Cf.Objective.2009

28
Approaches to Automated Security Testing Bill Shelton (no initials – no hacker alias) MXUnit.org [email protected] @virtix – Twitter

Transcript of Cf.Objective.2009

Page 1: Cf.Objective.2009

Approaches to Automated Security Testing

Bill Shelton (no initials – no hacker alias)[email protected]@virtix – Twitter

Page 2: Cf.Objective.2009
Page 3: Cf.Objective.2009
Page 4: Cf.Objective.2009

OneBigAss

Problem!

Page 5: Cf.Objective.2009

Programmer Security guy

Page 6: Cf.Objective.2009

Programmer Security guy

Page 7: Cf.Objective.2009
Page 8: Cf.Objective.2009

Break it

Page 9: Cf.Objective.2009

Disassemble, Discover, Discard

Page 10: Cf.Objective.2009
Page 11: Cf.Objective.2009
Page 12: Cf.Objective.2009

+ Webdriver + + ==

Page 13: Cf.Objective.2009

Ok … Now what?

Page 14: Cf.Objective.2009

It’s T-shirt time! What’s wrong with the following code?

Page 15: Cf.Objective.2009
Page 16: Cf.Objective.2009

StaticAnalysis

Page 17: Cf.Objective.2009
Page 18: Cf.Objective.2009

Trust Boundaries

Page 19: Cf.Objective.2009

Validation

Page 20: Cf.Objective.2009

Output

Encoding

Page 21: Cf.Objective.2009

Black List

White List

Page 22: Cf.Objective.2009

Validate this, punk …

Page 23: Cf.Objective.2009
Page 24: Cf.Objective.2009

http://foo.com/myapp/profile.cfm?id=123

Direct Object Reference

Page 25: Cf.Objective.2009

Indirect

Object

Reference

Page 26: Cf.Objective.2009

Take Away

• Think securely from the first line of code -Far better to write securely from the start rather than fix it later

• Use black box tools to help to grab low hanging fruit

• Use your knowledge to dig in and find and fix vulnerabilities – gray and white box approaches

• Learn the trust boundaries• Validate and encode correctly

Page 27: Cf.Objective.2009

Test Be Happy

Page 28: Cf.Objective.2009

Stuff to Read

• OWASP - http://www.owasp.org/index.php/Main_Page

• SANS Institute - http://www.sans.org/

• SANS Top 25 of 2009 - - http://www.sans.org/top25errors/

• Secure Programming with Static Analysis – Brian Chess & Jacob West

• OWASP:Software Assurance Maturity Model - http://www.owasp.org/index.php/Category:OWASP_Software_Assurance_Maturity_Model_Project

• Software Security: Building Security In – Gary McGraw

• Exploiting Software: How to Break Code – Gary McGraw

• Hackers.org - http://ha.ckers.org/

• Free Stock Photos - http://www.sxc.hu/