Hack Yourself! RED
TEAMING
Red Teaming security Multi-blended aproach
used to hack in organisation
MAKE IT STRESS FREE
Defend Yourself! BLUE
TEAMING
Find Gaps In Your Defenses — Before Attackers
Find Them
MAKE IT STRESS FREE
Healthy Cybersec Culture!
PURPLE
TEAMING
Augment your security posture- Combining Red
and Blue teaming strategies
COMMING SOON

OK To Defer Low Severity Vulnerabilities?

Discovery of the chained vulnerability requires manual testing, static/dynamic vulnerability testing is not sufficient.

We offer manual testing very economically with our certified ethical hackers, let us know if you’d like to receive an actual sample report, or for a free 24-hour test of your app.

Request a 24-hour Free Pen Test or actual sample report at security@apptroos.com  so you can see the high quality of our work & reports.

Top US Travel Site Secured From IDOR Vulnerability Before Exploitation

Recently apptroops found one weak spot in the Top US Travel website where the attacker could see the personal information of all the users. Have you ever noticed a parameter in a URL and tried tweaking it to retrieve a different valid page/request? If you are successful, you exploit an insecure direct object reference.

Description

Insecure Direct Object References have occupied the fourth spot of the OWASP Top 10 list of the most critical web application security risks since 2007.

Insecure Direct Object References occur when an application provides direct access to objects based on the user-supplied input. As a result of this vulnerability, attackers can bypass authorization and access resources in the system directly, for example, database records or files.

Insecure Direct Object References allow attackers to bypass authorization and access resources directly by modifying the value of a parameter used to directly point to an object. Such resources can be database entries belonging to other users, files in the system, and more. This is caused by the fact that the application takes user-supplied input and uses it to retrieve an object without performing sufficient authorization checks.

What was the Risk?

The website was using some token to authenticate users but token was not validating properly which opened the window for the attacker to perform insecure direct object reference attack. Changing the values of users (user_id) in increasing or decreasing the number, the attacker could see the personal information of all the users on the website. Such flaws can compromise all the data that can be referenced by the parameter.

Mitigation or Fix

Preventing insecure direct object references requires selecting an approach for protecting each user-accessible object:

Use per user or session indirect object references. This prevents attackers from directly targeting unauthorized resources.

Check access. Each use of a direct object reference from an un-trusted source must include an access control check to ensure the user is authorized for the requested object.

Code review of the application can quickly verify whether either approach is implemented safely. Testing is also effective for identifying direct object references and whether they are safe. Automated tools typically do not look for such flaws because they cannot recognize what requires protection or what is safe or unsafe.

Brief Introduction On Devsecops

DevOps vs DevSecOps
DevOps is an edge approach that overcomes any barrier been development and operations. It involves better-coordinated effort between all the supporters that deal with programming. In simple terms, it ensures everybody dealing with the venture is on the same wavelength. So, all departments or groups associated with software development are associated effectively. It assists speed with increasing the procedure and dispenses with superfluous expenses.
Because of the quick increment in the development of mobile applications and their deployment on the cloud, the protection of information inside these applications is fundamental for long haul achievement. Security and its right reconciliation, at later stages, however through the whole development stage have become significant.

Inside the cooperative system of DevOps, security turns into a mutual obligation that is coordinated from start to finish. In this manner, the term DevSecOps came to fruition to underscore the requirement for an establishment of security for any application.
DevSecOps overcomes that issue by going above and beyond and integrating security efforts into the development practice. It coordinates security into the CI/CD pipeline. This empowers early and constant hazards to the board.

Advantages of DevSecOps
Cost decrease is accomplished by detecting and fixing security issues during the development stages which likewise speeds up conveyance.
The speed of recovery is upgraded on account of a security occurrence by using templates and pet/cattle procedure.
Threat chasing can stay away from poor publicity, and consequently can conceivably build sales – it is clearly simpler to sell a secure product.
Improved by and large security by decreasing vulnerabilities, diminishing insecure defaults and expanding code coverage and automation using the stable framework
Keeping in sync with the wild-eyed development natural for cybercrime by successfully overseeing security examining, monitoring, and notice frameworks.
‘Secure by structure’ standard is guaranteed by utilizing mechanized security review of code, automated application security testing, instructing, and engaging developers to utilize secure design designs.
Everyone is answerable for security. DevSecOps encourages a culture of receptiveness and transparency and does as such from the most punctual phases of development.
The capacity to quantify various things that can be seen by everybody – DevSecOps empowers a culture of steady iterative developments.

Best Practices of DevSecOps
Plan
Everything begins with planning. It’s fundamental that the arrangement is key and succinct for effective usage. Unimportant segment based depictions won’t get the job done. The experts should likewise build up acknowledgment test rules, client plans, and danger models.
Develop
Development is the following stage, and groups should begin by assessing the development of their current practices. It’s a smart thought to assemble assets from numerous sources to give direction. Setting up a code survey framework at this stage may likewise prove to be useful on the grounds that it energizes consistency, which is a feature of DevSecOps.
Build
At that point comes building, where computerized building tools work. In such devices, through a form of content, the source code is consolidated into machine code. Assemble computerization apparatuses acquire an assortment of incredible highlights. Other than bragging sizable library modules, they additionally have numerous accessible UIs. Some can likewise consequently identify any powerless libraries and supplant them with new ones.
Test
The following stage is testing, wherein the robust computerized testing structure teaches solid testing practices to the pipeline.
Secure
Since advancement, activities, and security go connected at the hip, just a couple of issues are left unattended at the finish of the improvement procedure. At the point when vulnerabilities are recognized, there is a superior possibility of deciding whether they are expected misuses of false positives.
Deploy
The arrangement is typically helped out through IaC(Infrastructure as code) instruments, as they computerize the procedure and quicken the pace of programming conveyance.
Operate
Operation is another critical advance, and occasional upkeep is a normal capacity of task groups. Zero-day misuses are loathsome. So activity groups should watch out for them. To keep human blunder from sneaking in, DevSecOps can use IaC apparatuses to make sure about the association’s foundation rapidly and effectively.
Monitor
Another significant piece of the procedure incorporates utilizing amazing, constant observing instruments. They guarantee your security frameworks are proceeding as expected.
Scale
Scaling likewise assumes a significant job. The appearance of virtualization implies associations no longer need to squander their assets to keep up huge server farms. Rather, in case of any dangers, they can just scale the IT framework to oversee them.
Adapt
At the point when it is tied in with supporting a light-footed practice, persistent improvement is vital. This is likewise valid for DevSecOps practices, as you improve and adjust all through the product advancement lifecycle.

General Data Protection Regulation (GDPR)

What does the GDPR do?
The General Data Protection Regulation (GDPR) is the hardest security and security law on the planet. In spite of the fact that it was drafted and passed by the European Union (EU), it forces commitments onto organizations anywhere, insofar as they target or gather data identified with individuals in the EU.

What is secured by GDPR?
The GDPR requires individual data to be handled in a way that guarantees its security. This includes protection against General Data Protection Regulation (GDPR) or illegal preparing and against unintentional misfortune, pulverization or harm. It necessitates that fitting specialized or legal measures are utilized.

What isn’t secured by GDPR?
GDPR doesn’t cover the handling of individual data which concerns lawful people, (for example, restricted organizations), including the name and the type of the lawful individual and the contact subtleties of the legitimate individual. In this manner, there is no necessity in the Regulation to redact the data about authorized people.

GDPR Compliance Checklist
Guaranteeing compliance by business partners is a troublesome assignment paying little heed to the regulation being referred to. Organizations ought to have a compliance agenda and perform due ingenuity activities on a standard premise to guarantee that outsiders are effectively connected with GDPR necessities. As the core values and compliance announcing systems advance, organizations ought to intently follow these turns of events and persistently refine strategic approaches and arrangements to stay current and productive. Organizations may attempt the accompanying to guarantee compliance by processors:

Publicly show your organization’s name and contact data, just as your DPO’s name and contact data, if your organization has relegated one.

Impart European data subjects’ privileges plainly.

Enable data subjects to practice their data security rights by setting up a technique they can use to effortlessly submit demands.

Confirm the identity of data subjects before following up on the solicitations you get.

Authorize inward procedures to react to the data subject’s solicitations in time (30 days).

Update and convey your treat/data assortment strategies to remember data for what individual data you gather, why, for how long, what is the lawful base for gathering it, where you store the data, and who you share it with.

Classify and guide data, lawful bases, preparing purposes, and data processors.

Confirm cookies agreement by asking clients’ consent before stacking any contents on your site.

Guarantee the security of individual data through security and protection rehearses.

Report that you gathered assent before playing out any preparing movement that is represented by clients’ consent.

Show that you have regarded users’ privileges and tended to their requirements.

Is automated vulnerability testing enough?

Why not have white hat hackers verify systems have been correctly patched and test for flaws manually?  Well, in a word, it can be expensive.  One new company, apptroops, is doing it very economically.  They automate where it makes sense, with bots that crawl for the latest vulnerabilities, exploits, and malware, but manually apply those hacks because that’s how a black hat hacker will do it.

Using manual hacking techniques they can test multiple vulnerabilities and malware together to see if by combining those hacks they can escalate the severity level of a vulnerability.

By using certified hackers from Asia testing is performed much more economically. apptroops has found previously unknown vulnerabilities in Google, Facebook, Microsoft, eBay, and Sony with their methods, and for a limited time, we will test your infrastructure for FREE, pay only if we find critical or high severity vulnerabilities.

Contact Us

    Write us a message

  • Request our free 24-Hour penetration test
    and get vulnerability report.

    • Evaluate skills before any type of engagement with Apptroops.
    • Level-1 Testing with manual approach in addition to static/dynamic.
    • Get a clear picture of root findings with mitigations in the report.
    • 90% of the time we find unknown hidden critical/ high vulnerabilities.
  • 1