SlideShare ist ein Scribd-Unternehmen logo
1 von 18
Penetration testing using open source tools
Agenda
 What is SOA and SOAP communication?
 What are web services?
 Attacker’s approach
Google Hacking
Universal Description Discovery and Integration
(UDDI)
 Exploiting XML parsers
 Error Handling
 Attack simulation Technique & Tools
 Simulating the attack
 Conclusion
What is SOA?
SOA is similar to building blocks.
Conventionally, the components of an
IT industry were tightly rigid, so
implementing change was difficult.
With SOA it is easy to assemble,
easily reconfigurable.
How SOAP communicates?
What is the meaning of web
service? Web service is a server-
oriented system which
operates on server side, and
performs tasks, when it is
called upon by an application.
Web service is registered in a
web service registry, which an
application uses to call
specific service it requires.
A web service is not language
and platform dependent, it
uses XML to communicate
with other services or
application.
Web service in Action
The communication starts
with the user submitting the
data.
1. The application contacts
the UDDI to look up the
service required to perform
this functionality.
UDDI ProviderClient
The UDDI provider creates a binding which associates the message to the service
requested, and its location. The UDDI provider then returns a WSDL file to the
client, which the application completes as a SOAP message.
Web service in Action
The Soap message then gets sent to the
application server which hosts the web
service needed to execute the current
operation.
This is done by binding the details in the
WSDL file from the UDDI.
Web service in Action
Using the SOAP instructions, the
web services can correctly
execute the task according to
the parameters it was given, and
deliver the processed
conversation.
Note: Appending ?wsdl or .wsdl reveals the wsdl file.
http://172.16.125.233/HacmeBank_v2_WS/Install/Install.asmx?WSDL
Attacker’s approach
 Google hacking
Filetype: wsdl
Indexof “wsdl”
Inurl: wsdl
Inurl: asmx (note that asmx is the WSDL equivalent
in ASP.net)
 UDDI (Universal Description and Integration):
This provides a centralized repository of web
services and their wsdl files. Service providers often
post their details using public UDDI’s to discover at
run time.
Web Application v/s Web services
WEB APPLICATION WEB SERVICES
1. XSS
2. SQL Injection
3. Malicious File execution
4. Broken Authentication and Session
Management
5. Insecure Direct Object References
6. Cross-Site Request Forgery (CSRF)
7. Insecure Cryptographic Storage
8. Failure to Restrict URL Access
And many more…..
1. Almost all the attacks that are
applicable to web application.
2. Xpath/XML Injection
3. LDAP Injection
4. Exploiting XML parsers
5. Brute forcing
Exploiting XML parser
Document Object Model SAX
Buffer overflow XML Injection
Error handling
 Uncaught exceptions within application
logic are caught at the SOAP engine
and displayed as a SOAP fault element.
Defense
○ Ensure all exceptions caught are generic error
messages returned with SOAP responses.
○ Suppress exception details from being
included in the fault element.
Attack simulation Technique and
Tools
 Foot printing
Discovering the existence of some services relevant
to the target.
Discovering the entry points to those respective
services.
○ Techniques based on the UBR (Universal Business
Register) and UDDI will work
○ WSDL scanning and schema poisoning
○ Discovery of .wsdl, .jws, .aspx
 Tool: wspawn – It does footprint via the UBR(UDDI) inquire
API’s. It also does discovery based protocol.
Enumeration
○ Service Information
○ Port type information
○ Operation information
Simulating the attack
DEMO
Other tools
 Commercial Tools:
WebInspect
WSID4ID (Web services interface Definition
for intrusion Defense)
Conclusion
 We can now attack web services 
Any Questions ??
WCF Services/Security

Weitere ähnliche Inhalte

Was ist angesagt?

Asp.net identity dot netconf
Asp.net identity dot netconfAsp.net identity dot netconf
Asp.net identity dot netconf
rustd
 
Microsoft asp.net identity security
Microsoft asp.net identity  securityMicrosoft asp.net identity  security
Microsoft asp.net identity security
rustd
 
Dom based xss
Dom based xssDom based xss
Dom based xss
Lê Giáp
 
Securing Single Page Applications with Token Based Authentication
Securing Single Page Applications with Token Based AuthenticationSecuring Single Page Applications with Token Based Authentication
Securing Single Page Applications with Token Based Authentication
Stefan Achtsnit
 
Cross Site Request Forgery Vulnerabilities
Cross Site Request Forgery VulnerabilitiesCross Site Request Forgery Vulnerabilities
Cross Site Request Forgery Vulnerabilities
Marco Morana
 
ZubZib Black Coffee #9 - ASP.NET Identity
ZubZib Black Coffee #9 - ASP.NET IdentityZubZib Black Coffee #9 - ASP.NET Identity
ZubZib Black Coffee #9 - ASP.NET Identity
Non Intanon
 

Was ist angesagt? (20)

Automatically detecting security vulnerabilities in WordPress
Automatically detecting security vulnerabilities in WordPressAutomatically detecting security vulnerabilities in WordPress
Automatically detecting security vulnerabilities in WordPress
 
Azure AD Synchronization Data Flow
Azure AD Synchronization Data FlowAzure AD Synchronization Data Flow
Azure AD Synchronization Data Flow
 
Single Sign-On security issue in Cloud Computing
Single Sign-On security issue in Cloud ComputingSingle Sign-On security issue in Cloud Computing
Single Sign-On security issue in Cloud Computing
 
Facebook_Oauth
Facebook_OauthFacebook_Oauth
Facebook_Oauth
 
Asp.net identity dot netconf
Asp.net identity dot netconfAsp.net identity dot netconf
Asp.net identity dot netconf
 
Microsoft Azure Administrator-AZ 103 training in Bangalore
Microsoft Azure Administrator-AZ 103 training in BangaloreMicrosoft Azure Administrator-AZ 103 training in Bangalore
Microsoft Azure Administrator-AZ 103 training in Bangalore
 
Asp.Net Identity
Asp.Net IdentityAsp.Net Identity
Asp.Net Identity
 
Microsoft asp.net identity security
Microsoft asp.net identity  securityMicrosoft asp.net identity  security
Microsoft asp.net identity security
 
Secure Code Warrior - Authentication
Secure Code Warrior - AuthenticationSecure Code Warrior - Authentication
Secure Code Warrior - Authentication
 
Authentication & Authorization in ASPdotNet MVC
Authentication & Authorization in ASPdotNet MVCAuthentication & Authorization in ASPdotNet MVC
Authentication & Authorization in ASPdotNet MVC
 
The most Common Website Security Threats
The most Common Website Security ThreatsThe most Common Website Security Threats
The most Common Website Security Threats
 
OpenID Connect primer
OpenID Connect primerOpenID Connect primer
OpenID Connect primer
 
API Security : Patterns and Practices
API Security : Patterns and PracticesAPI Security : Patterns and Practices
API Security : Patterns and Practices
 
Dom based xss
Dom based xssDom based xss
Dom based xss
 
Open source wso2 identity server sso with drupal 8
Open source wso2 identity server sso with drupal 8Open source wso2 identity server sso with drupal 8
Open source wso2 identity server sso with drupal 8
 
Xss frame work
Xss frame workXss frame work
Xss frame work
 
Securing Single Page Applications with Token Based Authentication
Securing Single Page Applications with Token Based AuthenticationSecuring Single Page Applications with Token Based Authentication
Securing Single Page Applications with Token Based Authentication
 
React security vulnerabilities
React security vulnerabilitiesReact security vulnerabilities
React security vulnerabilities
 
Cross Site Request Forgery Vulnerabilities
Cross Site Request Forgery VulnerabilitiesCross Site Request Forgery Vulnerabilities
Cross Site Request Forgery Vulnerabilities
 
ZubZib Black Coffee #9 - ASP.NET Identity
ZubZib Black Coffee #9 - ASP.NET IdentityZubZib Black Coffee #9 - ASP.NET Identity
ZubZib Black Coffee #9 - ASP.NET Identity
 

Andere mochten auch

Presentación inglés
Presentación inglésPresentación inglés
Presentación inglés
Carol Lopez
 
Simple Object Access Protocol
Simple Object Access ProtocolSimple Object Access Protocol
Simple Object Access Protocol
Saatviga Sudhahar
 
Stefan Tilkov Pragmatic Intro To Rest
Stefan Tilkov Pragmatic Intro To RestStefan Tilkov Pragmatic Intro To Rest
Stefan Tilkov Pragmatic Intro To Rest
deimos
 

Andere mochten auch (9)

Presentación inglés
Presentación inglésPresentación inglés
Presentación inglés
 
Web services - REST and SOAP
Web services - REST and SOAPWeb services - REST and SOAP
Web services - REST and SOAP
 
Enterprise REST
Enterprise RESTEnterprise REST
Enterprise REST
 
ReST Vs SOA(P) ... Yawn
ReST Vs SOA(P) ... YawnReST Vs SOA(P) ... Yawn
ReST Vs SOA(P) ... Yawn
 
Web of Science: REST or SOAP?
Web of Science: REST or SOAP?Web of Science: REST or SOAP?
Web of Science: REST or SOAP?
 
Webservices in SalesForce (part 1)
Webservices in SalesForce (part 1)Webservices in SalesForce (part 1)
Webservices in SalesForce (part 1)
 
Simple Object Access Protocol
Simple Object Access ProtocolSimple Object Access Protocol
Simple Object Access Protocol
 
Web Services (SOAP, WSDL, UDDI)
Web Services (SOAP, WSDL, UDDI)Web Services (SOAP, WSDL, UDDI)
Web Services (SOAP, WSDL, UDDI)
 
Stefan Tilkov Pragmatic Intro To Rest
Stefan Tilkov Pragmatic Intro To RestStefan Tilkov Pragmatic Intro To Rest
Stefan Tilkov Pragmatic Intro To Rest
 

Ähnlich wie SOA Architecture & SOAP Protocol Architecture Detail & Attack Vector

webservices overview
webservices overviewwebservices overview
webservices overview
elliando dias
 

Ähnlich wie SOA Architecture & SOAP Protocol Architecture Detail & Attack Vector (20)

Web services overview
Web services overviewWeb services overview
Web services overview
 
web technologies Unit 5
 web technologies Unit 5 web technologies Unit 5
web technologies Unit 5
 
Web Services in Cloud Computing.pptx
Web Services in Cloud Computing.pptxWeb Services in Cloud Computing.pptx
Web Services in Cloud Computing.pptx
 
Introduction to soapui and webservices
Introduction to soapui  and webservicesIntroduction to soapui  and webservices
Introduction to soapui and webservices
 
Unit 5 WEB TECHNOLOGIES
Unit 5 WEB TECHNOLOGIES Unit 5 WEB TECHNOLOGIES
Unit 5 WEB TECHNOLOGIES
 
Web services and SOA
Web services and SOAWeb services and SOA
Web services and SOA
 
Web services concepts, protocols and development
Web services concepts, protocols and developmentWeb services concepts, protocols and development
Web services concepts, protocols and development
 
Webservices
WebservicesWebservices
Webservices
 
Web services
Web servicesWeb services
Web services
 
Web services and SOA [Modified]
Web services and SOA [Modified]Web services and SOA [Modified]
Web services and SOA [Modified]
 
Efficient retrieval of web services using prioritization and clustering
Efficient retrieval of web services using prioritization and clusteringEfficient retrieval of web services using prioritization and clustering
Efficient retrieval of web services using prioritization and clustering
 
Secc tutorials development and deployment of rest web services in java_v2.0
Secc tutorials development and deployment of rest web services in java_v2.0Secc tutorials development and deployment of rest web services in java_v2.0
Secc tutorials development and deployment of rest web services in java_v2.0
 
Web Services on AIMS (FAO)
Web Services on AIMS (FAO)Web Services on AIMS (FAO)
Web Services on AIMS (FAO)
 
Web programming
Web programmingWeb programming
Web programming
 
Web service
Web serviceWeb service
Web service
 
Web Services
Web Services Web Services
Web Services
 
Layer 7 Technologies: Web Services Hacking And Hardening
Layer 7 Technologies: Web Services Hacking And HardeningLayer 7 Technologies: Web Services Hacking And Hardening
Layer 7 Technologies: Web Services Hacking And Hardening
 
SOA & WCF
SOA & WCFSOA & WCF
SOA & WCF
 
webservices overview
webservices overviewwebservices overview
webservices overview
 
SOAP--Simple Object Access Protocol
SOAP--Simple Object Access ProtocolSOAP--Simple Object Access Protocol
SOAP--Simple Object Access Protocol
 

Mehr von n|u - The Open Security Community

Mehr von n|u - The Open Security Community (20)

Hardware security testing 101 (Null - Delhi Chapter)
Hardware security testing 101 (Null - Delhi Chapter)Hardware security testing 101 (Null - Delhi Chapter)
Hardware security testing 101 (Null - Delhi Chapter)
 
Osint primer
Osint primerOsint primer
Osint primer
 
SSRF exploit the trust relationship
SSRF exploit the trust relationshipSSRF exploit the trust relationship
SSRF exploit the trust relationship
 
Nmap basics
Nmap basicsNmap basics
Nmap basics
 
Metasploit primary
Metasploit primaryMetasploit primary
Metasploit primary
 
Api security-testing
Api security-testingApi security-testing
Api security-testing
 
Introduction to TLS 1.3
Introduction to TLS 1.3Introduction to TLS 1.3
Introduction to TLS 1.3
 
Gibson 101 -quick_introduction_to_hacking_mainframes_in_2020_null_infosec_gir...
Gibson 101 -quick_introduction_to_hacking_mainframes_in_2020_null_infosec_gir...Gibson 101 -quick_introduction_to_hacking_mainframes_in_2020_null_infosec_gir...
Gibson 101 -quick_introduction_to_hacking_mainframes_in_2020_null_infosec_gir...
 
Talking About SSRF,CRLF
Talking About SSRF,CRLFTalking About SSRF,CRLF
Talking About SSRF,CRLF
 
Building active directory lab for red teaming
Building active directory lab for red teamingBuilding active directory lab for red teaming
Building active directory lab for red teaming
 
Owning a company through their logs
Owning a company through their logsOwning a company through their logs
Owning a company through their logs
 
Introduction to shodan
Introduction to shodanIntroduction to shodan
Introduction to shodan
 
Cloud security
Cloud security Cloud security
Cloud security
 
Detecting persistence in windows
Detecting persistence in windowsDetecting persistence in windows
Detecting persistence in windows
 
Frida - Objection Tool Usage
Frida - Objection Tool UsageFrida - Objection Tool Usage
Frida - Objection Tool Usage
 
OSQuery - Monitoring System Process
OSQuery - Monitoring System ProcessOSQuery - Monitoring System Process
OSQuery - Monitoring System Process
 
DevSecOps Jenkins Pipeline -Security
DevSecOps Jenkins Pipeline -SecurityDevSecOps Jenkins Pipeline -Security
DevSecOps Jenkins Pipeline -Security
 
Extensible markup language attacks
Extensible markup language attacksExtensible markup language attacks
Extensible markup language attacks
 
Linux for hackers
Linux for hackersLinux for hackers
Linux for hackers
 
Android Pentesting
Android PentestingAndroid Pentesting
Android Pentesting
 

Kürzlich hochgeladen

Why Teams call analytics are critical to your entire business
Why Teams call analytics are critical to your entire businessWhy Teams call analytics are critical to your entire business
Why Teams call analytics are critical to your entire business
panagenda
 
Architecting Cloud Native Applications
Architecting Cloud Native ApplicationsArchitecting Cloud Native Applications
Architecting Cloud Native Applications
WSO2
 

Kürzlich hochgeladen (20)

ProductAnonymous-April2024-WinProductDiscovery-MelissaKlemke
ProductAnonymous-April2024-WinProductDiscovery-MelissaKlemkeProductAnonymous-April2024-WinProductDiscovery-MelissaKlemke
ProductAnonymous-April2024-WinProductDiscovery-MelissaKlemke
 
Polkadot JAM Slides - Token2049 - By Dr. Gavin Wood
Polkadot JAM Slides - Token2049 - By Dr. Gavin WoodPolkadot JAM Slides - Token2049 - By Dr. Gavin Wood
Polkadot JAM Slides - Token2049 - By Dr. Gavin Wood
 
GenAI Risks & Security Meetup 01052024.pdf
GenAI Risks & Security Meetup 01052024.pdfGenAI Risks & Security Meetup 01052024.pdf
GenAI Risks & Security Meetup 01052024.pdf
 
Strategize a Smooth Tenant-to-tenant Migration and Copilot Takeoff
Strategize a Smooth Tenant-to-tenant Migration and Copilot TakeoffStrategize a Smooth Tenant-to-tenant Migration and Copilot Takeoff
Strategize a Smooth Tenant-to-tenant Migration and Copilot Takeoff
 
Exploring the Future Potential of AI-Enabled Smartphone Processors
Exploring the Future Potential of AI-Enabled Smartphone ProcessorsExploring the Future Potential of AI-Enabled Smartphone Processors
Exploring the Future Potential of AI-Enabled Smartphone Processors
 
TrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
TrustArc Webinar - Stay Ahead of US State Data Privacy Law DevelopmentsTrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
TrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
 
Real Time Object Detection Using Open CV
Real Time Object Detection Using Open CVReal Time Object Detection Using Open CV
Real Time Object Detection Using Open CV
 
Connector Corner: Accelerate revenue generation using UiPath API-centric busi...
Connector Corner: Accelerate revenue generation using UiPath API-centric busi...Connector Corner: Accelerate revenue generation using UiPath API-centric busi...
Connector Corner: Accelerate revenue generation using UiPath API-centric busi...
 
Why Teams call analytics are critical to your entire business
Why Teams call analytics are critical to your entire businessWhy Teams call analytics are critical to your entire business
Why Teams call analytics are critical to your entire business
 
Apidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, Adobe
Apidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, AdobeApidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, Adobe
Apidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, Adobe
 
MINDCTI Revenue Release Quarter One 2024
MINDCTI Revenue Release Quarter One 2024MINDCTI Revenue Release Quarter One 2024
MINDCTI Revenue Release Quarter One 2024
 
FWD Group - Insurer Innovation Award 2024
FWD Group - Insurer Innovation Award 2024FWD Group - Insurer Innovation Award 2024
FWD Group - Insurer Innovation Award 2024
 
Corporate and higher education May webinar.pptx
Corporate and higher education May webinar.pptxCorporate and higher education May webinar.pptx
Corporate and higher education May webinar.pptx
 
Manulife - Insurer Transformation Award 2024
Manulife - Insurer Transformation Award 2024Manulife - Insurer Transformation Award 2024
Manulife - Insurer Transformation Award 2024
 
Strategies for Landing an Oracle DBA Job as a Fresher
Strategies for Landing an Oracle DBA Job as a FresherStrategies for Landing an Oracle DBA Job as a Fresher
Strategies for Landing an Oracle DBA Job as a Fresher
 
Ransomware_Q4_2023. The report. [EN].pdf
Ransomware_Q4_2023. The report. [EN].pdfRansomware_Q4_2023. The report. [EN].pdf
Ransomware_Q4_2023. The report. [EN].pdf
 
Architecting Cloud Native Applications
Architecting Cloud Native ApplicationsArchitecting Cloud Native Applications
Architecting Cloud Native Applications
 
Boost Fertility New Invention Ups Success Rates.pdf
Boost Fertility New Invention Ups Success Rates.pdfBoost Fertility New Invention Ups Success Rates.pdf
Boost Fertility New Invention Ups Success Rates.pdf
 
Apidays New York 2024 - Accelerating FinTech Innovation by Vasa Krishnan, Fin...
Apidays New York 2024 - Accelerating FinTech Innovation by Vasa Krishnan, Fin...Apidays New York 2024 - Accelerating FinTech Innovation by Vasa Krishnan, Fin...
Apidays New York 2024 - Accelerating FinTech Innovation by Vasa Krishnan, Fin...
 
Apidays New York 2024 - The Good, the Bad and the Governed by David O'Neill, ...
Apidays New York 2024 - The Good, the Bad and the Governed by David O'Neill, ...Apidays New York 2024 - The Good, the Bad and the Governed by David O'Neill, ...
Apidays New York 2024 - The Good, the Bad and the Governed by David O'Neill, ...
 

SOA Architecture & SOAP Protocol Architecture Detail & Attack Vector

  • 1. Penetration testing using open source tools
  • 2. Agenda  What is SOA and SOAP communication?  What are web services?  Attacker’s approach Google Hacking Universal Description Discovery and Integration (UDDI)  Exploiting XML parsers  Error Handling  Attack simulation Technique & Tools  Simulating the attack  Conclusion
  • 3. What is SOA? SOA is similar to building blocks. Conventionally, the components of an IT industry were tightly rigid, so implementing change was difficult. With SOA it is easy to assemble, easily reconfigurable.
  • 5. What is the meaning of web service? Web service is a server- oriented system which operates on server side, and performs tasks, when it is called upon by an application. Web service is registered in a web service registry, which an application uses to call specific service it requires. A web service is not language and platform dependent, it uses XML to communicate with other services or application.
  • 6. Web service in Action The communication starts with the user submitting the data. 1. The application contacts the UDDI to look up the service required to perform this functionality. UDDI ProviderClient The UDDI provider creates a binding which associates the message to the service requested, and its location. The UDDI provider then returns a WSDL file to the client, which the application completes as a SOAP message.
  • 7. Web service in Action The Soap message then gets sent to the application server which hosts the web service needed to execute the current operation. This is done by binding the details in the WSDL file from the UDDI.
  • 8. Web service in Action Using the SOAP instructions, the web services can correctly execute the task according to the parameters it was given, and deliver the processed conversation. Note: Appending ?wsdl or .wsdl reveals the wsdl file. http://172.16.125.233/HacmeBank_v2_WS/Install/Install.asmx?WSDL
  • 9. Attacker’s approach  Google hacking Filetype: wsdl Indexof “wsdl” Inurl: wsdl Inurl: asmx (note that asmx is the WSDL equivalent in ASP.net)  UDDI (Universal Description and Integration): This provides a centralized repository of web services and their wsdl files. Service providers often post their details using public UDDI’s to discover at run time.
  • 10. Web Application v/s Web services WEB APPLICATION WEB SERVICES 1. XSS 2. SQL Injection 3. Malicious File execution 4. Broken Authentication and Session Management 5. Insecure Direct Object References 6. Cross-Site Request Forgery (CSRF) 7. Insecure Cryptographic Storage 8. Failure to Restrict URL Access And many more….. 1. Almost all the attacks that are applicable to web application. 2. Xpath/XML Injection 3. LDAP Injection 4. Exploiting XML parsers 5. Brute forcing
  • 11. Exploiting XML parser Document Object Model SAX Buffer overflow XML Injection
  • 12. Error handling  Uncaught exceptions within application logic are caught at the SOAP engine and displayed as a SOAP fault element. Defense ○ Ensure all exceptions caught are generic error messages returned with SOAP responses. ○ Suppress exception details from being included in the fault element.
  • 13. Attack simulation Technique and Tools  Foot printing Discovering the existence of some services relevant to the target. Discovering the entry points to those respective services. ○ Techniques based on the UBR (Universal Business Register) and UDDI will work ○ WSDL scanning and schema poisoning ○ Discovery of .wsdl, .jws, .aspx  Tool: wspawn – It does footprint via the UBR(UDDI) inquire API’s. It also does discovery based protocol. Enumeration ○ Service Information ○ Port type information ○ Operation information
  • 15. Other tools  Commercial Tools: WebInspect WSID4ID (Web services interface Definition for intrusion Defense)
  • 16. Conclusion  We can now attack web services 

Hinweis der Redaktion

  1. DOM based parsers load the entire XML stream into the memory creating a hierarchical object that is referenced within the app logic. Obvious attack vector is inputting large XML files to consume server-side resources during parsing, resulting in DOS attack. SAX based parsers are not susceptible to the Denial of Service attacks. Because SAX based parsers are event driven, they parse the XML stream as needed, thus holding a maximum of 2 elements in memory at given time. They are susceptible to XML injection