OWASP 10 Most Common Backdoors
OWASP 10 Most Common Backdoors
OWASP 10 Most Common Backdoors
Backdoors
Yaniv Simsolo, COMSEC Consulting
“ The news about the above agreement was posted on Cisco site in
mid 1998. Shortly this news was removed from Cisco website.
Gradually all this information which was readily available about
1 backdoors and doorbells was removed from the internet.”
OWASP Top Ten Backdoors
Prologue
Definition
Top Ten Most Common Backdoors
Impacts
Summary
2
OWASP Top Ten Backdoors
3
Prologue
4
Definition
Definitions of backdoor:
A hidden entrance to a computer system that can
be used to bypass security policies (MS definition).
An undocumented way to get access to a computer
system or the data it contains.
A way of getting into a guarded system without
using the required password.
5
Definition
7
OWASP Top Ten Backdoors
Conventional backdoors
8
OWASP Top Ten Backdoors, Number 1
9
OWASP Top Ten Backdoors, Number 1
10
OWASP Top Ten Backdoors, Number 1
11
OWASP Top Ten Backdoors, Number 2
Redundant interfaces/functions/features
debug=TRUE
Backdoors by design
Uploaded to production environment
• By mistake
• On purpose
• Due to faulted procedures
Enable various actions and control over systems
Exploitable at large by hackers
OWASP A10 – Insecure Configuration Management
OWASP A1 – Unvalidated Input
12
OWASP Top Ten Backdoors, Number 3
Hidden parameters
*=-999
Backdoors by design
Uploaded to production environment on purpose
3rd party systems expose the enterprise:
• Without protection
• Without knowledge of backdoor existence
Enable various actions and control over systems
Exploitable at large by hackers
OWASP A1 – Unvalidated Input?
13
OWASP Top Ten Backdoors, Number 4
Redundant users
guest, testuser, scott (tiger)
Usually default users
Uploaded to production environment due to
faulted procedures
Common knowledge
May enable hackers to take total control over the
system
Easily mitigated
OWASP A10 – Insecure Configuration Management
14
OWASP Top Ten Backdoors, Number 5
15
OWASP Top Ten Backdoors
Unconventional backdoors
16
OWASP Top Ten Backdoors, Number 6
17
OWASP Top Ten Backdoors, Number 6
18
OWASP Top Ten Backdoors, Number 6
19
OWASP Top Ten Backdoors, Number 7
20
OWASP Top Ten Backdoors, Number 7
21
OWASP Top Ten Backdoors, Number 8
Flawed hardening
xp_cmdshell
Perfect hardening is difficult to achieve
Hardening of ALL system components is mandatory
Common failure in organizations – lack of
hardening
Enables malicious entities multiple attack vectors,
up to a total control of the system
OWASP A10 – Insecure Configuration Management
22
OWASP Top Ten Backdoors, Number 8
Flawed hardening
Most (aware) organizations perform:
• OS hardening
• Application servers hardening
• DB hardening
Whatabout application hardening?
OWASP A10 – Insecure Configuration Management
23
OWASP Top Ten Backdoors, Number 8
Flawed hardening
24
OWASP Top Ten Backdoors, Number 9
25
OWASP Top Ten Backdoors, Number 10
26
OWASP Top Ten Backdoors, Number 10
27
OWASP Top Ten Backdoors, Number 10
28
OWASP Top Ten Backdoors
Impacts
29
Impacts
30
Impacts
31
Summary
32
Questions?
33