#MicroFocusCyberSummit
Developer-centric Application Security Scans
Ray Kelly, Practice Principal - Fortify Sherman Monroe, Senior Security Consultant Thomas Ryan, Fortify Solutions Architect
Developer-centric Application Security Scans Ray Kelly, Practice - - PowerPoint PPT Presentation
Developer-centric Application Security Scans Ray Kelly, Practice Principal - Fortify Sherman Monroe, Senior Security Consultant Thomas Ryan, Fortify Solutions Architect #MicroFocusCyberSummit Session Agenda Mobile Apps The Bad, The Worse
#MicroFocusCyberSummit
Ray Kelly, Practice Principal - Fortify Sherman Monroe, Senior Security Consultant Thomas Ryan, Fortify Solutions Architect
Mobile Apps – The Bad, The Worse And The Ugly Attacking Web Services using Web Inspect Developer-centric Application Security Scans with Fortify
3
#MicroFocusCyberSummit
Ray Kelly Practice Principal - Fortify
Overview of the mobile landscape The mobile threat surface Real world mobile app vulnerabilities Q&A
5
Ray Kelly
6
All vulnerabilities discussed in this presentation are either already publicly disclosed or have been anonymized/scrubbed These are developer mistakes that potentially leave users at risk Apps are made by developers with the best of intentions
7
8
Source: https://www.statista.com/statistics/274774/forecast-of-mobile-phone-users-worldwide/
development right now. But users may be at risk.
mobile devices may mean that security is not prioritized.
threats, so building devices with adequate security and mobile device developers with security training are valuable.
9
10
Client Network Server
Two key differences:
(Compared to traditional apps)
Magnified network vulnerability
be visible to others with a mobile device than local traffic at work or home
Magnified physical vulnerability
hardware, once the attacker has physical access, it’s over
11
12
Mobile applications which have at least one critical or high vulnerability
Source: Micro Focus 2018 Application Security Research Update Report
Server Side
13
Server Side
14
Account enumeration
Network/Privacy
15
16
Network/Privacy
17
Network/Privacy
Client Side/Logging
18
Starbucks Mobile App
/Library/Caches/com.crashlytics.data/com.starbucks.mystarbucks/session.clslog <input class="field text medium" id="Account_UserName" maxlength="200" name="Account.UserName" tabindex="0" type="text" value="CLEARTEXT" /> <label for="Account_PassWord" class="">Password <span class='req'>*</span></label> <input class="field text medium" id="Account_PassWord" maxlength="200" name="Account.PassWord" tabindex="0" type="password" value="CLEARTEXT" />
“When reached Wednesday, Crashlytics, a Boston-based firm that specializes in crash reporting solutions, couldn’t comment on specific customers but did reiterate that the firm doesn’t recommend developers log sensitive information.”
Source: https://threatpost.com/starbucks-app-stores-user-information-passwords-in-clear-text/103649/2/
19
Client Side/Logging
20
Client Side/Storage
21
Client Side/Debug Screens
22
Client Side
23
Provides Application Security as a Service
Discover
Understanding your application portfolio is the first step to securing it Comprehensive static, dynamic/interactive web and mobile testing delivered at the speed of development Continuously monitors and protects software running in production Integrated workflows to fix vulnerabilities faster and accelerate a mature AppSec program
Assess Monitor & Protect Integrate
Leading-edge developer training for secure coding best practices and prevent vulnerabilities before check-in Securing DevOps through broad Fortify Ecosystem integrations and automation tools Thick-client Web Mobile
Remediate
Educate
24
Client Network Services
Why Fortify on Demand MAST?
Mobile Assessments include:
Vulnerability analysis of mobile binary Endpoint reputation analysis Security expert review of prioritized results
Mobile + Assessments include:
Manual testing of binary, network and services WebInspect analysis of backend services
Visit Fortify On Demand at http://microfocus.com/fod Follow us on Twitter @MicroFocusSec
#MicroFocusCyberSummit
Ray Kelly Follow me on Twitter: @vbisbest
#MicroFocusCyberSummit
Sherman Monroe
Overview of Web Service Scanning SOAP scan setup Manual RESTful Scan setup Automated RESTful Scan setup
27
28
Determining attack surface Historically only link-based Today employ JavaScript emulation to get dynamic requests
Sending known attack vectors Fuzzing parameters Session-based
Understanding request generation (i.e. links) Understanding parameters Understanding session management
29
Non-standard parameter specs
multipart/form-data)
Patterns in URL segments
Component Values
POST /acme/geo/get_feature?uid=68e4cf6a8077912a02b250b230b8abe73265753b HTTP/1.1 Host: acme.com Connection: keep-alive X-CUST-SESSIONID: h57768d18hfr883xc36b53100jeew99sb2b320eb User-Agent: Mozilla/5.0 (Windows NT 6.1) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/46.0.2490.80 Safari/537.36 Content-Type: application/x-www-form-urlencoded Accept: */* Accept-Encoding: gzip, deflate, sdch Accept-Language: ja,en-US;q=0.8,en;q=0.6 {“location":"48.854325",“feature_area_id":”tag=3hks83n3j;name=sector_north”} HTTP/1.1 200 OK Content-Type: application/json; charset=utf-8 Date: Mon, 05 May 2017 03:03:56 GMT Content-Length: 138 Connection: keep-alive {“feature_id":"\u30a4\u30d9\u30f3\u30c8\u3000\u5341\u4e00",“sz":532,“wght":0.32,"last_photo":"",“resp_code":0} Desktop Manager Web Server Feature Service Image Service Spatial DBMS JPEG JPEG JSON Response REST Request SOAP Request GML
POST /acme/geo/get_feature?uid=68e4cf6a8077912a02b250b230b8abe73265753b HTTP/1.1 Host: acme.com Connection: keep-alive X-CUST-SESSIONID: h57768d18hfr883xc36b53100jeew99sb2b320eb User-Agent: Mozilla/5.0 (Windows NT 6.1) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/46.0.2490.80 Safari/537.36 Content-Type: application/x-www-form-urlencoded Accept: */* Accept-Encoding: gzip, deflate, sdch Accept-Language: ja,en-US;q=0.8,en;q=0.6 {“location":"48.854325",“feature_area_id":”tag=3hks83n3j;name=sector_north”} HTTP/1.1 200 OK Content-Type: application/json; charset=utf-8 Date: Mon, 05 May 2017 03:03:56 GMT Content-Length: 138 Connection: keep-alive {“feature_id":"\u30a4\u30d9\u30f3\u30c8\u3000\u5341\u4e00",“sz":532,“wght":0.32,"last_photo":"",“resp_code":0}
Desktop Manager Web Server Feature Service Image Service Spatial DBMS JPEG JPEG JSON Response REST Request SOAP Request GML
data types
38
39
#MicroFocusCyberSummit
Navigate the Eclipse IDE and Fortify plug-in & Security Assistant Examine & Remediate SQL injection Full scan from the Eclipse IDE Understand the Jenkins Continuous integration tool Configure static scan and result automation with the Jenkins build Enable predictive analysis with audit assistant through SSC View results in Fortify Software Security Center with audit assistant predictions
42
#MicroFocusCyberSummit
#MicroFocusCyberSummit