Thank you for sending your enquiry! One of our team members will contact you shortly.
Thank you for sending your booking! One of our team members will contact you shortly.
Course Outline
Day 1
IT security and secure coding
- The nature of security
- Key IT security terminology
- Risk definition
- Various aspects of IT security
- Requirements across different application domains
- IT security versus secure coding
-
From vulnerabilities to botnets and cybercrime
- The nature of security flaws
- Why detecting flaws is challenging
- The progression from infected machines to targeted attacks
-
Classification of security flaws
- Landwehr’s taxonomy
- The Seven Pernicious Kingdoms
- OWASP Top Ten 2013
- Comparison of OWASP Top Ten: 2003 vs. 2013
Introduction to the Microsoft® Security Development Lifecycle (SDL)
- Agenda
-
Applications under attack...
- The evolution of cybercrime
- Attacks increasingly focus on applications
- The majority of vulnerabilities reside in smaller ISV applications
-
Origins of the Microsoft SDL...
- Security timeline at Microsoft...
- Which applications are mandated to follow SDL?
-
Microsoft Security Development Lifecycle (SDL)
- Microsoft Security Development Lifecycle (SDL)
- Pre-SDL Requirements: Security Training
- Phase One: Requirements
- Phase Two: Design
- Phase Three: Implementation
- Phase Four: Verification
- Phase Five: Release – Response Plan
- Phase Five: Release – Final Security Review
- Phase Five: Release – Archive
- Post-SDL Requirement: Response
- SDL Process Guidance for LOB Apps
- SDL Guidance for Agile Methodologies
- Secure software development necessitates process improvement
Secure design principles
-
Attack surface
- Reducing the attack surface
- Attack surface – illustrative example
- Analyzing the attack surface
- Examples of attack surface reduction
-
Privacy
- Privacy considerations
- Understanding application behaviors and concerns
-
Defense in depth
- Core SDL Principle: Defense in Depth
- Defense in depth – illustrative example
-
Least privilege principle
- Least privilege – illustrative example
-
Secure defaults
- Secure defaults – illustrative examples
Secure implementation principles
- Agenda
- Microsoft Security Development Lifecycle (SDL)
-
Fundamentals of buffer overflows
- Intel 80x86 Processors – main registers
- Memory address layout
- Function calling mechanisms in C/C++ on x86
- Local variables and stack frames
-
Stack overflow
- Buffer overflow on the stack
- Introduction to exercises
- Exercise BOFIntro
- Exercise BOFIntro – determining the stack layout
- Exercise BOFIntro – crafting a simple exploit
-
Input validation
- Concepts of input validation
-
Integer-related issues
- Representation of negative integers
- Integer overflow
- Arithmetic overflow – predicting the output
- Exercise IntOverflow
- What is the result of Math.Abs(int.MinValue)?
-
Mitigating integer problems
- Strategies for integer problem mitigation
- Avoiding arithmetic overflow – addition
- Avoiding arithmetic overflow – multiplication
- Detecting overflow using the 'checked' keyword in C#
- Exercise – Utilizing the 'checked' keyword in C#
- Exceptions triggered by overflows in C#
-
Case study – Integer overflow in .NET
- A real-world integer overflow vulnerability
- Exploiting the integer overflow vulnerability
-
Path traversal vulnerability
- Mitigating path traversal
Day 2
Secure implementation principles
-
Injection attacks
- Common SQL Injection attack methods
- Blind and time-based SQL injection
- Methods for protecting against SQL Injection
- Command injection
-
Broken authentication – password management
- Exercise – Weakness of hashed passwords
- Password management and storage strategies
- Special-purpose hash algorithms for password storage
-
Cross-Site Scripting (XSS)
- Cross-Site Scripting (XSS) overview
- CSS injection
- Exploitation: injection via other HTML tags
- Preventing XSS
-
Missing function level access control
- Filtering file uploads
-
Practical cryptography
- Ensuring confidentiality with symmetric cryptography
- Symmetric encryption algorithms
- Block ciphers – modes of operation
- Hashes or message digests
- Hash algorithms
- Message Authentication Code (MAC)
- Ensuring integrity and authenticity with a symmetric key
- Ensuring confidentiality with public-key encryption
- Rule of thumb – possession of the private key
- Common mistakes in password management
- Exercise – Hard-coded passwords
- Conclusion
Secure verification principles
- Functional testing versus security testing
- Identifying security vulnerabilities
- Prioritization of risks
- Security testing within the SDLC
- Steps of test planning (risk analysis)
-
Scoping and information gathering
- Stakeholders
- Assets
- The attack surface
- Security objectives for testing
-
Threat modeling
- Threat modeling concepts
- Attacker profiles
- Threat modeling using attack trees
- Threat modeling based on misuse/abuse cases
- Misuse/abuse cases – a simple Web shop example
- STRIDE per element approach to threat modeling – MS SDL
- Identifying security objectives
- Diagramming – examples of DFD elements
- Data flow diagram – example
- Threat enumeration – MS SDL’s STRIDE and DFD elements
- Risk analysis – classification of threats
- The DREAD threat/risk ranking model
-
Security testing techniques and tools
- General testing approaches
- Techniques for various stages of the SDLC
-
Code review
- Code review for software security
- Taint analysis
- Heuristics
-
Static code analysis
- Static code analysis overview
- Exercise – Using static code analysis tools
-
Testing the implementation
- Manual run-time verification
- Manual versus automated security testing
- Penetration testing
- Stress tests
-
Fuzzing
- Automated security testing – fuzzing
- Challenges of fuzzing
-
Web vulnerability scanners
- Exercise – Using a vulnerability scanner
-
Checking and hardening the environment
- Common Vulnerability Scoring System – CVSS
- Vulnerability scanners
- Public databases
-
Case study – Forms Authentication Bypass
- NULL byte termination vulnerability
- The Forms Authentication Bypass vulnerability in the code
- Exploiting the Forms Authentication Bypass
Knowledge sources
- Secure coding sources – a starter kit
- Vulnerability databases
- .NET secure coding guidelines at MSDN
- .NET secure coding cheat sheets
- Recommended books – .NET and ASP.NET
14 Hours
Testimonials (3)
Experience sharing, it's teacher's know-how and valuable.
Carey Fan - Logitech
Course - C/C++ Secure Coding
the knowledge of the trainer was very high - he knew what he was talking about, and knew the answers to our questions
Adam - Fireup.PRO
Course - Advanced Java Security
The labs practice