15.1 Introduction to Web Vulnerabilities and Hardening Flashcards
The cyber kill chain is an __________ designed to identify and prevent cyber intrusions.
The cyber kill chain is an “intelligence-driven defense framework” designed to identify and prevent cyber intrusions.
The _______ chain has been adapted to apply more directly to web server infrastructure. It includes the following stages: (5)
The hybrid kill chain, a derivative of Lockheed Martin’s cyber kill chain.
**Reconnaissance**: Information gathering stage against the target.
**Weaponization**: Preparation of offensive operations against specific targets using information gathered during reconnaissance.
**Delivery**: Launch of the operation. Attacks carried out based on Red Team offensive strategies.
**Exploitation**: Actively compromises adversary’s apps, servers, or network, and avert physical, logical, or administrative controls.
**Exfiltration**: Ultimate goal. The exfiltration of private, sensitive data that the target considers to be critically sensitive.
The ________ is widely considered to represent the most prevalent security risks facing web applications today.
The **OWASP Top 10** is widely considered to represent the most prevalent security risks facing web applications today.
True or False:
The OWASP Top 10 is a platform for standardizing awareness of threats in web application development security.
True
What is the purpose of the OWASP Top 10?
OWASP TOP 10 was created to educate a wide audience of professionals about the consequences of web application security weaknesses.
The Top 10 offers resources and best practices to software engineers, managers, designers, and organizations about how to protect against threats. Also a community.
What is OWASP’s number one threat?
Code injection, such as SQL, LDAP, OS, and NOSQL.
How is OWASP Top 10 developed?
Over 500 individuals from various organizations who work on applications and API are surveyed. OWASP prioritizes the top ten threats based on prevalence data as well as exploitability, detectability and impact.
What is the OWASP Cheat Sheet Series and what is it used for?
The OWASP Cheat Sheet Series (OCSS) is designed by application security professionals to provide a collection of significant information in regards to specific application security topics.
What are the current OWASP top 10 threats?
- Injection
- Broken Authentication
- Sensitive Data Exposure
- XML External Entities (XXE)
- Broken Access Controls
- Security Misconfigurations
- Cross-Site Scripting (XSS)
- Insecure Deserialization
- Using Components with Known Vulnerabilities
- Insufficient Logging and Monitoring
What does URL stand for?
The **Uniform Resource Locator (URL)**, also referred to as the Uniform Resource Identifer (URI), is the standardized naming convention for addressing documents that are accessible over the internet, intranets (closed network within a single organization), and extranets (closed network shared across groups or organizations).
The _______ indicates the protocol or application to use with the request, such as:
**Protocol**
- HTTP Hypertext Transfer Protocol: Used for transferring webpages.
- FTP File Transfer Protocol: Used for file transfer requests (upload and download).
- SPDY Speedy: Google’s version of HTTP, designed to speed up web content loading.
The _______ identifies a specific web server for the request of web resources.
The **Host Name** identifies a specific web server for the request of web resources.
- Domain Name:
example.com
,google.com
,facebook.com
, etc. - Sub-Domain: Typically used for specific sub-sites within a larger domain. The most common subdomain is
www
, which stands for World Wide Web. Some domains use this as an indication of publicly accessible resources and content.
The _______ request indicates which web application will be used to provide resources to the client.
The **Path** request indicates which web application will be used to provide resources to the client.
This is a directory, similar to a file or folder on your computer.
What does .asp stand for and what is it?
(Active Server Page)
Active Server Pages, commonly referred to as ASP, is Microsoft’s solution to server-side scripting.
With Active Server Pages, the server gets a chance to alter the file before sending it to the user. So, for every request for a file with a .ASP extension, the server runs the file through a DLL called ASP.DLL, which parses the ASP commands.
If your web site is run on a UNIX box, you can still use Active Server Pages, but you need to use a third party tool to translate the ASP before it is sent to the client.
________ are specifically formatted data that interact with back-end servers such as email and web databases.
**Parameters** are specifically formatted data that interact with back-end servers such as email and web databases.
Explain the different parts of a URL parameter?
http:// www.example.com /add.asp?item#3478&price=299
Each parameter is made up of a few different parts:
- The question mark (
?
) indicates the beginning of a list of parameters. - Each individual parameter has a name and a value, separated by a hash (
#
). - The name of this parameter is
item#
and the value is3478
. - A URL can have multiple parameters. These will be separated by an ampersand symbol (
&
). For example:?item# 3478&price=299
A URL is composed of many parts. Define each part of a URL:
- Protocol: http. Identifies the protocol or application to use with the HTTP request.
- Host Name: example.com. Targets a specific web server for the request of web resources.
- Path: add.asp?. Identifies which of the host’s web applications will be used to provide resources to the client.
- Parameters: ItemID=123&Price=999. Specifically formatted data that interacts with back-end databases, email, and web servers, for example.
How can a URL (also know as a URI) be used as a weapon against web servers?
A URL can be manipulated by attackers to infiltrate these various parts of the web server architecture.
Web vulnerabilities exist because SDLC faces what challenges: (6)
- Implementation costs are high.
- Lack of support from management.
- Lack of standardization.
- No quality management.
- Reactive security posture (“If it ain’t broke, don’t fix it” mentality).
- Reliance on a false sense of security that web application firewalls provide absolute protection.
What are the 5 primary stages of web server infrastructure?
**Stage 1: Client**: A user who interacts with a web server using HTTP or FTP through either a web browser or file transfer software.
- **Stage 2: Firewall:** A perimeter defense used to protect the web server sitting behind it.
- **Stage 3: Web Server**: A program such as Apache, Nginx, or IIS that responds to a client’s requests for web resources.
- **Stage 4: Web Application:** The software that runs on a remote server, such as Facebook, Twitter, or Amazon.
- **Stage 5: Database**: Typically the innermost part of the web architecture, storing data such as customer names, addresses, account numbers, and credit card info.
What is input sanitation?
The process of cleaning and scrubbing user input to prevent it from exploiting security holes. This is ensured by, when necessary, changing the value input by the user.
What is the input validation process?
**Input validation**: The testing of input supplied by a user or application, designed to prevent malformed data from entering a data information system. This is done by verifying user input meets specific criteria.
What is the SDLC process?
**Secure Software Deployment Cycles (SDLC)**: A software development methodology that ensures secure programming at every stage of the software development process.
What are the three most popular web servers in use today?
- Apache
- Nginx
- IIS
Name three ways a compromised web server can be used to perform an attack.
- A defaced webpage can contain malicious content and links to inappropriate and offensive sites, which can damage a company’s reputation.
- A compromised web server can be used to download malicious software (viruses, Trojans, botnets) to anyone visiting the webpage.
- Compromised data can be used to commit fraudulent activities, leading to loss of business or lawsuits.
The typical web application server setup is composed of five basic components. Name and define each component.
- The client: A user who interacts with a web server using HTTP or FTP through either a web browser or file transfer software.
- A firewall: A perimeter defense used to protect a web server placed behind it.
- A web server: A program such as Apache, Nginx, or IIS that responds to a client’s requests for web resources.
- Web applications: The software that runs on a remote server, such as Facebook, Twitter, Amazon.
- Databases: Typically the inner most part of the web architecture where data is stored, such as customer names, addresses, account numbers, and credit card info.
______ is an open-source web server alternative that runs on Unix, Linux, and Windows.
**Apache** is an open-source web server alternative that runs on Unix, Linux, and Windows.