Title: Computer and Network Infrastructure Attacks
1Computer and Network Infrastructure Attacks
Kazumi Nakandakari
1. What is OWASP ?
- 2. The OWASP Top Ten a list of the 10 most
dangerous current Web application security flaws. - 1) Unvalidated Input 2) Broken Access Control
- 3) Broken Authentication and Session Management
- 4) Cross Site Scripting 5) Buffer Overflow
- 6) Injection Flaws 7) Improper Error Handling
- 8) Insecure Storage 9) Application Denial of
Service - 10) Insecure Configuration Management
2SQL Injection(One of top 10 vulnerability in web
applications)
Password
Kazumi
' or '' '
Query looks like this
Wrong user name
"SELECT id FROM logins WHERE username
Kazumi' and password '' or '' ''"
The '' '' will aways evaluate to TRUE since an
empty string is equal to an emptystring. Â You
provide the wrong username and password, this is
how the where clause is evaluated FALSE and
FALSE or TRUEThis first one comes from username
'bob' is false. The second one comes from
password '' is false. The last one comes from
'' '' is always true. Since the 'and' operator
has a higher precedence that the 'or', you
evaluate it first. Â FALSE and FALSE or TRUE
(FALSE and FALSE) or TRUE FALSE or TRUEand
when you perform a logical OR, if either left or
right side is true, the whole thing is TRUE.
TRUE
3Detection mechanism for SQL injection
- You must check and determine information that a
user entered. You should prevent them from
appearing in the form of input, or escaping them
whether characters are special. - Use reusable components in several languages to
help prevent many forms of injection as well as
CodeSeeker which is an application level firewall
released by OWASP.
4Commwarrior.C
- Commwarrior.C is a Bluetooth and MMS worm.
- Commwarrior.C uses Bluetooth for spreading by
searching other phone numbers. Subsequently, it
will send MMS messages infected with copies of
itself to phone numbers found in the phonebook.
The SIS files (commw.sis) that Comwarrior sends
are renamed randomly, so it isnt possible for
users to avoid receiving malicious file names.
5Detection mechanism for Commwarrior.C
- Download F-Secure Mobile AntiVirus program.
- Dont install unknown applications arriving in
MMS messages and keep Bluetooth in undiscoverable
mode.