2. About
●
“ This happens when
the system admins ,
DBAs and developers
leave security holes in the
configuration of computer
systems. ”
A5
http://www.inteco.es
htts://www.inteco.es
3. Idea(1)
Attacker accesses :
●
●
●
●
default accounts,
unused pages,
unpatched flaws,
unprotected files and directories.
Security misconfiguration can happen at any
level on an application stack:
●
●
●
●
●
including the platform,
web & application server,
database,
framework,
custom code.
6. Typical attack approach
●
●
Find information related to : OS type and version, libraries, tools, Web server type ,web
development language,
And then
7. How to prevent ?
●
●
●
●
●
●
●
●
●
●
Remove/ change default credentials,
Keep up to date software,
Look for disabling unused components or services,
Take in consideration automated scanners(OpenVAS, WATOBO,WebScarab, https://asafaweb.
com/),
Setup a process for security updates,
Use minimal privileges everywhere,
Remove all unused pages and user accounts,
Create whitelist pages,
Update patches(small piece of software used to correct a problem with OS for example),
Review configuration default for : frameworks, db, web server ….