Open rainit2006 opened 1 month ago
To test a web app for broken access control security risks, consider the following strategies:
The most important preventative measure is to design and implement a robust role-based access control (RBAC) system. Ensure that each user role has the minimum necessary permissions (least privilege principle). Enforce these roles consistently throughout the application, both on the front end and back end.
To test for this risk:
To test your web app for injection risks:
The testing strategies for insecure design are more nuanced and include:
Hurried deployments and a lack of security awareness are the primary causes of these risks.
To test your web applications for security misconfigurations:
Web applications that rely on vulnerable components inherit their weaknesses, which provides a potential path for threat actors to exploit.
To test web applications for vulnerable/outdated components:
To test for this OWASP Top 10 risk:
To test for these failures, consider:
A lack of detailed logs or the absence of monitoring creates blind spots that prevent timely detection of unauthorized access, data breaches, or other malicious activities.
To assess if a web application has these risks:
This risk facilitates lateral movements in network infrastructures and enables attackers to interface with backend services or exfiltrate data.
To test for SSRF:
https://portswigger.net/support/using-burp-to-test-for-the-owasp-top-ten
Using Burp to Test For Injection Flaws
Injection Attack: Bypassing Authentication
Using Burp to Detect SQL-specific Parameter Manipulation Flaws Using Burp to Exploit SQL Injection Vulnerabilities: The UNION Operator Using Burp to Detect Blind SQL Injection Bugs Using Burp to Exploit Bind SQL Injection Bugs
Using Burp to Brute Force a Login Page Using Burp to Test for Sensitive Data Exposure Issues
Injection Attack: Bypassing Authentication
Using Burp to Hack Cookies and Manipulate Sessions
Using Burp to Test Token Generation
Using Burp to Test Session Token Handling
Using Burp to Test for Insecure Direct Object References
Using Burp to Find Cross-Site Scripting Issues Using Burp to Manually Test for Reflected XSS
Using Burp to Exploit XSS - Injecting in to Scriptable Contexts
Using Burp to Test for Insecure Direct Object References
Using Burp to Test for Security Misconfiguration Issues
Using Burp to Test for Sensitive Data Exposure Issues
Using Burp to test for Missing Function Level Access Control Using Burp's "Request in Browser" Function to Test for Access Control Issues
Using Burp to Test for Cross-Site Request Forgery (CSRF)
video: https://www.youtube.com/watch?v=NtggatbBetU
Using Burp to Test for Components with Known Vulnerabilities
https://portswigger.net/web-security/xxe
Server-side request forgery is a web security vulnerability that allows an attacker to cause the server-side application to make requests to an unintended location.
In a typical SSRF attack, the attacker might cause the server to make a connection to internal-only services within the organization's infrastructure. In other cases, they may be able to force the server to connect to arbitrary external systems. This could leak sensitive data, such as authorization credentials.
Example When a user views the stock status for an item, their browser makes the following request:
POST /product/stock HTTP/1.0
Content-Type: application/x-www-form-urlencoded
Content-Length: 118
stockApi=http://stock.weliketoshop.net:8080/product/stock/check%3FproductId%3D6%26storeId%3D1
This causes the server to make a request to the specified URL, retrieve the stock status, and return this to the user.
In this example, an attacker can modify the request to specify a URL local to the server:
POST /product/stock HTTP/1.0
Content-Type: application/x-www-form-urlencoded
Content-Length: 118
stockApi=http://localhost/admin
The server fetches the contents of the /admin URL and returns it to the user.
Instead of localhost, attacker can try to use other IP address: In the previous example, imagine there is an administrative interface at the back-end URL https://192.168.0.68/admin. An attacker can submit the following request to exploit the SSRF vulnerability, and access the administrative interface:
POST /product/stock HTTP/1.0
Content-Type: application/x-www-form-urlencoded
Content-Length: 118
stockApi=http://192.168.0.68/admin
Burp Scanner automatically detects web cache deception vulnerabilities that are caused by path mapping discrepancies during audits. You can also use the Web Cache Deception Scanner BApp to detect misconfigured web caches.
OWASP Top10
AWS WAF -- Addressing OWASP Top 10 risks
https://aws.amazon.com/developer/application-security-performance/articles/addressing-owasp-top-10-risks/?nc1=h_ls
In addition to the custom rules that you configure in AWS WAF, it's recommended to use Amazon Managed Rules (AMR). (AMRs) is a set of rules inspired by OWASP top 10 and maintained by the AWS Threat Research Team. It's designed to to protect applications from the most common and high-severity threats while keeping a very low false positive rate across all customers. https://aws.amazon.com/jp/developer/application-security-performance/articles/addressing-owasp-top-10-risks/