session management security and applied reverse benchmarking - tom stracener, sr. security analyst,...

72
Session Management Security and Applied Reverse Benchmarking - Tom Stracener, Sr. Security Analyst, Cenzic Inc. November 2007

Upload: clifton-chandler

Post on 13-Jan-2016

227 views

Category:

Documents


0 download

TRANSCRIPT

Page 1: Session Management Security and Applied Reverse Benchmarking - Tom Stracener, Sr. Security Analyst, Cenzic Inc. November 2007

Session Management Security and Applied Reverse Benchmarking

- Tom Stracener, Sr. Security Analyst, Cenzic Inc.

November 2007

Page 2: Session Management Security and Applied Reverse Benchmarking - Tom Stracener, Sr. Security Analyst, Cenzic Inc. November 2007

Cenzic Confidential2

Agenda

• Security Statistics

• Application Layer Basics

• Session Management Vulnerability Types

• Session Poisoning as a research area

• Reverse Benchmarking as applied to session management testing methods

• Q&A

Page 3: Session Management Security and Applied Reverse Benchmarking - Tom Stracener, Sr. Security Analyst, Cenzic Inc. November 2007

Cenzic Confidential3

Web Vulnerabilities

Source: Cenzic Q3 Application Trends Report

Page 4: Session Management Security and Applied Reverse Benchmarking - Tom Stracener, Sr. Security Analyst, Cenzic Inc. November 2007

Cenzic Confidential4

Web vulnerabilities by Major Type

Source: Cenzic Q3 Application Trends Report

Page 5: Session Management Security and Applied Reverse Benchmarking - Tom Stracener, Sr. Security Analyst, Cenzic Inc. November 2007

Cenzic Confidential5

Web Browser Vulnerabilities

Source: Cenzic Q3 Application Trends Report

Page 6: Session Management Security and Applied Reverse Benchmarking - Tom Stracener, Sr. Security Analyst, Cenzic Inc. November 2007

Cenzic Confidential6

Percentage of Applications by Vulnerability

Source: Cenzic Q3 Application Trends Report – Cenzic ClickToSecure Managed Services

Page 7: Session Management Security and Applied Reverse Benchmarking - Tom Stracener, Sr. Security Analyst, Cenzic Inc. November 2007

Cenzic Confidential7

Incidents by Category

Source: Cenzic Q3 Application Trends Report

Page 8: Session Management Security and Applied Reverse Benchmarking - Tom Stracener, Sr. Security Analyst, Cenzic Inc. November 2007

Cenzic Confidential8

Incidents by Sector

Source: Cenzic Q3 Application Trends Report

Page 9: Session Management Security and Applied Reverse Benchmarking - Tom Stracener, Sr. Security Analyst, Cenzic Inc. November 2007

Cenzic Confidential9

Vulnerability by Class

Source: Cenzic Q3 Application Trends Report

Page 10: Session Management Security and Applied Reverse Benchmarking - Tom Stracener, Sr. Security Analyst, Cenzic Inc. November 2007

Cenzic Confidential10

Anatomy of a web application

Single Factor Session Management

UI Layer (Browser Logic)

Server and Middleware (Session Management)

Custom Applications

Web Browser

JavaScript Plug-Ins/API

Java DOM HTML/DHTML

Cookies

HTTP SSL HTTP-S Authentication Certificates

Digital Signatures

Communication Layer (Protocol Layer)

Web Server SW/HW

J2EE PHPASPJava .NET

Data LayerDatabases SSI Raw Data CSS/XSLXML

File System

JavaScript VB Script C/C++ PHP/LAMP CGI

Page 11: Session Management Security and Applied Reverse Benchmarking - Tom Stracener, Sr. Security Analyst, Cenzic Inc. November 2007

Cenzic Confidential11

Session Mgmt Overview

HTTP is a stateless protocol.

A Session identifies a user with a persistent (but changing) state within the application.

Web Applications must track and maintain state for a user across application boundaries over time.

99% of all session management mechanisms offer single-factor protection and were not designed for security.

Page 12: Session Management Security and Applied Reverse Benchmarking - Tom Stracener, Sr. Security Analyst, Cenzic Inc. November 2007

Cenzic Confidential12

Session Mgmt Overview

Types of session management mechanisms

• Cookies (RFC 2109,

• HTML Hidden Field Values

• URL Tokens

• Ex.

http://eBiz/Cart/checkout.php?session_id=2006011617415164.60.123.42&pid=&cat_id=&attrib

Page 13: Session Management Security and Applied Reverse Benchmarking - Tom Stracener, Sr. Security Analyst, Cenzic Inc. November 2007

Cenzic Confidential13

3 Challenges of Session Mgmt Security

1. Web Applications must maintain state securely

User session data must individuate one user from another so that state information does not overlap, for the purpose of enforcing proper user privileges and roles.

Ex. User 2Pac (registered user), 50Cent (Admin), Master P (anonymous) have access to different pages and functions within the application.

Page 14: Session Management Security and Applied Reverse Benchmarking - Tom Stracener, Sr. Security Analyst, Cenzic Inc. November 2007

Cenzic Confidential14

3 Challenges of Session Mgmt Security

2. Distributed Components within Web Applications must share user session information securely

User session data must be shared and validated by application components that process user requests and information associated with a user.

Ex. Shopping Cart (Add/remove items), Wish List (Add/Remove items), Checkout & Transaction (SSL), Confirmation of Order (SSL), Reciept (SSL)

Page 15: Session Management Security and Applied Reverse Benchmarking - Tom Stracener, Sr. Security Analyst, Cenzic Inc. November 2007

Cenzic Confidential15

3 Challenges of Session Mgmt Security

3. State maintaining mechanisms must handle state transitions securely as the user moves between functional hierarchies.

As the user’s privilege level changes within the application, state tracking must securely handle these transitions without data leaks or exposures.

Ex. Spot (anonymous) authenticates and adds several items to his wishlist (registered) and then makes a purchase (SSL-cart) by selecting an item and performing the transaction (SSL-cart). The transaction details are stored in Spots purchase history (SSL-cart).

Page 16: Session Management Security and Applied Reverse Benchmarking - Tom Stracener, Sr. Security Analyst, Cenzic Inc. November 2007

Cenzic Confidential16

Misconceptions Regarding Session Security

“Our Sessions are Secure”

“There really aren’t any exploits”

“Our Session IDs aren’t predictable so we are safe.”

Page 17: Session Management Security and Applied Reverse Benchmarking - Tom Stracener, Sr. Security Analyst, Cenzic Inc. November 2007

Cenzic Confidential17

Cookie Security Flaws

Cookie Tampering

Cookie Persistence and Expiration

Types of Cookie Security Flaws

Cookie Theft/Hijacking (single factor attack)

Cross-Site Cooking (Cookie Based Session Fixation)

Page 18: Session Management Security and Applied Reverse Benchmarking - Tom Stracener, Sr. Security Analyst, Cenzic Inc. November 2007

Cenzic Confidential18

Cookie Security Flaws

Session Replay Attacks\Expiration

Session Poisoning (New)

Types of Session ID Flaws

Session Hijacking (single factor attack)

Session Tampering\Prediction

Page 19: Session Management Security and Applied Reverse Benchmarking - Tom Stracener, Sr. Security Analyst, Cenzic Inc. November 2007

Cenzic Confidential19

Session Vulnerabilities and Examples

Insecure Session Teardown/Session Timeout

The Session IDs used during a session are not removed following termination or inactivity of a session, allowing the Session IDs to be reused by an attacker to access the previous users session. (non-concurrent attack)

S1…………S1…………..L1……….S1

T1………….T2………….T3…………T4

Reuse of S1 following Logout L1

Page 20: Session Management Security and Applied Reverse Benchmarking - Tom Stracener, Sr. Security Analyst, Cenzic Inc. November 2007

Cenzic Confidential20

Session Vulnerabilities and Examples

Session Replay Attacks

Session information persistently stored by an intermediate server or

application is reused to access a users session.

1. Caching Proxies

2. Web Proxies\Reverse Proxies

3. Internet Gateways

4. Logging Servers/Webtrends, etc.

URL-based Session IDs can be cached in web logs, Proxy Servers, logged in

HTTP Referrer Fields. A Session replay attack involves uses these

credentials to gain access to the application to take over an existing session.

Page 21: Session Management Security and Applied Reverse Benchmarking - Tom Stracener, Sr. Security Analyst, Cenzic Inc. November 2007

Cenzic Confidential21

Session Vulnerabilities and Examples

Session ID Prediction

Generating Sequential Session IDs is dangerous, as an attacker can predict the next value and take over a concurrent session.

Using static information like the data and IP addresses in Session IDs can allow an attacker to analyze and break down the session ID, making it easier to brute force valid session tokens.

/Cart/checkout.php?session_id=2006011617415164.60.123.42&pid=&cat_id=&attrib

/Cart/checkout.php?session_id=2006011617416164.60.123.42&pid=&cat_id=&attrib

/Cart/checkout.php?session_id=2006011617417164.60.123.42&pid=&cat_id=&attrib

/Cart/checkout.php?session_id=2006011617418164.60.123.42&pid=&cat_id=&attrib

Page 22: Session Management Security and Applied Reverse Benchmarking - Tom Stracener, Sr. Security Analyst, Cenzic Inc. November 2007

Cenzic Confidential22

Session Vulnerabilities and Examples

Session ID Prediction (Example)

Page 23: Session Management Security and Applied Reverse Benchmarking - Tom Stracener, Sr. Security Analyst, Cenzic Inc. November 2007

Cenzic Confidential23

Session Vulnerabilities and Examples

Session Hijacking Attacker submits a concurrent request with a valid session ID for

a current user and gains access to their web session. The attack can involve combinations of other attacks to capture a live Session ID, or could capture unencrypted Session Tokens from the LAN.

Brute Force attacks against Session IDs.

Local Sniffer-based attacks

Cookie Reuse.

URL Session ID Harvesting/logging via proxy or XSS.

Page 24: Session Management Security and Applied Reverse Benchmarking - Tom Stracener, Sr. Security Analyst, Cenzic Inc. November 2007

Cenzic Confidential24

Session Vulnerabilities and Examples

Session Fixation

Attacker fixes the user’s session ID prior to authentication, so that the Session ID

supplied by the attacker is used by the application.

Depends upon the application trusting the session ID supplied by the client. The

ability to generate or predict Session IDS that are valid for the Session Token

syntax makes the attack more likely to succeed.

Page 25: Session Management Security and Applied Reverse Benchmarking - Tom Stracener, Sr. Security Analyst, Cenzic Inc. November 2007

Cenzic Confidential25

Session Vulnerabilities and Examples

Session ID Poisoning (New Research Area)

Attacker appends arbitrary data to a users session ID, resulting in potentially unsafe content being propagated via the Session ID mechanism.

Depends upon the application sanitizing the session ID.

Session_id=ghzdkfl11020003<script>maliciouscontent<script>

Page 26: Session Management Security and Applied Reverse Benchmarking - Tom Stracener, Sr. Security Analyst, Cenzic Inc. November 2007

Cenzic Confidential26

Hailstorm Overview

Session Poisoning Attack Example

ttp://www.internet.com/forums/viewtopic.php?p=36660&sid=15170326da8f83631f59d120a6dea3f8<script>alert(document.cookie)</script>

Characteristics of the attack

1. Malicious Content “Piggiebacks” on a session ID

2. Content is innocuous to the attacked application

3. Malicious Content logged by intermediaries

4. Malicious Content executed (reflected) by an intermediary (e.g. a web proxy server).

Page 27: Session Management Security and Applied Reverse Benchmarking - Tom Stracener, Sr. Security Analyst, Cenzic Inc. November 2007

Cenzic Confidential27

Hailstorm Overview

Session Poisoning Attack Example

Characteristics of the attack

1. Malicious Content “Piggiebacks” on a session ID

2. Content is innocuous to the attacked application

3. Malicious Content logged by intermediaries

4. Malicious Content executed (reflected) by an intermediary (e.g. a web proxy server).

Page 28: Session Management Security and Applied Reverse Benchmarking - Tom Stracener, Sr. Security Analyst, Cenzic Inc. November 2007

Cenzic Confidential28

Versions of PHP are vulnerable when used in conjunction with software that relies on PHP Session Management mechanisms.Verified on Apache/2.0.55 (Win32) PHP/5.1.2

Page 29: Session Management Security and Applied Reverse Benchmarking - Tom Stracener, Sr. Security Analyst, Cenzic Inc. November 2007

Cenzic Confidential29

Reverse Benchmarking & Session Management Security Testing Procedures.

(A scanner darkly)

Page 30: Session Management Security and Applied Reverse Benchmarking - Tom Stracener, Sr. Security Analyst, Cenzic Inc. November 2007

Cenzic Confidential30

Analyzing Application Security Scanners

Security Assessment Methods and Quality-based Criteria

• Functionality (Black vs White Box)

• Ergonomics & Usability

• Performance

• Feature Sets

• Bling

• Accuracy

• False Positive Rates i.e. Signal to Noise

Page 31: Session Management Security and Applied Reverse Benchmarking - Tom Stracener, Sr. Security Analyst, Cenzic Inc. November 2007

Cenzic Confidential31

Analyzing Application Security Scanners

Benchmarking Concepts

• Benchmarking black box scanners is ultimately a systematic comparison

• Most common Benchmarking technique is ‘positive’ or ‘comparative’ benchmarking

• The goal is to see which scanner does the best against a selected application

Page 32: Session Management Security and Applied Reverse Benchmarking - Tom Stracener, Sr. Security Analyst, Cenzic Inc. November 2007

Cenzic Confidential32

Positive and Negative Accuracy concepts

Detection Metrics Matrix

Page 33: Session Management Security and Applied Reverse Benchmarking - Tom Stracener, Sr. Security Analyst, Cenzic Inc. November 2007

Cenzic Confidential33

What is Reverse Benchmarking?

• It’s a type of passive Reverse Engineering.• Taxonomic understanding of False Positives • Causes Massive False Positives• Understanding vulnerability detection methods• Think of it as Detection Logic Fuzzing

Exposes poor coding, faulty detection logic Reveals Security Testing design flaws Confuses Stateless Testing Mechanisms

Page 34: Session Management Security and Applied Reverse Benchmarking - Tom Stracener, Sr. Security Analyst, Cenzic Inc. November 2007

Cenzic Confidential34

Rationale for Reverse Benchmarking

Most of the Common False Positive Types have been around since 1999-2000

Most testing mechanisms are entirely stateless and have evolved little

Very little is known about False Positives, as a science

There are no taxonomies or Top 10 lists for Common False Positive Types

Page 35: Session Management Security and Applied Reverse Benchmarking - Tom Stracener, Sr. Security Analyst, Cenzic Inc. November 2007

Cenzic Confidential35

Reverse Benchmark Target

Web Application Scanner

Enumerates and Categorizes False Positive Types

Reveals Vacuous or Meaningless results

Reveals Semantic flaws in vulnerability Categorization

Reveals systemic flaws in application spider technology

Page 36: Session Management Security and Applied Reverse Benchmarking - Tom Stracener, Sr. Security Analyst, Cenzic Inc. November 2007

Cenzic Confidential36

Positive and Negative Accuracy concepts

Detection Metrics Matrix

Page 37: Session Management Security and Applied Reverse Benchmarking - Tom Stracener, Sr. Security Analyst, Cenzic Inc. November 2007

Cenzic Confidential37

Positive and Negative Accuracy concepts

Detection Metrics Matrix

Page 38: Session Management Security and Applied Reverse Benchmarking - Tom Stracener, Sr. Security Analyst, Cenzic Inc. November 2007

Cenzic Confidential38

Positive and Negative Accuracy concepts

Detection Metrics Matrix

Page 39: Session Management Security and Applied Reverse Benchmarking - Tom Stracener, Sr. Security Analyst, Cenzic Inc. November 2007

Cenzic Confidential39

Hailstorm Overview

Reverse Benchmarking Example• 4 page test target• Generated over 57,000 False Positives.

Page 40: Session Management Security and Applied Reverse Benchmarking - Tom Stracener, Sr. Security Analyst, Cenzic Inc. November 2007

Cenzic Confidential40

Session Hijacking SmartAttack

Page 41: Session Management Security and Applied Reverse Benchmarking - Tom Stracener, Sr. Security Analyst, Cenzic Inc. November 2007

Cenzic Confidential41

Session Hijacking SmartAttack

Page 42: Session Management Security and Applied Reverse Benchmarking - Tom Stracener, Sr. Security Analyst, Cenzic Inc. November 2007

Cenzic Confidential42

Reverse Benchmarking Methodology

Page 43: Session Management Security and Applied Reverse Benchmarking - Tom Stracener, Sr. Security Analyst, Cenzic Inc. November 2007

Cenzic Confidential43

Reverse Benchmarking Goals

The goal of Reverse Benchmarking is not to malign vendors, but to aid the security community and help developers avoid the same mistakes with each new generation of technology

Systematically performed, Reverse Benchmarking can help security practioners learn to quickly distinguish false positives from valid security issues, as they will learn the conditions under which the

technology they are using fails.

Based on the type of trigger that elicits the false positive, a taxonomy of false positive types can be developed. A set of common causes or contributing factors for each type can be outlined.

Page 44: Session Management Security and Applied Reverse Benchmarking - Tom Stracener, Sr. Security Analyst, Cenzic Inc. November 2007

Cenzic Confidential44

Out of Session FaultsDetection of session management security issues under the mistaken assumption that a session exists when in fact it does not, or the scanner has lost state with the application.

In Session parameters

In Session Progression

Stateless

Progression

Common Causes of False Positives

Page 45: Session Management Security and Applied Reverse Benchmarking - Tom Stracener, Sr. Security Analyst, Cenzic Inc. November 2007

Cenzic Confidential45

Partial Match ProblemsDetection strings may be a subset of existing content and triggered by the presence of unrelated words or elements within the HTML or DOM

GET /search.pl~bak

July 2007 200 OK

Common Causes of False Positives

Page 46: Session Management Security and Applied Reverse Benchmarking - Tom Stracener, Sr. Security Analyst, Cenzic Inc. November 2007

Cenzic Confidential46

Parameter EchoingParameter values may be echoed back in places within a web application, and this can trigger false positives.

<TEXTAREA rows=3 ls=100>

<?php

// get the form data

$field1 = $_POST['comments'];

// Echo the value of the comments parameter

echo "Backacha Biatch: $field1";

?>

</TEXTAREA>

Page 47: Session Management Security and Applied Reverse Benchmarking - Tom Stracener, Sr. Security Analyst, Cenzic Inc. November 2007

Cenzic Confidential47

Mistaken Identity

Some security tests look for vulnerability conditions so general that the vulnerability reported must be disambiguated in order to be

verified.

Many types of PHP forum software, Calendars, Blogs reuse a common code base and so overlapping URI and application responses

GET /search.pl

Alibaba Search Overflow Paul’s Search SQL InjXn

YABB Search.pl XSS

Page 48: Session Management Security and Applied Reverse Benchmarking - Tom Stracener, Sr. Security Analyst, Cenzic Inc. November 2007

Cenzic Confidential48

Semantic Ambiguity

Signature-based detection is often relies on signatures that are generic and thus are neither necessary nor sufficient for the vulnerability to be present.

[Microsoft][ODBC SQL Server Driver]

Many false positives arise because the vulnerability is more complex than the vulnerability conditions checked for by the signatures.

Page 49: Session Management Security and Applied Reverse Benchmarking - Tom Stracener, Sr. Security Analyst, Cenzic Inc. November 2007

Cenzic Confidential49

Response Timing

Slow, unresponsive, or delayed server-side processing can trigger security checks that are timing dependent

Some SQL injection tests use a wait_for_delay expression and measure the timing.

Page 50: Session Management Security and Applied Reverse Benchmarking - Tom Stracener, Sr. Security Analyst, Cenzic Inc. November 2007

Cenzic Confidential50

Custom 404 Pages

Simple file scanning routines and other security tests will trigger erroneously in the

presence of custom 404 pages.

Some signatures are based on 302 Redirects

GET /search.pl~bak

302 200

Page 51: Session Management Security and Applied Reverse Benchmarking - Tom Stracener, Sr. Security Analyst, Cenzic Inc. November 2007

Cenzic Confidential51

Custom 404 Pages

Simple file scanning routines and other security tests will trigger erroneously in the

presence of custom 404 pages.

Some signatures are based on 302 Redirects

GET /search.pl~bak

302 200

Page 52: Session Management Security and Applied Reverse Benchmarking - Tom Stracener, Sr. Security Analyst, Cenzic Inc. November 2007

Cenzic Confidential52

Creating a Reverse Benchmark target

Nature of the target will depend on your goals as a researcher

Reverse Engineering

1. Emphasis on exposing as much of the signature base and rule set as possible without inspecting datafiles or code. Clear generic cases that will likely impact the largest portion of the rule base

2. Focus on generic trigger signatures, including available open source scanners. (i.e. use of Nikto detections strings in response data.

Page 53: Session Management Security and Applied Reverse Benchmarking - Tom Stracener, Sr. Security Analyst, Cenzic Inc. November 2007

Cenzic Confidential53

Creating a Reverse Benchmark target

Nature of the target will depend on your goals as a researcher

Bakeoffs/Comparisons

1. Emphasis on exposing false positives or signature flaws of all varieties, including the uncommon or essoteric. Use of non-standard or overly difficult application configuration to stress test the scanner.

2. Focus on unusual or non-standard trigger signatures. i.e. Javascript or Flash road test

Page 54: Session Management Security and Applied Reverse Benchmarking - Tom Stracener, Sr. Security Analyst, Cenzic Inc. November 2007

Cenzic Confidential54

Creating a Reverse Benchmark target

Nature of the target will depend on your goals as a researcher

Reverse Engineering

Page 55: Session Management Security and Applied Reverse Benchmarking - Tom Stracener, Sr. Security Analyst, Cenzic Inc. November 2007

Cenzic Confidential55

Open Reverse Benchmarking Project

Nature of the target will depend on your goals as a researcher

Page 56: Session Management Security and Applied Reverse Benchmarking - Tom Stracener, Sr. Security Analyst, Cenzic Inc. November 2007

Cenzic Confidential56

Backatcha Roadtest Results Overview

Took 4 popular blackbox web application security scanners

Ran their default policies against the target reverse benchmarking application

Put the results into high level buckets

Generated a few graphs with the results

Page 57: Session Management Security and Applied Reverse Benchmarking - Tom Stracener, Sr. Security Analyst, Cenzic Inc. November 2007

Cenzic Confidential57

Total False Positives

92%

2% 2%

4%

Scanner 1

Scanner 2

Scanner 3

Scanner 4

Page 58: Session Management Security and Applied Reverse Benchmarking - Tom Stracener, Sr. Security Analyst, Cenzic Inc. November 2007

Cenzic Confidential58

Out of 4 scanners, 1 scanner generated 92% of the false positive volume

Roughly 9000 false positives total

3 other scanners came in at 2%, 2% and 4%.

In terms of numbers, our 3 page application generated 180, 180, and 360 false positives in the remaining scanners

Total False Positives

92%

2% 2%

4%

Scanner 1

Scanner 2

Scanner 3

Scanner 4

Page 59: Session Management Security and Applied Reverse Benchmarking - Tom Stracener, Sr. Security Analyst, Cenzic Inc. November 2007

Cenzic Confidential59

Scanner 1 False Positives

42%

5%2%7%

30%

14%0%

Path Manipulation

Command Injection

XSS

SQL Injection

File Disclosure

Known Vulnerabilities

Misconfigurations

Page 60: Session Management Security and Applied Reverse Benchmarking - Tom Stracener, Sr. Security Analyst, Cenzic Inc. November 2007

Cenzic Confidential60

Scanner 2 False Positives

29%

11%

4%

21%

21%

0%

14%

Path Manipulation

Command Injection

XSS

SQL Injection

File Disclosure

Known Vulnerabilities

Misconfigurations

Page 61: Session Management Security and Applied Reverse Benchmarking - Tom Stracener, Sr. Security Analyst, Cenzic Inc. November 2007

Cenzic Confidential61

Scanner 3 False Positives

0%

29%

67%

2%

1%

0%

1%

Path Manipulation

Command Injection

XSS

SQL Injection

File Disclosure

Known Vulnerabilities

Misconfigurations

Page 62: Session Management Security and Applied Reverse Benchmarking - Tom Stracener, Sr. Security Analyst, Cenzic Inc. November 2007

Cenzic Confidential62

Scanner 4 False Positives

4%

0%

53%

0%

7%

0%

36%

Path Manipulation

Command Injection

XSS

SQL Injection

File Disclosure

Known Vulnerabilities

Misconfigurations

Page 63: Session Management Security and Applied Reverse Benchmarking - Tom Stracener, Sr. Security Analyst, Cenzic Inc. November 2007

Cenzic Confidential63

Further Research

Improve reverse benchmarking target

Add more tests

Improve testing methodology

Test with more scanners

Partner with OWASP

Help develop Reverse Benchmarking Module for SiteGenerator

Page 64: Session Management Security and Applied Reverse Benchmarking - Tom Stracener, Sr. Security Analyst, Cenzic Inc. November 2007

Cenzic Confidential64

Hailstorm Overview

SmartAttack Library provides for robust testing and analysis of Session Security

Session Management SmartAttacks target a wide-range of Session-Based vulnerabilities.

Session Hijacking

Privilege Escalation

Authorization Boundary

Page 65: Session Management Security and Applied Reverse Benchmarking - Tom Stracener, Sr. Security Analyst, Cenzic Inc. November 2007

Cenzic Confidential65

Session Hijacking SmartAttack

Page 66: Session Management Security and Applied Reverse Benchmarking - Tom Stracener, Sr. Security Analyst, Cenzic Inc. November 2007

Cenzic Confidential66

Privilege Escalation SmartAttack

The SmartAttack gathers session credentials from a previous user and injects them in a more privileged user’s session. Pages accessible only by the privileged user should not be accessible using the gathered session credentials if the sessions are maintained correctly

Page 67: Session Management Security and Applied Reverse Benchmarking - Tom Stracener, Sr. Security Analyst, Cenzic Inc. November 2007

Cenzic Confidential67

Privilege Escalation SmartAttack

Page 68: Session Management Security and Applied Reverse Benchmarking - Tom Stracener, Sr. Security Analyst, Cenzic Inc. November 2007

Cenzic Confidential68

Session Expiration

The SmartAttack gathers session credentials from a previous user and injects them into a different session once the first user logs out. Pages accessible with these credentials are vulnerable to session id/cookie reuse-based attacks.

Page 69: Session Management Security and Applied Reverse Benchmarking - Tom Stracener, Sr. Security Analyst, Cenzic Inc. November 2007

Cenzic Confidential69

Authorization Boundary

The SmartAttack takes an application traversal by a previous user and attempts to access pages restricted to that user by suppressing session credentials. Tests for authentication/authorization boundaries within an application, and also detects fail open bugs in session management.

Page 70: Session Management Security and Applied Reverse Benchmarking - Tom Stracener, Sr. Security Analyst, Cenzic Inc. November 2007

Cenzic Confidential70

Authorization Boundary

The SmartAttack takes an application traversal by a previous user and attempts to access pages restricted to that user by suppressing session credentials. Tests for authentication/authorization boundaries within an application, and also detects fail open bugs in session management.

Page 71: Session Management Security and Applied Reverse Benchmarking - Tom Stracener, Sr. Security Analyst, Cenzic Inc. November 2007

Cenzic Confidential71

Thank You for Your Time!

Tom Stracener

For more info: [email protected] or 1-866-4-CENZIC (1-866-423-6942)

Page 72: Session Management Security and Applied Reverse Benchmarking - Tom Stracener, Sr. Security Analyst, Cenzic Inc. November 2007

Cenzic Confidential72

Questions & Answers