F5 Web Application Security Insights
F5 Web Application Security Insights
F5
Web
Application
Security
Radovan Gibala
Senior Solutions Architect
[email protected]
+420 731 137 223
2011
2
Cookie Poisoning
Hidden-Field Manipulation
PORT 443 !
Forced
Parameter Tampering Access to
But Is Open
!
Infrastructural
to Web Traffic
Information
High
Intelligence Information
Density
=
High Value
Attack
4
Web developers?
Network Security?
Engineering services?
DBA?
6
1+1=2
Application Performance
7
Best
Automated
Practice
& Targeted
Design
Testing
Methods
Only protects against Web Done periodically; only
known vulnerabilities Apps as good as the last test
Difficult to enforce; Only checks for known
especially with sub- vulnerabilities
contracted code Does it find everything?
Only periodic updated;
large exposure window
8
Best
Automated
Practice
& Targeted
Design
Testing
Methods
Only protects against Web Done periodically; only
known vulnerabilities Apps as good as the last test
Difficult to enforce; Only checks for known
especially with sub- vulnerabilities
contracted code Does it find everything?
Only periodic updated; Web
large exposure window Application
Firewall
Real-time 24 x 7 protection
Enforces Best Practice Methodology
Allows immediate protection against
new vulnerabilities
11
A2 – Injection Flaws Injection flaws, particularly SQL injection, are common in web applications. Injection occurs
when user-supplied data is sent to an interpreter as part of a command or query. The
attacker’s hostile data tricks the interpreter into executing unintended commands or
changing data.
A3 – Insecure Remote File Include Code vulnerable to remote file inclusion allows attackers to include hostile code and data,
resulting in devastating attacks, such as total server compromise.
A4 – Insecure Direct Object Reference A direct object reference occurs when a developer exposes a reference to an internal
implementation object, such as a file, directory, database record, or key, as a URL or form
parameter. Attackers can manipulate those references to access other objects without
authorization.
A5 – Cross Site Request Forgery (CSRF) A CSRF attack forces a logged-on victim’s browser to send a pre-authenticated request to a
vulnerable web application, which then forces the victim’s browser to perform a hostile
action to the benefit of the attacker.
A6 – Information Leakage and Improper Applications can unintentionally leak information about their configuration, internal workings,
Error Handling or violate privacy through a variety of application problems. Attackers use this weakness
to violate privacy, or conduct further attacks.
A7 – Broken Authentication and Session Account credentials and session tokens are often not properly protected. Attackers
Management compromise passwords, keys, or authentication tokens to assume other users’ identities.
A8 – Insecure Cryptographic Storage Web applications rarely use cryptographic functions properly to protect data and credentials.
Attackers use weakly protected data to conduct identity theft and other crimes, such as
credit card fraud.
A9 – Insecure Communications Applications frequently fail to encrypt network traffic when it is necessary to protect sensitive
communications.
A10 – Failure to Restrict URL Access Frequently, the only protection for sensitive areas of an application is links or URLs are not
presented to unauthorized users. Attackers can use this weakness to access and perform
unauthorized operations.
12
Simple Version:
– Does your WAF discover that the Price of an Item on an Online
Shop was changed ?
14
Simple Version:
– Does your WAF discover that the Price of an Item on an Online
Shop was changed ?
Technical Version:
– OWASP
(http://www.owasp.org/index.php/OWASP_Top_Ten_Project )
1. Unvalidated Input
2. Broken Access Control
3. Broken Authentication and Session Management
4. Cross Site Scripting
5. Buffer Overflow
6. Injection Flaws
7. Emproper Error Handling
8. Insecure Storage
9. Application Denial of Service
10. Insecure Configuration Management
16
!
Unauthorised
And Stops
Bad !Non-
Access Requests compliant
Information
WAF Allows
Browser
! Legitimate Requests
Unauthorised
!
Infrastructural
Access Intelligence
Bi-directional:
– Inbound: protection from generalised & targeted attacks
– Outbound: content scrubbing & application cloaking
Application content & context aware
High performance, low latency, high availability, high
security
Policy-based full proxy with deep inspection & Java support
Positive security augmenting negative security
Central point of application security enforcement
19
Definition of Good
Browser and Bad Behaviour
20
!
ALLOWED
Username
From Acc. $ Amount
Password To Acc. Transfer
? !
!
VIOLATION
VIOLATION
PARAMETER NAMES
Typical
‘standard’
starting point OBJECT NAMES
OBJECT TYPES
22
Enforcement
Content Scrubbing
Application Cloaking
Security policy
Response delivered applied
OBJECT TYPES
26
Learning mode
– Gradual deployment
– Transparent / semi-transparent / full blocking
27
Layer 7 DOS/DDOS
DOS/DDOS attacks are on the increase
The wide spread of malware is providing much more
tools/means to execute these attacks via BOTnets
Danger of DOS:
– Service availability
– Resource cost optimization
– Stability of the security state
Two main scenarios
– Network pipe is saturated
– Server resources are saturated
An ideal solution will stop the malicious traffic, allowing
legitimate end users to get service – Automatically!!!
28
Hacking Automation
Attackers are using commercial scanners to find
vulnerabilities
Automated attack BOTS/ Worms randomly scan
the internet for vulnerabilities and exploit them
What is the probably the most difficult BOT
activity to detect ?
– Web Scraping : “Stealing” IP content from a website,
harvesting its database
30
IT Staff IT Staff
Automated
scraper
Problem
Entire web site is being scraped of valuable IP information
Scrapers fail to provide company’s terms and updates
Sites copying content end up ranking above company’s for keywords
Need logging and reporting on Web scraping
31
IT Staff IT Staff
Automated
scraper
Web Domino Network
Solution
Protects valuable intellectual property
Prices are controlled and users see airline approved inventory
Integrated scrape reporting for PCI compliance
Avoid litigation drastically reducing legal costs
33
Design rate
shaping and
interval requests
before blocking
Add IP addresses
to Whitelist for
allowable scrapers
34
XML Firewall
Well formatted validation
Schema/WSDL validation
Methods selection
Attack signatures for XML platforms
Backend Parser protection
XML islands application protection
Full request Logging
40
IP “penalties”
IP Penalty Enforcer
– Regular and repeatable attacks from reported IPs are
mitigated
– A policy in ASM allows only a designated number of
violations blocked per minute
– Upon threshold the IP session is blocked
– Tighter security coverage for IP violators
41
Secerno DataWall
Real-Time database activity monitoring
and blocking
Responds to each type of threat via either logging, monitoring,
alerting, blocking or substituting.
Enables rapid application development by reducing the need for
intensive security code development
Enforces a positive-security model: Only approved behavior is
allowed
Zero false positives
43
The Integration:
F5 ASM+Secerno DataWall
Monitor & Block traffic at the web and database layers
Application sessions tracked from client to database and back.
When anomalies are detected by ASM, they are logged to both the ASM & Secerno
DataWall logs.
– ASM provides user and web context of the attack to Secerno enabling complete visibility of attack from source
IP address, through HTTP page and session to SQL transaction.
– Secerno can analyse the full SQL transaction to see if the query is out of policy, rather than just a fragment.
Ensures that administrators are always able to get consistent, correlated application
monitoring data.
Web tier attacks are blocked by ASM
Undetected attacks that get to the database are blocked by Secerno DataWall
Users who do not access the database via the web application (DBA’s, consultants,
and operations staff) are still controlled by Secerno, whether the access is made over
then network, remote session, SSH or keyboard.
44
Mitigates Brute-
Length Checks Force Attacks Rate Limits
Anti-SPAM
Data Guard Length Checks Grey-Listing
“Stepping-Stone” Security
Application
BIG-IP ASM
App. Protocol
BIG-IP PSM
BIG-IP LTM
Transport
Network
Data Link
49
Reporting
54
Reporting
55
Overall www.f5.com
Technical ask.f5.com
devcentral.f5.com
F5 University www.f5university.com/
» Login: your email
» Password: adv5tech
Partner Informaiotn
www.f5.com/partners
www.f5.com/training_services/certification/certFAQ.html
Gartner Report http://mediaproducts.gartner.com/reprints/f5networks/article1/article1.html
Let us know if you need any clarification or you have any further questions.
64
Application
Delivery
At Home Network SAP
In the Office Microsoft
On the Road Oracle