looks for When Attacking an App Robert Kugler

Researcher Looks for When Attacking an App Top 5 Things a ... · Top 5 Things a Security Researcher Looks for When Attacking an App Robert Kugler

  • Upload
    others

  • View
    2

  • Download
    0

Embed Size (px)

Citation preview

Page 1: Researcher Looks for When Attacking an App Top 5 Things a ... · Top 5 Things a Security Researcher Looks for When Attacking an App Robert Kugler

Top 5 Things a Security Researcher Looks for When Attacking an App

Robert Kugler

Page 2: Researcher Looks for When Attacking an App Top 5 Things a ... · Top 5 Things a Security Researcher Looks for When Attacking an App Robert Kugler

About me● Ethical hacker

● Penetration tester

● Data Protection consultant

● Speaker + Human rights activist

EXPECTATION...

REALITY...

Page 3: Researcher Looks for When Attacking an App Top 5 Things a ... · Top 5 Things a Security Researcher Looks for When Attacking an App Robert Kugler

1. Injections

2. Broken Authentication 4. XML External Entities

3. Sensitive Data Exposure 5. Broken Access Control

6. Bonus

Page 4: Researcher Looks for When Attacking an App Top 5 Things a ... · Top 5 Things a Security Researcher Looks for When Attacking an App Robert Kugler

What is it?How to look for it?

What’s the impact?

Page 5: Researcher Looks for When Attacking an App Top 5 Things a ... · Top 5 Things a Security Researcher Looks for When Attacking an App Robert Kugler

1. Injections

Page 6: Researcher Looks for When Attacking an App Top 5 Things a ... · Top 5 Things a Security Researcher Looks for When Attacking an App Robert Kugler

What is it?

Insecurely crafted database queries or OS commands mishandling user input

Page 7: Researcher Looks for When Attacking an App Top 5 Things a ... · Top 5 Things a Security Researcher Looks for When Attacking an App Robert Kugler

How to look for it?

● Fuzz the application using automated scanners & manual analysis

● Check common vulnerable parameters e.g. $id, $username, $password

● Don’t forget cookie values or HTTP headers!

Page 8: Researcher Looks for When Attacking an App Top 5 Things a ... · Top 5 Things a Security Researcher Looks for When Attacking an App Robert Kugler

What’s the impact?

● Worst-case: Remote Code Execution○

● Best-case: Data loss○

Page 9: Researcher Looks for When Attacking an App Top 5 Things a ... · Top 5 Things a Security Researcher Looks for When Attacking an App Robert Kugler

2. Broken Authentication

Page 10: Researcher Looks for When Attacking an App Top 5 Things a ... · Top 5 Things a Security Researcher Looks for When Attacking an App Robert Kugler

What is it?

● Weak authentication and session management

Page 11: Researcher Looks for When Attacking an App Top 5 Things a ... · Top 5 Things a Security Researcher Looks for When Attacking an App Robert Kugler

How to look for it?

● Check for default credentials, 2FA, session fixation, session timeouts, bruteforce protections, JWT & OAuth weaknesses

● Look for predictable password reset / confirmation tokens, lifetime of tokens

Page 12: Researcher Looks for When Attacking an App Top 5 Things a ... · Top 5 Things a Security Researcher Looks for When Attacking an App Robert Kugler

What’s the impact?

● Worst-case: Data loss or privilege escalation○

● Best-case: Targeted account takeover e.g. a 2FA bypass○

Page 13: Researcher Looks for When Attacking an App Top 5 Things a ... · Top 5 Things a Security Researcher Looks for When Attacking an App Robert Kugler

3. Sensitive Data Exposure

Page 14: Researcher Looks for When Attacking an App Top 5 Things a ... · Top 5 Things a Security Researcher Looks for When Attacking an App Robert Kugler

What is it?

● Sensitive data is leaked to third parties

Page 15: Researcher Looks for When Attacking an App Top 5 Things a ... · Top 5 Things a Security Researcher Looks for When Attacking an App Robert Kugler

How to look for it?

● Check for sensitive data transmitted over unencrypted channels or GET requests, vulnerable TLS ciphers, plain text password storage, leaks of tokens through the referrer, unencrypted backups

testssl.sh (command-line)

Page 16: Researcher Looks for When Attacking an App Top 5 Things a ... · Top 5 Things a Security Researcher Looks for When Attacking an App Robert Kugler

What’s the impact?

● Worst-case: Privilege escalation with stolen credentials

● Best-case: Targeted data loss e.g. losing confidentiality of communications○

Page 17: Researcher Looks for When Attacking an App Top 5 Things a ... · Top 5 Things a Security Researcher Looks for When Attacking an App Robert Kugler

4. XML External Entities

Page 18: Researcher Looks for When Attacking an App Top 5 Things a ... · Top 5 Things a Security Researcher Looks for When Attacking an App Robert Kugler

What is it?

● Vulnerable XML parser processes XML external entities and DTDs

Page 19: Researcher Looks for When Attacking an App Top 5 Things a ... · Top 5 Things a Security Researcher Looks for When Attacking an App Robert Kugler

How to look for it?

● Inject external entities in XML payloads and measure response times

● Switch the Content-Type to see if you can find deprecated XML parsers

Page 20: Researcher Looks for When Attacking an App Top 5 Things a ... · Top 5 Things a Security Researcher Looks for When Attacking an App Robert Kugler

What’s the impact?

● Worst-case: Remote Code Execution○

● Best-case: Data loss○

Page 21: Researcher Looks for When Attacking an App Top 5 Things a ... · Top 5 Things a Security Researcher Looks for When Attacking an App Robert Kugler

5. Broken Access Control

Page 22: Researcher Looks for When Attacking an App Top 5 Things a ... · Top 5 Things a Security Researcher Looks for When Attacking an App Robert Kugler

What is it?

● Unauthorized users are able to access sensitive data, mainly a API issue.

Page 23: Researcher Looks for When Attacking an App Top 5 Things a ... · Top 5 Things a Security Researcher Looks for When Attacking an App Robert Kugler

How to look for it?

● Check for CORS misconfigurations, insecure direct object references (IDORs), privilege escalation through different roles inside the application

Page 24: Researcher Looks for When Attacking an App Top 5 Things a ... · Top 5 Things a Security Researcher Looks for When Attacking an App Robert Kugler

What’s the impact?

● Worst-case: Data loss○

● Best-case: Privilege escalation or account takeover○

Page 25: Researcher Looks for When Attacking an App Top 5 Things a ... · Top 5 Things a Security Researcher Looks for When Attacking an App Robert Kugler

Bonus: Server-Side Request Forgery

Page 26: Researcher Looks for When Attacking an App Top 5 Things a ... · Top 5 Things a Security Researcher Looks for When Attacking an App Robert Kugler

What is it?

● An attacker is able to send a crafted request from a vulnerable web application

Page 27: Researcher Looks for When Attacking an App Top 5 Things a ... · Top 5 Things a Security Researcher Looks for When Attacking an App Robert Kugler

How to look for it?

● Check common vulnerable endpoints e.g. webhooks, embed videos or pictures

● Make requests to localhost, 127.0.0.1 or use domains pointing to it

● Measure response times, if you don’t have access to the response data

Page 28: Researcher Looks for When Attacking an App Top 5 Things a ... · Top 5 Things a Security Researcher Looks for When Attacking an App Robert Kugler

What’s the impact?

● Worst-case: Remote Code Execution○

● Best-case: Access to the internal company network○

Page 29: Researcher Looks for When Attacking an App Top 5 Things a ... · Top 5 Things a Security Researcher Looks for When Attacking an App Robert Kugler

Summary

● Flaws trivial to exploit● Data loss always involved● Manual testing required

Page 30: Researcher Looks for When Attacking an App Top 5 Things a ... · Top 5 Things a Security Researcher Looks for When Attacking an App Robert Kugler

Thanks for Listening!

Any Questions?

Robert [email protected]