security missconcepts
play

Security #MiSSConcepts Ammarit Thongthua, CISSP CISM # Who am I - PowerPoint PPT Presentation

Security #MiSSConcepts Ammarit Thongthua, CISSP CISM # Who am I


  1. Security #MiSSConcepts Ammarit Thongthua, CISSP CISM

  2. # Who am I �������������������������������� �������������������������������� �������������������������������� �������������������������������� ������������������ ������������������ ������������������� �������������������

  3. Security #MiSSConcepts

  4. Security #MiSSConcepts use use use use understand understand take take

  5. Security protection we Security protection we #Expected #Expected

  6. Security protection we get in #Reality

  7. Security by Obscurity Security by Obscurity Security by Obscurity Security by Obscurity

  8. Security by Obscurity Obscurity = make nobody know or make it hard to see � Example: - Path hiding - Path hiding - Hidden field - Hidden/Remove object - Change service port number - Referrer, HTTP special Header

  9. Security by Obscurity Path hiding Path hiding https://www.somewebsite.com/page/admin/login.aspx admin/login.aspx

  10. Security by Obscurity Path hiding Path hiding https://www.somewebsite.com/abc/123/admin.php /abc/123/admin.php

  11. Security by Obscurity Path hiding Path hiding

  12. Security by Obscurity Path hiding Path hiding - -Temp File, Back Up Temp File, Back Up

  13. Security by Obscurity Dirbuster Dirbuster

  14. Security by Obscurity Dirbuster Dirbuster � Prepare path dictionary � Basic : /admin , /test, /abc, /xyz � Well known : /administrator /manager, /wp-admin, /console � � Advance : /admin-path, / � Temp File, Back Up � Path + .zip , .rar , .bak � Ex; /admin � http://testsite.com/admin.zip � http://testsite.com/admin.rar � http://testsite.com/admin.bak

  15. Security by Obscurity Hidden filed Hidden filed

  16. Security by Obscurity Hidden filed Hidden filed

  17. Security by Obscurity Hidden filed Hidden filed

  18. Security by Obscurity Hidden filed Hidden filed

  19. Security by Obscurity Disabled Disabled

  20. Security by Obscurity Hidden/Remove object Hidden/Remove object

  21. Security by Obscurity Hidden/Remove object Hidden/Remove object

  22. Security by Obscurity Hidden/Remove object Hidden/Remove object

  23. Security by Obscurity Change service port number Change service port number

  24. Security by Obscurity Change service port number Change service port number

  25. Security by Obscurity HTTP Referrer HTTP Referrer

  26. Security by Obscurity HTTP special Header HTTP special Header

  27. Security by Obscurity HTTP special Header HTTP special Header ���������������� ��������������� ��������������������� ���������������� ���������

  28. Security by Obscurity HTTP special Header HTTP special Header

  29. Security by Obscurity HTTP special Header Example HTTP special Header Example Header name What it means x-forwarded-for x-forwarded-for Originating IP of a client connection to the server Originating IP of a client connection to the server x-forwarded-host Origination host name x-forwarded-server Originating server name x-wap-profile A reference to the user-agent profile as specified. x-imsi The imsi number. Identifies the end user. x-msisdn The end users phone number Ref: https://mobiforge.com/design-development/useful-x-headers

  30. Encode = Encrypt ? Encode = Encrypt ? Encode = Encrypt ? Encode = Encrypt ?

  31. Encode != Encrypt � BASE 64 password in database

  32. Encode != Encrypt � BASE 64 password Cookie

  33. Encode != Encrypt

  34. Encode != Encrypt � BASE 64 decode by zap proxy

  35. ���� ������������������ �������������� ������������������ !� ������������������ !� ������������������ !� ������������������ !� !�������"���# !�������"���# $%�&����'���( $%�&����'���(

  36. Weak hashing algorithm � Example � Shift-bit + Add letter GD + Fake Pad (==) � Shift-bit + Add letter GD + Fake Pad (==) � Password = QGDbGDtGDtGDxGDpGDsGDe== � Remove GD => Qbttxpse � Shift back => Password

  37. Encrypted password ? Encrypted password ? Encrypted password ? Encrypted password ?

  38. Encrypted Password ? Config file password A03aBe/q54f== Attacker Database Web Server

  39. Password hashing ? Password hashing ? Password hashing ? Password hashing ?

  40. Weak hashing algorithm

  41. Weak hashing algorithm

  42. Encrypt data with secure Encrypt data with secure algorithm is OK. algorithm is OK. No more need to concern

  43. Encryption More things to concern for the encryption - Implementation - Implementation - Key length (bits) - Mode (ECB, CBC, OFB, CFB)

  44. ECB mode weakness in real case ? ECB mode weakness in real case ?

  45. ECB block shuffler �������������������� ������������������������������� ����� � !� ����� ����������!��"����"� #�����#�$�#�$����#���� ��� ����� � !� ����� ����������!��"����"� #�����#�$�#�$����#���� ��� ����������������#####����������� ����� � !� ����� ����������!��"���"##!!$��"���"��� "������!��#�� �������������########����������� ��� #!������!#�$��"�� ���$� " ����"##!!$��"���"��� "������!��#��

  46. ECB block shuffler �������������������� ��������������������� ����� � !� ����� ����������!��"����"� #�����#�$�#�$����#���� ��� ����������������##### ����������������##### ����� � !� ����� ����������!��"���"##!!$��"���"��� "������!��#�� �������������######## ��� #!������!#�$��"�� ���$� " ����"##!!$��"���"��� "������!��#�� �������������###������������%� ��� #!������!#�$��"�� ���$� " �����"� #�����#�$�#�$����#���� ���

  47. ECB block shuffler �������������###������������%� https://fitnessxx.com/cutomer.php? https://fitnessxx.com/cutomer.php? data= ��� #!������!#�$��"�� ���$� " �����"� #�����#�$�#�$����#���� ���

  48. ECB block shuffler

  49. Is encrypted data secured Is encrypted data secured when secure algorithm and when secure algorithm and Mode?

  50. Yes, But Yes, But

  51. Replay Attack

  52. Replay Attack

  53. Other Security #MiSSConcepts Authentication Check at on load 
 - Tamper Data and reject 
 Cookie Expired date is work - Cookie Editor - Cookie Editor Protection by WAF is sufficient 
 - Evasion (Ex; admin';--) - Unsupported SSL cipher suite - Pollution technique 
 - WAFW00F 
 Input validate HTTPS is sufficient

  54. Other Security #MiSSConcepts No vulnerability found in VA/Pentest = Secured

  55. Conclusion � Secure by design � Put the right solutions to the right jobs � Put the right solutions to the right jobs � Security Source code review � Perform regular vulnerability assessment / penetration test

Download Presentation
Download Policy: The content available on the website is offered to you 'AS IS' for your personal information and use only. It cannot be commercialized, licensed, or distributed on other websites without prior consent from the author. To download a presentation, simply click this link. If you encounter any difficulties during the download process, it's possible that the publisher has removed the file from their server.

Recommend


More recommend