Details

Web Application Defender's Cookbook


Web Application Defender's Cookbook

Battling Hackers and Protecting Users
1. Aufl.

von: Ryan C. Barnett, Jeremiah Grossman

CHF 33.00

Verlag: Wiley
Format: EPUB
Veröffentl.: 04.01.2013
ISBN/EAN: 9781118417058
Sprache: englisch
Anzahl Seiten: 560

DRM-geschütztes eBook, Sie benötigen z.B. Adobe Digital Editions und eine Adobe ID zum Lesen.

Beschreibungen

<p><b>Defending your web applications against hackers and attackers</b></p> <p>The top-selling book <i>Web Application Hacker's Handbook</i> showed how attackers and hackers identify and attack vulnerable live web applications. This new <i>Web Application Defender's Cookbook</i> is the perfect counterpoint to that book: it shows you how to <i>defend</i>. Authored by a highly credentialed defensive security expert, this new book details defensive security methods and can be used as courseware for training network security personnel, web server administrators, and security consultants.</p> <p>Each "recipe" shows you a way to detect and defend against malicious behavior and provides working code examples for the ModSecurity web application firewall module. Topics include identifying vulnerabilities, setting hacker traps, defending different access points, enforcing application flows, and much more.</p> <ul> <li>Provides practical tactics for detecting web attacks and malicious behavior and defending against them</li> <li>Written by a preeminent authority on web application firewall technology and web application defense tactics </li> <li>Offers a series of "recipes" that include working code examples for the open-source ModSecurity web application firewall module</li> </ul> <p>Find the tools, techniques, and expert information you need to detect and respond to web application attacks with <i>Web Application Defender's Cookbook: Battling Hackers and Protecting Users</i>.</p>
<p>Foreword xix</p> <p>Introduction xxiii</p> <p><b>I Preparing the Battle Space 1</b></p> <p><b>1 Application Fortification 7</b></p> <p>Recipe 1-1: Real-time Application Profiling 7</p> <p>Recipe 1-2: Preventing Data Manipulation with Cryptographic Hash Tokens 15</p> <p>Recipe 1-3: Installing the OWASP ModSecurity Core Rule Set (CRS) 19</p> <p>Recipe 1-4: Integrating Intrusion Detection System Signatures 33</p> <p>Recipe 1-5: Using Bayesian Attack Payload Detection 38</p> <p>Recipe 1-6: Enable Full HTTP Audit Logging 48</p> <p>Recipe 1-7: Logging Only Relevant Transactions 52</p> <p>Recipe 1-8: Ignoring Requests for Static Content 53</p> <p>Recipe 1-9: Obscuring Sensitive Data in Logs 54</p> <p>Recipe 1-10: Sending Alerts to a Central Log Host Using Syslog 58</p> <p>Recipe 1-11: Using the ModSecurity AuditConsole 60</p> <p><b>2 Vulnerability Identification and Remediation 67</b></p> <p>Recipe 2-1: Passive Vulnerability Identification 70</p> <p>Recipe 2-2: Active Vulnerability Identification 79</p> <p>Recipe 2-3: Manual Scan Result Conversion 88</p> <p>Recipe 2-4: Automated Scan Result Conversion 92</p> <p>Recipe 2-5: Real-time Resource Assessments and Virtual Patching 99</p> <p><b>3 Poisoned Pawns (Hacker Traps) 115</b></p> <p>Recipe 3-1: Adding Honeypot Ports 116</p> <p>Recipe 3-2: Adding Fake robots.txt Disallow Entries 118</p> <p>Recipe 3-3: Adding Fake HTML Comments 123</p> <p>Recipe 3-4: Adding Fake Hidden Form Fields 128</p> <p>Recipe 3-5: Adding Fake Cookies 131</p> <p><b>II Asymmetric Warfare 137</b></p> <p><b>4 Reputation and Third-Party Correlation 139</b></p> <p>Recipe 4-1: Analyzing the Client’s Geographic Location Data 141</p> <p>Recipe 4-2: Identifying Suspicious Open Proxy Usage?@147</p> <p>Recipe 4-3: Utilizing Real-time Blacklist Lookups (RBL) 150</p> <p>Recipe 4-4: Running Your Own RBL 157</p> <p>Recipe 4-5: Detecting Malicious Links 160</p> <p><b>5 Request Data Analysis 171</b></p> <p>Recipe 5-1: Request Body Access 172</p> <p>Recipe 5-2: Identifying Malformed Request Bodies 178</p> <p>Recipe 5-3: Normalizing Unicode 182</p> <p>Recipe 5-4: Identifying Use of Multiple Encodings 186</p> <p>Recipe 5-5: Identifying Encoding Anomalies 189</p> <p>Recipe 5-6: Detecting Request Method Anomalies 193</p> <p>Recipe 5-7: Detecting Invalid URI Data 197</p> <p>Recipe 5-8: Detecting Request Header Anomalies 200</p> <p>Recipe 5-9: Detecting Additional Parameters 209</p> <p>Recipe 5-10: Detecting Missing Parameters 212</p> <p>Recipe 5-11: Detecting Duplicate Parameter Names 214</p> <p>Recipe 5-12: Detecting Parameter Payload Size Anomalies 216</p> <p>Recipe 5-13: Detecting Parameter Character Class Anomalies 219</p> <p><b>6 Response Data Analysis 223</b></p> <p>Recipe 6-1: Detecting Response Header Anomalies 224</p> <p>Recipe 6-2: Detecting Response Header Information Leakages 234</p> <p>Recipe 6-3: Response Body Access 238</p> <p>Recipe 6-4: Detecting Page Title Changes 240</p> <p>Recipe 6-5: Detecting Page Size Deviations 243</p> <p>Recipe 6-6: Detecting Dynamic Content Changes 246</p> <p>Recipe 6-7: Detecting Source Code Leakages 249</p> <p>Recipe 6-8: Detecting Technical Data Leakages 253</p> <p>Recipe 6-9: Detecting Abnormal Response Time Intervals 256</p> <p>Recipe 6-10: Detecting Sensitive User Data Leakages 259</p> <p>Recipe 6-11: Detecting Trojan, Backdoor, and Webshell Access Attempts 262</p> <p><b>7 Defending Authentication 265</b></p> <p>Recipe 7-1: Detecting the Submission of Common/Default Usernames 266</p> <p>Recipe 7-2: Detecting the Submission of Multiple Usernames 269</p> <p>Recipe 7-3: Detecting Failed Authentication Attempts 272</p> <p>Recipe 7-4: Detecting a High Rate of Authentication Attempts 274</p> <p>Recipe 7-5: Normalizing Authentication Failure Details 280</p> <p>Recipe 7-6: Enforcing Password Complexity 283</p> <p>Recipe 7-7: Correlating Usernames with SessionIDs 286</p> <p><b>8 Defending Session State 291</b></p> <p>Recipe 8-1: Detecting Invalid Cookies 291</p> <p>Recipe 8-2: Detecting Cookie Tampering 297</p> <p>Recipe 8-3: Enforcing Session Timeouts 302</p> <p>Recipe 8-4: Detecting Client Source Location Changes During Session Lifetime 307</p> <p>Recipe 8-5: Detecting Browser Fingerprint Changes During Sessions 314</p> <p><b>9 Preventing Application Attacks 323</b></p> <p>Recipe 9-1: Blocking Non-ASCII Characters 323</p> <p>Recipe 9-2: Preventing Path-Traversal Attacks 327</p> <p>Recipe 9-3: Preventing Forceful Browsing Attacks 330</p> <p>Recipe 9-4: Preventing SQL Injection Attacks 332</p> <p>Recipe 9-5: Preventing Remote File Inclusion (RFI) Attacks 336</p> <p>Recipe 9-6: Preventing OS Commanding Attacks 340</p> <p>Recipe 9-7: Preventing HTTP Request Smuggling Attacks 342</p> <p>Recipe 9-8: Preventing HTTP Response Splitting Attacks 345</p> <p>Recipe 9-9: Preventing XML Attacks 347</p> <p><b>10 Preventing Client Attacks 353</b></p> <p>Recipe 10-1: Implementing Content Security Policy (CSP) 353</p> <p>Recipe 10-2: Preventing Cross-Site Scripting (XSS) Attacks 362</p> <p>Recipe 10-3: Preventing Cross-Site Request Forgery (CSRF) Attacks 371</p> <p>Recipe 10-4: Preventing UI Redressing (Clickjacking) Attacks 377</p> <p>Recipe 10-5: Detecting Banking Trojan (Man-in-the-Browser) Attacks 381</p> <p><b>11 Defending File Uploads 387</b></p> <p>Recipe 11-1: Detecting Large File Sizes 387</p> <p>Recipe 11-2: Detecting a Large Number of Files 389</p> <p>Recipe 11-3: Inspecting File Attachments for Malware 390</p> <p><b>12 Enforcing Access Rate and Application Flows 395</b></p> <p>Recipe 12-1: Detecting High Application Access Rates 395</p> <p>Recipe 12-2: Detecting Request/Response Delay Attacks 405</p> <p>Recipe 12-3: Identifying Inter-Request Time Delay Anomalies 411</p> <p>Recipe 12-4: Identifying Request Flow Anomalies 413</p> <p>Recipe 12-5: Identifying a Significant Increase in Resource Usage 414</p> <p><b>III Tactical Response 419</b></p> <p><b>13 Passive Response Actions 421</b></p> <p>Recipe 13-1: Tracking Anomaly Scores 421</p> <p>Recipe 13-2: Trap and Trace Audit Logging 427</p> <p>Recipe 13-3: Issuing E-mail Alerts 428</p> <p>Recipe 13-4: Data Sharing with Request Header Tagging 436</p> <p><b>14 Active Response Actions 441</b></p> <p>Recipe 14-1: Using Redirection to Error Pages 442</p> <p>Recipe 14-2: Dropping Connections 445</p> <p>Recipe 14-3: Blocking the Client Source Address 447</p> <p>Recipe 14-4: Restricting Geolocation Access Through Defense Condition</p> <p>(DefCon) Level Changes 452</p> <p>Recipe 14-5: Forcing Transaction Delays 455</p> <p>Recipe 14-6: Spoofing Successful Attacks 462</p> <p>Recipe 14-7: Proxying Traffic to Honeypots 468</p> <p>Recipe 14-8: Forcing an Application Logout 471</p> <p>Recipe 14-9: Temporarily Locking Account Access 476</p> <p><b>15 Intrusive Response Actions 479</b></p> <p>Recipe 15-1: JavaScript Cookie Testing 479</p> <p>Recipe 15-2: Validating Users with CAPTCHA Testing 481</p> <p>Recipe 15-3: Hooking Malicious Clients with BeEF 485</p> <p>Index 495</p>
<p><b>RYAN BARNETT</b> is a Lead Security Researcher in Trustwave's SpiderLabs Team, an advanced security team focused on penetration testing, incident response, and application security. He is the ModSecurity web application firewall project lead, a SANS Institute certified instructor, and a frequent speaker at industry conferences.</p>
<p><b>100+ recipes to improve your defenses</b></p> <p>Are your web applications secure? Do you know how to lock down new web applications when they are placed into production? Do you know if attackers are trying to break into your site and steal data or cause other harm? The solutions in this book provide answers to these critical questions and increase your ability to thwart malicious activity within your web applications.</p> <p>Each recipe includes background data explaining how the attack works, an ingredients list, and step-by-step directions. You'll learn how to prepare for attacks, analyze web transactions for malicious activity, and respond with the best solutions. ModSecurity, a versatile, open source web application firewall module for Apache, Microsoft IIS, and Nginx web server platforms, is used to demonstrate each defensive technique.</p> <p><b>Learn to:</b></p> <ul> <li>Implement full HTTP auditing for incident response</li> <li>Utilize virtual patching processes to remediate identified vulnerabilities</li> <li>Deploy web tripwires (honeytraps) to identify malicious users</li> <li>Detect when users are acting abnormally</li> <li>Analyze uploaded files and web content for malware</li> <li>Recognize when web applications leak sensitive user or technical data</li> <li>Respond to attacks with varying levels of force</li> </ul>

Diese Produkte könnten Sie auch interessieren:

Reversing
Reversing
von: Eldad Eilam
EPUB ebook
CHF 28.00
Die Kunst des Einbruchs
Die Kunst des Einbruchs
von: Kevin Mitnick, William L. Simon
PDF ebook
CHF 14.50
Die Kunst der Täuschung
Die Kunst der Täuschung
von: Kevin D. Mitnick, William Simon
PDF ebook
CHF 14.50