19.04.2013 Views

2KKUU7ita

2KKUU7ita

2KKUU7ita

SHOW MORE
SHOW LESS

You also want an ePaper? Increase the reach of your titles

YUMPU automatically turns print PDFs into web optimized ePapers that Google loves.

302<br />

Part V: Hacking Applications<br />

(www.sourcefire.com/security-technologies/network-<br />

security/next-generation-intrusion-prevention-system).<br />

✓ A host-based web application IPS, such as SecureIIS (www.eeye.com/<br />

products/secureiis-web-server-security) or ServerDefender<br />

(www.port80software.com/products/serverdefender).<br />

These programs can detect web application and certain database attacks<br />

in real time and cut them off before they have a chance to do any harm.<br />

Analyzing source code<br />

Software development is where security holes begin and should end but<br />

rarely do. If you feel confident in your ethical hacking efforts to this point,<br />

you can dig deeper to find security flaws in your source code — things that<br />

might never be discovered by traditional scanners and hacking techniques<br />

but that are problems nonetheless. Fear not! It’s actually much simpler than<br />

it sounds. No, you won’t have to go through the code line by line to see<br />

what’s happening. You don’t even need development experience (although it<br />

does help).<br />

To do this, you can use a static source code analysis tool, such as those offered<br />

by Veracode (www.veracode.com) and Checkmarx (www.checkmarx.com).<br />

Checkmarx’s CxSuite (more specifically CxDeveloper) is a standalone tool<br />

that’s reasonably priced and very comprehensive in its testing of both web<br />

applications and mobile apps.<br />

As shown in Figure 14-13, with CxDeveloper, you simply load the Enterprise<br />

Client, log in to the application (default credentials are admin@cx/admin),<br />

run the Create Scan Wizard to point it to the source code and select your<br />

scan policy, click Next, click Run, and you’re off and running.<br />

When the scan completes, you can review the findings and recommended<br />

solutions, as shown in Figure 14-14.

Hooray! Your file is uploaded and ready to be published.

Saved successfully!

Ooh no, something went wrong!