SlideShare a Scribd company logo
1 of 39
Download to read offline
© 2013 Imperva, Inc. All rights reserved.
Blueprint for Web Attack Survival
Confidential1
Kasey Cross, Sr. Manager, Web Security, Imperva
Nick Silver, Sr. Solutions Architect, WhiteHat Security
© 2013 Imperva, Inc. All rights reserved.
Agenda
Confidential2
§  Application Threatscape
§  Solutions to Mitigate Web Attacks
© 2013 Imperva, Inc. All rights reserved.
Presenters
Confidential3
§  Kasey Cross
•  Senior Product Marketing Manager at Imperva
•  Frequent speaker at industry events
•  Managed SecureSphere WAF product line
for 8 years
§  Nick Silver
•  Sr. Solutions Architect at WhiteHat Security
© 2013 Imperva, Inc. All rights reserved.
Application Threatscape
Confidential4
Web Application Vulnerabilities and Threats
© 2013 Imperva, Inc. All rights reserved.
Industry Averages for 2012
Confidential5
© 2013 Imperva, Inc. All rights reserved. Confidential6
The average number of days in a year a website is exposed to at least
one serious* vulnerability
© 2013 Imperva, Inc. All rights reserved.
Industrialization of Hacking and Automation
Researching
Vulnerabilities
Developing Exploits
Growing Botnets
Exploiting Targets
Consuming
Direct Value: PII, CCN
Command & Control
Malware Distribution
Phishing & spam
DDoS
Growing Botnets and
Exploiting Vulnerabilities
Selecting Targets via
Search Engines
Templates & Kits
Centralized
Management
Roles Optimization Automation
Confidential7
© 2013 Imperva, Inc. All rights reserved.
Hacktivism Attack Targets and Methods
2010
Now
2011
2012
2013
Titanic
Takeover
Tuesday
Operation
Payback
HTTP Flood “Abibil Assassin” (Vertigo &
KamiNa variants) & attack to login page from
54 countries
Confidential8
© 2013 Imperva, Inc. All rights reserved.
Distributed Denial of Service Threats
Confidential9
§  74% of organizations received a
DDoS attack in past year1
§  Many DDoS attacks are launched by botnets, because of
scale
•  Toolkits automate DDoS attacks
•  Botnets for rent from $50 - $2K
§  DDoS attacks are moving up the stack
•  Less expensive; requires few attackers
•  Bypasses network security measures DDoS Attack Tool
1 ”The Trends and Changing Landscape of DDoS Threats and Protection,” Forrester Research
© 2013 Imperva, Inc. All rights reserved.
Commercialized DDoS
§  Customer satisfaction guarantee!
Confidential10
© 2013 Imperva, Inc. All rights reserved.
Commercialized DDoS
§  Customer satisfaction guarantee!
Confidential11
© 2013 Imperva, Inc. All rights reserved.
Step-by-Step Instructions to Survive
a Web Attack
Confidential12
© 2013 Imperva, Inc. All rights reserved.
1. Understand the Threat Actor
Confidential13
§  Identify the attack source:
•  Research their attack
techniques and tools
§  Hacktivism:
•  Monitor social media, Twitter,
Facebook, and YouTube
•  Identify DDoS attack tools and
“booster packs”
§  Cybercrime:
•  Talk to peers in your industry about attack sources and tools
•  Read hacker intelligence reports and security research
13
© 2013 Imperva, Inc. All rights reserved.
2. Develop a Security Response Plan
Confidential14
§  Organize an incident response team
•  IT security personnel, networking, and application development
teams
•  Assign 24x7 coverage
§  Create a Red Team
•  Security engineers that will look for vulnerabilities
•  Evaluate all potential risks including, application, network, end-
user, social engineering, and even physical threats
14
© 2013 Imperva, Inc. All rights reserved.
§  DNS and Internet Service Providers
§  DDoS Protection Services
§  Relevant security consultants
Little Black Book of Contacts
Confidential15
§  IT security managers
§  IT operations managers
§  Networking operators
§  Application developers
§  Database administrators
§  Legal
§  Executive management
Gather the names, phone numbers, and
email addresses of:
INTERNALEXTERNAL
© 2013 Imperva, Inc. All rights reserved.
Document Network and Server Information
Confidential16
§  Gather IP address and network info for:
•  Web servers
•  Databases
•  DNS servers
•  Network firewalls
•  Web application firewalls
•  Database firewalls
•  Routers and switches
•  Disaster recovery networks
§  Develop network architecture diagrams
16
Security Tip:
Keep network information
and contact lists secure
© 2013 Imperva, Inc. All rights reserved.
Notify Management & Set Up a War Room
Confidential17
§  Inform Executive Management of the threat
§  Consider warning employees
•  Notify users of potential
downtime (for DDoS)
•  Educate employees about phishing
•  Prepare IT for social
engineering threats
§  Establish a War Room
•  “Ground zero” for planning and
communications
17
© 2013 Imperva, Inc. All rights reserved.
3. Locate and Assess Servers and Apps
Confidential18
§  Scan your network to identify all assets (cloud and local)
•  Classify assets by information and brand sensitivity to identify high
risk landscapes
•  Prioritize efforts to based on risk levels
§  Secure database access
•  Scan DBs for vulnerabilities or configuration flaws
•  Remove any default or unnecessary user accounts
•  Disable unneeded services
18
© 2013 Imperva, Inc. All rights reserved.
Perform Vulnerability Assessments
Confidential19
§  Perform vulnerability assessments
•  Scan both Network and Application Layers
•  Scan all known Web Assets
•  Scan Concurrently and Continuously
•  Analyze application functionality for DDoS attack potential and
Business Logic based exploits
•  Implement assessment practice across the entire SDLC
19
Design" Development" QA" Production"
© 2013 Imperva, Inc. All rights reserved.
4. Application, Network & End-Point Controls
Confidential2020
Anti Virus
Network
Security
Database
Security
Install anti-virus and
anti-malware
software on servers.
Make sure definition
files are up to date.
Block all
unnecessary ports
with the firewall.
Configure the IPS to
block high and critical
violations.
Configure your
database firewall to
block unauthorized
SQL queries, limit
access, and virtually
patch vulnerabilities.
© 2013 Imperva, Inc. All rights reserved.
Ratchet Up Web App Firewall Protection
Confidential21
§  Review and tune the web application profile
•  Review acceptable characters & parameter value lengths
•  Compare the profile to vulnerability scan results
§  Tighten profile policies to block based on profile violations
21
Directories
URLs
© 2013 Imperva, Inc. All rights reserved.
Block Web Attacks and Attack Sources
Confidential22
© 2013 Imperva, Inc. All rights reserved.
WAF Policies to Stop App DDoS Attacks
Confidential23
§  Create policies that block:
•  High rates of requests in a short
period of time by IP address, by
user, and by session
•  Known malicious IP addresses,
anonymous proxies, and Tor networks
•  Users that request many files with extensions like “.pdf”, “.mp3” or
“.mp4” in a short period of time
•  Users that download large amounts of data
•  Users that initiate multiple requests that cause extremely slow
web server responses
23
DDoS Preparation Tip
Make sure you can
manage your security
products from an out-of-
band network
© 2013 Imperva, Inc. All rights reserved.
While app DDoS attacks target Web servers & databases
network DDoS attacks target your Internet connection
Stopping Network DDoS Threats
Confidential2424
Web Servers
and Databases
© 2013 Imperva, Inc. All rights reserved.
While app DDoS attacks target Web servers & databases
network DDoS attacks target your Internet connection
Stopping Network DDoS Threats
Confidential2525
Web Servers
and Databases
© 2013 Imperva, Inc. All rights reserved.
While app DDoS attacks target Web servers & databases
network DDoS attacks target your Internet connection
Stopping Network DDoS Threats
Confidential2626
Web Servers
and Databases
To prevent network DDoS attacks, look at DDoS mitigation
services that stop attacks before they reach your network
© 2013 Imperva, Inc. All rights reserved.
While app DDoS attacks target Web servers & databases
network DDoS attacks target your Internet connection
Stopping Network DDoS Threats
Confidential2727
Web Servers
and Databases
To prevent network DDoS attacks, look at DDoS mitigation
services that stop attacks before they reach your network
© 2013 Imperva, Inc. All rights reserved.
§  Continuously monitor alerts from security and network
devices and from performance monitoring tools
§  If attacks are coming from a specific geographic area,
create policies to block requests from that area
§  If you can detect which URLs
bots are targeting, create bot
mitigation rules that block bots
from accessing those URLs
§  Monitor social media, hacker forums, IRC chat rooms,
and sites that list website defacements
5. Security Procedures When Under Attack
Confidential2828
© 2013 Imperva, Inc. All rights reserved.
Stop DDoS Attacks that Target Databases
Confidential29
§  Attackers often target search, login & registration pages
§  Create custom policies to block the attacks
•  Block an excessive number of failed logins
•  Block multiple successful logins from the same user
29
Number of
Occurrences
Failed Login
© 2013 Imperva, Inc. All rights reserved.
6. Conduct a Post Mortem of the Attack
Confidential30
§  Review the impact of the attack
§  Analyze alert logs from your WAF,
SIEM, & network monitoring tools
§  Answer the following questions:
•  Did you suffer any downtime during the attack?
•  Was any sensitive data compromised?
•  What security technologies and processes were in place? Were
they effective?
•  What improvements can be made in the future?
30
© 2013 Imperva, Inc. All rights reserved.
Solutions to Prepare For and Stop
Web Attacks
Confidential31
© 2013 Imperva, Inc. All rights reserved.
Secure SDLC with WhiteHat Sentinel
Confidential3232
Design" Development" QA" Production"
Sentinel
Source
(SAST)"
Computer-
based training
(CBT)"
Sentinel PL
(DAST)"
Sentinel BE,
SE, and PE
(DAST)"
Sentinel
Mobile"
© 2013 Imperva, Inc. All rights reserved.
Complete Solution (DAST)
Confidential3333
© 2013 Imperva, Inc. All rights reserved. Confidential3434
Complete Solution (Source)
© 2013 Imperva, Inc. All rights reserved.
Imperva Web Application Security Solutions
Confidential35
SecureSphere Web
Application Firewall
Accurate, automated protection against
online threats
Incapsula
•  Scalable, easy to use,
cloud-based DDoS and Web
application firewall service
© 2013 Imperva, Inc. All rights reserved.
Known Attackers
Bots
Web Attacks
Undesirable
Countries
Web Fraud
App DDoS
Scrapers
Phishing Sites
Comment
Spammers
Vulnerabilities
Web Apps
SecureSphere
Complete Protection Against Web Threats
Confidential36
© 2013 Imperva, Inc. All rights reserved.
Imperva and WhiteHat are offering a free 30-day trial.
Register at: http://reg.whitehatsec.com/imperva
Are Your Web Applications Secure?
Confidential3737
© 2013 Imperva, Inc. All rights reserved.
#ImpervaChat
Confidential38
§  What: Twitter Chat
§  When: Tues., Oct. 1st @ 10am-11am (PDT)
§  Where: #ImpervaChat
§  Co Moderators:
•  Barry Shteiman, Senior Security Strategist, Imperva
§  @bshteiman
•  Kasey Cross, Senior Manager of Web Security Solutions, Imperva
§  @kaseycross
Best Practices for Surviving a Web Attack
© 2013 Imperva, Inc. All rights reserved.
www.imperva.com
39 Confidential

More Related Content

What's hot

SecureSphere ThreatRadar: Improve Security Team Productivity and Focus
SecureSphere ThreatRadar: Improve Security Team Productivity and FocusSecureSphere ThreatRadar: Improve Security Team Productivity and Focus
SecureSphere ThreatRadar: Improve Security Team Productivity and FocusImperva
 
Top 5 Things to Look for in an IPS Solution
Top 5 Things to Look for in an IPS SolutionTop 5 Things to Look for in an IPS Solution
Top 5 Things to Look for in an IPS SolutionIBM Security
 
5 Ways to Get Even More from Your IBM Security QRadar Investment in 2016
5 Ways to Get Even More from Your IBM Security QRadar Investment in 20165 Ways to Get Even More from Your IBM Security QRadar Investment in 2016
5 Ways to Get Even More from Your IBM Security QRadar Investment in 2016IBM Security
 
PAC Webinar - "Show me the money!" - evaluating market opportunities in cyber...
PAC Webinar - "Show me the money!" - evaluating market opportunities in cyber...PAC Webinar - "Show me the money!" - evaluating market opportunities in cyber...
PAC Webinar - "Show me the money!" - evaluating market opportunities in cyber...Nicolas Beyer
 
Detect and Respond to Threats Better with IBM Security App Exchange Partners
Detect and Respond to Threats Better with IBM Security App Exchange PartnersDetect and Respond to Threats Better with IBM Security App Exchange Partners
Detect and Respond to Threats Better with IBM Security App Exchange PartnersIBM Security
 
Nowhere to Hide: Expose Threats in Real-time with IBM QRadar Network Insights
Nowhere to Hide: Expose Threats in Real-time with IBM QRadar Network InsightsNowhere to Hide: Expose Threats in Real-time with IBM QRadar Network Insights
Nowhere to Hide: Expose Threats in Real-time with IBM QRadar Network InsightsIBM Security
 
Hardware Security on Vehicles
Hardware Security on VehiclesHardware Security on Vehicles
Hardware Security on VehiclesPriyanka Aash
 
Protect Your Data and Apps in the Public Cloud
Protect Your Data and Apps in the Public CloudProtect Your Data and Apps in the Public Cloud
Protect Your Data and Apps in the Public CloudImperva
 
Compete To Win: Don’t Just Be Compliant – Be Secure!
Compete To Win: Don’t Just Be Compliant – Be Secure!Compete To Win: Don’t Just Be Compliant – Be Secure!
Compete To Win: Don’t Just Be Compliant – Be Secure!IBM Security
 
Meet the New IBM i2 QRadar Offense Investigator App and Start Threat Hunting ...
Meet the New IBM i2 QRadar Offense Investigator App and Start Threat Hunting ...Meet the New IBM i2 QRadar Offense Investigator App and Start Threat Hunting ...
Meet the New IBM i2 QRadar Offense Investigator App and Start Threat Hunting ...IBM Security
 
DTS Solution - ISACA UAE Chapter - ISAFE 2014 - RU PWNED - Living a Life as a...
DTS Solution - ISACA UAE Chapter - ISAFE 2014 - RU PWNED - Living a Life as a...DTS Solution - ISACA UAE Chapter - ISAFE 2014 - RU PWNED - Living a Life as a...
DTS Solution - ISACA UAE Chapter - ISAFE 2014 - RU PWNED - Living a Life as a...Shah Sheikh
 
IBM Security Services Overview
IBM Security Services OverviewIBM Security Services Overview
IBM Security Services OverviewCasey Lucas
 
Malware in a JAR: How Rogue Java Applications Compromise your Endpoints
Malware in a JAR: How Rogue Java Applications Compromise your EndpointsMalware in a JAR: How Rogue Java Applications Compromise your Endpoints
Malware in a JAR: How Rogue Java Applications Compromise your EndpointsIBM Security
 
Jake Williams - Navigating the FDA Recommendations on Medical Device Security...
Jake Williams - Navigating the FDA Recommendations on Medical Device Security...Jake Williams - Navigating the FDA Recommendations on Medical Device Security...
Jake Williams - Navigating the FDA Recommendations on Medical Device Security...centralohioissa
 
Understanding Your Attack Surface and Detecting & Mitigating External Threats
Understanding Your Attack Surface and Detecting & Mitigating External ThreatsUnderstanding Your Attack Surface and Detecting & Mitigating External Threats
Understanding Your Attack Surface and Detecting & Mitigating External ThreatsUlf Mattsson
 
What’s the State of Your Endpoint Security?
What’s the State of Your    Endpoint Security?What’s the State of Your    Endpoint Security?
What’s the State of Your Endpoint Security?IBM Security
 
Robert Hurlbut - Threat Modeling for Secure Software Design
Robert Hurlbut - Threat Modeling for Secure Software DesignRobert Hurlbut - Threat Modeling for Secure Software Design
Robert Hurlbut - Threat Modeling for Secure Software Designcentralohioissa
 
Cyber Security Beyond 2020 – Will We Learn From Our Mistakes?
Cyber Security Beyond 2020 – Will We Learn From Our Mistakes?Cyber Security Beyond 2020 – Will We Learn From Our Mistakes?
Cyber Security Beyond 2020 – Will We Learn From Our Mistakes?Raffael Marty
 

What's hot (20)

SecureSphere ThreatRadar: Improve Security Team Productivity and Focus
SecureSphere ThreatRadar: Improve Security Team Productivity and FocusSecureSphere ThreatRadar: Improve Security Team Productivity and Focus
SecureSphere ThreatRadar: Improve Security Team Productivity and Focus
 
CYBER THREAT FORCAST 2016
CYBER THREAT FORCAST 2016 CYBER THREAT FORCAST 2016
CYBER THREAT FORCAST 2016
 
Top 5 Things to Look for in an IPS Solution
Top 5 Things to Look for in an IPS SolutionTop 5 Things to Look for in an IPS Solution
Top 5 Things to Look for in an IPS Solution
 
5 Ways to Get Even More from Your IBM Security QRadar Investment in 2016
5 Ways to Get Even More from Your IBM Security QRadar Investment in 20165 Ways to Get Even More from Your IBM Security QRadar Investment in 2016
5 Ways to Get Even More from Your IBM Security QRadar Investment in 2016
 
PAC Webinar - "Show me the money!" - evaluating market opportunities in cyber...
PAC Webinar - "Show me the money!" - evaluating market opportunities in cyber...PAC Webinar - "Show me the money!" - evaluating market opportunities in cyber...
PAC Webinar - "Show me the money!" - evaluating market opportunities in cyber...
 
Detect and Respond to Threats Better with IBM Security App Exchange Partners
Detect and Respond to Threats Better with IBM Security App Exchange PartnersDetect and Respond to Threats Better with IBM Security App Exchange Partners
Detect and Respond to Threats Better with IBM Security App Exchange Partners
 
Nowhere to Hide: Expose Threats in Real-time with IBM QRadar Network Insights
Nowhere to Hide: Expose Threats in Real-time with IBM QRadar Network InsightsNowhere to Hide: Expose Threats in Real-time with IBM QRadar Network Insights
Nowhere to Hide: Expose Threats in Real-time with IBM QRadar Network Insights
 
Hardware Security on Vehicles
Hardware Security on VehiclesHardware Security on Vehicles
Hardware Security on Vehicles
 
Protect Your Data and Apps in the Public Cloud
Protect Your Data and Apps in the Public CloudProtect Your Data and Apps in the Public Cloud
Protect Your Data and Apps in the Public Cloud
 
Compete To Win: Don’t Just Be Compliant – Be Secure!
Compete To Win: Don’t Just Be Compliant – Be Secure!Compete To Win: Don’t Just Be Compliant – Be Secure!
Compete To Win: Don’t Just Be Compliant – Be Secure!
 
Meet the New IBM i2 QRadar Offense Investigator App and Start Threat Hunting ...
Meet the New IBM i2 QRadar Offense Investigator App and Start Threat Hunting ...Meet the New IBM i2 QRadar Offense Investigator App and Start Threat Hunting ...
Meet the New IBM i2 QRadar Offense Investigator App and Start Threat Hunting ...
 
DTS Solution - ISACA UAE Chapter - ISAFE 2014 - RU PWNED - Living a Life as a...
DTS Solution - ISACA UAE Chapter - ISAFE 2014 - RU PWNED - Living a Life as a...DTS Solution - ISACA UAE Chapter - ISAFE 2014 - RU PWNED - Living a Life as a...
DTS Solution - ISACA UAE Chapter - ISAFE 2014 - RU PWNED - Living a Life as a...
 
IBM Security QRadar
 IBM Security QRadar IBM Security QRadar
IBM Security QRadar
 
IBM Security Services Overview
IBM Security Services OverviewIBM Security Services Overview
IBM Security Services Overview
 
Malware in a JAR: How Rogue Java Applications Compromise your Endpoints
Malware in a JAR: How Rogue Java Applications Compromise your EndpointsMalware in a JAR: How Rogue Java Applications Compromise your Endpoints
Malware in a JAR: How Rogue Java Applications Compromise your Endpoints
 
Jake Williams - Navigating the FDA Recommendations on Medical Device Security...
Jake Williams - Navigating the FDA Recommendations on Medical Device Security...Jake Williams - Navigating the FDA Recommendations on Medical Device Security...
Jake Williams - Navigating the FDA Recommendations on Medical Device Security...
 
Understanding Your Attack Surface and Detecting & Mitigating External Threats
Understanding Your Attack Surface and Detecting & Mitigating External ThreatsUnderstanding Your Attack Surface and Detecting & Mitigating External Threats
Understanding Your Attack Surface and Detecting & Mitigating External Threats
 
What’s the State of Your Endpoint Security?
What’s the State of Your    Endpoint Security?What’s the State of Your    Endpoint Security?
What’s the State of Your Endpoint Security?
 
Robert Hurlbut - Threat Modeling for Secure Software Design
Robert Hurlbut - Threat Modeling for Secure Software DesignRobert Hurlbut - Threat Modeling for Secure Software Design
Robert Hurlbut - Threat Modeling for Secure Software Design
 
Cyber Security Beyond 2020 – Will We Learn From Our Mistakes?
Cyber Security Beyond 2020 – Will We Learn From Our Mistakes?Cyber Security Beyond 2020 – Will We Learn From Our Mistakes?
Cyber Security Beyond 2020 – Will We Learn From Our Mistakes?
 

Similar to A Blueprint for Web Attack Survival

Hiding in Plain Sight: The Danger of Known Vulnerabilities
Hiding in Plain Sight: The Danger of Known VulnerabilitiesHiding in Plain Sight: The Danger of Known Vulnerabilities
Hiding in Plain Sight: The Danger of Known VulnerabilitiesImperva
 
Detect & Remediate Malware & Advanced Targeted Attacks
Detect & Remediate Malware & Advanced Targeted AttacksDetect & Remediate Malware & Advanced Targeted Attacks
Detect & Remediate Malware & Advanced Targeted AttacksImperva
 
Protecting Against Vulnerabilities in SharePoint Add-ons
Protecting Against Vulnerabilities in SharePoint Add-onsProtecting Against Vulnerabilities in SharePoint Add-ons
Protecting Against Vulnerabilities in SharePoint Add-onsImperva
 
Top Security Trends for 2014
Top Security Trends for 2014Top Security Trends for 2014
Top Security Trends for 2014Imperva
 
Scalar Security Roadshow - Vancouver Presentation
Scalar Security Roadshow - Vancouver PresentationScalar Security Roadshow - Vancouver Presentation
Scalar Security Roadshow - Vancouver PresentationScalar Decisions
 
Scalar Security Roadshow - Calgary Presentation
Scalar Security Roadshow - Calgary PresentationScalar Security Roadshow - Calgary Presentation
Scalar Security Roadshow - Calgary PresentationScalar Decisions
 
Scalar Security Roadshow - Ottawa Presentation
Scalar Security Roadshow - Ottawa PresentationScalar Security Roadshow - Ottawa Presentation
Scalar Security Roadshow - Ottawa PresentationScalar Decisions
 
The Value of Crowd-Sourced Threat Intelligence
The Value of Crowd-Sourced Threat IntelligenceThe Value of Crowd-Sourced Threat Intelligence
The Value of Crowd-Sourced Threat IntelligenceImperva
 
Bleeding Servers – How Hackers are Exploiting Known Vulnerabilities
Bleeding Servers – How Hackers are Exploiting Known VulnerabilitiesBleeding Servers – How Hackers are Exploiting Known Vulnerabilities
Bleeding Servers – How Hackers are Exploiting Known VulnerabilitiesImperva
 
Security from the Start: Optimizing Your Acquia Experience with Acquia Cloud...
 Security from the Start: Optimizing Your Acquia Experience with Acquia Cloud... Security from the Start: Optimizing Your Acquia Experience with Acquia Cloud...
Security from the Start: Optimizing Your Acquia Experience with Acquia Cloud...Rachel Wandishin
 
CMS Hacking 101
CMS Hacking 101CMS Hacking 101
CMS Hacking 101Imperva
 
Practical White Hat Hacker Training - Introduction to Cyber Security
Practical White Hat Hacker Training - Introduction to Cyber SecurityPractical White Hat Hacker Training - Introduction to Cyber Security
Practical White Hat Hacker Training - Introduction to Cyber SecurityPRISMA CSI
 
A DevOps Guide to Web Application Security
A DevOps Guide to Web Application SecurityA DevOps Guide to Web Application Security
A DevOps Guide to Web Application SecurityImperva Incapsula
 
Journey to the Cloud: Securing Your AWS Applications - April 2015
Journey to the Cloud: Securing Your AWS Applications - April 2015Journey to the Cloud: Securing Your AWS Applications - April 2015
Journey to the Cloud: Securing Your AWS Applications - April 2015Alert Logic
 
Developing Secure Web Apps
Developing Secure Web AppsDeveloping Secure Web Apps
Developing Secure Web AppsMark Garratt
 
Enhancing Your Security Infrastructure with Infoblox Threat Intelligence Webinar
Enhancing Your Security Infrastructure with Infoblox Threat Intelligence WebinarEnhancing Your Security Infrastructure with Infoblox Threat Intelligence Webinar
Enhancing Your Security Infrastructure with Infoblox Threat Intelligence WebinarAdelaide Hill
 
Web Application Hacking 2004
Web Application Hacking 2004Web Application Hacking 2004
Web Application Hacking 2004Mike Spaulding
 
Cyber security series advanced persistent threats
Cyber security series   advanced persistent threats Cyber security series   advanced persistent threats
Cyber security series advanced persistent threats Jim Kaplan CIA CFE
 

Similar to A Blueprint for Web Attack Survival (20)

Hiding in Plain Sight: The Danger of Known Vulnerabilities
Hiding in Plain Sight: The Danger of Known VulnerabilitiesHiding in Plain Sight: The Danger of Known Vulnerabilities
Hiding in Plain Sight: The Danger of Known Vulnerabilities
 
Detect & Remediate Malware & Advanced Targeted Attacks
Detect & Remediate Malware & Advanced Targeted AttacksDetect & Remediate Malware & Advanced Targeted Attacks
Detect & Remediate Malware & Advanced Targeted Attacks
 
Protecting Against Vulnerabilities in SharePoint Add-ons
Protecting Against Vulnerabilities in SharePoint Add-onsProtecting Against Vulnerabilities in SharePoint Add-ons
Protecting Against Vulnerabilities in SharePoint Add-ons
 
Top Security Trends for 2014
Top Security Trends for 2014Top Security Trends for 2014
Top Security Trends for 2014
 
Scalar Security Roadshow - Vancouver Presentation
Scalar Security Roadshow - Vancouver PresentationScalar Security Roadshow - Vancouver Presentation
Scalar Security Roadshow - Vancouver Presentation
 
Scalar Security Roadshow - Calgary Presentation
Scalar Security Roadshow - Calgary PresentationScalar Security Roadshow - Calgary Presentation
Scalar Security Roadshow - Calgary Presentation
 
Scalar Security Roadshow - Ottawa Presentation
Scalar Security Roadshow - Ottawa PresentationScalar Security Roadshow - Ottawa Presentation
Scalar Security Roadshow - Ottawa Presentation
 
The Value of Crowd-Sourced Threat Intelligence
The Value of Crowd-Sourced Threat IntelligenceThe Value of Crowd-Sourced Threat Intelligence
The Value of Crowd-Sourced Threat Intelligence
 
Network security
Network securityNetwork security
Network security
 
Bleeding Servers – How Hackers are Exploiting Known Vulnerabilities
Bleeding Servers – How Hackers are Exploiting Known VulnerabilitiesBleeding Servers – How Hackers are Exploiting Known Vulnerabilities
Bleeding Servers – How Hackers are Exploiting Known Vulnerabilities
 
Security from the Start: Optimizing Your Acquia Experience with Acquia Cloud...
 Security from the Start: Optimizing Your Acquia Experience with Acquia Cloud... Security from the Start: Optimizing Your Acquia Experience with Acquia Cloud...
Security from the Start: Optimizing Your Acquia Experience with Acquia Cloud...
 
CMS Hacking 101
CMS Hacking 101CMS Hacking 101
CMS Hacking 101
 
Practical White Hat Hacker Training - Introduction to Cyber Security
Practical White Hat Hacker Training - Introduction to Cyber SecurityPractical White Hat Hacker Training - Introduction to Cyber Security
Practical White Hat Hacker Training - Introduction to Cyber Security
 
A DevOps Guide to Web Application Security
A DevOps Guide to Web Application SecurityA DevOps Guide to Web Application Security
A DevOps Guide to Web Application Security
 
Journey to the Cloud: Securing Your AWS Applications - April 2015
Journey to the Cloud: Securing Your AWS Applications - April 2015Journey to the Cloud: Securing Your AWS Applications - April 2015
Journey to the Cloud: Securing Your AWS Applications - April 2015
 
Developing Secure Web Apps
Developing Secure Web AppsDeveloping Secure Web Apps
Developing Secure Web Apps
 
Enhancing Your Security Infrastructure with Infoblox Threat Intelligence Webinar
Enhancing Your Security Infrastructure with Infoblox Threat Intelligence WebinarEnhancing Your Security Infrastructure with Infoblox Threat Intelligence Webinar
Enhancing Your Security Infrastructure with Infoblox Threat Intelligence Webinar
 
Let's Discuss Security with SFWelly
Let's Discuss Security with SFWellyLet's Discuss Security with SFWelly
Let's Discuss Security with SFWelly
 
Web Application Hacking 2004
Web Application Hacking 2004Web Application Hacking 2004
Web Application Hacking 2004
 
Cyber security series advanced persistent threats
Cyber security series   advanced persistent threats Cyber security series   advanced persistent threats
Cyber security series advanced persistent threats
 

More from Imperva

Cybersecurity and Healthcare - HIMSS 2018 Survey
Cybersecurity and Healthcare - HIMSS 2018 SurveyCybersecurity and Healthcare - HIMSS 2018 Survey
Cybersecurity and Healthcare - HIMSS 2018 SurveyImperva
 
API Security Survey
API Security SurveyAPI Security Survey
API Security SurveyImperva
 
Imperva ppt
Imperva pptImperva ppt
Imperva pptImperva
 
Research: From zero to phishing in 60 seconds
Research: From zero to phishing in 60 seconds Research: From zero to phishing in 60 seconds
Research: From zero to phishing in 60 seconds Imperva
 
Making Sense of Web Attacks: From Alerts to Narratives
Making Sense of Web Attacks: From Alerts to NarrativesMaking Sense of Web Attacks: From Alerts to Narratives
Making Sense of Web Attacks: From Alerts to NarrativesImperva
 
How We Blocked a 650Gb DDoS Attack Over Lunch
How We Blocked a 650Gb DDoS Attack Over LunchHow We Blocked a 650Gb DDoS Attack Over Lunch
How We Blocked a 650Gb DDoS Attack Over LunchImperva
 
Survey: Insider Threats and Cyber Security
Survey: Insider Threats and Cyber SecuritySurvey: Insider Threats and Cyber Security
Survey: Insider Threats and Cyber SecurityImperva
 
Companies Aware, but Not Prepared for GDPR
Companies Aware, but Not Prepared for GDPRCompanies Aware, but Not Prepared for GDPR
Companies Aware, but Not Prepared for GDPRImperva
 
Rise of Ransomware
Rise of Ransomware Rise of Ransomware
Rise of Ransomware Imperva
 
7 Tips to Protect Your Data from Contractors and Privileged Vendors
7 Tips to Protect Your Data from Contractors and Privileged Vendors7 Tips to Protect Your Data from Contractors and Privileged Vendors
7 Tips to Protect Your Data from Contractors and Privileged VendorsImperva
 
SEO Botnet Sophistication
SEO Botnet SophisticationSEO Botnet Sophistication
SEO Botnet SophisticationImperva
 
Phishing Made Easy
Phishing Made EasyPhishing Made Easy
Phishing Made EasyImperva
 
Imperva 2017 Cyber Threat Defense Report
Imperva 2017 Cyber Threat Defense ReportImperva 2017 Cyber Threat Defense Report
Imperva 2017 Cyber Threat Defense ReportImperva
 
Combat Payment Card Attacks with WAF and Threat Intelligence
Combat Payment Card Attacks with WAF and Threat IntelligenceCombat Payment Card Attacks with WAF and Threat Intelligence
Combat Payment Card Attacks with WAF and Threat IntelligenceImperva
 
HTTP/2: Faster Doesn't Mean Safer, Attack Surface Growing Exponentially
HTTP/2: Faster Doesn't Mean Safer, Attack Surface Growing ExponentiallyHTTP/2: Faster Doesn't Mean Safer, Attack Surface Growing Exponentially
HTTP/2: Faster Doesn't Mean Safer, Attack Surface Growing ExponentiallyImperva
 
Get Going With Your GDPR Plan
Get Going With Your GDPR PlanGet Going With Your GDPR Plan
Get Going With Your GDPR PlanImperva
 
Cyber Criminal's Path To Your Data
Cyber Criminal's Path To Your DataCyber Criminal's Path To Your Data
Cyber Criminal's Path To Your DataImperva
 
Combat Today's Threats With A Single Platform For App and Data Security
Combat Today's Threats With A Single Platform For App and Data SecurityCombat Today's Threats With A Single Platform For App and Data Security
Combat Today's Threats With A Single Platform For App and Data SecurityImperva
 
Hacking HTTP/2 : New attacks on the Internet’s Next Generation Foundation
Hacking HTTP/2: New attacks on the Internet’s Next Generation FoundationHacking HTTP/2: New attacks on the Internet’s Next Generation Foundation
Hacking HTTP/2 : New attacks on the Internet’s Next Generation FoundationImperva
 
Gartner MQ for Web App Firewall Webinar
Gartner MQ for Web App Firewall WebinarGartner MQ for Web App Firewall Webinar
Gartner MQ for Web App Firewall WebinarImperva
 

More from Imperva (20)

Cybersecurity and Healthcare - HIMSS 2018 Survey
Cybersecurity and Healthcare - HIMSS 2018 SurveyCybersecurity and Healthcare - HIMSS 2018 Survey
Cybersecurity and Healthcare - HIMSS 2018 Survey
 
API Security Survey
API Security SurveyAPI Security Survey
API Security Survey
 
Imperva ppt
Imperva pptImperva ppt
Imperva ppt
 
Research: From zero to phishing in 60 seconds
Research: From zero to phishing in 60 seconds Research: From zero to phishing in 60 seconds
Research: From zero to phishing in 60 seconds
 
Making Sense of Web Attacks: From Alerts to Narratives
Making Sense of Web Attacks: From Alerts to NarrativesMaking Sense of Web Attacks: From Alerts to Narratives
Making Sense of Web Attacks: From Alerts to Narratives
 
How We Blocked a 650Gb DDoS Attack Over Lunch
How We Blocked a 650Gb DDoS Attack Over LunchHow We Blocked a 650Gb DDoS Attack Over Lunch
How We Blocked a 650Gb DDoS Attack Over Lunch
 
Survey: Insider Threats and Cyber Security
Survey: Insider Threats and Cyber SecuritySurvey: Insider Threats and Cyber Security
Survey: Insider Threats and Cyber Security
 
Companies Aware, but Not Prepared for GDPR
Companies Aware, but Not Prepared for GDPRCompanies Aware, but Not Prepared for GDPR
Companies Aware, but Not Prepared for GDPR
 
Rise of Ransomware
Rise of Ransomware Rise of Ransomware
Rise of Ransomware
 
7 Tips to Protect Your Data from Contractors and Privileged Vendors
7 Tips to Protect Your Data from Contractors and Privileged Vendors7 Tips to Protect Your Data from Contractors and Privileged Vendors
7 Tips to Protect Your Data from Contractors and Privileged Vendors
 
SEO Botnet Sophistication
SEO Botnet SophisticationSEO Botnet Sophistication
SEO Botnet Sophistication
 
Phishing Made Easy
Phishing Made EasyPhishing Made Easy
Phishing Made Easy
 
Imperva 2017 Cyber Threat Defense Report
Imperva 2017 Cyber Threat Defense ReportImperva 2017 Cyber Threat Defense Report
Imperva 2017 Cyber Threat Defense Report
 
Combat Payment Card Attacks with WAF and Threat Intelligence
Combat Payment Card Attacks with WAF and Threat IntelligenceCombat Payment Card Attacks with WAF and Threat Intelligence
Combat Payment Card Attacks with WAF and Threat Intelligence
 
HTTP/2: Faster Doesn't Mean Safer, Attack Surface Growing Exponentially
HTTP/2: Faster Doesn't Mean Safer, Attack Surface Growing ExponentiallyHTTP/2: Faster Doesn't Mean Safer, Attack Surface Growing Exponentially
HTTP/2: Faster Doesn't Mean Safer, Attack Surface Growing Exponentially
 
Get Going With Your GDPR Plan
Get Going With Your GDPR PlanGet Going With Your GDPR Plan
Get Going With Your GDPR Plan
 
Cyber Criminal's Path To Your Data
Cyber Criminal's Path To Your DataCyber Criminal's Path To Your Data
Cyber Criminal's Path To Your Data
 
Combat Today's Threats With A Single Platform For App and Data Security
Combat Today's Threats With A Single Platform For App and Data SecurityCombat Today's Threats With A Single Platform For App and Data Security
Combat Today's Threats With A Single Platform For App and Data Security
 
Hacking HTTP/2 : New attacks on the Internet’s Next Generation Foundation
Hacking HTTP/2: New attacks on the Internet’s Next Generation FoundationHacking HTTP/2: New attacks on the Internet’s Next Generation Foundation
Hacking HTTP/2 : New attacks on the Internet’s Next Generation Foundation
 
Gartner MQ for Web App Firewall Webinar
Gartner MQ for Web App Firewall WebinarGartner MQ for Web App Firewall Webinar
Gartner MQ for Web App Firewall Webinar
 

Recently uploaded

The Ultimate Guide to Choosing WordPress Pros and Cons
The Ultimate Guide to Choosing WordPress Pros and ConsThe Ultimate Guide to Choosing WordPress Pros and Cons
The Ultimate Guide to Choosing WordPress Pros and ConsPixlogix Infotech
 
Long journey of Ruby standard library at RubyConf AU 2024
Long journey of Ruby standard library at RubyConf AU 2024Long journey of Ruby standard library at RubyConf AU 2024
Long journey of Ruby standard library at RubyConf AU 2024Hiroshi SHIBATA
 
[Webinar] SpiraTest - Setting New Standards in Quality Assurance
[Webinar] SpiraTest - Setting New Standards in Quality Assurance[Webinar] SpiraTest - Setting New Standards in Quality Assurance
[Webinar] SpiraTest - Setting New Standards in Quality AssuranceInflectra
 
DevEX - reference for building teams, processes, and platforms
DevEX - reference for building teams, processes, and platformsDevEX - reference for building teams, processes, and platforms
DevEX - reference for building teams, processes, and platformsSergiu Bodiu
 
Arizona Broadband Policy Past, Present, and Future Presentation 3/25/24
Arizona Broadband Policy Past, Present, and Future Presentation 3/25/24Arizona Broadband Policy Past, Present, and Future Presentation 3/25/24
Arizona Broadband Policy Past, Present, and Future Presentation 3/25/24Mark Goldstein
 
Data governance with Unity Catalog Presentation
Data governance with Unity Catalog PresentationData governance with Unity Catalog Presentation
Data governance with Unity Catalog PresentationKnoldus Inc.
 
TeamStation AI System Report LATAM IT Salaries 2024
TeamStation AI System Report LATAM IT Salaries 2024TeamStation AI System Report LATAM IT Salaries 2024
TeamStation AI System Report LATAM IT Salaries 2024Lonnie McRorey
 
Scale your database traffic with Read & Write split using MySQL Router
Scale your database traffic with Read & Write split using MySQL RouterScale your database traffic with Read & Write split using MySQL Router
Scale your database traffic with Read & Write split using MySQL RouterMydbops
 
How to Effectively Monitor SD-WAN and SASE Environments with ThousandEyes
How to Effectively Monitor SD-WAN and SASE Environments with ThousandEyesHow to Effectively Monitor SD-WAN and SASE Environments with ThousandEyes
How to Effectively Monitor SD-WAN and SASE Environments with ThousandEyesThousandEyes
 
Enhancing User Experience - Exploring the Latest Features of Tallyman Axis Lo...
Enhancing User Experience - Exploring the Latest Features of Tallyman Axis Lo...Enhancing User Experience - Exploring the Latest Features of Tallyman Axis Lo...
Enhancing User Experience - Exploring the Latest Features of Tallyman Axis Lo...Scott Andery
 
Merck Moving Beyond Passwords: FIDO Paris Seminar.pptx
Merck Moving Beyond Passwords: FIDO Paris Seminar.pptxMerck Moving Beyond Passwords: FIDO Paris Seminar.pptx
Merck Moving Beyond Passwords: FIDO Paris Seminar.pptxLoriGlavin3
 
Moving Beyond Passwords: FIDO Paris Seminar.pdf
Moving Beyond Passwords: FIDO Paris Seminar.pdfMoving Beyond Passwords: FIDO Paris Seminar.pdf
Moving Beyond Passwords: FIDO Paris Seminar.pdfLoriGlavin3
 
Rise of the Machines: Known As Drones...
Rise of the Machines: Known As Drones...Rise of the Machines: Known As Drones...
Rise of the Machines: Known As Drones...Rick Flair
 
Connecting the Dots for Information Discovery.pdf
Connecting the Dots for Information Discovery.pdfConnecting the Dots for Information Discovery.pdf
Connecting the Dots for Information Discovery.pdfNeo4j
 
Assure Ecommerce and Retail Operations Uptime with ThousandEyes
Assure Ecommerce and Retail Operations Uptime with ThousandEyesAssure Ecommerce and Retail Operations Uptime with ThousandEyes
Assure Ecommerce and Retail Operations Uptime with ThousandEyesThousandEyes
 
New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024
New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024
New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024BookNet Canada
 
Manual 508 Accessibility Compliance Audit
Manual 508 Accessibility Compliance AuditManual 508 Accessibility Compliance Audit
Manual 508 Accessibility Compliance AuditSkynet Technologies
 
Transcript: New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024Transcript: New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024BookNet Canada
 
Use of FIDO in the Payments and Identity Landscape: FIDO Paris Seminar.pptx
Use of FIDO in the Payments and Identity Landscape: FIDO Paris Seminar.pptxUse of FIDO in the Payments and Identity Landscape: FIDO Paris Seminar.pptx
Use of FIDO in the Payments and Identity Landscape: FIDO Paris Seminar.pptxLoriGlavin3
 
The Future Roadmap for the Composable Data Stack - Wes McKinney - Data Counci...
The Future Roadmap for the Composable Data Stack - Wes McKinney - Data Counci...The Future Roadmap for the Composable Data Stack - Wes McKinney - Data Counci...
The Future Roadmap for the Composable Data Stack - Wes McKinney - Data Counci...Wes McKinney
 

Recently uploaded (20)

The Ultimate Guide to Choosing WordPress Pros and Cons
The Ultimate Guide to Choosing WordPress Pros and ConsThe Ultimate Guide to Choosing WordPress Pros and Cons
The Ultimate Guide to Choosing WordPress Pros and Cons
 
Long journey of Ruby standard library at RubyConf AU 2024
Long journey of Ruby standard library at RubyConf AU 2024Long journey of Ruby standard library at RubyConf AU 2024
Long journey of Ruby standard library at RubyConf AU 2024
 
[Webinar] SpiraTest - Setting New Standards in Quality Assurance
[Webinar] SpiraTest - Setting New Standards in Quality Assurance[Webinar] SpiraTest - Setting New Standards in Quality Assurance
[Webinar] SpiraTest - Setting New Standards in Quality Assurance
 
DevEX - reference for building teams, processes, and platforms
DevEX - reference for building teams, processes, and platformsDevEX - reference for building teams, processes, and platforms
DevEX - reference for building teams, processes, and platforms
 
Arizona Broadband Policy Past, Present, and Future Presentation 3/25/24
Arizona Broadband Policy Past, Present, and Future Presentation 3/25/24Arizona Broadband Policy Past, Present, and Future Presentation 3/25/24
Arizona Broadband Policy Past, Present, and Future Presentation 3/25/24
 
Data governance with Unity Catalog Presentation
Data governance with Unity Catalog PresentationData governance with Unity Catalog Presentation
Data governance with Unity Catalog Presentation
 
TeamStation AI System Report LATAM IT Salaries 2024
TeamStation AI System Report LATAM IT Salaries 2024TeamStation AI System Report LATAM IT Salaries 2024
TeamStation AI System Report LATAM IT Salaries 2024
 
Scale your database traffic with Read & Write split using MySQL Router
Scale your database traffic with Read & Write split using MySQL RouterScale your database traffic with Read & Write split using MySQL Router
Scale your database traffic with Read & Write split using MySQL Router
 
How to Effectively Monitor SD-WAN and SASE Environments with ThousandEyes
How to Effectively Monitor SD-WAN and SASE Environments with ThousandEyesHow to Effectively Monitor SD-WAN and SASE Environments with ThousandEyes
How to Effectively Monitor SD-WAN and SASE Environments with ThousandEyes
 
Enhancing User Experience - Exploring the Latest Features of Tallyman Axis Lo...
Enhancing User Experience - Exploring the Latest Features of Tallyman Axis Lo...Enhancing User Experience - Exploring the Latest Features of Tallyman Axis Lo...
Enhancing User Experience - Exploring the Latest Features of Tallyman Axis Lo...
 
Merck Moving Beyond Passwords: FIDO Paris Seminar.pptx
Merck Moving Beyond Passwords: FIDO Paris Seminar.pptxMerck Moving Beyond Passwords: FIDO Paris Seminar.pptx
Merck Moving Beyond Passwords: FIDO Paris Seminar.pptx
 
Moving Beyond Passwords: FIDO Paris Seminar.pdf
Moving Beyond Passwords: FIDO Paris Seminar.pdfMoving Beyond Passwords: FIDO Paris Seminar.pdf
Moving Beyond Passwords: FIDO Paris Seminar.pdf
 
Rise of the Machines: Known As Drones...
Rise of the Machines: Known As Drones...Rise of the Machines: Known As Drones...
Rise of the Machines: Known As Drones...
 
Connecting the Dots for Information Discovery.pdf
Connecting the Dots for Information Discovery.pdfConnecting the Dots for Information Discovery.pdf
Connecting the Dots for Information Discovery.pdf
 
Assure Ecommerce and Retail Operations Uptime with ThousandEyes
Assure Ecommerce and Retail Operations Uptime with ThousandEyesAssure Ecommerce and Retail Operations Uptime with ThousandEyes
Assure Ecommerce and Retail Operations Uptime with ThousandEyes
 
New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024
New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024
New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024
 
Manual 508 Accessibility Compliance Audit
Manual 508 Accessibility Compliance AuditManual 508 Accessibility Compliance Audit
Manual 508 Accessibility Compliance Audit
 
Transcript: New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024Transcript: New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024
 
Use of FIDO in the Payments and Identity Landscape: FIDO Paris Seminar.pptx
Use of FIDO in the Payments and Identity Landscape: FIDO Paris Seminar.pptxUse of FIDO in the Payments and Identity Landscape: FIDO Paris Seminar.pptx
Use of FIDO in the Payments and Identity Landscape: FIDO Paris Seminar.pptx
 
The Future Roadmap for the Composable Data Stack - Wes McKinney - Data Counci...
The Future Roadmap for the Composable Data Stack - Wes McKinney - Data Counci...The Future Roadmap for the Composable Data Stack - Wes McKinney - Data Counci...
The Future Roadmap for the Composable Data Stack - Wes McKinney - Data Counci...
 

A Blueprint for Web Attack Survival

  • 1. © 2013 Imperva, Inc. All rights reserved. Blueprint for Web Attack Survival Confidential1 Kasey Cross, Sr. Manager, Web Security, Imperva Nick Silver, Sr. Solutions Architect, WhiteHat Security
  • 2. © 2013 Imperva, Inc. All rights reserved. Agenda Confidential2 §  Application Threatscape §  Solutions to Mitigate Web Attacks
  • 3. © 2013 Imperva, Inc. All rights reserved. Presenters Confidential3 §  Kasey Cross •  Senior Product Marketing Manager at Imperva •  Frequent speaker at industry events •  Managed SecureSphere WAF product line for 8 years §  Nick Silver •  Sr. Solutions Architect at WhiteHat Security
  • 4. © 2013 Imperva, Inc. All rights reserved. Application Threatscape Confidential4 Web Application Vulnerabilities and Threats
  • 5. © 2013 Imperva, Inc. All rights reserved. Industry Averages for 2012 Confidential5
  • 6. © 2013 Imperva, Inc. All rights reserved. Confidential6 The average number of days in a year a website is exposed to at least one serious* vulnerability
  • 7. © 2013 Imperva, Inc. All rights reserved. Industrialization of Hacking and Automation Researching Vulnerabilities Developing Exploits Growing Botnets Exploiting Targets Consuming Direct Value: PII, CCN Command & Control Malware Distribution Phishing & spam DDoS Growing Botnets and Exploiting Vulnerabilities Selecting Targets via Search Engines Templates & Kits Centralized Management Roles Optimization Automation Confidential7
  • 8. © 2013 Imperva, Inc. All rights reserved. Hacktivism Attack Targets and Methods 2010 Now 2011 2012 2013 Titanic Takeover Tuesday Operation Payback HTTP Flood “Abibil Assassin” (Vertigo & KamiNa variants) & attack to login page from 54 countries Confidential8
  • 9. © 2013 Imperva, Inc. All rights reserved. Distributed Denial of Service Threats Confidential9 §  74% of organizations received a DDoS attack in past year1 §  Many DDoS attacks are launched by botnets, because of scale •  Toolkits automate DDoS attacks •  Botnets for rent from $50 - $2K §  DDoS attacks are moving up the stack •  Less expensive; requires few attackers •  Bypasses network security measures DDoS Attack Tool 1 ”The Trends and Changing Landscape of DDoS Threats and Protection,” Forrester Research
  • 10. © 2013 Imperva, Inc. All rights reserved. Commercialized DDoS §  Customer satisfaction guarantee! Confidential10
  • 11. © 2013 Imperva, Inc. All rights reserved. Commercialized DDoS §  Customer satisfaction guarantee! Confidential11
  • 12. © 2013 Imperva, Inc. All rights reserved. Step-by-Step Instructions to Survive a Web Attack Confidential12
  • 13. © 2013 Imperva, Inc. All rights reserved. 1. Understand the Threat Actor Confidential13 §  Identify the attack source: •  Research their attack techniques and tools §  Hacktivism: •  Monitor social media, Twitter, Facebook, and YouTube •  Identify DDoS attack tools and “booster packs” §  Cybercrime: •  Talk to peers in your industry about attack sources and tools •  Read hacker intelligence reports and security research 13
  • 14. © 2013 Imperva, Inc. All rights reserved. 2. Develop a Security Response Plan Confidential14 §  Organize an incident response team •  IT security personnel, networking, and application development teams •  Assign 24x7 coverage §  Create a Red Team •  Security engineers that will look for vulnerabilities •  Evaluate all potential risks including, application, network, end- user, social engineering, and even physical threats 14
  • 15. © 2013 Imperva, Inc. All rights reserved. §  DNS and Internet Service Providers §  DDoS Protection Services §  Relevant security consultants Little Black Book of Contacts Confidential15 §  IT security managers §  IT operations managers §  Networking operators §  Application developers §  Database administrators §  Legal §  Executive management Gather the names, phone numbers, and email addresses of: INTERNALEXTERNAL
  • 16. © 2013 Imperva, Inc. All rights reserved. Document Network and Server Information Confidential16 §  Gather IP address and network info for: •  Web servers •  Databases •  DNS servers •  Network firewalls •  Web application firewalls •  Database firewalls •  Routers and switches •  Disaster recovery networks §  Develop network architecture diagrams 16 Security Tip: Keep network information and contact lists secure
  • 17. © 2013 Imperva, Inc. All rights reserved. Notify Management & Set Up a War Room Confidential17 §  Inform Executive Management of the threat §  Consider warning employees •  Notify users of potential downtime (for DDoS) •  Educate employees about phishing •  Prepare IT for social engineering threats §  Establish a War Room •  “Ground zero” for planning and communications 17
  • 18. © 2013 Imperva, Inc. All rights reserved. 3. Locate and Assess Servers and Apps Confidential18 §  Scan your network to identify all assets (cloud and local) •  Classify assets by information and brand sensitivity to identify high risk landscapes •  Prioritize efforts to based on risk levels §  Secure database access •  Scan DBs for vulnerabilities or configuration flaws •  Remove any default or unnecessary user accounts •  Disable unneeded services 18
  • 19. © 2013 Imperva, Inc. All rights reserved. Perform Vulnerability Assessments Confidential19 §  Perform vulnerability assessments •  Scan both Network and Application Layers •  Scan all known Web Assets •  Scan Concurrently and Continuously •  Analyze application functionality for DDoS attack potential and Business Logic based exploits •  Implement assessment practice across the entire SDLC 19 Design" Development" QA" Production"
  • 20. © 2013 Imperva, Inc. All rights reserved. 4. Application, Network & End-Point Controls Confidential2020 Anti Virus Network Security Database Security Install anti-virus and anti-malware software on servers. Make sure definition files are up to date. Block all unnecessary ports with the firewall. Configure the IPS to block high and critical violations. Configure your database firewall to block unauthorized SQL queries, limit access, and virtually patch vulnerabilities.
  • 21. © 2013 Imperva, Inc. All rights reserved. Ratchet Up Web App Firewall Protection Confidential21 §  Review and tune the web application profile •  Review acceptable characters & parameter value lengths •  Compare the profile to vulnerability scan results §  Tighten profile policies to block based on profile violations 21 Directories URLs
  • 22. © 2013 Imperva, Inc. All rights reserved. Block Web Attacks and Attack Sources Confidential22
  • 23. © 2013 Imperva, Inc. All rights reserved. WAF Policies to Stop App DDoS Attacks Confidential23 §  Create policies that block: •  High rates of requests in a short period of time by IP address, by user, and by session •  Known malicious IP addresses, anonymous proxies, and Tor networks •  Users that request many files with extensions like “.pdf”, “.mp3” or “.mp4” in a short period of time •  Users that download large amounts of data •  Users that initiate multiple requests that cause extremely slow web server responses 23 DDoS Preparation Tip Make sure you can manage your security products from an out-of- band network
  • 24. © 2013 Imperva, Inc. All rights reserved. While app DDoS attacks target Web servers & databases network DDoS attacks target your Internet connection Stopping Network DDoS Threats Confidential2424 Web Servers and Databases
  • 25. © 2013 Imperva, Inc. All rights reserved. While app DDoS attacks target Web servers & databases network DDoS attacks target your Internet connection Stopping Network DDoS Threats Confidential2525 Web Servers and Databases
  • 26. © 2013 Imperva, Inc. All rights reserved. While app DDoS attacks target Web servers & databases network DDoS attacks target your Internet connection Stopping Network DDoS Threats Confidential2626 Web Servers and Databases To prevent network DDoS attacks, look at DDoS mitigation services that stop attacks before they reach your network
  • 27. © 2013 Imperva, Inc. All rights reserved. While app DDoS attacks target Web servers & databases network DDoS attacks target your Internet connection Stopping Network DDoS Threats Confidential2727 Web Servers and Databases To prevent network DDoS attacks, look at DDoS mitigation services that stop attacks before they reach your network
  • 28. © 2013 Imperva, Inc. All rights reserved. §  Continuously monitor alerts from security and network devices and from performance monitoring tools §  If attacks are coming from a specific geographic area, create policies to block requests from that area §  If you can detect which URLs bots are targeting, create bot mitigation rules that block bots from accessing those URLs §  Monitor social media, hacker forums, IRC chat rooms, and sites that list website defacements 5. Security Procedures When Under Attack Confidential2828
  • 29. © 2013 Imperva, Inc. All rights reserved. Stop DDoS Attacks that Target Databases Confidential29 §  Attackers often target search, login & registration pages §  Create custom policies to block the attacks •  Block an excessive number of failed logins •  Block multiple successful logins from the same user 29 Number of Occurrences Failed Login
  • 30. © 2013 Imperva, Inc. All rights reserved. 6. Conduct a Post Mortem of the Attack Confidential30 §  Review the impact of the attack §  Analyze alert logs from your WAF, SIEM, & network monitoring tools §  Answer the following questions: •  Did you suffer any downtime during the attack? •  Was any sensitive data compromised? •  What security technologies and processes were in place? Were they effective? •  What improvements can be made in the future? 30
  • 31. © 2013 Imperva, Inc. All rights reserved. Solutions to Prepare For and Stop Web Attacks Confidential31
  • 32. © 2013 Imperva, Inc. All rights reserved. Secure SDLC with WhiteHat Sentinel Confidential3232 Design" Development" QA" Production" Sentinel Source (SAST)" Computer- based training (CBT)" Sentinel PL (DAST)" Sentinel BE, SE, and PE (DAST)" Sentinel Mobile"
  • 33. © 2013 Imperva, Inc. All rights reserved. Complete Solution (DAST) Confidential3333
  • 34. © 2013 Imperva, Inc. All rights reserved. Confidential3434 Complete Solution (Source)
  • 35. © 2013 Imperva, Inc. All rights reserved. Imperva Web Application Security Solutions Confidential35 SecureSphere Web Application Firewall Accurate, automated protection against online threats Incapsula •  Scalable, easy to use, cloud-based DDoS and Web application firewall service
  • 36. © 2013 Imperva, Inc. All rights reserved. Known Attackers Bots Web Attacks Undesirable Countries Web Fraud App DDoS Scrapers Phishing Sites Comment Spammers Vulnerabilities Web Apps SecureSphere Complete Protection Against Web Threats Confidential36
  • 37. © 2013 Imperva, Inc. All rights reserved. Imperva and WhiteHat are offering a free 30-day trial. Register at: http://reg.whitehatsec.com/imperva Are Your Web Applications Secure? Confidential3737
  • 38. © 2013 Imperva, Inc. All rights reserved. #ImpervaChat Confidential38 §  What: Twitter Chat §  When: Tues., Oct. 1st @ 10am-11am (PDT) §  Where: #ImpervaChat §  Co Moderators: •  Barry Shteiman, Senior Security Strategist, Imperva §  @bshteiman •  Kasey Cross, Senior Manager of Web Security Solutions, Imperva §  @kaseycross Best Practices for Surviving a Web Attack
  • 39. © 2013 Imperva, Inc. All rights reserved. www.imperva.com 39 Confidential