Upgrade to Pro — share decks privately, control downloads, hide ads and more …

OWASP Top 10, Owasp Lagos

ShehuAwwal
September 15, 2017

OWASP Top 10, Owasp Lagos

Discussing on the Owasp A1 injection, But mainly focus on the SQL Injection, Types, And also how to exploit such a vulnerability if exist on a web application.

ShehuAwwal

September 15, 2017
Tweet

More Decks by ShehuAwwal

Other Decks in Programming

Transcript

  1. Agenda • A1 - Injection • Demos with OWASP Mutillidae

    • Practical with SQLi Master For Mastering Different Types Of SQL Injection Types Or Bwapp etc
  2. A1 – SQL Injection(SQLi) • Some possible effects? – Allows

    tampering/stealing of data – Leading To Remote Code Execution (RCE) That allows overtaken of the Server. – And so on. …
  3. A1 – SQL Injection • And what’s the big deal?

    • Has affected many prominent vendors that you might think of.
  4. A1 – Types of SQLi • Error Based • Union

    Based • Blind SQLi Which includes time etc
  5. Testing For SQL Injection? • Break the injection point using

    ‘ or “ • Look for parameters using id=1 and so on. • And have a look at the type of SQL Message Error to identify what type. • Example: http://www.example.com/product?id=1’ OR http://www.example.com/download?id=1”
  6. A1 – Also Test For SQLi Basic Authentication What Is

    It? Let’s Have A Look At OWASP Mutillidae And Test with ‘ OR ‘1’ =‘1 And so on! To Get The Cheat Sheet Search: SQLi Basic Authentication Cheat Sheet.
  7. A1 – Can you spot the SQL Injection type? 1

    - You have an error in your SQL Syntax. 2 – Quoted String not properly terminated 3 – Msg 150: Unclosed Quotation Mark And so on!
  8. A1 – Are We Still Vulnerable To SQL Injection Attack

    Despite New Frameworks and so on? The Answer Is Yes, Not Necessary The SQLi, But other Injection Attack types Under the OWASP A1 Like LDAP, Xpath Injection, LDAP Injection etc
  9. A1 – Output Encoding • Sanitize All User Input Queries

    • Enforce Least Privileges • See https://www.owasp.org/index.php/SQL_Injection_Prevention_Chea t_Sheet
  10. A3 – Use Tools & Libraries • Testing And Exploitation

    Tools: Testing Tools -Acunetix, Vega, Or Manual Testing Explotiation Tools SQLMap, Hajiv, etc
  11. A10 – Unvalidated Redirects/Forwards Use these only if you must:

    • http://www.good.com/redirect.jsp?url=evil.com  Phisher’s heaven! • http://www.example.com/default.jsp?fwd=admin.jsp  ACL into dustbin! VALIDATE AUTHORIZATION! WHITELIST!