Application Security - Unit 3 PDF
Application Security - Unit 3 PDF
2
Unit - 3 Application
Security
Authorization
o Elevation of Privilege
o Disclosure of confidential data
o Data tampering
o Luring attacks
Configuration Management
o Unauthorized Access to Administration Interfaces
o Unauthorized Access to Configuration Stores
o Retrieval of Plaintext Configuration Secrets
o Lack of Individual Accountability
o Over-privileged Application and Service Accounts
Sensitive Data
o Access to Sensitive Data in Storage
o Network Eavesdropping
o Data Tampering
Session Management
o Session Hijacking
o Session Replay
o Man in the Middle Attacks
4
Unit - 3 Application
Security
Cryptography
o Poor Key Generation or Key Management
o Weak or Custom Encryption
o Checksum Spoofing
Parameter Manipulation
o Query String Manipulation
o Form Field Manipulation
o Cookie Manipulation
o HTTP Header Manipulation
Exception Management
o Attacker Reveals Implementation Details
o Denial of Service
Auditing and Logging
o User Denies Performing an Operation
o Attackers Exploit an Application Without Leaving a Trace
o Attackers Covers their tracks
5
Application
Introduction Security
6
Application
Steps in Anatomy of Cyber attack Security
• Reconnaissance
• Scanning
• Access and Escalation
• Exfiltration
• Sustainment
• Assault
• Obfuscation
7
Application
Steps in Anatomy of Cyber attack Security
Reconnaissance
8
Application
Steps in Anatomy of Cyber attack Security
Scanning
9
Application
Steps in Anatomy of Cyber attack Security
Exfiltration
• But stealing private data is not the only action intruders can
take. They can also change or erase files on compromised
systems.
11
Application
Steps in Anatomy of Cyber attack Security
Sustainment
12
Application
Steps in Anatomy of Cyber attack Security
Assault
Obfuscation
• Usually the attackers want to hide their tracks, but this is not
universally the case – especially if the hackers want to leave a
“calling card” behind to boast about their exploits.
14
Application
Protection from Cyber Attacks Security
15
Application
Protection from Cyber Attacks Security
16
Application
Protection from Cyber Attacks Security
17
Application
Protection from Cyber Attacks Security
• Cyber security experts test the systems and the network for
vulnerabilities and fix them pre-emptively.
19
Application
Protection from Cyber Attacks Security
20
Application
Protection from Cyber Attacks Security
• The first step would be encrypting all the data that your
organization owns. Even if an attacker infiltrates the network,
decrypting the data will need hours, which may buy some
time for the security experts to find the source of the attack.
21
Application
Protection from Cyber Attacks Security
22
Applying modern technologies Application
Security
for better Cyber Security
• Artificial intelligence is playing a pivotal role in cyber security.
Machine learning has the ability to analyze the anatomy of a
cyber attack, and learn from the behaviour patterns of
malware.
23
Applying modern technologies Application
Security
for better Cyber Security
• And, big players such as Microsoft, Google, Palo Alto
Networks, Fortinet and Cisco Systems are already developing
cyber security solutions using artificial intelligence and
machine learning.
30
Application
Basic steps in Attacker Methodology Security
31
Application
Basic steps in Attacker Methodology Security
Escalate Privileges
32
Application
Basic steps in Attacker Methodology Security
Escalate Privileges
33
Application
Basic steps in Attacker Methodology Security
Maintain Access
Deny service
Spoofing
Tampering
37
Application
STRIDE Security
Repudiation
Information disclosure
Elevation of privilege
40
STRIDE – Application
Security
Threats and Countermeasures
41
STRIDE – Application
Security
Threats and Countermeasures
42
Network Threats and Application
Security
Countermeasures
Introduction
• Sniffing
• Spoofing
• Session hijacking
• Denial of service
44
Network Threats and Application
Security
Countermeasures
Information gathering
• After they identify open ports, they use banner grabbing and
enumeration to detect device types and to determine
operating system and application versions.
46
Network Threats and Application
Security
Countermeasures
Sniffing Attacks
47
Network Threats and Application
Security
Countermeasures
Types of Sniffing Attacks
• LAN Sniff – The sniffer attacks the internal LAN and scans the
entire IP gaining access to live hosts, open ports, server
inventory etc. A port specific vulnerability attacks happens in
LAN sniffing.
48
Network Threats and Application
Security
Countermeasures
Types of Sniffing Attacks
49
Network Threats and Application
Security
Countermeasures
Types of Sniffing Attacks
50
Application
Tools used for Packet sniffing Security
52
Sniffing Detection and Prevention Application
Security
techniques
• Detecting sniffers can be difficult since they are mostly
passive (collects data only) especially in a shared Ethernet.
53
Sniffing Detection and Prevention Application
Security
techniques
• ARP method – Machines always captures and caches ARP.
Upon sending a non-broadcast ARP, the sniffer/promiscuous
machine will cache the ARP and it will respond to our
broadcast ping.
54
Sniffing Detection and Prevention Application
Security
techniques
• ARP Watch – Used to trigger alarms when it sees a duplicate
cache of the ARP.
55
Application
Spoofing Attacks Security
Spoofing
56
Application
Spoofing Attacks Security
58
Application
Spoofing Attacks Security
59
Application
Spoofing Attacks Security
• ARP spoofing only works on local area networks that use the
Address Resolution Protocol. Routinely checking your
website’s stats for unexpected traffic spikes and paying
attention to multiple “service unavailable” messages can help
you predict possible DoS attacks.
60
Application
Spoofing Attacks Security
IP Spoofing
61
Application
Spoofing Attacks Security
IP Spoofing
IP Spoofing
63
Application
Spoofing Attacks Security
IP Spoofing
64
Application
Spoofing Attacks Security
66
Application
Spoofing Attack Prevention and Mitigation Security
Packet filtering:
68
Application
Spoofing Attack Prevention and Mitigation Security
70
Application
Session Hijacking Security
72
Application
Countermeasures Security
73
Application
Denial of Service Security
74
Application
Countermeasures Security
75
Application
Host and Application Threats Security
Introduction
76
Application
Viruses, Trojan horses and Worms Security
77
Application
Countermeasures Security
78
Application
Footprinting Security
79
Application
Footprinting Security
• Footprinting helps to
80
Application
Footprinting Security
Identify vulnerabilities -
81
Application
Footprinting Security
82
Application
Countermeasures Security
83
Application
Password Cracking Security
• If you use default account names, you are giving the attacker a
head start. Then the attacker only has to crack the account’s
password.
84
Application
Countermeasures Security
85
Application
Denial of Service Security
86
Application
Countermeasures Security
87
Application
Arbitrary code execution Security
88
Application
Countermeasures Security
89
Application
Unauthorized access Security
90
Application
Countermeasures Security
91
Application
Application Threats Security
92
Application
Application Threats Security
93
Application
Application Threats Security
94
Application
Input validation Security
• When network and host level entry points are fully secured;
the public interfaces exposed by your application become the
only source of attack.
o Buffer overflows
o Cross-site scripting
o SQL injection
o Canonicalization
96
Application
Buffer overflows Security
97
Application
Buffer overflows Security
98
Application
Countermeasures Security
99
Application
Countermeasures Security
• Make sure you validate input for type and length, especially
before you call unmanaged code because unmanaged code is
particularly susceptible to buffer overflows.
102
Application
Cross-site Scripting Security
103
Application
Cross-site Scripting Security
104
Application
Examples of Cross-site Scripting Security
106
Application
Countermeasures Security
• Validate all input for known valid values and then reject all
other input. Use regular expressions to validate input data
received via HTML form fields, cookies, and query strings.
• It can also occur if your code uses stored procedures that are
passed strings that contain unfiltered user input. Using the
SQL injection attack, the attacker can execute arbitrary
commands in the database.
108
Application
SQL Injection Security
109
Application
Example of SQL Injection Security
110
Application
Example of SQL Injection Security
111
Application
Example of SQL Injection Security
• ‘ OR 1=1–
115
Application
Canonicalization Security
• Files, paths, and URLs are resource types that are vulnerable
to canonicalization because in each case there are many
different ways to represent the same name. File names are
also problematic.
116
Application
Canonicalization Security
• c:\temp\somefile.dat
• somefile.dat
• c:\temp\subdir\..\somefile.dat
• ..\somefile.dat
• Ideally, your code does not accept input file names. If it does,
the name should be converted to its canonical form prior to
making security decisions, such as whether access should be
granted or denied to the specified file.
117
Application
Countermeasures Security
118
Application
Authentication and Authorization Security
o Network eavesdropping
o Brute force attacks
o Dictionary attacks
o Cookie replay attacks
o Credential theft
119
Application
Network Eavesdropping Security
Countermeasures
121
Application
Dictionary Attacks Security
• Lost keys mean that all passwords are invalidated. Most user store
implementations hold password hashes (or digests). Users are
authenticated by re-computing the hash based on the user-
supplied password value and comparing it against the hash value
stored in the database.
• Note: Once the attacker has obtained the list of password has
hes, the dictionary attack can be performed offline and does
not require interaction with the application.
123
Application
Dictionary Attacks Security
• Use strong passwords that are complex, are not regular words,
and contain a mixture of upper case, lower case, numeric, and
special characters.
124
Application
Cookie Replay Attacks Security
125
Application
Cookie Replay Attacks Security
126
Application
Credential Theft Security
• Browser history and cache also store user login information for
future use. If the terminal is accessed by someone other than
the user who logged on, and the same page is hit, the saved
login will be available.
127
Application
Credential Theft Security
o Elevation of privilege
o Disclosure of confidential data
o Data tampering
o Luring attacks
129
Application
Elevation of Privilege Security
130
Application
Elevation of Privilege Security
131
Application
Disclosure of confidential data Security
132
Application
Disclosure of confidential data Security
133
Application
Data tampering Security
134
Application
Luring Attacks Security
135
Application
Configuration Management Security
136
Application
Unauthorized access to administration interfaces Security
137
Application
Unauthorized access to administration interfaces Security
138
Application
Unauthorized access to administration interfaces Security
139
Application
Unauthorized access to configuration stores Security
140
Application
Retrieval of Plain text from configuration secrets Security
141
Application
Lack of individual accountability Security
143
Application
Over privileged application and service accounts Security
144
Application
Sensitive Data Security
o Network eavesdropping
o Data tampering
145
Application
Q&A Security