Upgrade to Pro — share decks privately, control downloads, hide ads and more …

Application Security in .NET

Sponsored · Your Podcast. Everywhere. Effortlessly. Share. Educate. Inspire. Entertain. You do you. We'll handle the rest.
Avatar for James McKee James McKee
September 27, 2016

Application Security in .NET

A surface level talk given at Prarie.Code() 2016. The talk was designed as a introduction to what ACTUAL hacking looks like on websites.

Avatar for James McKee

James McKee

September 27, 2016
Tweet

More Decks by James McKee

Other Decks in Programming

Transcript

  1. Disclaimer • This talk represents my own options and views

    not the opinions of my employer or their employees. • Dave is Cool • He didn’t ask me to do this.
  2. Who Am I? • I have been working as a

    .NET developer since 2005 • Throughout that time I have been focused on developer practices. • I have worked for 8 fortune 500 companies and 3 nationally recognized non-profits in a consulting role. • My current role at BlueBolt Solutions is Security Engineer / Enterprise Architect / Solutions Developer • I am around the internet under the handle @punkcoder
  3. What qualifies me to talk about application security? • Nothing

    really. • Graduated from Murray State with a TSM degree focused on Security. • More than anything this is a passion.
  4. Quick Polls • Have you been the victim of identity

    theft / stolen credit card? • Is this your first security talk? • Does your company have a security plan in place? • How many people have internal security teams? • How many people are testing for security before deployment? • How many people are testing for security after deployment? • Have you been exposed to a security audit? • Have you had your (day, week, month, year) ruined by a security event?
  5. Security Primer • Security Triad • Confidentiality • Integrity •

    Availability • If I can own any one of these I (as the bad guy) have succeeded. • Security is something that isn't important until it's really important.
  6. OWASP Top 10 • Injection * • Broken authentication and

    Session Management * • Cross Site Scripting * • Insecure Direct Object References * • Security Misconfiguration * • Sensitive Data Exposure * • Missing Function Level Access Control • Cross-Site Request Forgery • Using Components with Known Vulnerabilities • Invalidated redirects and forwards
  7. General Data Protection Regulation • GDPR goes into effect May

    25, 2018, and applies to all European Businesses as well as businesses that do business in the EU. • The following sanctions can be imposed: • a warning in writing in cases of first and non-intentional non-compliance • regular periodic data protection audits • a fine up to 10,000,000 EUR or up to 2% of the annual worldwide turnover of the preceding financial year in case of an enterprise, whichever is greater (Article 83, Paragraph 4 [14])) • a fine up to 20,000,000 EUR, or in the case of an undertaking, up to 4% of the total worldwide annual turnover of the preceding financial year, whichever is higher (Article 83, Paragraph 5 & 6[14])”
  8. Fighting the Tide • As with all bugs… The earlier

    that they are detected the easier they are to solve. • This is a problem that is getting worse, and the front line of this war is developers and ops teams. • Education is Essential • Practice is Prevention • Security isn’t something that you can bolt on afterwards, it needs to be part of the initial plan. • Work with people offering responsible disclosure, address issues quickly and communicate effectively.
  9. Building a Culture of Security Awareness • Find Coworkers that

    are interested in security • Get management buy in • Help train other coworkers to spot things that don’t look right and escalate. • Plan events around application security awareness.
  10. References and Stuff to Read • OWASP Top 10 (2013)

    • http://owasptop10.googlecode.com/files/OWASP%20Top%2010%20- %202013.pdf • Writing Secure Code • https://www.amazon.com/Writing-Secure-Code-Strategies- Applications/dp/0735617228 • MSDN: Securing Web Applications • https://msdn.microsoft.com/en-us/library/330a99hc.aspx
  11. Stuff to Do • Hack This Site • https://www.hackthissite.org/pages/index/index.php •

    We Chall • https://www.wechall.net/ • CTF Time • https://ctftime.org/
  12. Evals – No Seriously… • Feed back is the only

    way I can improve and the only way that amegala can help to get only the best speakers. • http://prairiecode.amegala.com/evals • http://prairiecode.amegala.com/evals