www.nethemba.com www.nethemba.com
Security vulnerabilities in new web applications
- Ing. Pavol Lupták, CISSP, CEH
Security vulnerabilities in new web applications Ing. Pavol Luptk, - - PowerPoint PPT Presentation
Security vulnerabilities in new web applications Ing. Pavol Luptk, CISSP, CEH Lead Security Consultant www.nethemba.com www.nethemba.com Introduction $whoami Pavol Luptk 10+ years of practical experience in security and seeking
www.nethemba.com www.nethemba.com
www.nethemba.com
$whoami Pavol Lupták
10+ years of practical experience in security
OWASP Slovakia Chapter Leader co-author of the OWASP Testing Guide v3.0 owner of security company Nethemba s.r.o.
www.nethemba.com
To show security vulnerabilities common in new
“Real data” from plenty of new web applications
To ensure their privacy, the used data was
www.nethemba.com
Most new applications use prepared
Complex architecture with multiple different
New fully-automatized SQL injection tools are
www.nethemba.com
www.nethemba.com
Many new applications use own session
If it is possible, use language underlying
At this moment, there is no automated way to
www.nethemba.com
If the attacker can inject an arbitrary value in
Can be used to hijack user sessions using
The application should not accept injected
www.nethemba.com
Secure flag prevents the browser to send a
HttpOnly flag prevents the injected javascript
HttpOnly is effective only when TRACE/TRACK
www.nethemba.com
In normal circumstances there is no need for
User should be informed if another user with
Bind the user session with its IP address/subnet Session logging is very important
www.nethemba.com
Feasible when session token is shorter than
Almost no application can detect this attack
The application should detect increased
www.nethemba.com
GET requests are still used for sensitive
Many ways how to protect against CSRF: Requiring special non-determinable parameters
AJAX “double submit” cookies Using other verification channels (email,
www.nethemba.com
www.nethemba.com
Still prevailed because of complexity to detect
Common problems: Permanent user's account locking Using negative numbers to gain a lot of money Enumeration of users using “forgotten
www.nethemba.com
SSLv2 is still massively used Weak (less than 56-bits) SSL ciphers are used MD5 is still massively used DES ECB is still used (in a bank environment!) Applications have password complexity restrictions
that drastically decrease all possible combinations
Short complicated passwords are still used Hashes are not salted (risk of rainbow table attacks)
www.nethemba.com