Copyright © 2007 - The OWASP Foundation Permission is granted to copy, distribute and/or modify this document under the terms of the Creative Commons Attribution-ShareAlike.

Slides:



Advertisements
Similar presentations
HQ in Israel Threat research, security operations center 24/7. In-depth understanding and insight into how cyber crime works. Over 10 million online identities.
Advertisements

© 2009 IBM Corporation IBM Rational Application Security The Bank Job Utilizing XSS Vulnerabilities Adi Sharabani IBM Rational Application Security Research.
Infosec 2012 | 25/4/12 Application Performance Monitoring Ofer MAOR CTO Infosec 2012.
SPEKE S imple Password-authenticated Exponential Key Exchange Robert Mol Phoenix Technologies.
WEB BROWSER SECURITY By Robert Sellers Brian Bauer.
Session Hijacking Why web security depends on communications security and how TLS everywhere is the only solution. Scott Helme - 6th Aug scotthel.me.
1 Managing Identity Threats May Where are the threats ? Customer Web/App Server Vulnerabilities: Trojan sniffers Soliciting to enter credentials.
Security Issues and Challenges in Cloud Computing
Introduction to PKI Seminar What is PKI? Robert Brentrup July 13, 2004.
A Security Pattern for a Virtual Private Network Ajoy Kumar and Eduardo B. Fernandez Dept. of Computer Science and Eng. Florida Atlantic University Boca.
Online Security Tuesday April 8, 2003 Maxence Crossley.
It’s always better live. MSDN Events Securing Web Applications Part 1 of 2 Understanding Threats and Attacks.
Lesson 11-Virtual Private Networks. Overview Define Virtual Private Networks (VPNs). Deploy User VPNs. Deploy Site VPNs. Understand standard VPN techniques.
Information Networking Security and Assurance Lab National Chung Cheng University 1 Top Vulnerabilities in Web Applications (I) Unvalidated Input:  Information.
Copyright © Clifford Neuman - UNIVERSITY OF SOUTHERN CALIFORNIA - INFORMATION SCIENCES INSTITUTE CSci530: Computer Security Systems Authentication.
The OWASP Foundation OWASP Chennai Phishing.
Copyright © The OWASP Foundation Permission is granted to copy, distribute and/or modify this document under the terms of the Creative Commons Attribution-ShareAlike.
Introduction to InfoSec – Recitation 10 Nir Krakowski (nirkrako at post.tau.ac.il) Itamar Gilad (itamargi at post.tau.ac.il)
May 30 th – 31 st, 2006 Sheraton Ottawa. Microsoft Certificate Lifecycle Manager Saleem Kanji Technology Solutions Professional - Windows Server Microsoft.
OV Copyright © 2011 Element K Content LLC. All rights reserved. System Security  Computer Security Basics  System Security Tools  Authentication.
Best Practices in Deploying a PKI Solution BIEN Nguyen Thanh Product Consultant – M.Tech Vietnam
LEVERAGING UICC WITH OPEN MOBILE API FOR SECURE APPLICATIONS AND SERVICES Ran Zhou 1 9/3/2015.
© NeoAccel, Inc. TWO FACTOR AUTHENTICATION Corporate Presentation.
Introduction to Secure Messaging The Open Group Messaging Forum April 30, 2003.
IBM Rational Application Security Group (aka Watchfire) Web Based Man In the Middle Attack © 2009 IBM Corporation 1 Active Man in the Middle Attacks The.
Copyright 2007 © The OWASP Foundation Permission is granted to copy, distribute and/or modify this document under the terms of the OWASP License. The OWASP.
Solutions for Secure and Trustworthy Authentication Ramesh Kesanupalli
Configuring and Troubleshooting Identity and Access Solutions with Windows Server® 2008 Active Directory®
Copyright 2007 © The OWASP Foundation Permission is granted to copy, distribute and/or modify this document under the terms of the OWASP License. The OWASP.
Browser Security Evaluation IE6 vs. IE7 vs. Firefox 3.0 Gowri Kanugovi.
Copyright © The OWASP Foundation Permission is granted to copy, distribute and/or modify this document under the terms of the OWASP License. The OWASP.
Copyright © The OWASP Foundation Permission is granted to copy, distribute and/or modify this document under the terms of the OWASP License. The OWASP.
Copyright © cs-tutorial.com. Overview Introduction Architecture Implementation Evaluation.
Copyright © The OWASP Foundation Permission is granted to copy, distribute and/or modify this document under the terms of the OWASP License. The OWASP.
CSCE 522 Identification and Authentication. CSCE Farkas2Reading Reading for this lecture: Required: – Pfleeger: Ch. 4.5, Ch. 4.3 Kerberos – An Introduction.
Copyright © The OWASP Foundation Permission is granted to copy, distribute and/or modify this document under the terms of the OWASP License. The OWASP.
Copyright © The OWASP Foundation Permission is granted to copy, distribute and/or modify this document under the terms of the GNU Free Documentation.
Yair Grindlinger, CEO and Co-Founder Do you know who your employees are sharing their credentials with? Do they?
DIGITAL SIGNATURE.
SSL. Why Is Security Important ●Security is important on E-Commerce because it makes sure that your information gets from your computer to their server.
CS526Topic 12: Web Security (2)1 Information Security CS 526 Topic 9 Web Security Part 2.
Measures to prevent MITM attack and their effectiveness CSCI 5931 Web Security Submitted By Pradeep Rath Date : 23 rd March 2004.
Copyright © The OWASP Foundation Permission is granted to copy, distribute and/or modify this document under the terms of the OWASP License. The OWASP.
Copyright © The OWASP Foundation Permission is granted to copy, distribute and/or modify this document under the terms of the Creative Commons Attribution-ShareAlike.
© Copyright 2009 SSLPost 01. © Copyright 2009 SSLPost 02 a recipient is sent an encrypted that contains data specific to that recipient the data.
Copyright © The OWASP Foundation This work is available under the Creative Commons SA 2.5 license The OWASP Foundation OWASP Denver February 2012.
Lecture 11 Overview. Digital Signature Properties CS 450/650 Lecture 11: Digital Signatures 2 Unforgeable: Only the signer can produce his/her signature.
Lecture 9 Overview. Digital Signature Properties CS 450/650 Lecture 9: Digital Signatures 2 Unforgeable: Only the signer can produce his/her signature.
HOTP IETF Draft David M’Raihi IETF Meeting - March 10, 2005.
By Collin Donaldson. Hacking is only legal under the following circumstances: 1.You hack (penetration test) a device/network you own. 2.You gain explicit,
Information Systems Design and Development Security Precautions Computing Science.
IBM Rational Application Security Group (aka Watchfire) Web Based Man In the Middle Attack © 2009 IBM Corporation 1 Active Man in the Middle Attacks The.
A l a d d I n. c o m Strong Authentication and Beyond Budai László, IT Biztonságtechnikai tanácsadó.
Security of Digital Signatures
Web Application Vulnerabilities, Detection Mechanisms, and Defenses
TOPIC: Web Security (Part-4)
Do you know who your employees are sharing their credentials with
World Wide Web policy.
Grid Security.
ISYM 540 Current Topics in Information System Management
PAYMENT GATEWAY Presented by SHUJA ASHRAF SHAH ENROLL: 4471
Ofer Shezaf, CTO, Breach Security
Cross-Site Forgery
How to Check if a site's connection is secure ?
Security in Web Applications
Riding Someone Else’s Wave with CSRF
The main cause for that are the famous phishing attacks, in which the attacker directs users to a fake web page identical to another one and steals the.
Active Man in the Middle Attacks
Exploring DOM-Based Cross Site Attacks
Week 7 - Wednesday CS363.
Presentation transcript:

Copyright © The OWASP Foundation Permission is granted to copy, distribute and/or modify this document under the terms of the Creative Commons Attribution-ShareAlike 2.5 License. To view this license, visit The OWASP Foundation OWASP & WASC AppSec 2007 Conference San Jose – Nov The PKI Lie Attacking Certificate Based Authentication Ofer Maor CTO, Hacktics

OWASP & WASC AppSec 2007 Conference – San Jose – Nov Introduction  More and more organizations are examining PKI solutions (client cert authentication) to provide an answer to modern authentication threats  This presentation will examine the common notions about PKI in web applications and present various threats  This lecture is:  NOT going to reveal any flaws in RSA or Digital Signatures technology  IS going to present how poor implementation can allow hackers to work around it…

OWASP & WASC AppSec 2007 Conference – San Jose – Nov Agenda  Common Credential Theft Threats  Suggested PKI Authentication Solution  Attacks on PKI Implementation  Poor Application Integration  Trojans  PKI Phishing  Demo  Conclusion  Mitigation

OWASP & WASC AppSec 2007 Conference – San Jose – Nov Common Credentials Theft Threats  Phishing/Pharming  Malicious Links  DNS Hijacking  Trojan/Malware  Online Phishing Against OTP  Trojans  HTTP Monitoring  Key Loggers  XSS Attacks  Session Hijacking  XSS Based Phishing

OWASP & WASC AppSec 2007 Conference – San Jose – Nov Suggested Solution – PKI & Client Certs  PKI Authentication Combines:  Something you Have (Smartcard / Token)  Something you Know (PIN)  Some modern implementations are seeking to replace the PIN with biometric authentication  Authentication requires the physical device to be plugged in (Private key stored on device)  The combination of smart card, PIN, and the strength of RSA, is why many consider PKI authentication as hack proof.

OWASP & WASC AppSec 2007 Conference – San Jose – Nov  The “Hack Proof” notion, urges organizations to switch to PKI based authentication at high costs  Financial Organizations  Many banks are deploying PKI authentication for customers  The solutions are considered so secure – that previous Phishing/Pharming warnings are removed!  Governments  Digital signatures are now legally valid  In some countries – they are considerably more abiding than normal signatures The PKI Lie – A Hack Proof Solution

OWASP & WASC AppSec 2007 Conference – San Jose – Nov  PKI Authentication is not Hack Proof  Secure in Theory  Very strong encryption & authentication algorithms  Verified robust implementation (Common Criteria)  Fails in Practice: Integration of the solution with the surrounding environment may allow compromise  End Point Integration (PC/User)  Web Application Integration  Allows performing real time attacks The PKI (sad) Truth

OWASP & WASC AppSec 2007 Conference – San Jose – Nov Application Integration Flaws  Poor Authentication Verification by Application  Poor Session Integration  Relying on session information for authentication  No binding of application session and SSL session  XSS Vulnerabilities  Data Theft  Execution of Operations  Invocation of Signing Operations (if cached)  The sky is the limit…

OWASP & WASC AppSec 2007 Conference – San Jose – Nov Client Side Attacks – Trojans  Trojans - No #1 Pharming Technique  But also useful for direct data compromise

OWASP & WASC AppSec 2007 Conference – San Jose – Nov Client Side Attacks - Trojans  Complete takeover of smartcard / token  The Simple Way – Cached PIN  The Hard Way – Stealing & Using PIN  Step #1 – Obtaining PIN  Key Loggers  USB Sniffers (Encryption might be a problem…)  Driver Manipulation  Step #2 – Utilizing Card  GUI Based Macro (Visible to user…)  Direct DLL Access – Silent Mode

OWASP & WASC AppSec 2007 Conference – San Jose – Nov 2007  One of the most prominent attacks today  “Surely solved by PKI…” (or not?) 11 Client Side Attacks - Phishing

OWASP & WASC AppSec 2007 Conference – San Jose – Nov Real Time PKI Phishing - Overview  Real Time Phishing provides a mean for overcoming the need of credentials theft.  Rather than being stolen, the credentials are used in real time, while the device is plugged  Once hijacked, the attacker can exploit the existing credentials using CSRF, Reflected XSS or other means  As common with other CSRF/XSS attacks, the user has little, if any, way of preventing this.

OWASP & WASC AppSec 2007 Conference – San Jose – Nov Real Time PKI Phishing - Analysis  The attack is performed by creating a faked site (much like regular Phishing attacks)  The site has no content, and contains 2 frames:  Frame I - Uses entire screen area and presents the real site  Frame II – Invisible, and is used for taking advantage of the logged on user  Utilizing cross domain techniques (CSRF, JavaScript inclusion, etc.) Frame II, already authenticated, is used to launch attacks

OWASP & WASC AppSec 2007 Conference – San Jose – Nov Real Time PKI Phishing - Flow  User follows link to malicious (Phished) site  The response includes an empty content HTML, as following: <IFRAME WIDTH=100% HEIGHT=100% NAME=REAL FRAMEBORDER=1 SRC=“

OWASP & WASC AppSec 2007 Conference – San Jose – Nov Real Time PKI Phishing – Flow (Cont’d)  The user is then presented with the Certificate selection – The user experience is IDENTICAL

OWASP & WASC AppSec 2007 Conference – San Jose – Nov Real Time PKI Phishing – Flow (Cont’d)  Once the user has logged on, the user is able to browser through the site  The malicious site is now able to perform navigation events on the 2 nd IFrame.  This allows execution of any operation in the site on behalf of the user

OWASP & WASC AppSec 2007 Conference – San Jose – Nov Real Time PKI Phishing  Demo…

OWASP & WASC AppSec 2007 Conference – San Jose – Nov Real Time PKI Phishing Limitations  Data Viewing – May not be possible (Cross Site Limitations)  Relies on CSRF Capabilities (Won’t work well in.Net…)  However – both limitations are easily bypassed with Reflected XSS  The Phishing site provides the persistency platform  XSS can then be used to access sensitive data  XSS can also be used to obtaining whatever random data required to overcome CSRF protection

OWASP & WASC AppSec 2007 Conference – San Jose – Nov Additional Real Time PKI Phishing Aspects  Proprietary ActiveX based authentication (As opposed to integrated browser certificates)  Identifying when the main frame has been successfully authenticated – can be performed using cross domain exploits (e.g. JS includes)  Man in the Middle Techniques  An Alternative to CSRF/XSS Attacks  Establish a connection with the client, and relay the challenge from the original server to the client.  Might generate some warnings, but users tend to ignore those…

OWASP & WASC AppSec 2007 Conference – San Jose – Nov Conclusion  Embedding PKI authentication in web applications is not a magic solution!  Trojans, Pharming, Phishing, CSRF, XSS, as well as other applications vulnerabilities, remain a significant concern  These problems must be addressed well before implementing client side certificates  With that said – client side certificates stored on secure physical device are still a very strong form of authentication

OWASP & WASC AppSec 2007 Conference – San Jose – Nov Mitigation  CSRF Protection – Massively discussed yesterday  XSS Protection – Massively discussed for the past few years…  Trojans Protection – Tricky (Requires taking the PC out of the equation…)  On-Device PIN Input & Verification  On-Device Biometric Verification  On-Device “OK” confirmation  Clean From-Device OS Boot (Might work with virtualization as well…)

OWASP & WASC AppSec 2007 Conference – San Jose – Nov Thank You! Questions?