Meetup Vulnerabilities: Escalation of Privilege and Redirection of Funds
What is SQL injection?
SQL injection occurs when a malicious attacker submits a database SQL command which is then executed by the web application. This results in a security vulnerability that can expose the back-end database. This is typically due to improper validation or encoding procedures. The specific commands entered by a malicious attacker tricks the web app into executing unmediated commands and data changes. During a successful SQL injection, the SQL interpreter is unable to distinguish between the intended commands and those implemented by the attacker. By utilizing this trickery, a malicious attacker can exploit vulnerabilities and gain unauthorized access to confidential areas of the network. Using SQL injection, the attacker can then create, delete, read, update, and edit data. This is typically done in order to gain access to sensitive data such as credit card numbers, social security numbers, financial information, contact information, company information, company assets and much more.
What is Static Application Security Testing?
Static Application Security Testing, shortened as SAST and also referred to as White-Box Testing, is a type of security testing which analyzes an applications source code to determine if security vulnerabilities exist. SAST solutions looks at the application ‘from the inside-out’, without needing to actually compile the code. Gartner states that “SAST should be a mandatory requirement for all organizations developing applications,” and with 80% of attacks aimed at the application layer, according to Gartner, SAST is one of the top ways to ensure your application security is sound.
With so many applications being developed in Java, there’s an acute awareness of the importance of application security, and the best way to integrate security into the software development life cycle is though static code analysis. When it comes to static code analysis for Java there are many options to examine the code through plugins – however not all of these options have the right output for development teams.
There are several options available for static code analysis within Eclipse and they all come in the form of plugins. Code coverage can be monitored using EclEmma with a straightforward traffic light warning system to deliver a simple report on whether your unit testing goes deep enough. FindBugs will deliver byte code analysis and it works through the classes of the compiled code and looks for bugs that have already been identified in its own database.
Subversion (SVN) is designed to help software developers on collaborative development projects manage their source code. It tracks each commit and the changes within the code so that it’s easy to review the code and ensure that it’s in line with the expectation of the development team. However it doesn’t have built-in support for SVN Static Code Analysis, and developers looking to optimize the security level of the code they deliver will need to look elsewhere to find this functionality.
Vulnerability testing is critical for the security of company information and assets. There are currently two types of vulnerability testing, and although they sound similar, they both have different methods of achieving results.
A vulnerability assessment is the use of scanning tools to scan the network in order to find vulnerabilities or flaws that could potentially be exploited by unauthorized users. This is typically the first step in vulnerability testing as it will find common vulnerabilities that attackers using network scanners would find. It does have its limitations, as it is limited to vulnerabilities and flaws that have been pre-programmed into the software.
Why companies need vulnerability assessments
Vulnerability discoveries are at an all-time high, while many more have not yet been exposed. Security scanning software is a great start, but it’s not enough. Web applications are becoming more complex and the threats are becoming more sophisticated. Scanning software solutions are not very cost-efficient and only look for vulnerabilities that have already been documented. They are not capable of defending against new issues and need to be constantly updated in order to keep up with the latest threats.
The term Vulnerability Scan refers to an automated process of identifying security vulnerabilities in a network’s computing systems. The purpose of the scan is to determine whether a system or a program can be exploited or threatened. While servers are essential for communication and data transfer over the net, they are vulnerable to potential security breaches that are executed by threat agents such as viruses sent by malicious hackers.
Any company that has a web presence faces threats on a daily basis. A well-prepared and executed security plan can prevent these attacks, but as new threats and vulnerabilities are found on a daily basis, it is critical that companies keep the most up-to-date security and vulnerability database. It is also critical that all newly-developed or newly-added applications are scanned for vulnerabilities as these applications could potentially allow a malicious attacker to gain unauthorized access to the network. This could put sensitive company information, financial records, company assets, and confidential client, customer and employee information at risk.