Change your Yahoo Password now (ymail,
flickr, …)!
http://www.usatoday.com/story/tech/2016/09/22/report-yahoo-may-
confirm-massive-data-breach/90824934/
Slide 3
Slide 3 text
$ whoami
• Application security engineer 15
years in #appsec industry
• Tech blogger @codiceinsicuro
• Love writing security source code
scanners (Owasp Orizon,
dawnscanner)
• Love talking about application
security
• #appsec tweets available at
@thesp0nge
Slide 4
Slide 4 text
Agenda
• Talk about testing scenarios
• Talk about what an appsec pipe is and what do you
need to create one
• Be inspired, go home and do some homework
Slide 5
Slide 5 text
What do I have to test?
Slide 6
Slide 6 text
No content
Slide 7
Slide 7 text
Testing scenarios
Slide 8
Slide 8 text
We don’t do any test
(and we are aware of it)
Slide 9
Slide 9 text
We don’t do any test
(but I’ll love to do)
Slide 10
Slide 10 text
We do security test
(but I want to learn more about the pipeline)
Slide 11
Slide 11 text
How do we perform
security tests?
Slide 12
Slide 12 text
The unacceptable solution…
• Tests must be done:
• in production environment
• before going live
• Testers need:
• the code being frozen
• some “fake” accounts
• a couple of week to do the job
Slide 13
Slide 13 text
… for a difficult task
• Products can not delay time to market
release to allow security tests
• Tests must be performed on each release
• Often companies do releases on a weekly
basis
• There are no fake accounts on a
production server
• Code is never on a frozen state
• This applies to web properties and
mobile applications
• Tests are not sawn as investment
Slide 14
Slide 14 text
#appsec can’t be done this way
and we’re the first talking our science to the next level
Slide 15
Slide 15 text
The application security
pipeline
Slide 16
Slide 16 text
Before we start
• We need
• Commitment
• An organised SDLC
• A development team aware about
#appsec topic
• An #appsec team (with patience and
some coding skills)
Slide 17
Slide 17 text
Then we can build the #appsec pipeline
(https://www.owasp.org/index.php/OWASP_AppSec_Pipeline)
Slide 18
Slide 18 text
The collector tool
A way for our customer to ask for services, keep track about the progress
and having results back
Slide 19
Slide 19 text
Your favourite collection of #appsec tools
You may want to cover vulnerability assessment, penetration test, web application
penetration test and code review at least. Keep calm and let’s go shopping.
Slide 20
Slide 20 text
The Orchestrator
Your customers ask for services, you need an automatic dispatcher mechanism to
the appropriate tool. Of course you need also something retrieving results too.
Slide 21
Slide 21 text
The ticketing system
You need something to keep track about vulnerabilities, about their history
and their state.
Slide 22
Slide 22 text
The Workflow
(Glue all together)
Slide 23
Slide 23 text
Bonus track - some useful
tools
Slide 24
Slide 24 text
Some tools to check
• Sinatra with Grape (create HTTP API
endpoints)
• Owasp ZAP (WAPT on steroids)
• Owasp DeepViolet (check your SSL config)
• Nexpose + nexpose gem (automate
vulnerability assessment)
• Brakeman/Dawnscanner (ultimate ruby
code review)
• Owasp Orizon (Java security code review)
• Owasp GLUE gem (pipeline related tool)