SlideShare a Scribd company logo
1 of 27
Download to read offline
Copyright	
  (c)	
  	
  Bitforest	
  Co.,	
  Ltd.
 
Vulnerabilities	
  Are	
  Bugs	
  
Let’s	
  Test	
  for	
  Them!
VAddy
Continuous Security Testing Service
1
Bitforest	
  Co.,	
  Ltd.	
  
Yasushi	
  Ichikawa
Copyright	
  (c)	
  	
  Bitforest	
  Co.,	
  Ltd.
 
Web Security Tests
• White-­‐box	
  testing	
  
• Analyze	
  source	
  code	
  (e.g.	
  with	
  brakeman)	
  
• Black-­‐box	
  testing	
  
• Send	
  HTTP	
  requests	
  with	
  attack	
  payloads	
  and	
  
check	
  responses	
  
• Examples:	
  VAddy,	
  OWASP	
  ZAP,	
  AppScan
2
Copyright	
  (c)	
  	
  Bitforest	
  Co.,	
  Ltd.
 
Current Issues with Web Security Tests
3
Development	
  team
External	
  security	
  firm	
  
Internal	
  security	
  team
Coding
Unit	
  tests
Integration	
  tests
Vulnerability	
  
assessment
Development	
  team
Revisions
Release
Current	
  practice	
  is	
  to	
  conduct	
  only	
  one	
  
vulnerability	
  assessment	
  prior	
  to	
  release	
  
!
• If	
  a	
  large	
  number	
  of	
  vulnerabilities	
  are	
  
found	
  immediately	
  before	
  release,	
  they	
  
will	
  have	
  a	
  big	
  impact	
  on	
  the	
  release	
  
schedule	
  
• From	
  both	
  a	
  time	
  and	
  cost	
  perspective,	
  
it’s	
  difficult	
  to	
  conduct	
  vulnerability	
  
assessments	
  for	
  every	
  revision	
  and	
  new	
  
feature	
  introduced	
  after	
  an	
  application	
  is	
  
released
Copyright	
  (c)	
  	
  Bitforest	
  Co.,	
  Ltd.
 
Current Issues with Web Security Tests
[Scenario:	
  Using	
  a	
  Security	
  Firm]	
  
Cost:	
  Thousands	
  of	
  dollars	
  (or	
  more)	
  
Duration:
4
This	
  is	
  difficult	
  to	
  do	
  continuously
Over	
  one	
  week	
  until	
  the	
  results	
  of	
  an	
  

investigation	
  are	
  delivered
Copyright	
  (c)	
  	
  Bitforest	
  Co.,	
  Ltd.
 
5
We	
  need	
  
continuous	
  
security	
  tests
Copyright	
  (c)	
  	
  Bitforest	
  Co.,	
  Ltd.
 
6
Run	
  from	
  the	
  beginning	
  of	
  
development	
  until	
  release,	
  
just	
  like	
  unit	
  tests
Copyright	
  (c)	
  	
  Bitforest	
  Co.,	
  Ltd.
 
What Are Continuous Web Security Tests?
7
Development	
  team
External	
  security	
  firm	
  
Internal	
  security	
  team
Coding
Unit	
  tests
Integration	
  tests
Vulnerability	
  
assessment
Development	
  team
Revisions
Release
Continuous	
  Security	
  Tests
Development	
  team
Coding
Unit	
  tests
Integration	
  
tests
Release
Vulnerability	
  
assessments
Development	
  teams	
  can	
  run	
  security	
  tests	
  as	
  often	
  as	
  they	
  like.
Copyright	
  (c)	
  	
  Bitforest	
  Co.,	
  Ltd.
 
Issues with Continuous Web Security Tests
• Existing	
  scanning	
  tools	
  
• are	
  difficult	
  to	
  add	
  to	
  continuous	
  integration	
  
workflows	
  
• cost	
  both	
  time	
  and	
  money	
  to	
  set	
  up	
  and	
  
maintain	
  yourself	
  
• have	
  many	
  settings	
  and	
  require	
  accumulated	
  
expertise
8
Copyright	
  (c)	
  	
  Bitforest	
  Co.,	
  Ltd.
 
Important Points
9
It’s	
  important	
  to	
  tell	
  your	
  scanning	
  tools	
  
how	
  your	
  web	
  application	
  works
Copyright	
  (c)	
  	
  Bitforest	
  Co.,	
  Ltd.
 
Important Points
10
For	
  example:	
  
If,	
  while	
  testing	
  an	
  authenticated	
  page,	
  
your	
  session	
  expires	
  and	
  you	
  are	
  returned	
  
to	
  the	
  login	
  screen,	
  test	
  the	
  login	
  screen	
  
and	
  continue
Copyright	
  (c)	
  	
  Bitforest	
  Co.,	
  Ltd.
 
Important Points
11
You	
  need	
  to	
  configure	
  your	
  tools	
  to	
  
behave	
  appropriately	
  when	
  their	
  sessions	
  
expire	
  and	
  they	
  are	
  logged	
  out
Copyright	
  (c)	
  	
  Bitforest	
  Co.,	
  Ltd.
 
12
This	
  keeps	
  you	
  from	
  focusing	
  on	
  
business-­‐critical	
  software	
  
development
Scanning	
  tools	
  aren’t	
  very	
  effective	
  unless	
  
you	
  continue	
  to	
  learn	
  how	
  to	
  configure	
  them
Issues with Continuous Web Security Tests
Copyright	
  (c)	
  	
  Bitforest	
  Co.,	
  Ltd.
 
13
Simple	
  setup	
  
Maintenance	
  free

Effective	
  scanning

CI	
  cycle	
  automation
Copyright	
  (c)	
  	
  Bitforest	
  Co.,	
  Ltd.
 
14
Continuous Web Security Testing Service
Vulnerability	
  Assessment	
  is	
  your	
  Buddy
Copyright	
  (c)	
  	
  Bitforest	
  Co.,	
  Ltd.
 
15
Continuous Web Security Testing Service
http://vaddy.net	
  
Copyright	
  (c)	
  	
  Bitforest	
  Co.,	
  Ltd.
 
VAddy s Features
• No	
  tool	
  to	
  install	
  (SaaS)	
  
• Unlimited	
  free	
  scanning	
  
• Support	
  for	
  continuous	
  integration	
  
• Web	
  API	
  
• Jenkins	
  plugin	
  
• Works	
  with	
  Travis,	
  CircleCI,	
  etc.
16
Copyright	
  (c)	
  	
  Bitforest	
  Co.,	
  Ltd.
 
Common Configurations
17
Copyright	
  (c)	
  	
  Bitforest	
  Co.,	
  Ltd.
 
VAddy s Features
18
VAddy	
  can	
  figure	
  out	
  how	
  your	
  
application	
  works	
  and	
  scan	
  it	
  correctly	
  
without	
  any	
  special	
  settings
Copyright	
  (c)	
  	
  Bitforest	
  Co.,	
  Ltd.
 
VAddy s Policy
19
Software	
  developers	
  should	
  
focus	
  on	
  	
  
software	
  development!
Copyright	
  (c)	
  	
  Bitforest	
  Co.,	
  Ltd.
 
VAddy s Features
20
Proprietary	
  security	
  scanning	
  
engine	
  that	
  uses	
  machine	
  learning
Copyright	
  (c)	
  	
  Bitforest	
  Co.,	
  Ltd.
 
VAddy s List of Scan Results
21
Copyright	
  (c)	
  	
  Bitforest	
  Co.,	
  Ltd.
 
Types of Vulnerabilities and Vulnerable Parameters
22
You	
  can	
  see	
  the	
  type	
  of	
  vulnerability	
  (e.g.	
  SQL	
  injection)	
  that	
  
was	
  found	
  along	
  with	
  the	
  vulnerable	
  URL	
  and	
  parameter	
  
name.	
  
This	
  example	
  shows	
  that	
  there	
  is	
  a	
  SQL	
  injection	
  vulnerability	
  
in	
  the	
  parameter	
  "ID"	
  used	
  at	
  the	
  URL	
  "search",	
  so	
  you	
  can	
  
figure	
  out	
  which	
  lines	
  of	
  code	
  are	
  at	
  fault.
Copyright	
  (c)	
  	
  Bitforest	
  Co.,	
  Ltd.
 
Request Data for Reproducing Attacks
23
VAddy	
  shows	
  you	
  the	
  request	
  data	
  it	
  sent	
  so	
  you	
  
can	
  reproduce	
  the	
  attack	
  in	
  your	
  own	
  
development	
  environment
Copyright	
  (c)	
  	
  Bitforest	
  Co.,	
  Ltd.
 
Currently Supported Scans (SQLi, XSS)
• GET/POST/PUT/DELETE	
  parameters	
  
• Rest	
  APIs	
  with	
  JSON	
  parameters	
  
• Parameters	
  in	
  URL	
  paths	
  
• www.example.com/item/view/1	
  
• Form	
  authentication	
  (login	
  screens)	
  
• CSRF	
  tokens	
  (including	
  Angular.js)	
  
• SSL	
  applications
24
Copyright	
  (c)	
  	
  Bitforest	
  Co.,	
  Ltd.
 
25
Continuous	
  security	
  tests	
  are	
  
an	
  up-­‐and-­‐coming	
  trend	
  	
  
in	
  software	
  development
Copyright	
  (c)	
  	
  Bitforest	
  Co.,	
  Ltd.
 
26
Twitter:	
  @vaddy_support	
  
Email:	
  	
  	
  	
  	
  info@vaddy.net	
  
Contacts
Copyright	
  (c)	
  	
  Bitforest	
  Co.,	
  Ltd.
 
27
http://vaddy.net	
  

More Related Content

What's hot

SecDevOps: The New Black of IT
SecDevOps: The New Black of ITSecDevOps: The New Black of IT
SecDevOps: The New Black of ITCloudPassage
 
Integrating security into Continuous Delivery
Integrating security into Continuous DeliveryIntegrating security into Continuous Delivery
Integrating security into Continuous DeliveryTom Stiehm
 
SecDevOps - The Operationalisation of Security
SecDevOps -  The Operationalisation of SecuritySecDevOps -  The Operationalisation of Security
SecDevOps - The Operationalisation of SecurityDinis Cruz
 
DevOpsSec: Appling DevOps Principles to Security, DevOpsDays Austin 2012
DevOpsSec: Appling DevOps Principles to Security, DevOpsDays Austin 2012DevOpsSec: Appling DevOps Principles to Security, DevOpsDays Austin 2012
DevOpsSec: Appling DevOps Principles to Security, DevOpsDays Austin 2012Nick Galbreath
 
Embracing the Rise of SecDevOps
Embracing the Rise of SecDevOpsEmbracing the Rise of SecDevOps
Embracing the Rise of SecDevOpsTom Cappetta
 
Devops security-An Insight into Secure-SDLC
Devops security-An Insight into Secure-SDLCDevops security-An Insight into Secure-SDLC
Devops security-An Insight into Secure-SDLCSuman Sourav
 
Integrating DevOps and Security
Integrating DevOps and SecurityIntegrating DevOps and Security
Integrating DevOps and SecurityStijn Muylle
 
DevOps & Security: Here & Now
DevOps & Security: Here & NowDevOps & Security: Here & Now
DevOps & Security: Here & NowCheckmarx
 
OWASP AppSec EU - SecDevOps, a view from the trenches - Abhay Bhargav
OWASP AppSec EU - SecDevOps, a view from the trenches - Abhay BhargavOWASP AppSec EU - SecDevOps, a view from the trenches - Abhay Bhargav
OWASP AppSec EU - SecDevOps, a view from the trenches - Abhay BhargavAbhay Bhargav
 
we45 SecDevOps Presentation - ISACA Chennai
we45 SecDevOps Presentation - ISACA Chennaiwe45 SecDevOps Presentation - ISACA Chennai
we45 SecDevOps Presentation - ISACA ChennaiAbhay Bhargav
 
we45 - SecDevOps Concept Presentation
we45 - SecDevOps Concept Presentationwe45 - SecDevOps Concept Presentation
we45 - SecDevOps Concept PresentationAbhay Bhargav
 
Unit testing : what are you missing for security
Unit testing : what are you missing for securityUnit testing : what are you missing for security
Unit testing : what are you missing for securitySuman Sourav
 
Better Security Testing: Using the Cloud and Continuous Delivery
Better Security Testing: Using the Cloud and Continuous DeliveryBetter Security Testing: Using the Cloud and Continuous Delivery
Better Security Testing: Using the Cloud and Continuous DeliveryGene Gotimer
 
DevSecCon London 2017: when good containers go bad by Tim Mackey
DevSecCon London 2017: when good containers go bad by Tim MackeyDevSecCon London 2017: when good containers go bad by Tim Mackey
DevSecCon London 2017: when good containers go bad by Tim MackeyDevSecCon
 
Proactive Security AppSec Case Study
Proactive Security AppSec Case StudyProactive Security AppSec Case Study
Proactive Security AppSec Case StudyAndy Hoernecke
 
Building a high quality+ products with SCA
Building a high quality+ products with SCABuilding a high quality+ products with SCA
Building a high quality+ products with SCASuman Sourav
 
Dev seccon london 2016 intelliment security
Dev seccon london 2016   intelliment securityDev seccon london 2016   intelliment security
Dev seccon london 2016 intelliment securityDevSecCon
 
Code Quality - Security
Code Quality - SecurityCode Quality - Security
Code Quality - Securitysedukull
 
Testing in a Continuous Delivery Pipeline - Better, Faster, Cheaper
Testing in a Continuous Delivery Pipeline - Better, Faster, CheaperTesting in a Continuous Delivery Pipeline - Better, Faster, Cheaper
Testing in a Continuous Delivery Pipeline - Better, Faster, CheaperGene Gotimer
 

What's hot (20)

SecDevOps: The New Black of IT
SecDevOps: The New Black of ITSecDevOps: The New Black of IT
SecDevOps: The New Black of IT
 
Integrating security into Continuous Delivery
Integrating security into Continuous DeliveryIntegrating security into Continuous Delivery
Integrating security into Continuous Delivery
 
SecDevOps - The Operationalisation of Security
SecDevOps -  The Operationalisation of SecuritySecDevOps -  The Operationalisation of Security
SecDevOps - The Operationalisation of Security
 
DevOpsSec: Appling DevOps Principles to Security, DevOpsDays Austin 2012
DevOpsSec: Appling DevOps Principles to Security, DevOpsDays Austin 2012DevOpsSec: Appling DevOps Principles to Security, DevOpsDays Austin 2012
DevOpsSec: Appling DevOps Principles to Security, DevOpsDays Austin 2012
 
Embracing the Rise of SecDevOps
Embracing the Rise of SecDevOpsEmbracing the Rise of SecDevOps
Embracing the Rise of SecDevOps
 
SecDevOps
SecDevOpsSecDevOps
SecDevOps
 
Devops security-An Insight into Secure-SDLC
Devops security-An Insight into Secure-SDLCDevops security-An Insight into Secure-SDLC
Devops security-An Insight into Secure-SDLC
 
Integrating DevOps and Security
Integrating DevOps and SecurityIntegrating DevOps and Security
Integrating DevOps and Security
 
DevOps & Security: Here & Now
DevOps & Security: Here & NowDevOps & Security: Here & Now
DevOps & Security: Here & Now
 
OWASP AppSec EU - SecDevOps, a view from the trenches - Abhay Bhargav
OWASP AppSec EU - SecDevOps, a view from the trenches - Abhay BhargavOWASP AppSec EU - SecDevOps, a view from the trenches - Abhay Bhargav
OWASP AppSec EU - SecDevOps, a view from the trenches - Abhay Bhargav
 
we45 SecDevOps Presentation - ISACA Chennai
we45 SecDevOps Presentation - ISACA Chennaiwe45 SecDevOps Presentation - ISACA Chennai
we45 SecDevOps Presentation - ISACA Chennai
 
we45 - SecDevOps Concept Presentation
we45 - SecDevOps Concept Presentationwe45 - SecDevOps Concept Presentation
we45 - SecDevOps Concept Presentation
 
Unit testing : what are you missing for security
Unit testing : what are you missing for securityUnit testing : what are you missing for security
Unit testing : what are you missing for security
 
Better Security Testing: Using the Cloud and Continuous Delivery
Better Security Testing: Using the Cloud and Continuous DeliveryBetter Security Testing: Using the Cloud and Continuous Delivery
Better Security Testing: Using the Cloud and Continuous Delivery
 
DevSecCon London 2017: when good containers go bad by Tim Mackey
DevSecCon London 2017: when good containers go bad by Tim MackeyDevSecCon London 2017: when good containers go bad by Tim Mackey
DevSecCon London 2017: when good containers go bad by Tim Mackey
 
Proactive Security AppSec Case Study
Proactive Security AppSec Case StudyProactive Security AppSec Case Study
Proactive Security AppSec Case Study
 
Building a high quality+ products with SCA
Building a high quality+ products with SCABuilding a high quality+ products with SCA
Building a high quality+ products with SCA
 
Dev seccon london 2016 intelliment security
Dev seccon london 2016   intelliment securityDev seccon london 2016   intelliment security
Dev seccon london 2016 intelliment security
 
Code Quality - Security
Code Quality - SecurityCode Quality - Security
Code Quality - Security
 
Testing in a Continuous Delivery Pipeline - Better, Faster, Cheaper
Testing in a Continuous Delivery Pipeline - Better, Faster, CheaperTesting in a Continuous Delivery Pipeline - Better, Faster, Cheaper
Testing in a Continuous Delivery Pipeline - Better, Faster, Cheaper
 

Similar to Vulnerabilities are bugs, Let's Test For Them!

IBM AppScan - the total software security solution
IBM AppScan - the total software security solutionIBM AppScan - the total software security solution
IBM AppScan - the total software security solutionhearme limited company
 
Bridging the Security Testing Gap in Your CI/CD Pipeline
Bridging the Security Testing Gap in Your CI/CD PipelineBridging the Security Testing Gap in Your CI/CD Pipeline
Bridging the Security Testing Gap in Your CI/CD PipelineDevOps.com
 
Managing Continuous Delivery of Mobile Apps - for the Enterprise
Managing Continuous Delivery of Mobile Apps - for the EnterpriseManaging Continuous Delivery of Mobile Apps - for the Enterprise
Managing Continuous Delivery of Mobile Apps - for the EnterpriseSauce Labs
 
Common Web Application Attacks
Common Web Application Attacks Common Web Application Attacks
Common Web Application Attacks Ahmed Sherif
 
Innovating FIPS crypto validation in the Cloud - SEP321 - AWS re:Inforce 2019
Innovating FIPS crypto validation in the Cloud - SEP321 - AWS re:Inforce 2019 Innovating FIPS crypto validation in the Cloud - SEP321 - AWS re:Inforce 2019
Innovating FIPS crypto validation in the Cloud - SEP321 - AWS re:Inforce 2019 Amazon Web Services
 
Finding Bugs, Fixing Bugs, Preventing Bugs — Exploiting Automated Tests to In...
Finding Bugs, Fixing Bugs, Preventing Bugs — Exploiting Automated Tests to In...Finding Bugs, Fixing Bugs, Preventing Bugs — Exploiting Automated Tests to In...
Finding Bugs, Fixing Bugs, Preventing Bugs — Exploiting Automated Tests to In...University of Antwerp
 
4 florin coada - dast automation, more value for less work
4   florin coada - dast automation, more value for less work4   florin coada - dast automation, more value for less work
4 florin coada - dast automation, more value for less workIevgenii Katsan
 
IBM AppScan Source - The SAST solution
IBM AppScan Source - The SAST solutionIBM AppScan Source - The SAST solution
IBM AppScan Source - The SAST solutionhearme limited company
 
5 Ways to Accelerate Standards Compliance with Static Code Analysis
5 Ways to Accelerate Standards Compliance with Static Code Analysis 5 Ways to Accelerate Standards Compliance with Static Code Analysis
5 Ways to Accelerate Standards Compliance with Static Code Analysis Perforce
 
BUSTED! How to Find Security Bugs Fast!
BUSTED! How to Find Security Bugs Fast!BUSTED! How to Find Security Bugs Fast!
BUSTED! How to Find Security Bugs Fast!Parasoft
 
Amazon CI/CD Practices for Software Development Teams - SRV320 - Anaheim AWS ...
Amazon CI/CD Practices for Software Development Teams - SRV320 - Anaheim AWS ...Amazon CI/CD Practices for Software Development Teams - SRV320 - Anaheim AWS ...
Amazon CI/CD Practices for Software Development Teams - SRV320 - Anaheim AWS ...Amazon Web Services
 
Amazon CI/CD Practices for Software Development Teams - SRV320 - Atlanta AWS ...
Amazon CI/CD Practices for Software Development Teams - SRV320 - Atlanta AWS ...Amazon CI/CD Practices for Software Development Teams - SRV320 - Atlanta AWS ...
Amazon CI/CD Practices for Software Development Teams - SRV320 - Atlanta AWS ...Amazon Web Services
 
How PCI And PA DSS will change enterprise applications
How PCI And PA DSS will change enterprise applicationsHow PCI And PA DSS will change enterprise applications
How PCI And PA DSS will change enterprise applicationsBen Rothke
 
IBM AppScan Enterprise - The total software security solution
IBM AppScan Enterprise - The total software security solutionIBM AppScan Enterprise - The total software security solution
IBM AppScan Enterprise - The total software security solutionhearme limited company
 
Zibrasoft | Software QA Testing Company Inida
Zibrasoft | Software QA Testing Company InidaZibrasoft | Software QA Testing Company Inida
Zibrasoft | Software QA Testing Company InidaZibraSoft Technologies
 
Web Application Security - Everything You Should Know
Web Application Security - Everything You Should KnowWeb Application Security - Everything You Should Know
Web Application Security - Everything You Should KnowNarola Infotech
 
Top Application Security Trends of 2012
Top Application Security Trends of 2012Top Application Security Trends of 2012
Top Application Security Trends of 2012DaveEdwards12
 

Similar to Vulnerabilities are bugs, Let's Test For Them! (20)

IBM AppScan - the total software security solution
IBM AppScan - the total software security solutionIBM AppScan - the total software security solution
IBM AppScan - the total software security solution
 
Bridging the Security Testing Gap in Your CI/CD Pipeline
Bridging the Security Testing Gap in Your CI/CD PipelineBridging the Security Testing Gap in Your CI/CD Pipeline
Bridging the Security Testing Gap in Your CI/CD Pipeline
 
Managing Continuous Delivery of Mobile Apps - for the Enterprise
Managing Continuous Delivery of Mobile Apps - for the EnterpriseManaging Continuous Delivery of Mobile Apps - for the Enterprise
Managing Continuous Delivery of Mobile Apps - for the Enterprise
 
Common Web Application Attacks
Common Web Application Attacks Common Web Application Attacks
Common Web Application Attacks
 
Webinar–AppSec: Hype or Reality
Webinar–AppSec: Hype or RealityWebinar–AppSec: Hype or Reality
Webinar–AppSec: Hype or Reality
 
Innovating FIPS crypto validation in the Cloud - SEP321 - AWS re:Inforce 2019
Innovating FIPS crypto validation in the Cloud - SEP321 - AWS re:Inforce 2019 Innovating FIPS crypto validation in the Cloud - SEP321 - AWS re:Inforce 2019
Innovating FIPS crypto validation in the Cloud - SEP321 - AWS re:Inforce 2019
 
Finding Bugs, Fixing Bugs, Preventing Bugs — Exploiting Automated Tests to In...
Finding Bugs, Fixing Bugs, Preventing Bugs — Exploiting Automated Tests to In...Finding Bugs, Fixing Bugs, Preventing Bugs — Exploiting Automated Tests to In...
Finding Bugs, Fixing Bugs, Preventing Bugs — Exploiting Automated Tests to In...
 
A perspective on web testing.ppt
A perspective on web testing.pptA perspective on web testing.ppt
A perspective on web testing.ppt
 
4 florin coada - dast automation, more value for less work
4   florin coada - dast automation, more value for less work4   florin coada - dast automation, more value for less work
4 florin coada - dast automation, more value for less work
 
IBM AppScan Source - The SAST solution
IBM AppScan Source - The SAST solutionIBM AppScan Source - The SAST solution
IBM AppScan Source - The SAST solution
 
5 Ways to Accelerate Standards Compliance with Static Code Analysis
5 Ways to Accelerate Standards Compliance with Static Code Analysis 5 Ways to Accelerate Standards Compliance with Static Code Analysis
5 Ways to Accelerate Standards Compliance with Static Code Analysis
 
BUSTED! How to Find Security Bugs Fast!
BUSTED! How to Find Security Bugs Fast!BUSTED! How to Find Security Bugs Fast!
BUSTED! How to Find Security Bugs Fast!
 
DevOps on AWS
DevOps on AWSDevOps on AWS
DevOps on AWS
 
Amazon CI/CD Practices for Software Development Teams - SRV320 - Anaheim AWS ...
Amazon CI/CD Practices for Software Development Teams - SRV320 - Anaheim AWS ...Amazon CI/CD Practices for Software Development Teams - SRV320 - Anaheim AWS ...
Amazon CI/CD Practices for Software Development Teams - SRV320 - Anaheim AWS ...
 
Amazon CI/CD Practices for Software Development Teams - SRV320 - Atlanta AWS ...
Amazon CI/CD Practices for Software Development Teams - SRV320 - Atlanta AWS ...Amazon CI/CD Practices for Software Development Teams - SRV320 - Atlanta AWS ...
Amazon CI/CD Practices for Software Development Teams - SRV320 - Atlanta AWS ...
 
How PCI And PA DSS will change enterprise applications
How PCI And PA DSS will change enterprise applicationsHow PCI And PA DSS will change enterprise applications
How PCI And PA DSS will change enterprise applications
 
IBM AppScan Enterprise - The total software security solution
IBM AppScan Enterprise - The total software security solutionIBM AppScan Enterprise - The total software security solution
IBM AppScan Enterprise - The total software security solution
 
Zibrasoft | Software QA Testing Company Inida
Zibrasoft | Software QA Testing Company InidaZibrasoft | Software QA Testing Company Inida
Zibrasoft | Software QA Testing Company Inida
 
Web Application Security - Everything You Should Know
Web Application Security - Everything You Should KnowWeb Application Security - Everything You Should Know
Web Application Security - Everything You Should Know
 
Top Application Security Trends of 2012
Top Application Security Trends of 2012Top Application Security Trends of 2012
Top Application Security Trends of 2012
 

Recently uploaded

Salesforce Community Group Quito, Salesforce 101
Salesforce Community Group Quito, Salesforce 101Salesforce Community Group Quito, Salesforce 101
Salesforce Community Group Quito, Salesforce 101Paola De la Torre
 
From Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time AutomationFrom Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time AutomationSafe Software
 
Breaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path MountBreaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path MountPuma Security, LLC
 
Presentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreterPresentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreternaman860154
 
🐬 The future of MySQL is Postgres 🐘
🐬  The future of MySQL is Postgres   🐘🐬  The future of MySQL is Postgres   🐘
🐬 The future of MySQL is Postgres 🐘RTylerCroy
 
IAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI SolutionsIAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI SolutionsEnterprise Knowledge
 
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking MenDelhi Call girls
 
Finology Group – Insurtech Innovation Award 2024
Finology Group – Insurtech Innovation Award 2024Finology Group – Insurtech Innovation Award 2024
Finology Group – Insurtech Innovation Award 2024The Digital Insurer
 
08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking Men08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking MenDelhi Call girls
 
A Call to Action for Generative AI in 2024
A Call to Action for Generative AI in 2024A Call to Action for Generative AI in 2024
A Call to Action for Generative AI in 2024Results
 
Automating Google Workspace (GWS) & more with Apps Script
Automating Google Workspace (GWS) & more with Apps ScriptAutomating Google Workspace (GWS) & more with Apps Script
Automating Google Workspace (GWS) & more with Apps Scriptwesley chun
 
CNv6 Instructor Chapter 6 Quality of Service
CNv6 Instructor Chapter 6 Quality of ServiceCNv6 Instructor Chapter 6 Quality of Service
CNv6 Instructor Chapter 6 Quality of Servicegiselly40
 
08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking Men08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking MenDelhi Call girls
 
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
04-2024-HHUG-Sales-and-Marketing-Alignment.pptxHampshireHUG
 
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...Igalia
 
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdfThe Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdfEnterprise Knowledge
 
08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking Men08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking MenDelhi Call girls
 
Histor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slideHistor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slidevu2urc
 
Driving Behavioral Change for Information Management through Data-Driven Gree...
Driving Behavioral Change for Information Management through Data-Driven Gree...Driving Behavioral Change for Information Management through Data-Driven Gree...
Driving Behavioral Change for Information Management through Data-Driven Gree...Enterprise Knowledge
 
Tata AIG General Insurance Company - Insurer Innovation Award 2024
Tata AIG General Insurance Company - Insurer Innovation Award 2024Tata AIG General Insurance Company - Insurer Innovation Award 2024
Tata AIG General Insurance Company - Insurer Innovation Award 2024The Digital Insurer
 

Recently uploaded (20)

Salesforce Community Group Quito, Salesforce 101
Salesforce Community Group Quito, Salesforce 101Salesforce Community Group Quito, Salesforce 101
Salesforce Community Group Quito, Salesforce 101
 
From Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time AutomationFrom Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time Automation
 
Breaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path MountBreaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path Mount
 
Presentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreterPresentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreter
 
🐬 The future of MySQL is Postgres 🐘
🐬  The future of MySQL is Postgres   🐘🐬  The future of MySQL is Postgres   🐘
🐬 The future of MySQL is Postgres 🐘
 
IAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI SolutionsIAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI Solutions
 
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
 
Finology Group – Insurtech Innovation Award 2024
Finology Group – Insurtech Innovation Award 2024Finology Group – Insurtech Innovation Award 2024
Finology Group – Insurtech Innovation Award 2024
 
08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking Men08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking Men
 
A Call to Action for Generative AI in 2024
A Call to Action for Generative AI in 2024A Call to Action for Generative AI in 2024
A Call to Action for Generative AI in 2024
 
Automating Google Workspace (GWS) & more with Apps Script
Automating Google Workspace (GWS) & more with Apps ScriptAutomating Google Workspace (GWS) & more with Apps Script
Automating Google Workspace (GWS) & more with Apps Script
 
CNv6 Instructor Chapter 6 Quality of Service
CNv6 Instructor Chapter 6 Quality of ServiceCNv6 Instructor Chapter 6 Quality of Service
CNv6 Instructor Chapter 6 Quality of Service
 
08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking Men08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking Men
 
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
 
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...
 
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdfThe Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
 
08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking Men08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking Men
 
Histor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slideHistor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slide
 
Driving Behavioral Change for Information Management through Data-Driven Gree...
Driving Behavioral Change for Information Management through Data-Driven Gree...Driving Behavioral Change for Information Management through Data-Driven Gree...
Driving Behavioral Change for Information Management through Data-Driven Gree...
 
Tata AIG General Insurance Company - Insurer Innovation Award 2024
Tata AIG General Insurance Company - Insurer Innovation Award 2024Tata AIG General Insurance Company - Insurer Innovation Award 2024
Tata AIG General Insurance Company - Insurer Innovation Award 2024
 

Vulnerabilities are bugs, Let's Test For Them!

  • 1. Copyright  (c)    Bitforest  Co.,  Ltd.   Vulnerabilities  Are  Bugs   Let’s  Test  for  Them! VAddy Continuous Security Testing Service 1 Bitforest  Co.,  Ltd.   Yasushi  Ichikawa
  • 2. Copyright  (c)    Bitforest  Co.,  Ltd.   Web Security Tests • White-­‐box  testing   • Analyze  source  code  (e.g.  with  brakeman)   • Black-­‐box  testing   • Send  HTTP  requests  with  attack  payloads  and   check  responses   • Examples:  VAddy,  OWASP  ZAP,  AppScan 2
  • 3. Copyright  (c)    Bitforest  Co.,  Ltd.   Current Issues with Web Security Tests 3 Development  team External  security  firm   Internal  security  team Coding Unit  tests Integration  tests Vulnerability   assessment Development  team Revisions Release Current  practice  is  to  conduct  only  one   vulnerability  assessment  prior  to  release   ! • If  a  large  number  of  vulnerabilities  are   found  immediately  before  release,  they   will  have  a  big  impact  on  the  release   schedule   • From  both  a  time  and  cost  perspective,   it’s  difficult  to  conduct  vulnerability   assessments  for  every  revision  and  new   feature  introduced  after  an  application  is   released
  • 4. Copyright  (c)    Bitforest  Co.,  Ltd.   Current Issues with Web Security Tests [Scenario:  Using  a  Security  Firm]   Cost:  Thousands  of  dollars  (or  more)   Duration: 4 This  is  difficult  to  do  continuously Over  one  week  until  the  results  of  an  
 investigation  are  delivered
  • 5. Copyright  (c)    Bitforest  Co.,  Ltd.   5 We  need   continuous   security  tests
  • 6. Copyright  (c)    Bitforest  Co.,  Ltd.   6 Run  from  the  beginning  of   development  until  release,   just  like  unit  tests
  • 7. Copyright  (c)    Bitforest  Co.,  Ltd.   What Are Continuous Web Security Tests? 7 Development  team External  security  firm   Internal  security  team Coding Unit  tests Integration  tests Vulnerability   assessment Development  team Revisions Release Continuous  Security  Tests Development  team Coding Unit  tests Integration   tests Release Vulnerability   assessments Development  teams  can  run  security  tests  as  often  as  they  like.
  • 8. Copyright  (c)    Bitforest  Co.,  Ltd.   Issues with Continuous Web Security Tests • Existing  scanning  tools   • are  difficult  to  add  to  continuous  integration   workflows   • cost  both  time  and  money  to  set  up  and   maintain  yourself   • have  many  settings  and  require  accumulated   expertise 8
  • 9. Copyright  (c)    Bitforest  Co.,  Ltd.   Important Points 9 It’s  important  to  tell  your  scanning  tools   how  your  web  application  works
  • 10. Copyright  (c)    Bitforest  Co.,  Ltd.   Important Points 10 For  example:   If,  while  testing  an  authenticated  page,   your  session  expires  and  you  are  returned   to  the  login  screen,  test  the  login  screen   and  continue
  • 11. Copyright  (c)    Bitforest  Co.,  Ltd.   Important Points 11 You  need  to  configure  your  tools  to   behave  appropriately  when  their  sessions   expire  and  they  are  logged  out
  • 12. Copyright  (c)    Bitforest  Co.,  Ltd.   12 This  keeps  you  from  focusing  on   business-­‐critical  software   development Scanning  tools  aren’t  very  effective  unless   you  continue  to  learn  how  to  configure  them Issues with Continuous Web Security Tests
  • 13. Copyright  (c)    Bitforest  Co.,  Ltd.   13 Simple  setup   Maintenance  free
 Effective  scanning
 CI  cycle  automation
  • 14. Copyright  (c)    Bitforest  Co.,  Ltd.   14 Continuous Web Security Testing Service Vulnerability  Assessment  is  your  Buddy
  • 15. Copyright  (c)    Bitforest  Co.,  Ltd.   15 Continuous Web Security Testing Service http://vaddy.net  
  • 16. Copyright  (c)    Bitforest  Co.,  Ltd.   VAddy s Features • No  tool  to  install  (SaaS)   • Unlimited  free  scanning   • Support  for  continuous  integration   • Web  API   • Jenkins  plugin   • Works  with  Travis,  CircleCI,  etc. 16
  • 17. Copyright  (c)    Bitforest  Co.,  Ltd.   Common Configurations 17
  • 18. Copyright  (c)    Bitforest  Co.,  Ltd.   VAddy s Features 18 VAddy  can  figure  out  how  your   application  works  and  scan  it  correctly   without  any  special  settings
  • 19. Copyright  (c)    Bitforest  Co.,  Ltd.   VAddy s Policy 19 Software  developers  should   focus  on     software  development!
  • 20. Copyright  (c)    Bitforest  Co.,  Ltd.   VAddy s Features 20 Proprietary  security  scanning   engine  that  uses  machine  learning
  • 21. Copyright  (c)    Bitforest  Co.,  Ltd.   VAddy s List of Scan Results 21
  • 22. Copyright  (c)    Bitforest  Co.,  Ltd.   Types of Vulnerabilities and Vulnerable Parameters 22 You  can  see  the  type  of  vulnerability  (e.g.  SQL  injection)  that   was  found  along  with  the  vulnerable  URL  and  parameter   name.   This  example  shows  that  there  is  a  SQL  injection  vulnerability   in  the  parameter  "ID"  used  at  the  URL  "search",  so  you  can   figure  out  which  lines  of  code  are  at  fault.
  • 23. Copyright  (c)    Bitforest  Co.,  Ltd.   Request Data for Reproducing Attacks 23 VAddy  shows  you  the  request  data  it  sent  so  you   can  reproduce  the  attack  in  your  own   development  environment
  • 24. Copyright  (c)    Bitforest  Co.,  Ltd.   Currently Supported Scans (SQLi, XSS) • GET/POST/PUT/DELETE  parameters   • Rest  APIs  with  JSON  parameters   • Parameters  in  URL  paths   • www.example.com/item/view/1   • Form  authentication  (login  screens)   • CSRF  tokens  (including  Angular.js)   • SSL  applications 24
  • 25. Copyright  (c)    Bitforest  Co.,  Ltd.   25 Continuous  security  tests  are   an  up-­‐and-­‐coming  trend     in  software  development
  • 26. Copyright  (c)    Bitforest  Co.,  Ltd.   26 Twitter:  @vaddy_support   Email:          info@vaddy.net   Contacts
  • 27. Copyright  (c)    Bitforest  Co.,  Ltd.   27 http://vaddy.net