Showing posts with label WAST. Show all posts
Showing posts with label WAST. Show all posts

Just some testing related links (updated)

Training online

Hacker Contests / War Games

Deliberately Vulnerable Websites

Deliberately Insecure Applications

Deliberately Insecure Distributions

Vulnerable 'real' applications

Testing Tools

Security Tool Suites

Frameworks / Testing resources

Security Models

First Burp Extension


Yesterday I started converting the few Hiccup scripts I created (as in: tinkering with a mashup of existing scripts until it worked) in the past to the new Burp Extender format.
After some initial startup problems (with which http://www.burpextensions.com really helped out) I am proud to present my first simple extension :)

It doesn't do much more than highlighting requests of content-type text/xml and text/xhtml in the proxy tab. The reason I want that is that these content types are possibly vulnerable to html encoded XSS attacks and are often missed by scanners (thanks to mario heiderich for pointing that out to me in the past!). It is therefor useful to test them manually.

See http://www.thespanner.co.uk/2011/09/12/protecting-against-xss/ for some background info and PoC.

Link to the Burp Extension



Mostly Free Online Testing and Security Magazines

Just a list I collected over time. Many are free or provide free issues.

Software Test & QA
http://www.softwaretestpro.com/Publication/p/STPM

(IN)Secure Magazine
http://www.net-security.org/insecuremag.php

Hack in the Box Magazine
http://magazine.hackinthebox.org/

IT Expert Magazine
http://www.itexpertmag.com/

Hakin9 Magazine
http://hakin9.org/

Datacenter Magazine
http://datacentermag.com/category/magazine/

Pentest Magazine
http://pentestmag.com/

Security Acts
http://www.securityacts.com/

Security Kaizen Magazine
http://www.bluekaizen.org/security-kaizen-magazine/

Testing Experience
http://www.testingexperience.com/

Ideal Skill Set For Web Application Security Testers

Today I saw an interesting post by Keatron Evans on the "Ideal Skill Set For the Penetration Testing". You can find his blog here.

While I think it is a good summary about the skill-set for pentesters, I think it is not the correct skill-set for web application security testers. So I have made a slightly modified version of it for (what I think to be) the basic skill-set of a web application security tester.

I tried to maintain the original list as much as possible and provide the webappsec analogies of the items. I also copy/pasted the good bits and the things I thought to be applicable in both lists.

1. Mastery of web and application servers. Each and every web and application server has its own configuration options, behaviour, quirks and file locations. Learn them and learn how to abuse or break them.

2 Good knowledge of the HTTP protocol. Understand and learn the header fields, how cookies work and the different request methods. Understand how HTTPS works. Get the basics of AJAX, JSON, serialized streams, etc.

3. If you don’t understand the things in item 2, then you can’t possibly understand how session management, CSRF or a (layer 7) MiTM attack actually works.

4. Learn the ins and outs of HTML, javascript, CSS. Learn the different encoding mechanisms, their uses and limitations. Also learn how each browser handles exceptions and strange input (see 6)

5. Learn the ins and outs of the mechanisms behind IDS and IPS. Learn how to pass data past them using basic encoding and other simple techniques. There’s no better way to understand these concepts than to apply them. Once you’re mastered this, you can move to a WAF and start the process over again. Start experimenting with different encodings and obfuscation techniques and other attacks.

6. Know your browsers. Despite all the standards browsers tend to handle HTML, javascript and encodings in a (slightly) different way. Next to that, each browser has its own configuration options, behaviour, quirks and file locations.

7. Eventually learn a programming language. Focus on Java, Python and Ruby. Figure out something you want to automate, or think of something simple you’d like to create. For example, a simple fuzzer or request/response interceptor.

8, 9 and 10. Same as Keatron Evans' list.

How to protect yourself from Firesheep (and other wolves in disguise)

About a month ago codebutler released a firefox plugin called firesheep and shook the world (or at least the internet using part of it). Firesheep makes it possible to sniff unencrypted networks for credentials and take over someones identity; the HORROR !

The vulnerability that firesheep (ab)uses is not new, known for a very long time, widely spread, and called "session hijacking". A very simple overview can be found at the OWASP page about it.

In fact, the problem is so big that a tool like firesheep was necessary to finally create some awareness for it and according to the website that was also the main reason for releasing it:
Websites have a responsibility to protect the people who depend on their services. They've been ignoring this responsibility for too long, and it's time for everyone to demand a more secure web. My hope is that Firesheep will help the users win.


Unfortunately the problem resides on the web server side and can only be solved there but the solutions are known.

So, where does that leave us? Are we completely helpless? Luckily not. Over the last few weeks several solutions were posted all over the internet, but I felt none of them provided a complete overview, so that's why I wrote this post.

Let's start with the obvious: "Do not use unencrypted networks"
Although this might seem an "open door" it's not. Many applications run in the background connecting at regular intervals for updates and not only on laptops, but nowadays also on smart-phones. Make sure to disable automatic connections to unsecured networks.

"Only use https"
When you need to access a webpage that requires you to login make sure it supports https. This can be trickier than it looks as many websites only support https on the login page and switch back to http after the login has completed, making sniffing and a successful session hijacking attack possible again. Some websites (e.g. gmail ) allow you to force the use of https in the settings, but more sites don't.

Firefox users can use add-ons like 'https everywhere' or 'noscript' to force the browser to always use https on certain sites, but the problem remains that many sites do not support it on all pages or functionalities (e.g. facebook chat or linkedin). Users of IE, Chrome or Opera cannot even use these plugins.

"HTTPS tunneling"
A better solution is the use of an https tunnel. With a tunnel you basically create an encrypted connection to a trusted location and reroute all traffic over it. Although many SSL supporting web proxies exist, I personally wouldn't trust them with my login data so a better idea it to setup one yourself.
For this you need to have a webserver, but this might be easier than you think. Many home-use devices like a NAS have build-in support for this and you don't need much power if you only use it yourself; a simple apache server with php+ssl support is all you need. Providing a complete guide to set this up for every device or webserver is impossible, but the basic steps to set this up are:

1) install a php based proxy on your webserver (I use phproxy, but alternatives exist)
2) setup ssl in apache
3) i also recommend to at least setup basic authentication to prevent unauthorized access
4) open up the port in your firewall

When everything is running it is as simple as first browsing securely to your proxy after which you can safely have the proxy access insecure sites. This solution does have a few drawbacks though, the biggest one being broken functionality, but security comes at a price... Another drawback is that this solution cannot be used for applications other than the browser.

When you want use other applications securely on an unencrypted network you need more advanced solutions like an SSH tunnel. Again, providing a complete guide to set this up for every device or webserver is impossible, but here and here you can find the basics for setting up an SSH tunneling proxy using putty.

Another solution is using a VPN connection, but that might prove to be more difficult to set up. Fortunately many providers offer these solutions relatively cheap so google a bit around.

Fun with regexes

Last year on one of the dutch OWASP chapters Adar Weidman gave a very interesting presentation about reDOS.

The principle behind a reDOS is feeding a regex input that will cause it to spawn a huge number of treads eventually exhausting all resources on the system. Take a look at the OWASP page for more information.

Ever since the presentation I was intrigued by the vulnerability, but did not really see much of it in the field (or I didn't search hard enough).

I mostly forgot about it until I read this post a few months ago. Apparently these things are more widespread than I suspected...

For those interested in regexes, lacking knowledge, and wanting to play with them:
http://xenon.stanford.edu/~xusch/regexp/analyzer.html
http://www.regular-expressions.info/

BruCON 2009

This weekend I noticed the schedule for BruCON 2009 is almost complete, so now the hard part begins; deciding what to attend to and what to skip .. Tough decisions have to be made :)

If you're interested in BruCON an want to stay up-to-date; join the linkedin group:
http://events.linkedin.com/BruCON-Security-Conference/pub/31107

Pentest(ing) politics

This week I started on a long term assignment involving the implementation of web application security testing in the SDLC. Although it is fun to do something more structural than the average 'pentest a website and get out' assignment, there's also the element of politics that immediately shows it's head.

For example choosing a scanner .. Although you can get good results with a collection of open-source or freeware tools, sometimes a commercial scanner is the better choice from a political perspective. Especially when there are quite strict regulations about the format of your reporting, choosing a commercial scanner can make your life a lot easier... On the other hand it's absurd to decide on the acquisition of tools based on the format of a report.

It makes you wonder if you should deal with pentest politics or if you should pentest politics.

Corporate Espionage with Google Analytics

With the start of this blog I also installed Google Analytics just to see how it works and what data it collects. What surprised me is the fact that you can add any domain without any form of authentication. The only thing you need to do is add a piece of javascript to the site and add the domain to your profile.
Since most sites have a few XSS holes or other vulnerabilities which you can (ab)use to add this script, a scenario for corporate espionage or information gathering is easy to imagine ...
Am I just being paranoid or could it really be that simple ?

QEMU: Portable Virtualization

Sometimes you find yourself in a situation where you really need that one tool on another LiveCD, but that means rebooting and losing the stuff you're working on (or at least slow you down in the progress).

For this I found QEMU to be very useful. Combined with QEMU Manager this tool provides a nice GUI based portable virtualization tool. Best of all it's able to boot a CD, USB device or ISO.

So put QEMU, QEMU Manager and all of your favorite ISO's on a USB stick and you are able to use all the tools you want, whenever you want. (well .. off course you cannot run any WLAN hacking tools, but that goes without saying).

Fun with Firefox

Besides being a browser, Firefox can be a lot more due to availability of hundreds of add-ons. "FireCAT (Firefox Catalog of Auditing exTension) is a mindmap collection of the most efficient and useful firefox extensions oriented application security auditing and assessment"

The current official version of Firecat is still based on FF2, but most add-ons are also available on FF3. If you want to start using FF3, you should also take a look at some FF3 only add-ons: Cipherfox, Javascript Deobfuscator, JSON View, and Lazarus form recovery. The only big disadvantage of switching to FF3 is the incompatibility of XML developer toolbar for which I did not find a worthy successor yet....

The big disadvantage of using all these add-ons is that if you, for some reason, have to use another machine, you have to install all your favourite add-ons again. To tackle this problem, take a look at Firefox Portable. It is a modified installer of firefox that allows you to install it on an USB stick. All add-ons that you install on FF portable are also instantaneously portable. This way you can always have your fully customized Firefox with you !

LinkedIn group on Web Application Security Testing

I admit, I am spamming my own blog, but I created a LinkedIn group for discussions and knowledge exchange regarding Web Application Security Testing.
Please check it out en join if you're interested.

http://www.linkedin.com/groups?gid=1964541

Going to BruCON 2009 !

Completed the registration this weekend so I'll be at BruCON 2009 !

I'm also participating at one of the trainings to refresh my "hacker-skills", now all I have to do is find a course to refresh my ethics ;)