Network Security Payton Turnage, Evan French, Austin Barnett, Zane Womack, Tristan Leavitt, Andrew Hubeli.

Slides:



Advertisements
Similar presentations
Cross-Site Scripting Issues and Defenses Ed Skoudis Predictive Systems © 2002, Predictive Systems.
Advertisements

Nick Feamster CS 6262 Spring 2009
What is code injection? Code injection is the exploitation of a computer bug that is caused by processing invalid data. Code injection can be used by.
Common Exploits Aaron Cure Cypress Data Defense. SQL Injection.
Intrusion Detection and Hackers Exploits IP Spoofing Attack Yousef Yahya & Ahmed Alkhamaisa Prepared for Arab Academy for Banking and Financial Sciences.
CMSC 414 Computer and Network Security Lecture 24 Jonathan Katz.
Security Issues and Challenges in Cloud Computing
Security Awareness: Applying Practical Security in Your World, Second Edition Chapter 5 Network Security.
Security Awareness: Applying Practical Security in Your World
Chapter 9 Web Applications. Web Applications are public and available to the entire world. Easy access to the application means also easy access for malicious.
Sanjay Goel, School of Business/Center for Information Forensics and Assurance University at Albany Proprietary Information 1 Unit Outline Information.
Network Security. Network security starts from authenticating any user. Once authenticated, firewall enforces access policies such as what services are.
Demonstrating HTTP Session Hijacking through ARP Cache Poisoning and Man-in-the-Middle Attack and exploring HTTPS and VOIP session vulnerabilities Mainuddin.
WEB SECURITY WORKSHOP TEXSAW 2013 Presented by Joshua Hammond Prepared by Scott Hand.
Introduction to InfoSec – Recitation 10 Nir Krakowski (nirkrako at post.tau.ac.il) Itamar Gilad (itamargi at post.tau.ac.il)
Security.NET Chapter 1. How Do Attacks Occur? Stages of attack Examples of attacker actions 1. FootprintRuns a port scan on the firewall 2. PenetrationExploits.
Lets Make our Web Applications Secure. Dipankar Sinha Project Manager Infrastructure and Hosting.
WEB SECURITY WEEK 3 Computer Security Group University of Texas at Dallas.
1-Vulnerabilities 2-Hackers 3-Categories of attacks 4-What a malicious hacker do? 5-Security mechanisms 6-HTTP Web Servers 7-Web applications attacks.
Chapter 9 Web Applications. Web Applications are public and available to the entire world. Easy access to the application means also easy access for malicious.
Lecture slides prepared for “Computer Security: Principles and Practice”, 3/e, by William Stallings and Lawrie Brown, Chapter 5 “Database and Cloud Security”.
3-Protecting Systems Dr. John P. Abraham Professor UTPA.
CHAPTER 11 Spoofing Attack. INTRODUCTION Definition Spoofing is the act of using one machine in the network communication to impersonate another. The.
Attacking Applications: SQL Injection & Buffer Overflows.
Chapter 2. Core Defense Mechanisms. Fundamental security problem All user input is untrusted.
Packet Filtering & Firewalls. Stateless Packet Filtering Assume We can classify a “good” packet and/or a “bad packet” Each rule can examine that single.
Cross-Site Attacks James Walden Northern Kentucky University.
Web Application Security ECE ECE Internetwork Security What is a Web Application? An application generally comprised of a collection of scripts.
Security Scanners Mark Shtern. Popular attack targets Web – Web platform – Web application Windows OS Mac OS Linux OS Smartphone.
October 3, 2008IMI Security Symposium Application Security through a Hacker’s Eyes James Walden Northern Kentucky University
CIS 450 – Network Security Chapter 4 - Spoofing. Definition - To fool. In networking, the term is used to describe a variety of ways in which hardware.
By Sean Rose and Erik Hazzard.  SQL Injection is a technique that exploits security weaknesses of the database layer of an application in order to gain.
Copyright © The OWASP Foundation Permission is granted to copy, distribute and/or modify this document under the terms of the GNU Free Documentation.
Presented by Rebecca Meinhold But How Does the Internet Work?
CS526Topic 12: Web Security (2)1 Information Security CS 526 Topic 9 Web Security Part 2.
Web Security Lesson Summary ●Overview of Web and security vulnerabilities ●Cross Site Scripting ●Cross Site Request Forgery ●SQL Injection.
Module: Software Engineering of Web Applications Chapter 3 (Cont.): user-input-validation testing of web applications 1.
Firewalls A brief introduction to firewalls. What does a Firewall do? Firewalls are essential tools in managing and controlling network traffic Firewalls.
Session 11: Cookies, Sessions ans Security iNET Academy Open Source Web Development.
Spoofing The False Digital Identity. What is Spoofing?  Spoofing is the action of making something look like something that it is not in order to gain.
Carrie Estes Collin Donaldson.  Zero day attacks  “zero day”  Web application attacks  Signing up for a class  Hardening the web server  Enhancing.
Unit 2 Personal Cyber Security and Social Engineering Part 2.
MAN-IN-THE-MIDDLE ATTACK STEGANOGRAPHY Lab# MAC Addresses and ARP  32-bit IP address:  network-layer address  used to get datagram to destination.
SESSION HIJACKING It is a method of taking over a secure/unsecure Web user session by secretly obtaining the session ID and masquerading as an authorized.
TCP Sliding Windows For each TCP connection each hosts keep two Sliding Windows, send sliding window, and receive sliding window to make sure the correct.
Web Security (cont.) 1. Referral issues r HTTP referer (originally referrer) – HTTP header that designates calling resource  Page on which a link is.
Chapter 40 Internet Security.
Database and Cloud Security
BUILD SECURE PRODUCTS AND SERVICES
Module: Software Engineering of Web Applications
Firewall Techniques Matt Cupp.
Module: Software Engineering of Web Applications
Web Application Vulnerabilities, Detection Mechanisms, and Defenses
Chapter 7: Identifying Advanced Attacks
World Wide Web policy.
ARP and RARP Objectives Chapter 7 Upon completion you will be able to:
Whether you decide to use hidden frames or XMLHttp, there are several things you'll need to consider when building an Ajax application. Expanding the role.
Spoofing Basics Presentation developed by A.F.M Bakabillah Cyber Security and Networking Consultant MCSA: Messaging, MCSE RHCE ITIL CEH.
Net 323: NETWORK Protocols
CS4622: Computer Networking
Network Security: IP Spoofing and Firewall
Network Security: DNS Spoofing, SQL Injection, ARP Poisoning
CSC 495/583 Topics of Software Security Intro to Web Security
Lecture 2 - SQL Injection
Active Man in the Middle Attacks
COMPUTER NETWORKS PRESENTATION
Computer Networks ARP and RARP
Computer Networks Protocols
Wireless Spoofing Attacks on Mobile Devices
Exploring DOM-Based Cross Site Attacks
Presentation transcript:

Network Security Payton Turnage, Evan French, Austin Barnett, Zane Womack, Tristan Leavitt, Andrew Hubeli

SQL Injection

SQL Injection SQL Injection attacks occur when an application takes data from an untrusted source and passes that input to a database on the backend without and kind of validation, thus allowing the user to input SQL statements that get executed. Entry Points—web form fields, cookies and parts of HTTP headers in-band SQLi Error-Based SQLi. Union-based SQL Blind SQLi—compares results of different queries that return true or false. Time-Based SQLi Out-of-Band SQLi—uses an alternative channel to extract data, such as email. Piggybacked Queries—attacker injects additional queries into the original query to alter data. White, G. (2015). CompTIA Security+. New York, NY:McGraw-Hill Education

SQL Injection Safe Practices

SQL Injection Prevention Strategies Validating Input Whitelist validation—removal of characters that are not part of an approved list. Blacklist validation—only reject input of characters or grouping of characters that are known to be malicious Stored Procedures—restricts the attacker's privileges. Surface Area Reduction—limit the number of components the DBMS is running. Safely Handle Data—encrypt sensitive information. Firewalls Web application firewall(WAF) Database Firewall Suppress Error Messages Avoid Obvious Object names Clarke,J.(2009). SQL Injection Attacks and Defense. Burlington, MA:Syngress Publishing International Journal of Computer Science, Systems Engineering and Information Technology, 2011, pp. 87-91

CSRF Attacks

Prerequisites of CSRF Attacks In order for a CSRF attack to be possible, some assumptions have to be made: the attacked website does not check the Referer HTTP header, so that it accepts requests originating from external pages. The web site accepts data modification via form submissions or URLs that have side effects which the attacker can exploit. The attacker can determine all the values for the request inputs. In the simplest case, authentication is done exclusively via a session cookie and so the attacker just have to fill non-sensitive fields. The user must load a malicious page containing the attacker's code. Judging by the amount of Facebook Likejacking, clicking on everything that moves is a pretty common behavior. https://dzone.com/articles/cross-site-request-forgery https://www.owasp.org/index.php/Cross-Site_Request_Forgery_(CSRF)

CSRF Safe Practices

Origin and Referer Request Headers Require http requests to provide both an origin and referrer header. Most browsers do not allow these to be spoofed. Ensure that these have the same value and that the request does not originate from an third party referrer. Use alternative X-Forwarded-Host header and preprogram expected origin if the service operates behind a proxy.

CSRF Tokens Issue a hidden form value to users, which must be returned with their POST request. Maintain an association between user host and the particular hidden form value, which should originate from a cryptographically secure prng. A stateless solution is to persist a value of the same kind in a user’s encrypted cookie jar, requiring it be sent with each request as a header. A cross site request forger would not have access to the users’ hidden value in the cookie jar; only the correct host’s javascript could fetch it and make it a header. https://www.owasp.org/index.php/Cross-Site_Request_Forgery_(CSRF)_Prevention_Cheat_Sheet Accessed April 11

ARP Poisoning Attacks

ARP Poisoning Host on a local network requests the MAC address of where it wants to send an IP datagram to (ARP request) Request sent to the broadcast address Matching machine returns an ARP reply

ARP Poisoning ARP’s weakness is that it’s a stateless protocol Accepts all responses even if not requested A person can spoof an ARP reply and will then have packets sent to them Done through their own machine on the LAN or through a compromised machine on it Associates their own/compromised MAC address with an IP address of a target

ARP Poisoning “Stealing” packets Man-in-the-middle: Can forward the packets to the actual destination afterwards, thus avoiding detection Can forward some/all of the packets on a network to a target, causing a denial of service (DoS) attack

ARP Poisoning Safe Practices

ARP Poisoning Simplest: have read only IP-to_MAC mapping for each destination on each machine; only efficient on small networks Detection software: Crosscheck ARP responses either in individual machines or through network equipment; block non-matching ones Notification software: Notify a user upon all ARP entry changes Packet filters: Inspect packet’s source address during transmission Cryptographic network protocols: Encrypt data https://books.google.com/books?id=6weH75ATpbUC&pg=PA184#v=onepage&q&f=false https://www.veracode.com/security/arp-spoofing

DNS Spoofing Attacks

DNS Spoofing Domain Name System Spoofing: Man in the middle technique (MITM) where false DNS information is given to a host For example “google.com” is at IP address XXX.XX.XX.XX, but the host receives IP address YYY.YY.YY.YY from the attacker and is sent to fake “google.com” Mainly used with phishing to steal credentials, install malware, or cause denial of service DNS spoofing works because devices do not understand “google.com”, they understand IP addresses; therefore a request is sent to a DNS server that maps domains to IP addresses and then a response is returned

DNS Spoofing Safe Practices

DNS Spoofing Secure internal machines Helps because these attacks are usually within a network Don’t rely on DNS for secure systems Highly sensitive and secure systems should not use DNS Use intrusion detection system (IDS); they pick up most forms of DNS spoofing Use DNSSEC Alternative to DNS/future of DNS uses digitally signed records to ensure validity of response Son, Sooel; Shmatikov, Vitaly. "The Hitchhiker's Guide to DNS Cache Poisoning" (PDF). Cornell University. Retrieved April 10, 2017.