Slide 1

Slide 1 text

Bulletproof Your Software The Magic of Security Autotests Elmir Iskanderov

Slide 2

Slide 2 text

$ whoami - Elmir Iskanderov linkedin.com/in/iskanderov; - 4 years in cybersecurity; - Application Security Engineer at Cossack Labs; - Specialized in WEB, API, Infrastructure and Cloud penetration testing; - Automatization enjoyer. Cossack Labs - UK/Ukraine data security solutions company. Practical data security and software security in industries where security is a hard requirement.

Slide 3

Slide 3 text

Agenda 1. The Problems We Faced 2. Security Autotest 3. Use Cases 4. Creation Autotests In a Few Clicks 5. Important to Remember 6. Q&A

Slide 4

Slide 4 text

The Problems We Faced - A lot of reported vulnerabilities that we should validate as fixed; - Detect duplicate previously found vulnerabilities; - Spending too much time on validation.

Slide 5

Slide 5 text

Solution

Slide 6

Slide 6 text

Security Autotests - Saving time; - Automated validation of vulnerabilities; - Integration into the CI/CD pipeline; - Tracking previous vulnerabilities; - Creation in a few clicks.

Slide 7

Slide 7 text

Use Cases - Validating HTTP security headers; - Input validation; - Misconfigurations (open files, secrets in code, etc.); - Rate limits.

Slide 8

Slide 8 text

Validating HTTP headers

Slide 9

Slide 9 text

Session Token Revocation

Slide 10

Slide 10 text

Wait wait wait…

Slide 11

Slide 11 text

Real Size of Security Autotests

Slide 12

Slide 12 text

Use templates!!!

Slide 13

Slide 13 text

Template

Slide 14

Slide 14 text

Creation Autotests In a Few Clicks Burp Suite + ‘Copy as Python-Requests’ extension + + your templates

Slide 15

Slide 15 text

Copy As Python-Requests Installation https://github.com/portswigger/copy-as-python-requests

Slide 16

Slide 16 text

Copy As Python-Requests Usage

Slide 17

Slide 17 text

Copy As Python-Requests Usage 2

Slide 18

Slide 18 text

Creation of Security Autotest

Slide 19

Slide 19 text

Creation of security autotest 2

Slide 20

Slide 20 text

Output

Slide 21

Slide 21 text

Pay attention to - Do not trust verifications for high/critical vulnerabilities; - Do not spend too much time on creation (if there are no reasons to automate all); - Use templates for most common issues; - Create a flow for logging in and retrieving session cookies/tokens; - Software is developing, and some automated tests are becoming outdated.

Slide 22

Slide 22 text

QA Q&A