Sadeeq Jan,Omer Bin Tauqeer,Fazal Qudus Khan,George Tsaramirsis,Awais Ahmad,Iftikhar Ahmad,Imran Maqsood and Niamat Ullah
1National Center for Cyber Security,Department of CS&IT,University of Engineering &Technology,Peshawar,Pakistan
2Department of Information Technology,FCIT,King Abdulaziz University,Jeddah,Saudi Arabia
3Dipartimento di Informatica(DI),Università Degli Studi di Milano Statale,Via Celoria 18,Milano,Italy
4Department of Computer Science &IT,University of Engineering &Technology,Peshawar,Pakistan
5Department of Software Engineering,University of Engineering &Technology,Mardan,Pakistan
6University of Buner,Buner,Pakistan
Abstract:Over the last decade,a significant increase has been observed in the use of web-based Information systems that process sensitive information,e.g.,personal,financial,medical.With this increased use,the security of such systems became a crucial aspect to ensure safety,integrity and authenticity of the data.To achieve the objectives of data safety,security testing is performed.However,with growth and diversity of information systems,it is challenging to apply security testing for each and every system.Therefore,it is important to classify the assets based on their required level of security using an appropriate technique.In this paper,we propose an asset security classification technique to classify the System Under Test(SUT)based on various factors such as system exposure,data criticality and security requirements.We perform an extensive evaluation of our technique on a sample of 451 information systems.Further,we use security testing on a sample extracted from the resulting prioritized systems to investigate the presence of vulnerabilities.Our technique achieved promising results of successfully assigning security levels to various assets in the tested environments and also found several vulnerabilities in them.
Keywords:Security;security testing;privacy;asset classification
Complex web-based systems either contain or utilize private and critical information which must remain secure from unauthorized access and tampering.Similarly,basic web applications may also process sensitive information and,are constantly at risk of being attacked.New and complex systems used in cloud computing for data crunching and information gathering may also be vulnerable to various attacks and threats.To ensure the security of these systems and applications,security testing is required.There are various types of security testing techniques that are used to find vulnerabilities.The most common form of testing is Penetration Testing also known as “Pen Testing”.Penetration testing is carried out by simulating real attacks on systems to identify exploitable vulnerabilities and the damage they would incur[1,2].Open Web Application Security(OWASP)is a well-known online community that provides various techniques and tools for securing web-based systems[3].The most common of these is the document titled as OWASP Top 10 Web Application Vulnerabilities published every 3 to 5 years[4].The document discusses the most common vulnerabilities that potentially exists in many web applications.It also describes how the vulnerabilities can be exploited by the attackers,along with identifying the key techniques that can be employed as safeguard against such attacks.The fundamental three features of security that are checked during any security testing process are[5,6]:
Confidentiality:is the assurance that information is not disclosed to unauthorized individuals,processes,or devices.
Integrity:is provided when data is unchanged from its source and has not been accidentally or maliciously modified,altered,or destroyed.
Availability:guarantees timely,reliable access to data and information services for authorized users.
These security principles make the CIA triad which is the most commonly used and oldest security standard around the globe.Over the years with the increase in the complexity and wide variety of systems and applications,more security features have been added such as:
Authentication:is a security measure designed to establish the validity of a transmission,message,or originator,or a means of verifying an individual’s authorization to receive specific categories of information.
Authorization:provides access privileges granted to a user,program,or process.
Non-repudiation:is the assurance that none of the partners taking part in a transaction can later deny of its participation.
The focus of providing security should be applied on the web application layer to protect it from unauthorized users by building security across the software development lifecycle security mechanism[7].The effectiveness of the testing process significantly depends on the tools used to support the process.Testing tools usually automate some of the tasks required by the process,such as test case generation,test case execution and evaluation of the test case result.Several testing tools support the production of useful testing documentation and provide a configuration and management of these tools[8].The existing approaches for mitigating threats to Web applications can be divided into client-side and server-side solutions.If we look at the server-side security,we can consider an application-level firewall offering protection in case of suspected cross-site scripting(XSS)attacks that attempt to steal a user’s credentials[9].Server-side solutions have the advantage of being able to discover a larger range of vulnerabilities,and the benefit of a security aw fixed by the service provider is instantly propagated to all its clients.These server-side techniques can be further classified into dynamic and static approaches[10].Dynamic tools and Perl’s taint mode try to detect attacks while executing the audited program,whereas static analyzers scan the Web application’s source code for vulnerabilities[11].Assessment or test of security risks both from outside and within the organization can include someone’s access to classified information and transferring it to a USB[12].
Security testing is often performed for a single System Under Test(SUT),however,there are usually more systems or components that needs to be tested in a complex web-based infrastructure.In such cases,it becomes a difficult decision for the tester/organization that which system/component should be tested first among the vast majority of systems[13–18].For such scenarios,a technique is needed to classify the assets of an organization.In this paper we propose an Asset classification system to assign priority levels to each system based on their security needs,for the web-based Information systems.
Our proposed technique verifies the quality of data that the system stores,analyses,processes and transfers,as well as the criticality of the system determined via a checklist that focuses on such aspect of the system.The technique utilizes information as collected and described during the planning and design stage of the Security Testing and the Software Development Life Cycle(SDLC).This information is further used to consider the exposure to various types of users of the system.All the collected information about various aspects of a SUT is then analyzed to calculate the criticality value of the asset and an appropriate category(High,Medium,Low)is assigned to it.For evaluating the effectiveness of our proposed approach,we performed testing on 400 web based information systems of the province of Khyber Pakhtunkhwa,Pakistan.Finally,we analyzed a sample of the categorized systems for the investigation of OWASP Top 10 vulnerabilities.
The rest of the paper is organized as following.Section 2 provides a succinct summary of the related work.Section 3 provides a background on the OWASP Top 10 vulnerabilities.Sections 4 presents our proposed approach for asset security classification in detail.Section 5 describes the details of our study design including the subjects’ selection and methods of analysis.The results are discussed in Section 6.Finally,the conclusion and future work is presented in Section 7.
Attacks on web-based systems have increased significantly over the last few years.The number of attacks grew from 17 million to 50 million between years 2015 and 2016[19].Similarly,the number of new vulnerabilities found in web applications have seen an increase in 2017 by 212% as compared to 2016[1].In 2018,Google sent over 45 million notifications to various web administrators alerting them about possible problems with their websites that could affect their appearance in a search.Therefore,there is a dire need to take appropriate security measures to counter these attacks.
A web based platform is a complex system consisting several components,tools,devices,technologies e.g.,HTTP/S protocols,application development technologies like PHP,ASP and web clients(browser etc.).Further,almost all types of these systems are continuously being targeted by attackers and therefore organizations use intrusion detection/prevention systems(IDS/IPS)and firewalls to protect and monitors such networks[8].Although,a number of preventive measures are used to secure the deployed web applications,security testing has become a critical activity at the development phase.The purpose of security testing is to ensure confidentiality and authenticity of the data,as well as ensuring the availability of the services to the end user.Such security testing is used to verify if the web applications fulfills its security requirements in case of malicious user inputs[20].There are various challenges when carrying out security testing of systems and applications and the newly discovered vulnerabilities are making the task more complicated.Developers/testers need to understand the importance of all such issues/challenges when conducting security testing.
A framework for assessing the risk of vulnerabilities in e-government sites,has been discussed by Anastacio et al.[21].The authors discussed the benefits and risks of the e-government systems.As per the authors views,the value or importance of an e-government system depends on its difference from other systems and the interactions of the users with the system.Rjaibi et al.[22]provided an analysis technique for the security assessment of e-learning systems.Security requirements such as privacy,nonrepudiation,authentication etc.have been identified along with the types of possible attacks such as,buffer over ow,cross site scripting,insecure direct object referencing and information leakage etc.The authors considered the availability as the most important security requirement.Patel et al.[23]proposed a risk assessment modeling technique for modeling the possible attacks and their impact on industrial systems.The technique allowed them to determine financial loses that can occur due to the cyber-attacks on these types of systems.The authors implemented their technique to find the financial loss caused due to an attack on a SCADA based system and found an estimated $454,094 yearly loss possible based on their methodology.
Almadhoob et al.[24]performed a study to analyze cybercrimes and their effects in Bahrain.For this purpose,a survey was carried out by the authors among the different businesses and organizations working in Bahrain.Based on the survey an audit plan was created that if utilized would protect the businesses in Bahrain from cyber-attacks on their systems.The authors found that from 34 total participants,31 had been affected by phishing attacks.It was also found that most of the participants had not added important security controls to protect their systems.Of the total participants only 13 were found that had controls in place to track changes made to the data hosted on their systems.Saripalli et al.[25]propose a quantitative framework for the calculation of risk and impact on security of different cloud computing environments.The framework measures the security events and categorizes them from among six pre-defined categories.The framework utilizes the wide-band Dolphi method for calculating the measures in quantitative form.According to the authors,the framework would provide the different user types interacting with the cloud environment and regulating agencies with statically usable data.The authors point out that utilization of this framework would require input of risk knowledge and objectives in huge amount.
In addition to the asset classification,we also aim at security testing for vulnerabilities,especially for the web vulnerabilities that may exist in web-based information systems.Therefore,in this section,we provide an overview of the widely known vulnerabilities as listed by the Open Web Application Security Project[3]commonly known as OWASP.
OWASP is a platform developed by and for the IT community.This platform is used to share knowledge and tools for professionals and beginners alike in the pursuance of defending against attacks on web-based systems.OWASP provides open source tools as well as documents focusing on finding security related attacks and vulnerabilities,guard against attacks and further strengthening the security activities protecting the systems.OWASP ZAP[26]is one of the most widely used tool to discover vulnerabilities and attacks that can be used to affect a system.Similarly,OWASP Juice Shop[27],is an application which has been developed with the most common security aws that affect web applications in mind.It is used as a tool for teaching beginners and new comers to the field of security how various security vulnerabilities can be used by attackers due to the aws that remain unfixed in the system during the development phase.
Similar to using tools,OWASP also provide documentation for developers to learn about the various vulnerabilities and how to harden the systems against such vulnerabilities[28].The OWASP testing guide[29]is a useful resource for this purpose and provides detailed best practices for system hardening and security testing.Another documentation project by OWASP is OWASP Top 10 Vulnerabilities[4]that are found in most web applications and demonstrates how a slight coding habit can emerge into a security threat.Most recent OWASP Top 10 list was released in 2017 and lists SQL injection to be the most common and dangerous security.
Following are the OWASP vulnerabilities in the order of their severity.
An injection attack allows an attacker to insert malicious data into a program via input sources,e.g.,input fields.These attacks are commonly found in SQL,LDAP,XPath etc.In case of SQL attack,the attacker can read,modify,delete the database or execute other queries.In these types of attacks,the coding query handling methods affect the security of the program[30].
Often many web applications require users to login with their credentials.Typical cases require a username and password,that are used to generate a random session id that authenticates all actions as a legitimate user.Disclosure of these credentials occur due to reasons like transmission through insecure channels and security misconfiguration.Upon obtaining such credentials,attackers can impersonate a legitimate user.Therefore,authentication and session management must be managed properly to protect the users’ data from unauthorized disclosure or modification[31].
Data exposure occurs when a web application or program does not adequately protect its data and information.This data if accessed by the attackers can result in financial or business loss.An example could be,exposed data by an error message,weak crypto and lack of headers preventing browser caching.
XML is used to describe data.Two systems that are running on different technologies can communicate with each other using XML.XML External Entity attack takes place when a reference to an external entity is processed by weakly configured parser that may result in information disclosure,Denial of Service(DoS)attacks,port scanning[32].
In access control mechanism,also known as authorization,users are allotted access to resources according to their roles,e.g.,admin,employee or guests etc.Broken access control is one of the most common and highly exploitable vulnerability.Access controls are exploited by changing parameter values,giving direct access to unauthorized system object.Most common impact is privilege escalation—A practice of providing users more rights or access than required,hence weakening the system security[29].
Security misconfiguration vulnerabilities appear into systems due to the use of weak passwords,encryption,using default configured setting,incomplete or improper configuration of settings,outdated software’s or unpatched aws etc.
Cross-site Scripting attacks are a type of injection attacks.The attacker generally injects the malicious code through a browser site script.Nowadays,JavaScript is enabled in most web applications to provide rich functionalities to users.This also provides the attacker an opportunity to exploit and execute their attack.One of the main difficulties in stopping XSS vulnerabilities is proper character encoding where the web applications are unable to filter the character encodings for example there is a possibility that the web application might filter out 99热网站在线观看| 99久久99久久久精品蜜桃| 一边摸一边做爽爽视频免费| 午夜免费男女啪啪视频观看| 久久久亚洲精品成人影院| 菩萨蛮人人尽说江南好唐韦庄| 国产高清videossex| 精品一区二区三区av网在线观看 | 久久久亚洲精品成人影院| 可以免费在线观看a视频的电影网站| 免费一级毛片在线播放高清视频 | 婷婷色综合www| 男人舔女人的私密视频| 捣出白浆h1v1| 日韩伦理黄色片| 国产日韩一区二区三区精品不卡| 国产亚洲一区二区精品| 尾随美女入室| 最近最新中文字幕大全免费视频 | 老司机深夜福利视频在线观看 | 久久久久国产一级毛片高清牌| 亚洲国产欧美在线一区| 国产精品欧美亚洲77777| 久久久精品94久久精品| av在线播放精品| 精品久久久精品久久久| 欧美日韩av久久| 国产日韩欧美视频二区| 狠狠精品人妻久久久久久综合| 91成人精品电影| 搡老岳熟女国产| 久久人妻福利社区极品人妻图片 | 在线观看免费视频网站a站| 肉色欧美久久久久久久蜜桃| 国产成人欧美在线观看 | a级毛片在线看网站| 久久久久视频综合| 下体分泌物呈黄色| 国产精品久久久人人做人人爽| 国产女主播在线喷水免费视频网站| 两人在一起打扑克的视频| 免费一级毛片在线播放高清视频 | 亚洲精品第二区| 午夜免费观看性视频| 在线看a的网站| 一本—道久久a久久精品蜜桃钙片| 王馨瑶露胸无遮挡在线观看| videos熟女内射| 老司机影院毛片| 国产一区二区在线观看av| 91精品国产国语对白视频| 在线亚洲精品国产二区图片欧美| 亚洲人成77777在线视频| 午夜av观看不卡| 高潮久久久久久久久久久不卡| 日韩中文字幕欧美一区二区 | 男男h啪啪无遮挡| 午夜精品国产一区二区电影| 叶爱在线成人免费视频播放| 国产亚洲欧美精品永久| 亚洲精品成人av观看孕妇| 日韩欧美一区视频在线观看| 嫁个100分男人电影在线观看 | 午夜福利免费观看在线| 亚洲成国产人片在线观看| 午夜福利影视在线免费观看| 日韩电影二区| 超色免费av| 久久影院123| 亚洲中文字幕日韩| av有码第一页| 成人国语在线视频| 黄色视频在线播放观看不卡| 国产成人一区二区在线| 视频区图区小说| 午夜福利视频精品| 一个人免费看片子| 美女大奶头黄色视频| 国产激情久久老熟女| 9热在线视频观看99| 日韩精品免费视频一区二区三区| 久久99一区二区三区| 啦啦啦在线观看免费高清www| 亚洲一区中文字幕在线| 宅男免费午夜| 中文字幕人妻熟女乱码| 一本综合久久免费| 免费黄频网站在线观看国产| 大话2 男鬼变身卡| 欧美精品av麻豆av| 热re99久久精品国产66热6| 99国产精品免费福利视频| 后天国语完整版免费观看| 看免费av毛片| 999久久久国产精品视频| 日韩熟女老妇一区二区性免费视频| 日本一区二区免费在线视频| 日韩免费高清中文字幕av| 日韩视频在线欧美| 免费人妻精品一区二区三区视频| 中文字幕av电影在线播放| 在线亚洲精品国产二区图片欧美| 中文字幕人妻丝袜制服| 国产高清videossex| 性色av一级| 亚洲精品一二三| 国产精品成人在线| 国产av国产精品国产| 黑人巨大精品欧美一区二区蜜桃| 亚洲av日韩在线播放| 欧美中文综合在线视频| 婷婷成人精品国产| 免费观看av网站的网址| av天堂久久9| 丝袜在线中文字幕| 你懂的网址亚洲精品在线观看| 高清av免费在线| 久久久久国产精品人妻一区二区| 五月开心婷婷网| 国产成人免费观看mmmm| 欧美成人午夜精品| 午夜福利在线免费观看网站| 欧美国产精品一级二级三级| 亚洲精品国产av蜜桃| 99精国产麻豆久久婷婷| 国产人伦9x9x在线观看| 极品少妇高潮喷水抽搐| 亚洲av国产av综合av卡| 精品高清国产在线一区| 80岁老熟妇乱子伦牲交| 操出白浆在线播放| 777久久人妻少妇嫩草av网站| a级片在线免费高清观看视频| 两性夫妻黄色片| 免费在线观看黄色视频的| 丰满少妇做爰视频| 久久天堂一区二区三区四区| 99久久精品国产亚洲精品| 午夜福利影视在线免费观看| 人妻一区二区av| 亚洲一码二码三码区别大吗| 首页视频小说图片口味搜索 | 国产亚洲精品久久久久5区| 少妇人妻 视频| 不卡av一区二区三区| 午夜免费成人在线视频| 人人妻人人爽人人添夜夜欢视频| 久久人妻熟女aⅴ| 国产一区二区在线观看av| 国产一区二区 视频在线| 我的亚洲天堂| 美女国产高潮福利片在线看| 亚洲 国产 在线| 欧美黄色片欧美黄色片| 欧美精品人与动牲交sv欧美| 91麻豆av在线| 99久久99久久久精品蜜桃| 欧美亚洲日本最大视频资源| 午夜免费男女啪啪视频观看| 免费观看人在逋| 国产精品一国产av| 亚洲国产精品一区三区| 免费黄频网站在线观看国产| 亚洲精品自拍成人| 国产av国产精品国产| 国产精品麻豆人妻色哟哟久久| 色精品久久人妻99蜜桃| 亚洲av片天天在线观看| 国产伦理片在线播放av一区| 国产一区亚洲一区在线观看| 中文字幕制服av| 免费观看人在逋| 精品一区在线观看国产| 免费黄频网站在线观看国产| 一区在线观看完整版| 国产成人精品久久二区二区免费| 国产一卡二卡三卡精品| 免费不卡黄色视频| 久久久精品区二区三区| 99国产精品一区二区蜜桃av | 久久天堂一区二区三区四区| 在线av久久热| 免费在线观看影片大全网站 | 久久国产亚洲av麻豆专区| 国产日韩欧美在线精品| av福利片在线| 一二三四在线观看免费中文在| 岛国毛片在线播放| 男女高潮啪啪啪动态图| 老熟女久久久| 成人手机av| 美国免费a级毛片| 精品人妻在线不人妻| 久久精品久久久久久噜噜老黄| 女性被躁到高潮视频| 人人妻人人爽人人添夜夜欢视频| 国产亚洲欧美精品永久| 亚洲图色成人| 成人手机av| netflix在线观看网站| 久久狼人影院| 亚洲伊人久久精品综合| 啦啦啦啦在线视频资源| 天天躁夜夜躁狠狠久久av| 国产免费视频播放在线视频| 宅男免费午夜| 婷婷丁香在线五月| 成人国产一区最新在线观看 | 国产一级毛片在线| 美女大奶头黄色视频| 午夜免费鲁丝| 日韩视频在线欧美| 国产成人一区二区三区免费视频网站 | 男女国产视频网站| 亚洲少妇的诱惑av| 午夜av观看不卡| 最近手机中文字幕大全| 考比视频在线观看| 老司机午夜十八禁免费视频| 欧美亚洲日本最大视频资源| 亚洲av国产av综合av卡| 女性被躁到高潮视频| 欧美日本中文国产一区发布| 免费av中文字幕在线| 丝袜在线中文字幕| 母亲3免费完整高清在线观看| 国产成人免费无遮挡视频| 国产主播在线观看一区二区 | 最新在线观看一区二区三区 | 精品亚洲成国产av| 成人黄色视频免费在线看| 丁香六月欧美| a级片在线免费高清观看视频| 性少妇av在线| 精品国产超薄肉色丝袜足j| 久久国产精品大桥未久av| 国产片内射在线| 日韩制服丝袜自拍偷拍| 免费看十八禁软件| 亚洲精品国产av成人精品| 男女床上黄色一级片免费看| 久久久久精品国产欧美久久久 | 一区二区日韩欧美中文字幕| 精品久久蜜臀av无| 欧美+亚洲+日韩+国产| 国产精品 国内视频| 一级毛片女人18水好多 | 国产精品av久久久久免费| 免费在线观看黄色视频的| 国产99久久九九免费精品| 侵犯人妻中文字幕一二三四区| 亚洲成人免费av在线播放| 国产免费现黄频在线看| 久久久久久亚洲精品国产蜜桃av| av国产精品久久久久影院| 超碰97精品在线观看| 国产午夜精品一二区理论片| 国产精品 国内视频| 免费av中文字幕在线| 国产亚洲av高清不卡| 国产精品久久久人人做人人爽| 色精品久久人妻99蜜桃| av一本久久久久| 久久国产精品影院| 91精品三级在线观看| 69精品国产乱码久久久| 少妇猛男粗大的猛烈进出视频| 亚洲国产精品国产精品| 最近最新中文字幕大全免费视频 | 欧美在线黄色| 交换朋友夫妻互换小说| 男女国产视频网站| 国产精品久久久久久精品古装| 亚洲av日韩精品久久久久久密 | 国语对白做爰xxxⅹ性视频网站| 91字幕亚洲| 肉色欧美久久久久久久蜜桃| 一级毛片 在线播放| 老司机亚洲免费影院| 青春草视频在线免费观看| cao死你这个sao货| 黑人猛操日本美女一级片| 欧美日韩av久久| 欧美老熟妇乱子伦牲交| 国产色视频综合| 久久精品久久精品一区二区三区| 久久人人97超碰香蕉20202| 亚洲成色77777| 一本色道久久久久久精品综合| 不卡av一区二区三区| 赤兔流量卡办理| 国产精品一国产av| 精品卡一卡二卡四卡免费| 国产日韩欧美在线精品| 亚洲激情五月婷婷啪啪| 黄色a级毛片大全视频| 欧美+亚洲+日韩+国产| 高清黄色对白视频在线免费看| 制服人妻中文乱码| 热99久久久久精品小说推荐| 黑人猛操日本美女一级片| 十八禁高潮呻吟视频| 99国产精品一区二区蜜桃av | 欧美97在线视频| 国产福利在线免费观看视频| 男女边吃奶边做爰视频| 丝瓜视频免费看黄片| 久久人妻福利社区极品人妻图片 | 久久国产精品男人的天堂亚洲| 中国美女看黄片| 我的亚洲天堂| 在线观看人妻少妇| 欧美精品人与动牲交sv欧美| 亚洲精品久久午夜乱码| 欧美亚洲日本最大视频资源| 亚洲中文av在线| 国产极品粉嫩免费观看在线| 久久久久精品国产欧美久久久 | 欧美另类一区| 色婷婷久久久亚洲欧美| 亚洲成人免费av在线播放| 日韩人妻精品一区2区三区| 成人影院久久| 老汉色∧v一级毛片| 亚洲成色77777| 亚洲av成人精品一二三区| 国产精品久久久久成人av| 久久亚洲精品不卡| 成人黄色视频免费在线看| 亚洲成人手机| 精品一区二区三卡| 日韩一本色道免费dvd| 青春草亚洲视频在线观看| 欧美日韩亚洲高清精品| 少妇裸体淫交视频免费看高清 | 啦啦啦视频在线资源免费观看| 少妇粗大呻吟视频| 肉色欧美久久久久久久蜜桃| 免费av中文字幕在线| 国产精品一二三区在线看| 19禁男女啪啪无遮挡网站| 日本vs欧美在线观看视频| 美女国产高潮福利片在线看| kizo精华| 免费观看a级毛片全部| 久久 成人 亚洲| 天天影视国产精品| 亚洲精品久久久久久婷婷小说| 中国国产av一级| 人人妻,人人澡人人爽秒播 | 久久久久精品国产欧美久久久 | 在线天堂中文资源库| 91国产中文字幕| 99精品久久久久人妻精品| 欧美国产精品一级二级三级| 亚洲精品在线美女| 女人久久www免费人成看片| 首页视频小说图片口味搜索 | 亚洲人成网站在线观看播放| 中国美女看黄片| 99国产精品99久久久久| 欧美97在线视频| 18在线观看网站| 中文字幕高清在线视频| 日韩精品免费视频一区二区三区| 欧美日韩成人在线一区二区| 国产免费一区二区三区四区乱码| 免费少妇av软件| 国产成人影院久久av| 精品国产国语对白av| 欧美变态另类bdsm刘玥| 亚洲成国产人片在线观看| 免费黄频网站在线观看国产| 成人三级做爰电影| 赤兔流量卡办理| 国产高清videossex| 1024香蕉在线观看| 黄色怎么调成土黄色| 国产一区二区三区综合在线观看| 美女福利国产在线| 久久人妻福利社区极品人妻图片 | 超色免费av| 建设人人有责人人尽责人人享有的| 这个男人来自地球电影免费观看| 国产无遮挡羞羞视频在线观看| 亚洲色图 男人天堂 中文字幕| 亚洲五月色婷婷综合| 国产熟女欧美一区二区| 欧美国产精品一级二级三级| 乱人伦中国视频| 日韩人妻精品一区2区三区| 午夜福利视频精品| 国产精品久久久人人做人人爽| 中文字幕人妻熟女乱码| 日韩免费高清中文字幕av| 亚洲第一青青草原| 精品久久蜜臀av无| 国产一级毛片在线| 少妇裸体淫交视频免费看高清 | 日本一区二区免费在线视频| 99国产精品一区二区三区| 一本一本久久a久久精品综合妖精| 精品一区二区三区四区五区乱码 | 青春草视频在线免费观看| 别揉我奶头~嗯~啊~动态视频 | 不卡av一区二区三区| 国产在线视频一区二区| av又黄又爽大尺度在线免费看| 性色av一级| 欧美在线一区亚洲| 精品高清国产在线一区| 成年动漫av网址| 国产一区二区在线观看av| 国产黄色视频一区二区在线观看| 欧美激情极品国产一区二区三区| xxx大片免费视频| 免费看av在线观看网站| 久久精品人人爽人人爽视色| 成人三级做爰电影| 91字幕亚洲| 一区二区三区精品91| 高清欧美精品videossex| 久久精品国产亚洲av涩爱| 黑人欧美特级aaaaaa片| 欧美日本中文国产一区发布| 欧美日韩国产mv在线观看视频| 天堂中文最新版在线下载| 国产精品久久久久久精品电影小说| 久久免费观看电影| 精品国产超薄肉色丝袜足j| 欧美日韩福利视频一区二区| av在线app专区| 婷婷丁香在线五月| 熟女av电影| av国产精品久久久久影院| 人人妻人人澡人人爽人人夜夜| 咕卡用的链子| 男女下面插进去视频免费观看| 97精品久久久久久久久久精品| 久久九九热精品免费| 18禁观看日本| 国产精品人妻久久久影院| 另类亚洲欧美激情| 国产精品欧美亚洲77777| 亚洲国产精品999| 亚洲色图综合在线观看| 黄色一级大片看看| 2021少妇久久久久久久久久久| 天天躁夜夜躁狠狠久久av| 日韩一区二区三区影片| 日本一区二区免费在线视频| 亚洲第一av免费看| 国产日韩一区二区三区精品不卡| 国产精品.久久久| 人妻人人澡人人爽人人| 色精品久久人妻99蜜桃| 国产高清视频在线播放一区 | 国产成人av激情在线播放| 十八禁网站网址无遮挡| 午夜福利影视在线免费观看| 视频在线观看一区二区三区| 纯流量卡能插随身wifi吗| 99久久精品国产亚洲精品| 久久狼人影院| 国产一区二区 视频在线| 五月开心婷婷网| 我要看黄色一级片免费的| 欧美精品人与动牲交sv欧美| 老司机靠b影院| 精品一区二区三区四区五区乱码 | 日韩制服骚丝袜av| 女人被躁到高潮嗷嗷叫费观| 亚洲五月婷婷丁香| 777久久人妻少妇嫩草av网站| 国产有黄有色有爽视频| 久久国产亚洲av麻豆专区| 黄色一级大片看看| 中文字幕av电影在线播放| 人妻一区二区av| 精品欧美一区二区三区在线| av在线老鸭窝| 在线观看免费午夜福利视频| 国产亚洲一区二区精品| 婷婷色麻豆天堂久久| 亚洲欧美一区二区三区国产| 亚洲黑人精品在线| 美女福利国产在线| 午夜福利,免费看| 国产成人欧美在线观看 | 99精品久久久久人妻精品| 久久久国产欧美日韩av| 在线观看国产h片| videosex国产| 9热在线视频观看99| 亚洲色图 男人天堂 中文字幕| 精品人妻一区二区三区麻豆| 国产精品欧美亚洲77777| 成年人免费黄色播放视频| 亚洲自偷自拍图片 自拍| 丝袜人妻中文字幕| 黑人巨大精品欧美一区二区蜜桃| 国产亚洲午夜精品一区二区久久| www.av在线官网国产| 久久精品亚洲熟妇少妇任你| 如日韩欧美国产精品一区二区三区| 日本五十路高清| www.熟女人妻精品国产| 午夜福利免费观看在线| 国产黄色视频一区二区在线观看| 好男人视频免费观看在线| 性色av乱码一区二区三区2| 侵犯人妻中文字幕一二三四区| 国产极品粉嫩免费观看在线| 一区福利在线观看| 久久精品久久精品一区二区三区| 国产免费福利视频在线观看| 老汉色∧v一级毛片| 中文字幕色久视频| 99国产精品免费福利视频| 夜夜骑夜夜射夜夜干| 嫁个100分男人电影在线观看 | 国产亚洲午夜精品一区二区久久| 国产一区二区激情短视频 | 久久亚洲精品不卡| 国产1区2区3区精品| 亚洲黑人精品在线| 好男人电影高清在线观看| 熟女少妇亚洲综合色aaa.| 久久久久精品人妻al黑| 中文乱码字字幕精品一区二区三区| 成人黄色视频免费在线看| 欧美精品高潮呻吟av久久| 黄色a级毛片大全视频| 国产伦人伦偷精品视频| 亚洲精品中文字幕在线视频| 一级毛片 在线播放| h视频一区二区三区| 亚洲 欧美一区二区三区| 天堂中文最新版在线下载| 亚洲欧美一区二区三区国产| 亚洲国产av新网站| kizo精华| 夜夜骑夜夜射夜夜干| 成人手机av| 国产精品久久久av美女十八| 国产成人av激情在线播放| 国产成人精品久久久久久| 黄色 视频免费看| 国产97色在线日韩免费| 熟女av电影| 无限看片的www在线观看| 欧美成狂野欧美在线观看| 在线观看一区二区三区激情| 黄色a级毛片大全视频| 亚洲欧美一区二区三区黑人| 少妇粗大呻吟视频| 国产精品欧美亚洲77777| 国产三级黄色录像| 久久久久国产精品人妻一区二区| 久久这里只有精品19| 欧美在线黄色| 黄色a级毛片大全视频| 免费观看av网站的网址| 欧美日韩黄片免| 亚洲综合色网址| 欧美日本中文国产一区发布| 精品福利观看| 99香蕉大伊视频| 无遮挡黄片免费观看| www.精华液| 国产免费现黄频在线看| 日韩一区二区三区影片| 日韩中文字幕视频在线看片| 十八禁网站网址无遮挡| 黄色视频在线播放观看不卡| 国产麻豆69| 亚洲成人国产一区在线观看 | 这个男人来自地球电影免费观看| 精品亚洲成a人片在线观看| 欧美精品av麻豆av| 国产亚洲精品久久久久5区| 超碰97精品在线观看| 国产麻豆69| 日韩视频在线欧美| 夫妻午夜视频| 亚洲第一青青草原| av在线播放精品| 国产男女超爽视频在线观看| 人妻人人澡人人爽人人| 51午夜福利影视在线观看| 欧美性长视频在线观看| 一级片免费观看大全| 国产亚洲av高清不卡| 如日韩欧美国产精品一区二区三区| 欧美成人精品欧美一级黄| 国产极品粉嫩免费观看在线| 丁香六月天网| 国产亚洲欧美精品永久| 国产成人精品在线电影| 妹子高潮喷水视频| 大片电影免费在线观看免费| 国产精品.久久久| 麻豆乱淫一区二区| 国产精品人妻久久久影院| 日韩欧美一区视频在线观看| 可以免费在线观看a视频的电影网站| 欧美+亚洲+日韩+国产| 国产成人欧美在线观看 | 三上悠亚av全集在线观看| 性少妇av在线| 国产精品香港三级国产av潘金莲 | 欧美老熟妇乱子伦牲交| 黄色毛片三级朝国网站| 美女高潮到喷水免费观看| av电影中文网址|