Get in Touch

Course Outline

Day 1

IT security and secure coding

  • The nature of security
  • Key IT security terminology
  • Risk definition
  • Various aspects of IT security
  • Requirements across different application domains
  • IT security versus secure coding
  • From vulnerabilities to botnets and cybercrime
    • The nature of security flaws
    • Why detecting flaws is challenging
    • The progression from infected machines to targeted attacks
  • Classification of security flaws
    • Landwehr’s taxonomy
    • The Seven Pernicious Kingdoms
    • OWASP Top Ten 2013
    • Comparison of OWASP Top Ten: 2003 vs. 2013

Introduction to the Microsoft® Security Development Lifecycle (SDL)

  • Agenda
  • Applications under attack...
    • The evolution of cybercrime
    • Attacks increasingly focus on applications
    • The majority of vulnerabilities reside in smaller ISV applications
  • Origins of the Microsoft SDL...
    • Security timeline at Microsoft...
    • Which applications are mandated to follow SDL?
  • Microsoft Security Development Lifecycle (SDL)
    • Microsoft Security Development Lifecycle (SDL)
    • Pre-SDL Requirements: Security Training
    • Phase One: Requirements
    • Phase Two: Design
    • Phase Three: Implementation
    • Phase Four: Verification
    • Phase Five: Release – Response Plan
    • Phase Five: Release – Final Security Review
    • Phase Five: Release – Archive
    • Post-SDL Requirement: Response
    • SDL Process Guidance for LOB Apps
    • SDL Guidance for Agile Methodologies
    • Secure software development necessitates process improvement

Secure design principles

  • Attack surface
    • Reducing the attack surface
    • Attack surface – illustrative example
    • Analyzing the attack surface
    • Examples of attack surface reduction
  • Privacy
    • Privacy considerations
    • Understanding application behaviors and concerns
  • Defense in depth
    • Core SDL Principle: Defense in Depth
    • Defense in depth – illustrative example
  • Least privilege principle
    • Least privilege – illustrative example
  • Secure defaults
    • Secure defaults – illustrative examples

Secure implementation principles

  • Agenda
  • Microsoft Security Development Lifecycle (SDL)
  • Fundamentals of buffer overflows
    • Intel 80x86 Processors – main registers
    • Memory address layout
    • Function calling mechanisms in C/C++ on x86
    • Local variables and stack frames
    • Stack overflow
      • Buffer overflow on the stack
      • Introduction to exercises
      • Exercise BOFIntro
      • Exercise BOFIntro – determining the stack layout
      • Exercise BOFIntro – crafting a simple exploit
  • Input validation
    • Concepts of input validation
    • Integer-related issues
      • Representation of negative integers
      • Integer overflow
      • Arithmetic overflow – predicting the output
      • Exercise IntOverflow
      • What is the result of Math.Abs(int.MinValue)?
    • Mitigating integer problems
      • Strategies for integer problem mitigation
      • Avoiding arithmetic overflow – addition
      • Avoiding arithmetic overflow – multiplication
      • Detecting overflow using the 'checked' keyword in C#
      • Exercise – Utilizing the 'checked' keyword in C#
      • Exceptions triggered by overflows in C#
    • Case study – Integer overflow in .NET
      • A real-world integer overflow vulnerability
      • Exploiting the integer overflow vulnerability
    • Path traversal vulnerability
      • Mitigating path traversal

Day 2

Secure implementation principles

  • Injection attacks
    • Common SQL Injection attack methods
    • Blind and time-based SQL injection
    • Methods for protecting against SQL Injection
    • Command injection
  • Broken authentication – password management
    • Exercise – Weakness of hashed passwords
    • Password management and storage strategies
    • Special-purpose hash algorithms for password storage
  • Cross-Site Scripting (XSS)
    • Cross-Site Scripting (XSS) overview
    • CSS injection
    • Exploitation: injection via other HTML tags
    • Preventing XSS
  • Missing function level access control
    • Filtering file uploads
  • Practical cryptography
    • Ensuring confidentiality with symmetric cryptography
    • Symmetric encryption algorithms
    • Block ciphers – modes of operation
    • Hashes or message digests
    • Hash algorithms
    • Message Authentication Code (MAC)
    • Ensuring integrity and authenticity with a symmetric key
    • Ensuring confidentiality with public-key encryption
    • Rule of thumb – possession of the private key
    • Common mistakes in password management
    • Exercise – Hard-coded passwords
    • Conclusion

Secure verification principles

  • Functional testing versus security testing
  • Identifying security vulnerabilities
  • Prioritization of risks
  • Security testing within the SDLC
  • Steps of test planning (risk analysis)
  • Scoping and information gathering
    • Stakeholders
    • Assets
    • The attack surface
    • Security objectives for testing
  • Threat modeling
    • Threat modeling concepts
    • Attacker profiles
    • Threat modeling using attack trees
    • Threat modeling based on misuse/abuse cases
    • Misuse/abuse cases – a simple Web shop example
    • STRIDE per element approach to threat modeling – MS SDL
    • Identifying security objectives
    • Diagramming – examples of DFD elements
    • Data flow diagram – example
    • Threat enumeration – MS SDL’s STRIDE and DFD elements
    • Risk analysis – classification of threats
    • The DREAD threat/risk ranking model
  • Security testing techniques and tools
    • General testing approaches
    • Techniques for various stages of the SDLC
  • Code review
    • Code review for software security
    • Taint analysis
    • Heuristics
  • Static code analysis
    • Static code analysis overview
    • Exercise – Using static code analysis tools
  • Testing the implementation
    • Manual run-time verification
    • Manual versus automated security testing
    • Penetration testing
    • Stress tests
  • Fuzzing
    • Automated security testing – fuzzing
    • Challenges of fuzzing
  • Web vulnerability scanners
    • Exercise – Using a vulnerability scanner
  • Checking and hardening the environment
    • Common Vulnerability Scoring System – CVSS
    • Vulnerability scanners
    • Public databases
  • Case study – Forms Authentication Bypass
    • NULL byte termination vulnerability
    • The Forms Authentication Bypass vulnerability in the code
    • Exploiting the Forms Authentication Bypass

Knowledge sources

  • Secure coding sources – a starter kit
  • Vulnerability databases
  • .NET secure coding guidelines at MSDN
  • .NET secure coding cheat sheets
  • Recommended books – .NET and ASP.NET
 14 Hours

Number of participants


Price per participant

Testimonials (3)

Upcoming Courses

Related Categories