Tour of OWASP’s projects Sebastien Deleersnyder Dec 1, 2010 OWASP BeNeLux 2010 Copyright © 2010 - The OWASP Foundation This work is available under the Creative Commons SA 2.5 license The OWASP Foundation http://www.owasp.org OWASP Tools and Technology • Vulnerability Scanners • Static Analysis Tools • Fuzzing • Penetration Testing Tools • Code Review Tools • ESAPI Automated Security Verification Manual Security Verification • AppSec Libraries • ESAPI Reference Implementation • Guards and Filters • Reporting Tools • Flawed Apps • Learning Environments • Live CD • SiteGenerator Secure Coding AppSec Management AppSec Education Security Architecture OWASP 2 OWASP Body of Knowledge Guidance and Tools for Measuring and Managing Application Security Guide to Application Security Testing and Guide to Application Security Code Review Verifying Application Security AppSec Conferences Chapters Projects Guide to Building Secure Web Applications and Web Services Acquiring and Building Secure Applications Research Projects to Figure Out How to Secure the Use OWASP Community Platform of New (wiki, forums, mailing lists) Technologies (like Ajax) OWASP Foundation 501c3 Managing Application Security Core Application Security Knowledge Base Research to Secure New Technologies Web Based Learning Environment and Guide for Learning Application Security Application Security Tools AppSec Education and CBT Tools for Scanning, Testing, Simulating, and Reporting Web Application Security Issues Principles Threat Agents, Attacks, Vulnerabilities, Impacts, and Countermeasures OWASP Top level view There are a lot of OWASP projects OWASP Metrics Categorizing and organizing projects Maturity, activity level, quality, relevance OWASP 6 Assessment Criteria OWASP 7 OWASP 8 OWASP 9 Categories PROTECT - These are tools and documents that can be used to guard against security-related design and implementation flaws. DETECT - These are tools and documents that can be used to find security-related design and implementation flaws. LIFE CYCLE - These are tools and documents that can be used to add security-related activities into the Software Development Life Cycle (SDLC). OWASP 10 OWASP projects by numbers Total Projects: 122 Release quality: 19 Beta quality: 28 Alpha quality: 89 Inactive: 6 OWASP Dashboard OWASP 12 Assessment details OWASP 13 Project Parade The ‘Big 4’ Documentation Projects Building Guide Code Review Guide Testing Guide Application Security Desk Reference (ASDR) OWASP The Guide Complements OWASP Top 10 310p Book Free and open source Gnu Free Doc License Many contributors Apps and web services Most platforms Examples are J2EE, ASP.NET, and PHP Comprehensive Project Leader and Editor Andrew van der Stock, vanderaj@owasp.org OWASP Uses of the Guide Developers Use for guidance on implementing security mechanisms and avoiding vulnerabilities Project Managers Use for identifying activities (threat modeling, code review, penetration testing) that need to occur Security Teams Use for structuring evaluations, learning about application security, remediation approaches OWASP Each Topic Includes Basic Information (like OWASP T10) How to Determine If You Are Vulnerable How to Protect Yourself Adds Objectives Environments Affected Relevant COBIT Topics Theory Best Practices Misconceptions Code Snippets OWASP Testing Guide v3: Index 1. Frontispiece 2. Introduction 3. The OWASP Testing Framework 4. Web Application Penetration Testing 5. Writing Reports: value the real risk Appendix A: Testing Tools Appendix B: Suggested Reading Appendix C: Fuzz Vectors OWASP 19 Evolution V3 Information Gathering Business Logic Testing Authentication Testing Session Management Testing Data Validation Testing Denial of Service Testing Web Services Testing Ajax Testing Information Gathering Config. Management Testing Business Logic Testing Authentication Testing Authorization Testing Session Management Testing Data Validation Testing Denial of Service Testing Web Services Testing Ajax Testing Encoded Appendix OWASP 20 How the Guide helps the security industry Pen-testers Organisations A structured approach to the testing activities A checklist to be followed A learning and training tool A tool to understand web vulnerabilities and their impact A way to check the quality of the penetration tests they buy More in general, the Guide aims to provide a pen-testing standard that creates a 'common ground' between the pen-testing industry and its client. This will raise the overall quality and understanding of this kind of activity and therefore the general level of security in our infrastructures OWASP 21 OWASP Application Security Verification Std Standard for verifying the security of web applications Four levels Automated Manual Architecture Internal OWASP 22 OWASP Software Assurance Maturity Model OWASP 23 Tools http://www.owasp.org/index.php/Phoenix/Tools Best known OWASP Tools WebGoat WebScarab Remember: A Fool with a Tool is still a Fool OWASP Live CD Project that collects some of the best open source security projects in a single environment http://www.owasp.org/index.php/LiveCD Users can boot from Live CD and immediately start using all tools without any configuration OWASP 25 Available Tools 25 “significant” tools OWASP WebScarab v20090122 OWASP WebGoat v5.2 OWASP CAL9000 v2.0 OWASP JBroFuzz v1.2 OWASP DirBuster v0.12 OWASP OWASP SQLiX WSFuzzer v1.0 v1.9.4 OWASP Wapiti v2.0.0-beta Paros Proxy v3.2.13 nmap & Zenmap v 4.76 Wireshark v1.0.5 Firefox 3.06 + 25 addons Burp Suite v1.2 Grendel Scan v1.0 Metasploit v3.2 w3af + GUI svn Netcats – (svn) r2161 original + GNU Nikto v2.03 Firece Domain Scanner v1.0.3 Maltego CE v2-210 Spike Proxy v1.4.8-4 Rat Proxy v1.53-beta tcpdump v4.0.0 Httprint v301 SQLBrute v1.0 sqlmap v0.7-rc1 now included! OWASP 26 OWASP WebGoat OWASP 27 OWASP WebScarab OWASP 28 Tools – At Best 45% MITRE found that all application security tool vendors’ claims put together cover only 45% of the known vulnerability types (over 600 in CWE) They found very little overlap between tools, so to get 45% you need them all (assuming their claims are true) OWASP 29 OWASP SecurityConfiguration IntrusionDetector Logger Exception Handling Randomizer EncryptedProperties Encryptor HTTPUtilities Encoder Validator AccessReferenceMap AccessController User Authenticator The OWASP Enterprise Security API Custom Enterprise Web Application Enterprise Security API Existing Enterprise Security Services/Libraries 30 Create Your ESAPI Implementation Your Security Services Wrap your existing libraries and services Extend and customize your ESAPI implementation Fill in gaps with the reference implementation Your Coding Guideline Tailor the ESAPI coding guidelines Retrofit ESAPI patterns to existing code OWASP 31 OWASP CSRFTester OWASP 32 OWASP CSRFGuard 2.0 OWASP CSRFGuard Adds token to: Verify Token User (Browser) href attribute src attribute hidden field in all forms Business Processing Actions: Add Token to HTML http://www.owasp.org/index.php/CSRFGuard Log Invalidate Redirect OWASP 33 SDLC & OWASP Guidelines OWASP Framework OWASP 34 Want More ? OWASP OWASP OWASP OWASP OWASP OWASP OWASP OWASP OWASP OWASP OWASP OWASP OWASP OWASP OWASP OWASP OWASP OWASP OWASP OWASP OWASP OWASP OWASP OWASP OWASP .NET Project ASDR Project AntiSamy Project AppSec FAQ Project Application Security Assessment Standards Project Application Security Metrics Project Application Security Requirements Project CAL9000 Project CLASP Project CSRFGuard Project CSRFTester Project Career Development Project Certification Criteria Project Certification Project Code Review Project Communications Project DirBuster Project Education Project Encoding Project Enterprise Security API Flash Security Project Guide Project Honeycomb Project Insecure Web App Project Interceptor Project OWASP OWASP OWASP OWASP OWASP OWASP OWASP OWASP OWASP OWASP OWASP OWASP OWASP OWASP OWASP OWASP OWASP OWASP OWASP OWASP OWASP OWASP OWASP OWASP JBroFuzz Java Project LAPSE Project Legal Project Live CD Project Logging Project Orizon Project PHP Project Pantera Web Assessment Studio Project SASAP Project SQLiX Project SWAAT Project Sprajax Project Testing Project Tools Project Top Ten Project Validation Project WASS Project WSFuzzer Project Web Services Security Project WebGoat Project WebScarab Project XML Security Gateway Evaluation Criteria Project on the Move Project OWASP 35 OWASP Research Grants We support the research that keeps your organization safe! OWASP 36 OWASP Projects Are Alive! 2009 … 2007 2005 2003 2001 OWASP 37 How to participate? Start your own project The best OWASP projects are strategic get the community involved / build a team Contribute exising (open license) Promotion! ‘Help’ an existing project OWASP Questions and Answers OWASP