SlideShare a Scribd company logo
Automated Web Foo or FUD? David Kierznowski IT Security Analyst [email_address]
Powered by... http://www.nta-monitor.com
About DK Check Team Leader with UK’s CESG Scheme Senior Security Analyst for a leading penetration testing company in the UK Works in both government and commercial sectors Core member of GNUCITIZEN group Developed a number of open source security tools (i.e. ASP-Auditor, TSF) Founder of BlogSecurity, michaeldaw.org and primary developer of wp-scanner Credited on several major web application vulnerability findings Research featured on Slashdot, eWeek, SecurityFocus and others
Review Current Threats and the Attack Renaissance. Insight into the effectiveness of automated tools. Test less vs test all debate. Hybrid testing with the Technika Security Framework.
Goals Basic understanding of how automated security testing tools are constructed. A greater awareness of the challenges that lie ahead with automated web application tools. An introduction into browser scripting and the Technika Security Framework. A better understanding of how security testing companies approach web application testing. Some suggestions to improve the quality of web application tests.
Current Threats Gartner Group says 90% of web applications have serious vulnerabilities. Symantec says 78% of attacks are at the web application level. Mitre last year stated that application-level attacks, such as XSS and SQLI, are replacing buffer overflows as the favourite hacker initiative. OSI Network Suite
Attack Renaissance Traditional vulnerabilities target the server New age attacks target the client - XSS as the catalyst
Find Less vs Find All Find all approach Try locate and report all vulnerabilities Find less approach   Locate less and report the cause of the problem
Simple Automation Target & Virtual Hosts > Spider & Locate > Sort &Unique > Identify > Test > Result > Report
Auto Limitations “find all” Script Parsing Business and/or application logic False Negatives/Positives Non-RFC applications State or flow  Challenge-Response Cost Custom URLs Training Denial of Service risks
Manual Limitations "Find less approach" Time Emotional stability Skill level Find less approach
The Auto-Worth Model (F + BA + T) * R = AW F low (state)  B usiness/ A pplication Logic T echnology (i.e. Flash) R ole of web application
A Couple Suggestions Define clearly the purpose and role of the application to be tested Use the Auto-Worth Model as a base Manual security testers should follow a testing procedure A hybrid approach may be best
Technika Automated Browser Exploitation Tool  and  Browser Scripting Tool
Technika – Write Script Snippet from tech.store for persistent storage   tech.store.pop = function(_sarray, key) { var _l = _sarray.length; for (i=0; i<_l; i++) { var _key = key + i; sessionStorage.removeItem(_key, _sarray[i]); } console.log(_sarray.length + &quot; records removed.&quot;); };
Technika – Save as bookmarklet
Technika Security Framework tech.dspider  - DOM link spider; because we utilize the DOM, the results are instant.  tech.forms  - GET/POST form parser.  tech.mutate  - By specifying a payload and regex, we can mutate our target arrays and build tests.  tech.scan  - tech.scan is our actual engine that will handle our GET and POST requests.  tech.mNikto  - Mini-Nikto was named after the popular web application tool Nikto if you haven’t already guessed. We called it mini-nikto as it currently only contains a very small database.  tech.explorer  - This is one of my favorite tools in the TS framework. It uses Yahoo! AJAX API (JSON) to fetch links and perform other Google hacking type queries outside of our current DOM. This is really useful even when it is not security related.  tech.store  - Utilizes the Firefox sessionStorage to allow us to persistently store arrays.  And much MORE!!
Technika Security Framework Technika demo video placeholder and tool introduction.
Summary The application layer is enemy number 1! Increased attacks in the future due to the Attack Renaissance Remember the Auto-Worth model in planning and even during the web application testing process. The hybrid approach will almost always present the best results. We hope to start developing Technika to a semi-stable state, but its definitely a project to start getting involved in.
Credits and Refs Credits: GNUCITIZEN GROUP –  http://gnucitizen.org NTA-Monitor –  http://www.nta-monitor.com Refs: Robert Auger -  http://www.cgisecurity.com/articles/scannerchallenges.shtml Technika -  http://www.gnucitizen.org/projects/technika/ Technika Security Framework -  http://www.gnucitizen.org/blog/introducing-technika-security-framework/ Jeremiah Grossman – Challenges of Web Application Testing

More Related Content

PDF
Manual Code Review
n|u - The Open Security Community
 
PPTX
Static analysis for security
Fadi Abdulwahab
 
PDF
Protection and Verification of Security Design Flaws
Hdiv Security
 
PDF
SAST vs. DAST: What’s the Best Method For Application Security Testing?
Cigital
 
PPT
Owasp Code Crawler Presentation
alessiomarziali
 
PDF
Threat-Modeling-as-Code: ThreatPlaybook AppSecUSA 2018 Presentation
Abhay Bhargav
 
PPTX
Making Security Agile
Oleg Gryb
 
PDF
Making DevSecOps a Reality in your Spring Applications
Hdiv Security
 
Static analysis for security
Fadi Abdulwahab
 
Protection and Verification of Security Design Flaws
Hdiv Security
 
SAST vs. DAST: What’s the Best Method For Application Security Testing?
Cigital
 
Owasp Code Crawler Presentation
alessiomarziali
 
Threat-Modeling-as-Code: ThreatPlaybook AppSecUSA 2018 Presentation
Abhay Bhargav
 
Making Security Agile
Oleg Gryb
 
Making DevSecOps a Reality in your Spring Applications
Hdiv Security
 

What's hot (17)

PPT
Agnitio: its static analysis, but not as we know it
Security BSides London
 
PDF
Static code analysis
Prancer Io
 
PDF
Innovating Faster with Continuous Application Security
Jeff Williams
 
PPTX
Product Security
Steven Carlson
 
PPTX
Application Security at DevOps Speed and Portfolio Scale
Jeff Williams
 
PPTX
What Good is this Tool? A Guide to Choosing the Right Application Security Te...
Kevin Fealey
 
PPT
Cost effective web application testing
Harinath Pudipeddi
 
PPTX
2017-11 Three Ways of Security - OWASP London
Jeff Williams
 
PDF
5 Important Secure Coding Practices
Thomas Kurian Ambattu,CRISC,ISLA-2011 (ISC)²
 
PDF
Improving the quality of Cyber Security Hires via Pre-Interview Challenges
Dinis Cruz
 
PPTX
Agile and Secure Development
Nazar Tymoshyk, CEH, Ph.D.
 
PDF
Videos about static code analysis
PVS-Studio
 
PDF
Pactera - App Security Assessment - Mobile, Web App, IoT - v2
Kyle Lai
 
PPTX
Security as a new metric for Business, Product and Development Lifecycle
Nazar Tymoshyk, CEH, Ph.D.
 
PDF
Using threat models to control project brief
Dinis Cruz
 
PPTX
Automating Web Applications Security Assessments Through Scanners
nfteodoro
 
PDF
On the Static Analysis of Hybrid Mobile Apps: A Report on the State of Apache...
Achim D. Brucker
 
Agnitio: its static analysis, but not as we know it
Security BSides London
 
Static code analysis
Prancer Io
 
Innovating Faster with Continuous Application Security
Jeff Williams
 
Product Security
Steven Carlson
 
Application Security at DevOps Speed and Portfolio Scale
Jeff Williams
 
What Good is this Tool? A Guide to Choosing the Right Application Security Te...
Kevin Fealey
 
Cost effective web application testing
Harinath Pudipeddi
 
2017-11 Three Ways of Security - OWASP London
Jeff Williams
 
5 Important Secure Coding Practices
Thomas Kurian Ambattu,CRISC,ISLA-2011 (ISC)²
 
Improving the quality of Cyber Security Hires via Pre-Interview Challenges
Dinis Cruz
 
Agile and Secure Development
Nazar Tymoshyk, CEH, Ph.D.
 
Videos about static code analysis
PVS-Studio
 
Pactera - App Security Assessment - Mobile, Web App, IoT - v2
Kyle Lai
 
Security as a new metric for Business, Product and Development Lifecycle
Nazar Tymoshyk, CEH, Ph.D.
 
Using threat models to control project brief
Dinis Cruz
 
Automating Web Applications Security Assessments Through Scanners
nfteodoro
 
On the Static Analysis of Hybrid Mobile Apps: A Report on the State of Apache...
Achim D. Brucker
 
Ad

Similar to GNUCITIZEN Dwk Owasp Day September 2007 (20)

PDF
[Russia] Bugs -> max, time &lt;= T
OWASP EEE
 
PPTX
Pentesting Tips: Beyond Automated Testing
Andrew McNicol
 
PPTX
Find maximum bugs in limited time
beched
 
PDF
CNIT 129S: Ch 4: Mapping the Application
Sam Bowne
 
PPT
Web 2.0 Hacking
blake101
 
PPTX
Web application Security tools
Nico Penaredondo
 
PDF
DEF CON 23 - BRENT - white hacking web apps wp
Felipe Prado
 
PPTX
Web application vulnerability assessment
Ravikumar Paghdal
 
DOC
Semi-Automated Security Testing of Web applications
Ram G Athreya
 
PPT
Hacking Web 2.0 - Defending Ajax and Web Services [HITB 2007 Dubai]
Shreeraj Shah
 
PPTX
DEF CON 23 - Hacking Web Apps @brentwdesign
brentwdesign
 
PDF
ProActive Security
Ibnisina Sina
 
PDF
ProActive Security
Ibnisina Sina
 
PDF
Evil testers guide to technical testing
Alan Richardson
 
PPT
Hacking web applications
Adeel Javaid
 
PPTX
Application security in a hurry webinar
kdinerman
 
ODP
How to Improve Your Technical Test Ability - AADays 2015 Keynote
Alan Richardson
 
PDF
Web Applications Assessment Tools: Comparison and Discussion
EECJOURNAL
 
PDF
4 Mapping the Application
Sam Bowne
 
[Russia] Bugs -> max, time &lt;= T
OWASP EEE
 
Pentesting Tips: Beyond Automated Testing
Andrew McNicol
 
Find maximum bugs in limited time
beched
 
CNIT 129S: Ch 4: Mapping the Application
Sam Bowne
 
Web 2.0 Hacking
blake101
 
Web application Security tools
Nico Penaredondo
 
DEF CON 23 - BRENT - white hacking web apps wp
Felipe Prado
 
Web application vulnerability assessment
Ravikumar Paghdal
 
Semi-Automated Security Testing of Web applications
Ram G Athreya
 
Hacking Web 2.0 - Defending Ajax and Web Services [HITB 2007 Dubai]
Shreeraj Shah
 
DEF CON 23 - Hacking Web Apps @brentwdesign
brentwdesign
 
ProActive Security
Ibnisina Sina
 
ProActive Security
Ibnisina Sina
 
Evil testers guide to technical testing
Alan Richardson
 
Hacking web applications
Adeel Javaid
 
Application security in a hurry webinar
kdinerman
 
How to Improve Your Technical Test Ability - AADays 2015 Keynote
Alan Richardson
 
Web Applications Assessment Tools: Comparison and Discussion
EECJOURNAL
 
4 Mapping the Application
Sam Bowne
 
Ad

Recently uploaded (20)

PDF
The Future of Mobile Is Context-Aware—Are You Ready?
iProgrammer Solutions Private Limited
 
PDF
Automating ArcGIS Content Discovery with FME: A Real World Use Case
Safe Software
 
PDF
AI Unleashed - Shaping the Future -Starting Today - AIOUG Yatra 2025 - For Co...
Sandesh Rao
 
PDF
A Strategic Analysis of the MVNO Wave in Emerging Markets.pdf
IPLOOK Networks
 
PDF
Structs to JSON: How Go Powers REST APIs
Emily Achieng
 
PDF
Security features in Dell, HP, and Lenovo PC systems: A research-based compar...
Principled Technologies
 
PDF
Trying to figure out MCP by actually building an app from scratch with open s...
Julien SIMON
 
PPTX
AI in Daily Life: How Artificial Intelligence Helps Us Every Day
vanshrpatil7
 
PDF
Using Anchore and DefectDojo to Stand Up Your DevSecOps Function
Anchore
 
PDF
Get More from Fiori Automation - What’s New, What Works, and What’s Next.pdf
Precisely
 
PDF
Doc9.....................................
SofiaCollazos
 
PDF
BLW VOCATIONAL TRAINING SUMMER INTERNSHIP REPORT
codernjn73
 
PPTX
The-Ethical-Hackers-Imperative-Safeguarding-the-Digital-Frontier.pptx
sujalchauhan1305
 
PDF
Advances in Ultra High Voltage (UHV) Transmission and Distribution Systems.pdf
Nabajyoti Banik
 
PDF
The Evolution of KM Roles (Presented at Knowledge Summit Dublin 2025)
Enterprise Knowledge
 
PDF
Economic Impact of Data Centres to the Malaysian Economy
flintglobalapac
 
PPTX
Dev Dives: Automate, test, and deploy in one place—with Unified Developer Exp...
AndreeaTom
 
PDF
Tea4chat - another LLM Project by Kerem Atam
a0m0rajab1
 
PPTX
Applied-Statistics-Mastering-Data-Driven-Decisions.pptx
parmaryashparmaryash
 
PDF
AI-Cloud-Business-Management-Platforms-The-Key-to-Efficiency-Growth.pdf
Artjoker Software Development Company
 
The Future of Mobile Is Context-Aware—Are You Ready?
iProgrammer Solutions Private Limited
 
Automating ArcGIS Content Discovery with FME: A Real World Use Case
Safe Software
 
AI Unleashed - Shaping the Future -Starting Today - AIOUG Yatra 2025 - For Co...
Sandesh Rao
 
A Strategic Analysis of the MVNO Wave in Emerging Markets.pdf
IPLOOK Networks
 
Structs to JSON: How Go Powers REST APIs
Emily Achieng
 
Security features in Dell, HP, and Lenovo PC systems: A research-based compar...
Principled Technologies
 
Trying to figure out MCP by actually building an app from scratch with open s...
Julien SIMON
 
AI in Daily Life: How Artificial Intelligence Helps Us Every Day
vanshrpatil7
 
Using Anchore and DefectDojo to Stand Up Your DevSecOps Function
Anchore
 
Get More from Fiori Automation - What’s New, What Works, and What’s Next.pdf
Precisely
 
Doc9.....................................
SofiaCollazos
 
BLW VOCATIONAL TRAINING SUMMER INTERNSHIP REPORT
codernjn73
 
The-Ethical-Hackers-Imperative-Safeguarding-the-Digital-Frontier.pptx
sujalchauhan1305
 
Advances in Ultra High Voltage (UHV) Transmission and Distribution Systems.pdf
Nabajyoti Banik
 
The Evolution of KM Roles (Presented at Knowledge Summit Dublin 2025)
Enterprise Knowledge
 
Economic Impact of Data Centres to the Malaysian Economy
flintglobalapac
 
Dev Dives: Automate, test, and deploy in one place—with Unified Developer Exp...
AndreeaTom
 
Tea4chat - another LLM Project by Kerem Atam
a0m0rajab1
 
Applied-Statistics-Mastering-Data-Driven-Decisions.pptx
parmaryashparmaryash
 
AI-Cloud-Business-Management-Platforms-The-Key-to-Efficiency-Growth.pdf
Artjoker Software Development Company
 

GNUCITIZEN Dwk Owasp Day September 2007

  • 1. Automated Web Foo or FUD? David Kierznowski IT Security Analyst [email_address]
  • 3. About DK Check Team Leader with UK’s CESG Scheme Senior Security Analyst for a leading penetration testing company in the UK Works in both government and commercial sectors Core member of GNUCITIZEN group Developed a number of open source security tools (i.e. ASP-Auditor, TSF) Founder of BlogSecurity, michaeldaw.org and primary developer of wp-scanner Credited on several major web application vulnerability findings Research featured on Slashdot, eWeek, SecurityFocus and others
  • 4. Review Current Threats and the Attack Renaissance. Insight into the effectiveness of automated tools. Test less vs test all debate. Hybrid testing with the Technika Security Framework.
  • 5. Goals Basic understanding of how automated security testing tools are constructed. A greater awareness of the challenges that lie ahead with automated web application tools. An introduction into browser scripting and the Technika Security Framework. A better understanding of how security testing companies approach web application testing. Some suggestions to improve the quality of web application tests.
  • 6. Current Threats Gartner Group says 90% of web applications have serious vulnerabilities. Symantec says 78% of attacks are at the web application level. Mitre last year stated that application-level attacks, such as XSS and SQLI, are replacing buffer overflows as the favourite hacker initiative. OSI Network Suite
  • 7. Attack Renaissance Traditional vulnerabilities target the server New age attacks target the client - XSS as the catalyst
  • 8. Find Less vs Find All Find all approach Try locate and report all vulnerabilities Find less approach Locate less and report the cause of the problem
  • 9. Simple Automation Target & Virtual Hosts > Spider & Locate > Sort &Unique > Identify > Test > Result > Report
  • 10. Auto Limitations “find all” Script Parsing Business and/or application logic False Negatives/Positives Non-RFC applications State or flow Challenge-Response Cost Custom URLs Training Denial of Service risks
  • 11. Manual Limitations &quot;Find less approach&quot; Time Emotional stability Skill level Find less approach
  • 12. The Auto-Worth Model (F + BA + T) * R = AW F low (state) B usiness/ A pplication Logic T echnology (i.e. Flash) R ole of web application
  • 13. A Couple Suggestions Define clearly the purpose and role of the application to be tested Use the Auto-Worth Model as a base Manual security testers should follow a testing procedure A hybrid approach may be best
  • 14. Technika Automated Browser Exploitation Tool and Browser Scripting Tool
  • 15. Technika – Write Script Snippet from tech.store for persistent storage tech.store.pop = function(_sarray, key) { var _l = _sarray.length; for (i=0; i<_l; i++) { var _key = key + i; sessionStorage.removeItem(_key, _sarray[i]); } console.log(_sarray.length + &quot; records removed.&quot;); };
  • 16. Technika – Save as bookmarklet
  • 17. Technika Security Framework tech.dspider - DOM link spider; because we utilize the DOM, the results are instant. tech.forms - GET/POST form parser. tech.mutate - By specifying a payload and regex, we can mutate our target arrays and build tests. tech.scan - tech.scan is our actual engine that will handle our GET and POST requests. tech.mNikto - Mini-Nikto was named after the popular web application tool Nikto if you haven’t already guessed. We called it mini-nikto as it currently only contains a very small database. tech.explorer - This is one of my favorite tools in the TS framework. It uses Yahoo! AJAX API (JSON) to fetch links and perform other Google hacking type queries outside of our current DOM. This is really useful even when it is not security related. tech.store - Utilizes the Firefox sessionStorage to allow us to persistently store arrays. And much MORE!!
  • 18. Technika Security Framework Technika demo video placeholder and tool introduction.
  • 19. Summary The application layer is enemy number 1! Increased attacks in the future due to the Attack Renaissance Remember the Auto-Worth model in planning and even during the web application testing process. The hybrid approach will almost always present the best results. We hope to start developing Technika to a semi-stable state, but its definitely a project to start getting involved in.
  • 20. Credits and Refs Credits: GNUCITIZEN GROUP – http://gnucitizen.org NTA-Monitor – http://www.nta-monitor.com Refs: Robert Auger - http://www.cgisecurity.com/articles/scannerchallenges.shtml Technika - http://www.gnucitizen.org/projects/technika/ Technika Security Framework - http://www.gnucitizen.org/blog/introducing-technika-security-framework/ Jeremiah Grossman – Challenges of Web Application Testing