SlideShare ist ein Scribd-Unternehmen logo
1 von 72
The OWASP Foundation
http://www.owasp.org
OWASP WTE:
Application Testing Your Way
Matt Tesauro
WTE and OpenStack Security Project Lead
matt.tesauro@owasp.org
Product Security Engineering Lead
Rackspace, the open cloud company
Twin Cities Chapter
2
Who's this Matt guy anyway?
Broad IT background
Developer, DBA, Sys Admin, Pen Tester, Application
Security professional, CISSP, CEH, RHCE, Linux+
Long history with Linux and Open Source
Contributor to many projects
Leader of OWASP Live CD / WTE
Former OWASP Foundation Board Member
Breaking “the cloud” for Rackspace
OWASP WTE: A History
4
At all started that fine spring day...
5
At all started that summer...
6
At all started that summer...
7
•Current Release
•OWASP WTE Oct 2012
•Previous Releases
•OWASP WTE Sept 2011
•OWASP WTE Feb 2011
•OWASP WTE Beta Jan 2010
•AppSecEU May 2009
•AustinTerrier Feb 2009
•Portugal Release Dec 2008
•SoC Release Sept 2008
•Beta1 and Beta2 releases during the SoC
Note: Not all of these had ISO, VirtualBox and
Vmware versions
8
Other fun facts
~5,094 GB of bandwidth since launch (Jul 2008)
Most downloads in 1 month = 81,607 (Mar 2009)
Overall downloads: 330,081
(as of 2009-10-05)
9
10
11
There's a new kid in town
OWASP WTE
Web
Testing
Environment
12
The project has grown to more than just a Live CD
VMWare installs/appliances
VirtualBox installs
USB Installs
Training Environment
....
Add in the transition to Ubuntu and the possibilities
are endless
(plus the 26,000+ packages in the Ubuntu repos)
13
GOAL
Make application security tools and documentation easily
available and easy to use
Compliment's OWASP goal to make app security visible
Design goals
Easy for users to keep updated
Easy for project lead to keep updated
Easy to produce releases (more on this later)
Focused on just application security – not general pen
testing
What's on WTE
15
16
17
18
31 “Significant” Tools Available
WapitiWeb Goat
CAL9000
JBroFuzz
DirBuster
WebSlayer
WSFuzzerWeb Scarab
OWASP Tools:
a tool for performing all types of security testing on web apps and
web services
an online training environment for hands-on learning about app sec
a collection of web app sec testing tools especially encoding/decoding
a web application fuzzer for requests being made over HTTP
and/or HTTPS.
a fuzzer with HTTP based SOAP services as its main target
audits the security of web apps by performing "black-box" scans
a multi threaded Java app to brute force directory and file names
A tool designed for brute-forcing web applications such as resource
discovery, GET and POST fuzzing, etc
JBroFuzz
a web application fuzzer for requests being made over HTTP
and/or HTTPS.
EnDe
An amazing collection of encoding and decoding tools as well as
many other utilities
ZAP Proxy
A fork of the popular but moribund Paros Proxy
19
Skipfish
Paros
Nmap &
Zenmap
Wireshark
Firefox
Burp Suite
Grendel
Scan
Nikto
sqlmap
SQL Brute
w3af
netcat
Httprint
Spike Proxy
Rat Proxy
Fierce Domain
Scanner
Metasploit
tcpdump
Maltego CE
Other Proxies: Scanners:
Duh:
SQL-i: Others:
Fuzzdb
Wpscan
Red = New in last release
Why is it different?
21
22
23
24
OWASP Documents
Testing Guide v2 & v3
CLASP and OpenSamm
Top 10 for 2010
Top 10 for Java Enterprise Edition
AppSec FAQ
Books – tried to get all of them
CLASP, Top 10 2010, Top 10 + Testing + Legal,
WebGoat and Web Scarab, Guide 2.0, Code Review
Others
WASC Threat Classification, OSTTMM 3.0 & 2.2
25
26
27
28
29
30
What is next?
32
33
Among the new ides for WTE are
Live CDs & Live DVDs
Virtual installs/appliances
A package repository
Can add 1+ tool to any Debian based Linux
# apt-get install owasp-wte-*
Custom remixes of any of the above
Targeted installs
WebGoat Developer Version
Wubi
USB and Kiosk version
34
OWASP Education
Project
Natural ties between these projects
Already being used for training classes
Need to coordinate efforts to make sure critical pieces aren't
missing from the OWASP WTE
Training environment could be customized for a particular class
thanks to the individual modules
Student gets to take the environment home
As more modules come online, even more potential for cross
pollination
Builder tools/docs only expand its reach
35
Builder is where the ROI is
But darn it,
breaking is really fun.
Builder tools coming in future releases.
(Thanks Top Gear!)
Builder vs Breaker
36
Crazy “Pie in the Sky” idea
.deb package + auto update + categories
= WTE profiles
Allows someone to customize
the OWASP WTE to their needs
Example profiles
Whitebox testing
Blackbox testing
Static Analysis
Target specific (Java, .Net, ...)
Profile + VM = custom persistent environment
37
Goals going forward
Showcase great OWASP projects
Provide the best, freely distributable application security
tools/documents in an easy to use package
Ensure that tools provided are easy to use as possible
38
Goals going forward
Continue to document how to use the tools and how
the modules were created
Align the tools with the OWASP Testing Guide v4 to
provide maximum coverage
Add more developer focused tools
39
40
Cloud-ifying WTE
Cloud Provider
Ubuntu / Debian Install
WTE Repository
Fun ensues
41
WTE Cloud - The12 Step
Program
Currently this is all manual
12 steps to get a fully-functional WTE
~30 minutes until you are logged in
42
Step 1: Get a cloud account
43
Step 2: Select Ubuntu/Debian
44
Step 3: Choose Name & RAM
45
Step 4: Start your server
46
Step 5: Install Desktop + WTE
47
Step 6: More installs
Add Repos & apt-get update
Ubuntu partners & WTE
Add a NX Server
ppa:freenx-team (plus a fix)
Add OWASP user
Start GDM
48
Step 7: NX Client setup
49
Step 8: Connect to WTE
50
Step 9: WTE ala Cloud
51
Step 10: Test Connectivity
52
Step 11: Test the Tools
53
Turn Cats into Dogs
54
Step 12: Check your bill
55
Cost Estimates
56
Cost Estimates
Estimated for 40 hours + 1 GB transfer
$4.98
Estimated for M-F by 24 hours + 1 GB
transfer = $15.48
Estimated 30 days by 24 hours + 4 GB
transfer = $88.32
Now what?
58
More Automation
Create a wte-cloud package
Wraps up all tools into 1 package
Make configuration steps into a script
Add to postinst for wte-cloud package
Get setup down to a single step
Ideally all in the wte-cloud package
59
Even More Automation
Python library to abstract away
differences between multiple cloud
provider APIs
Cloud Servers
Cloud Storage
Cloud Load balancers
Supports 24 different providers
60
More Options
Different desktop installs
Minimal
Baseline
Instant WebGoat in the sky
Internal Clouds
OpenStack, Vmware,
VirtualBox (headless)
61
Document, Document
Document
Document and post the current manual
process (coming soon)
Create then document the Libcloud
process
Tutorials for various providers
Problems
63
Current Issues
Yikes AMD64 CPU
sqlmap is missing a dependency
WTE Firefox is for i386
NX server is a bit tricky
The WTE theme gets lost
64
Like what you see,
then get involved?
Join the OWASP mail list
Announcements are there – low traffic
Download an ISO or VM or Cloud instance
Complain or praise, suggest improvements
Submit a bug to the Google Code site
65
How can you get involved?
Suggest missing doc or links
Do a screencast of one of the tools
Suggest some cool new tool
Create a .deb package
66
Learn More...
OWASP Site
http://www.owasp.org/index.php/Category:OWASP_Live_CD_Project
or just look on the OWASP project page (release quality)
http://www.owasp.org/index.php/Category:OWASP_Project
or Google “OWASP Live CD” or “OWASP WTE”
Download & Community Site
http://AppSecLive.org
Previously: http://mtesauro.com/livecd/
67
Why do
I do this?
68
Questions?
http://http://mango.blender.org/ Independent film produced by the Blender
Foundation using free and open software
Download it free at: Tears of Steel
69
A bit about OWASP
71
OWASP Meritocracy
72
Security
Vulnerabilities
Change Control
Source Code Mgmt
Strategy & Metrics
Policy & Compliance
Education & Training
Threat Assessment
Security Requirements
Secure Architecture
Design Review
Code Review
Remediation
Hardening
...

Weitere ähnliche Inhalte

Was ist angesagt?

Was ist angesagt? (20)

DEVSECOPS.pptx
DEVSECOPS.pptxDEVSECOPS.pptx
DEVSECOPS.pptx
 
RunDeck
RunDeckRunDeck
RunDeck
 
DevOps culture
DevOps cultureDevOps culture
DevOps culture
 
Owasp zap
Owasp zapOwasp zap
Owasp zap
 
Web Application Penetration Testing
Web Application Penetration Testing Web Application Penetration Testing
Web Application Penetration Testing
 
Introduction to CI/CD
Introduction to CI/CDIntroduction to CI/CD
Introduction to CI/CD
 
Build CICD Pipeline for Container Presentation Slides
Build CICD Pipeline for Container Presentation SlidesBuild CICD Pipeline for Container Presentation Slides
Build CICD Pipeline for Container Presentation Slides
 
CICD with Jenkins
CICD with JenkinsCICD with Jenkins
CICD with Jenkins
 
10+ Deploys Per Day: Dev and Ops Cooperation at Flickr
10+ Deploys Per Day: Dev and Ops Cooperation at Flickr10+ Deploys Per Day: Dev and Ops Cooperation at Flickr
10+ Deploys Per Day: Dev and Ops Cooperation at Flickr
 
Roles and Responsibilities of a DevOps Engineer
Roles and Responsibilities of a DevOps EngineerRoles and Responsibilities of a DevOps Engineer
Roles and Responsibilities of a DevOps Engineer
 
Building robust and friendly command line applications in go
Building robust and friendly command line applications in goBuilding robust and friendly command line applications in go
Building robust and friendly command line applications in go
 
DevOps intro
DevOps introDevOps intro
DevOps intro
 
Container World 2018
Container World 2018Container World 2018
Container World 2018
 
Rundeck Overview
Rundeck OverviewRundeck Overview
Rundeck Overview
 
Prometheus
PrometheusPrometheus
Prometheus
 
SonarQube Presentation.pptx
SonarQube Presentation.pptxSonarQube Presentation.pptx
SonarQube Presentation.pptx
 
Introduction to DevOps
Introduction to DevOpsIntroduction to DevOps
Introduction to DevOps
 
Continues Integration and Continuous Delivery with Azure DevOps - Deploy Anyt...
Continues Integration and Continuous Delivery with Azure DevOps - Deploy Anyt...Continues Integration and Continuous Delivery with Azure DevOps - Deploy Anyt...
Continues Integration and Continuous Delivery with Azure DevOps - Deploy Anyt...
 
Scalability, Availability & Stability Patterns
Scalability, Availability & Stability PatternsScalability, Availability & Stability Patterns
Scalability, Availability & Stability Patterns
 
Security Checkpoints in Agile SDLC
Security Checkpoints in Agile SDLCSecurity Checkpoints in Agile SDLC
Security Checkpoints in Agile SDLC
 

Andere mochten auch

AppSec Survey 2.0 Fine-Tuning an AppSec Training Program Based on Data
AppSec Survey 2.0 Fine-Tuning an AppSec Training Program Based on DataAppSec Survey 2.0 Fine-Tuning an AppSec Training Program Based on Data
AppSec Survey 2.0 Fine-Tuning an AppSec Training Program Based on Data
Denim Group
 
Automated Security Testing
Automated Security TestingAutomated Security Testing
Automated Security Testing
seleniumconf
 

Andere mochten auch (20)

Web Application Security: Introduction to common classes of security flaws an...
Web Application Security: Introduction to common classes of security flaws an...Web Application Security: Introduction to common classes of security flaws an...
Web Application Security: Introduction to common classes of security flaws an...
 
Virtual Security Lab Setup - OWASP Broken Web Apps, Webgoat, & ZAP
Virtual Security Lab Setup - OWASP Broken Web Apps, Webgoat, & ZAPVirtual Security Lab Setup - OWASP Broken Web Apps, Webgoat, & ZAP
Virtual Security Lab Setup - OWASP Broken Web Apps, Webgoat, & ZAP
 
OWASP WebGoat and PANTERA Web Assessment Studio Project.
OWASP WebGoat and PANTERA Web Assessment Studio Project.OWASP WebGoat and PANTERA Web Assessment Studio Project.
OWASP WebGoat and PANTERA Web Assessment Studio Project.
 
Security testautomation
Security testautomationSecurity testautomation
Security testautomation
 
Devbeat Conference - Developer First Security
Devbeat Conference - Developer First SecurityDevbeat Conference - Developer First Security
Devbeat Conference - Developer First Security
 
Agile Secure Software Development in a Large Software Development Organisatio...
Agile Secure Software Development in a Large Software Development Organisatio...Agile Secure Software Development in a Large Software Development Organisatio...
Agile Secure Software Development in a Large Software Development Organisatio...
 
Continous Integration of (JS) projects & check-build philosophy
Continous Integration of (JS) projects & check-build philosophyContinous Integration of (JS) projects & check-build philosophy
Continous Integration of (JS) projects & check-build philosophy
 
Pythonista も ls を読むべきか?
Pythonista も ls を読むべきか?Pythonista も ls を読むべきか?
Pythonista も ls を読むべきか?
 
AppSec Survey 2.0 Fine-Tuning an AppSec Training Program Based on Data
AppSec Survey 2.0 Fine-Tuning an AppSec Training Program Based on DataAppSec Survey 2.0 Fine-Tuning an AppSec Training Program Based on Data
AppSec Survey 2.0 Fine-Tuning an AppSec Training Program Based on Data
 
Rugged DevOps: Bridging Security and DevOps
Rugged DevOps: Bridging Security and DevOpsRugged DevOps: Bridging Security and DevOps
Rugged DevOps: Bridging Security and DevOps
 
DevOps AppSec Pipeline Velcocity NY 2015
DevOps AppSec Pipeline Velcocity NY 2015DevOps AppSec Pipeline Velcocity NY 2015
DevOps AppSec Pipeline Velcocity NY 2015
 
Automated Security Testing
Automated Security TestingAutomated Security Testing
Automated Security Testing
 
Continuous Security Testing in a Devops World #OWASPHelsinki
Continuous Security Testing in a Devops World #OWASPHelsinkiContinuous Security Testing in a Devops World #OWASPHelsinki
Continuous Security Testing in a Devops World #OWASPHelsinki
 
Cybersecurity by the numbers
Cybersecurity by the numbersCybersecurity by the numbers
Cybersecurity by the numbers
 
Threat Modeling And Analysis
Threat Modeling And AnalysisThreat Modeling And Analysis
Threat Modeling And Analysis
 
Continuous and Visible Security Testing with BDD-Security
Continuous and Visible Security Testing with BDD-SecurityContinuous and Visible Security Testing with BDD-Security
Continuous and Visible Security Testing with BDD-Security
 
Building Risk Management into Enterprise Architecture
Building Risk Management into Enterprise ArchitectureBuilding Risk Management into Enterprise Architecture
Building Risk Management into Enterprise Architecture
 
Automating security tests for Continuous Integration
Automating security tests for Continuous IntegrationAutomating security tests for Continuous Integration
Automating security tests for Continuous Integration
 
Integración contínua con Jenkins
Integración contínua con JenkinsIntegración contínua con Jenkins
Integración contínua con Jenkins
 
(SEC405) Enterprise Cloud Security via DevSecOps | AWS re:Invent 2014
(SEC405) Enterprise Cloud Security via DevSecOps | AWS re:Invent 2014(SEC405) Enterprise Cloud Security via DevSecOps | AWS re:Invent 2014
(SEC405) Enterprise Cloud Security via DevSecOps | AWS re:Invent 2014
 

Ähnlich wie OWASP WTE - Now in the Cloud!

Docker intro
Docker introDocker intro
Docker intro
spiddy
 
Application Deployment on Openstack
Application Deployment on OpenstackApplication Deployment on Openstack
Application Deployment on Openstack
Docker, Inc.
 
Docker and OpenStack Boston Meetup
Docker and OpenStack Boston MeetupDocker and OpenStack Boston Meetup
Docker and OpenStack Boston Meetup
Kamesh Pemmaraju
 
Write Once and REALLY Run Anywhere | OpenStack Summit HK 2013
Write Once and REALLY Run Anywhere | OpenStack Summit HK 2013Write Once and REALLY Run Anywhere | OpenStack Summit HK 2013
Write Once and REALLY Run Anywhere | OpenStack Summit HK 2013
dotCloud
 

Ähnlich wie OWASP WTE - Now in the Cloud! (20)

Openstack - An introduction/Installation - Presented at Dr Dobb's conference...
 Openstack - An introduction/Installation - Presented at Dr Dobb's conference... Openstack - An introduction/Installation - Presented at Dr Dobb's conference...
Openstack - An introduction/Installation - Presented at Dr Dobb's conference...
 
Extending DevOps to Big Data Applications with Kubernetes
Extending DevOps to Big Data Applications with KubernetesExtending DevOps to Big Data Applications with Kubernetes
Extending DevOps to Big Data Applications with Kubernetes
 
OpenStack for VMware Administrators
OpenStack for VMware AdministratorsOpenStack for VMware Administrators
OpenStack for VMware Administrators
 
The challenge of application distribution - Introduction to Docker (2014 dec ...
The challenge of application distribution - Introduction to Docker (2014 dec ...The challenge of application distribution - Introduction to Docker (2014 dec ...
The challenge of application distribution - Introduction to Docker (2014 dec ...
 
2017 03 25 Microsoft Hacks, How to code efficiently
2017 03 25 Microsoft Hacks, How to code efficiently2017 03 25 Microsoft Hacks, How to code efficiently
2017 03 25 Microsoft Hacks, How to code efficiently
 
Docker intro
Docker introDocker intro
Docker intro
 
What's New in Docker - February 2017
What's New in Docker - February 2017What's New in Docker - February 2017
What's New in Docker - February 2017
 
VMworld 2013: Deploying vSphere with OpenStack: What It Means to Your Cloud E...
VMworld 2013: Deploying vSphere with OpenStack: What It Means to Your Cloud E...VMworld 2013: Deploying vSphere with OpenStack: What It Means to Your Cloud E...
VMworld 2013: Deploying vSphere with OpenStack: What It Means to Your Cloud E...
 
Docker Presentation at the OpenStack Austin Meetup | 2013-09-12
Docker Presentation at the OpenStack Austin Meetup | 2013-09-12Docker Presentation at the OpenStack Austin Meetup | 2013-09-12
Docker Presentation at the OpenStack Austin Meetup | 2013-09-12
 
Application Deployment on Openstack
Application Deployment on OpenstackApplication Deployment on Openstack
Application Deployment on Openstack
 
Docker and OpenStack Boston Meetup
Docker and OpenStack Boston MeetupDocker and OpenStack Boston Meetup
Docker and OpenStack Boston Meetup
 
Webinar Docker Tri Series
Webinar Docker Tri SeriesWebinar Docker Tri Series
Webinar Docker Tri Series
 
Building Your Docker Tech Stack
Building Your Docker Tech StackBuilding Your Docker Tech Stack
Building Your Docker Tech Stack
 
Building your production tech stack for docker container platform
Building your production tech stack for docker container platformBuilding your production tech stack for docker container platform
Building your production tech stack for docker container platform
 
Introduction to Orchestration and DevOps with OpenStack
Introduction to Orchestration and DevOps with OpenStackIntroduction to Orchestration and DevOps with OpenStack
Introduction to Orchestration and DevOps with OpenStack
 
Write Once and REALLY Run Anywhere | OpenStack Summit HK 2013
Write Once and REALLY Run Anywhere | OpenStack Summit HK 2013Write Once and REALLY Run Anywhere | OpenStack Summit HK 2013
Write Once and REALLY Run Anywhere | OpenStack Summit HK 2013
 
OpenStack Summit
OpenStack SummitOpenStack Summit
OpenStack Summit
 
Demystifying Containerization Principles for Data Scientists
Demystifying Containerization Principles for Data ScientistsDemystifying Containerization Principles for Data Scientists
Demystifying Containerization Principles for Data Scientists
 
The world of Docker and Kubernetes
The world of Docker and Kubernetes The world of Docker and Kubernetes
The world of Docker and Kubernetes
 
Learn OpenStack from trystack.cn
Learn OpenStack from trystack.cnLearn OpenStack from trystack.cn
Learn OpenStack from trystack.cn
 

Mehr von Matt Tesauro

Mehr von Matt Tesauro (20)

Tenants for Going at DevSecOps Speed - LASCON 2023
Tenants for Going at DevSecOps Speed - LASCON 2023Tenants for Going at DevSecOps Speed - LASCON 2023
Tenants for Going at DevSecOps Speed - LASCON 2023
 
Hacking and Defending APIs - Red and Blue make Purple.pdf
Hacking and Defending APIs - Red and Blue make Purple.pdfHacking and Defending APIs - Red and Blue make Purple.pdf
Hacking and Defending APIs - Red and Blue make Purple.pdf
 
Practical DevSecOps: Fundamentals of Successful Programs
Practical DevSecOps: Fundamentals of Successful ProgramsPractical DevSecOps: Fundamentals of Successful Programs
Practical DevSecOps: Fundamentals of Successful Programs
 
Black and Blue APIs: Attacker's and Defender's View of API Vulnerabilities
Black and Blue APIs: Attacker's and Defender's View of API VulnerabilitiesBlack and Blue APIs: Attacker's and Defender's View of API Vulnerabilities
Black and Blue APIs: Attacker's and Defender's View of API Vulnerabilities
 
Landmines in the API Landscape
Landmines in the API LandscapeLandmines in the API Landscape
Landmines in the API Landscape
 
Peeling the Onion: Making Sense of the Layers of API Security
Peeling the Onion: Making Sense of the Layers of API SecurityPeeling the Onion: Making Sense of the Layers of API Security
Peeling the Onion: Making Sense of the Layers of API Security
 
The Final Frontier, Automating Dynamic Security Testing
The Final Frontier, Automating Dynamic Security TestingThe Final Frontier, Automating Dynamic Security Testing
The Final Frontier, Automating Dynamic Security Testing
 
Taking the Best of Agile, DevOps and CI/CD into security
Taking the Best of Agile, DevOps and CI/CD into securityTaking the Best of Agile, DevOps and CI/CD into security
Taking the Best of Agile, DevOps and CI/CD into security
 
DevSecOps Fundamentals and the Scars to Prove it.
DevSecOps Fundamentals and the Scars to Prove it.DevSecOps Fundamentals and the Scars to Prove it.
DevSecOps Fundamentals and the Scars to Prove it.
 
Continuous Security: Using Automation to Expand Security's Reach
Continuous Security: Using Automation to Expand Security's ReachContinuous Security: Using Automation to Expand Security's Reach
Continuous Security: Using Automation to Expand Security's Reach
 
Running FaaS with Scissors
Running FaaS with ScissorsRunning FaaS with Scissors
Running FaaS with Scissors
 
Making Continuous Security a Reality with OWASP’s AppSec Pipeline - Matt Tesa...
Making Continuous Security a Reality with OWASP’s AppSec Pipeline - Matt Tesa...Making Continuous Security a Reality with OWASP’s AppSec Pipeline - Matt Tesa...
Making Continuous Security a Reality with OWASP’s AppSec Pipeline - Matt Tesa...
 
Building a Secure DevOps Pipeline - for your AppSec Program
Building a Secure DevOps Pipeline - for your AppSec Program   Building a Secure DevOps Pipeline - for your AppSec Program
Building a Secure DevOps Pipeline - for your AppSec Program
 
AppSec Pipelines and Event based Security
AppSec Pipelines and Event based SecurityAppSec Pipelines and Event based Security
AppSec Pipelines and Event based Security
 
AppSec++ Take the best of Agile, DevOps and CI/CD into your AppSec Program
AppSec++ Take the best of Agile, DevOps and CI/CD into your AppSec ProgramAppSec++ Take the best of Agile, DevOps and CI/CD into your AppSec Program
AppSec++ Take the best of Agile, DevOps and CI/CD into your AppSec Program
 
Taking AppSec to 11 - BSides Austin 2016
Taking AppSec to 11 - BSides Austin 2016Taking AppSec to 11 - BSides Austin 2016
Taking AppSec to 11 - BSides Austin 2016
 
Taking AppSec to 11: AppSec Pipeline, DevOps and Making Things Better
Taking AppSec to 11: AppSec Pipeline, DevOps and Making Things BetterTaking AppSec to 11: AppSec Pipeline, DevOps and Making Things Better
Taking AppSec to 11: AppSec Pipeline, DevOps and Making Things Better
 
AppSec Pipeline - Velcocity NY 2015
AppSec Pipeline - Velcocity NY 2015AppSec Pipeline - Velcocity NY 2015
AppSec Pipeline - Velcocity NY 2015
 
Building an Open Source AppSec Pipeline - 2015 Texas Linux Fest
Building an Open Source AppSec Pipeline - 2015 Texas Linux FestBuilding an Open Source AppSec Pipeline - 2015 Texas Linux Fest
Building an Open Source AppSec Pipeline - 2015 Texas Linux Fest
 
Building an Open Source AppSec Pipeline
Building an Open Source AppSec PipelineBuilding an Open Source AppSec Pipeline
Building an Open Source AppSec Pipeline
 

Kürzlich hochgeladen

Architecting Cloud Native Applications
Architecting Cloud Native ApplicationsArchitecting Cloud Native Applications
Architecting Cloud Native Applications
WSO2
 
+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...
+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...
+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...
?#DUbAI#??##{{(☎️+971_581248768%)**%*]'#abortion pills for sale in dubai@
 

Kürzlich hochgeladen (20)

Apidays Singapore 2024 - Scalable LLM APIs for AI and Generative AI Applicati...
Apidays Singapore 2024 - Scalable LLM APIs for AI and Generative AI Applicati...Apidays Singapore 2024 - Scalable LLM APIs for AI and Generative AI Applicati...
Apidays Singapore 2024 - Scalable LLM APIs for AI and Generative AI Applicati...
 
Automating Google Workspace (GWS) & more with Apps Script
Automating Google Workspace (GWS) & more with Apps ScriptAutomating Google Workspace (GWS) & more with Apps Script
Automating Google Workspace (GWS) & more with Apps Script
 
Emergent Methods: Multi-lingual narrative tracking in the news - real-time ex...
Emergent Methods: Multi-lingual narrative tracking in the news - real-time ex...Emergent Methods: Multi-lingual narrative tracking in the news - real-time ex...
Emergent Methods: Multi-lingual narrative tracking in the news - real-time ex...
 
A Beginners Guide to Building a RAG App Using Open Source Milvus
A Beginners Guide to Building a RAG App Using Open Source MilvusA Beginners Guide to Building a RAG App Using Open Source Milvus
A Beginners Guide to Building a RAG App Using Open Source Milvus
 
Boost Fertility New Invention Ups Success Rates.pdf
Boost Fertility New Invention Ups Success Rates.pdfBoost Fertility New Invention Ups Success Rates.pdf
Boost Fertility New Invention Ups Success Rates.pdf
 
ICT role in 21st century education and its challenges
ICT role in 21st century education and its challengesICT role in 21st century education and its challenges
ICT role in 21st century education and its challenges
 
Navi Mumbai Call Girls 🥰 8617370543 Service Offer VIP Hot Model
Navi Mumbai Call Girls 🥰 8617370543 Service Offer VIP Hot ModelNavi Mumbai Call Girls 🥰 8617370543 Service Offer VIP Hot Model
Navi Mumbai Call Girls 🥰 8617370543 Service Offer VIP Hot Model
 
presentation ICT roal in 21st century education
presentation ICT roal in 21st century educationpresentation ICT roal in 21st century education
presentation ICT roal in 21st century education
 
Strategies for Landing an Oracle DBA Job as a Fresher
Strategies for Landing an Oracle DBA Job as a FresherStrategies for Landing an Oracle DBA Job as a Fresher
Strategies for Landing an Oracle DBA Job as a Fresher
 
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
 
Real Time Object Detection Using Open CV
Real Time Object Detection Using Open CVReal Time Object Detection Using Open CV
Real Time Object Detection Using Open CV
 
Ransomware_Q4_2023. The report. [EN].pdf
Ransomware_Q4_2023. The report. [EN].pdfRansomware_Q4_2023. The report. [EN].pdf
Ransomware_Q4_2023. The report. [EN].pdf
 
Architecting Cloud Native Applications
Architecting Cloud Native ApplicationsArchitecting Cloud Native Applications
Architecting Cloud Native Applications
 
+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...
+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...
+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...
 
Apidays New York 2024 - The value of a flexible API Management solution for O...
Apidays New York 2024 - The value of a flexible API Management solution for O...Apidays New York 2024 - The value of a flexible API Management solution for O...
Apidays New York 2024 - The value of a flexible API Management solution for O...
 
ProductAnonymous-April2024-WinProductDiscovery-MelissaKlemke
ProductAnonymous-April2024-WinProductDiscovery-MelissaKlemkeProductAnonymous-April2024-WinProductDiscovery-MelissaKlemke
ProductAnonymous-April2024-WinProductDiscovery-MelissaKlemke
 
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
 
"I see eyes in my soup": How Delivery Hero implemented the safety system for ...
"I see eyes in my soup": How Delivery Hero implemented the safety system for ..."I see eyes in my soup": How Delivery Hero implemented the safety system for ...
"I see eyes in my soup": How Delivery Hero implemented the safety system for ...
 
GenAI Risks & Security Meetup 01052024.pdf
GenAI Risks & Security Meetup 01052024.pdfGenAI Risks & Security Meetup 01052024.pdf
GenAI Risks & Security Meetup 01052024.pdf
 
EMPOWERMENT TECHNOLOGY GRADE 11 QUARTER 2 REVIEWER
EMPOWERMENT TECHNOLOGY GRADE 11 QUARTER 2 REVIEWEREMPOWERMENT TECHNOLOGY GRADE 11 QUARTER 2 REVIEWER
EMPOWERMENT TECHNOLOGY GRADE 11 QUARTER 2 REVIEWER
 

OWASP WTE - Now in the Cloud!

  • 1. The OWASP Foundation http://www.owasp.org OWASP WTE: Application Testing Your Way Matt Tesauro WTE and OpenStack Security Project Lead matt.tesauro@owasp.org Product Security Engineering Lead Rackspace, the open cloud company Twin Cities Chapter
  • 2. 2 Who's this Matt guy anyway? Broad IT background Developer, DBA, Sys Admin, Pen Tester, Application Security professional, CISSP, CEH, RHCE, Linux+ Long history with Linux and Open Source Contributor to many projects Leader of OWASP Live CD / WTE Former OWASP Foundation Board Member Breaking “the cloud” for Rackspace
  • 3. OWASP WTE: A History
  • 4. 4 At all started that fine spring day...
  • 5. 5 At all started that summer...
  • 6. 6 At all started that summer...
  • 7. 7 •Current Release •OWASP WTE Oct 2012 •Previous Releases •OWASP WTE Sept 2011 •OWASP WTE Feb 2011 •OWASP WTE Beta Jan 2010 •AppSecEU May 2009 •AustinTerrier Feb 2009 •Portugal Release Dec 2008 •SoC Release Sept 2008 •Beta1 and Beta2 releases during the SoC Note: Not all of these had ISO, VirtualBox and Vmware versions
  • 8. 8 Other fun facts ~5,094 GB of bandwidth since launch (Jul 2008) Most downloads in 1 month = 81,607 (Mar 2009) Overall downloads: 330,081 (as of 2009-10-05)
  • 9. 9
  • 10. 10
  • 11. 11 There's a new kid in town OWASP WTE Web Testing Environment
  • 12. 12 The project has grown to more than just a Live CD VMWare installs/appliances VirtualBox installs USB Installs Training Environment .... Add in the transition to Ubuntu and the possibilities are endless (plus the 26,000+ packages in the Ubuntu repos)
  • 13. 13 GOAL Make application security tools and documentation easily available and easy to use Compliment's OWASP goal to make app security visible Design goals Easy for users to keep updated Easy for project lead to keep updated Easy to produce releases (more on this later) Focused on just application security – not general pen testing
  • 15. 15
  • 16. 16
  • 17. 17
  • 18. 18 31 “Significant” Tools Available WapitiWeb Goat CAL9000 JBroFuzz DirBuster WebSlayer WSFuzzerWeb Scarab OWASP Tools: a tool for performing all types of security testing on web apps and web services an online training environment for hands-on learning about app sec a collection of web app sec testing tools especially encoding/decoding a web application fuzzer for requests being made over HTTP and/or HTTPS. a fuzzer with HTTP based SOAP services as its main target audits the security of web apps by performing "black-box" scans a multi threaded Java app to brute force directory and file names A tool designed for brute-forcing web applications such as resource discovery, GET and POST fuzzing, etc JBroFuzz a web application fuzzer for requests being made over HTTP and/or HTTPS. EnDe An amazing collection of encoding and decoding tools as well as many other utilities ZAP Proxy A fork of the popular but moribund Paros Proxy
  • 19. 19 Skipfish Paros Nmap & Zenmap Wireshark Firefox Burp Suite Grendel Scan Nikto sqlmap SQL Brute w3af netcat Httprint Spike Proxy Rat Proxy Fierce Domain Scanner Metasploit tcpdump Maltego CE Other Proxies: Scanners: Duh: SQL-i: Others: Fuzzdb Wpscan Red = New in last release
  • 20. Why is it different?
  • 21. 21
  • 22. 22
  • 23. 23
  • 24. 24 OWASP Documents Testing Guide v2 & v3 CLASP and OpenSamm Top 10 for 2010 Top 10 for Java Enterprise Edition AppSec FAQ Books – tried to get all of them CLASP, Top 10 2010, Top 10 + Testing + Legal, WebGoat and Web Scarab, Guide 2.0, Code Review Others WASC Threat Classification, OSTTMM 3.0 & 2.2
  • 25. 25
  • 26. 26
  • 27. 27
  • 28. 28
  • 29. 29
  • 30. 30
  • 32. 32
  • 33. 33 Among the new ides for WTE are Live CDs & Live DVDs Virtual installs/appliances A package repository Can add 1+ tool to any Debian based Linux # apt-get install owasp-wte-* Custom remixes of any of the above Targeted installs WebGoat Developer Version Wubi USB and Kiosk version
  • 34. 34 OWASP Education Project Natural ties between these projects Already being used for training classes Need to coordinate efforts to make sure critical pieces aren't missing from the OWASP WTE Training environment could be customized for a particular class thanks to the individual modules Student gets to take the environment home As more modules come online, even more potential for cross pollination Builder tools/docs only expand its reach
  • 35. 35 Builder is where the ROI is But darn it, breaking is really fun. Builder tools coming in future releases. (Thanks Top Gear!) Builder vs Breaker
  • 36. 36 Crazy “Pie in the Sky” idea .deb package + auto update + categories = WTE profiles Allows someone to customize the OWASP WTE to their needs Example profiles Whitebox testing Blackbox testing Static Analysis Target specific (Java, .Net, ...) Profile + VM = custom persistent environment
  • 37. 37 Goals going forward Showcase great OWASP projects Provide the best, freely distributable application security tools/documents in an easy to use package Ensure that tools provided are easy to use as possible
  • 38. 38 Goals going forward Continue to document how to use the tools and how the modules were created Align the tools with the OWASP Testing Guide v4 to provide maximum coverage Add more developer focused tools
  • 39. 39
  • 40. 40 Cloud-ifying WTE Cloud Provider Ubuntu / Debian Install WTE Repository Fun ensues
  • 41. 41 WTE Cloud - The12 Step Program Currently this is all manual 12 steps to get a fully-functional WTE ~30 minutes until you are logged in
  • 42. 42 Step 1: Get a cloud account
  • 43. 43 Step 2: Select Ubuntu/Debian
  • 44. 44 Step 3: Choose Name & RAM
  • 45. 45 Step 4: Start your server
  • 46. 46 Step 5: Install Desktop + WTE
  • 47. 47 Step 6: More installs Add Repos & apt-get update Ubuntu partners & WTE Add a NX Server ppa:freenx-team (plus a fix) Add OWASP user Start GDM
  • 48. 48 Step 7: NX Client setup
  • 50. 50 Step 9: WTE ala Cloud
  • 51. 51 Step 10: Test Connectivity
  • 52. 52 Step 11: Test the Tools
  • 54. 54 Step 12: Check your bill
  • 56. 56 Cost Estimates Estimated for 40 hours + 1 GB transfer $4.98 Estimated for M-F by 24 hours + 1 GB transfer = $15.48 Estimated 30 days by 24 hours + 4 GB transfer = $88.32
  • 58. 58 More Automation Create a wte-cloud package Wraps up all tools into 1 package Make configuration steps into a script Add to postinst for wte-cloud package Get setup down to a single step Ideally all in the wte-cloud package
  • 59. 59 Even More Automation Python library to abstract away differences between multiple cloud provider APIs Cloud Servers Cloud Storage Cloud Load balancers Supports 24 different providers
  • 60. 60 More Options Different desktop installs Minimal Baseline Instant WebGoat in the sky Internal Clouds OpenStack, Vmware, VirtualBox (headless)
  • 61. 61 Document, Document Document Document and post the current manual process (coming soon) Create then document the Libcloud process Tutorials for various providers
  • 63. 63 Current Issues Yikes AMD64 CPU sqlmap is missing a dependency WTE Firefox is for i386 NX server is a bit tricky The WTE theme gets lost
  • 64. 64 Like what you see, then get involved? Join the OWASP mail list Announcements are there – low traffic Download an ISO or VM or Cloud instance Complain or praise, suggest improvements Submit a bug to the Google Code site
  • 65. 65 How can you get involved? Suggest missing doc or links Do a screencast of one of the tools Suggest some cool new tool Create a .deb package
  • 66. 66 Learn More... OWASP Site http://www.owasp.org/index.php/Category:OWASP_Live_CD_Project or just look on the OWASP project page (release quality) http://www.owasp.org/index.php/Category:OWASP_Project or Google “OWASP Live CD” or “OWASP WTE” Download & Community Site http://AppSecLive.org Previously: http://mtesauro.com/livecd/
  • 67. 67 Why do I do this?
  • 68. 68 Questions? http://http://mango.blender.org/ Independent film produced by the Blender Foundation using free and open software Download it free at: Tears of Steel
  • 69. 69
  • 70. A bit about OWASP
  • 72. 72 Security Vulnerabilities Change Control Source Code Mgmt Strategy & Metrics Policy & Compliance Education & Training Threat Assessment Security Requirements Secure Architecture Design Review Code Review Remediation Hardening ...

Hinweis der Redaktion

  1. How would you feel if your confidential data is stolen? Angry frustrated!!
  2. http://www.fastcompany.com/multimedia/slideshows/content/autotechnology.html
  3. http://www.fastcompany.com/multimedia/slideshows/content/autotechnology.html
  4. http://www.fastcompany.com/multimedia/slideshows/content/autotechnology.html
  5. http://www.fordinthenews.com/ford-channels-kids-open-source-for-sync-app-development/ http://wot.motortrend.com/6623001/technology/ford-sync-to-gain-itunes-tagging-via-hd-radio-in-2010/index.html
  6. http://news.cnet.com/8301-27080_3-20020547-245.html
  7. http://www.itechdiary.com/barbie-video-girl-barbie-doll-is-equipped-with-spy-camera.html http://www.youtube.com/watch?v=oEH5pMylo3Q
  8. http://aarontestado.i.ph/photo/93/101
  9. image from Tom Brennan's trip to OWASP China 2010
  10. http://www.usinenouvelle.com/industry/green-hills-software-2777/green-hills-platform-for-medical-devices-p58601.html http://www.mathworks.com/company/events/webinars/wbnr33339.html?id=33339&p1=525981126&p2=525981144 http://www.zdnet.com/blog/projectfailures/heart-pacemakers-vulnerable-to-attack/965
  11. http://www.usinenouvelle.com/industry/green-hills-software-2777/green-hills-platform-for-medical-devices-p58601.html http://www.mathworks.com/company/events/webinars/wbnr33339.html?id=33339&p1=525981126&p2=525981144 http://www.zdnet.com/blog/projectfailures/heart-pacemakers-vulnerable-to-attack/965
  12. http://www.zdnet.com/blog/projectfailures/heart-pacemakers-vulnerable-to-attack/965
  13. http://www.npr.org/blogs/thetwo-way/2009/07/investigators_air_france_fligh.html http://en.wikipedia.org/wiki/Air_France_Flight_447 http://www.lowfaresairline.com/2010/01/2009-an-eventful-year-for-airlines/
  14. http://www.xssed.com/news/112/Persistent_XSS_vulnerability_affecting_Twitter_promptly_corrected/
  15. http://backseatcuddler.com/2008/12/20/arnold-hints-at-terminator-salvation-cameo/
  16. http://backseatcuddler.com/2008/12/20/arnold-hints-at-terminator-salvation-cameo/
  17. http://backseatcuddler.com/2008/12/20/arnold-hints-at-terminator-salvation-cameo/
  18. How would you feel if your confidential data is stolen? Angry frustrated!!
  19. How would you feel if your confidential data is stolen? Angry frustrated!!
  20. How would you feel if your confidential data is stolen? Angry frustrated!!
  21. How would you feel if your confidential data is stolen? Angry frustrated!!
  22. How would you feel if your confidential data is stolen? Angry frustrated!!
  23. How would you feel if your confidential data is stolen? Angry frustrated!!
  24. How would you feel if your confidential data is stolen? Angry frustrated!!