25
1 Security Testing: What Can We Do? Hien Trinh Minh Harvey Nash Vietnam

Security testing-What can we do - Trinh Minh Hien

Embed Size (px)

Citation preview

Page 1: Security testing-What can we do - Trinh Minh Hien

1

Security Testing: What Can

We Do?

Hien Trinh Minh

Harvey Nash Vietnam

Page 2: Security testing-What can we do - Trinh Minh Hien

Presenter : Hien Trinh Minh

Background & Work experience:

Harvey Nash Vietnam : Testing Solution Architect More than 2 years of experience in Web Application Security Testing, Mobile Application Security Testing,

security analysis.

More than 12 years of experience in software testing for Telecom application and networking.

More than 7 years of experience in software testing for UMTS : Inter-Operability Test, Functional Network

Element Test, Field testing activities at 3G lab with live network.

Contact info:

[email protected]

2

Page 3: Security testing-What can we do - Trinh Minh Hien

Tech Agenda

• Introduction to Security Testing

• Open Web Application Security Project Top 10

• Security testing on OWASP Web Top 10

• Security Testing Tools

• Demo

3

Page 4: Security testing-What can we do - Trinh Minh Hien

Introduction to Security Testing

4

Security Testing Network Security Testing

Application Security Testing

Web App Security Testing

Mobile App Security Testing

Page 5: Security testing-What can we do - Trinh Minh Hien

Introduction to Security Testing (cont.)

5

• High Risks

– Allows an attacker to read or modify confidential data

belonging to other web sites. If exploited would compromise

data security, potentially allowing access to confidential

data, or could compromise processing resources in a user's

computer.

• Medium Risks

– Allows an attacker to obtain limited amounts of information.

That is limited to a significant degree by factors such as

default configuration, auditing, or is difficult to exploit.

• Low Risks

– Allows an attacker temporary control over non-critical

browser features. That has minimal impact and is extremely

difficult to exploit.

• Information

– Just provide information

High

Medium

Low

Information

Severity

Page 6: Security testing-What can we do - Trinh Minh Hien

OWASP TOP 10

6

Page 7: Security testing-What can we do - Trinh Minh Hien

A1: Injection

7

Page 8: Security testing-What can we do - Trinh Minh Hien

A1: Injection (cont.)

8

Page 9: Security testing-What can we do - Trinh Minh Hien

A2 : Broken Authentication and

Session Management

• Password not hashed/encrypted in

database

• No wrong password limit (Brute

force attack)

• Session id exposed in URL

• No session timeout

• Session id vulnerable to session

fixation.

9

Page 10: Security testing-What can we do - Trinh Minh Hien

A2 : Broken Authentication and

Session Management (cont.)

10

Page 11: Security testing-What can we do - Trinh Minh Hien

A3 : Cross Site Scripting (XSS)

11

Page 12: Security testing-What can we do - Trinh Minh Hien

A3 : Cross Site Scripting- XSS (cont.)

12

Page 13: Security testing-What can we do - Trinh Minh Hien

A4 : Insecure Direct Object References

• A direct object reference occurs when a developer exposes a reference to an

internal implementation object, such as a file, directory, database record, or

key, as a URL or form parameter.

13

Page 14: Security testing-What can we do - Trinh Minh Hien

A4 : Insecure Direct Object

References (cont.)

14

Page 15: Security testing-What can we do - Trinh Minh Hien

A5 : Security Misconfiguration

• Directories are listed and PHPinfo page has been found in this directory

15

Page 16: Security testing-What can we do - Trinh Minh Hien

A6 : Sensitive Data Exposure

16

Examples:

• Transmitting data in the clear text

e.g. non-SSL, URLs, login forms

over http

• Unencrypted credit card info

• Incorrect encryption

• Logging

Page 17: Security testing-What can we do - Trinh Minh Hien

A7 : Missing Function Level Access

Control

• Attacker notices the URL indicates his role

/user/Accounts

• He modifies it to another directory (role) /admin/Accounts

or /manager/Accounts

• Attacker views more accounts than just their own

17

Page 18: Security testing-What can we do - Trinh Minh Hien

A8 : Cross-Site Request Forgery

(CSRF)

18

Page 19: Security testing-What can we do - Trinh Minh Hien

A9 : Using Components with Known

Vulnerabilities

19

Page 20: Security testing-What can we do - Trinh Minh Hien

A10 : Unvalidated Redirects and

Forwards

20

Page 21: Security testing-What can we do - Trinh Minh Hien

Security Testing Tools

21

Page 22: Security testing-What can we do - Trinh Minh Hien

Demo

22

Page 23: Security testing-What can we do - Trinh Minh Hien

References

• https://www.owasp.org

• http://projects.webappsec.org

• http://code.google.com/p/owaspbwa

• https://www.hacking-lab.com/

• http://www.acunetix.com/

• https://portswigger.net/burp/

• https://www.mavensecurity.com/resources/web-security-dojo/

• https://sourceforge.net/projects/samurai/files/

• http://www.bonsai-sec.com/en/research/moth.php

• Books:

The_Basics_of_Hacking_and_Penetration_Testing__Ethical_Hacking_and_Penetration_Testing_Made_

Easy

• -the-web-application-hackers-handbook

• -HowtoBreak

• -Hacking attacks and Examples Test

23

Page 24: Security testing-What can we do - Trinh Minh Hien

Q & A

Page 25: Security testing-What can we do - Trinh Minh Hien

© 2014 HCMC Software Testing Club

THANK YOU