SlideShare a Scribd company logo
Demystify Web application Security
with attack surface visibility
Simon Roe and John Stock, Outpost24
27th January 2021
Helping customers improve security posture since 2001
Full stack security assessment
Over 2,000 customers in all regions of the world
Complete Application security for DevSecOps
Crest certificated penetration testing.
The problem
3
Why should you care
4
5
• Pen testing, DAST scanning,
SAST, SCA, IAST
• DevSecOps
• WAF, RASP
• So many buzz words, different
products,
• Where do we start
Overwhelming choice
6
• What you know (your Ecommerce system)
• What you don’t know
• IOT devices
• Benefits
• Marketing campaigns
• Acquisitions
• Other 3rd party sites (employee
benefits)
• These make up your addressable attack
surface
How to identify your application attack
surface score
Retail analysis – An example
7
8
• Assess each application using
OSINT techniques to identity
potential areas of risk.
• We’ll look at the how and why
next
Then What
Mapping your application attack surface
John Stock
9
10
• Basic understanding of the web
application
• Don’t need to understand DEVOPS or
be an Appsec Guru
• Mostly what we would call ‘Basic
security best practice’
Where to start…
11
• Basic understanding of the web application
• Don’t need to understand DEVOPS or be an
Appsec Guru
• Mostly what we would call ‘Basic security best
practice’
• Available tools include:
• Maltego
• theHarvester
• ShodanHQ
• But as its out site, we can also just use the
most powerful tool available… A web browser!
What tools do I need?
Security Mechanism
Two main things to consider
• Use of TLS
• Is there any input validation?
12
13
How was the page created?
• Static HTTP
• Or dynamic content, eg PHP,
ASP, JSP…
Page Creation Method
Degree of Distribution
• Cross domain is always harder to
secure
• The greater the number of second
level and sub domains, the higher
the risk
14
15
• Is there authentication?
• Is it email & password?
• Any signs of 2FA?
Authentication
Input Vectors
How many opportunities are there for
data input?
• Forms
• Hidden parameters
• URL parameters
• Search
16
Active Content
• JavaScript, external JavaScript,
Server Side Scripting, AJAX,
Java, Flash, External Flash, RSS
feed…… Oh boy!
• Does it make use of a plugin or
helper app? Active!
17
18
Everyone loves cookies!
• Number of cookies
• both external (foreign)
• internal (local)
• Type of cookie:
• Tracking
• Session Management
• Authentication
Cookies
Scoring your attack surface and beyond
19
• Turn those attack vectors into
scores
20
Scoring your application attack surface
SM PCM DOD AUT IV ACT CS
9.95 100 91.18 33.33 29.04 100 0
Translate scores to a visual Attack surface summary
21
0.00
0.20
0.40
0.60
0.80
1.00
V1: Security
Mechanisms
V2: Page Creation
Method
V3: Degree of
Distribution
V4:
Authentication
V5: Input Vectors
V6: Active
Content
V7: Cookies
Attack Surface Radar
AS Score: 33.48 of 42.19
Overall Application attack surface score card
jQuery 1.12.4
jQuery Migrate 1.4.1
PHP/5.6.40
Apache/2.4.6
Findings:
Scope: www.Outpost24.com AS Score: 39. 16 of 42.00
SM PCM DOD AUT IV ACT CS
9.95 100 91.18 33.33 29.04 100 0
Alexa Ranking:
#413,480 in global internet engagement
Vulnerable
Vulnerable
WordPress 5.2.6
DOS, Vulnerable
Vulnerable
OK
Over the past 90 days
0.00
0.20
0.40
0.60
0.80
1.00
V1: Security
Mechanisms
V2: Page Creation
Method
V3: Degree of
Distribution
V4:
Authentication
V5: Input Vectors
V6: Active
Content
V7: Cookies
Attack Surface Radar
<- Screenshot of app
Leads to informed choice of tools
• Make informed choices about tools, solutions and services
• Critical applications : Continuous hybrid application testing
• Less critical : DAST scanning + one time penetration test
• Identify IOT devices, turn off access or block with firewall
• Start to inform development decisions
• SCA for 3rd party components
• SAST or IAT for code improvements
• Build a continuous application security assessment program
23
Adopt a continuous approach to application security
24
Takeaways
• Applications continues to be a prime vector for breaches.
• Measuring the right attack vectors gives you a comprehensive
view of an applications attack surface
• This in turn gives you a sense of the risk the application poses
• Using this information can help drive your application security
program (ASP)
• Your ASP should be dynamic and continuous, not one time
and done
25
Simon Roe, sro@outpost24.com
John Stock, js@outpost24.com
Let’s start an application security program today!

More Related Content

What's hot (19)

PPTX
Web Application Vulnerabilities
Preetish Panda
 
PPTX
Owasp top 10 2017
ibrahimumer2
 
PDF
OISC 2019 - The OWASP Top 10 & AppSec Primer
ThreatReel Podcast
 
PPTX
How to Test for The OWASP Top Ten
Security Innovation
 
PDF
OWASP Top Ten in Practice
Security Innovation
 
PPTX
OWASP Mobile TOP 10 2014
Islam Azeddine Mennouchi
 
PDF
OWASP Top 10 - The Ten Most Critical Web Application Security Risks
All Things Open
 
PPTX
Owasp mobile top 10
Pawel Rzepa
 
PDF
Introduction to Security Testing
vodQA
 
PDF
Understanding The Known: OWASP A9 Using Components With Known Vulnerabilities
Anant Shrivastava
 
PDF
Client-Side Penetration Testing Presentation
Chris Gates
 
PPTX
Modernizing, Migrating & Mitigating - Moving to Modern Cloud & API Web Apps W...
Security Innovation
 
PDF
Web Application Security 101 - 03 Web Security Toolkit
Websecurify
 
PPTX
Security Testing for Web Application
Precise Testing Solution
 
PPSX
Scaling-up and Automating Web Application Security Tech Talk
Netsparker
 
PDF
Testing Web Application Security
Ted Husted
 
PPTX
OWASP Top 10 2017 - New Vulnerabilities
Dilum Bandara
 
PDF
Owasp Mobile Top 10 – 2014
n|u - The Open Security Community
 
PDF
The New OWASP Top Ten: Let's Cut to the Chase
Security Innovation
 
Web Application Vulnerabilities
Preetish Panda
 
Owasp top 10 2017
ibrahimumer2
 
OISC 2019 - The OWASP Top 10 & AppSec Primer
ThreatReel Podcast
 
How to Test for The OWASP Top Ten
Security Innovation
 
OWASP Top Ten in Practice
Security Innovation
 
OWASP Mobile TOP 10 2014
Islam Azeddine Mennouchi
 
OWASP Top 10 - The Ten Most Critical Web Application Security Risks
All Things Open
 
Owasp mobile top 10
Pawel Rzepa
 
Introduction to Security Testing
vodQA
 
Understanding The Known: OWASP A9 Using Components With Known Vulnerabilities
Anant Shrivastava
 
Client-Side Penetration Testing Presentation
Chris Gates
 
Modernizing, Migrating & Mitigating - Moving to Modern Cloud & API Web Apps W...
Security Innovation
 
Web Application Security 101 - 03 Web Security Toolkit
Websecurify
 
Security Testing for Web Application
Precise Testing Solution
 
Scaling-up and Automating Web Application Security Tech Talk
Netsparker
 
Testing Web Application Security
Ted Husted
 
OWASP Top 10 2017 - New Vulnerabilities
Dilum Bandara
 
Owasp Mobile Top 10 – 2014
n|u - The Open Security Community
 
The New OWASP Top Ten: Let's Cut to the Chase
Security Innovation
 

Similar to Outpost24 webinar - Demystifying Web Application Security with Attack Surface Visibility (20)

PDF
Software Security Assurance for DevOps
Black Duck by Synopsys
 
PDF
AppSec in an Agile World
David Lindner
 
PPTX
Why Johnny Still Can’t Pentest: A Comparative Analysis of Open-source Black-...
Rana Khalil
 
PDF
What Every Developer And Tester Should Know About Software Security
Anne Oikarinen
 
PPTX
Evaluating Web App, Mobile App, and API Security - Matt Cohen
Inman News
 
PPTX
Tune in for the Ultimate WAF Torture Test: Bots Attack!
Distil Networks
 
PPTX
Outpost24 webinar - Understanding the 7 deadly web application attack vectors
Outpost24
 
PPTX
For Business's Sake, Let's focus on AppSec
Lalit Kale
 
PDF
Web App Security Presentation by Ryan Holland - 05-31-2017
TriNimbus
 
PPTX
SELJE - VFP and IT Security.pptx
Eric Selje
 
PPTX
Web application vulnerability assessment
Ravikumar Paghdal
 
PPTX
Introduction to Web Application Penetration Testing
Rana Khalil
 
PPT
IBM AppScan - the total software security solution
hearme limited company
 
PPTX
Build Security into the Software with Sparrow
Jason Sohn
 
PDF
Complete Endpoint protection
xband
 
PDF
Solvay secure application layer v2015 seba
Sebastien Deleersnyder
 
PDF
Jonathan Singer - Wheezing The Juice.pdf
Jonathan Singer
 
PDF
Cybersecurity update 12
Jim Kaplan CIA CFE
 
PDF
Software Analytics: Data Analytics for Software Engineering and Security
Tao Xie
 
PPTX
Software Security Assurance for DevOps - Hewlett Packard Enterprise + Black Duck
Black Duck by Synopsys
 
Software Security Assurance for DevOps
Black Duck by Synopsys
 
AppSec in an Agile World
David Lindner
 
Why Johnny Still Can’t Pentest: A Comparative Analysis of Open-source Black-...
Rana Khalil
 
What Every Developer And Tester Should Know About Software Security
Anne Oikarinen
 
Evaluating Web App, Mobile App, and API Security - Matt Cohen
Inman News
 
Tune in for the Ultimate WAF Torture Test: Bots Attack!
Distil Networks
 
Outpost24 webinar - Understanding the 7 deadly web application attack vectors
Outpost24
 
For Business's Sake, Let's focus on AppSec
Lalit Kale
 
Web App Security Presentation by Ryan Holland - 05-31-2017
TriNimbus
 
SELJE - VFP and IT Security.pptx
Eric Selje
 
Web application vulnerability assessment
Ravikumar Paghdal
 
Introduction to Web Application Penetration Testing
Rana Khalil
 
IBM AppScan - the total software security solution
hearme limited company
 
Build Security into the Software with Sparrow
Jason Sohn
 
Complete Endpoint protection
xband
 
Solvay secure application layer v2015 seba
Sebastien Deleersnyder
 
Jonathan Singer - Wheezing The Juice.pdf
Jonathan Singer
 
Cybersecurity update 12
Jim Kaplan CIA CFE
 
Software Analytics: Data Analytics for Software Engineering and Security
Tao Xie
 
Software Security Assurance for DevOps - Hewlett Packard Enterprise + Black Duck
Black Duck by Synopsys
 
Ad

More from Outpost24 (20)

PPTX
Outpost24 webinar - A fresh look into the underground card shop ecosystem
Outpost24
 
PDF
Outpost24 webinar Why API security matters and how to get it right.pdf
Outpost24
 
PPTX
Outpost24 webinar - The new CISO imperative: connecting technical vulnerabili...
Outpost24
 
PPTX
Outpost24 Webinar - Five steps to build a killer Application Security Program
Outpost24
 
PPTX
Outpost24 webinar - How to protect your organization from credential theft
Outpost24
 
PPTX
Outpost24 webinar : Beating hackers at their own game 2022 predictions
Outpost24
 
PPTX
Outpost24 webinar - Enhance user security to stop the cyber-attack cycle
Outpost24
 
PDF
Outpost24 webinar - Mapping Vulnerabilities with the MITRE ATT&CK Framework
Outpost24
 
PPTX
Outpost24 webinar: best practice for external attack surface management
Outpost24
 
PPTX
Outpost24 webinar: The state of ransomware in 2021 and how to limit your expo...
Outpost24
 
PPTX
Outpost24 Webinar - DevOps to DevSecOps: delivering quality and secure develo...
Outpost24
 
PDF
Outpost24 webinar - Why asset discovery is the missing link to enterprise vul...
Outpost24
 
PPTX
Outpost24 webinar - Api security
Outpost24
 
PDF
Outpost24 Webinar - CISO conversation behind the cyber security technology
Outpost24
 
PDF
Outpost24 webinar - Differentiating vulnerabilities from risks to reduce time...
Outpost24
 
PDF
Outpost24 webinar - How to secure cloud services in the DevOps fast lane
Outpost24
 
PPTX
Outpost24 webinar - Winning the cybersecurity race with predictive vulnerabil...
Outpost24
 
PPTX
Outpost24 webinar - Bridging your cyber hygiene gap to prevent enterprise hac...
Outpost24
 
PPTX
Outpost24 webinar mastering container security in modern day dev ops
Outpost24
 
PPTX
Outpost24 webinar - Protecting Cezanne HR’s cloud web application with contin...
Outpost24
 
Outpost24 webinar - A fresh look into the underground card shop ecosystem
Outpost24
 
Outpost24 webinar Why API security matters and how to get it right.pdf
Outpost24
 
Outpost24 webinar - The new CISO imperative: connecting technical vulnerabili...
Outpost24
 
Outpost24 Webinar - Five steps to build a killer Application Security Program
Outpost24
 
Outpost24 webinar - How to protect your organization from credential theft
Outpost24
 
Outpost24 webinar : Beating hackers at their own game 2022 predictions
Outpost24
 
Outpost24 webinar - Enhance user security to stop the cyber-attack cycle
Outpost24
 
Outpost24 webinar - Mapping Vulnerabilities with the MITRE ATT&CK Framework
Outpost24
 
Outpost24 webinar: best practice for external attack surface management
Outpost24
 
Outpost24 webinar: The state of ransomware in 2021 and how to limit your expo...
Outpost24
 
Outpost24 Webinar - DevOps to DevSecOps: delivering quality and secure develo...
Outpost24
 
Outpost24 webinar - Why asset discovery is the missing link to enterprise vul...
Outpost24
 
Outpost24 webinar - Api security
Outpost24
 
Outpost24 Webinar - CISO conversation behind the cyber security technology
Outpost24
 
Outpost24 webinar - Differentiating vulnerabilities from risks to reduce time...
Outpost24
 
Outpost24 webinar - How to secure cloud services in the DevOps fast lane
Outpost24
 
Outpost24 webinar - Winning the cybersecurity race with predictive vulnerabil...
Outpost24
 
Outpost24 webinar - Bridging your cyber hygiene gap to prevent enterprise hac...
Outpost24
 
Outpost24 webinar mastering container security in modern day dev ops
Outpost24
 
Outpost24 webinar - Protecting Cezanne HR’s cloud web application with contin...
Outpost24
 
Ad

Recently uploaded (20)

PDF
Wondershare PDFelement Pro Crack for MacOS New Version Latest 2025
bashirkhan333g
 
PDF
4K Video Downloader Plus Pro Crack for MacOS New Download 2025
bashirkhan333g
 
PDF
[Solution] Why Choose the VeryPDF DRM Protector Custom-Built Solution for You...
Lingwen1998
 
PDF
ERP Consulting Services and Solutions by Contetra Pvt Ltd
jayjani123
 
PPTX
Function & Procedure: Function Vs Procedure in PL/SQL
Shani Tiwari
 
PDF
SAP Firmaya İade ABAB Kodları - ABAB ile yazılmıl hazır kod örneği
Salih Küçük
 
PDF
Why is partnering with a SaaS development company crucial for enterprise succ...
Nextbrain Technologies
 
PPTX
Library_Management_System_PPT111111.pptx
nmtnissancrm
 
PPTX
Milwaukee Marketo User Group - Summer Road Trip: Mapping and Personalizing Yo...
bbedford2
 
PDF
Best Web development company in india 2025
Greenusys
 
PPTX
Comprehensive Risk Assessment Module for Smarter Risk Management
EHA Soft Solutions
 
PDF
Dipole Tech Innovations – Global IT Solutions for Business Growth
dipoletechi3
 
PDF
UITP Summit Meep Pitch may 2025 MaaS Rebooted
campoamor1
 
PPTX
Prompt Like a Pro. Leveraging Salesforce Data to Power AI Workflows.pptx
Dele Amefo
 
PPTX
Transforming Insights: How Generative AI is Revolutionizing Data Analytics
LetsAI Solutions
 
PDF
Salesforce Experience Cloud Consultant.pdf
VALiNTRY360
 
PDF
NPD Software -Omnex systems
omnex systems
 
PDF
Top Agile Project Management Tools for Teams in 2025
Orangescrum
 
PPTX
From spreadsheets and delays to real-time control
SatishKumar2651
 
PDF
IDM Crack with Internet Download Manager 6.42 Build 43 with Patch Latest 2025
bashirkhan333g
 
Wondershare PDFelement Pro Crack for MacOS New Version Latest 2025
bashirkhan333g
 
4K Video Downloader Plus Pro Crack for MacOS New Download 2025
bashirkhan333g
 
[Solution] Why Choose the VeryPDF DRM Protector Custom-Built Solution for You...
Lingwen1998
 
ERP Consulting Services and Solutions by Contetra Pvt Ltd
jayjani123
 
Function & Procedure: Function Vs Procedure in PL/SQL
Shani Tiwari
 
SAP Firmaya İade ABAB Kodları - ABAB ile yazılmıl hazır kod örneği
Salih Küçük
 
Why is partnering with a SaaS development company crucial for enterprise succ...
Nextbrain Technologies
 
Library_Management_System_PPT111111.pptx
nmtnissancrm
 
Milwaukee Marketo User Group - Summer Road Trip: Mapping and Personalizing Yo...
bbedford2
 
Best Web development company in india 2025
Greenusys
 
Comprehensive Risk Assessment Module for Smarter Risk Management
EHA Soft Solutions
 
Dipole Tech Innovations – Global IT Solutions for Business Growth
dipoletechi3
 
UITP Summit Meep Pitch may 2025 MaaS Rebooted
campoamor1
 
Prompt Like a Pro. Leveraging Salesforce Data to Power AI Workflows.pptx
Dele Amefo
 
Transforming Insights: How Generative AI is Revolutionizing Data Analytics
LetsAI Solutions
 
Salesforce Experience Cloud Consultant.pdf
VALiNTRY360
 
NPD Software -Omnex systems
omnex systems
 
Top Agile Project Management Tools for Teams in 2025
Orangescrum
 
From spreadsheets and delays to real-time control
SatishKumar2651
 
IDM Crack with Internet Download Manager 6.42 Build 43 with Patch Latest 2025
bashirkhan333g
 

Outpost24 webinar - Demystifying Web Application Security with Attack Surface Visibility

  • 1. Demystify Web application Security with attack surface visibility Simon Roe and John Stock, Outpost24 27th January 2021
  • 2. Helping customers improve security posture since 2001 Full stack security assessment Over 2,000 customers in all regions of the world Complete Application security for DevSecOps Crest certificated penetration testing.
  • 4. Why should you care 4
  • 5. 5 • Pen testing, DAST scanning, SAST, SCA, IAST • DevSecOps • WAF, RASP • So many buzz words, different products, • Where do we start Overwhelming choice
  • 6. 6 • What you know (your Ecommerce system) • What you don’t know • IOT devices • Benefits • Marketing campaigns • Acquisitions • Other 3rd party sites (employee benefits) • These make up your addressable attack surface How to identify your application attack surface score
  • 7. Retail analysis – An example 7
  • 8. 8 • Assess each application using OSINT techniques to identity potential areas of risk. • We’ll look at the how and why next Then What
  • 9. Mapping your application attack surface John Stock 9
  • 10. 10 • Basic understanding of the web application • Don’t need to understand DEVOPS or be an Appsec Guru • Mostly what we would call ‘Basic security best practice’ Where to start…
  • 11. 11 • Basic understanding of the web application • Don’t need to understand DEVOPS or be an Appsec Guru • Mostly what we would call ‘Basic security best practice’ • Available tools include: • Maltego • theHarvester • ShodanHQ • But as its out site, we can also just use the most powerful tool available… A web browser! What tools do I need?
  • 12. Security Mechanism Two main things to consider • Use of TLS • Is there any input validation? 12
  • 13. 13 How was the page created? • Static HTTP • Or dynamic content, eg PHP, ASP, JSP… Page Creation Method
  • 14. Degree of Distribution • Cross domain is always harder to secure • The greater the number of second level and sub domains, the higher the risk 14
  • 15. 15 • Is there authentication? • Is it email & password? • Any signs of 2FA? Authentication
  • 16. Input Vectors How many opportunities are there for data input? • Forms • Hidden parameters • URL parameters • Search 16
  • 17. Active Content • JavaScript, external JavaScript, Server Side Scripting, AJAX, Java, Flash, External Flash, RSS feed…… Oh boy! • Does it make use of a plugin or helper app? Active! 17
  • 18. 18 Everyone loves cookies! • Number of cookies • both external (foreign) • internal (local) • Type of cookie: • Tracking • Session Management • Authentication Cookies
  • 19. Scoring your attack surface and beyond 19
  • 20. • Turn those attack vectors into scores 20 Scoring your application attack surface SM PCM DOD AUT IV ACT CS 9.95 100 91.18 33.33 29.04 100 0
  • 21. Translate scores to a visual Attack surface summary 21 0.00 0.20 0.40 0.60 0.80 1.00 V1: Security Mechanisms V2: Page Creation Method V3: Degree of Distribution V4: Authentication V5: Input Vectors V6: Active Content V7: Cookies Attack Surface Radar AS Score: 33.48 of 42.19
  • 22. Overall Application attack surface score card jQuery 1.12.4 jQuery Migrate 1.4.1 PHP/5.6.40 Apache/2.4.6 Findings: Scope: www.Outpost24.com AS Score: 39. 16 of 42.00 SM PCM DOD AUT IV ACT CS 9.95 100 91.18 33.33 29.04 100 0 Alexa Ranking: #413,480 in global internet engagement Vulnerable Vulnerable WordPress 5.2.6 DOS, Vulnerable Vulnerable OK Over the past 90 days 0.00 0.20 0.40 0.60 0.80 1.00 V1: Security Mechanisms V2: Page Creation Method V3: Degree of Distribution V4: Authentication V5: Input Vectors V6: Active Content V7: Cookies Attack Surface Radar <- Screenshot of app
  • 23. Leads to informed choice of tools • Make informed choices about tools, solutions and services • Critical applications : Continuous hybrid application testing • Less critical : DAST scanning + one time penetration test • Identify IOT devices, turn off access or block with firewall • Start to inform development decisions • SCA for 3rd party components • SAST or IAT for code improvements • Build a continuous application security assessment program 23
  • 24. Adopt a continuous approach to application security 24
  • 25. Takeaways • Applications continues to be a prime vector for breaches. • Measuring the right attack vectors gives you a comprehensive view of an applications attack surface • This in turn gives you a sense of the risk the application poses • Using this information can help drive your application security program (ASP) • Your ASP should be dynamic and continuous, not one time and done 25
  • 26. Simon Roe, [email protected] John Stock, [email protected] Let’s start an application security program today!