Skip to content

OWASP San Antonio - June 23 @ 11:30am

O
Hosted By
OWASP San A.
OWASP San Antonio - June 23 @ 11:30am

Details

Join us for the June OWASP San Antonio meeting!

Note: New date is Thursday, June 23.

We will have a talk about source-assisted web application penetration testing.

Speaker: Dan Cornell

Bio:

A globally recognized application security expert, Dan Cornell holds over 15 years of experience architecting, developing and securing web-based software systems. As the Chief Technology Officer and a Principal at Denim Group, Ltd., he leads the technology team to help Fortune 500 companies and government organizations integrate security throughout the development process. He is also the original creator of ThreadFix, Denim Group's industry leading application vulnerability management platform.

Title:

The ABCs of Source-Assisted Web Application Penetration Testing With OWASP ZAP: Attack Surface, Backdoors, and Configuration

Abstract:

There are a number of reasons to use source code to assist in web application penetration testing such as making better use of penetration testers’ time, providing penetration testers with deeper insight into system behavior, and highlighting specific sections of code so development teams can remediate vulnerabilities faster. Examples of these are provided using the open source ThreadFix plugin for the OWASP ZAP proxy and dynamic application security testing tool. These show opportunities attendees have to enhance their own penetration tests given access to source code.

This presentation covers the “ABCs” of source code assisted web application penetration testing: covering issues of attack surface enumeration, backdoor identification, and configuration issue discovery. Having access to the source lets an attacker enumerate all of the URLs and parameters an application exposes – essentially its attack surface. Knowing these allows pen testers greater application coverage during testing. In addition, access to source code can help to identify potential backdoors that have been intentionally added to the system. Comparing the results of blind spidering to a full attack surface model can identify items of interest such as hidden admin consoles or secret backdoor parameters. Finally, the presentation examines how access to source code can help identify configuration settings that may have an adverse impact on the security of the deployed application.

Denim Group Offices: 1354 N Loop 1604 E Suite 110, San Antonio, TX 78232

http://photos1.meetupstatic.com/photos/event/6/7/0/5/600_434186373.jpeg

Photo of OWASP San Antonio group
OWASP San Antonio
See more events
Denim Group
1354 N Loop 1604 E Ste 110 · San Antonio, TX