SlideShare una empresa de Scribd logo
1 de 17
Black-box* Security Testing
(*for some definitions of black)
Jari Saukkonen
12.9.2013 www.ambientia.net 1
Jari Saukkonen
• Software Architect
• Hands-on development and problem solving at
Ambientia since 1998
• Involved in Liferay-based projects from Liferay
5.1 onwards
• Hobby pianist, (astro)photographer, rhythm
game addict, and a fan of good tea.
12.9.2013 www.ambientia.net 2
Everyone knows this
• All nontrivial software has bugs
• Keeping your software up-to-date is important
12.9.2013 www.ambientia.net 3
Why am I not up-to-date, then?
• You might not have the personnel or contractors
to look after your installation
• The fixes might not be available for your (older)
product version
• You might be using a Liferay-derivative product,
making the version choice out of your control
• ”works for me”
12.9.2013 www.ambientia.net 4
Liferay CE vs. EE
• Community Security Team maintains patches for
the latest CE version
• Liferay Support provides the latest security fixes
for Liferay EE as they are implemented. You can
choose individually which patches to apply.
• EE patches are backported to previous Liferay
versions as long as they are supported
12.9.2013 www.ambientia.net 5
Patching Tool
• Liferay Enterprise Edition comes with a
dedicated patching tool
• Finds out which patches are relevant for your
installation and applies them
• Easy to use!
12.9.2013 www.ambientia.net 6
Black-box Testing
• Definition: Determine the functionality of a
system without knowledge of its internal
structures
• Automated (security scanners) or manual
process
• Useful for testing unknown, possibly very
customized systems
12.9.2013 www.ambientia.net 7
Automated security scanners
• Pros:
• Press button, wait, receive results
• Good for searching generic problems such as XSS
exploits or SQL injections
• Cons:
• Liferay vulnerabilities not widely implemented in third
party products
• Results always need interpretation, false positives are
common with certain types of searches
12.9.2013 www.ambientia.net 8
Manual testing
1. Find out your (more or less) exact Liferay
version
2. Search http://issues.liferay.com for security
issues affecting your version
3. Try to reproduce the issues in your
environment
• This is not always easy..
12.9.2013 www.ambientia.net 9
Essential tools
• Browser debugger
• Firebug
• Chrome Developer Tools
• Request editing tool for custom GET/POST –
requests
• curl
• Fiddler
• Creativity!
12.9.2013 www.ambientia.net 10
Typical security problems I
• LPS-8374, Access to the default view of all
portlets
• Including /enterprise_admin/view that can
display all user accounts on the server
• Since: 5.1.2, fixed in 5.2 EE SP4, 6.0 EE SP3,
6.1 CE GA2
12.9.2013 www.ambientia.net 11
Typical security problems II
• LPS-28222, Remote Denial of Service that
prevents server startup
• Requires manual database cleanup to recover
• Since: 5.2.3, fixed in 6.1.1 CE/EE GA2
• LPS-29268, Remote Denial of Service that fills
the database with PortletPreferences
• Requires manual database cleanup to recover
• Since: 6.0.6 GA, fixed in 6.1 CE/EE GA 3
12.9.2013 www.ambientia.net 12
Typical security problems III
• Various XSS issues
• Portlet-specific problems, you need to use the portlet
to be vulnerable
• Usually not very long-lived, but may be present in
older versions
• OS-level problems, e.g. a vulnerable httpd
version
12.9.2013 www.ambientia.net 13
How to secure my server?
• EE customers can receive notices when security
patches are released  have a process in place
to handle them in a timely manner
• https://www.liferay.com/community/security-
team/known-vulnerabilities
• Security Advisories –forum on liferay.com
12.9.2013 www.ambientia.net 14
Keep your Liferay safe!
12.9.2013 www.ambientia.net 15
Questions?
12.9.2013 www.ambientia.net 16
Black box security testing

Más contenido relacionado

La actualidad más candente

La actualidad más candente (20)

Company Profile
Company ProfileCompany Profile
Company Profile
 
WordPress Security: Beyond The Plugin
WordPress Security:  Beyond The PluginWordPress Security:  Beyond The Plugin
WordPress Security: Beyond The Plugin
 
AWS Summit Singapore 2019 | Pragmatic Container Security
AWS Summit Singapore 2019 | Pragmatic Container SecurityAWS Summit Singapore 2019 | Pragmatic Container Security
AWS Summit Singapore 2019 | Pragmatic Container Security
 
Agile and Secure SDLC
Agile and Secure SDLCAgile and Secure SDLC
Agile and Secure SDLC
 
A Brief Insight into Penetration Testing
A Brief Insight into Penetration TestingA Brief Insight into Penetration Testing
A Brief Insight into Penetration Testing
 
Fix it utilities preview by a2zcrack
Fix it utilities preview by a2zcrackFix it utilities preview by a2zcrack
Fix it utilities preview by a2zcrack
 
Renato Rodrigues - Security in the wild
Renato Rodrigues - Security in the wildRenato Rodrigues - Security in the wild
Renato Rodrigues - Security in the wild
 
Cloud Security Zen: Principles to Meditate On
Cloud Security Zen: Principles to Meditate OnCloud Security Zen: Principles to Meditate On
Cloud Security Zen: Principles to Meditate On
 
Managing Organizational Security with Seqrite Cloud
Managing Organizational Security with Seqrite CloudManaging Organizational Security with Seqrite Cloud
Managing Organizational Security with Seqrite Cloud
 
Quickstart for continuous integration
Quickstart for continuous integrationQuickstart for continuous integration
Quickstart for continuous integration
 
Is Your Mobile App Secure?
Is Your Mobile App Secure?Is Your Mobile App Secure?
Is Your Mobile App Secure?
 
DevOps
DevOpsDevOps
DevOps
 
Dmitriy Desyatkov "Secure SDLC or Security Culture to be or not to be"
Dmitriy Desyatkov "Secure SDLC or Security Culture to be or not to be"Dmitriy Desyatkov "Secure SDLC or Security Culture to be or not to be"
Dmitriy Desyatkov "Secure SDLC or Security Culture to be or not to be"
 
Towards Continuous Delivery in Mobile Apps
Towards Continuous Delivery in Mobile AppsTowards Continuous Delivery in Mobile Apps
Towards Continuous Delivery in Mobile Apps
 
Test Strategies in Microservices
Test Strategies in MicroservicesTest Strategies in Microservices
Test Strategies in Microservices
 
The Internet of Insecure Things: 10 Most Wanted List
The Internet of Insecure Things: 10 Most Wanted ListThe Internet of Insecure Things: 10 Most Wanted List
The Internet of Insecure Things: 10 Most Wanted List
 
Continuous and Visible Security Testing with BDD-Security
Continuous and Visible Security Testing with BDD-SecurityContinuous and Visible Security Testing with BDD-Security
Continuous and Visible Security Testing with BDD-Security
 
Secure Software Development Lifecycle
Secure Software Development LifecycleSecure Software Development Lifecycle
Secure Software Development Lifecycle
 
Proactive Security AppSec Case Study
Proactive Security AppSec Case StudyProactive Security AppSec Case Study
Proactive Security AppSec Case Study
 
Building Security Controls around Attack Models
Building Security Controls around Attack ModelsBuilding Security Controls around Attack Models
Building Security Controls around Attack Models
 

Similar a Black box security testing

BlackHat Presentation - Lies and Damn Lies: Getting past the Hype of Endpoint...
BlackHat Presentation - Lies and Damn Lies: Getting past the Hype of Endpoint...BlackHat Presentation - Lies and Damn Lies: Getting past the Hype of Endpoint...
BlackHat Presentation - Lies and Damn Lies: Getting past the Hype of Endpoint...
Mike Spaulding
 
Networking 2016-06-14 - The Dirty Secrets of Enterprise Security by Kevin Dunn
Networking 2016-06-14 - The Dirty Secrets of Enterprise Security by Kevin DunnNetworking 2016-06-14 - The Dirty Secrets of Enterprise Security by Kevin Dunn
Networking 2016-06-14 - The Dirty Secrets of Enterprise Security by Kevin Dunn
North Texas Chapter of the ISSA
 
Hugo Fiennes - Security and the IoT - Electric Imp
Hugo Fiennes - Security and the IoT - Electric ImpHugo Fiennes - Security and the IoT - Electric Imp
Hugo Fiennes - Security and the IoT - Electric Imp
Business of Software Conference
 

Similar a Black box security testing (20)

System hardening - OS and Application
System hardening - OS and ApplicationSystem hardening - OS and Application
System hardening - OS and Application
 
GrrCon 2014: Security On the Cheap
GrrCon 2014: Security On the CheapGrrCon 2014: Security On the Cheap
GrrCon 2014: Security On the Cheap
 
BlackHat Presentation - Lies and Damn Lies: Getting past the Hype of Endpoint...
BlackHat Presentation - Lies and Damn Lies: Getting past the Hype of Endpoint...BlackHat Presentation - Lies and Damn Lies: Getting past the Hype of Endpoint...
BlackHat Presentation - Lies and Damn Lies: Getting past the Hype of Endpoint...
 
Avc per 201206_en
Avc per 201206_enAvc per 201206_en
Avc per 201206_en
 
Chapter 9 Client and application Security
Chapter 9 Client and application SecurityChapter 9 Client and application Security
Chapter 9 Client and application Security
 
QRadar_CEddfdfdsfdfdfdfdfdfdfdfdfdfdff.pdf
QRadar_CEddfdfdsfdfdfdfdfdfdfdfdfdfdff.pdfQRadar_CEddfdfdsfdfdfdfdfdfdfdfdfdfdff.pdf
QRadar_CEddfdfdsfdfdfdfdfdfdfdfdfdfdff.pdf
 
Debugging,Troubleshooting & Monitoring Distributed Web & Cloud Applications a...
Debugging,Troubleshooting & Monitoring Distributed Web & Cloud Applications a...Debugging,Troubleshooting & Monitoring Distributed Web & Cloud Applications a...
Debugging,Troubleshooting & Monitoring Distributed Web & Cloud Applications a...
 
Applying formal methods to existing software by B.Monate
Applying formal methods to existing software by B.MonateApplying formal methods to existing software by B.Monate
Applying formal methods to existing software by B.Monate
 
Life as an enterprise security geek from underground. (What enterprises want ...
Life as an enterprise security geek from underground. (What enterprises want ...Life as an enterprise security geek from underground. (What enterprises want ...
Life as an enterprise security geek from underground. (What enterprises want ...
 
Windows updates by Rithyvong neou
Windows updates by Rithyvong neouWindows updates by Rithyvong neou
Windows updates by Rithyvong neou
 
How to prepare a project for automated deployment?
How to prepare a project for automated deployment?How to prepare a project for automated deployment?
How to prepare a project for automated deployment?
 
Yow connected developing secure i os applications
Yow connected   developing secure i os applicationsYow connected   developing secure i os applications
Yow connected developing secure i os applications
 
AV-Comparatives Performance Test
AV-Comparatives Performance TestAV-Comparatives Performance Test
AV-Comparatives Performance Test
 
Networking 2016-06-14 - The Dirty Secrets of Enterprise Security by Kevin Dunn
Networking 2016-06-14 - The Dirty Secrets of Enterprise Security by Kevin DunnNetworking 2016-06-14 - The Dirty Secrets of Enterprise Security by Kevin Dunn
Networking 2016-06-14 - The Dirty Secrets of Enterprise Security by Kevin Dunn
 
Troubleshooting Anypoint Platform
Troubleshooting Anypoint PlatformTroubleshooting Anypoint Platform
Troubleshooting Anypoint Platform
 
Hardware Security on Vehicles
Hardware Security on VehiclesHardware Security on Vehicles
Hardware Security on Vehicles
 
Hugo Fiennes - Security and the IoT - Electric Imp
Hugo Fiennes - Security and the IoT - Electric ImpHugo Fiennes - Security and the IoT - Electric Imp
Hugo Fiennes - Security and the IoT - Electric Imp
 
Create a Data Encryption Strategy using ADE
Create a Data Encryption Strategy using ADECreate a Data Encryption Strategy using ADE
Create a Data Encryption Strategy using ADE
 
AusCERT - Developing Secure iOS Applications
AusCERT - Developing Secure iOS ApplicationsAusCERT - Developing Secure iOS Applications
AusCERT - Developing Secure iOS Applications
 
Incident Prevention and Incident Response - Alexander Sverdlov, PHDays IV
Incident Prevention and Incident Response - Alexander Sverdlov, PHDays IVIncident Prevention and Incident Response - Alexander Sverdlov, PHDays IV
Incident Prevention and Incident Response - Alexander Sverdlov, PHDays IV
 

Más de Ambientia

Más de Ambientia (20)

Itms atlassian way-final-2017-10
Itms atlassian way-final-2017-10Itms atlassian way-final-2017-10
Itms atlassian way-final-2017-10
 
Dev ops atlassianway-final-2017-10
Dev ops atlassianway-final-2017-10Dev ops atlassianway-final-2017-10
Dev ops atlassianway-final-2017-10
 
Insight Asset Management for JIRA Service Desk
Insight Asset Management for JIRA Service DeskInsight Asset Management for JIRA Service Desk
Insight Asset Management for JIRA Service Desk
 
APIen hallinnalla uutta liiketoimintaa
APIen hallinnalla uutta liiketoimintaaAPIen hallinnalla uutta liiketoimintaa
APIen hallinnalla uutta liiketoimintaa
 
Miten API management toimii
Miten API management toimiiMiten API management toimii
Miten API management toimii
 
Tunnistamalla asiakaspolut tehostat asiakaspalvelusi toimintaa
Tunnistamalla asiakaspolut tehostat asiakaspalvelusi toimintaaTunnistamalla asiakaspolut tehostat asiakaspalvelusi toimintaa
Tunnistamalla asiakaspolut tehostat asiakaspalvelusi toimintaa
 
OpenShift-webinaari 31.1. / Ambientian esitykset
OpenShift-webinaari 31.1. / Ambientian esityksetOpenShift-webinaari 31.1. / Ambientian esitykset
OpenShift-webinaari 31.1. / Ambientian esitykset
 
ITSM & JIRA Service Desk
ITSM & JIRA Service DeskITSM & JIRA Service Desk
ITSM & JIRA Service Desk
 
Ambientia Service Design -työpaja SYTYKE
Ambientia Service Design -työpaja SYTYKEAmbientia Service Design -työpaja SYTYKE
Ambientia Service Design -työpaja SYTYKE
 
Liferayn rooli Valtorin palveluvalikoimassa
Liferayn rooli Valtorin palveluvalikoimassaLiferayn rooli Valtorin palveluvalikoimassa
Liferayn rooli Valtorin palveluvalikoimassa
 
Digitaalinen asiakaskokemus ja palvelumuotoilu
Digitaalinen asiakaskokemus ja palvelumuotoiluDigitaalinen asiakaskokemus ja palvelumuotoilu
Digitaalinen asiakaskokemus ja palvelumuotoilu
 
Liferay Audience Targeting
Liferay Audience TargetingLiferay Audience Targeting
Liferay Audience Targeting
 
Case Procountor: Zephyr test tool deployment
Case Procountor: Zephyr test tool deploymentCase Procountor: Zephyr test tool deployment
Case Procountor: Zephyr test tool deployment
 
JIRA Portfolio
JIRA PortfolioJIRA Portfolio
JIRA Portfolio
 
Case Containerships JIRA Service Desk
Case Containerships JIRA Service DeskCase Containerships JIRA Service Desk
Case Containerships JIRA Service Desk
 
Jira 7
Jira 7Jira 7
Jira 7
 
Liferay Road Show Sosiaali- ja terveysministeriö
Liferay Road Show Sosiaali- ja terveysministeriöLiferay Road Show Sosiaali- ja terveysministeriö
Liferay Road Show Sosiaali- ja terveysministeriö
 
Liferay Road Show Responsiivinen suunnittelu
Liferay Road Show Responsiivinen suunnitteluLiferay Road Show Responsiivinen suunnittelu
Liferay Road Show Responsiivinen suunnittelu
 
Liferay Road Show Linnunmaa LEX
 Liferay Road Show Linnunmaa LEX Liferay Road Show Linnunmaa LEX
Liferay Road Show Linnunmaa LEX
 
Liferay Road Show Rolf van der Steen
Liferay Road Show Rolf van der SteenLiferay Road Show Rolf van der Steen
Liferay Road Show Rolf van der Steen
 

Último

Último (20)

Data Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt RobisonData Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt Robison
 
Apidays New York 2024 - The value of a flexible API Management solution for O...
Apidays New York 2024 - The value of a flexible API Management solution for O...Apidays New York 2024 - The value of a flexible API Management solution for O...
Apidays New York 2024 - The value of a flexible API Management solution for O...
 
presentation ICT roal in 21st century education
presentation ICT roal in 21st century educationpresentation ICT roal in 21st century education
presentation ICT roal in 21st century education
 
AWS Community Day CPH - Three problems of Terraform
AWS Community Day CPH - Three problems of TerraformAWS Community Day CPH - Three problems of Terraform
AWS Community Day CPH - Three problems of Terraform
 
Artificial Intelligence Chap.5 : Uncertainty
Artificial Intelligence Chap.5 : UncertaintyArtificial Intelligence Chap.5 : Uncertainty
Artificial Intelligence Chap.5 : Uncertainty
 
Automating Google Workspace (GWS) & more with Apps Script
Automating Google Workspace (GWS) & more with Apps ScriptAutomating Google Workspace (GWS) & more with Apps Script
Automating Google Workspace (GWS) & more with Apps Script
 
Manulife - Insurer Innovation Award 2024
Manulife - Insurer Innovation Award 2024Manulife - Insurer Innovation Award 2024
Manulife - Insurer Innovation Award 2024
 
Connector Corner: Accelerate revenue generation using UiPath API-centric busi...
Connector Corner: Accelerate revenue generation using UiPath API-centric busi...Connector Corner: Accelerate revenue generation using UiPath API-centric busi...
Connector Corner: Accelerate revenue generation using UiPath API-centric busi...
 
Exploring the Future Potential of AI-Enabled Smartphone Processors
Exploring the Future Potential of AI-Enabled Smartphone ProcessorsExploring the Future Potential of AI-Enabled Smartphone Processors
Exploring the Future Potential of AI-Enabled Smartphone Processors
 
2024: Domino Containers - The Next Step. News from the Domino Container commu...
2024: Domino Containers - The Next Step. News from the Domino Container commu...2024: Domino Containers - The Next Step. News from the Domino Container commu...
2024: Domino Containers - The Next Step. News from the Domino Container commu...
 
ProductAnonymous-April2024-WinProductDiscovery-MelissaKlemke
ProductAnonymous-April2024-WinProductDiscovery-MelissaKlemkeProductAnonymous-April2024-WinProductDiscovery-MelissaKlemke
ProductAnonymous-April2024-WinProductDiscovery-MelissaKlemke
 
Top 5 Benefits OF Using Muvi Live Paywall For Live Streams
Top 5 Benefits OF Using Muvi Live Paywall For Live StreamsTop 5 Benefits OF Using Muvi Live Paywall For Live Streams
Top 5 Benefits OF Using Muvi Live Paywall For Live Streams
 
Strategies for Landing an Oracle DBA Job as a Fresher
Strategies for Landing an Oracle DBA Job as a FresherStrategies for Landing an Oracle DBA Job as a Fresher
Strategies for Landing an Oracle DBA Job as a Fresher
 
How to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerHow to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected Worker
 
Tata AIG General Insurance Company - Insurer Innovation Award 2024
Tata AIG General Insurance Company - Insurer Innovation Award 2024Tata AIG General Insurance Company - Insurer Innovation Award 2024
Tata AIG General Insurance Company - Insurer Innovation Award 2024
 
Polkadot JAM Slides - Token2049 - By Dr. Gavin Wood
Polkadot JAM Slides - Token2049 - By Dr. Gavin WoodPolkadot JAM Slides - Token2049 - By Dr. Gavin Wood
Polkadot JAM Slides - Token2049 - By Dr. Gavin Wood
 
🐬 The future of MySQL is Postgres 🐘
🐬  The future of MySQL is Postgres   🐘🐬  The future of MySQL is Postgres   🐘
🐬 The future of MySQL is Postgres 🐘
 
Powerful Google developer tools for immediate impact! (2023-24 C)
Powerful Google developer tools for immediate impact! (2023-24 C)Powerful Google developer tools for immediate impact! (2023-24 C)
Powerful Google developer tools for immediate impact! (2023-24 C)
 
Boost PC performance: How more available memory can improve productivity
Boost PC performance: How more available memory can improve productivityBoost PC performance: How more available memory can improve productivity
Boost PC performance: How more available memory can improve productivity
 
Real Time Object Detection Using Open CV
Real Time Object Detection Using Open CVReal Time Object Detection Using Open CV
Real Time Object Detection Using Open CV
 

Black box security testing

  • 1. Black-box* Security Testing (*for some definitions of black) Jari Saukkonen 12.9.2013 www.ambientia.net 1
  • 2. Jari Saukkonen • Software Architect • Hands-on development and problem solving at Ambientia since 1998 • Involved in Liferay-based projects from Liferay 5.1 onwards • Hobby pianist, (astro)photographer, rhythm game addict, and a fan of good tea. 12.9.2013 www.ambientia.net 2
  • 3. Everyone knows this • All nontrivial software has bugs • Keeping your software up-to-date is important 12.9.2013 www.ambientia.net 3
  • 4. Why am I not up-to-date, then? • You might not have the personnel or contractors to look after your installation • The fixes might not be available for your (older) product version • You might be using a Liferay-derivative product, making the version choice out of your control • ”works for me” 12.9.2013 www.ambientia.net 4
  • 5. Liferay CE vs. EE • Community Security Team maintains patches for the latest CE version • Liferay Support provides the latest security fixes for Liferay EE as they are implemented. You can choose individually which patches to apply. • EE patches are backported to previous Liferay versions as long as they are supported 12.9.2013 www.ambientia.net 5
  • 6. Patching Tool • Liferay Enterprise Edition comes with a dedicated patching tool • Finds out which patches are relevant for your installation and applies them • Easy to use! 12.9.2013 www.ambientia.net 6
  • 7. Black-box Testing • Definition: Determine the functionality of a system without knowledge of its internal structures • Automated (security scanners) or manual process • Useful for testing unknown, possibly very customized systems 12.9.2013 www.ambientia.net 7
  • 8. Automated security scanners • Pros: • Press button, wait, receive results • Good for searching generic problems such as XSS exploits or SQL injections • Cons: • Liferay vulnerabilities not widely implemented in third party products • Results always need interpretation, false positives are common with certain types of searches 12.9.2013 www.ambientia.net 8
  • 9. Manual testing 1. Find out your (more or less) exact Liferay version 2. Search http://issues.liferay.com for security issues affecting your version 3. Try to reproduce the issues in your environment • This is not always easy.. 12.9.2013 www.ambientia.net 9
  • 10. Essential tools • Browser debugger • Firebug • Chrome Developer Tools • Request editing tool for custom GET/POST – requests • curl • Fiddler • Creativity! 12.9.2013 www.ambientia.net 10
  • 11. Typical security problems I • LPS-8374, Access to the default view of all portlets • Including /enterprise_admin/view that can display all user accounts on the server • Since: 5.1.2, fixed in 5.2 EE SP4, 6.0 EE SP3, 6.1 CE GA2 12.9.2013 www.ambientia.net 11
  • 12. Typical security problems II • LPS-28222, Remote Denial of Service that prevents server startup • Requires manual database cleanup to recover • Since: 5.2.3, fixed in 6.1.1 CE/EE GA2 • LPS-29268, Remote Denial of Service that fills the database with PortletPreferences • Requires manual database cleanup to recover • Since: 6.0.6 GA, fixed in 6.1 CE/EE GA 3 12.9.2013 www.ambientia.net 12
  • 13. Typical security problems III • Various XSS issues • Portlet-specific problems, you need to use the portlet to be vulnerable • Usually not very long-lived, but may be present in older versions • OS-level problems, e.g. a vulnerable httpd version 12.9.2013 www.ambientia.net 13
  • 14. How to secure my server? • EE customers can receive notices when security patches are released  have a process in place to handle them in a timely manner • https://www.liferay.com/community/security- team/known-vulnerabilities • Security Advisories –forum on liferay.com 12.9.2013 www.ambientia.net 14
  • 15. Keep your Liferay safe! 12.9.2013 www.ambientia.net 15