Course : Web Application Security

Web Application Security

Download in PDF format Share this course by email 2


Intrusion into enterprise servers represents a major risk. It is essential to understand and apply technologies and products used to provide a high enough level of security for the applications deployed, and more particularly for at-risk applications like extranet services and email. This decidedly pragmatic course will provide you with the keys to protecting an online service using concrete examples of attacks and appropriate responses.


Inter
In-house
Custom

Practical course in person or remote class

Ref. SER
Price : 2390 € E.T.
  3d - 21h00




Intrusion into enterprise servers represents a major risk. It is essential to understand and apply technologies and products used to provide a high enough level of security for the applications deployed, and more particularly for at-risk applications like extranet services and email. This decidedly pragmatic course will provide you with the keys to protecting an online service using concrete examples of attacks and appropriate responses.

Teaching objectives
At the end of the training, the participant will be able to:
  • Identify the most common vulnerabilities in web applications
  • Understand how an attack proceeds
  • Implement simple security measures for web applications
  • Configure a web server to encrypt web traffic with HTTPS
  • Test the security of your web applications

Intended audience
Network admins, sysadmins, webmasters.

Prerequisites
Basic knowledge of systems, networks, and the Internet.

Course schedule

Introduction

  • Statistics and changes in web-related vulnerabilities according to IBM X-Force and OWASP.
  • Changes in protocol and application attacks.
  • The world of hackers: Who are they? What are their motives, their means?

Components of a Web application.

  • Elements of an N-tier application.
  • The HTTP front-end server, its role, and its weaknesses.
  • The intrinsic risks of these components.
  • Major players on the market.

The HTTP protocol in detail.

  • Refreshers on TCP, HTTP, persistence, and pipelining.
  • The PDUs GET, POST, PUT, DELETE, HEAD, and TRACE.
  • Header fields, status codes 1xx to 5xx.
  • Redirection, virtual host, proxy cache, and tunneling.
  • Cookies, attributes, corresponding options.
  • Authentications (Basic, Improved Digest, etc.).
  • HTTP acceleration, proxy, web balancing.
  • HTTP Request Smuggling and HTTP Response Splitting protocol attacks.
Hands-on work
Installation and use of the Wireshark network analyzer. Using a special HTTP analysis proxy.

Vulnerabilities of Web applications

  • Why are Web applications more vulnerable?
  • Major risks of Web applications according to OWASP (Top Ten 2017).
  • “Cross Site Scripting” or XSS attacks Why are they growing? How can they be avoided?
  • Injection attacks (injection commands, SQL Injection, LDAP injection, etc.).
  • Session attacks (cookie poisoning, session hijacking, etc.).
  • Exploiting vulnerabilities on the HTTP front-end (Nimda worm, Unicode exploit, etc.).
  • Attacks on standard configurations (Default Password, Directory Traversal, etc.).
Hands-on work
Cross Site Scripting attack. Exploiting a vulnerability in the http front-end. Bypassing authentication with an SQL query injection.

The network firewall in protecting HTTP applications

  • The network firewall, its role, and its functions.
  • How many DMZs for an N-Tier architecture?
  • Why isn't the network firewall suitable for protecting a Web application?

Making flows secure with SSL/TLS

  • Reminders of cryptographic techniques used in SSL and TLS.
  • Managing your server certificates, the X509 standard.
  • What is the new X509 EV certificate good for?
  • What certification authority should you choose?
  • SSL flow capture and analysis techniques.
  • The main vulnerabilities of X509 certificates.
  • Using a reverse proxy for SSL acceleration.
  • The benefit of HSM crypto-hardware cards.
Hands-on work
Implementing SSL in IIS and Apache. Attacks on HTTPS flows with sslstrip and sslsnif.

System and software configuration

  • Default configuration, the major risk.
  • Rules to follow when installing an operating system.
  • Linux or Windows. Apache or IIS?
  • How do you configure Apache and IIS for optimal security?
  • Middleware and the database. VDSs (Vulnerability Detection Systems).
Hands-on work
Web front-end security procedure (Apache or IIS).

Principle of secure development

  • Development security: What's the right budget?
  • Security in the development cycle.
  • The role of client-side code: Security or ergonomics?
  • Checking data sent by the client.
  • Fighting buffer overflow attacks.
  • Development rules to follow.
  • How to fight residual risks: Headers, poorly formed URL, cookie poisoning, etc. ?

User authentication

  • Authentication via HTTP: Basic Authentication and Digest Authentication or application-based authentication (HTML form).
  • Strong authentication: X509 client certificate, Token SecurID, Mobilegov Digital DNA, etc.
  • Other software authentication techniques: CAPTCHA, Keypass, etc.
  • Password attacks: Sniffing, brute force, phishing, keyloggers, etc.
  • Attack on session numbers (session hijacking) or on cookies (cookie poisoning).
  • Attack on HTTPS authentications (fake server, sslsniff, X509 certificate exploit, etc.).
Hands-on work
“Man in the Middle” attack on user authentication and session hijacking.

The “application” firewall

  • Reverse-proxy and application firewall, details of the features.
  • What does the application firewall add to website security?
  • Inserting an application firewall into a system in production. Players on the market.
Hands-on work
Implementing an application firewall. Security policy management. Attacks and results.


Practical details
Hands-on work
Secure, protected online sites (multi-DMZ firewall) will be deployed, SSL acceleration, a HTTP protocol analysis proxy, an HTTP(S) flow injector, strong certificate-based authentication, attack tools on HTTPS flows.

Customer reviews
4,4 / 5
Customer reviews are based on end-of-course evaluations. The score is calculated from all evaluations within the past year. Only reviews with a textual comment are displayed.


Dates and locations
Select your location or opt for the remote class then choose your date.
Remote class