The Essentials of Offensive Security in Web Applications

undefined
 
Web
 
Offensive Security
 
Web Overview
 
Web called out specifically
Because web is different than just testing services
More services are moving to the web, often more exposed
As web apps have become more important, they have also
become more complex
 
 
 
Offensive Security
 
2
 
OWASP
 
Open Web Application Security Project
 
Offensive Security
 
3
 
https://www.owasp.org/index.php/Main_Page
 
OWASP Testing Areas
 
Information Gathering
Configuration and Deploy Management Testing
Identity Management Testing
Authentication Testing
Authorization Testing
Session Management Testing
Data Validation Testing
Error Handling
Cryptography
Business Logic Testing
Client Side Testing
 
Offensive Security
 
4
 
https://www.owasp.org/index.php/Testing_Checklist
 
OWASP Top 10
 
1.
Injection
2.
Broken Authentication
3.
Sensitive Data Exposure
4.
XML External Entities (XXE)
5.
Broken Access Control
6.
Security Misconfiguration
 
7.
Cross Site Script (XSS)
8.
Insecure Deserialization
9.
Using Components with
Know Vulnerabilities
10.
Insufficient Logging &
Monitoring
 
Offensive Security
 
5
 
Tools
 
Burp
Zap
Dirbuster/Gobuster
Nikto
Sslscan
Nmap scripts
Google dorks/wayback machine
 
Offensive Security
 
6
 
Web Scoping
 
What does the application do?
Identify functionality and important functionality
 
Offensive Security
 
7
 
Dangerous Portions of Web Apps
 
Automated crawlers click links
Think about ”delete” portions of websites
Update pages
 
What if your crawlers gets into the site as admin?
With delete and update functionality
 
Offensive Security
 
8
 
Request Types
 
 
Offensive Security
 
9
 
Web Methodology
 
Big surface area, requires its own methodology
 
Recon
Mapping
Discovery
Exploitation
Just like our regular methodology
 
Offensive Security
 
10
 
Enumeration
 
Manually browse every
 
 
 
 
Spidering with Burp/Zap
 
Offensive Security
 
11
 
Nikto
 
 
Offensive Security
 
12
 
Resources
 
https://www.redsiege.com/wp-
content/uploads/2018/10/WA101-LayoftheLand.pdf
https://www.owasp.org/images/1/19/OTGv4.pdf
https://github.com/qazbnm456/awesome-web-security
 
 
Offensive Security
 
13
Slide Note
Embed
Share

Comprehensive overview of key aspects of offensive security in web applications including testing areas, OWASP guidelines, top 10 vulnerabilities, essential tools, web scoping, handling dangerous portions, understanding request types, and following a specialized methodology for exploitation. The content emphasizes the importance of securing web applications amidst increasing complexity and risks.

  • Offensive Security
  • Web Applications
  • OWASP
  • Vulnerabilities
  • Web Security

Uploaded on Oct 11, 2024 | 0 Views


Download Presentation

Please find below an Image/Link to download the presentation.

The content on the website is provided AS IS for your information and personal use only. It may not be sold, licensed, or shared on other websites without obtaining consent from the author.If you encounter any issues during the download, it is possible that the publisher has removed the file from their server.

You are allowed to download the files provided on this website for personal or commercial use, subject to the condition that they are used lawfully. All files are the property of their respective owners.

The content on the website is provided AS IS for your information and personal use only. It may not be sold, licensed, or shared on other websites without obtaining consent from the author.

E N D

Presentation Transcript


  1. Web Offensive Security

  2. Web Overview Web called out specifically Because web is different than just testing services More services are moving to the web, often more exposed As web apps have become more important, they have also become more complex Offensive Security 2

  3. OWASP Open Web Application Security Project Offensive Security 3 https://www.owasp.org/index.php/Main_Page

  4. OWASP Testing Areas Information Gathering Configuration and Deploy Management Testing Identity Management Testing Authentication Testing Authorization Testing Session Management Testing Data Validation Testing Error Handling Offensive Security Cryptography Business Logic Testing Client Side Testing 4 https://www.owasp.org/index.php/Testing_Checklist

  5. OWASP Top 10 1. Injection 7. Cross Site Script (XSS) 2. Broken Authentication 8. Insecure Deserialization 3. Sensitive Data Exposure 9. Using Components with Know Vulnerabilities 4. XML External Entities (XXE) 10. Insufficient Logging & Monitoring 5. Broken Access Control 6. Security Misconfiguration Offensive Security 5

  6. Tools Burp Zap Dirbuster/Gobuster Nikto Sslscan Nmap scripts Offensive Security Google dorks/wayback machine 6

  7. Web Scoping What does the application do? Identify functionality and important functionality Offensive Security 7

  8. Dangerous Portions of Web Apps Automated crawlers click links Think about delete portions of websites Update pages What if your crawlers gets into the site as admin? With delete and update functionality Offensive Security 8

  9. Request Types Offensive Security 9

  10. Web Methodology Big surface area, requires its own methodology Recon Mapping Recon Discovery Exploitation Offensive Security Exploitation Mapping Just like our regular methodology Discovery 10

  11. Enumeration Manually browse every Spidering with Burp/Zap Offensive Security 11

  12. Nikto Offensive Security 12

  13. Resources https://www.redsiege.com/wp- content/uploads/2018/10/WA101-LayoftheLand.pdf https://www.owasp.org/images/1/19/OTGv4.pdf https://github.com/qazbnm456/awesome-web-security Offensive Security 13

More Related Content

giItT1WQy@!-/#giItT1WQy@!-/#giItT1WQy@!-/#