Copyright © The OWASP Foundation Permission is granted to copy, distribute and/or modify this document under the terms of the OWASP License. The OWASP.

Slides:



Advertisements
Similar presentations
Nick Feamster CS 6262 Spring 2009
Advertisements

Cross-site Request Forgery (CSRF) Attacks
Past, Present and Future By Eoin Keary and Jim Manico
ForceHTTPS: Protecting High-Security Web Sites from Network Attacks Collin Jackson and Adam Barth.
FI-WARE Testbed Access Control temporary solution.
Copyright © The OWASP Foundation Permission is granted to copy, distribute and/or modify this document under the terms of the OWASP License. The OWASP.
Session Hijacking Why web security depends on communications security and how TLS everywhere is the only solution. Scott Helme - 6th Aug scotthel.me.
ATTACKING AUTHENTICATION The Web Application Hacker’s Handbook, Ch. 6 Presenter: Jie Huang 10/31/2012.
Copyright © The OWASP Foundation Permission is granted to copy, distribute and/or modify this document under the terms of the GNU Free Documentation.
Copyright © The OWASP Foundation Permission is granted to copy, distribute and/or modify this document under the terms of the OWASP License. The OWASP.
Amir Herzberg and Ronen Margulies Bar Ilan University 1.
The OWASP Foundation Risks of Insecure Communication High likelihood of attack Open wifi, munipical wifi, malicious ISP Easy to exploit.
CS426Fall 2010/Lecture 81 Computer Security CS 426 Lecture 8 User Authentication.
Internet Phishing Not the kind of Fishing you are used to.
A Third Party Service for Providing Trust on the Internet Work done in 2001 at HP Labs by Michael VanHilst and Ski Ilnicki.
10/20/2009 Loomi Liao.  The problems  Some anti-phishing solutions  The Web Wallet solutions  The Web Wallet User Interface  User study  Discussion.
Anti-Phishing Technology Chokepoints and Countermeasures Aaron Emigh Radix Labs
Stronger Password Authentication Using Browser Extensions Blake Ross, Collin Jackson, Nick Miyake, Dan Boneh, John Mitchell Stanford University
Chapter 9 Web Applications. Web Applications are public and available to the entire world. Easy access to the application means also easy access for malicious.
It’s always better live. MSDN Events Securing Web Applications Part 1 of 2 Understanding Threats and Attacks.
The OWASP Foundation Copyright © The OWASP Foundation Permission is granted to copy, distribute and/or modify this document under.
TRIRIGA Anywhere 10.4 Beta Registration Steps
The OWASP Foundation OWASP Chennai Phishing.
Public Key Encryption An example of how a bank might accomplish encryption.
Information Security 2013 Roadshow. Roadshow Outline  Why We Care About Information Security  Safe Computing Recognize a Secure Web Site (HTTPS) How.
Lecture 7 Page 1 CS 236 Online Password Management Limit login attempts Encrypt your passwords Protecting the password file Forgotten passwords Generating.
Phishing and Intrusion Prevention Tod Beardsley, TippingPoint (a division of 3Com), 02/15/06 – IMP-201.
Web Spoofing John D. Cook Andrew Linn. Web huh? Spoof: A hoax, trick, or deception Spoof: A hoax, trick, or deception Discussed among academics in the.
CSC 386 – Computer Security Scott Heggen. Agenda Authentication.
NAMS Account Activation Training. 2 What is NAMS? The NASA Account Management System is NASA’s centralized process for requesting and maintaining accounts.
Prevent Cross-Site Scripting (XSS) attack
WEB SPOOFING by Miguel and Ngan. Content Web Spoofing Demo What is Web Spoofing How the attack works Different types of web spoofing How to spot a spoofed.
Lecture 14 – Web Security SFDV3011 – Advanced Web Development 1.
KAIST Web Wallet: Preventing Phishing Attacks by Revealing User Intentions Min Wu, Robert C. Miller and Greg Little Symposium On Usable Privacy and Security.
Chapter 9 Web Applications. Web Applications are public and available to the entire world. Easy access to the application means also easy access for malicious.
Reliability & Desirability of Data
© 2010 Cisco and/or its affiliates. All rights reserved. 1 Web Security Fear, Surprise, and Ruthless Efficiency Mary Ellen Zurko.
IBM Rational Application Security Group (aka Watchfire) Web Based Man In the Middle Attack © 2009 IBM Corporation 1 Active Man in the Middle Attacks The.
November 13, 2008 Ohio Information Security Forum Attack Surface of Web Applications James Walden Northern Kentucky University
Copyright 2007 © The OWASP Foundation Permission is granted to copy, distribute and/or modify this document under the terms of the OWASP License. The OWASP.
Integrating with UCSF’s Shibboleth system
Copyright 2007 © The OWASP Foundation Permission is granted to copy, distribute and/or modify this document under the terms of the OWASP License. The OWASP.
COMP3121 E-Commerce Technologies Richard Henson University of Worcester November 2011.
An Empirical Study of Visual Security Cues to Prevent the SSLstripping Attack Dongwan Shin and Rodrigo Lopes In Proc. 27 th Annual Computer Security Applications.
Feedback #2 (under assignments) Lecture Code:
Web Spoofing Steve Newell Mike Falcon Computer Security CIS 4360.
School of Computing and Information Systems CS 371 Web Application Programming Security Avoiding and Preventing Attacks.
Drive-by pharming is an interesting type of networking attack that combines multiple networking vulnerabilities and average user laziness to create an.
Copyright © The OWASP Foundation Permission is granted to copy, distribute and/or modify this document under the terms of the OWASP License. The OWASP.
Ram Santhanam Application Level Attacks - Session Hijacking & Defences
CIT 380: Securing Computer SystemsSlide #1 CIT 380: Securing Computer Systems Web Security.
Copyright © The OWASP Foundation Permission is granted to copy, distribute and/or modify this document under the terms of the OWASP License. The OWASP.
How Phishing Works Prof. Vipul Chudasama.
Building Secure Web Applications With ASP.Net MVC.
BeamAuth : Two-Factor Web Authentication with a Bookmark 14 th ACM Conference on Computer and Communications Security Ben Adida Presenter : SJ Park.
Saphe surfing! 1 SAPHE Secure Anti-Phishing Environment Presented by Uri Sternfeld.
Copyright © The OWASP Foundation Permission is granted to copy, distribute and/or modify this document under the terms of the OWASP License. The OWASP.
Copyright © The OWASP Foundation Permission is granted to copy, distribute and/or modify this document under the terms of the GNU Free Documentation.
An Evaluation of Extended Validation and Picture-in-Picture Phishing Attacks Collin Jackson et. all Presented by Roy Ford.
Mr. Justin “JET” Turner CSCI 3000 – Fall 2015 CRN Section A – TR 9:30-10:45 CRN – Section B – TR 5:30-6:45.
© Copyright 2009 SSLPost 01. © Copyright 2009 SSLPost 02 a recipient is sent an encrypted that contains data specific to that recipient the data.
CSRF Attacks Daniel Chen 11/18/15. What is CSRF?  Cross Site Request Forgery (Sea-Surf)  AKA XSRF/ One Click / Sidejacking / Session Riding  Exploits.
Session Management Tyler Moore CS7403 University of Tulsa Slides adapted in part or whole from Dan Boneh, Stanford CS155 1.
Week 7 - Wednesday.  Web security – user side.
SlideSet #20: Input Validation and Cross-site Scripting Attacks (XSS) SY306 Web and Databases for Cyber Operations.
An Introduction to Web Application Security
Cross-Site Forgery
Fixing the Web Trust Model
User Registration.
Active Man in the Middle Attacks
Presentation transcript:

Copyright © The OWASP Foundation Permission is granted to copy, distribute and/or modify this document under the terms of the OWASP License. The OWASP Foundation OWASP Defending against Phishing without Client-side Code Amir Herzberg Bar-Ilan University 6 Sep 2008

OWASP Server-based Defense from Phishing: Agenda  Phishing attacks and defenses  Esp. SSL login pages  Secure-usability testing of phishing defenses: SubmitWeb  Login Bookmarks 2

OWASP 3 Sources This presentation is based on:  TrustBar and related secure-usability experiments, with Ahmad Jbara (BIU)  SubmitWeb: real-use phishing experiments, Joint work with Alex Dvorkin (BIU)  BeamAuth by Ben Adida, see:

OWASP Goal: Server-based Defense from Phishing  Phishing: stealing user’s credentials (password)  Typical phishing vectors:  Spoofed (usually with link to spoofed site)  From attacker-controlled site  Single-Sign On (or `click to login into your…`)  Or, XSS or MITM/Pharming attacks (on victim site/`google`)  How to prevent?  Detect, block phishing  Detect, block phishing site  Prevent expose of password to spoofed site  Without new/extended browser  But doesn’t SSL already do this?? 4

OWASP (c) Amir Herzberg 5 (In)Secure Login using SSL  Example: login form in Chase’s site  Chase must know what they do, right?  Wrong:  Chase’s site or Phisher’s site?  SSL or misleading padlock?  Fact: page loaded w/o SSL  SSL invoked only on `submit’  Spoofed page submits to Phisher…  Most login sites are better:  Invoke SSL, no misleading padlock  Secure?

OWASP (c) Amir Herzberg 6 Typical Login Sites are Better…  Typical, `good’ login site:  Invoke SSL (to authenticate page, encrypt PW)  No misleading padlock  User education:  Look for URL, padlock, https  Never follow links in s, sites (google?)  Isn’t this good enough?  Can/should we do more ?  Without changing the browser?

OWASP Phishing Attacks on Typical (`good’) Sites  Wrong URL attacks  Homographic: submitweb.com vs. submitvveb.com  Misleading: submitweb.c6.com vs. c6.submitweb.com  Pharming/DNS Poisoning/MITM attacks  MITM sometimes easy, e.g. via WiFi  DNS often vulnerable  But what of SSL? Three options: 1.No SSL – will user notice?? 2.SSL, using wrong URL 3.SSL… with Phisher’s CA  Browser will ask user… will user approve? Notice? 7

OWASP Server-based Defense from Phishing: Agenda  Phishing attacks and defenses  Esp. SSL login pages  Secure-usability testing of phishing defenses: SubmitWeb  Login Bookmarks 8

OWASP Do Users Notice ?  Need experiments with users… what a pain!  [H+Jbara] `Classical’ browser vs. Improved  Improved (TrustBar): displays name/logo for site  Detection rate: 67%  96%  Other improvements:  False positives: 19%  3%  Decision time: 15sec  9sec  But in reality:  Almost no false positives  Decision time < 1sec   Need more realistic experiment! 9

OWASP SubmitWeb: Realistic Phishing Experiment [Dvorkin+H]  Real-use assignment submission system  Repetitive web and activities  Very few `attacks’ over long period of use  Significant student population  Early (2008) results: 492 BIU CS students  Each randomly assigned one defense type  Randomly (very rarely) attacked 10

OWASP SubmitWeb: Simulated Attacks 11 Homograph Attack (redirection to non-SSL page). Homograph Attack (redirection to SSL page). Corrupted Certificate. Non-SSL (e.g. MITM)

OWASP SubmitWeb: Evaluated Defense Mechanisms 12  Passive indicators  None (`classical’ browser indicator only)  Display name of site (from certificate)  Display user-selected name for site  Interactive indicators  Interactive site user-selected name  Interactive site user-selected image  Login bookmark  User must click on bookmark to login  Details later

OWASP SubmitWeb: Detection Rates 13

OWASP Server-based Defense from Phishing: Agenda  Phishing attacks and defenses  Esp. SSL login pages  Secure-usability testing of phishing defenses: SubmitWeb  Login Bookmarks 14

OWASP What about login bookmarks? 15  How login bookmarks work?  Server generates special bookmark per user  User `drags’ bookmark into browser  To login, user must click on bookmark  Bookmark contains key for 1 st authentication  Server displays user-selected image  User (confirms image and) enters password  2 nd authentication: password over SSL  Wrong-URL, no-SSL attacks irrelevant  Testing focused on response to

OWASP Login Bookmark: Results 16  Login bookmark mechanism increases user security against phishing attacks  Bookmark reduced following links, success:

OWASP Login Bookmark: Details  1 st idea: JavaScript (with `key’) in bookmark  Problem: current page can change JavaScript, hence access `key`  Better idea: use URL Fragment Identifier, e.g. :  used to designate portion of page  browser scrolls to the appropriate location – if exists  never sent to server but accessible from JavaScript  Changing fragments does not cause page reload 17

OWASP Login with Bookmark + Interactive Image  Initialization:  Select image  Install bookmark (with ID,Key in fragment)  Login process:  User clicks on https (SSL) bookmark, page loaded  Script reads ID, Key, authenticates to server  Server sends secret image (over SSL)  Script displays image  User must click image, then script asks for password  User enters password  Script sends password (over SSL) 18

OWASP Resistance to Specific Attacks  Spoofed site and prompt, user enters PW  Password exposed, ID secret  Note: user ignored no/wrong image!  Replace bookmark  Password exposed, ID still secret  Expose bookmark (access to PC, tricking user)  ID exposed, password OK  Fails  against:  Corrupted server site (XSS sending rogue script)  Rogue CA (approved by user), spoofed site  Rogue browser 19

OWASP Future Plans  Continue, extend SubmitWeb experiments  More data, more confidence  Compare browsers  Compare variants of bookmark defense  E.g. server sends few images  may prevent `dictionary attack’ even from user with access to bookmark  Measure usability  Measure with anti-phishing filtering  Ability to identify clone s  Provide toolkit, help for sites 20